Freedom
                                   ~~~~~~~
                      Freedom Issue 1, December 24, 1992

                                   File 1/7

                                 Introduction
                                 ~~~~~~~~~~~~


Well after a bunch of delays, it's finally here... just in time for christmas.

Merry Christmas everyone..

Welcome  to  Freedom  Issue 1. First  let me  begin by explaining  what 
Freedom is. Freedom is an electronic newsletter devoted to the freedom of 
information, we, like many other electronic newsletters, believe that the 
people have the right to know everything, and mostly things that they 
shouldn't (all legal of course). Since we are just starting out, this issue 
will be fairly small but hopefully in the future as our reader population 
grows so will our issues. Freedom is basically a reader supported newsletter.
I will be writing articles as often as I can, whenever I find something 
interesting, but I also ask that if you have an article or an idea which 
would suit the magazine to please contact us. Anything of interest relating 
to the computer underground, hacking, phreaking, anarchy, and other issues 
would be welcomed. Material may be taken from this magazine as long as the 
source, and author are mentioned, and the article remains unchanged.


                                 Reaching Us
                                 ~~~~~~~~~~~

If you would like to submit an article, or just drop us a note, you can either
call up our support board (204.669.7983). There is a new user password, to get
on the system, login to the public USENet system first (waffle), and leave me
mail asking for it. I'm in the process of hooking up UUCP feeds to the system, 
so in the next issue i'll include the address.


Thanks to ElZorro for proof reading and editing this entire issue.

                                 till next time....

                                                       ICEMAN


Index
~~~~~

I.   Introduction and Index by ICEMAN.
II.  How to lock up TAG 2.6 boards by Thunder/ICEMAN.
III. IBM's Voice Mail System by ICEMAN.
IV.  Air Frequency's For Manitoba by Thunder.
V.   How to make crystalline methylamphetamine (ICE) by Vox Populii.
VI.  How to make a miniature pipe bomb by Lazarus Long.
VII. Hackers in Winnipeg? by ICEMAN.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


                      Freedom Issue 1, December 24, 1992

                                   File 2/7

                         How to lock up TAG 2.6 boards

                              by Thunder/ICEMAN


        This was discovered by a friend of mine (Thunder) so I don't take
credit for finding this but since he didn't want to write up the article I
decided to since it was an interesting bug.

        This is extremely simple so if you don't understand this you will need
help. Basically, what you have to do is write a message containing the 
required character sequence and then quote it. Now, if you want to write a 
public message or a private message to yourself is completely up to you
but post a message. The first step is to write the message. What you have to 
do is hold down the up/down/left/right key (pick one of them) enough times to
enter at least 85 or more escape sequences (considering of course your using
a terminal program that supports arrow key ANSI movements). Don't bother 
counting them, if you hold your arrow key down for at least 15 seconds
thats more than enough. We haven't bothered to test this with any other 
escape sequences but the arrow keys work nicely. This will fill the message 
with the chosen ANSI sequence. Hit enter after doing this for about 15 
seconds and save your message. Now all you have to do is read the message
you just wrote, reply to it, and when you attempt to quote it, it will lock 
up the system instantly. Pretty simple actually..

        We predict that the reason this locks up the system has something to
do with the 255 character string constant. Since each ANSI sequence (for the
arrow keys) is 3 characters, 3*85=255.

ICEMAN

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                      Freedom Issue 1, December 24, 1992

                                   File 3/7


                           IBM's Voice Mail System

                                  By ICEMAN


                                  Disclaimer
                                  ~~~~~~~~~~

As the author of this article, I am not responsible for any actions that may
result from the information in this article. This file is for informational
and educational purposes only, detailing the features of this particular
VMB system. None of this information should not be used without the permission
of the authorized people in charge.


                                 Introduction
                                 ~~~~~~~~~~~~

I haven't encountered a VMB system such as the one IBM is using in our area
yet, so i've decided to write an article on it. The specific system in this
case is only a local system, and I'm not at all sure if IBM is using it on
any 1-800's that they run. I have heard something about ROLM in the past while
but I haven't been able to get any info on it in time for this issue... maybe
there'll be a part ][ in the next one.


                                  

                                  First steps
                                  ~~~~~~~~~~~

Once you have called up the IBM VMB system, a high quality voice will answer
and give you the following options:

o Press 1 if you are using a touchtone phone
o Hold the line if you are using a rotary dial phone

Note that you want to select 1. If you are using a rotary dial phone, get a
touch tone phone. If you hold the line you will be connected to a live
operator, and this defeats the purpose.

Next you will be presented with the following options:

o Press 1 if you know the name of the person you are trying to call
o Press 2 if you want to make a service call
o Press 3 if you would like information on IBM's products or services
o Press 4 if you want to leave a comment about the automated phone system

Now you want to pick option 1, since the whole purpose of your call is to get
into the actual Voice Mail section.


                               Finding Valid VMB's
                               ~~~~~~~~~~~~~~~~~~~

After choosing 1, you are prompted to enter the persons name of who you want
to reach. You enter the name by using your touch-tone keypad corresponding to
the first 3 letters of the persons last name. If you want to reach someone 
with a last name of Doe, you would enter 363 (DOE). Since the letters Q and Z 
don't appear on standard keypads, use the 7 key for Q and the 9 key for Z.

It will probably be difficult to actually find a valid mail-box, so it may
help by actually calling up the local IBM service department and using some
social engineering skills to get some of the employee names out of the 
operator. Or you could go as far as dumpster diving, but this is probably 
far too much trouble to get a person's name.

After finding 1 valid Mailbox it is easier to scan for others as well. When
the voice asks you to enter the mailbox number, after 2 invalid attempts,
enter one the valid ones which you have found. This will prevent the system
from hanging up on you and you can keep on scanning from there.

Once you have entered a valid name, the system will say something like this: 
'You dialed ', then an actual recording of the persons voice will be 
played, saying his own name, so the result will be 'You have reached John 
Doe'. It sounds a little silly mind you, but at least you've found a valid
Mailbox. It will then ask you if this is correct.

o Press # if it is the correct person.
o Press * if it is incorrect.


                             After You've Found One
                             ~~~~~~~~~~~~~~~~~~~

Now the persons greeting will play, and you will be prompted to enter a
message for them. During the greeting, or during message entry if you press
the 0 key, you will be presented with the following options:

o Press # if you would like to talk to someone taking calls for John Doe
o Press 0 to talk to an operator
o Press * to enter another persons name (VMB)
o Or enter an extension number, to transfer to another extension.

You probably won't need to use any of these functions, so just continue
listening to the greeting. Now it's time to try and get into it by hacking
out the persons personal password. To do this you must first enter a message
to the person, enter a completely blank message, unless you want to harrass
an IBM employee or something (not suggested since you dont want to leave
traces of your visit and this would be very unethical). Once the time has
elapsed, you will be presented with the following options:

o Press 7 then 3 to replay the message
o Press 1 to re-record the message
o Press # to accept and save the message
o Press 6 to erase the message
o Press 7 to disconnect

You now want to delete the message since you don't want to leave any traces 
whatsoever of your visit. When selecting 6 you'll be presented with:

o Press # to continue deletion
o Press 1 to re-record the message

Select # to delete the message and proceed. You will then be presented with
the following options:

o Press 0 to transfer to another extension
o Press # to access the phone mail features

Now we want to access the phone mail features so press #. You will now once
again be prompted to enter an extension or name, once again enter the same
name that you are currently hacking. You now have the following options:

o Press * if this is the incorrect person (Obviously not)
o Enter the password for this Mailbox, then press #

Ah-Hah. We have finally reached the password entry prompt. You now have your
chance to try to enter the correct password try every combination of the VMB
number that you can think of or any other information about the employee that
could be relevant.

These systems are incredibly secure (This is IBM we're dealing with here), and
after 3 invalid password entries, you will be unable to get to the password
entry prompt again. This is a major drawback and will deter all but the 
patient, determined individual. You must wait for the person who owns the
mailbox to talk to the system administrator to 'unlock' the mailbox and then try 
again the next day. The person will probably become extremely paranoid due to
people trying to hack into their mailbox every day, and change their password
often. I'm currently not sure of the length of the password since you are 
able to enter as many digits as you like before pressing the pound key.

The fact that you are only allowed 3 attempts to enter the correct password
seems quite stupid in my opinion since even though you are locked out from
attempting to access the VMB so is the owner of the mailbox. This means that
the owner is unable to read their mail or do anything about it. This could 
become very annoying to them if done repeatedly and would be one way to 
really get on their nerves. There's no telling what IBM can or will do. This
is wasting their time, they could go as far as installing traces since 
this is probably considered mischief. So it may be a good idea to do it from 
a payphone, if you must.


                                    Summary
                                    ~~~~~~~

Here is a simplified rundown of what to do:

o Call the VMB system
o Press 1 since you have a touch-tone phone
o Press 1 to enter a persons VMB number
o Press # if it's the correct person
o Wait for the greeting to finish, and enter the blank message
o Press 6 to erase the message
o Press # to verify deletion
o Press # to access phone mail features
o Enter the Mailbox number again
o Enter the password then # to complete

After this you are on your own. We have been unable to enter ANY boxes to
date due to the tight security involved.

If you are able to actually get into one of these mailboxes please let us
know or write up a text file explaining the options availible from within.
Considering the options availible on other similar systems, these could range
from Forwarding Messages, Mass Messages, Creating Guest Accounts, Placing
outgoing calls (an outdial), Listening to your Messages (obviously), 
Programming Mailboxes to Call certain phone numbers, and play certain 
messages at specified times, plus may other possible features.

ICEMAN

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


                       Freedom Issue 1, December 24, 1992

                                   File 4/7

                          DOC Frequencies for Manitoba

                                  by Thunder
                        

What follows are various frequencies for the province of Manitoba, most of
them can be received with a scanner, depending on the quality. Having these
frequencies is by no means illegal, but it is considered illegal to listen
to them.


Freq(khz)  Name                                Area            Service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
46.610     MTS Cordless Phones                 Provincial      Phones
46.970     MTS Cordless Phones                 Provincial      Phones
118.000    Air Centre                          Provincial      Aircraft
118.300    Tower                               Provincial      Aircraft
119.000    Radar                               Provincial      Aircraft
119.500    Arrival                             Provincial      Aircraft
119.900    Departure                           Provincial      Aircraft
121.000    VFR Advisory                        Provincial      Aircraft
121.300    Clearance                           Provincial      Aircraft
121.500    Emergency                           Provincial      Aircraft
121.900    Ground                              Provincial      Aircraft
122.400    Weather - Aircraft                  Provincial      Aircraft
122.800    Unicom                              Provincial      Aircraft
123.000    Unicom                              Provincial      Aircraft
123.500    Unicom                              Provincial      Aircraft
124.300    Pagers                              Provincial      Aircraft
131.775    Air Canada Dispatch                 Winnipeg        Aircraft
131.950    Perimeter Aviation Dispatch         St. Andrews     Aircraft
142.750    Mobile Phone YR                     Provincial      Aircraft
143.415    Bison Electronics Repeater          Provincial      Business
148.685    Emergency Measures Org.             Winnipeg        Emergency
150.605    United Towing                       Winnipeg        Towing
151.025    Unicity Taxi                        Winnipeg        Taxi
151.145    Selkirk Works & Operations          Selkirk         Town
151.325    Selkirk Parks & Recreation          Selkirk         Town
151.350    Stoney Mountain Penitentiary        Stoney Mtn      Police
151.480    Mobile Phone JJ                     Provincial      Phones
152.510    Mobile Phone JL                     Provincial      Phones
152.540    Mobile Phone YL                     Provincial      Phones
152.570    Mobile Phone JP                     Provincial      Phones
152.600    Mobile Phone YP                     Provincial      Phones
152.630    Mobile Phone YJ                     Provincial      Phones
152.660    Mobile Phone YK                     Provincial      Phones
152.690    Mobile Phone JS                     Provincial      Phones
152.720    Mobile Phone YS                     Provincial      Phones
152.780    Mobile Phone JK                     Provincial      Phones
152.810    Mobile Phone JR                     Provincial      Phones
152.840    Mobile Phone JW                     Provincial      Phones
154.980    Winnipeg Transit                    Winnipeg        Bus
155.220    Selkirk Mental Hospital             Selkirk         Crazy
155.310    R.C.M.P. Local                      Selkirk         Police
155.550    R.C.M.P. Channel A                  Provincial      Police
155.580    R.C.M.P. Channel B                  Provincial      Police
155.640    R.C.M.P. Channel D                  Provincial      Police
155.700    R.C.M.P. Channel C                  Provincial      Police
155.760    R.C.M.P. Car to Car                 Provincial      Police
157.530    Unicity Taxi                        Winnipeg        Taxi
157.680    Unicity Taxi                        Winnipeg        Taxi
157.740    Mobile Phone JJ                     Provincial      Phones
157.770    Mobile Phone JL                     Provincial      Phones
157.800    Mobile Phone YL                     Provincial      Phones
157.830    Mobile Phone JP                     Provincial      Phones
157.860    Mobile Phone YP                     Provincial      Phones
157.890    Mobile Phone YL                     Provincial      Phones
157.920    Mobile Phone YK                     Provincial      Phones
157.950    Mobile Phone JS                     Provincial      Phones
157.980    Mobile Phone YS                     Provincial      Phones
158.070    Mobile Phone JR                     Provincial      Phones
158.100    Mobile Phone JW                     Provincial      Phones
158.340    MacArthurs Towing                   Winnipeg        Towing
158.760    Selkirk Ambulance                   Selkirk         Hospital
158.880    Selkirk Volunteer Fire Dept.        Selkirk         Fire
158.925    Provincial Fire Commissioner        Provincial      Fire
159.500    R.C.M.P. East St. Paul              E. St. Paul     Police
159.810    CNR - Symington Yard                Winnipeg        Railway
160.485    CNR - Symington Yard                Winnipeg        Railway
160.905    CNR - Symington Yard                Winnipeg        Railway
161.415    CNR - Police                        Winnipeg        Police
161.870    Unicity Taxi                        Winnipeg        Taxi
162.150    Selkirk Taxi                        Selkirk         Taxi
162.400    USA National Weather Service        Fargo ND        Weather
162.550    Canadian Weather Service            Provincial      Weather
163.230    Unicity Taxi                        Winnipeg        Taxi
164.460    South End Towing                    Winnipeg        Towing
165.990    Manitoba Motor League Towing        Provincial      Towing
168.990    Brandon Jail                        Brandon         Police
236.000    ATC Winnipeg Tower                  Winnipeg        Aircraft
243.000    ATC Country Emergency               Provincial      Aircraft
275.800    ATC Winnipeg Ground                 Winnipeg        Aircraft
282.700    ATC Winnipeg Radar                  Winnipeg        Aircraft
283.500    ATC Winnipeg Clear/Delay            Winnipeg        Aircraft
291.400    ATC Winnipeg                        Winnipeg        Aircraft
294.500    ATC Winnipeg Centre                 Winnipeg        Aircraft
308.800    ATC Pilot to Metro                  Winnipeg        Aircraft
325.900    Winnipeg Tower Radar                Winnipeg        Aircraft
341.300    VFR Advisory Service                Winnipeg        Aircraft
349.600    Winnipeg Centre                     Winnipeg        Aircraft
356.600    Winnipeg Arrival                    Winnipeg        Aircraft
363.800    Winnipeg Departure                  Winnipeg        Aircraft
412.562    Winnipeg Transit                    Winnipeg        Bus
412.637    Winnipeg Transit                    Winnipeg        Bus
412.662    Winnipeg Transit                    Winnipeg        Bus
413.012    Winnipeg Fire Department            Winnipeg        Fire
413.062    R.C.M.P. Airport Security           Winnipeg        Police
413.125    Winnipeg Police District 3,4,5      Winnipeg        Police
413.162    Winnipeg Fire Dept. City Wide       Winnipeg        Fire
418.225    Winnipeg Police District 1,2,6      Winnipeg        Police
418.362    Winnipeg Ambulance Ch 2             Winnipeg        Ambulance
418.412    Winnipeg Fire Department Ch 3       Winnipeg        Fire
418.575    Winnipeg Police - Vice              Winnipeg        Police
418.587    Winnipeg Ambulance Ch 4             Winnipeg        Ambulance
418.625    Winnipeg Fire Department Ch 4       Winnipeg        Fire
418.650    Winnipeg Police - Detective Uplink  Winnipeg        Police
418.737    Winnipeg Police - Mobile Cell       Winnipeg        Police
418.787    Winnipeg Police - Uplink            Winnipeg        Police
418.902    Winnipeg Ambulance - Dispatch       Winnipeg        Ambulance
418.975    Winnipeg Police - Uplink            Winnipeg        Police
420.012    Mobile Phone ACT                    Winnipeg        Phones
420.037    Mobile Phone ACT                    Winnipeg        Phones
451.237    Auto-Route Towing                   Winnipeg        Towing
460.212    R.C.M.P. Winnipeg Airport           Winnipeg        Police
461.787    R.C.M.P. Winnipeg Airport           Winnipeg        Police
464.762    Buchanan Towing                     Winnipeg        Towing
800.000+   MTS Cellular Phones                 Provincial      Phones
                          

Thunder

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                 

                       Freedom Issue 1, December 24, 1992

                                   File 5/7

                How to make crystalline methylamphetamine (ICE)

                                by Vox Populii

                                  Disclaimer
                                  ~~~~~~~~~~

  I'm a firm believer in the concept of evolution and natural selection; 
basically, the strong survive and the weak get shit upon. I also believe 
that reality tends to punish those who are stupid. If you DON'T thoroughly 
understand working with ALL of these concepts, please don't try this...well, 
if you kill yourself, the IQ of the average human being will be that much
greater.

                                  Forward We Go
                                  ~~~~~~~~~~~~~

Materials: 95-100% ethanol, Sodium Borohydride, 250 ml round bottom glass 
flask, reflux condenser, rubber tubing, Sudafed nasal decongestant capsules
( VERY IMPORTANT ), glass extraction funnel, 1 molar Sodium Hydroxide, 
anhydrous Sodium Sulfate, diethyl ether, Safety goggles(!!!!), Safety shield
( plexiglass...1-2" thick ), Safety apron and gloves. It's also advisable to 
have a dry chemical fire extinguisher available at all times. Blue and red 
litmus paper, and about a litre of saturated salt solution (1 gram per 23 
mls).

Where do I get all this shit? Steal it from your high school, or buy it at a
laboratory supply house (none of these materials are prohibited or restricted
in any way!)


Why make this stuff?: Because it's an illegal drug. You can get really wacked 
on the stuff if you're stupid enough to use it. It's probably quite fun if 
you're into death and that kinda shit.

Theory: You will perform a catalytic dehydrogenolysis on pseudoephedrine, 
converting it into methylamphetamine (speed, ice, or glass are common names).

         C-----C
        //     \\
       C         CH2-CHCH3          
        \ _____ /    |
         C-----C     NH2

         
Structure of synthesis: This procedure is broken up into two parts; 

1) the production and purification of pseudoephedrine free base.
2) the production and purification of methylamphetamine free base.


        The production and purification of pseudoepehdrine free base 
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Buy sudafed capsules; the more the merrier!

Method: Take 10 sudafed capsules apart, and place the little round granules 
into a clean dish. These granules contain the pseudoephedrine hydrochloride 
and inorganic filler. Crush the granules until they are no more than a very 
fine powder. I suggest using the 100 milligram capsules at this point. 
Approximate end yield will be roughly 1 gram of product.

        Place 100 mls of room temperature water into the extraction funnel, 
and CAREFULLY add all of the powdder into the funnel. Place a cap on the 
funnel, invert, and open the stopcock. MAKE SURE YOU ARE WEARING YOUR SAFETY 
GOGGLES AT THIS POINT! Swirl the funnel around to dissolve the material. 
There will be a significant amount of undissolved white powder; do not be
concerned, this is inorganic filler. After 10 mins of shaking, dip a glass 
rod into the liquid and touch the drop on the tip of the stirring rod to a 
piece of moist BLUE litmus paper. The litmus paper should turn red where it 
has been touched. This means that the solution is acidic, and that a 
significant proportion of the pseudoephedrine hydrochloride has in fact 
dissolved in the water. If the litmus paper has turned red, you can go on to 
the next step. If not, repeat he shaking 5 more minutes until the litmus 
paper does turn red. 

Add 50 mls of diethyl ether to the separation funnel. BE VERY CAREFUL AT THIS
STAGE. MAKE SURE YOU ARE WORKING IN A WELL VENTILATED AREA AND PLEASE DON'T 
DO SOMETHING FUCKING STUPID LIKE SMOKE CIGARETTES OR YOU DESERVE WHAT WILL 
HAPPEN! YOU DESERVE TO GET LUNG CANCER OR HAVE YOUR FUCKING FACE BLOWN OFF! 
The diethyl ether is less dense than the water solution and will float on top.
Add 10 mls of the 1 molar sodium hydroxide, cap the funnel, invert and 
IMMEDIATELY release the stopcock to vent off the gas that forms. Point the 
end of the funnel AWAY from your eyes! Periodically swirl and vent the funnel 
to release any gas. When no more gas is given off after venting, draw off a 
little of the liquid from the lower layer into a thimble. Test it with a piece
of moist RED litmus paper. If it stays red, add 10 more mls of the sodium 
hydroxide solution, invert funnel, swirl and vent until no more gas is given 
off. Repeat this UNTIL the red litmus paper turns blue. At this stage, the 
water solution is basic, the pseudoephedrine hydrochloride is in the free base
form, and is located entirely within the diethyl ether layer.

          Draw off the lower water layer and discard it. Pour off the ether 
layer into a beaker with 10 grams of anhydrous sodium sulfate. The sodium 
sulfate is a drying agent and will remove most of the water that is in the 
ether solution (very little really since ether is non polar and water is very 
polar). Cap the beaker with a piece of saran wrap and let it sit in a well 
ventilated COOL area overnite (not the fridge). Don't smoke within 2 miles of 
this. Ether is FLAMMABLE and forms EXPLOSIVE peroxides which tend to 
spontaneously detonate.

          Decant off the ether into a dry round bottom flask. Heat this flask
over a pot of very hot water. This will take only a few minutes to evaporate. 
You will be left with a clear syrupy liquid that looks like childrens tylenol 
drops. This is the pure pseudoephedrine free base. If you have a death wish, 
you can try some now (scoop it up with a spoon, a toothpick, etc). Swallow 
it, or put it on a cigarette and smoke it. I don't care. You're stupid if you 
do.

                   
                   Production of methylamphetamine free base
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

          Add the 95% ethanol or everclear drop by drop until the sludge is 
dissolved. It should go into solution very easily. I doubt it if many people 
will be able to get 100% ethanol, but the purer the better, since trace 
amounts of water inhibit the next step in the preparation.

          Total volume should not exceed 50 mls at this point. You can make 
the solution up to 50 mls if you wish. VERY carefully add 1 gram of sodium 
borohydride to the solution, add the relux condensor to the top of the round 
bottom flask, and start to boil the mixture (eg, on a hot plate...NOT on an 
open flame. The cold water going thru the reflux condensor will keep the 
ethanol from evaporating, yet the high temperature of the reaction vessel will
allow the reaction to go forward as desired. Let this go for about 4 hours. 
Take away from the hot plate and let cool slowly to room temperature. 

          AFTER the solution has cooled to room temperature, add 50 mls of 
saturated salt solution. At this point, you should see little oil drops 
floating on the surface of the liquid. This is methylamphetamine. Add 50 mls 
of diethyl ether to the COOLED flask( room temperature is ok ). Transfer the 
contents to a separatory funnel, cap, invert, and IMMEDIATELY open the 
stopcock. Some gas will escape. Close the stopcock, gently swirl, and open to 
vent off and gas. Repeat until no more pressure developes after 5-10 seconds 
of gentle agitation.  

          Draw off the lower layer and set aside for a moment. Drain the upper
ether layer into a beaker containing 10 grams of sodium sulfate. Add the layer
that you had set aside BACK to the separatory funnel, and add another 50 mls 
of ether. Cap, invert, vent, etc until NO more pressure developes. Drain off 
the lower water layer and discard. Drain the ether layer into the beaker with 
the first portion of ether. Cover this with saran wrap and let sit over nite.

          Decant the ether solution into a clean beaker and gently heat this 
over very hot water. As the ether evaporates( please use good ventilation ), 
you will be left with a beige sludge. This beige sludge is methylamphetamine. 
You can do two things at this stage; i) Prepare 'glass' for smoking or 
freebasing (very fucking stupid), or prepare crystal meth for shooting up 
(very very fucking stupid). 
     
     i) if you want to prepare solid ice, stick the beaker in the freezer, 
       and hope that crystal formation starts. If it doesn't, take 5 or 6 
       chemistry course and you'll learn where you fucked up.

    ii) if you want to prepare `crystal' for shooting up, dissolve the beige 
        ice in about 10 mls of anhydrous (very dry) diethyl ether. Add ethereal
        HCL drop by drop. After each drop, you'll see a little white suspension
        form. This is methylamphetamine hydrochloride. Add ethereal HCL until 
        no more white powder forms. You could then decant off any ether, and 
        let the powder dry on tinfoil or whatever. This should be 90% pure.

Reliabilty of this synthetic method: It works, and in a lab, you can go from 
starting material to finished product in about 8 hours IF you know what 
you're doing (and you probably don't). To the best of my knowledge, this has 
never been published, but the general reaction scheme of catalyic 
hydrogenolysis is well documented. At ALL stages, glassware should be kept 
very dry.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        

                      Freedom Issue 1, December 24, 1992

                                   File 6/7

                       How to make a Miniature Pipe Bomb

                                By Lazarus Long


        This device is not a weapon of terrorism like a genuine pipe bomb.  
It is essentially just a firecracker, a very loud firecracker, that can 
mangle a finger or two if you aren't careful. First, I will advise you to go 
out and buy a pound of Pyrodex. This is a smokeless powder sold at most 
gun/hunting supply stores for roughly $15 (Canadian) per pound.  It is an 
exceptionally versatile explosive as it is less sensitive to friction and 
impact, and it also does not absorb moisture as readily, as other similar
compounds like black powder.  Pyrodex is also exceptionally easy to make into
simple fuses.  A pound will last a long time depending on how you use it.

        What you will need:
        
        o A Papermate Flexgrip pen
        o Pyrodex
        o A couple cotton balls
        o A fuse

   
                           Part 1 - Making Fuses
                           ~~~~~~~~~~~~~~~~~~~~~

        For those of you that don't know how to make fuses out of pyrodex I 
will explain this first.  Mix some pyrodex into a small amount of water until
you have a thin paste, it shouldn't be too thick or too watery.  Take a cotton
ball and stretch it into a long string.  Coat this string with the paste and 
loosely pull it through your fingers to scrape off excess paste (do not 
flatten the fuse).  Place on a cookie pan (use wax paper, or place them on 
the back of the pan), aluminum foil, or other similar surface.  Keep making 
these until you run out of paste, there is no need to let it go to waste.  
Bake in your oven at 250 degrees until the fuse is stiff.  When ready it will 
be both stiff and dry, and have a steel grey appearance.  Try not to bend this 
fuse as areas that incur bends will sometimes fail.
        
        This is the most expedient method I have found and, except for the 
Pyrodex, requires items frequently already in the home.  Using the same 
principles you can also use cotton string, or even toilet paper (toilet paper 
is not recommended).  My last bit of advice: never bake a large amount of 
fuses at once.  Although powders like Pyrodex don't explode unless confined, 
they do burn.  I have never had any problems with the above method, but 
caution should always be used.
        
       
                             Part ][ - The Bomb
                             ~~~~~~~~~~~~~~~~~~

        Now to the mini pipe bomb itself.  The Papermate Flexgrip pen is the 
perfect container for such an explosive.  They are, unfortunately, fairly 
expensive as pens go, so except for one or two experimental bombs you are 
going to want to use them first (fortunately the Flexgrip is also one of the 
best pens out there). The reason it is such a good container is that, like a 
pipe bomb, both ends are screw on, one of which has a hole the perfect size
for a fuse.  The rest of the container has no holes in it, unlike the cheap 
Bic pens.
        
        First take out the ink cartridge, you don't need it anymore. Second, 
unscrew the metal end out of which the writing part formerly jutted.  Insert 
the fuse through the hole starting from the inside and pulling out, remember 
to avoid bending the fuse too much.  Leave enough fuse on the inside to just 
barely reach above the threads on the metal cone.  You should then screw this 
metal end back onto the pen.  Now fill the pen with Pyrodex nearly to the top.  
Tap the pen with your finger to eliminate air pockets.  Fill again if 
necessary.  Finally put some cotton in the top of the pen, and the hollow 
part of the screw on top.  Screw the top back into place.  You now have a 
miniature pipe bomb.  When firing this off you don't want to be nearby, it 
produces a fair amount of shrapnel, and a very loud bang.  Use a long fuse.

        When making this using Pyrodex is advised.  If you choose to use black
powder or match heads (match heads are dumb!) be VERY careful when screwing on 
the top piece that you don't have any powder in the threads.  You should be 
wary of this even when using Pyrodex but it isn't nearly as dangerous.  I've 
made over two dozen of these and had no problems whatsoever, except for the 
occasional failed fuse.  If the fuse fails don't approach the bomb for at
least five to ten minutes.  When you recover it you will have to empty the 
Pyrodex and start over with a new fuse.
        
        This mini pipe bomb with the cap on looks just like a pen without 
alterations and could be rigged into a booby trap if necessary (ie. placing 
the pen cap back on in a way that would light a very short fuse when removed).  
Pen booby traps such as these, although not made in the same fashion, were 
used as antipersonal devices by Germans against the British.  The idea behind
such a booby trap is not usually to kill, but to maim, thus taking the enemy 
personnel out of action and forcing the enemy to expend resources on medical 
care.  To be used for recreational purposes though the fuse should be too 
long to place the cap on properly and therefore doesn't look nearly as 
innocent.

Hopefully this makes it in on time to be a part of the LANDMARK issue one of
Freedom, and furthermore I hope to be a regular contributor.  See you soon...

Lazarus Long (LAZ).
December, 1992.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                       Freedom Issue 1, December 24, 1992

                                   File 7/7
                       
                              Hackers in Winnipeg?

                                   by ICEMAN

After hearing about my friend having his computer confiscated for crashing
a board, I was astonished... even more astonishing was what came a few days
later. An article on the FRONT page of our local paper, on his story. A
little extreme in my opinion...

Following is the article which appeared on the front page of the Winnipeg         
Free Press, on November 26, 1992.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      
         STAFF THREATENED, FILES RUINED AS TEEN COMPUTER WHIZ STRIKES

                                By George Nikides

                                 Staff Reporter
    

     A teen hacker uncovered a hole in a downtown software shop's computer 
system and went on a rampage, destroying every file and threatening employees.
     " It's an ego thing. 'Boy look what i've accomplished,' " said Sgt. 
Dennis Loupin of the Winnipeg police fraud unit.
     " He's very, very intelligent. He's got a tremendous future in the
computer world. "
     An 18 year-old, who can't be named because he's charged under the Young
Offender's Act, faces fraud charges.
     Police say a hacker discovered a "hole" - an opening that allows a user
to circumvent a computer system's passwords - in the bulletin board program
at Adventure Software Ltd., a Hargrave Street software shop.
     The computer whiz unlocked the program several times, at one point
destroying every file.

                                 Bulletin Board

     The hacking is believed to have been carried out with an IBM-style 
computer from a home.
     Adventure Software offers a computer bulletin board where customers can
communicate, read about news products, or leave messages from their home 
systems.
     The system has about 400 users, police say.
     An Adventure Software employee, who asked not to be identified, said
threatening messages were left in the system, some suggesting that selling
software was immoral. Some messages attacked a store employee.
     The system was out of operation at one point for 3 1/2 weeks, he said.
     But the employee said police are overstating the hacker's skills.
     " It doesn't take a genius to hear about a 'hole' in the program," said
the man.
     The system was infiltrated four to six times, he said.
     " It's not crippling. It's just extremely annoying, " the employee said.
     By breaking into the system the computer bandit found home phone numbers
and addresses, he said.
     Police say they are also investigating the teen in connection with 
break-ins at other systems across North America.

                                    Mischief

     " He's now going to have to face the consequences of something he 
thought was just a challenge but it's more than that - it's a crime, " said
Loupin.
     A Victor Street teenager was arrested Tuesday night and charged with
using a computer service to commit mischief, an offence that carries a
maximum 10-year sentence.
     The teen is now 18, but police say he was 17 when the alleged crimes 
occured.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

I decided to ask him a few questions about how he fellt about it, and that's
what follows. He didn't want any of his other aliases mentioned, so we
decided to use one which he uses on private boards.

                         FR=Freedom   BL=Big Leacher

FR: Can you give us a brief rundown of the events that happened on November
    24th 1992?

BL: Oh nothing really, just the police department came down and confiscated
    my system, thats about the only thing that happened. I was also taken
    down for questioning.

FR: Do you feel that the Free Press highly exploited your story?

BL: Yes, they seem to want to sell papers, more than tell the truth. The 
    Winnipeg Sun told a more realistic story.

FR: Can you justify Duncan Falconer's (Adventure Software employee) statement
    that it took them 120 hours to setup their system again?

BL: No, and I don't think Duncan could either, he's bullshitting, and even
    lamers know it couldn't take that long.

FR: What do you expect will come out of this? Do you expect to be charged?
    (Just a note that no charges have yet been laid, only a computer was
     confiscated)

BL: I expect to be charged, but it's no sweat, it was a stupid thing to do.
    Better yet, an even stupider thing to get caught for.

FR: Did you learn anything from this experience?

BL: Not really.. just that the police are good at tracing, and that you should
    allways have a failsafe for the data on your computer.

FR: Will you continue hacking after this is all over?

BL: Hack? Naaaaah.. would never get caught doing something as bad as that
    again. :)


FR: What do you think was meant by the statement saying you were being
    investigated in connection with other break-ins across North America?

BL: I had access to many boards through Internet and other LD places. Also
    I was/am in a group which believes in the freedom of expression, so I
    think they are trying to key me as the leader of this group. I didn't
    hack other systems, just Adventure Software, because I had a score to
    settle with an employee there.

FR: What do you mean when you said you 'had a score to settle'?

BL: The sysop of Adventure Software and I had dealings in the past which 
    cause alot of negativity in my family. I no longer hold a grudge.

FR: Do you feel any sympathy towards Adventure Software?

BL: No.. why? Selling software for the prices they do is wrong, since kids
    use games, they'll get them any way they can. There should be a copying
    fee, and that's all. 

FR: What do you think of the fact that this is our city's first computer crime
    investigation?

BL: It's cool, if I was still a youth, I would love the publicity of this,
    but i've turned 18 after the crime, so I can't state how I 'really' 
    feel. :)

FR: Will you continue to BBS after this is over?

BL: Of course, this is nothing, and I'm both amused and suprised of the
    publicity it has received (i.e. Free Press, Sun, Cud) and possibly
    more as the case goes on.

FR: Is there anything else you want to say to ours readers?

BL: Yeah, hacking a bbs sucks, go for new things, and allways watch your ass.
    Damn I need a modem, anyone wanna donate a C64 compatible one? Get in
    touch with ICEMAN. Anyways i'll be back in a few months. 

Well that's all...

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                End of Freedom Issue 1 - Freedom, Copyright 1992
                                 
                                   Freedom
                                   ~~~~~~~

                      Freedom Issue 2, February 28, 1993
                                   File 1/7
 
                                 Introduction
                                 ~~~~~~~~~~~~

        Welcome to issue 2 of Freedom, thanks to everyone who submitted to
the first issue, and this one. I'll keep this intro short, since I don't have
much to say.

        There's been a new section added which i've called Tidbits, that
basically consists of small articles that weren't appropriate to put in
separately. If you have something that you feel isn't worth writing a full
fledged article on, it can be included in this section.

        If you would like to submit an article, or get a hold of me, either
call one of the boards listed hereafter or send it via internet e-mail to
freedom@silicon.bison.mb.ca.

                           Freedom can be found on 

                    Silicon Valley           xxx.xxx.xxxx 

                      as well as the following systems:

                    Unphamiliar Territory    xxx.xxx.xxxx
                    The Phrozen Realm        xxx.xxx.xxxx


                                    ICEMAN
                          iceman@silicon.bison.mb.ca


Index
~~~~~
I.   Introduction by ICEMAN.
II.  Northern Telecom SL-1's by ICEMAN.
III. How to reduce taxes, eliminate welfare, and reduce organ donor shortages
     at no cost to honest hardworking individuals by Vox Populii.
IV.  Computers and Radios by Illusion.
V.   The Invisible Answering Machine by Lazarus Long.
VI.  Catalog Reviews by Lazarus Long.
VII. Tidbits.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                      Freedom Issue 2, February 28, 1993
                                   File 2/7
 
                            Northern Telecom SL-1
                                  by ICEMAN

        This article is fairly lengthy, but I felt that it was worth including
all the information that I did, even though a great deal of it is useless to
someone attempting to take advantage of such a system. If you have any
interest in learning about PBX's, then in my opinion it's worth reading in
it's entirety. Just a note that you can't expect to learn this all in one
sitting, it takes time and experience. I would say that about 50% of this
material was taken from other sources, ranging from Northern Telecom manuals,
to classroom handouts used to educate those who work with them. Although most
of the technical information is straight out of the book, I did my best to
simplify it as much as I could, so that the reader can get a better grasp on
it.

        Development of Northern Electric's SL-1 started in 1971. Their
objective was to design a superior communications system for business 
subscribers in the range of 100 to 7600 stations. The system had to encompass
all the features of a PBX, Centrex and key systems and be economically
competitive with them. It had to have new custom services not previously
feasible with the older systems. It had to be easy to learn and to operate.
As well, it had to be easy to install and maintain.

        What the designers came up with was a digital, stored program control
machine using an 8-bit PCM. They also came up with a new telephone instrument,
the SL-1 telephone, which is a multi-line instrument with many features, but
uses only 2 pairs of wires, instead of 25 pairs required by key telephones.

        The SL-1 system has three main parts: The common equipment (CE), the
peripheral equipment (PE) and the power supplies.

        The CE performs the central control and switching functions for all
the connecting lines and trunks. It has a central processing unit (CPU) and
read/write memory which stores all the operating programs and data unique
to the particular system, including switching sequences, feature and class
of service information, and numbers and types of terminals. It also has a
magnetic tape unit for high-speed loading of the operating programs and data
into the R/W memory, providing data restoral after a power failure. The tape
also contains the diagnostic routines. There is a Teletype to communicate to
the system with and to print error messages on. The network circuits perform
the switching duties for all lines and trunks. The digital service circuits
provide for such functions as dial and ringing tones and call conferencing.

        The CE units communicate over a common central bus under control of
the CPU. Speech signals, converted to digital, follow a separate path on a
network switching bus.

        The PE performs the interface between the line and trunk circuits and
the SL-1 system. It consists mainly of line and trunk cards which convert
analog speech to digital signals for digital switching and vice versa. Lines
connect to individual instruments and trunks to other PBX's. Peripheral 
buffers act as interface between the PE and the CE providing power control,
timing and switching control signals for the line and trunk circuits. Digital
conversion into 8-bit PCM is done by a single encoder/decoder (codec) for each
line or trunk. This codec is a custom LSI circuit.

        Between the PE and the CE, all signals travel in digital format on 
time multiplexed loops. Each loops carriers 30 voice channels, one control
signalling channel and one unused channel. The channels operate at 64 kbps
to give a total data rate of 2.048 mbps. Each loops terminates on a different
circuit pack in the CE. There can be up to 16 multiplex loops.

        When a call is set up, the CPU assigns each party a channel from among
the 30 on their own multiplex loops. These channels form a matched pair. For
instance, the calling party may use channel 2 of it's digital loop, and the
called party may use channel 3 of it's loop.

        The SL-1 conducts audio digitally. The line and trunk cards contain
A/D and D/A converters. Received audio is changed to a digital signal and
put on a voice channel. At it's destination, the digital signal is converted
back to analog audio.

        All programming is done from a keyboard with the output going to a
printer. To program, a specific diagnostic is selected, and is automatically
loaded from tape. Once this is done, the appropriate commands are entered to
change the options. All typing is echoed on the printer and the SL-1's
responses are printed out. If any system parameters or configurations are 
changed, these changes will not survive a total power outage unless a new
tape is made.

        In case of a power outage, upon restoral of power, the SL-1 activates
the tape unit and loads in the system operating data, and runs some 
diagnostics. This takes from 5-15 minutes, and at the end of that time,
service is fully restored with all the options which were recorded on the tape
being implemented. Of course any user-selected options like speed call lists 
and call waiting which had been selected before the outage will be lost.

        Automatic diagnostics (called 'background' programs) are being run
constantly with the results of any problems being printed out. At midnight
a more thorough set of diagnostics are run. Any of the diagnostics may be
run on demand from the keyboard. Also available on demand from the keyboard
are a series of diagnostics to determine the status of lines and trunks, to
trace calls, and to print lists and traffic studies.


                                 SL-1 Features
                                 ~~~~~~~~~~~~~

        - Call Waiting                     - Digitone (DTMF) service             
        - Ring Again                       - Direct inward dialing     
        - Display services                 - Direct outward dialing
        - Tandem switching                 - Private line service
        - Special dial tone                - Remote administration and     
        - Traffic measurement                maintenance
        - Common control switching         - Multi-customer group operation
          arrangement access               - Line/trunk lockout
        - Data transmission                - Flexible numbering system
        - Access to automatic recorded       (2 to 4 digits)
          answering equipment              - Pulse to DTMF conversion
        - Access to paging equipment       - DTMF to pulse conversion
        - Call forward - busy              - Emergency transfer
        - Call forward - don't answer      - Hunting
        - Call forward - follow me         - Intercept
        - Call pickup                      - Manual service
        - Conference (3 or 6 party)        - Night service
        - Service restrictions

                          SL-1 Telephone Set Features
                          ~~~~~~~~~~~~~~~~~~~~~~~~~~~

        - Autodial                         - Automatic preselection
        - Call status                      - Headset connection
        - Call forwarding                  - Executive override
        - Call transfer                    - Hold     
        - Speed calling                    - On-hook dialing     
        - Call waiting                     - LED indicators
        - Tone ringing                     - Call pickup
        - Common audible signalling        - Loudspeaker/Amplifier     
        - Ring again                       - Voice calling
        - Hands free operation             - Manual signalling
        - Multiple appearance directory    - 3 or 6 party conference
          number; multiple call            - non-locking keys
          arrangements                     - Single appearance directory
        - Prime directory number             number
        - Station set expansion            - Privacy
        - Privacy release


                        Explanation of Some Features
                        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Station to station calling - Any station can directly call any other station
without attendant assistance.

Direct Outward Dialing (DOD) - Allows a station to gain access to the exchange
network without attendant assistance and receives a second dialtone.

Hunting - Routes a call to an idle station directory number when the called
number is busy. The numbers in the hunt group do not have to be in sequence
nor do they have to appear on the same instrument. The sequence can be
consecutive (station directory numbers are hunted in ascending numerical
order) or non-consecutive.

Access to paging - Provides a connection to customer-owned paging equipment.

Access to Automatic Recorded Answering Equipment - SL-1 stations can have
incoming messages recorded on customer-provided answering equipment by
forwarding calls to the directory number (DN) assigned to the equipment.

Direct Inward Dialing (DID) - Allows an incoming call from the exchange
network to reach a station without attendant assistance. The DN for each
station will normally be the last 2,3 or 4 digits of the 7 digit exchange
network number.

Tandem Switching - The SL-1 can act as an intermediate switching point for
traffic between other PBX's.

Manual Service - Does not provide a dialtone when a station goes off-hook.
Instead the attendant is alerted and completes the call for the user.

Private Line Service - Permits the appearance of a private central office line
on an SL-1 Telephone set. Dialtone is received directly from the telco and
calls are not processed by the SL-1.

Multi-Customer Group Operation - Allows for the provision of services for more
than one business customer from the same switching machine. Each customer
is totally separate from the others, may have the same directory numbers as
the others, has his own attendant console, his own trunks, and cannot directly
call stations belonging to the other customers.

Service Restrictions - Allows the ability to restrict various functions.

Intercept - Disposes of calls which cannot be completed because of 
restrictions or dialing errors. They are either routed to the attendant
or overflow tone.

Special Dial Tone - A Regular dialtone with three 128 ms interruptions at the
beginning to advise the user that his hookswitch flash has been successful.

Line Lockout - Disconnects stations which have been off-hook for too long to
prevent system problems.

Night Service - Allows the attendant to preconnect some or all of the incoming
telco trunks to selected DN's on the SL-1.

Emergency Transfer - Puts the system in the power fail transfer mode. This
transfers telco trunks to selected stations to provide some continuity of
service to the outside world during the time the SL-1 is inoperative.

Remote Administration and Maintenance - Permits operation of the diagnostics
from a remote location via a modem and telephone line. You may do anything
from the remote terminal that you can do from the local terminal.

Call Forward - Busy - Routes incoming calls to another number when the called
station is busy.

Call Forward - Don't answer - Routes incoming calls to another number when the
called station doesn't answer within a prescribed time.

Call Forward - Follow me - Routes incoming calls to another, programmable
number.

Call Waiting - Informs the user of a second incoming call while he is already
in conversation. He can then place the first caller on hold and answer the
second call. He can then return to the first call.

Conference - Allows a user to connect up to either 1 or 4 additional persons
into an existing call. Up to 2 of the users may be trunks.

Call Pickup - Allows a station to answer an incoming call to another station
in the same pickup group by dialing a special code.

Ring Again - Permits a calling station, on encountering a busy DN, to operate
a dedicated key or dial a special code to have the system monitor the called
station and alert him when it goes idle. He is then automatically connect to
that station when he goes off-hook or presses the key during the alert and the
system rings that station.

Data Transmission - The SL-1 is suitable for voiceband data transmissions
and is compatible with a conventional modem.


                                 SL-1 Models
                                 ~~~~~~~~~~~

Model    Lines     Introduced    Generic      Features
~~~~~    ~~~~~     ~~~~~~~~~~    ~~~~~~~      ~~~~~~~~
SL1-L    300-700      1975         x01      - N/A

SL1-VL   700-2500     1976         x02      - Multi customer operation
                                            - Automatic Identification of
                                              outward dialing
                                            - Do not disturb

CDR      N/A          1977       x03,x04,   - Call detail recording
                                 x08        - Recorded Announcement
                                            - Digit display console

SL1-LE   300-700      1978         x05      - Automatic Route Selection

SL1-VLE  700-2500      N/A         N/A      - Remote peripheral equipment
                                            - Automatic Number Identification
                                            - "E" system
                                            - Autovon

SL1-A    60-400       1979       x06,x07,   - Centralized attendant service
                                 x14        - Automatic call distribution
                                            - Digit display SL-1 Sets
                                            - 2500 Set Features
                                            - Direct inward system access
                                            - Dial Intercom
                                            - Message Center
                                            - Hotel/Motel
                                            - International Phase 1

SL1-XL   1000-5000    1980       x09,X17    - Advanced ACD packages  
                                            - Multiple message center
                                            - Integrated voice and data 
                                              switching
                                            - Hospital/Clinic
                                            - International Phase 2

ESN      N/A          1981       x9000      - Office data administration 
                                              system
                                            - Automatic Wake-up
                                            - Room status
                                            - Auxiliary data system
                                            - Electronic switched network
                                            - International Phase 3

SL1-M    60-400       1982       x11 rls 1  - Attendant Administration
                                            - Attendant overflow
                                            - Automatic set relocation
                                            - History file
                                            - Call park
                                            - Flexible code restriction
                                            - System speed call
                                            - International Phase 4&5

SL1-S    30-160       1983       x11 rls 4  - Distinctive ringing
                                            - Stored number redial
                                            - Async. interface module
                                            - Sync. data transmission
                                            - Multi-channel data system
                                            - SL-1 displayphone
                                            - Hotel/Motel


'Generic' refers to the software version. It is expressed as a 3 or 4 digit
number where the first part of the number indicates the machine it is for
and the second part indicates the purpose of the software and serves as a 
version number and also indicates the type of machine it can be used with. The
'X' stands for a 1 or 2 digit number representing the model:

1 = SL1-L     2 = SL1-VL     3 = SL1-LE     4 = SL1-VLE     5 = SL1-A
6 = SL1-XL    7 = SL1-M/S    8 = SL1-N      9 = SL1-XN      10= SL1-ST
11= SL1-NT    12= SL1-XT

                            Maintenance Programs
                            ~~~~~~~~~~~~~~~~~~~~

        All troubleshooting procedures, configuration changes and circuit
disabling/enabling are carried out from the keyboard of a Teletype via 
software programs. There is virtually no physical contact with the exchange
other than required to remove a defective board and replace it with a spare.
Even this does not require tools.

        This material will give only a brief description of each program and
some examples of how to use them.

        Before running a program you must first gain access to the computer.
The dialup will normally be a 1200 baud connection, with an even parity,
databits of 7, and stopbits of 1 (E71). Once connected press the 'return'
key to wake the system up. The system SHOULD respond with 'OVL111 BKGD' or
'OVL111 IDLE' and now you know it's alright to login. If the response is
'OVL000' and then a '>' prompt you are already logged in, and you can go
straight to loading an overlay.

        Type 'LOGI' to initiate the login. Make sure when entering commands
that they are all input in uppercase. The system responds with 'PASS?'. Now
enter the password. The default password is '0000' but is obviously
configurable. If you have correctly logged in, the system will respond with
a '>' prompt. The system will display this prompt whenever waiting for
operator input and is not running a diagnostic program. Once a diagnostic
program is running the prompt becomes a '.' (period). If you are not logged
in, there is no prompt.

        What follows is an example of what you will see during login.

{ Hit Carriage Return }
.
.
.
.LOGI                        { Initiate Login                    }
PASS?                        { Enter password, it will not echo  }
OVL015                       { Error code for incorrect password }
TTY 01 SCH MTC    16:40

OVL 45 BKGD
.LOGI                        { Try again }
PASS?
.
>
OVL000
>LD 22           { You are now logged in and ready to load an overlay program }
                 { in this case we are loading overlay 22, a print routine.   }
PT20000

REQ TID          { The REQ prompt appears, now enter your selection, in this }
                 { case we want to print the TID (Tape ID)                   }
TAPE ID:
LOADED XXXXXX
DISK/TAPE   XXXXXX

REQ ISS          { Enter ISS to view the Issue and Release number of the     }
                 { software/switch                                           }
VERSION 1011
RELEASE 14
ISSUE 39


REQ END          { Enter END to quit this overlay }
>LOGO
>
.                { Logout and hangup }

        
        Now after gaining this information, we can determine what type of
system we're dealing with. Notice that the version number is 1011. Now
refer back to the listing of SL-1 Models for the information we seek. We are
logged into an x11 system (last 2 digits of the version number). Unfortunately,
there are two system with x11 generics, and none of which have a release
number of 14, so we're either dealing with an SL1-M or an SL1-S, with either a
60-400 or 30-160 line capability respectively. Although this information isn't
extremely useful, it comes in handy when determining how large the system is.


                              Overlay Programs
                              ~~~~~~~~~~~~~~~~

        Upon first logging in, no program is loaded, and you must load a
program (overlay) into system memory. This is done by the command 'LD'
followed by a space and the overlay number. To load overlay 10 you would
simply do a 'LD 10'. It will take approximately 1 minute to load the overlay
into memory from tape, if the system uses a tape drive. If the system uses
other methods of storage (disks, ROM) then it will load quickly. Once the
program is loaded, a 'REQ' (request) prompt will appear. The system is now
waiting for input from the user.

        There are many different overlays which can be used, all of which
are explained in the following section.

Number     Name                          Purpose
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  10   500/2500 Type     Allows new 500/2500 telephone data blocks to be
       Telephone         generated, existing office data modified, moved
                         to a new TN location on the same loop, or removed
                         from the system.

  11   SL-1 Type         Allows new SL-1 telephone data blocks to be
       Telephone         generated, existing office data to be modified,
                         moved to a new TN location on the same loop, or
                         removed from the system.

  12   Attendant         Allows new SL-1 attendant console data blocks to be
       Console           generated, existing office data to be modified,
                         moved to a new TN location on the same loop, or
                         removed from the system.

  13   DIGITONE          Allows new DIGITONE and SL-1 tone detectors blocks
       Receiver and      to be generated, moved to a new TN location on the
       SL-1 Tone         same loop, or removed from the system.
       Detectors

  14   Trunks            Allows new trunk data blocks to be generated,
                         existing office data modified, moved to a new TN
                         location on the same loop, or removed from the 
                         system.

  15   Customer          Allows new customer data blocks to be generated,
                         existing office data modified, or removed from the
                         system.

  16   Trunk Route/      Allows new trunk/ATM route and ATM schedule hours
       Automatic Trunk   data blocks to be generated, existing office data
       Maintenance       modified, or removed from the system.

  17   Configuration     Allows the configuration record to be modified to
       Record            reflect changes in the system parameters.

  18   Speed Call        Allows speed call/system speed call and group call
       Group Call Data   data to be generated, modified, or removed from the
                         system.

  19   Code Restriction  Allows code restriction data block to be generated,
                         modified, or removed from the system.

  20   Print Routine 1   Allows the printing of:
                         - SL-1 TN data blocks
                         - 500 TN data blocks
                         - attendant TN data blocks
                         - trunk TN data blocks
                         - DIG data blocks
                         - group call data
                         - templates
                         - speed call lists
                         - hunting patterns of stations
                         - unused units
                         - unused card positions
                         - terminal numbers

  21   Print Routine 2   Allows the printing of:
                         - customer data blocks
                         - code restriction data blocks
                         - route data blocks
                         - a list of trunks in a route
                         - ATM data
                         - ATM schedules
                         - TN associated with CAS keys

  22   Print Routine 3   Allows the printing of:
                         - the configuration record
                         - directory number to TN matrix
                         - equipped packages
                         - history
                         - password numbers
                         - ROM QPC number
                         - station category indication
                         - version and issue of generic

  23   ACD/Message       Allows ACD data, ACD management report schedules,
       Center            and Message Center data to be generated, modified,
                         or removed.

  24   DISA              Allows data for direct inward system access to be
                         generated, modified or printed.

  25   Move Data         Allows movement or interchanges of data between
       Blocks            loops, shelves and packs in the same customer 
                         group.

  26   Do Not Disturb    Allows DND groups to be formed, changed, merged,
                         removed or printed.

  28   ANI Route         Allows ANI route selection data block to be 
       Selection         generated, modified, removed, or printed.

  29   Memory/           Used to determine the amount of unused memory, and
       Management        to determine if enough memory is available to add
                         new data. Also used to respond to error messages
                         SCH601 and 603 on Meridian SL-1 XN systems.

  49   NFCR              Allows code restriction data blocks to be defined,
                         modified, removed, or printed.

  50   Call Park         Allows call park data to be generated, modified,
                         removed, or printed.

  73   Digital Trunk     Allows Digital Trunk Interface data to be generated
       Interface         or modified.

  81   Features/         Allows stations to be listed or counted according
       Stations Print    to their features.

  82   Hunt Chain/       Allows printing of hunting patterns and multiple
       Multiple          appearance groups.
       Appearance Print

  83   TN Sort Print     Allows printing of stations according to station DES.

  84   DES Entry         Allows the assignment of station DES to 500/2500
                         sets.

  85   DES Entry         Allows the assignment of station DES to SL-1 sets.

  86   ESN 1             Allows electronic switched network data defining
                         BARS/NARS/CDP features to be generated, modified,
                         or printed.

  87   ESN 2             Allows electronic switched network data defining
                         BARS/NARS/CDP features to be generated, modified,
                         or printed.

  88   Authorization     Allows data for Basic Authorization Code (BAUT) and
       Code              Network Authorization Code (NAUT) to be generated,
                         modified, or printed.

  90   ESN 3             Allows data for ESN network translation tables to be
                         generated, modified, or printed.

  93   Mult-Tenant       Used to enable and administer multi-tenant service.
       Service

       
                                 Programming
                                 ~~~~~~~~~~~

        The following few sections will summarize the possible commands and
responses for various overlays. Since there are various models of SL-1's as
well as various software versions running on them, there are bound to be
differences in the commands, to accommodate this, notice the 'generic' heading.
If 'all' appears under this heading, then the following command/prompt is
found in all models/versions, otherwise it only appears in the models/versions
that are specified under this column. Once an overlay is loaded, the first
prompt will appear. For example when overlay 10 is loaded, the 'REQ' prompt
will appear, and you will choose the appropriate response, in this case the
choices are 'NEW','CHG','MOV','OUT', and 'END', then the next prompt will
appear and so on. Note that not all prompts will appear for all versions,
but i've done my best to include possible prompts that you can come across.
When entering input, if you make a mistake and would like the system to
disregard the current line, end the line with a '*' then a carriage return.
If you make a mistake, and would like to return to the beginning of the
input routine, enter '**' at the end of the line, followed by a carriage
return, and you will return to the 'REQ' (request) prompt.


Overlay 10: 500/2500-Type Telephone Set
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

GENERIC       PROMPTS   RESPONSES               COMMENTS
~~~~~~~       ~~~~~~~   ~~~~~~~~~               ~~~~~~~~
all           REQ       NEW,CHG,MOV,OUT,END     NEW - Add a new set
                                                CHG - Change a current set
                                                MOV - Move a set
                                                OUT - Remove a set
                                                END - Quit this overlay

all           TYPE      500                     500/2500 Telephone set data
                                                block (500 is a normal
                                                telephone set)

X11                     CARD                    500/2500 Card Block

all           TN        LL S CC U               LL (Loop), S (Shelf),
                                                CC (Card), U (Unit)

X11.4         CDEN      (dd),sd                 Card Density (double) single
                                                Normally double

all           TOTN      LL S CC U               New loop, shelf, card, unit,
                                                LL (Loop), S (Shelf),
                                                CC (Card), U (Unit)

X04+          DES       XXXXXX                  1-6 digit alphanumeric station
                                                designator for ODAS

all           CUST      0-31                    Customer Number

X05,X09+      DIG       0-253 0-99              Group Number and Member Number

all           DN        XXXX                    Directory Number (Extension)

all           HUNT      XXXX                    Hunt Directory Number
all                     X                       To remove Hunt Directory 
                                                Number (Character 'X')

all           TGAR      0-15                    Trunk Group Access Restriction

X05,X09       ARSQ      0-3                     Automatic Route Selection
                                                Queue code (normally 0)

X11           NCOS      0-15 0-3                Network Class of service group
X11.2+                  0-15 0-3 0-7            0-15 if NARS Active
                                                0-3 if BARS/CDP Active
                                                0-7 if NCFCR Active

all           RNPG      0-127                   Ringing Number pick-up group
X04+                    0-255                   Ringing Number pick-up group

X11           SCI       0-7                     Station Category number
                                                priority level (Normally 0)

X11           XLST      0-7                     Pretranslation group
                                                (Normally 0)

all           CLS       (UNR)                   Unrestricted
all                     TLD                     Toll denied
all                     SRE                     Semirestricted
all                     FRE                     Fully restricted
X04+                    CUN                     Conditionally unrestricted
X04+                    CTD                     Conditionally toll denied
X04+                    FR1                     Fully restricted 1
X04+                    FR2                     Fully restricted 2
all                     (DIP)                   Dial pulse
all                     DTN                     Digitone dial
all                     MNL                     Manual service
all                     (XRD)                   Ring again denied
all                     XRA                     Ring again allowed
all                     (XFD)                   Call transfer denied
all                     XFA                     Call transfer allowed
all                     (CWD)                   Call waiting denied
all                     CWA                     Call waiting allowed
all                     (PUA)                   Call pick-up allowed
all                     PUD                     Call pick-up denied
all                     (WTA)                   Warning tone allowed
all                     WTD                     Warning tone denied
all                     (LPR)                   Low priority station
all                     HPR                     High priority station
X04+                    (FND)                   Call forward no-answer denied
X04+                    FNA                     Call forward no-answer allowed
X04+                    (FBD)                   Call forward busy denied
X04+                    FBA                     Call forward busy allowed
X04+                    (ONP)                   On-premise extension
X04+                    OPX                     Off-premise extension
X04+                    (HTD)                   Hunting denied
X04+                    HTA                     Hunting allowed
X05,X09+                (MWD)                   Message waiting denied
X05,X09+                MWA                     Message waiting allowed
X05+                    MCI                     Message center included
X05+                    (MCX)                   Message center excluded
X05,X09+                (LPD)                   Message waiting lamp denied
X05,X09+                LPA                     Message waiting lamp allowed
X11.4+                  (XHD)                   Exclusive hold denied
X11.4+                  XHA                     Exclusive hold allowed

X09+          FCAR      YES                     Set restricted from using
                                                forced charged account
                        (NO)                    Set can use FCA

X05,X09+      FTR       CFW 4-23                Call forward to directory
                                                number length (normally 4)
X05,X09+                SCC 0-253               Speed call controller list
                                                number
X05,X09+                SCU 0-253               Speed call user list number
X05,X09+                PHD                     Permanent hold
X09+                    MCD XXXX                Message center directory
                                                number
X11.2+                  FDN XXXX                Flexible call forward no
                                                answer directory number
X11.2+                  SSU 0-253               System speed call list number
X11.3+                  RDL 1-31                Stored number redial, maximum
                                                number of digits allowed 
                                                (usually 16)
X11.4+                  HOT 1-31 X...X          Flexible hot line, hot line
                                                directory number length, hot
                                                line directory number
all                     Xaaa                    Remove feature (aaa=feature 
                                                mnemonic)


Overlay 20: Print Routine 1
~~~~~~~~~~~~~~~~~~~~~~~~~~~

GENERIC       PROMPTS   RESPONSES               COMMENTS
~~~~~~~       ~~~~~~~   ~~~~~~~~~               ~~~~~~~~

all           REQ       LTN,LUC,LUU,PRT,END     LUC - List unused cards
                                                LUU - List unused units
                                                PRT - Print data
                                                END - Quit this overlay

all           TYPE      aaa                     Prompted when request is PRT,
                                                which services to print
                                                ADM - Attendant Administration
                                                AID - Automatic Identification
                                                      if outgoing dialing
                                                ATT - Attendant
                                                ATVN- Autovon
                                                CAA - Controlled class of 
                                                      service allowed
                                                CAM - Central Admin and
                                                      Maintenance Trunk
                                                COT - Central Office Trunk
                                                CSA - Common control switching
                                                      arrangement
                                                DIC - Dictation
                                                DID - Direct Inward Dial
                                                DIG - Dial Intercom Group
                                                DTR - Digitone Receiver
                                                FEX - Foreign Exchange
                                                GRP - Group Call
                                                HNT - Hunting
                                                MDM - Modem
                                                MUS - Music
                                                PAG - Paging
                                                PWR - Power-only TN card
                                                RAN - Recorded Announcement
                                                RCD - Emergency Recorder
                                                RLM - Release Link Main
                                                RLR - Release Link Remote
                                                SCL - Speed Call Lists
                                                SL1 - SL-1 Set
                                                TEM - Template
                                                TDET- Tone Detector
                                                TIE - Tie Trunk
                                                TNB - TN Block
                                                TRK - Trunk
                                                WAT - WATS
                                                500 - 500/2500 sets
                                                2000- Meridian 2000 sets
                                                3000- M3000 Touch sets
                                                4020- M4020 Terminal
               
all           TN        <CR>                    Terminal Number to print data
                                                for. <CR> for all.
                        lll                     Print data for this loop
                        lll s                   for this loop,shelf
                        lll s cc                for this loop,shelf,card
                        lll s cc uu             for this loop,shelf,card,unit
                                                Multiple TN's can be entered,
                                                just end your entry with a
                                                space and the prompt will
                                                reappear

X11           CDEN      DD,SD,<CR>              Card density, Double, Single,
                                                <CR> for all.

all           CUST          XX                  Customer Number (0-31)

X11           TEN           0                   Shared customer resource 
                                                stations
                            1-511               Tenant Service stations
                            XX                  Print data for this customer

X04+          DATE      1-31 JAN-DEC            Date, month and year from 
                        19xx                    the date data is to be printed
                        <CR>                    Print all Data

X04+          PAGE      (NO),YES                Print data on per-page basis

X04+          DES       X...X                   1-6 digit designator
                        X+                      All sets starting with DES x
                        +                       Sets with no DES assigned
                        <CR>                    Print All Data

X04+          ADJUST    <CR>                    Prompted when PAGE is YES
              PAPER,                            Just tells you to adjust the
              CR                                Paper in the printer, hit <CR>
                            
X04+          NACT       (NO),YES               Update the activity date? Best
                                                To choose no.

X11.1-        SCNO       XXXX                   Speed call list number, 
                         <CR>                   prompted when type is SCL,
                                                <CR> Prints all.

X11.2+        LSNO       XXX                    List number (0-253).
                         <CR>                   Print all lists

X11.2+        RNGE       XXX YYY                First and last member numbers
                                                in range to be printed.
                         <CR>                   Print all members of the SCL.

all           HNTO       XXXX                   Prompted when type is HNT,
                                                Hunt number.

X05,X09+      DGRP       XXX                    Prompted when type is DIG
                                                DIG numbers per customer
                         <CR>                   All DIG numbers per customer

X05,X09+      DMEN       XX                     Dial intercom member number
                         <CR>                   All DIG numbers

X05,X09+      GRNO       XX                     Prompted when type is GRP
                                                Group call number
                         <CR>                   Print all call group call
                                                groups

X09+          FOR                               Prompted when type is TEM
                         500                    Print data for 500/2500 sets
                         SL1                    Print data for SL1 sets

X11+          KEY        NO                     Print data for 500/2500 sets
                         YES                    Print data for SL1 sets, 
                                                Digital and touch sets.

X09+          INFO                              Prompted when type is TEM
                         FRM                    Print key/feature assignment 
                                                template
                         USE                    Print number of users of 
                                                template
                         USS                    Print TN using template
                         DEF                    Print number of templates 
                                                defined and number allowed

X09+          TEM        XXXX                   Template Number
                         <CR>                   Print all templates

X11+          CPND                              Feature for CPND name display

X11+          EHT        XXXX                   External Hunt DN



Overlay 21: Print Routine 2
~~~~~~~~~~~~~~~~~~~~~~~~~~~

GENERIC       PROMPTS   RESPONSES               COMMENTS
~~~~~~~       ~~~~~~~   ~~~~~~~~~               ~~~~~~~~

all           REQ       PRT,LTM,END             PRT - Print Data
                                                LTM - List Trunk Members
                                                END - Quit this overlay

all           TYPE      CDB,CRB,RDB,CASK,SRDT   Prompted when REQ is PRT
                                                CDB - Customer Data Blocks
                                                CRB - Code restriction Blocks
                                                RDB - Route data block
                                                CASK- Centralize Attendant
                                                      Service data
                                                SRDT- Set relocation data

all           CUST      0-31                    Customer Number
                        <CR>                    Print data for all customers

all           ROUT      0-31                    Route number
                        0-127
                        <CR>                    Print data for all routes

all           ACOD      XX                      Route access code
                        <CR>                    Print data for all route 
                                                access codes

Overlay 22: Print Routine 3
~~~~~~~~~~~~~~~~~~~~~~~~~~~

GENERIC       PROMPTS   RESPONSES               COMMENTS
~~~~~~~       ~~~~~~~   ~~~~~~~~~               ~~~~~~~~

all           REQ       ISS,PRT,PWD,ROM,        ISS - Issue and Release Number
                        SLL,TID,END             PRT - Print Data
                                                PWD - Password
                                                ROM - QPC Number of the ROM
                                                      daughter board
                                                TID - Tape ID
                                                END - Quit this overlay

all           TYPE      AHST,CFN,DNB,DSDN,      Prompted when request is PRT
                        PHST,PKG,SCI,REF,       AHST- All of history file
                        TST,IMA,APL             CFN - Configuration Record
                                                DNB - DN Block
                                                PHST- Part of history file
                                                PKG - Software Packages
                                                SCI - Station Category
                                                      Indication Block
                                                REF - Loop reference trunk
                                                      Data
                                                TST - Loop test trunk data
                                                IMA - Integrated messaging
                                                      system
                                                APL - Auxiliary Processor
                                                      Link

X11+          PWD2      XXXX                    Administrative password

all           CUST      XX                      Customer Number (0-31)
                        <CR>                    All Customers

all           DN        XXXX                    Print for Directory # XXXX
                        <CR>                    Print ALL Directory Numbers
                        XXXX<SPACE>             Will allow printing of 
                                                multiple directories. The DN
                                                prompt will reappear.

X04+          DATE      1-31 JAN-DEC            Date, month and year from 
                        19xx                    the date data is to be printed
                        <CR>                    Print all Data

X04+          DES       X...X                   1-6 digit designator
                        X+                      All sets starting with DES x
                        +                       Sets with no DES assigned
                        <CR>                    Print All Data

X04+          PAGE      (NO),YES                Print data on per-page basis

X04+          ADJUST    <CR>                    Prompted when PAGE is YES
              PAPER,                            Just tells you to adjust the
              CR                                Paper in the printer, hit <CR>
                                                When ready.

X04+          NACT       (NO),YES               Update the activity date? Best
                                                To choose no.

        Those are the main overlays used to modify setups and print the system
configuration information. Now you may be asking, where do I find an SL-1?
SL-1's are mainly used in buildings, ranging from department stores to
large office complexes. The dialups are commonly found off of an extension
of the PBX, I've come across several while scanning for VMB's, which are
becoming more common in stores every day. I've never however come across
one while exchange scanning, and I really don't think you would find many
this way.

        Anyways have fun, and remember, knowing is half the battle.

                                                              ICEMAN

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                      Freedom Issue 2, February 28, 1993
                                   File 3/7
 
                    How to reduce taxes, eliminate welfare,
                    and reduce organ donor shortages at no
                    cost to honest hardworking individuals

                                       by
                                   Vox Populii


        Has it ever bugged you that as a tax paying citizen in this fine
nation of ours that *YOU* have to pay for non productive fucking leeches who
sit at home all day, swilling beer, playing nintendo and generally whacking
off? I know I'm pissed off! 1/3 of my income goes to pay for social programs,
and it makes me as mad as hell that I'm forced to subsidize loozers( yeah
that's right, and if you find this antagonistic, I guess you know what I
think of you so piss off, format your hard drive, do the world a favor and
go crawl in a corner and fucking die already ).

        To the extent that the following issues represent serious problems, 
I offer solutions. These *are* workable, if our society had the balls to 
implement em. Typically however, thoughts like these are known to cause 
severe angst in yuppies. We can only wish that this paradise would come 
about!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

        1. Jails are overcrowded( why should we pay for luxury 
        accommodations for these freaks? ).

        2. We have a shortage of organ donors

        3. Our society is not strong enough( think of imperial 
        Rome, where it was not unusual for the average citizen 
        to see bloodshed each and every day ). Eventually, our 
        way of life will degenerate or rot.

        4. We don't have enough entertainment( or the 
        entertainment is not intense enough...take your pick ).

        5. People who aren't productive can get by just by 
        sucking on the public tit.
        
        6. We pay way too much FUCKING TAXES!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

        Did any of that get you mad? Did it make your blood boil? If it did, 
then I've got respect for you. If it didn't, well...fuck off and die. I've 
got more respect for someone working at McDonalds then for someone collecting
welfare. At least the person working at McDick's is contributing something
to society by virtue of participating in the social order.

        The first plan will virtually eliminate welfare overnite AND provide 
fresh supplies of organs and bodies for medical experimentation. It operates 
under the principle that while people are lazy( and none more so than the 
people on welfare )there is only so high a price that people will pay for 
'free' stuff. To this end, I have segregated people on welfare into three 
categories; 
                
                i) People who can work, but don't want to.
               ii) People who can work, but have been unable to
                   find jobs.
              iii) People who are unable to work for 
                   whatever reason( physical or mental 
                   disability )

Class i)
~~~~~~~~
        
        Fuck em. Let them rot, or kick them out of Canada. You might even want
to send em up to Baffin Island. We *all* know someone like this. It's your
typical person who goes and buys booze with his/her welfare cheque, goes on
a week long drunk, and then ends up robbing someone to buy more booze. I'd be
tempted to say let the law of the jingle take care of em if it weren't for
the fact that these type of people would probably wait outside your door to
mug you. Shooting's too good for them, but lest I be accused of inhumaity, I
say ship the bums off to er Somolia? Yeah, and then see how long they survive
( note: banishment was used in Ancient Greece ). If someone can't work, that's
neither my concern nor yours. So what if these people start hanging around on
the streets; we can ship them away. In the event they *don't* want to go away,
they go into the arena's( see below please ).   

Class ii) 
~~~~~~~~~

        Unfortunately, the government has fucked us all over to the point 
where the economy is a shambles, and there are those of us who *would* work,
but are unable to find jobs. Still, pathetic forms of mercy are no reason to 
shell out *YOUR* hard earned dollars. Class ii individuals could easily slip 
to class one individuals. Therefore, I propose that in exchange for a 
subsistence level of food and shelter, these people be forced to work on 
public projects( e.g. highway repairs, street repairs, cleanup, snow removal,
etc ). For as long as work is available in the public sector, and as long as
these people are willing to accept a demeaning level of existence, I see no
reason why we should not exploit them as a cheap source of labor. However,
lest these individuals come to see 'Big brother' as a provider, they should be
made to attempt job location at least once a month. In any event, when there
is no public work available, I'd kick these people off. Still, these people
are more respectable than class i people.

Class iii) 
~~~~~~~~~~

        This is the most problematic group of people to be dealt with; it
includes physically handicapped people, and individuals who are mentally
retarded. They may or may not wish to work( not that anyone would necessarily
wish to hire them ), nor may they even have an idea of what is constituted by
the concept of work. How do you deal with someone who is labelled as a
perpetual loser in society? How do you do this without appearing to be
inhumane? I'm not a nazi, nor would I wish to see people suffer unnecessarily
( those who deserve to suffer...well... ) If you accept that the jobs are
neither available for this group of people, nor could they fill such jobs if
they were in fact available, what is the incentive for society to sustain
their lives. I.e. what is the motivation for *YOU* Mr. taxpayer to shell out
some of his/her hard earned dollars to keep a non productive person alive?
        
        There is none.....UNLESS they participate in my schemata of voluntary
organ donations. In my extreme generosity, I am willing to allow these 
individuals to receive subsistence assistance from the state( fuck is that an
annoying term )in exchange for being placed on an organ donor bank. 
        
        What I propose is that each month, 8.25% of welfare recipients have
their names chosen at random. Those who are chosen are killed, and their
blood, tissue, skin, etc( i.e. all biologically useful substances )are placed
in storage or immediately given for transplant. The 8.25% represents a 
theoretical breakpoint such that any recipient of welfare( if he or she is
truly so lazy or desperate )has only a 50% chance of still 'being in the
program' after a six month period. Work out what 91.75% raised to the sixth 
power is...

        Quite obviously we would not expect people to meekly march to their
deaths after having 'their number' come up, so what I propose is that 
hospitals become welfare distribution centers. On any given day of the month,
approximately 3.33% of total welfare recipients would go to the hospital, be
strapped in a chair, and play the lottery of life (grin), at which point they
would have a 91.75% chance of receiving social assistance, and an 8.25% chance
of being taken for science. If they have the misfortune to draw a ticket, they 
would be mercifully put unconscious and then cut up for immediate use or 
storage.
        
        The interesting thing about this plan is that it assures us of a 
constant supply of fresh organs each and every day. No more blood bank
shortages. And my fellow taxpayer, LESS sucking at the public tit. YOUR taxes
go down. It's purely voluntary, with no one forced to participate. The only 
point of no return is after someone has drawn a random number. Additionally,
this would tend to strengthen our society, for our weakest members tend to be
the ones receiving social assistance.

______________________________________________________________________________

        
        The second problem that I wish to deal with is overcrowding in our
jail systems. They're overflowing with people, the courts are backlogged with
the most trivial of offenses, the parole system lets hardened criminals out
far too early, and some mass murderer who has raped and killed a dozen kids
gets luxury accommodations for years( while we have to spend OUR money to buy
a turkey for Christmas, these low life scum get to eat for free ).

        This plan operates under the principal that humans are greedy( and
particularly the unintelligent amongst us are greedy; not quite understanding
that you have to work for what you get in life ).

        I propose that for each individual who has committed a felony offense,
they have the offense of working off a portion of their sentence in the
following fashion; if a person has a 10 year sentence, he( or she ) may elect
to enter into the arena for a fight to the death with another convict( who
has also voluntarily elected to enter into the arena ). On each Friday of the
week, a set of such fights is held at the biggest public arena in each state
capital. Contestants are allowed to choose from a variety of weapons with
which to attempt to kill their opponents; ranging from knives to flails, etc.
The victor of said match would receive a one year reduction from his jail
term, while the loser is snuffed out. The person who( for example )had a ten
year sentence would now only have a nine year sentence. To have the jail term
reduced to zero, this person would have to win ten such matches. At any stage
in the process, he/she may drop out( an interesting modification might be to
have one criminal fight two; if the single man won, he would receive a 2 year
reduction, if the pair won, they would receive a 1/2 year reduction ).

        Some curious points to be noted about this proposal are;
                
                -the shorter a period of time a person is to be incarcerated,
                 the less likely they would risk the 'games'.
                
                -It doesn't really matter if a mass murderer has been let 
                 free( e.g. Jeffery Dahmer has a 125 year sentence ), because
                 in order to become free, he must kill 125 other scum. I would
                 say this person has done a great service to society then.
                
        The only stipulation I would like to add is that the Gladiator fights
will have a no tie rule imposed upon them. The contestants are to understand 
in advance that ties are not acceptable. A contestant may however opt to pull
out of a fight with the following penalty; one year will be added to his
sentence for cowardice. The opposing contestant is not penalized, but is
neither rewarded. In the event of such an act of cowardice though, the
remaining contestant has first right of rematch with this person. Should the
'withdrawing' gladiator refuse to refight within a one year period, 10 years
shall be added to his sentence.

        Upon being victorious for the 20th time( e.g. if the criminal had a 
20 year sentence ), a criminal shall be judged to have paid fully and 
completely for his crimes against society. On that instant , he shall be
declared a free man with a complete pardon( as opposed to parole ). In order
to expedite his return to society, he shall be awarded a one time sum of
10,000$ paid by admission tickets to the fights.

                           -=-=-=-=-=-=-=-=-=-=-=-=-

Public executions: 

        All executions of criminals shall take place in public, with the right
of execution decided upon by voluntary participation in a lottery. The person
whose name/number is drawn gets to decide the method of execution of the 
convicted criminal. Methods are to include hanging, shooting , electrocution
and beheading. Public executions are to be televised by all stations that
wish to do so. Imperial Rome had it's 'bread and circuses', and it was
considered to be quite civilized. At one time, it was the zenith of 
civilization on this planet.

        Of course, we could expect all sorts of civil libertarians to snivel
and whine at these proposals( they're probably recipients of welfare handouts
themselves ), but so what? We're not concerned with people like this.
        
        Sparta( an ancient Greek culture in rough proximity to Athens )was a
warrior society with a quite rigid code of ethics. What would be wrong with
'thinking' with our blood a little bit? Our culture has become too soft.

 
        -=-=-=-=-=-
        Vox Populii
        -=-=-=-=-=-
 
-These opinions are not necessarily held, nor supported by the 
 editor of this magazine.

-Feel free to quote from this article, with no compensation nor 
 form of reference given.

-if any of these ideas strike you as interesting, try reading 
 "The Republic' by Plato.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                      Freedom Issue 2, February 28, 1993
                                   File 4/7
                            
                            COMPUTERS AND RADIOS
                                By Illusion

PREFACE
~~~~~~~

     Well, first of all, I am by no means an authority on this subject.  I am
just interested in it, and have decided to share with others what I have 
learned so far.  I am not going to list any sources because I simply can't
remember any.  I did not originally intend to write anything about this, but 
I figured that maybe someone else might find it interesting as well.  The 
information used in this article was not deliberately or specifically obtained 
from any particular sources.  It is a compilation my personal knowledge and
experience on the subject.  A long time ago, I heard that it was possible to
transmit data through the so called "airwaves".  This seemed very interesting
to me, so over time, I've learned about it.

-------------------------------------------------------------------------------

A huge amount of data is available throughout the radio frequency spectrum.
To access it, you need a radio receiver and a computer.  Just like we have
protocols, there are special protocols used on the airwaves.  Equipment, 
software, and instructions are all available from several sources including
ham radio groups.  However, there are other ways to go about setting up a 
"station".  I would recommend buying all of your needed equipment used.
     I have not intended this article for use by the absolute beginner in
radio data communications.  If you are interested in the equipment, the basic
instructions/techniques, or a general overview, then contact a local amateur
radio club.  They will be able to provide you with all of the information that
you require -- usually at no cost.
     First you will need a receiver.  It must at least cover 100kHz to 
30 MHz and have AM, USB, and LSB.  (USB=Upper Side Band, LSB=Lower Side Band)
The better the radio, the easier it will be to find and receive the data.
Now, you need an antenna.  Don't expect to use your old cheap CB whip.
I would recommend what is known as the "active dipole".  It is usually small
and has 2 lengths of wire that are tied parallel to the ground.  Of course 
you want this as high as possible and far away from the computer to ensure
good reception and little interference.
     Next comes a computer.  Just about anything will do.  Even an old VIC-20
would do the job, but more software is available for PC's.  Now you need an
interface or a radio modem.  There is a huge variety of these, but you need
one that fits the industry standards...the best idea here would be to contact
a dealer.  You can probably find a good model for a relatively inexpensive
price.
     OK, I'm not going to go into the special protocols here.  You can find
this information very easily in instruction manuals and books.  What you want
are some frequencies!  Before you try listening in, don't be surprised if you
see silly messages or meaningless characters.  They are used just to sort of
reserve a frequency.  An example would be: RYRYRYRYRYRYRYRYR... on and on
until the station was sending something for real.

Here are a few where you are likely to find others talking (RTTY (Radio 
TeleTYpe)):

3950, 14090, 21090, 28090 ...or 
at VHF/UHF frequencies: 144.6, 145.3, 432.6, 433.3

These are some where you may be able to find news agency transmissions (kHz):

3155-3400      3500-3900      3950-4063      4438-4650      4750-4995 
5005-5480      5730-5950      6765-7000      7300-8195      9040-9500
9900-9995      10100-11175    11400-11650    12050-12330    13360-13600
13800-14000    14350-14990    15600-16360    17410-17550    18030-18068
18168-18780    18900-19680    19800-19990    20010-21000    21850-21870
22855-23200    23350-24890    25010-25070    25210-25550    26175-28000
29700-30005

Now you can know the news before it is broadcast, or sometimes, as it is
happening.  These are fun to listen to, but even more fun to broadcast to.
Use your imagination...

Well, one more thing that I wanted to cover (because it is so interesting), is
satellites.  I don't know very much about this, but I do know that you will
need a scanner type of radio or a crystal controlled one.  Some scanners have
certain frequencies that are blocked out or don't work.  These frequencies 
usually carry things like military information.  With a little electronics 
knowledge, you will be able to easily fix these spaces as these are the really
interesting freqs.  You need a different antenna too.  One of the ones
that is sort of like a big horizontal "X" will work fine.

The general layout of the radio spectrum for satellites is as follows:
          Amateur & Educational satellites:
                    144-146 MHz
                    430-440 MHz
          Weather satellites:
                    136-138 MHz
          Navigation satellites:
                    159-151 MHz

I heard that there are some that operate in the 1500+ MHz range, but I can't 
seem to figure out how to scan this high a frequency.  The VHF/UHF scanner
I was using couldn't go this high.  I suspect that this may be where the
"spy" and military satellites operate.  However, I also would assume that any
important data would be heavily encrypted.

A word of warning:  

     I am not sure about any laws regarding this subject, but I would be
careful.  It's easy enough to alter other peoples data and re-broadcast it
with changes, but I would assume that this is illegal.  It is extremely easy
to receive a satellite weather image, and it is also very simple to change it
and then send it out again.  It might be fun to make there appear to be a 
hurricane approaching on the 6pm news, but they must have ways of tracking
you down.  So, once again, be careful.  There are vast amounts of data riding
the airwaves, and it is available for all to view, with the right equipment.

-----
The author takes no responsibility for the actions taken by any of the readers
of this article.  
-----

Illusion

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                      Freedom Issue 2, February 28, 1993
                                   File 5/7
                 
                 The Invisible Answering Machine User Guide
                               by Lazarus Long

[EDITORS NOTE: The Invisible Answering machine is essentially a VMB service]
[              offered by MTS (Manitoba Telephone System). If it is        ]
[              implemented on your line, after approximately 3 rings, the  ]
[              caller is transferred to the VMB.                            ]

        Call answer is a service that acts like an invisible answering machine.
It will answer your calls when you are away from home or too busy to answer a
call.  By following this guide and listening to the system's friendly and
simple prompts, Call Answer is easy to use.

     The system will ask you to use symbols on your touch tone phone such as:
STAR *, and POUND #.  You'll find a quick reference card on the inside back
cover.  Remove this card and keep it near your phone to help you use the
system.

     Initial start up: Dial the Call Answer access number for Residential
customers - 783-CALL (2255). Voice prompts will then ask you to complete the
following steps:

1. Enter your temporary password - your telephone number will act as the
   temporary password until you create a new one.

2. The system will prompt you to change your temporary password to your own
   personal password.  Your personal password must be between 6 and 15 digits
   and cannot begin with 0 (zero).  For security reasons, CHANGE YOUR PASSWORD
   TO ONE THAT'S EASY FOR YOU TO REMEMBER BUT HARD FOR SOMEONE ELSE TO GUESS.

     The system will prompt you to record your name and select a greeting: 
press 1 for standard greeting, or 2 for personal greeting.  Then press 1 1,
to review them.

     Listening to your messages from your telephone: From a touch tone phone,
dial the Call Answer access number 783-CALL.  Enter your password (if calling
from another phone you will have to enter your phone number first) and press:

                          1 1 to listen to new messages
                          1   to listen to all messages

After you have listened to your messages you can press:
                          
                          4   to replay message
                          7   to erase the message
                          9   to save the message

     Listening to messages from another mailbox: dial the Call Answer access
number, press *, then enter your mailbox number. Enter your password. 

NOTE: Long Distance charges will apply if you are calling from
outside your local calling area.

     Personal options: (press 4 from main menu) A number of Call Answer 
options can be personalized.  From the Personal Options you may press:

                          1   Message waiting - this is the inter-
                              mittent dial tone you hear when there
                              is a message waiting.  It can be 
                              turned on, or off.
                          2   Administrative options - allows you
                              to change your password.
                          3   Greetings - allows you to change your
                              greeting or recorded name as often as
                              you like.
     
     Enhanced Call Answer Features: (available for and additional low monthly
rate).  Message Notification (Outcall), can be programmed to call out to a
pager, cellular telephone or alternative telephone to inform you that a 
message has been received in your mail box. Press:

                          4   for Personal Options
                          4   for notification schedule
                          1   for first schedule (use this schedule
                              for display pagers)
                          2   for second schedule
                          3   for temporary schedule

        You will now be guided through a series of prompts which will assist
you in creating or modifying your message notification schedule.  After you
have completed your schedules and are back in Personal Options, Press * to
exit.
        Family/Extension mail boxes: Call Answer Family/Extension mail box
allows members of your family to receive messages separately with their own
personal password.  This service allows for one host and three extensions
mail boxes.  Each represents one individual within your household.  Extensions
can be added or deleted as required by the host.  To set up a Family/Extension
mail box press:
                          
                          4   for Personal Options
                          9   for Extension mail box

Enter the number for the extension you want to add or delete.  Call Answer
will automatically assign a password.  If you wish, you may change the
password.  Remember, it must consist of 6 to 15 digits, and must not start
with 0 (zero).  Then record your name. To find out who a message is for press
0.  Call Answer will tell you the number of new and saved messages in each mail
box. To send a message to another extension: listen to the entire message
then press:
                          
                          6   for forward message, and record your
                              comments.
                          #   then enter the extension number of
                              the person to whom you wish to send
                              the messages.
                          #   your message will be sent.
                          *   to exit.

For more information please call: 941-7061 in Winnipeg or visit your local
MTS Phone Center.

     MAIN          PLAYBACK CONTROLS          SPECIAL KEYS
       1        1       2       3      *            *
    Listen    Rewind  Pause  Forward Cancel    Cancel/Exit
       4        4       5       6      0            0
  Pers. Opt. Slower  Env.Info Faster  Help        Help
       5        7       8       9      #            #
    Restart          Volume   Louder  Skip    Skip/Complete
       *
     Exit

Comments: For those of you wondering, you don't have to call the owners number
to get at the VMB.  You can call the service and do whatever you have planned.
However, this doesn't look very useful to be hacking into, but I really know
very little about the actual hacking.  Perhaps the weakness is in finding a box
before someone has changed their password.  Still, they will eventually get
MTS to do something about it OR cancel the service.  The other weakness might
be in finding someone with the extension service and creating a new box, BUT
I am pretty sure that the owner knows about the extensions even if he can't
get to them (because of your password), so again he will get MTS to do
something about it. Even though the hacking potential is slim you might want
to fuck around with the system, change messages etc., but that of course is
just mischievous.  If you found one with Outcall I wonder if you could somehow
use that to your advantage.  If not you could surely cause havoc with someone's
beeper/cellular (ie. schedule it to call him/her at 2:00 am and whatnot), but
again that is just mischief. Also, when calling you only have two tries at
getting a number with the service.  On the third try it says "sorry you are
having problems, an operator will be with you in a moment".  At this point
pressing * to exit has no effect.  Hang up.  I don't know how many tries you
get at guessing passwords.  I have entered two and then used my proper one.
One more thing, if you do somehow get an extension box you will want to
disable the intermittent dial tone function on the main box.  This will just
delay them from discovering you though.  The thing about this system is that
people pay a monthly rate for it so you aren't likely to find any "unused"
boxes.

I'd be interested to hear from anyone about any "experiments" with this
system.

LAZ.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                      Freedom Issue 2, February 28, 1993
                                   File 6/7

                               Catalog Reviews
                               by Lazarus Long

        
        If you are interested in "unique and unusual books" you will want to
read this.  In the last month I've been looking around for catalogs from
"underground" publishers and sent away a dozen or so catalog requests.
Unfortunately the responses have been slimmer than I hoped.  The following is
a review of those publishers who have sent me catalogs.

        Paladin Press is one of the better known publishers of "taboo titles".
In the note I received with my catalog they claim to have been in operation
for 22 years, so they aren't likely to be closing up shop anytime soon.  The
catalog is free to anyone that requests it, and is sent every two months to
customers who have made orders in the past year.  The most recent issue is
52 pages long.

        Being a student of espionage, intelligence, and terrorism, this is my
personal favorite of the catalogs I've received.  The variety of books they
offer in the 52 pages is quite extensive and survival oriented.  Ordering is
very easy via a 24 hour, 7 days a week, 1-800 number, or through the mail.

        Paladin Press sub headings include: Revenge & Humor, Locksmithing,
Weapons, New ID & Personal Freedom, Knives & Knife Fighting, Survival,
Sniping, Special Forces, Espionage & Investigation, Self-Defense, Explosives
& Demolitions, Military Science, Action Careers, Police Science, Terrorism,
Martial Arts, and Silencers.

        Service is pretty decent. It took less than three weeks from the day
I mailed my request to the day I received the catalog. Ordering by phone is
however a pain.  It is so low tech that the operator has to write down your
order by hand (while looking the books up in a stock catalog).  Shipping is
only supposed to take 7 to 10 days and they charge %6.00 or 5% of your order
(whichever is greater) for S&H.  If you want, other shipping arrangements can
be made.  They also accept Visa and Mastercard.

     The address is: Paladin Press, PO Box 1307,
                     Boulder, Colorado, 80306
     
     Their two 24 hour, 7 days/week 1-800#s are:
                     1-800-392-2400 (USA only)
                     1-800-872-4993 (USA and Canada)

        The Loompanics Unlimited catalog is clearly the largest and most
diverse catalog I've received to date.  The drawback is that it costs $5.00
US before you even get to see it.  They do, however, claim to be "the best
book catalog in the World".  It is indeed for anyone interested in "the
strange, the useful, the arcane, the oddball, the unusual, the unique, and
the diabolical". 

        The 1993 main catalog is over 280 pages long and its sub headings
are: The Underground Economy, Tax Evasion, Money Making Opportunities, Privacy
& Hiding things, Fake ID, Big Brother is Watching You, Conducting 
Investigations, Crime and Police Science, Locks and Locksmithing, Self
Defense, Revenge, Guns, Weapons, Torture, Survival, Self-Sufficiency, Head
for the Hills, Gimme Shelter, Health and Life Extension, Paralegal Skills,
Sex, Drugs, Rock 'N Roll, Intelligence Increase, Science and Technology,
Heresy/Weird Ideas, Anarchism and Egoism, Work, Mass Media, Censorship, Reality
Creation, and Self Publishing.

        I've only had this for a short time and haven't been able to get 
through it all, but it seems quite cool.  It also contains six articles which
consist of essays, short fiction, and a three page comic.  Some of the books
offered are the same as those in the Paladin Press catalog, but I have noticed
no price differences.

        Service is not as good as Paladin Press from what I can see. The
catalog took about a week longer to arrive and the orders can only be made by
mail.  Outside US orders have a whopping 12% of order PLUS $6.00 charged for
shipping and handling.  US orders are $7.50 plus regular shipping prices.

     The address is: Loompanics Unlimited, PO Box 1197,
                     Port Townsend, WA, 98368
     Their orders are shipped within 24 hours of receipt of payment.

        Books-by-phone is another cool publisher of controversial and 
underground books.  It says it costs two bucks but they'll send it free if
you give their 1-800# a call.  They basically bring together books from many
different publishers and make them conveniently available.  Prices seem to be
the same but I noticed one book that was actually $2.00 cheaper than that of
the original publisher.

        The Fall 1992 catalog is 32 pages long, and the subheadings are: 60s
and Beats, Black Markets, Comics, Criminology, Cyberpunk, Drug - Legal &
Social, Drug Literature, Ecology, Gardening and Herbs, Health, identification,
Timothy Leary, John Lilly, LSD, Marijuana, Money, Mushrooms, Occult,
Pharmaceuticals, Privacy, Psychoactives, Recovery, Rock & Roll, Sex &
Sensuality, Shamanism, Survival, Underground Labs, Weird & Exotic, Colin
Wilson, and Robert Anton Wilson.

        As for service, well, call the 1-800# and you get the catalog quite
quickly.  You can mail in orders or phone them in but there is a $3.00 charge
for a credit check on all credit card orders. American orders get a 10%
discount when made with money orders. Shipping and handling is $1.00 per book
in the US, and $3.00 per book in Canada.

     The address is: Books by Phone, PO Box 522,
                     Berkeley CA, 94701
     
     Their 1-800 is: 1-800-858-2665

        The Eden Press book catalog is aimed mainly at the subjects of
privacy and money.  Their goal is to "present ideas which can increase
opportunities for personal freedom".  There are some interesting books,
many of which I haven't seen in any of the other catalogs.  One thing that
endeared them to me was a notice on the cover, "Freedom is not dangerous to
your health".  So I guess you should read this magazine in large doses.

        The most recent catalog has the sub headings: Jobs, Credit, Privacy,
Protection, Business Ideas, Offshore Finance, and Personal Independence.

        Service looks very good.  It was roughly a week from the time I sent
the request to when I received the catalog.  You can order by mail, a 1-800
number, or by FAX.  They accept both Visa and Mastercard.  S & H in the US
seems reasonable (you can select the type of mail service you prefer), but
it is rather expensive in Canada at 20% of your order.

     The address is: Eden Press, 11623 Slater "E"
                     PO Box 8410, Fountain Valley
                     CA, 92728
     
     Their 24 hour, 7 days/week 1-800# is:
                     1-800-338-8484 (might be US only)
     
     Their FAX # is: 714-556-0721

        The last catalog I received was the Spring 1993 Butokukai (what a 
name!) book catalog.  It is only 23 pages long but has some stuff not
available in the other catalogs, but most of it is available elsewhere.  One
drawback is that they have changed their name sometime in the last two years
which I consider a sign of instability (they were formerly known as Desert
Publications). They are weapon oriented (and do sell some weapons, but they
cannot be shipped to Canada).

        The sub headings include: Under Cover Operations, Full Auto, 
Suppressors, Improvised Munitions, Weapons + Firearms, Guerilla Warfare, Army
Technical Manuals, SWAT Magazine back issues (sole suppliers), Self-Defense,
Home Study Courses (Ninja), Ninja, Firepower Magazine back issues, and
Locksmithing.

        Service is, all things considered, average.  It took a long time for
me to get the catalog (about 5 weeks) but that might have had something to do
with their name/address change.  You can order by mail, 1-800#, or FAX, and
they accept Visa and Mastercard.  An added bonus is that any order greater
than $50.00 gets you a free book of your choice (from a list of 13 books).
Shipping and  Handling is $4.00 per order in the US and $6.00 in Canada.

     Their address is: Butokukai, PO Box 430,
                       Cornville AZ, 86325
     
     Their 24 hour, 7 days/week 1-800# is:
                       1-800-747-6280
     
     Their FAX # is  : 602-634-1203

        I also just read the address for Barricade Books on a net.  I can
neither verify it or judge its quality but I'll include it for your
convenience.
     
     Their address is: Barricade Books, PO Box 1401-J
                       Secaucus NJ, 07096

Amendment: Butokukai may not have used the name Desert Publications, I may 
have been given some wrong information.  The real address for the REAL Desert 
Publications is: Desert Publications, PO Box 1751, El Dorado, AR 71731 USA.
You can also call: 1-501-862-2077.  Their catalog is $2.00 or free with an 
order.

LAZ's quote for the month:
"Whether it is good or bad, smashing something is also very pleasant on 
 occasion" Fyodor Dostoevsky, Notes from Underground.

Lazarus Long.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                      Freedom Issue 2, February 28, 1993
                                   File 7/7

                                    Tidbits


        This is a new section consisting mainly of smaller articles that in
my opinion weren't feasible to split into separate articles.


~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
                                  
                                  Mild Anarchy

        Fed up with impersonal corporations?  Want to get even without
breaking the law?  There are several methods of mild anarchy that will cost
the corporations money and in some cases benefit you.

1)  Get a credit card and use it responsibly.  How is that anarchy some people
    will ask.  Well some credit cards have no service fees or monthly fees
    but charge a preposterous amount of interest on an outstanding balance.
    The anarchist though will never have an outstanding balance, and thus
    defers payment for a month and can collect interest from the money that
    instead remains in the bank. You also build up a healthy credit rating
    for your future.  Bank of Montreal Mastercards work well with this.

2)  Are you in a book or music club like Columbia House? Frustrated or pissed
    off at having to send back things saying you don't want the "selection
    of the month"?  The anarchistic solution is simple: don't send them back.
    Then when they send you the tape, CD, book, or whatever, you can listen
    to it (tape it if you want), read it, or whatever you do with the object.
    Then put it back in its original package, seal it up, and write REFUSED on
    the front of the package.  This way you get to sample and or copy the
    product for free, and the corporation pays the postage.  I'm in a book club
    and a CD club and this works fine all the time.  It is also handy if you
    don't want to keep receiving garbage from them all the time. If you haven't
    sent something back to them they figure you own them money and don't send
    anything until you have paid up.  Keep the "gift" for several months, have
    a good laugh at the form letters they keep sending (You are such a good
    customer, please pay up or we will be forced to sick Guido the collection
    agent on you), then send it back.

3)  Free stuff!  This is a good idea even if you don't want to annoy the
    company.  Most businesses really want to maintain good public relations,
    and a wily letter writer can frequently take advantage of this.  The result
    is often free stuff, delivered to your door.  An example: write a letter
    to a computer disk manufacturer and tell them you bought a box of disks
    but it didn't come with any labels.  They will probably send you a bunch
    of labels and an apology.  Labels are no big deal but this one has worked
    several times in the past.  Tips: 1) be creative with your complaint, but
    never be belligerent, 2) never write the same place twice with the same
    address, 3) don't expect too much...major complaints are dealt with by
    service centers, not through the mail.

4)  Not quite shoplifting is also good for laughs, especially in stores where
    the "undercover" guys are obvious.  Wear a baggy coat or whatever into
    the store, find the "undercover" guy and start acting suspicious, put
    stuff into your pockets, use your shifty eyes to maximum effect.  The
    idea now is to walk around the store a lot, maybe do some real shopping.
    It's very important that you don't start laughing whenever you see the
    "undercover" guy slinking around behind you.  Once you are ready to leave
    and feel you've tied up the store's crime fighting resources long enough
    you go to a counter near the check out.  Here you leave everything you
    don't wish to purchase and then go through the check out or leave.  This
    also serves as a vital service to keeping students employed as the store
    must now pay a stock boy to put everything back in place. Ha, a double
    whammy.  This works because store security cannot stop anyone until they
    have left the store with unpaid for goods.  If you wish to cause more
    havoc this can be done with a partner.  One person fake shoplifts and
    gets the security to follow him while the other partner REALLY lifts
    whatever he can.  This of course is breaking the law and is a "no-no".
    In Winnipeg, a while back, a group of people were suspected of doing
    this but were never caught. Apparently a dozen or so fake lifters would
    work with on or two real lifters.  It is rumored that they made off with
    a LOT of loot. Remember though, the cost of shoplifting is most likely
    passed on to other consumers.

Next issue I hope to bring you something more technical in the realm of
destruction.  I hope the above was entertaining, if not informative.

Lazarus Long (LAZ)
February 1993
                        
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
                        
                        How to Steal a Library Book
                        ~~~~~~~~~~~~~~~~~~~~~~~~~~~

1. Flip open only the cover of the book you want and make a clean cut along 
   the inside spine.  If you do this properly then you'll be able to see the 
   security strip.  It will be located inside the cover on the inner spine 
   of the book. It is best to use a really sharp knife like an surgical knife.

2. When you locate it then remove the security strip.

3. Now the book is yours.


Excuses
~~~~~~~                

        Here is a hint. If you want to steal a book it is advisable that you 
have also some signed out books with you.  So if by any chance you get caught 
by the alarm due to you're own human errors you will have an excuse.

        "Ahh... I guess the lady forgot to undecenticize this one,  I was 
carrying alot of books as you can see..." 

        "Oppss... Sorry, boy is this embarrassing. I guess I forgot to sign 
this one out...I was in a real big rush...sorry about the inconvenience.."

        Well you get the idea.  Just BS your way through.       


Having fun at the library
~~~~~~~~~~~~~~~~~~~~~~~~~
        
        Get yourself some security strips off some lame shitty books.  Put 
them in peoples purses, bags, jackets etc.  Or if you're really brave put 
one in the library's security guard or in your teachers coffee. The ideas are 
almost countless.  The best part of it all is that no matter how hard they 
try they will almost never find it.

        I Hope you enjoyed this file.  Remember that the phun never ends, it 
just finds a new victim...

PRIMUS
        
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
        
                             Defeating Knogos
                             ~~~~~~~~~~~~~~~~

        Have you ever been caught shoplifting?  Did you feel embarrassed 
about the ordeal?  Well come get your chance to gain your rep back. There is 
a minor flaw in the system that virtually lets you walk straight out the 
door without setting off the alarm.

        Well first of all I have only experimented with what some retail 
stores call KNOGOS or simply security tags.  They are either a disk or a 
rectangular security tag.  If the store is using the new technological 
security strips(like ones in music stores) then just peel of the strip and 
it's yours.


The method to surpass the KNOGOS alarm system
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        
        This is a pretty simple technique but takes a bit of good hand and 
eye coordination.

1.  First of all you should be in a normal standing position.  Next place 
    the KNOGO facing upward in the palm of your hand.  The procedure must 
    be performed out of the detection area.  The detection area is the area 
    between the two detection devices standing at each end of the entrance.
        
2.  Adjust the angle of your palm until the KNOGO is parallel to the ground. 
    VERY IMPORTANT! It means that the widest area of KNOGO must be parallel 
    to ground.  If the position of the KNOGO is bent at an angle at more 
    than an about an inch in the detection area the alarm will go off.

3.  After you are sure it is almost parallel to the ground.  Just walk out 
    the store.  Passing the detection devices.  Another CAUTION the knogo 
    must not ever come with in 1 foot and a half to the detection devices.  
    As this will trigger off the alarm.

4.  Cover your ass if anything goes wrong with your hand and eye
    coordination (being drunk).  Always be ready to make a fast exit out the
    door if the alarm goes off.

        Well that's all there is to it, pretty simple.  Hope you enjoyed 
this article.  See y'all later!  and remember "That knowing is half the 
battle".
                
PRIMUS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                End of Freedom Issue 2 - Freedom, Copyright 1993