Cybertech Electric: Issue #5 5/17/2001 ¢ss es flestra ferdha f”r; en sk lpr es sverdha / |\ /| /|\ |\ |\ /| |-\ \ / / | \ / | / | \ | \ | \ / | | \ \ / / | \ / | / | \ | \ | \ / | | > / \ / / | \/ | / | \ | / | \/ | | / / / / \ | | | | < | | | \ / / \ \ | | | | \ | | | > \ / \ \ | | | | \ | | | / \ \ \ | | | | \ | | |-/ \ \ I know a fifteenth, which Thiodhroerir the dwarf sang before Delling's door. He sang might to the Aesir, power to the elves, and understanding to Odin. Cybertech Electric: Issue Five May 17th, 2001 edited by Thomas Icom/IIRG Table of Contents: - Cybertech Has Returned! - Living Free and Winning in the 20th Century, Part I - CAC-MARC: Common Access Cards (CAC) / Multi-Technology Automated Reader Cards (MARC), By Azure - The Day After, by The Omega Man - Clandestine Communications, by Anonymous - Cybertech Back Issue Information ---/////--- Cybertech Has Returned! It has been almost five years since I released an issue of Cybertech (formerly spelt Cybertek) Electric. I wasn't planning on doing another issue, but recent events convinced me otherwise. You can direct thanks to certain totalitarian elements in the United States government who have recently pissed in our collective Cornflakes with their blatant disregard of the US Constitution, and their lack of respect towards their employer (We The People). While this has been going on for quite some time (I've been discussing government misdeeds since the late 80s.), two recent events seem to have stuck in my craw. It started with the admission of the FBI that they withheld evidence from the defense in the trial of Timothy McVeigh for the Oklahoma City bombing. I don't care who did what, last time I checked I thought we were still in a constitutional republic where an accused is entitled to a fair trial. Obviously I was wrong. Since it has come to light in one case, you must now wonder about other cases. How many innocent people have been railroaded by Kangaroo courts? The second event of recent note that should have everyone perturbed is the recent totally stupid US Supreme Court decision making the medical use if marijuana illegal. Now personally I don't smoke weed. I hold the opinions (based on years of observation) that it does turn you into an idiot, and that most "recreational users" of dope are quite capable of fucking up a two car funeral procession. What people do in the privacy of their own homes is another matter, and if it can help someone suffering from a terrible disease such as Cancer or Glaucoma then it's a good thing. I'm not even going to get into all the other bullshit out there, such as the attacks against our right to bear and keep arms, free speech, rights against illegal search and seizure, and excessive taxation. All of that has been going on for years and has to be stopped as well. The two events of recent history however, should be enough to cause you to wake up and yell "What the Hell is going on here?!?!" The Constitution and Bill of Rights, while dear to my heart (and yours I hope), are just pieces of paper. They don't grant shit. They simply affirm that people have unalienable God-given (or Goddess-given) rights that shall not be infringed. Those documents are worth about as much as the piece of toilet paper you used to wipe your ass with earlier if YOU don't take the necessary measures to protect and stand up for your rights. When I started Cybertech back in 1990, it provided you with information on how to do just that; provided you possessed the courage and faith to do so. Eleven years later matters have gotten worse, but the truth still stands. It is up to each and every one of YOU to educate yourself (spiritually, socio-politically, and technically), draw your line in the sand, say "No more!", and do whatever you can and whatever it takes to take this country back from the slide into the totalitarian pit it has been going down. If enough of us do our part, I promise it will happen. ---/////--- Living Free and Winning in the 21st Century Part I I recently received a collection of Survive magazine back issues. Survive was a self-reliance periodical from the 1980's that contained very excellent information. In spite of its age, the quality is magnitudes better than the vast majority of material appearing today on the Internet. Just recently, it was mentioned on the newsgroup misc.survivalism that Self-Reliance Journal (formerly American Survival Guide) was ceasing publication. While often less than adequate in providing information, it was the only periodical that was geared specifically towards survivalists. There is still a lot of information available on and off the net. It is a time consuming and difficult process for a beginner to wade through it all, and sort out the good from the bad. One of the things I hope to do with Cybertech Electric is to provide a ready- reference for many technological survival topics, and a pointer towards material for more advanced study. What is "Technological Survival"? It is a self-reliance and preparedness philosophy that accepts the following: 1) In many "survival situations" one may encounter, the technological infrastructure of the affected area will remain mostly intact; if affected at all. 2) Even in the more serious disaster scenarios envisioned by survivalists there will be plenty of technology floating around, and in order to speed recovery operations plans should be made for its restoration and implementation. 3) As a matter of strategy, we must assume that opposition will be using equal to, if not superior to, the technology at our disposal. Therefore we must keep abreast of technological advancements to institute appropriate and effective countermeasures. 4) In order to maintain as good a survival edge as possible, it is necessary to become educated in high-tech, as well as low-tech, topics. 5) In order to more efficiently and effectively survive and prosper in the "beforemath" stage, one should be skilled and maintain proficiency in "modern" craft/trade. This also helps with post- disaster recovery. 6) Even "classic" survivalism can benefit from a twenty-first century outlook. I find it admirable that an individual may be able to live for extended periods of time as an 18th century mountain-man in the middle of the wilderness, and recommend studying to be able to do so if the need arises. I find it preposterous to think that in the twenty-first Century a normal individual would plan solely to do so as part of their survival preparations. To quote Cybertech writer Injun Jessie, " The true survivalist is not a purist. You know the type, 'It's gotta be authentic Special Forces Issue... It's gotta be authentic mountain man era gear... Ya gotta make it with stone tools and yer bare hands... Etc.' Use any and everything available!!!" Certain situations you may run into are "modern" in nature, and therefore require a modern solution. The most serious problem of this nature is increasing government totalitarianism evident in the United States today combined with the use of high-technology measures for population control. The best survivalist preparations combine both modern and antique techniques and equipment in order to provide the best chance of dealing with whatever the future decides to throw at you. Beginning Measures Most people are very prone to information overload, especially when they've been fed nothing but the garbage that passes for "news" in this country all their life, and then get exposed to alternative sources that provide real information. They find themselves unable to form a clear picture of where to start. This list is here to help those individuals. It is only a start, but a damn good one. The Beginning Measures List 1. Put together a bug-out kit and keep it handy in the event it is needed. It should include the following: 1) Earth-tone, outdoor-style clothing, including cover, boots, belt, & black leather gloves. 2) LBE/Web Gear (Green, Camo, or Black) 3) Rifle with magazines and other necessary accessories. 4) .22LR "survival rifle" (Marlin Papoose, AR7, et. al) or .22LR handgun. 5) Each rifle must have no less than 500 rounds. Your .22 should have at least 2000 reounds. 6) Pack, military type, large. Must be able to carry: A) 1 poncho liner B) 1 poncho C) 3 pairs undershorts D) 3 undershirts - olive green or brown E) 7 pairs outdoor/boot socks F) Rifle cleaning kit, gun oil G) E-tool H) Mess kit, knife, fork, spoon I) Riggers tape - green, brown, or black J) Hygiene kit: soap, wash cloth, tooth brush, tooth paste, razor, shaving cream, nail cutters, sewing kit. K) Food (No junk food.): canned and/or dried meat, carbohydrates, fruit, and vegetables. Other Personal Gear: Swiss Army Knife or Leatherman Tool Wire cutters Mosquito net hat Sheath Knife Skin-so-soft/Insect Repellent Camo Sticks/Kit Essential subjects book Lighter/Flint & Steel Lighter Fluid Compass 2-way radio: Handheld w/head piece (CB, FRS, Ham) First-aid kit Portable Police Scanner Portable Shortwave Receiver Rechargable batteries w/Solar-Powered Battery Charger The above list is a guideline for individuals who need assistance in assembling a bug-out kit, and should be considered an absolute minimum standard. Those of you who are tech-oriented and/or operate in urban environments will want to consider the following. This list is derived from my own experiences as an urban technological survivalist. All of the items are self-explanatory, and there is plenty of leeway to customize the kit towards your own tastes and preferences. I've designed this kit to be easily portable for urban areas where your transportation is usually public, bicycle, or shank's mare. We will start with the basics: Something to carry your gear around in. Most people go with either a courier bag or day-type backpack. Urban bicyclists seem to like the courier bags while walking types prefer backpacks; it's all a matter of preference. We like backpacks as they stay out of the way better, leave both hands free, and are less cumbersome than a bag hanging off your side. A decent military- surplus backpack is sturdier and less expensive than some of those courier bags. Also, the "shittier" your bag looks, the less likely it is that someone will try and rip it off you. Get something in a neutral earth-type color like green, brown, grey, or black. This not only stands out less, but also makes it easier to cache (hide) if you can't bring it in with you. Our recommendation is that it never leave your possession, but we know some places will want you to check it at the door. Whether you check it or hide it depends on what you have in the bag, and the relative time needed to get to it. Another thing you will want to start wearing, if you already don't, is a belt. It doesn't matter what type of belt as long as it's sturdy. Besides helping hold your pants up (which I'm sure is difficult considering some of you wear your pants 5 sizes too big), you can carry equipment on it: pager, Mini Maglite, Leatherman Tool, Buck Knife, etc. Now that you have something to carry your gear around in we can begin to almost fill it. You never want to run around with a full bag, in case you find something you want to take with you. I'll start with what you'll be carrying on your person. Get a Leatherman Tool, Gerber Multi-Plier, or Swiss Army Knife. My Leatherman PST-2 has neeedlenose pliers, wire cutters, file, clip point serrated/plain edge knife blade, metal saw, regular and phillips screwdrivers, can/bottle opener, and a small pair of scissors. I also occasionally carry a Camillus U.S. Military pocket knife. This is your classic four item "boy scout type" knife that has a plain-edged spear point blade, screwdriver/bottle opener, can opener, and mini screwdriver/awl. For heavier cutting tasks and possible self-defense usage get a good lock blade knife. The Rolls Royce of these (in my opinion) is Benchmade. Until recently I carried a CQB Folder which replaced the Cold Steel Folding Tanto that I retired. The tanto-point blade, while excellent for self-defense, is not the best for general purpose use and it is also a little bit heavy for everyday carrying. I went back to a Spyderco Endura Clipit. Spyderco blades are serrated and offer tremendous cutting power for their size. I've owned mine for quite a few years now, and it has yet to require sharpening. The other nice thing about the Spyderco is that if you lose it, you're only out $45 as opposed to $120 for some of the Benchmade knives. While you shouldn't lose tools, it happens (In the past 30 years I've misplaced several pocketknives, a Gerber Multi-Plier, a Spyderco Worker, and an Al-Mar folder that have yet to reappear). For those on a budget, the Schrade Cliphangers are a lot of knife for the money. Being a hardware hacker, I also carry around a few extra tools. A multi-bit screwdriver and a set of tamper proof bits have come in handy on numerous occasions; as have a little 6" pry-bar (nicknamed "the goblin bar" by an old acquaintance of mine) I picked up at a dollar store for, well, a dollar. A Radio Shack mini-multimeter also resides in my kit. Those heavy-duty scissors known as "EMT Shears" that will cut through a penny and only cost a few bucks are nice to have as well. A roll of duct tape and electrical tape complement the package. It is said that you can fix anything with duct tape. Now you need fire. Disposable lighters are nice. What's even better is one of those butane lighter/torches that put out a jet of blue flame. You can solder and almost weld with one of those. Include a butane refill cylinder. Some really "elite" types carry the miniature battery-operated Dremel Tool with a small case of relevant bits. Dremel tools have several thousand uses. You should throw in a few of those big black garbage bags as well. They have been known to come in handy. Another thing you should have on you is a Mini Mag lite or similar small two AA-cell flashlight. If you've ever been caught inside a modern office building or apartment when the lights go out, you'll appreciate how handy having a little flash light is. You can get a headband which places a Mini-Mag on the side of your head at eye level; an excellent idea when you need to work on something with both hands in the dark. You should also get the accessory kit for the red filter lens, as the red lens enables you to have a light source that doesn't fuck up your night vision. A cheap set of 8x or 10x binoculars are nice to see things that are far away and don't take up much space. Recently a friend gave me this piece of optics the size of a large pen that is both an 8x telescope and a 30x microscope. It was supposedly standard KGB issue. I also like to have a jewelers loupe handy for reading part numbers on electronic components (jeweler's loupes have coolness factor). For memory-aids, I include a copy of Pocket Ref, a little notepad, and writing implements. While individuals have taken to carrying around electronic notepads or Palm Pilots, I'm a little retro in my choice of memory aids, as they don't require batteries that go dead at inopportune times. Communications tools are next. If you can get your friends to carry FRS or 2-meter radios that's all fine and dandy, otherwise get a one- piece phone, cut the modular plug off the end, and attach alligator clips to the red and green wires. Get one of the portable touch-tone pads from Radio Shack. Get a pager with voice mail. If someone wants to reach you they page you and you can then call them back by whatever means you have or desire. Communications receivers (scanners) have come down in price and size. The Icom R2 and Alinco DJ-X2T are small wide-band receivers capable of picking up everything from AM/FM broadcasters, to shortwave stations, to local public safety communications. Throw a set of work gloves in your pack. Not only will they keep you from leaving fingerprints, but they also protect your hands from damage and keep them warm. For the summer, I get a "six pack" of cotton work gloves for about $5. In the winter I replace them with wool army "glove liners" and black leather "glove shell". Speaking of damage, throw in some assorted Band-Aids, "butterfly strips", gauze pads, first-aid tape, tweezers, alcohol pads, and some Mercurichrome or similar ointment in your kit. You will in the course of your adventures get minor dings, scratches, slivers and cuts, and will be glad you have it. It beats bleeding all over the place Clothing is next. Cold weather and rain just happen some times and you may spare yourself some discomfort or hypothermia with nice dark sweater or sweatshirt and a rain poncho or anorak. You can add spare socks and possibly undergarments if there is the possibility of staying overnight unexpectedly somewhere. Start wearing a hat. Baseball caps are OK, but I like outback "Crocodile Dundee" style hats that are made of waxed cotton and shed water like a duck's back. Some people I know also keep a military surplus poncho liner with them to use as a blanket. A military surplus poncho with liner makes a good lightweight sleeping bag for those unforeseen overnight stays. Now I will discuss weapons. Whether or not you decide to carry them is a personal decision. In most areas they are heavily frowned upon or illegal. I personally feel that "An armed society is a polite one" (Robert A. Heinlein) and that everyone should have the right to carry defensive weaponry if they so choose. Some places such as Massachusetts, California, and New York don't share my feeling. If you live in a Communist state, either move or follow the Eleventh Commandment (Thou shalt not get caught). In most places you can carry pepper spray with little hassle. It works most of the time, but be advised some people have an immunity to it. Don't spray into the wind, as you will dose yourself, and if you spray it in an enclosed area everyone nearby will get a sniff of it, yourself included. High- voltage stun-guns are pretty effective, despite claims to the contrary. To quote Kurt Saxon in The Poor Man's James Bond, "Anyone unaffected by 50,000 volts is from another planet". 2. Please read the following books as a start: Unintended Consequences, by John Ross, Patriots: Surviving the Coming Collapse, by James Wesley, Rawles, and Behold a Pale Horse, by William Cooper. 3. Do as much business as possible in cash with local vendors or via mail order with libertarian/patriot companies. Keep only the minimum amount of funds on your bank accounts, and if possible take your money out of a large bank and instead establish an account with a local credit union. 4. Participate in the now growing alternative communications networks that are operational on CB and Ham frequencies. You don't have to talk politics, just check in with local conditions. The frequencies are available at http://www.iirg.org/csa.html 5. Home-school your children, if you have any. 6. Establish contact with like-minded people in your area for mutual support and assistance. 7. Kill your Television. They don't call it "programming" for nothing. Instead of wasting hours in front of the boob-tube, listen to an international shortwave broadcaster, read a book, learn some skill/trade you're interested in, or take your kids our camping or to a rifle range. I like the rifle range idea. You can take your TV and use it for target practice. Now take a step back for a moment to see what you have done. For starters, you now have the capability to exist more independently from the existing social and political infrastructure. You have begun to acquire the means of capability of defending yourself; which starts your transformation from a subject to a citizen. You've eliminated a big drain on your time (by not subjecting yourself to the idiot box), which now enables you to devote more time towards self-improvement. You have taken a step towards supporting local small businesses, and have stopped giving money to large corporations that suppress capitalism and promote totalitarian philosophies. You are beginning to form a group of friends to help each other through the rough times ahead. You are getting real information about conditions in your area and beyond; so you can intelligently make decisions regarding various matters. All of this is a good thing, because if you continue on this path; you'll soon be confident in knowing that no matter what the future throws at you; you'll be able to prosper. In future issues of Cybertech Electric, we will discuss some of the specific subjects in further detail. ---/////--- CAC-MARC Common Access Cards (CAC) / Multi-Technology Automated Reader Cards (MARC) By Azure Introductions and Explanations I first heard about the MARC card some time in 1996 via a United States Navy website. The information was passed to me by the non-religious progeny of a local Mennonite family. MARC was already a functioning beta program at that time. The website where I gleaned my initial information is no longer accessible to the public. However, the Department of Defense has continued to develop the program over the course of the last few years. During this interim, the project has metamorphized somewhat. Currently, MARC has been renamed to SMART. The card itself has been re-christened as the Common Access Card (CAC). Other cards/systems have been tested and are also functioning to similar results (and in general, accolades from the military community). A transformation is occurring in the way our government tracks and deploys its considerable resources. This article aims to provide an over- view of different smart card technologies and some of their various physical specifications. I will also provide a brief timeline outlining the development cycle of several different systems, and their integration into military life. Most of this information is cobbled together from various sources (official .gov and .mil sites), and portions of this article are lifted verbatim from those sources. References are provided at the end of the article. MARC The Multi-Technology Automated Reader Card (MARC) project was initiated in response to a proliferation of single use, updatable technology programs throughout the Department of Defense. The MARC project evaluates the concept of providing a multi-functional, cross-service utility card capable of satisfying multiple requirements within the DOD for a portable updatable medium. The MARC test program moves the DOD toward a "one card per soldier" concept for portable data carriers. The MARC is an individually carried smart card that has several media: a standard 3 of 9 bar code, magnetic stripe, embossed data, printed information (including a digital photograph), and an Integrated Circuit (IC) computer chip. The combination of several media on one credit card-sized device gives the MARC its versatility: it can interface with a variety of technologies and systems, from rudimentary imprinting machines to computer systems that use IC chips as data carriers. The MARC Card consists of a Datacard Corporation MIC-1600 ICC card containing a 2K byte reusable (EEPROM) memory and microprocessor chip, a three-track magnetic stripe, a 3 of 9 bar code and various embossed data, including the holder's photograph. The card is a standard, CR-80 size plastic card that conforms with ISO 7816/1. The microprocessor contains a Smart Card Operating System (SCOS) used to organize the MARC data into files and protect them from unauthorized access. The MARC connects to various smart card readers through metallic contacts on the face of the card which are compatible with ISO 7816/2 specifications. Data on the card is accessed through a Smart Card User Interface (SCUI) which, in conjunction with the SCOS security features, controls all access to the MARC data and security features in a flexible, controlled manner. Additional technologies, including the use of holograms, laminated photos, and the Portable Data File (PDF-417) two-dimensional bar code, are being considered. Smart Card Operating System (SCOS) The MARC smart card contains a SCOS from Datacard Corporation under a licensing agreement with Personal Computer Card Corporation (Pc3). The SCOS provides a high level command language that supports data structures and access to files and records. Password keys are assigned to control reading and writing of individual data elements and sets. Smart Card User Interface (SCUI) The SCUI provides a standardized, but highly flexible and tailorable interface between the application and the data on the MARC. A tailored application card for each individual application provides the necessary data structure and security information to allow the application to access the MARC data without possibility to effect on other application's data. Security Files are protected from unauthorized access by requiring that one or more password keys be submitted to the ICC. Incorrect key submissions lock access to all files protected by the key until it is submitted correctly. For security reasons, only correct key submissions are confirmed. Eight successive incorrect key submissions permanently locks the card. To ensure the MARC cardholder controls and is aware of all data written, the individual is required to submit his or her Personal Identification Number (PIN) before any data (with the exception of field medical treatment data) can be written to the ICC. Communications Protocol Communication with the microprocessor module is based on the protocol defined in ISO 7816/3. Full ISO compatible (t=0) protocol is supported. Technical Specifications Microprocessor 62C580 3.57MHz clock 4.50 - 5.50v, 10ms Reset duration 10ms Serial Input/Output 9600bps asynchronous, 8 bit data ISO (t=0) and Pc3 protocols Transmit turnaround delay: 5ms Line timeout: 1.0 seconds Reset response: conforms to ISO 7816/3 Response delay < 10ms Keys Issuer, PIN, and 8 application keys 1-8 characters 8 retries Memory 1920 bytes data and File Descriptor Table storage 64 data files maximum 256 bytes per record 10,000 erasures Physical Characteristics 86mm x 54mm x .84mm ISO 7816/2 standard contacts 10,000 insertion cycles / 10 year data retention Environment 0 to 70 degrees centigrade operating -40 to 125 degrees centigrade storage 30 to 80% non-condensing operating 5 to 95% non-condensing storage AMS Optical Memory Card The AMS is a user-friendly software package designed to operate at different supply points: the depot, central receiving/shipping points (CRSPs), and supply support activities (SSAs). Each of these operations has similar equipment and software packages that complement the other, making them compatible. The AMS hardware consists of an IBM-compatible personal computer, optical memory card reader/writer, bar code reader (BCR), radio frequency tag, tag docking station, and printer. The AMS system outputs several different products such as scannable bar code labels, radio frequency tags, and optical memory cards. The AMS is currently a stand-alone system that is being incorporated into the Standard Army Retail System-Objective (SARSS-O) used at the direct support unit. The AMS is an efficient, cost-effective and compact shipping manifest and database management system that will expedite receipt processing when used properly. The need for AMS arose during evaluations of the logistical problems during Operation Desert Shield/Storm in the early 1990s. Supplies were inadequately manifested. Storage sites had no access or visibility. No inventory control procedures existed. All these logistical problems led to major accountability problems. The General Accounting Office (GAO) cited these accountability problems as the main reason for poor supply distribution and excessive costs. The Defense Logistics Agency (DLA) then began a research that developed the AMS. The AMS's key component for reducing receipt processing is the optical memory card. The size of a typical credit card, the optical memory card provides detailed information on the contents of each multipack or containerized shipment. Each card accompanies its multipack or container to its final destination. The optical memory card accesses and updates the SARSS database, which results in the immediate search and retrieval of high-priority items. The AMS, and specifically the optical memory card, are designed to interface with all the military services' retail supply systems. This interface enables asset visibility, expedites receipt confirmation, automates the reconciliation process, gives automated reports of discrepancy, and creates issue and packing lists for supported customers. The laser optical memory card has many advantages. The optical memory card caa store 2.5 million bytes of information (approximately 1,200 pages of hard copy). It costs only $4.00 per card. Very resilient, the optical memory card can withstand temperatures from -40 to +212 degrees Fahrenheit. In addition, it is not affected by severe weather, water or shock damage. The optical memory card also has a protective coating that shields it from magnetic fields, electrostatic, and radio frequency interference. The optical memory card allows a database to prioritize offloading and issue, which gets high-priority supplies to the unit quicker. This system will eliminate the backlog of processing shipments. Before the AMS, 40 personnel worked three shifts to receive and process receipts from a standard shipment. With the introduction of AMS, four soldiers can complete the same tasks in a single shift. History The following is a brief overview of smart card deployment throughout the last several years. Source material is footnoted where appropriate. 1993 November - MARC testing begins at Fort Bragg, NC. The cards' success at the initial site led to further testing in Hawaii. 1994 February - Initial MARC test at Fort Bragg, NC and Hawaii ends. August - 25th Infantry Division (Light) US Pacific Command (PACOM), Hawaii, begin participating in the MARC test. Hardware and software is installed and food service personnel and Personnel Administration Center (PAC) staff are trained on the new equipment and procedures. Information Technology Solutions, Inc., of Petersburg, Virginia, under contract with the product manager for the Army Food Management Information System (PM AFMIS), trains 90 food service workers from 12 dining facilities and 37 PAC employees. The headcounters at each dining facility serve as the main testers of AHC. They operate a handheld computer called a Portable Data Collection Device (PDCD), a commercial off-the-shelf item made by Telxon, Inc. Diners hand their MARC to the headcounter, who verifies the holder's photo on the card and scans it through the PDCD. The PDCD reads each diner's status and MEC to determine the correct cost of the meal. The basic information recorded by the PDCD includes the first five characters of the diner's last name, the diner's social security number, meal type, payment method, and amount paid. Recording these data electronically eliminates the need to collect signatures from MARC holders at the headcount station and reduces the paperwork required to collect headcount data. The PDCD keeps an up-to-the-minute record of diners served and cash collected. It also compiles summary information that speeds up post-meal accounting. The PDCD transmits data collected to the AFMIS 3B2 minicomputer after each meal. However, the PDCD has sufficient memory capacity to store information on multiple meals should the AFMIS system be inaccessible or inoperable. Automated Head Count (AHC) gives the BAS diner the option of paying for his meal with cash or by payroll deduction. If the diner chooses the payroll deduction option, the headcounter hands the diner the PDCD, and the diner enters a four-character personal identification number (similar to a transaction at a bank's automated teller machine). Payroll deduction data are sent through the Defense Data Network to the Defense Finance and Accounting Service for entry into the Defense Joint Military Pay System. Payroll deductions posted before the 15th of the month appear on that month's Leave and Earnings Statement (LES). Payroll deductions made after the 15th of the month appear on the next month's LES. - MARC has already been issued to soldiers stations at Fort Shafter, Oahu and marines at Marine Corps Base, Kaneohe Bay. [a] October - MARC is distributed throughout the 25th Infantry Division (Light), US Army Hawaii (USARHAW), 45th Support Group and the 703d Military Intelligence Brigade. 1995 January - AHC prototype test at Schofield Barracks, Hawaii. - MARC is put to the "real test" during the deployment of 3,600 soldiers from the 25th Infantry Division to Operation Uphold Democracy in Haiti. The card accounts for personnel readiness by updating and processing key information to the MARC during the Preparation for Overseas Movement (POM). Based on 25th Infrantry Division requirementns, the MARC program produces two spin-off cards for issuing in Haiti. The first is an access control card for local national employees and the second an access control card for secure areas. After the success of the MARC during Operation Uphold Democracy, Marine Forces-Pacific requests inclusion in the MARC test bed. September - The card is issued to all Marines in Hawaii. The US Marine Corps modifies the MARC to serve as a field training record and shipboard accountability card, in addition to the card's basic design. 1996 - The Clinger-Cohen Management Reform Act of 1996 (Section E of Public Law 104-106) is passed. [b] April - The 77th Maintenance Company's Class IX (repair parts) SSA, operating out of Camp Tampa, Bosnia, is fielded the AMS. The AMS's ability to use the optical manifest card to batch process incoming shipments from the depot cut the time that parts spent in the receiving section of the warehouse in half, saving about 80 manhours of work per week. - Approximately 18,000 25th soldiers asssigned to the Hawaii units participate in a prototype test of AHC in which they used the MARC as a substitute for the regular meal card. July - Fort Hood, Texas, July 15, Staff Sgt. Joseph K. George of 2nd Platoon, 4th Military Police Company, 4th Infantry Division, was one of the first soldiers to get his hands on the hand-held data entry device for the MARC system. He puts the unit through extensive durability and temperature tests. [c] October - DOD funding for the two-year Hawaii MARC card test ends. After the success of MARC, the commander of the 25th Infantry Division and USARHAW decides to continue the program throughout FY97 for division and USARHAW units. The 25th Infantry Division and USARHAW food service chief says the MARC in the dining facility was a success and the Army needs to keep the card. The MARC ends all paperwork associated with the meal cards. Also, the card is needed for deployments to update soldier information during predeployment POM. The only consequence to units that decide to use the MARC is funding. The cards are funded internally. Continued funding for the project beyond FY97 is uncertain. Efforts continue to secure funding to expand the MARC program Army-wide in FY98. 1997 July - Floor Statement by U.S. Senator Charles S. Robb (D- Va.) proposes $36 million in funding for FY98 to expand the MARC program. [d] September - Sen. Charles S. Robb votes in favor of the Fiscal Year 1998 Defense Appropriations bill. The measure passes the Senate by a vote of 93-5. [e] 1998 April - Army begins issuing 18,750 smart cards to to basic training recruits at Fort Sill, Okla., as part of a year-long pilot program. - On April 6, the United Press International reports Recruits will use the cards to buy toiletries, clothing and stamps, get haircuts and make telephone calls during basic training. It also states that a lost smart card "can be easily replaced and because each card is keyed to a recruit's fingerprint, it cannot be used by others." The article reports that the $4 million smart card pilot program is a joint project of the Army, the Treasury Department, Mellon Bank, the Defense Finance and Accounting Service, and the Army and Air Force Exchange Service. - Defense Finance and Accounting Service spokesperson Fran Gurka, who is coordinating the smart card program, says: "The card offers a sense of security not available with cash. When recruits were paid in cash, if they lost it, tough luck." [f] August - Approximately 4,200 multi-technology smart cards are issued to all cadets at the USAF Academy. The Gemplus 4K MPCOS-EMV card was issued with 3-G International's Multi-Application Reader Card (MARC) architecture and Smart Card User Interface (SCUI). This smart card's initial application is Product Technologies, Inc.'s SmartCity electronic purse. The e-purse can be used at the washers and dryers in the laundromats, to make copies in the library, and to purchase snacks. Other point of sale locations are being added. Disposable stored value smart cards are also available for purchase by USAFA employees and faculty. Additional smart card applications will be added in the near future. For example: room access control, medical, manifesting, and training qualifications and test dates. 1999 - The Paperwork Elimination Act of 1999 (Public Law 105-277) is passed. [g] April - On April 2, 1999, the Undersecretary of the Navy designates the Department of the Navy Chief Information Officer (DON CIO) as the DON lead for Smart Card Technology by memorandum directive. [h] May - A Smart Card Office is chartered on May 24, 1999 to provide focus and management for Smart Card efforts within the Department of Navy. [i] - The Smart Card Program at NTC Great Lakes (Department of Navy) is in full swing. Applications in use include: Electronic funds, Drug Test Management, Joint Food Service (automated dinner check-in), Smart Immune (storage of immunization records), and Smart Dental (storage of dental records). Also under developmnent at NTC Great Lakes is Care Central/TRI-MEP. This application will enhance the special physical exam process by providing the capability to automatically populate physical exam forms and download patient care to the Biomedical Databank. Web development of the application is planned. Card printing and issue at Great Lakes is the task of the local Defense Automated Printing Office (DAPS). Every recruit reporting to Great Lakes receives two smart cards; one temporary card and one permanent card. The temporary card is issued the day of arrival and is formatted to allow the use of a purse application. The purse function, administered by the Navy Exchange, allows the recruit to purchase required and personal items while under going training and replaces a World War II process of using "chit" books. Medical and dental information is also written to the card. Near the end of recruit training, each recruit cashes in any remaining funds on the temporary card. All demographic, medical and dental information is transferred to a permanent smart card that also displays a photograph of the individual. The recruit takes this permanent card to his/her next duty station and the temporary card is reformatted and reused. [j] - Similar programs are deployed at Pensacola, FCTC\NAS Oceana, Atlantic Fleet Ships/Norfolk, and NMCB Miramar by the Department of Navy. November - The Deputy Secretary of Defense makes the decision to institute a Department of Defense-wide "Common Access Card (CAC)" as the replacement for the existing military identification card. The Army will adapt this card as its standard military identification. CAC superceeds MARC as 'the' reference to the smart card within the U.S. government. [k] 2000 - The use of smart cards has become a priority within the Department of Defense (DOD). Public Law 106-65, National Defense Authorization Act for Fiscal Year 2000, directs the Army to establish a project office to cooperate with the Department of the Navy to develop plans for exploiting smart card technology as a means for enhancing readiness and improving business processes throughout the military departments. The Deputy Secretary of Defense's (DEPSECDEF) 10 November 1999 Smart Card Adoption and Implementation Memorandum mandated the implementation of the CAC, which will serve as the Standard ID card for active-duty military personnel (including the Selected Reserve), DOD civilian employees, and eligible contractor personnel; Principal card used to enable physical access to buildings and controlled spaces; Principal card used to enable computer network and system access; and Primary platform for the PKI authentication token. The Army sees participation in the development and deployment of this CAC as an pportunity to respond to the DEPSECDEF memorandum and support the Army EC mission. [l] - DOD Public Key Infrastructure (PKI) mandates that all active duty, selected reservists, civil service and on-site contractors begin using digital certificates by end of FY2001. The CAC card is the hardware token for PKI digital certificates. October - Fort Eustis, Va., U.S. Army Europe in Heidelberg, Germany, and Yongson Army Garrison, Korea begin a Beta Test of the CAC. [m] December - The Army interim policy messages for the CAC/SMART Card PKI are made official. General Cuviello signs the messages on 6 December 2000. [n] The Future This technology is intended to eventually enter the civillian world as an identification system. Meant to replace current 'multi-card' systems and represent a single identification point, MARC (now CAC) will revolutionize the way Americans authenticate transactions and conduct business. The ramifications on privacy should be evident. Where will this 'centralized' data be stored, and how/by whom will it be protected? Beyond concerns of legitimate data warehousing; the question begs to be asked: Under what authority is this mandatory tracking system being implemented? Will the CAC replace the State-issued Driver's License as our primary means of identification? Will an option be provided to 'opt out' of a system with questionable guarantees for personal security? What organizations will be allowed to gather and traffic in smart card data? With a centralized means of authentication for practically *all* societal functions, what happens when a smart card is compromised? Debate over this topic may not reach the mainstream until cards begin being issued en masse, and the first cases of MARC/CAC fraud are exposed. However, with current advertising campaigns promoting the smart card 'idea' (MasterCard and Visa are pioneering this sales pitch), mass implementation may in fact be *demanded* by the populace as a protection against on-line crime. Already, the playing field for this battle is being defined through television commercials and 'newly exposed' weaknesses in tradtional identification techniques. Little information is being presented concerning what measures will be taken to insure the inegrity of the 'data keepers'. Projected Uses for MARC Techology Full Military Deployment LCDR Tony Smith, Pacific Fleet MARC/CAC program manager, says the military plans to fully implement the MARC/CAC Program by Fiscal Year 2001 to all active-duty service members, DOD civilians, retirees, reservists, family members, the Departmen of Veterans Affairs and the Coast Guard. Social Security The Social Security Administration is already investigating methods of integrating biometric identification into its existing fraud prevention and detection programs. Initiatives requiring enhanced 'methods' of tracking beneficiaries have already crept onto the books. MARC/CAC will represent a decisive solution the the perceived delimna. [o] Immunization Tracking As demonstrated by the military, medical and dental histories can be tracked effectively with smart card technology. Future privacy initiatives instigated by Capitol Hill will require a secure method of identifying patients, and reliabley storing confidential information. 'Of course, when "the military experienced delays in troop deployments because personnel records (such as training completed, immunizations) were not up-to- date and readily available" during the Gulf War, the Pentagon created a MARC card.' [p] Summary Pros The use of smart cards can save millions of dollars formerly allocated for paperwork and storage, not to mention staff who are chaged with keeping track of all the paper. Speed of data storage and recovery are increased, and inaccurate record-keeping previously attributed to human error can be significantly reduced. The elimination of a physical 'paper trail' saves on storage costs and reduces the likelihood of accidentally misplacing or destroying data. Cons Loss of privacy. Reliance on the "computers don't make mistakes" syndrome. Whereas paper records stored in disparate locations require a fair amount of legwork to alter/tamper with, digital records can and will be altered remotely by individuals or groups who need not ever come in physical contact with their targets. Digital investigators need not risk the face-to-face interaction often required to retrieve such information in today's multi-card world. The advent of the 'paperless permenant record' adds a new dimension to Information Warfare tactics and strategy. It has not yet been demonstrated that digital identification can be better protected than its physical-world counterpart. Citizen Protest It may be prudent to note that 'MARC' may not have been the wisest choice of acronyms for this project. Certain elements within American society will no doubt draw parallels between the program name (or its stated goals) and motifs drawn from their own tradtional legends and cultural backgrounds (this may actually have been what lead to the project's eventual name-change in the late 1990's). Indeed, religious groups have latched onto the issue with a vengance. Specification information on the original MARC program circulated widely on the Internet in 1996, triggering the (almost immediate) emmergence of protest websites and notices on the World Wide Web. Here are two examples of religious (Protestant Christian) objections to the program: http://www.endtimeprophecy.net/~tttbbs/EPN-2/Articles/Articles- Mark/marccard.html http://www.google.com/search?q=cache:www.yellowstoneinfo.com/biochips.htm+char les+robb+MARC+card&hl=en On the other hand, the 'MARC' acronym may have been chosen for just this reason. Psychological Warfare Operations (PSY-OPS) are known to sometimes coincide with (and co-exist within) legitimate government projects. Whatever the case, religious organizations 'bit', and speculation quickly ran rampant. Anti-MARC sentiment spread amongst like-minded groups on the Internet like wildfire. Curiously, most organized dissention seems to have dissipated rapidly when the program underwent it's name change. However, goals and methods of the operation have remained consistent with the earliest documented efforts I have uncovered. Editorial Smart card technology is here to stay (as much as *anything* ever truly 'stays'). Successful test runs throughout the 1990's proved that electronic tracking of human and material resources greatly improves the efficiency of logistical planning and personnel management. Programs to integrate smart cards into civillian life are already being implemented nationwide. As more and more Americans rush to get on-line, the digitization of personal information and identification will continue to escalate until smart cards are considered a 'normal' tool for performing daily tasks. It is anticipated that future e-commerce systems will take advantage of the convenience and security (sic) that smart card authentication bring to the table. Time will tell if this reliance will prove to be a solid foundation for real-world transactions. As smart card technology spreads into general use by society at large, the effects of computerization will become apparent to both proponents and detractors. The issues that are examined at this time may prove to be some of the most important factors for the future of Privacy and Autonomy in the United States of the 21st Century. A large struggle looms over the horizon for control of the personal data that defines us as Human Beings. In our modern information-based economy, such personal data takes on a significant dollar value as well as enriching our understanding of ourselves and those around us. Without careful safeguards on the confidentiality and integrity of this data, Americans may well find themselves little more than beasts of burden on the battlefield of the Market Economy. It is imperative that issues of privacy and security be addressed as these technologies become more prevalant in day-to-day life. It is up to us to bring these decisions into the forefront of the public consciousness before it is too late. 40 acres and a mule. Closing Footnotes [a] http://www.chinfo.navy.mil/navpalib/news/navnews/nns96/nns96019.txt [b] http://www.rdc.noaa.gov/~irm/div-e.htm [c] http://www.dtic.mil/armylink/news/Jul1996/a19960715force2.htm [d] http://www.senate.gov/member/va/robb/statements/floor/marc.html [e] http://www.senate.gov/member/va/robb/releases/nrsep25.html [f] http://www.monkey.org/geeks/archive/9804/msg00155.html [g] http://www.ec.fed.gov/gpedoc.htm [h] http://www.doncio.navy.mil/downloads/memo1.pdf [i] http://www.doncio.navy.mil/focusareas/smartcard/index.html [j] http://www.doncio.navy.mil/focusareas/smartcard/greatlakes.html [k] http://armyec.com/faqs_main.htm#10 [l] http://armyec.com/smartcards/smartcards.htm#background [m] http://www.dtic.mil/armylink/news/Oct2000/a20001010cac.html [n] http://armyec.com/smartcards/cacpkipolicy.htm [o]http://www.ssa.gov/oig/auditpdf/9841007.pdf#xml=http://www.ssa.gov/search97 cgi/ s97_cgi?action=View&VdkVgwKey=http%3A%2F%2Fwww%2Essa%2Egov%2Foig%2Fauditpdf%2F 98 41007%2Epdf&doctype=xml&Collection=SSA&QueryZip=biometric%3COR%3E+%28keywords+ %3Cc ontains%3Ebiometric%29& [p] http://www.he.net/~dvk/imms/immtrack.htm Further Reading http://armyec.com/faqs_main.htm#smartcards http://www.smart.gov/information/plan/scplan.html http://www.smart.gov/information/guide/8physical.html http://www.gsa.gov/Portal/main.jsp?tab=home ---/////--- The Day After By The Omega Man Greetings, and welcome back! It is a pleasure to once again be able to write for this esteemed periodical. The survivalist scene is now taking a downturn, much like in 1990 when I first started writing for Cybertech. Things picked up a bit thanks to the election of Bill Clinton, the Y2K bug, and the election fiasco. With the new millenium and George W. Bush in office, the hobby of survivalism is not as popular as it was. It's as if people believe world affairs are going to miraculously change overnight: Some of us know better. I will start by reviewing a book that I recently purchased from Javelin Press titled Boston's Gun Bible, by Boston T. Party http://www.javelinpress.com/. This is a nice thick text containing all sorts of firearms reference info all in one place. It's $28 and well worth the price. It has a lot of good information for the beginner, and experienced firearms enthusiasts will find it to be a wealth of reference info all under one cover. The book is divided into six parts: The Basics, Combat Rifles, Guns in General, Acquisition, Disarmament, and Courage. Consider this book a "must get". As a student of survivalism, my spare time is spent between going out in the field to enjoy my hobby and roaming through libraries and bookstores looking for interesting reading material so I can expand my knowledge horizons. Even here in the back woods, I'm a short drive from Barnes & Noble, Borders Booksellers, and several used bookstores. My town also has an excellent library. Where do I browse? The sporting section has books about hunting, shooting, camping, fishing, and martial arts. The engineering and home improvement sections have some good technical skill books. Some stores have an agriculture section that contains a lot of books on rural living and survivalism. Also, believe it or not the reference section often has some interesting titles. I recently discovered a Ragnar Benson text in the reference section of our Borders. Going through the martial arts books at one Borders, I found a good one: Street Ninja, Ancient Secrets for Today's Mean Streets, by Dirk Skinner. Although a lot of survivalists tend to discount "ninja" material as worthless, the ninja were probably the first recorded technological survivalists and kit- bashers. They modified common farming implements into effective weaponry. They successfully led a covert existence. They were so effective that they were both hated and feared by the Samurai. Studying their techniques in a modern context would be useful to the modern-day survivalist. Street Ninja is an excellent way to start doing so. The book does an excellent job of applying the ancient fighting arts of the Ninja in a modern context. I'm getting a little more into high-tech. Thomas Icom introduced me to an excellent ham radio magazine called 73 Amateur Radio Today. I took a look at an issue for the first time, and the first thing I see is an article on how to make a morse code shortwave transceiver for a few dollars in electronic parts! Neat! The same issue also had articles on building a modem monitor (for checking phone line conditions), lightning protection for radio gear, and an article on experimenting with TV/VCR tuner modules for ham radio purposes. What does ham radio have to do with survivalism? Ham radio is a great way of communicating when other forms of communication don't work. Ham Radio also demonstrates skill with electronics. A skilled electronics enthusiast will have no problems finding work anywhere in the country. Subscriptions to 73 are $25 a year. Their number is 1-800-274-7373. Some people ask me "How do you find the time to do all this?" More often they say either "You must have a lot of spare time on your hands", or "I don't have enough time." People also mention to me that they would like to do various things I've wrote about, but lack the money to do so. I'm sure everyone's situation is different, and there isn't a quick cure-all answer I can give. One thing you might want to look into however is your television viewing. I don’t watch much television, maybe an hour or two a week for a show I like on PBS. I don't have cable TV. It's too expensive, and I can get a few stations, including my favorite PBS one, with the antenna on my roof. The average person spends about 20 hours a week in front of the TV. Basic cable TV service around here costs $40 a month. Start with thinking about that $40 a month. That's $480 a year. I hear some people are spending around $60 a month for "premium" services. That's $720 a year. What can that buy? For $480 you could buy a nice electronic experimenter setup including a Dremel Tool, Soldering Iron and spare parts, a subscription to 73 Magazine, AND a nice surplus Enfield or Mauser bolt-action rifle and plenty of ammo. Let's say you cut down your viewing to what I watch, 2 hours a week. That leaves you with 18 extra hours a week. That gives you plenty of time to go and do other things. Think about it. Why subject yourself to the abuse the idiot box gives you when you could instead be going out and doing neat things with your new found spare cash? Give it a try. Tell me how you feel in a couple months. That's all for this issue. If you'd like to write, I can be reached via email at . I'd like to hear from you. Until next time, stay free. -The Omega Man ---/////--- Clandestine Communications by Anonymous Communications is an essential element in any operational enterprise. Effective C3 (Command. Control, Communications) is the key to a mission's success. Fortunately, there are several varieties of commercial, off-the-shelf equipment that is either usable "as is", or capable of being modified to meet any set of operational requirements. Operatives have a variety of systems at their disposal: telecommunications, data communications/Internet, and RF. Elements of different systems may be combined to produce a custom C3 package tailored to your specific cell's needs. Future articles in this series will cover various aspects of clandestine communications I will start by detailing the various pieces of equipment that a communications specialist will need to acquire in order to establish and maintain a cell's C3 capability via the telecommunications (telecom) network. The telecom network offers a readily available communications medium that requires little in the way of specialized or expensive equipment to access. All of the following equipment is available on the open market at this time, and would normally be found in the possession of an electronics technician or ham radio "hobbyist"; thus offering a convenient cover. The one tool brought about by the recent deregulation of the telecom industry in the United States that any cell will find extremely useful is the prepaid calling card. Available in denominations ranging from 15 to 200 minutes, these cards are available at any retail establishment for a reasonable number of FRNs (Federal Reserve Notes a/k/a "Cash"). Provided proper OPSEC measures are maintained, prepaid calling cards offer a secure means of communications. Card calls are the only means in which a data (modem) call can be made over a payphone. Otherwise, after the initial rate period is up on a coin call, the resultant coin collection signal and request recording will disrupt communications. This is important, as a laptop computer and modem can form the basis of a secure communications terminal. Care must be taken in the selection and purchase of prepaid calling cards. Obviously, FRNs are the only recommended method of payment. Selection of prepaid calling cards is just as important as means of purchase. Before you commit to the purchase of a specific card, examine it carefully. Avoid those cards that state on the package that they must be activated before use. Said cards are also identifiable by a magnetic stripe on the back of the card. This means that at the time of purchase, the card is swiped through the POS terminal by the cashier, and the card company's computer is contacted by the store to indicate said card was legitimately purchased. This is intended to eliminate service theft. It also generates a record of where the card is purchased. Activation-required cards are generally sold by common retail chains. To find cards that don't require activation, check independent gas stations and convenience stores; particularly those in "ethnic" neighborhoods. Once purchased, the card should be used fo mission-related communications only, and disposed of in a conspicuous place with a few minutes of time remaining on the card. The aim is for another individual to "find" the card, and use the remaining time available on it. This will help counteract traffic analysis attempts on the account. It is also advisable to commit the access number and codes to memory; temporarily caching the card until it is required to be disposed of. If the card is found on one's person during a search, it is a simple matter for an investigator to request an accounting report of all calls made on the card. The common numeric pager is another one of those everyday items that arouse no suspicion, and can be used for secure communications. For around $100 or less a pager can be purchased with a year's worth of service with no questions asked and no ID required. The 10 digit numeric display can be used to send one way messages via simply generated numeric codes. The use of codes for brevity on paging systems is extremely common, and arouses no suspicion. A book entitled Pager Power is currently in print, and is a code book that is capable of generating any message required. This book can be used in conjunction with one time pads for your secure messaging needs. Simply take the number off the pad, and add to or subtract from the number indicated for the word or phrase. Pager communications are easily intercepted not only by investigative agencies but also by communications hobbyists, in spite of it being a violation of the Electronic Communications Privacy Act. This makes the use of encryption on such systems a necessity. The ease of interception by commercial off the shelf equipment, a $5 (in parts) circuit, and software available over the Internet opens up an interesting possibility for clandestine communications. The requirements are the assembly of a pager COMINT station, the location of what phone exchanges (or numbers in an exchange) are used for pager service, and the paging system radio frequency used for said numbers. Once this is accomplished, it is an easy matter to identify which capcodes (pager ID codes sent over the air to identify which message is intended for which pager/customer) are assigned to which phone numbers. Using the pager COMINT station, capcodes can be flagged for traffic logging, with a cell's communications identified from the usual account trffic by a certain preamble. While the message will also displayed on the pager of the customer whose account you are appropriating, it will be ignored as a "wrong number". Such "mistakes" are common enough that they can be used to establish a clandestine communications network among the normal traffic on a system. By using this technique with several different accounts and preamble codes, a high level of security is maintained. The key to success is in not abusing a particular account and causing the customer to contact the service under the impression that his capcode was accidentally assigned to another account. (This is an uncommon, but not rare occurrence.) Further details on this method will be elaborated on in a future installment. A linemans test set (butt set) rounds out the foundation of one's telecom kit. This is a ruggedized telephone used by telephone company installers and technicians. It features alligator clips to enable it to clip onto any one of several test points on the telephone network, and a monitor mode that enables "on hook" monitoring of a line to check it's status and activity state before use. These devices start at about $100 new from various mail order and supply houses, but have been seen at hamfests and electronics flea markets for less than that amount. While the genuine article is nice to have, it can be improvised by taking any standard one-piece phone and replacing the cord's modular plug with alligator clips on the red and green wires. Test points on the phone systen are known by various terms: cans, pedestals, bridging heads, and b-boxes. They are used for either troubleshooting lines, providing customer service connection points, and acting as "demarcation points" between customer and telco wiring. By hoking into any of these test points, dial tone can be acquired and phone calls made. These test points are usually unlocked, and "secured" with either a 7/16" bolt, or a 5/32" tamper proof allen wrench screw. A standard nut-driver will unfasten the 7/16" bolt, although electronics supply houses sell a "can wrench" designed specifically for the job. Tamper-proof allen wrenches, an allen wrench with a hole in the shaft, are available though electronic tool supply houses, auto-parts stores, and computer shows. For clandestine telecom access wireless phone jack systems appear to have great potential. They cost about $100 and consist of a base unit and an extension unit. The base unit is plugged into any AC outlet near an existing phone line and connected to the line. The extension unit is plugged into any other outlet and provides a phone line without the need to run cable. As long as both outlets are on the same transformer feed from the electric company, you should be able to hook this system up to a phone line and AC outlet in a utility room, and then go to another room with an AC outlet and have a phone connection. This could even be extended from one building to another provided both buildings were on the same transformer feed. With the electric company bridging transformers for remote meter reading, the range could be longer. A similar arrangement can also be accomplished with the use of a cordless phone. A cordless phone powered by a gel-cell battery and hooked up to a phone line would allow an individual to use said line without having to be physically present at the hook-up. Modern cordless phones use spread-spectrum digital communications on 900 Mhz. and 2.4 Ghz. frequency ranges which offer 1000 yard range and protection against casual interception. When clandestinely obtaining telecommunications service, the temptation to commit toll fraud must be resisted. The calling of a toll-free number to a prepaid calling card service on a clandestine hook-up will not be noticed. The appearance of an unknown number by a customer on his bill has the possibility of being noticed; with a resultant complaint made to customer service. One should especially avoid targeting the phone service of an enemy agent or collaborator, as it far more beneficial to use their lines as a source of intelligence. Laptops and modems are yet another useful tool. With good encryption software such as PGP, they offer an extremely secure means of communication. While a brand-new state-of-the-art laptop can cost upwards of $3000 depending on what you buy, but you don't need state-of-the-art. All you really need is something that you can hook a modem to, run terminal software, and do a little data storage. One can find older laptops for under $100 in the classified ad sections of newspapers and in your locale's ad paper. Hamfests and computer shows are also a good source. I recently saw an 8088 laptop at one for $15. Just make sure the unit either has an internal modem (even a 1200 will do) or has an RS-232 or PCMCIA port to add an external modem. If you're going the external RS-232 modem route, the modem will need to able to run off batteries. Make sure that the power supply that goes with the modem is a DC output supply. Many modems use AC output supplies, and the modem will be much more difficult to convert to battery peration. For a while there were these "pocket modems" being sold which were the size of a pack of cigarettes and ran off a 9 volt battery. We haven't seen them offered lately, but they still should be available on the used and surplus equipment market. For complete connectivity, acquire an acoustic coupler for your modem. This device attaches to the handset of any phone and plugs into your modem's RJ-11 jack. It is essential for modeming from payphones; where in most instances you don't have access to a terminal block or phone jack. Konexx http://www.konexx.com/ makes the "Konexx Koupler". It plugs into the RJ-11 jack of a modem and provides acoustic coupling between the modem and a telephone handset. According to company literature it operates up to 26.4K baud on electronic phones, and up to 2400 baud on payphones and other phones that use a carbon microphone. In the last paragraphs, I provided an overview of the various pieces of equipment needed to establish and maintain a cell's C3 capability via the telecom network. In this installment I will provide an overview of the telecom network as it relates to clandestine circuit access. Everything starts with the phone line itself. A standard analog phone line used by businesses and residences is known as a "POTS line" (Plain Old Telephone Service). There are more modern digital types of phone service available such as ISDN (Integrated Services Digital Network) and DSL (Digital Subscriber Loop), but the most common thing you will see on a cable pair is still a POTS line. A POTS line provides electrical power of nominally 48V DC to power a standard telephone set. For communications and signaling a POTS line provides one analog audio circuit with a frequency response of 300-3000 Hz for communications and signaling, and a nominal 90V AC ring signal to indicate an incoming telephone call to the subscriber. All of this is done on a single pair of wires known as a "cable pair". The cable pair wires are known as "tip" and "ring". The "tip" side is te negative polarity of the DC circuit, and conversely "ring" is positive polarity. POTS line polarity is an academic matter these days, as modern phones are designed to work hooked up "either way". Signaling to indicate a dialed number is usually done via 12 audio tone pair combinations (of 7 audio tones) known as "Dual Tone Multifrequency (DTMF)" tones or "Touch Tones". Signaling can also be accomplished via an older method called "pulse dialing", where the DC power of the circuit is interrupted momentarily (10 pulses per second) a certain number of times in a period to indicate what digit is dialed. In addition to dialing and ringing, some phones may also be equipped with "Caller ID", which sends the number of the individual calling the subscriber (or indication of a "blocked" call). This data is sent via a digital signal that can be heard between the first and second rings if one were to listen in to an "on hook" phone line. Inside a building between the "demarc" and the customer's phone equipment, the wiring consists of cable that is generally white, blue, or gray in color. Similar style cable might also be used for computer networking equipment, but will not draw a dial tone when a butt-set is attached to it. The cable will usually have 2, 3, or 4 wire pairs in it; each of which may provide access to a phone line. Certain cables also exist which may contain up to 25 pairs. Provided normal wiring conventions are followed, the following colors will indicate what colors are paired together for a phone line. Two Pair: red, green, black, yellow. Pair 1 - red & green Pair 2 - black & yellow Three Pair: Same as above, plus Pair 3 - blue & white Four Pair and above: Wire pairs with striped colors Blue Orange Green Brown Slate White 1 2 3 4 5 Red 6 7 8 9 10 Black 11 12 13 14 15 Yellow 16 17 18 19 20 Violet 21 22 23 24 25 For example, on a 25 pair cable the first pair would be Blue/White. The 23rd pair would be Violet/Green. With internal cabling you will usually find a four pair cable, unless it is a very large installation. Also keep in mind that while these colors are an industry standard, they are occasionally not adhered to, especially if the installation was not done by a skilled individual. All the internal telecommunications wiring in a building will be connected to a demarcation point. This is the point that separates the customer's wiring from the Telephone Company's wiring. In most single dwelling residences, small apartments and small offices it is a junction box attached to the outside of the building. In larger apartments and office buildings this will be inside the building; in what is referred to quite obviously as a "phone room". Additionally, a business may be equipped with a phone system. Smaller ones are often known as "KSUs" (Key Service Unit), and larger ones are generally referred to as "PBXs" (Private Branch Exchange). The POTS lines from the demarc point will go directly to the phone system. Internal building wiring would then be an extension on the phone system. These extensions can be digital. If that is the case a butt-set will not work on them. Extensions that mimic a standard POTS line may require dialing a 9 or 8 in order to access an outside line. They may also have outgoing call restrictions placed on them. The easiest way to determine if a phone system extension is digital or analog is to look at the extension phones. If the phone has a display screen, multiple function buttons, or looks like something out of a science fiction movie it's probably digital. If it looks like a normal house phone then it's probably analog. Some analog phones however can support up to five lines, and are equipped with multiple features. Te brand of the phone can also give you an indication. If the phone is labeled "Lucent", "Meridian", or "Nortel" it's probably hooked up to a digital PBX. Consumer-oriented names such as "Panasonic" or "Southwestern Bell" are usually analog. On the telco side of the demarc, most smaller installations will have either an underground or overhead cable that will be either one pair or three pairs. Externally they both look vaguely like old TV antenna twinlead cable; flat and black. The older single pair cable has two large solid copper wires. The cable jacket is easily pierced with two safety pins, or the piercing clips found on commercial butt-sets in order to facilitate clandestine circuit access. While there is still plenty of this cable in use, it has been replaced with a cable that has three pairs of a much smaller wire gauge. With the newer cable, one must slit open the outer jacket to gain access to the cable pairs, or simply jack in from a junction box. These cables then run into larger junction boxes ranging from 25 to 100+ cable pairs that are usually referred to as "cans", "pedestals" (usually applied to junction boxes for underground cable plant), bridging heads, or b-boxes depending on the telco. These points are easily identified. They are either beige boxes on the ground, or silver boxes of varying sizes (1 foot to 6 feet) attached to a telephone pole. Sometimes they will have a telephone company logo on them, a written designation with the words "telephone company property" or something to that effect. Older units will often be marked "Western Electric"; a dead giveaway you are dealing with telco hardware. These test points are rarely locked, and only require a 7/16" nut driver (can wrench) or 5/32" tamper-proof allen wrench (an allen wrench with a hole drilled in the shaft) to access. In the few instances when they are locked, it is usually with a high quality padlock such as a Best or American. The act of clandestine circuit access is simple. It only involves clipping a butt-set on to a handy active cable pair and dialing out. There are plenty of places in the telecom network to do this. The "difficult" part is finding a location that affords relative security while accessing a circuit. This is a matter of common sense, and the application of a criminal mindset. Techniques range from accessing a phone room by impersonating a telephone company employee, to finding a pedestal near some bushes and concealing oneself under a poncho during the hours of night. Some technically-minded individuals have employed cordless phone systems modified to operate off of batteries, to "wireless phone jacks" that use a building's AC power lines as phone wiring. The techniques to avoid are along the lines of one tried by a stupid teenage "phone phreak" whom drove his vehicle up to a roadside pedestal, and ran a length of phone cable from the pedestal to his vehicle. A police officer, assuming the vehicle was disabled, topped by to render assistance and noticed the phone cable running from the vehicle to the pedestal. Aside from the threat of physical discovery while covertly accessing a circuit, there are several threat systems from the Phone Company that must be faced. The first is CAMA, or Computerized Automatic Message accounting. CAMA is the details of phone usage kept on computer tape and used to generate phone bills. CAMA records numbers dialed, and most telcos keep them for seven years. Going along with CAMA is the phone bill of the customer whose phone service you had borrowed. Unless dealing with a large company that does not care, abnormal phone charges will be noted and a complaint likely filed with the phone company. There is "ANI" Automatic Number Identification, and Caller ID (CID), both of which report the originating phone number to the number being called. There are DNRs, Dialed Number Recorders a/k/a "Pen Registers" that are installed on a line by Telco, Law Enforcement, or the customer themselves. They provide a report of every digit dialed on that cable pair. A full-blown phone tap (legal or otherwise not only provides that data, but also a recording of conversations that have occurred on the line. All of these systems will provide a very detailed record of communications activity, and enable a skilled analyst to put together a very detailed intelligence picture of an organization. Threats need not only come from government entities. Surveillance technology is available from a nationwide electronics retailer to any individual who knows what to look for. In going through their catalog, you will find: * A device that will print out CID data on incoming calls and digits dialed on outgoing calls along with the time and duration of the call. They call it a "Call Accountant". * A little "black box" that interfaces a tape recorder to a phone line, and starts the recorder when a phone is taken off-hook. They tout it as a means to "get and take down phone messages the smart way". * A lineman's test-set featuring a "high-impedance monitor mode" that "doesn't disturb data lines". * Inductive microphones designed for telecom recording. They are even sold with an audio amplifier "so others in the room can hear the call". All of the equipment described above is sold without question to help individuals and business manage their phone usage more efficiently or to help the "do-it-yourselfer" install a phone extension in their home or small business. The countermeasure for all these systems is simple. Do not call any interesting number from any number traceable to you. Do not call any number that you want associated with your private line. Do not have anyone interesting call you on a private line. Be discrete in your conversations. By now, this article series has given you enough information to be able to accomplish these tasks. Readers of this series who are at a beginner level in telecommunications will locate and visit a bookstore. From there, they will locate and purchase a book detailing the "do-it-yourself" installation of phone extensions. This will cost less than $30FRN. One possible title is The Phone Book, 2nd edition, by Gerald Luecke & James B. Allen. Upon reading, this text may either be passed along to another worthy individual or retained in the reference library. ---/////--- Cybertech Back Issue Information The Cybertech (print version) Back Issue Compilation Volume II is now back in print. Volume II covers Issues 7-13 with 120 pages of articles and information on Kurt Saxon, SIGINT, Survivalism, Corporations, Hiding Stuff, Drugs, Caller ID, Crypto Systems, Resistance Operations, Guerrilla Media, Data Taps, The "Squealer", Tone Sequencer, Claymore Mines, Interesting Source Code, Combat Intelligence, TV Jammers , Alarm Systems, Schematics, CB Communications, Free Cable TV (legally), Self-Reliance & Preparedness, Memetic Engineering/PSYOPS, Data Security, "Doing a Radio!", Information Warfare, Herbal Medicine, Edged Weapons, Operational Security, Radio Shack Bugs, Home Workshop, Book Reviews, Propaganda, Near Field Receivers, Cheesebox Plans (That work!), Alternative News Gathering, Telecom Remote Control, Decoding Touch Tones, Backyard Pyrotechnics, Militia Operations, Urban Survival, and other neat information they don't want you to know! Cybertech Volume II is $18, which includes shipping via Priority Mail. Terms of payment are either cash or "payee blank" money orders (which makes them freely negotiable). Payment can be sent to: Cybertech P.O. Box 641 Marion, CT 06444 ---/////--- Unless otherwise noted Cybertech Electric is Copyright (C)2001 by Cybertech Press, PO Box 641, Marion, CT 06444. All Rights Reserved. Noncommercial reproduction by sovereign individuals is encouraged provided this electronic publication is redistributed in its entirety with credits intact. Cybertech Electric is published for educational purposes only; under The First Amendment of The United States Constitution. No illegal use is implied or suggested. If you have a problem with this, too fucking bad. Please send any feedback and/or submissions to either of the email addresses in the signature below. |\ /| /\ / |\ | Thomas Icom/IIRG | >< | < > / | \ |\ |/ \| \/ < | | > Cybertech, POB 641, Marion, CT 06444 | | /\ \ \ | |/ International Information Retrieval Guild | | / \ \ \| | "May Odin guide your way!" Madhr er manna gaman, ok moldar auki, ok skipa skreytir. The god that makes the iron grow, loves no slaves.