Cybertech Electric: Issue #5 5/17/2001

		�ss es flestra ferdha f�r; en sk�lpr es sverdha
       / |\ /| /|\ |\ |\ /| |-\ \ /
      / | \ / | / | \ | \ | \ / | | \ \ /
     / | \ / | / | \ | \ | \ / | | > / \ /
    / | \/ | / | \ | / | \/ | | / / / /
    \ | | | | < | | | \ / / \
     \ | | | | \ | | | > \ / \
      \ | | | | \ | | | / \ \
       \ | | | | \ | | |-/ \ \
 I know a fifteenth, which Thiodhroerir the dwarf sang before Delling's door.
  He sang might to the Aesir, power to the elves, and understanding to Odin.

			Cybertech Electric: Issue Five
				May 17th, 2001
			  edited by Thomas Icom/IIRG
		    <ticom@iirg.org> <ticomiirg@yahoo.com>

Table of Contents:
- Cybertech Has Returned!
- Living Free and Winning in the 20th Century, Part I
- CAC-MARC: Common Access Cards (CAC) / Multi-Technology Automated Reader
  Cards (MARC), By Azure
- The Day After, by The Omega Man
- Clandestine Communications, by Anonymous
- Cybertech Back Issue Information

				  ---/////---

			   Cybertech Has Returned!

It has been almost five years since I released an issue of Cybertech
(formerly spelt Cybertek) Electric.  I wasn't planning on doing another issue,
but recent events convinced me otherwise.  You can direct thanks to certain
totalitarian elements in the United States government who have recently pissed
in our collective Cornflakes with their blatant disregard of the US
Constitution, and their lack of respect towards their employer (We The
People).  While this has been going on for quite some time (I've been
discussing government misdeeds since the late 80s.), two recent events seem
to have stuck in my craw.

It started with the admission of the FBI that they withheld evidence from the
defense in the trial of Timothy McVeigh for the Oklahoma City bombing.  I
don't care who did what, last time I checked I thought we were still in a
constitutional republic where an accused is entitled to a fair trial.
Obviously I was wrong.  Since it has come to light in one case, you must now
wonder about other cases.  How many innocent people have been railroaded by
Kangaroo courts?

The second event of recent note that should have everyone perturbed is the
recent totally stupid US Supreme Court decision making the medical use if
marijuana illegal.  Now personally I don't smoke weed.  I hold the opinions
(based on years of observation) that it does turn you into an idiot, and that
most "recreational users" of dope are quite capable of fucking up a two car
funeral procession.  What people do in the privacy of their own homes is
another matter, and if it can help someone suffering from a terrible disease
such as Cancer or Glaucoma then it's a good thing.

I'm not even going to get into all the other bullshit out there, such as the
attacks against our right to bear and keep arms, free speech, rights against
illegal search and seizure, and excessive taxation.  All of that has been
going on for years and has to be stopped as well.  The two events of recent
history however, should be enough to cause you to wake up and yell "What the
Hell is going on here?!?!"

The Constitution and Bill of Rights, while dear to my heart (and yours I
hope), are just pieces of paper.  They don't grant shit.  They simply affirm
that people have unalienable God-given (or Goddess-given) rights that shall
not be infringed.  Those documents are worth about as much as the piece of
toilet paper you used to wipe your ass with earlier if YOU don't take the
necessary measures to protect and stand up for your rights.  When I started
Cybertech back in 1990, it provided you with information on how to do just
that; provided you possessed the courage and faith to do so.  Eleven years
later matters have gotten worse, but the truth still stands.  It is up to each
and every one of YOU to educate yourself (spiritually, socio-politically, and
technically), draw your line in the sand, say "No more!", and do whatever you
can and whatever it takes to take this country back from the slide into the
totalitarian pit it has been going down.  If enough of us do our part, I
promise it will happen.

				 ---/////---

		 Living Free and Winning in the 21st Century
				    Part I

I recently received a collection of Survive magazine back issues.  Survive was
a self-reliance periodical from the 1980's that contained very excellent
information.  In spite of its age, the quality is magnitudes better than the
vast majority of material appearing today on the Internet.  Just recently, it
was mentioned on the newsgroup misc.survivalism that Self-Reliance Journal
(formerly American Survival Guide) was ceasing publication.  While often less
than adequate in providing information, it was the only periodical that was
geared specifically towards survivalists.  There is still a lot of information
available on and off the net.  It is a time consuming and difficult process
for a beginner to wade through it all, and sort out the good from the bad.
One of the things I hope to do with Cybertech Electric is to provide a ready-
reference for many technological survival topics, and a pointer towards
material for more advanced study.  What is "Technological Survival"?  It is a
self-reliance and preparedness philosophy that accepts the following:

1) In many "survival situations" one may encounter, the technological
	infrastructure of the affected area will remain mostly intact; if
	affected at all.

2) Even in the more serious disaster scenarios envisioned by
	survivalists there will be plenty of technology floating around, and
	in order to speed recovery operations plans should be made for its
	restoration and implementation.

3) As a matter of strategy, we must assume that opposition will be using
	equal to, if not superior to, the technology at our disposal.
	Therefore we must keep abreast of technological advancements to
	institute appropriate and effective countermeasures.

4) In order to maintain as good a survival edge as possible, it is
	necessary to become educated in high-tech, as well as low-tech,
	topics.

5) In order to more efficiently and effectively survive and prosper in
	the "beforemath" stage, one should be skilled and maintain
	proficiency in "modern" craft/trade.  This also helps with post-
	disaster recovery.

6) Even "classic" survivalism can benefit from a twenty-first century
	outlook.

I find it admirable that an individual may be able to live for extended
periods of time as an 18th century mountain-man in the middle of the
wilderness, and recommend studying to be able to do so if the need arises.  I
find it preposterous to think that in the twenty-first Century a normal
individual would plan solely to do so as part of their survival preparations.
To quote Cybertech writer Injun Jessie, " The true survivalist is not a
purist.  You know the type, 'It's gotta be authentic Special Forces Issue...
It's gotta be authentic mountain man era gear...  Ya gotta make it with stone
tools and yer bare hands...  Etc.' Use any and everything available!!!"
Certain situations you may run into are "modern" in nature, and therefore
require a modern solution.  The most serious problem of this nature is
increasing government totalitarianism evident in the United States today
combined with the use of high-technology measures for population control.  The
best survivalist preparations combine both modern and antique techniques and
equipment in order to provide the best chance of dealing with whatever the
future decides to throw at you.

			      Beginning Measures

Most people are very prone to information overload, especially when they've
been fed nothing but the garbage that passes for "news" in this country all
their life, and then get exposed to alternative sources that provide real
information.  They find themselves unable to form a clear picture of where to
start.  This list is here to help those individuals.  It is only a start, but a
damn good one.

			 The Beginning Measures List

1.  Put together a bug-out kit and keep it handy in the event it is
	needed.  It should include the following:

	1) Earth-tone, outdoor-style clothing, including cover, boots, belt,
	   & black leather gloves.
	2) LBE/Web Gear (Green, Camo, or Black)
	3) Rifle with magazines and other necessary accessories.
	4) .22LR "survival rifle" (Marlin Papoose, AR7, et.  al) or .22LR
	   handgun.
	5) Each rifle must have no less than 500 rounds.  Your .22 should have
	   at least 2000 reounds.
	6) Pack, military type, large.  Must be able to carry:
	   A) 1 poncho liner
	   B) 1 poncho
	   C) 3 pairs undershorts
	   D) 3 undershirts - olive green or brown
	   E) 7 pairs outdoor/boot socks
	   F) Rifle cleaning kit, gun oil
	   G) E-tool
	   H) Mess kit, knife, fork, spoon
	   I) Riggers tape - green, brown, or black
	   J) Hygiene kit: soap, wash cloth, tooth brush, tooth paste, razor,
	      shaving cream, nail cutters, sewing kit.
	   K) Food (No junk food.): canned and/or dried meat, carbohydrates,
	      fruit, and vegetables.

	Other Personal Gear:
	Swiss Army Knife or Leatherman Tool
	Wire cutters
	Mosquito net hat
	Sheath Knife
	Skin-so-soft/Insect Repellent
	Camo Sticks/Kit
	Essential subjects book
	Lighter/Flint & Steel
	Lighter Fluid
	Compass
	2-way radio: Handheld w/head piece (CB, FRS, Ham)
	First-aid kit
	Portable Police Scanner
	Portable Shortwave Receiver
	Rechargable batteries w/Solar-Powered Battery Charger

	The above list is a guideline for individuals who need assistance in
	assembling a bug-out kit, and should be considered an absolute
	minimum standard.

	Those of you who are tech-oriented and/or operate in urban
	environments will want to consider the following.  This list is
	derived from my own experiences as an urban technological
	survivalist.  All of the items are self-explanatory, and there is
	plenty of leeway to customize the kit towards your own tastes and
	preferences.  I've designed this kit to be easily portable for urban
	areas where your transportation is usually public, bicycle, or
	shank's mare.

	We will start with the basics: Something to carry your gear around
	in.  Most people go with either a courier bag or day-type backpack.
	Urban bicyclists seem to like the courier bags while walking types
	prefer backpacks; it's all a matter of preference.  We like backpacks
	as they stay out of the way better, leave both hands free, and are
	less cumbersome than a bag hanging off your side.  A decent military-
	surplus backpack is sturdier and less expensive than some of those
	courier bags.  Also, the "shittier" your bag looks, the less likely
	it is that someone will try and rip it off you.

	Get something in a neutral earth-type color like green, brown, grey,
	or black.  This not only stands out less, but also makes it easier to
	cache (hide) if you can't bring it in with you.  Our recommendation is
	that it never leave your possession, but we know some places will
	want you to check it at the door.  Whether you check it or hide it
	depends on what you have in the bag, and the relative time needed to
	get to it.  Another thing you will want to start wearing, if you
	already don't, is a belt.  It doesn't matter what type of belt as long
	as it's sturdy.  Besides helping hold your pants up (which I'm sure is
	difficult considering some of you wear your pants 5 sizes too big),
	you can carry equipment on it: pager, Mini Maglite, Leatherman Tool,
	Buck Knife, etc.  Now that you have something to carry your gear
	around in we can begin to almost fill it.  You never want to run
	around with a full bag, in case you find something you want to take
	with you.

	I'll start with what you'll be carrying on your person.  Get a
	Leatherman Tool, Gerber Multi-Plier, or Swiss Army Knife.  My
	Leatherman PST-2 has neeedlenose pliers, wire cutters, file, clip
	point serrated/plain edge knife blade, metal saw, regular and
	phillips screwdrivers, can/bottle opener, and a small pair of
	scissors.  I also occasionally carry a Camillus U.S.  Military pocket
	knife.  This is your classic four item "boy scout type" knife that has
	a plain-edged spear point blade, screwdriver/bottle opener, can
	opener, and mini screwdriver/awl.

	For heavier cutting tasks and possible self-defense usage get a good
	lock blade knife.  The Rolls Royce of these (in my opinion) is
	Benchmade.  Until recently I carried a CQB Folder which replaced the
	Cold Steel Folding Tanto that I retired.  The tanto-point blade, while
	excellent for self-defense, is not the best for general purpose use
	and it is also a little bit heavy for everyday carrying.  I went back
	to a Spyderco Endura Clipit.  Spyderco blades are serrated and offer
	tremendous cutting power for their size.  I've owned mine for quite a
	few years now, and it has yet to require sharpening.  The other nice
	thing about the Spyderco is that if you lose it, you're only out $45
	as opposed to $120 for some of the Benchmade knives.  While you
	shouldn't lose tools, it happens (In the past 30 years I've misplaced
	several pocketknives, a Gerber Multi-Plier, a Spyderco Worker, and an
	Al-Mar folder that have yet to reappear).  For those on a budget, the
	Schrade Cliphangers are a lot of knife for the money.

	Being a hardware hacker, I also carry around a few extra tools.  A
	multi-bit screwdriver and a set of tamper proof bits have come in
	handy on numerous occasions; as have a little 6" pry-bar (nicknamed
	"the goblin bar" by an old acquaintance of mine) I picked up at a
	dollar store for, well, a dollar.  A Radio Shack mini-multimeter also
	resides in my kit.  Those heavy-duty scissors known as "EMT Shears"
	that will cut through a penny and only cost a few bucks are nice to
	have as well.  A roll of duct tape and electrical tape complement the
	package.  It is said that you can fix anything with duct tape.  Now
	you need fire.  Disposable lighters are nice.  What's even better is
	one of those butane lighter/torches that put out a jet of blue flame.
	You can solder and almost weld with one of those.  Include a butane
	refill cylinder.  Some really "elite" types carry the miniature
	battery-operated Dremel Tool with a small case of relevant bits.
	Dremel tools have several thousand uses.  You should throw in a few
	of those big black garbage bags as well.  They have been known to come
	in handy.

	Another thing you should have on you is a Mini Mag lite or similar
	small two AA-cell flashlight.  If you've ever been caught inside a
	modern office building or apartment when the lights go out, you'll
	appreciate how handy having a little flash light is.  You can get a
	headband which places a Mini-Mag on the side of your head at eye
	level; an excellent idea when you need to work on something with both
	hands in the dark.  You should also get the accessory kit for the red
	filter lens, as the red lens enables you to have a light source that
	doesn't fuck up your night vision.  A cheap set of 8x or 10x
	binoculars are nice to see things that are far away and don't take up
	much space.  Recently a friend gave me this piece of optics the size
	of a large pen that is both an 8x telescope and a 30x microscope.  It
	was supposedly standard KGB issue.  I also like to have a jewelers
	loupe handy for reading part numbers on electronic components
	(jeweler's loupes have coolness factor).  For memory-aids, I include a
	copy of Pocket Ref, a little notepad, and writing implements.  While
	individuals have taken to carrying around electronic notepads or Palm
	Pilots, I'm a little retro in my choice of memory aids, as they don't
	require batteries that go dead at inopportune times.

	Communications tools are next.  If you can get your friends to carry
	FRS or 2-meter radios that's all fine and dandy, otherwise get a one-
	piece phone, cut the modular plug off the end, and attach alligator
	clips to the red and green wires.  Get one of the portable touch-tone
	pads from Radio Shack.  Get a pager with voice mail.  If someone wants
	to reach you they page you and you can then call them back by
	whatever means you have or desire.  Communications receivers
	(scanners) have come down in price and size.  The Icom R2 and Alinco
	DJ-X2T are small wide-band receivers capable of picking up everything
	from AM/FM broadcasters, to shortwave stations, to local public
	safety communications.

	Throw a set of work gloves in your pack.  Not only will they keep you
	from leaving fingerprints, but they also protect your hands from
	damage and keep them warm.  For the summer, I get a "six pack" of
	cotton work gloves for about $5.  In the winter I replace them with
	wool army "glove liners" and black leather "glove shell".  Speaking of
	damage, throw in some assorted Band-Aids, "butterfly strips", gauze
	pads, first-aid tape, tweezers, alcohol pads, and some Mercurichrome
	or similar ointment in your kit.  You will in the course of your
	adventures get minor dings, scratches, slivers and cuts, and will be
	glad you have it.  It beats bleeding all over the place

	Clothing is next.  Cold weather and rain just happen some times and
	you may spare yourself some discomfort or hypothermia with nice dark
	sweater or sweatshirt and a rain poncho or anorak.  You can add spare
	socks and possibly undergarments if there is the possibility of
	staying overnight unexpectedly somewhere.  Start wearing a hat.
	Baseball caps are OK, but I like outback "Crocodile Dundee" style
	hats that are made of waxed cotton and shed water like a duck's back.
	Some people I know also keep a military surplus poncho liner with
	them to use as a blanket.  A military surplus poncho with liner makes
	a good lightweight sleeping bag for those unforeseen overnight stays.

	Now I will discuss weapons.  Whether or not you decide to carry them
	is a personal decision.  In most areas they are heavily frowned upon
	or illegal.  I personally feel that "An armed society is a polite
	one" (Robert A. Heinlein) and that everyone should have the right to
	carry defensive weaponry if they so choose.  Some places such as
	Massachusetts, California, and New York don't share my feeling.  If
	you live in a Communist state, either move or follow the Eleventh
	Commandment (Thou shalt not get caught).  In most places you can carry
	pepper spray with little hassle.  It works most of the time, but be
	advised some people have an immunity to it.  Don't spray into the
	wind, as you will dose yourself, and if you spray it in an enclosed
	area everyone nearby will get a sniff of it, yourself included.  High-
	voltage stun-guns are pretty effective, despite claims to the
	contrary.  To quote Kurt Saxon in The Poor Man's James Bond, "Anyone
	unaffected by 50,000 volts is from another planet".

2.  Please read the following books as a start: Unintended Consequences,
	by John Ross, Patriots: Surviving the Coming Collapse, by James
	Wesley, Rawles, and Behold a Pale Horse, by William Cooper.

3.  Do as much business as possible in cash with local vendors or via
	mail order with libertarian/patriot companies.  Keep only the minimum
	amount of funds on your bank accounts, and if possible take your
	money out of a large bank and instead establish an account with a
	local credit union.

4.  Participate in the now growing alternative communications networks
	that are operational on CB and Ham frequencies.  You don't have to
	talk politics, just check in with local conditions.  The frequencies
	are available at http://www.iirg.org/csa.html

5.  Home-school your children, if you have any.

6.  Establish contact with like-minded people in your area for mutual
	support and assistance.

7.  Kill your Television.  They don't call it "programming" for nothing.
	Instead of wasting hours in front of the boob-tube, listen to an
	international shortwave broadcaster, read a book, learn some
	skill/trade you're interested in, or take your kids our camping or to
	a rifle range.  I like the rifle range idea.  You can take your TV and
	use it for target practice.

Now take a step back for a moment to see what you have done.  For starters,
you now have the capability to exist more independently from the existing
social and political infrastructure.  You have begun to acquire the means of
capability of defending yourself; which starts your transformation from a
subject to a citizen.  You've eliminated a big drain on your time (by not
subjecting yourself to the idiot box), which now enables you to devote more
time towards self-improvement.  You have taken a step towards supporting local
small businesses, and have stopped giving money to large corporations that
suppress capitalism and promote totalitarian philosophies.  You are beginning
to form a group of friends to help each other through the rough times ahead.
You are getting real information about conditions in your area and beyond; so
you can intelligently make decisions regarding various matters.  All of this
is a good thing, because if you continue on this path; you'll soon be
confident in knowing that no matter what the future throws at you; you'll be
able to prosper.  In future issues of Cybertech Electric, we will discuss some
of the specific subjects in further detail.

				 ---/////---

				   CAC-MARC
  Common Access Cards (CAC) / Multi-Technology Automated Reader Cards (MARC)
				   By Azure

			Introductions and Explanations

I first heard about the MARC card some time in 1996 via a United States Navy
website.  The information was passed to me by the non-religious progeny of a
local Mennonite family.  MARC was already a functioning beta program at that
time.  The website where I gleaned my initial information is no longer
accessible to the public.  However, the Department of Defense has continued to
develop the program over the course of the last few years.

During this interim, the project has metamorphized somewhat.  Currently, MARC
has been renamed to SMART.  The card itself has been re-christened as the
Common Access Card (CAC).  Other cards/systems have been tested and are also
functioning to similar results (and in general, accolades from the military
community).  A transformation is occurring in the way our government tracks
and deploys its considerable resources.  This article aims to provide an over-
view of different smart card technologies and some of their various physical
specifications.  I will also provide a brief timeline outlining the
development cycle of several different systems, and their integration into
military life.  Most of this information is cobbled together from various
sources (official .gov and .mil sites), and portions of this article are
lifted verbatim from those sources.  References are provided at the end of the
article.

				     MARC

The Multi-Technology Automated Reader Card (MARC) project was initiated in
response to a proliferation of single use, updatable technology programs
throughout the Department of Defense.  The MARC project evaluates the concept
of providing a multi-functional, cross-service utility card capable of
satisfying multiple requirements within the DOD for a portable updatable
medium.  The MARC test program moves the DOD toward a "one card per soldier"
concept for portable data carriers.

The MARC is an individually carried smart card that has several media: a
standard 3 of 9 bar code, magnetic stripe, embossed data, printed information
(including a digital photograph), and an Integrated Circuit (IC) computer
chip.  The combination of several media on one credit card-sized device gives
the MARC its versatility: it can interface with a variety of technologies and
systems, from rudimentary imprinting machines to computer systems that use IC
chips as data carriers.

The MARC Card consists of a Datacard Corporation MIC-1600 ICC card containing
a 2K byte reusable (EEPROM) memory and microprocessor chip, a three-track
magnetic stripe, a 3 of 9 bar code and various embossed data, including the
holder's photograph.  The card is a standard, CR-80 size plastic card that
conforms with ISO 7816/1.  The microprocessor contains a Smart Card Operating
System (SCOS) used to organize the MARC data into files and protect them from
unauthorized access.  The MARC connects to various smart card readers through
metallic contacts on the face of the card which are compatible with ISO 7816/2
specifications.  Data on the card is accessed through a Smart Card User
Interface (SCUI) which, in conjunction with the SCOS security features,
controls all access to the MARC data and security features in a flexible,
controlled manner.  Additional technologies, including the use of holograms,
laminated photos, and the Portable Data File (PDF-417) two-dimensional bar
code, are being considered.

		      Smart Card Operating System (SCOS)

The MARC smart card contains a SCOS from Datacard Corporation under a
licensing agreement with Personal Computer Card Corporation (Pc3).  The SCOS
provides a high level command language that supports data structures and
access to files and records.  Password keys are assigned to control reading
and writing of individual data elements and sets.

		       Smart Card User Interface (SCUI)

The SCUI provides a standardized, but highly flexible and tailorable interface
between the application and the data on the MARC.  A tailored application card
for each individual application provides the necessary data structure and
security information to allow the application to access the MARC data without
possibility to effect on other application's data.

				   Security

Files are protected from unauthorized access by requiring that one or more
password keys be submitted to the ICC.  Incorrect key submissions lock access
to all files protected by the key until it is submitted correctly.  For
security reasons, only correct key submissions are confirmed.  Eight
successive incorrect key submissions permanently locks the card.  To ensure
the MARC cardholder controls and is aware of all data written, the individual
is required to submit his or her Personal Identification Number (PIN) before
any data (with the exception of field medical treatment data) can be written
to the ICC.

			    Communications Protocol

Communication with the microprocessor module is based on the protocol defined
in ISO 7816/3.  Full ISO compatible (t=0) protocol is supported.

			   Technical Specifications

Microprocessor

62C580
3.57MHz clock
4.50 - 5.50v, 10ms
Reset duration 10ms

Serial Input/Output

9600bps asynchronous, 8 bit data
ISO (t=0) and Pc3 protocols
Transmit turnaround delay: 5ms
Line timeout: 1.0 seconds
Reset response: conforms to ISO 7816/3
Response delay < 10ms

Keys

Issuer, PIN, and 8 application keys
1-8 characters
8 retries

Memory

1920 bytes data and File Descriptor Table storage
64 data files maximum
256 bytes per record
10,000 erasures

Physical Characteristics

86mm x 54mm x .84mm
ISO 7816/2 standard contacts
10,000 insertion cycles / 10 year data retention

Environment

0 to 70 degrees centigrade operating
-40 to 125 degrees centigrade storage
30 to 80% non-condensing operating
5 to 95% non-condensing storage

			    AMS Optical Memory Card

The AMS is a user-friendly software package designed to operate at different
supply points: the depot, central receiving/shipping points (CRSPs), and
supply support activities (SSAs).  Each of these operations has similar
equipment and software packages that complement the other, making them
compatible.  The AMS hardware consists of an IBM-compatible personal computer,
optical memory card reader/writer, bar code reader (BCR), radio frequency tag,
tag docking station, and printer.  The AMS system outputs several different
products such as scannable bar code labels, radio frequency tags, and optical
memory cards.  The AMS is currently a stand-alone system that is being
incorporated into the Standard Army Retail System-Objective (SARSS-O) used at
the direct support unit.  The AMS is an efficient, cost-effective and compact
shipping manifest and database management system that will expedite receipt
processing when used properly.

The need for AMS arose during evaluations of the logistical problems during
Operation Desert Shield/Storm in the early 1990s.  Supplies were inadequately
manifested.  Storage sites had no access or visibility.  No inventory control
procedures existed.  All these logistical problems led to major accountability
problems.  The General Accounting Office (GAO) cited these accountability
problems as the main reason for poor supply distribution and excessive costs.
The Defense Logistics Agency (DLA) then began a research that developed the
AMS.

The AMS's key component for reducing receipt processing is the optical memory
card.  The size of a typical credit card, the optical memory card provides
detailed information on the contents of each multipack or containerized
shipment.  Each card accompanies its multipack or container to its final
destination.

The optical memory card accesses and updates the SARSS database, which results
in the immediate search and retrieval of high-priority items.  The AMS, and
specifically the optical memory card, are designed to interface with all the
military services' retail supply systems.  This interface enables asset
visibility, expedites receipt confirmation, automates the reconciliation
process, gives automated reports of discrepancy, and creates issue and packing
lists for supported customers.

The laser optical memory card has many advantages.  The optical memory card
caa store 2.5 million bytes of information (approximately 1,200 pages of hard
copy).  It costs only $4.00 per card.  Very resilient, the optical memory card
can withstand temperatures from -40 to +212 degrees Fahrenheit.  In addition,
it is not affected by severe weather, water or shock damage.  The optical
memory card also has a protective coating that shields it from magnetic
fields, electrostatic, and radio frequency interference.

The optical memory card allows a database to prioritize offloading and issue,
which gets high-priority supplies to the unit quicker.  This system will
eliminate the backlog of processing shipments.  Before the AMS, 40 personnel
worked three shifts to receive and process receipts from a standard shipment.
With the introduction of AMS, four soldiers can complete the same tasks in a
single shift.

				    History

The following is a brief overview of smart card deployment throughout the last
several years.  Source material is footnoted where appropriate.

1993
November
  - MARC testing begins at Fort Bragg, NC. The cards' success at the initial
site led to further testing in Hawaii.

1994
February
  - Initial MARC test at Fort Bragg, NC and Hawaii ends.
August
  - 25th Infantry Division (Light) US Pacific Command (PACOM), Hawaii, begin
    participating in the MARC test.

Hardware and software is installed and food service personnel and Personnel
Administration Center (PAC) staff are trained on the new equipment and
procedures.

Information Technology Solutions, Inc., of Petersburg, Virginia, under
contract with the product manager for the Army Food Management Information
System (PM AFMIS), trains 90 food service workers from 12 dining facilities
and 37 PAC employees.

The headcounters at each dining facility serve as the main testers of AHC.
They operate a handheld computer called a Portable Data Collection Device
(PDCD), a commercial off-the-shelf item made by Telxon, Inc.  Diners hand
their MARC to the headcounter, who verifies the holder's photo on the card
and scans it through the PDCD.  The PDCD reads each diner's status and MEC to
determine the correct cost of the meal.  The basic information recorded by the
PDCD includes the first five characters of the diner's last name, the diner's
social security number, meal type, payment method, and amount paid.  Recording
these data electronically eliminates the need to collect signatures from MARC
holders at the headcount station and reduces the paperwork required to collect
headcount data.  The PDCD keeps an up-to-the-minute record of diners served and
cash collected.  It also compiles summary information that speeds up post-meal
accounting.  The PDCD transmits data collected to the AFMIS 3B2 minicomputer
after each meal.  However, the PDCD has sufficient memory capacity to store
information on multiple meals should the AFMIS system be inaccessible or
inoperable.

Automated Head Count (AHC) gives the BAS diner the option of paying for his
meal with cash or by payroll deduction.  If the diner chooses the payroll
deduction option, the headcounter hands the diner the PDCD, and the diner
enters a four-character personal identification number (similar to a
transaction at a bank's automated teller machine).  Payroll deduction data are
sent through the Defense Data Network to the Defense Finance and Accounting
Service for entry into the Defense Joint Military Pay System.  Payroll
deductions posted before the 15th of the month appear on that month's Leave
and Earnings Statement (LES).  Payroll deductions made after the 15th of the
month appear on the next month's LES.

  - MARC has already been issued to soldiers stations at Fort Shafter, Oahu
    and marines at Marine Corps Base, Kaneohe Bay.  [a]

October
  - MARC is distributed throughout the 25th Infantry Division (Light), US Army
    Hawaii (USARHAW), 45th Support Group and the 703d Military Intelligence
    Brigade.

1995
January
  - AHC prototype test at Schofield Barracks, Hawaii.
  - MARC is put to the "real test" during the deployment of 3,600 soldiers
    from the 25th Infantry Division to Operation Uphold Democracy in Haiti.
    The card accounts for personnel readiness by updating and processing key
    information to the MARC during the Preparation for Overseas Movement
    (POM).  Based on 25th Infrantry Division requirementns, the MARC program
    produces two spin-off cards for issuing in Haiti.  The first is an access
    control card for local national employees and the second an access control
    card for secure areas.  After the success of the MARC during Operation
    Uphold Democracy, Marine Forces-Pacific requests inclusion in the MARC
    test bed.

September
  - The card is issued to all Marines in Hawaii.  The US Marine Corps modifies
    the MARC to serve as a field training record and shipboard accountability
    card, in addition to the card's basic design.

1996
  - The Clinger-Cohen Management Reform Act of 1996 (Section E of Public Law
    104-106) is passed.  [b]

April
  - The 77th Maintenance Company's Class IX (repair parts) SSA, operating out
    of Camp Tampa, Bosnia, is fielded the AMS.  The AMS's ability to use the
    optical manifest card to batch process incoming shipments from the depot
    cut the time that parts spent in the receiving section of the warehouse in
    half, saving about 80 manhours of work per week.
  - Approximately 18,000 25th soldiers asssigned to the Hawaii units
    participate in a prototype test of AHC in which they used the MARC as a
    substitute for the regular meal card.

July
  - Fort Hood, Texas, July 15, Staff Sgt.  Joseph K. George of 2nd Platoon, 4th
    Military Police Company, 4th Infantry Division, was one of the first
    soldiers to get his hands on the hand-held data entry device for the MARC
    system.  He puts the unit through extensive durability and temperature
    tests.  [c]

October
  - DOD funding for the two-year Hawaii MARC card test ends.  After the
    success of MARC, the commander of the 25th Infantry Division and USARHAW
    decides to continue the program throughout FY97 for division and USARHAW
    units.  The 25th Infantry Division and USARHAW food service chief says the
    MARC in the dining facility was a success and the Army needs to keep the
    card.  The MARC ends all paperwork associated with the meal cards.  Also,
    the card is needed for deployments to update soldier information during
    predeployment POM.  The only consequence to units that decide to use the
    MARC is funding.  The cards are funded internally.  Continued funding for
    the project beyond FY97 is uncertain.  Efforts continue to secure funding
    to expand the MARC program Army-wide in FY98.

1997
July
  - Floor Statement by U.S.  Senator Charles S. Robb (D- Va.) proposes $36
    million in funding for FY98 to expand the MARC program.  [d]

September
  - Sen.  Charles S. Robb votes in favor of the Fiscal Year 1998 Defense
    Appropriations bill.  The measure passes the Senate by a vote of 93-5.  [e]

1998
April
  - Army begins issuing 18,750 smart cards to to basic training recruits at
    Fort Sill, Okla., as part of a year-long pilot program.
  - On April 6, the United Press International reports Recruits will use the
    cards to buy toiletries, clothing and stamps, get haircuts and make
    telephone calls during basic training.  It also states that a lost smart
    card "can be easily replaced and because each card is keyed to a recruit's
    fingerprint, it cannot be used by others." The article reports that the
    $4 million smart card pilot program is a joint project of the Army, the
    Treasury Department, Mellon Bank, the Defense Finance and Accounting
    Service, and the Army and Air Force Exchange Service.
  - Defense Finance and Accounting Service spokesperson Fran Gurka, who is
    coordinating the smart card program, says: "The card offers a sense of
    security not available with cash.  When recruits were paid in cash, if
    they lost it, tough luck." [f]

August

  - Approximately 4,200 multi-technology smart cards are issued to all cadets
    at the USAF Academy.  The Gemplus 4K MPCOS-EMV card was issued with 3-G
    International's Multi-Application Reader Card (MARC) architecture and
    Smart Card User Interface (SCUI).  This smart card's initial application
    is Product Technologies, Inc.'s SmartCity electronic purse.  The e-purse
    can be used at the washers and dryers in the laundromats, to make copies
    in the library, and to purchase snacks.  Other point of sale locations are
    being added.  Disposable stored value smart cards are also available for
    purchase by USAFA employees and faculty.  Additional smart card
    applications will be added in the near future.  For example: room access
    control, medical, manifesting, and training qualifications and test dates.

1999
  - The Paperwork Elimination Act of 1999 (Public Law 105-277) is passed.  [g]

April
  - On April 2, 1999, the Undersecretary of the Navy designates the
     Department of the Navy Chief Information Officer (DON CIO) as the DON
     lead for Smart Card Technology by memorandum directive.  [h]

May

  - A Smart Card Office is chartered on May 24, 1999 to provide focus and
    management for Smart Card efforts within the Department of Navy.  [i]
  - The Smart Card Program at NTC Great Lakes (Department of Navy) is in full
    swing.  Applications in use include: Electronic funds, Drug Test
    Management, Joint Food Service (automated dinner check-in), Smart Immune
    (storage of immunization records), and Smart Dental (storage of dental
    records).

Also under developmnent at NTC Great Lakes is Care Central/TRI-MEP.  This
application will enhance the special physical exam process by providing the
capability to automatically populate physical exam forms and download patient
care to the Biomedical Databank.  Web development of the application is
planned.

Card printing and issue at Great Lakes is the task of the local Defense
Automated Printing Office (DAPS).  Every recruit reporting to Great Lakes
receives two smart cards; one temporary card and one permanent card.  The
temporary card is issued the day of arrival and is formatted to allow the use
of a purse application.  The purse function, administered by the Navy Exchange,
allows the recruit to purchase required and personal items while under going
training and replaces a World War II process of using "chit" books.  Medical
and dental information is also written to the card.  Near the end of recruit
training, each recruit cashes in any remaining funds on the temporary card.
All demographic, medical and dental information is transferred to a permanent
smart card that also displays a photograph of the individual.  The recruit
takes this permanent card to his/her next duty station and the temporary card
is reformatted and reused.  [j]

  - Similar programs are deployed at Pensacola, FCTC\NAS Oceana, Atlantic
    Fleet Ships/Norfolk, and NMCB Miramar by the Department of Navy.

November
  - The Deputy Secretary of Defense makes the decision to institute a
    Department of Defense-wide "Common Access Card (CAC)" as the replacement
    for the existing military identification card.  The Army will adapt this
    card as its standard military identification.  CAC superceeds MARC as
    'the' reference to the smart card within the U.S.  government.  [k]

2000

  - The use of smart cards has become a priority within the Department of
    Defense (DOD).  Public Law 106-65, National Defense Authorization Act for
    Fiscal Year 2000, directs the Army to establish a project office to
    cooperate with the Department of the Navy to develop plans for exploiting
    smart card technology as a means for enhancing readiness and improving
    business processes throughout the military departments.  The Deputy
    Secretary of Defense's (DEPSECDEF) 10 November 1999 Smart Card Adoption
    and Implementation Memorandum mandated the implementation of the CAC,
    which will serve as the Standard ID card for active-duty military
    personnel (including the Selected Reserve), DOD civilian employees, and
    eligible contractor personnel; Principal card used to enable physical
    access to buildings and controlled spaces; Principal card used to enable
    computer network and system access; and Primary platform for the PKI
    authentication token.  The Army sees participation in the development and
    deployment of this CAC as an pportunity to respond to the DEPSECDEF
    memorandum and support the Army EC mission.  [l]
  - DOD Public Key Infrastructure (PKI) mandates that all active duty,
    selected reservists, civil service and on-site contractors begin using
    digital certificates by end of FY2001.  The CAC card is the hardware token
    for PKI digital certificates.

October
  - Fort Eustis, Va., U.S.  Army Europe in Heidelberg, Germany, and Yongson
    Army Garrison, Korea begin a Beta Test of the CAC.  [m]

December
  - The Army interim policy messages for the CAC/SMART Card PKI are made
    official.  General Cuviello signs the messages on 6 December 2000.  [n]

				  The Future

This technology is intended to eventually enter the civillian world as an
identification system.  Meant to replace current 'multi-card' systems and
represent a single identification point, MARC (now CAC) will revolutionize the
way Americans authenticate transactions and conduct business.  The
ramifications on privacy should be evident.  Where will this 'centralized'
data be stored, and how/by whom will it be protected?  Beyond concerns of
legitimate data warehousing; the question begs to be asked: Under what
authority is this mandatory tracking system being implemented?  Will the CAC
replace the State-issued Driver's License as our primary means of
identification?  Will an option be provided to 'opt out' of a system with
questionable guarantees for personal security?  What organizations will be
allowed to gather and traffic in smart card data?

With a centralized means of authentication for practically *all* societal
functions, what happens when a smart card is compromised?

Debate over this topic may not reach the mainstream until cards begin being
issued en masse, and the first cases of MARC/CAC fraud are exposed.  However,
with current advertising campaigns promoting the smart card 'idea' (MasterCard
and Visa are pioneering this sales pitch), mass implementation may in fact
be *demanded* by the populace as a protection against on-line crime.  Already,
the playing field for this battle is being defined through television
commercials and 'newly exposed' weaknesses in tradtional identification
techniques.  Little information is being presented concerning what measures
will be taken to insure the inegrity of the 'data keepers'.

		       Projected Uses for MARC Techology

Full Military Deployment

LCDR Tony Smith, Pacific Fleet MARC/CAC program manager, says the military
plans to fully implement the MARC/CAC Program by Fiscal Year 2001 to all
active-duty service members, DOD civilians, retirees, reservists, family
members, the Departmen of Veterans Affairs and the Coast Guard.

Social Security

The Social Security Administration is already investigating methods of
integrating biometric identification into its existing fraud prevention and
detection programs.  Initiatives requiring enhanced 'methods' of tracking
beneficiaries have already crept onto the books.  MARC/CAC will represent a
decisive solution the the perceived delimna.  [o]

Immunization Tracking

As demonstrated by the military, medical and dental histories can be tracked
effectively with smart card technology.  Future privacy initiatives instigated
by Capitol Hill will require a secure method of identifying patients, and
reliabley storing confidential information.

'Of course, when "the military experienced delays in troop deployments because
personnel records (such as training completed, immunizations) were not up-to-
date and readily available" during the Gulf War, the Pentagon created a MARC
card.' [p]

Summary

Pros

The use of smart cards can save millions of dollars formerly allocated for
paperwork and storage, not to mention staff who are chaged with keeping track
of all the paper.  Speed of data storage and recovery are increased, and
inaccurate record-keeping previously attributed to human error can be
significantly reduced.  The elimination of a physical 'paper trail' saves on
storage costs and reduces the likelihood of accidentally misplacing or
destroying data.

				     Cons

Loss of privacy.  Reliance on the "computers don't make mistakes" syndrome.
Whereas paper records stored in disparate locations require a fair amount of
legwork to alter/tamper with, digital records can and will be altered remotely
by individuals or groups who need not ever come in physical contact with their
targets.  Digital investigators need not risk the face-to-face interaction
often required to retrieve such information in today's multi-card world.  The
advent of the 'paperless permenant record' adds a new dimension to Information
Warfare tactics and strategy.  It has not yet been demonstrated that digital
identification can be better protected than its physical-world counterpart.

				Citizen Protest

It may be prudent to note that 'MARC' may not have been the wisest choice of
acronyms for this project.  Certain elements within American society will no
doubt draw parallels between the program name (or its stated goals) and motifs
drawn from their own tradtional legends and cultural backgrounds (this may
actually have been what lead to the project's eventual name-change in the late
1990's).  Indeed, religious groups have latched onto the issue with a
vengance.  Specification information on the original MARC program circulated
widely on the Internet in 1996, triggering the (almost immediate) emmergence
of protest websites and notices on the World Wide Web.  Here are two examples
of religious (Protestant Christian) objections to the program:

http://www.endtimeprophecy.net/~tttbbs/EPN-2/Articles/Articles-
Mark/marccard.html

http://www.google.com/search?q=cache:www.yellowstoneinfo.com/biochips.htm+char
les+robb+MARC+card&hl=en

On the other hand, the 'MARC' acronym may have been chosen for just this
reason.  Psychological Warfare Operations (PSY-OPS) are known to sometimes
coincide with (and co-exist within) legitimate government projects.  Whatever
the case, religious organizations 'bit', and speculation quickly ran rampant.
Anti-MARC sentiment spread amongst like-minded groups on the Internet like
wildfire.

Curiously, most organized dissention seems to have dissipated rapidly when the
program underwent it's name change.  However, goals and methods of the
operation have remained consistent with the earliest documented efforts I have
uncovered.

				   Editorial

Smart card technology is here to stay (as much as *anything* ever truly
'stays').  Successful test runs throughout the 1990's proved that electronic
tracking of human and material resources greatly improves the efficiency of
logistical planning and personnel management.  Programs to integrate smart
cards into civillian life are already being implemented nationwide.  As more
and more Americans rush to get on-line, the digitization of personal
information and identification will continue to escalate until smart cards are
considered a 'normal' tool for performing daily tasks.  It is anticipated that
future e-commerce systems will take advantage of the convenience and security
(sic) that smart card authentication bring to the table.  Time will tell if
this reliance will prove to be a solid foundation for real-world transactions.

As smart card technology spreads into general use by society at large, the
effects of computerization will become apparent to both proponents and
detractors.  The issues that are examined at this time may prove to be some of
the most important factors for the future of Privacy and Autonomy in the
United States of the 21st Century.  A large struggle looms over the horizon
for control of the personal data that defines us as Human Beings.  In our
modern information-based economy, such personal data takes on a significant
dollar value as well as enriching our understanding of ourselves and those
around us.  Without careful safeguards on the confidentiality and integrity of
this data, Americans may well find themselves little more than beasts of
burden on the battlefield of the Market Economy.

It is imperative that issues of privacy and security be addressed as these
technologies become more prevalant in day-to-day life.  It is up to us to
bring these decisions into the forefront of the public consciousness before it
is too late.

40 acres and a mule.

				    Closing

Footnotes

[a] http://www.chinfo.navy.mil/navpalib/news/navnews/nns96/nns96019.txt
[b] http://www.rdc.noaa.gov/~irm/div-e.htm
[c] http://www.dtic.mil/armylink/news/Jul1996/a19960715force2.htm
[d] http://www.senate.gov/member/va/robb/statements/floor/marc.html
[e] http://www.senate.gov/member/va/robb/releases/nrsep25.html
[f] http://www.monkey.org/geeks/archive/9804/msg00155.html
[g] http://www.ec.fed.gov/gpedoc.htm
[h] http://www.doncio.navy.mil/downloads/memo1.pdf
[i] http://www.doncio.navy.mil/focusareas/smartcard/index.html
[j] http://www.doncio.navy.mil/focusareas/smartcard/greatlakes.html
[k] http://armyec.com/faqs_main.htm#10
[l] http://armyec.com/smartcards/smartcards.htm#background
[m] http://www.dtic.mil/armylink/news/Oct2000/a20001010cac.html
[n] http://armyec.com/smartcards/cacpkipolicy.htm
[o]http://www.ssa.gov/oig/auditpdf/9841007.pdf#xml=http://www.ssa.gov/search97
cgi/
s97_cgi?action=View&VdkVgwKey=http%3A%2F%2Fwww%2Essa%2Egov%2Foig%2Fauditpdf%2F
98
41007%2Epdf&doctype=xml&Collection=SSA&QueryZip=biometric%3COR%3E+%28keywords+
%3Cc
ontains%3Ebiometric%29&
[p] http://www.he.net/~dvk/imms/immtrack.htm

Further Reading

http://armyec.com/faqs_main.htm#smartcards
http://www.smart.gov/information/plan/scplan.html
http://www.smart.gov/information/guide/8physical.html
http://www.gsa.gov/Portal/main.jsp?tab=home

				 ---/////---

				 The Day After
			       By The Omega Man
			  <the-omega-man@excite.com>

Greetings, and welcome back!  It is a pleasure to once again be able to
write for this esteemed periodical.  The survivalist scene is now taking a
downturn, much like in 1990 when I first started writing for Cybertech.  Things
picked up a bit thanks to the election of Bill Clinton, the Y2K bug, and the
election fiasco.  With the new millenium and George W. Bush in office, the
hobby of survivalism is not as popular as it was.  It's as if people believe
world affairs are going to miraculously change overnight: Some of us know
better.

I will start by reviewing a book that I recently purchased from Javelin Press
titled Boston's Gun Bible, by Boston T. Party http://www.javelinpress.com/.
This is a nice thick text containing all sorts of firearms reference info all
in one place.  It's $28 and well worth the price.  It has a lot of good
information for the beginner, and experienced firearms enthusiasts will find
it to be a wealth of reference info all under one cover.  The book is divided
into six parts: The Basics, Combat Rifles, Guns in General, Acquisition,
Disarmament, and Courage.  Consider this book a "must get".

As a student of survivalism, my spare time is spent between going out in the
field to enjoy my hobby and roaming through libraries and bookstores looking
for interesting reading material so I can expand my knowledge horizons.  Even
here in the back woods, I'm a short drive from Barnes & Noble, Borders
Booksellers, and several used bookstores.  My town also has an excellent
library.  Where do I browse?  The sporting section has books about hunting,
shooting, camping, fishing, and martial arts.  The engineering and home
improvement sections have some good technical skill books.  Some stores have an
agriculture section that contains a lot of books on rural living and
survivalism.  Also, believe it or not the reference section often has some
interesting titles.  I recently discovered a Ragnar Benson text in the
reference section of our Borders.

Going through the martial arts books at one Borders, I found a good one:
Street Ninja, Ancient Secrets for Today's Mean Streets, by Dirk Skinner.
Although a lot of survivalists tend to discount "ninja" material as worthless,
the ninja were probably the first recorded technological survivalists and kit-
bashers.  They modified common farming implements into effective weaponry.  They
successfully led a covert existence.  They were so effective that they were
both hated and feared by the Samurai.  Studying their techniques in a modern
context would be useful to the modern-day survivalist.  Street Ninja is an
excellent way to start doing so.  The book does an excellent job of applying
the ancient fighting arts of the Ninja in a modern context.

I'm getting a little more into high-tech.  Thomas Icom introduced me to an
excellent ham radio magazine called 73 Amateur Radio Today.  I took a look at
an issue for the first time, and the first thing I see is an article on how to
make a morse code shortwave transceiver for a few dollars in electronic parts!
Neat!  The same issue also had articles on building a modem monitor (for
checking phone line conditions), lightning protection for radio gear, and an
article on experimenting with TV/VCR tuner modules for ham radio purposes.
What does ham radio have to do with survivalism?  Ham radio is a great way of
communicating when other forms of communication don't work.  Ham Radio also
demonstrates skill with electronics.  A skilled electronics enthusiast will
have no problems finding work anywhere in the country.  Subscriptions to 73
are $25 a year.  Their number is 1-800-274-7373.

Some people ask me "How do you find the time to do all this?" More often they
say either "You must have a lot of spare time on your hands", or "I don't have
enough time." People also mention to me that they would like to do various
things I've wrote about, but lack the money to do so.  I'm sure everyone's
situation is different, and there isn't a quick cure-all answer I can give.
One thing you might want to look into however is your television viewing.
I don�t watch much television, maybe an hour or two a week for a show I like
on PBS.  I don't have cable TV. It's too expensive, and I can get a few
stations, including my favorite PBS one, with the antenna on my roof.  The
average person spends about 20 hours a week in front of the TV. Basic cable TV
service around here costs $40 a month.

Start with thinking about that $40 a month.  That's $480 a year.  I hear some
people are spending around $60 a month for "premium" services.  That's $720 a
year.  What can that buy?  For $480 you could buy a nice electronic experimenter
setup including a Dremel Tool, Soldering Iron and spare parts, a subscription
to 73 Magazine, AND a nice surplus Enfield or Mauser bolt-action rifle and
plenty of ammo.  Let's say you cut down your viewing to what I watch, 2 hours a
week.  That leaves you with 18 extra hours a week.  That gives you plenty of
time to go and do other things.  Think about it.  Why subject yourself to the
abuse the idiot box gives you when you could instead be going out and doing
neat things with your new found spare cash?  Give it a try.  Tell me how you
feel in a couple months.

That's all for this issue.  If you'd like to write, I can be reached via email
at <the-omega-man@excite.com>.  I'd like to hear from you.  Until next time,
stay free.  -The Omega Man

				  ---/////---

			  Clandestine Communications
				 by Anonymous

Communications is an essential element in any operational enterprise.
Effective C3 (Command.  Control, Communications) is the key to a mission's
success.  Fortunately, there are several varieties of commercial, off-the-shelf
equipment that is either usable "as is", or capable of being modified to meet
any set of operational requirements.  Operatives have a variety of systems at
their disposal: telecommunications, data communications/Internet, and RF.
Elements of different systems may be combined to produce a custom C3 package
tailored to your specific cell's needs.  Future articles in this series will
cover various aspects of clandestine communications

I will start by detailing the various pieces of equipment that a
communications specialist will need to acquire in order to establish and
maintain a cell's C3 capability via the telecommunications (telecom)
network.  The telecom network offers a readily available communications medium
that requires little in the way of specialized or expensive equipment to
access.  All of the following equipment is available on the open market at this
time, and would normally be found in the possession of an electronics
technician or ham radio "hobbyist"; thus offering a convenient cover.

The one tool brought about by the recent deregulation of the telecom industry
in the United States that any cell will find extremely useful is the prepaid
calling card.  Available in denominations ranging from 15 to 200 minutes, these
cards are available at any retail establishment for a reasonable number of
FRNs (Federal Reserve Notes a/k/a "Cash").  Provided proper OPSEC measures are
maintained, prepaid calling cards offer a secure means of communications.  Card
calls are the only means in which a data (modem) call can be made over a
payphone.  Otherwise, after the initial rate period is up on a coin call, the
resultant coin collection signal and request recording will disrupt
communications.  This is important, as a laptop computer and modem can form the
basis of a secure communications terminal.

Care must be taken in the selection and purchase of prepaid calling cards.
Obviously, FRNs are the only recommended method of payment.  Selection of
prepaid calling cards is just as important as means of purchase.  Before you
commit to the purchase of a specific card, examine it carefully.  Avoid those
cards that state on the package that they must be activated before use.  Said
cards are also identifiable by a magnetic stripe on the back of the card.  This
means that at the time of purchase, the card is swiped through the POS
terminal by the cashier, and the card company's computer is contacted by the
store to indicate said card was legitimately purchased.  This is intended to
eliminate service theft.  It also generates a record of where the card is
purchased.  Activation-required cards are generally sold by common retail
chains.  To find cards that don't require activation, check independent gas
stations and convenience stores; particularly those in "ethnic" neighborhoods.
Once purchased, the card should be used fo mission-related communications
only, and disposed of in a conspicuous place with a few minutes of time
remaining on the card.  The aim is for another individual to "find" the card,
and use the remaining time available on it.  This will help counteract traffic
analysis attempts on the account.  It is also advisable to commit the access
number and codes to memory; temporarily caching the card until it is required
to be disposed of.  If the card is found on one's person during a search, it
is a simple matter for an investigator to request an accounting report of all
calls made on the card.

The common numeric pager is another one of those everyday items that arouse no
suspicion, and can be used for secure communications.  For around $100 or less
a pager can be purchased with a year's worth of service with no questions
asked and no ID required.  The 10 digit numeric display can be used to send one
way messages via simply generated numeric codes.  The use of codes for brevity
on paging systems is extremely common, and arouses no suspicion.  A book
entitled Pager Power is currently in print, and is a code book that is capable
of generating any message required.  This book can be used in conjunction with
one time pads for your secure messaging needs.  Simply take the number off the
pad, and add to or subtract from the number indicated for the word or phrase.

Pager communications are easily intercepted not only by investigative agencies
but also by communications hobbyists, in spite of it being a violation of the
Electronic Communications Privacy Act.  This makes the use of encryption on
such systems a necessity.  The ease of interception by commercial off
the shelf equipment, a $5 (in parts) circuit, and software available over the
Internet opens up an interesting possibility for clandestine communications.
The requirements are the assembly of a pager COMINT station, the location of
what phone exchanges (or numbers in an exchange) are used for pager service,
and the paging system radio frequency used for said numbers.  Once this is
accomplished, it is an easy matter to identify which capcodes (pager ID codes
sent over the air to identify which message is intended for which
pager/customer) are assigned to which phone numbers.  Using the pager COMINT
station, capcodes can be flagged for traffic logging, with a cell's
communications identified from the usual account trffic by a certain preamble.
While the message will also displayed on the pager of the customer whose
account you are appropriating, it will be ignored as a "wrong number".  Such
"mistakes" are common enough that they can be used to establish a clandestine
communications network among the normal traffic on a system.  By using this
technique with several different accounts and preamble codes, a
high level of security is maintained.  The key to success is in not abusing a
particular account and causing the customer to contact the service under the
impression that his capcode was accidentally assigned to another account.
(This is an uncommon, but not rare occurrence.) Further details on this method
will be elaborated on in a future installment.

A linemans test set (butt set) rounds out the foundation of one's telecom kit.
This is a ruggedized telephone used by telephone company installers and
technicians.  It features alligator clips to enable it to clip onto any one of
several test points on the telephone network, and a monitor mode that enables
"on hook" monitoring of a line to check it's status and activity state before
use.  These devices start at about $100 new from various mail order and supply
houses, but have been seen at hamfests and electronics flea markets for less
than that amount.  While the genuine article is nice to have, it can be
improvised by taking any standard one-piece phone and replacing the cord's
modular plug with alligator clips on the red and green wires.  Test points on
the phone systen are known by various terms: cans, pedestals, bridging
heads, and b-boxes.  They are used for either troubleshooting lines, providing
customer service connection points, and acting as "demarcation points" between
customer and telco wiring.  By hoking into any of these test points, dial tone
can be acquired and phone calls made.  These test points are usually unlocked,
and "secured" with either a 7/16" bolt, or a 5/32" tamper proof allen wrench
screw.  A standard nut-driver will unfasten the 7/16" bolt, although
electronics supply houses sell a "can wrench" designed specifically for
the job.  Tamper-proof allen wrenches, an allen wrench with a hole in the
shaft, are available though electronic tool supply houses, auto-parts stores,
and computer shows.

For clandestine telecom access wireless phone jack systems appear to have
great potential.  They cost about $100 and consist of a base unit and an
extension unit.  The base unit is plugged into any AC outlet near an existing
phone line and connected to the line.  The extension unit is plugged into any
other outlet and provides a phone line without the need to run cable.  As long
as both outlets are on the same transformer feed from the electric company,
you should be able to hook this system up to a phone line and AC outlet
in a utility room, and then go to another room with an AC outlet and have a
phone connection.  This could even be extended from one building to another
provided both buildings were on the same transformer feed.  With the electric
company bridging transformers for remote meter reading, the range could be
longer.

A similar arrangement can also be accomplished with the use of a cordless
phone.  A cordless phone powered by a gel-cell battery and hooked up to a phone
line would allow an individual to use said line without having to be
physically present at the hook-up.  Modern cordless phones use spread-spectrum
digital communications on 900 Mhz.  and 2.4 Ghz.  frequency ranges which offer
1000 yard range and protection against casual interception.

When clandestinely obtaining telecommunications service, the temptation to
commit toll fraud must be resisted.  The calling of a toll-free number to a
prepaid calling card service on a clandestine hook-up will not be noticed.  The
appearance of an unknown number by a customer on his bill has the possibility
of being noticed; with a resultant complaint made to customer service.  One
should especially avoid targeting the phone service of an enemy agent or
collaborator, as it far more beneficial to use their lines as a source of
intelligence.

Laptops and modems are yet another useful tool.  With good encryption software
such as PGP, they offer an extremely secure means of communication.  While a
brand-new state-of-the-art laptop can cost upwards of $3000 depending on what
you buy, but you don't need state-of-the-art.  All you really need is something
that you can hook a modem to, run terminal software, and do a little data
storage.  One can find older laptops for under $100 in the classified ad
sections of newspapers and in your locale's ad paper.  Hamfests and computer
shows are also a good source.  I recently saw an 8088 laptop at one for $15.
Just make sure the unit either has an internal modem (even a 1200 will do) or
has an RS-232 or PCMCIA port to add an external modem.  If you're going the
external RS-232 modem route, the modem will need to able to run off
batteries.  Make sure that the power supply that goes with the modem is a DC
output supply.  Many modems use AC output supplies, and the modem will be much
more difficult to convert to battery peration.  For a while there were these
"pocket modems" being sold which were the size of a pack of cigarettes and ran
off a 9 volt battery.  We haven't seen them offered lately, but they still
should be available on the used and surplus equipment market.

For complete connectivity, acquire an acoustic coupler for your modem.  This
device attaches to the handset of any phone and plugs into your modem's RJ-11
jack.  It is essential for modeming from payphones; where in most instances you
don't have access to a terminal block or phone jack.  Konexx
http://www.konexx.com/ makes the "Konexx Koupler".  It plugs into the RJ-11
jack of a modem and provides acoustic coupling between the modem and a
telephone handset.  According to company literature it operates up to 26.4K
baud on electronic phones, and up to 2400 baud on payphones and other phones
that use a carbon microphone.

In the last paragraphs, I provided an overview of the various pieces of
equipment needed to establish and maintain a cell's C3 capability via the
telecom network.  In this installment I will provide an overview of the telecom
network as it relates to clandestine circuit access.  Everything starts with
the phone line itself.  A standard analog phone line used by businesses and
residences is known as a "POTS line" (Plain Old Telephone Service).  There are
more modern digital types of phone service available such as ISDN (Integrated
Services Digital Network) and DSL (Digital Subscriber Loop), but the most
common thing you will see on a cable pair is still a POTS line.  A POTS line
provides electrical power of nominally 48V DC to power a standard telephone
set.  For communications and signaling a POTS line provides one analog
audio circuit with a frequency response of 300-3000 Hz for communications and
signaling, and a nominal 90V AC ring signal to indicate an incoming telephone
call to the subscriber.  All of this is done on a single pair of wires known
as a "cable pair".  The cable pair wires are known as "tip" and "ring".  The
"tip" side is te negative polarity of the DC circuit, and conversely "ring" is
positive polarity.  POTS line polarity is an academic matter these days, as
modern phones are designed to work hooked up "either way".

Signaling to indicate a dialed number is usually done via 12 audio tone pair
combinations (of 7 audio tones) known as "Dual Tone Multifrequency (DTMF)"
tones or "Touch Tones".  Signaling can also be accomplished via an older
method called "pulse dialing", where the DC power of the circuit is
interrupted momentarily (10 pulses per second) a certain number of times in a
period to indicate what digit is dialed.  In addition to dialing and ringing,
some phones may also be equipped with "Caller ID", which sends the number of
the individual calling the subscriber (or indication of a "blocked" call).
This data is sent via a digital signal that can be heard between the first and
second rings if one were to listen in to an "on hook" phone line.

Inside a building between the "demarc" and the customer's phone equipment, the
wiring consists of cable that is generally white, blue, or gray in color.
Similar style cable might also be used for computer networking equipment, but
will not draw a dial tone when a butt-set is attached to it.  The cable will
usually have 2, 3, or 4 wire pairs in it; each of which may provide access to
a phone line.  Certain cables also exist which may contain up to 25 pairs.
Provided normal wiring conventions are followed, the following colors
will indicate what colors are paired together for a phone line.

Two Pair: red, green, black, yellow.
Pair 1 - red & green
Pair 2 - black & yellow

Three Pair: Same as above, plus
Pair 3 - blue & white

Four Pair and above: Wire pairs with striped colors

	Blue Orange Green Brown Slate
White 1 2 3 4 5
Red 6 7 8 9 10
Black 11 12 13 14 15
Yellow 16 17 18 19 20
Violet 21 22 23 24 25

For example, on a 25 pair cable the first pair would be Blue/White.  The 23rd
pair would be Violet/Green.  With internal cabling you will usually find a
four pair cable, unless it is a very large installation.  Also keep in mind
that while these colors are an industry standard, they are occasionally not
adhered to, especially if the installation was not done by a skilled
individual.

All the internal telecommunications wiring in a building will be connected to
a demarcation point.  This is the point that separates the customer's wiring
from the Telephone Company's wiring.  In most single dwelling residences, small
apartments and small offices it is a junction box attached to the outside of
the building.  In larger apartments and office buildings this will be inside
the building; in what is referred to quite obviously as a "phone room".

Additionally, a business may be equipped with a phone system.  Smaller ones are
often known as "KSUs" (Key Service Unit), and larger ones are generally
referred to as "PBXs" (Private Branch Exchange).  The POTS lines from the
demarc point will go directly to the phone system.  Internal building wiring
would then be an extension on the phone system.  These extensions can be
digital.  If that is the case a butt-set will not work on them.  Extensions that
mimic a standard POTS line may require dialing a 9 or 8 in order to
access an outside line.  They may also have outgoing call restrictions placed
on them.  The easiest way to determine if a phone system extension is digital
or analog is to look at the extension phones.  If the phone has a display
screen, multiple function buttons, or looks like something out of a science
fiction movie it's probably digital.  If it looks like a normal house phone
then it's probably analog.  Some analog phones however can support up to five
lines, and are equipped with multiple features.  Te brand of the phone can
also give you an indication.  If the phone is labeled "Lucent", "Meridian", or
"Nortel" it's probably hooked up to a digital PBX.  Consumer-oriented names
such as "Panasonic" or "Southwestern Bell" are usually analog.

On the telco side of the demarc, most smaller installations will have either
an underground or overhead cable that will be either one pair or three pairs.
Externally they both look vaguely like old TV antenna twinlead cable; flat and
black.  The older single pair cable has two large solid copper wires.  The cable
jacket is easily pierced with two safety pins, or the piercing clips found on
commercial butt-sets in order to facilitate clandestine circuit access.  While
there is still plenty of this cable in use, it has been replaced with a cable
that has three pairs of a much smaller wire gauge.  With the newer cable, one
must slit open the outer jacket to gain access to the cable pairs, or simply
jack in from a junction box.  These cables then run into larger junction boxes
ranging from 25 to 100+ cable pairs that are usually referred to as "cans",
"pedestals" (usually applied to junction boxes for underground cable plant),
bridging heads, or b-boxes depending on the telco.  These points are easily
identified.  They are either beige boxes on the ground, or silver boxes of
varying sizes (1 foot to 6 feet) attached to a telephone pole.  Sometimes they
will have a telephone company logo on them, a written designation with the
words "telephone company property" or something to that effect.  Older units
will often be marked "Western Electric"; a dead giveaway you are dealing with
telco hardware.  These test points are rarely locked, and only require a 7/16"
nut driver (can wrench) or 5/32" tamper-proof allen wrench (an allen wrench
with a hole drilled in the shaft) to access.  In the few instances when they
are locked, it is usually with a high quality padlock such as a Best or
American.

The act of clandestine circuit access is simple.  It only involves clipping a
butt-set on to a handy active cable pair and dialing out.  There are plenty of
places in the telecom network to do this.  The "difficult" part is
finding a location that affords relative security while accessing a circuit.
This is a matter of common sense, and the application of a criminal mindset.
Techniques range from accessing a phone room by impersonating a telephone
company employee, to finding a pedestal near some bushes and concealing
oneself under a poncho during the hours of night.  Some technically-minded
individuals have employed cordless phone systems modified to operate off of
batteries, to "wireless phone jacks" that use a building's AC power lines as
phone wiring.  The techniques to avoid are along the lines of one tried by a
stupid teenage "phone phreak" whom drove his vehicle up to a roadside
pedestal, and ran a length of phone cable from the pedestal to his vehicle.  A
police officer, assuming the vehicle was disabled, topped by to render
assistance and noticed the phone cable running from the vehicle to the
pedestal.

Aside from the threat of physical discovery while covertly accessing a
circuit, there are several threat systems from the Phone Company that must be
faced.  The first is CAMA, or Computerized Automatic Message accounting.  CAMA
is the details of phone usage kept on computer tape and used to generate
phone bills.  CAMA records numbers dialed, and most telcos keep them for seven
years.  Going along with CAMA is the phone bill of the customer whose phone
service you had borrowed.  Unless dealing with a large company that does not
care, abnormal phone charges will be noted and a complaint likely filed with
the phone company.  There is "ANI" Automatic Number Identification, and Caller
ID (CID), both of which report the originating phone number to the number
being called.  There are DNRs, Dialed Number Recorders a/k/a "Pen Registers"
that are installed on a line by Telco, Law Enforcement, or the customer
themselves.  They provide a report of every digit dialed on that cable pair.  A
full-blown phone tap (legal or otherwise not only provides that data, but also
a recording of conversations that have occurred on the line.  All of these
systems will provide a very detailed record of communications activity, and
enable a skilled analyst to put together a very detailed intelligence picture
of an organization.  Threats need not only come from government entities.
Surveillance technology is available from a nationwide electronics retailer to
any individual who knows what to look for.  In going through their catalog,
you will find:

* A device that will print out CID data on incoming calls and digits dialed
     on outgoing calls along with the time and duration of the call.  They call
     it a "Call Accountant".

* A little "black box" that interfaces a tape recorder to a phone line, and
     starts the recorder when a phone is taken off-hook.  They tout it as a
     means to "get and take down phone messages the smart way".

* A lineman's test-set featuring a "high-impedance monitor mode" that
     "doesn't disturb data lines".

* Inductive microphones designed for telecom recording.  They are even sold
     with an audio amplifier "so others in the room can hear the call".

All of the equipment described above is sold without question to help
individuals and business manage their phone usage more efficiently or to help
the "do-it-yourselfer" install a phone extension in their home or small
business.

The countermeasure for all these systems is simple.  Do not call any
interesting number from any number traceable to you.  Do not call any number
that you want associated with your private line.  Do not have anyone
interesting call you on a private line.  Be discrete in your conversations.  By
now, this article series has given you enough information to be able to
accomplish these tasks.  Readers of this series who are at a beginner level in
telecommunications will locate and visit a bookstore.  From there, they will
locate and purchase a book detailing the "do-it-yourself" installation of
phone extensions.  This will cost less than $30FRN.  One possible title is The
Phone Book, 2nd edition, by Gerald Luecke & James B. Allen.  Upon reading, this
text may either be passed along to another worthy individual or retained in
the reference library.

				  ---/////---

		       Cybertech Back Issue Information

The Cybertech (print version) Back Issue Compilation Volume II is now back in
print.  Volume II covers Issues 7-13 with 120 pages of articles and
information on Kurt Saxon, SIGINT, Survivalism, Corporations, Hiding Stuff,
Drugs, Caller ID, Crypto Systems, Resistance Operations, Guerrilla Media, Data
Taps, The "Squealer", Tone Sequencer, Claymore Mines, Interesting Source Code,
Combat Intelligence, TV Jammers , Alarm Systems, Schematics, CB
Communications, Free Cable TV (legally), Self-Reliance & Preparedness, Memetic
Engineering/PSYOPS, Data Security, "Doing a Radio!", Information Warfare,
Herbal Medicine, Edged Weapons, Operational Security, Radio Shack Bugs, Home
Workshop, Book Reviews, Propaganda, Near Field Receivers, Cheesebox Plans
(That work!), Alternative News Gathering, Telecom Remote Control, Decoding
Touch Tones, Backyard Pyrotechnics, Militia Operations, Urban Survival, and
other neat information they don't want you to know!

Cybertech Volume II is $18, which includes shipping via Priority Mail.  Terms
of payment are either cash or "payee blank" money orders (which makes them
freely negotiable).  Payment can be sent to:

Cybertech
P.O.  Box 641
Marion, CT 06444

				  ---/////---


Unless otherwise noted Cybertech Electric is Copyright (C)2001 by Cybertech
Press, PO Box 641, Marion, CT 06444.  All Rights Reserved.  Noncommercial
reproduction by sovereign individuals is encouraged provided this electronic
publication is redistributed in its entirety with credits intact.  Cybertech
Electric is published for educational purposes only; under The First
Amendment of The United States Constitution.  No illegal use is implied or
suggested.  If you have a problem with this, too fucking bad.  Please send any
feedback and/or submissions to either of the email addresses in the signature
below.

   |\ /| /\ / |\ | Thomas Icom/IIRG
   | >< | < > / | \ |\ <ticom@iirg.org>
   <ticomiirg@yahoo.com>
   |/ \| \/ < | | > Cybertech, POB 641, Marion, CT 06444
   | | /\ \ \ | |/ International Information Retrieval Guild
   | | / \ \ \| | "May Odin guide your way!"
	   Madhr er manna gaman, ok moldar auki, ok skipa skreytir.

	      The god that makes the iron grow, loves no slaves.
<End of Text>