meridian mail switch managment and security audit. meridian switch hacking (expunged) written for f41th magazine.
53fdc2fa5f05cf1777e8479352cc1d861cec9b6e6f8e3889967f641800081772
bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.
779a4ec91dd89436fd5f104ed274d52dc3ddd09f544a61c1d4556c2c9473b03f
covert government/military and diplomatic interception of telecommunications protocols and mediums. written for f41th magazine. an article that looks into the various covert methods deployed by international intellegence entitys to monitor/audit international communications for reasons of "national security" and informational gathering. includes a look into gchq, nsa and surrounding agencies that use provate wan's to form covert networks such as "project echelon".
11595f66582c00b0f21a5b10af46020a74de3a4975af5e4d190e80bc49ba9b82
overview of the uk systemx and axe pstn network. added december 1999, written for f41th magazine. a guide to dmsu's, dlsu's, rcu's, and the uk pstn trunking network "masterplan". gBH.
1f090e8554f5be05ed53b7a448628ee807e59fd1033b0de1a4a3177d925449f5
Faith Issue 12 - PSTS information gathering, TACS - Customer Line Testing on Digital Exchanges, Meridian PBX remote administration, Cellular phone tracking, and Overview of digital CCITT system 5.
bd12e1ae9ef765a93161b7696f9db64a3a24e0b7367089a6695362588bb8c688
Technical info on TACS and how it can be used to monitor telephone calls.
0e4701bc00451352a39e9f10346b7b34aae18e0341e0e36bfc358e18f1dd5b4f
Faith issue 11 - Contains bt system x local networks overview, guide to the caribbean phone system, optical phiber technologies, nodal disaster recovery procedure, back-to-back mux p-phone delivery, telephone network synchronisation overview, ntl telephone sync network, and bt system x nou css rough overview.
f867f9ccf672a2d8d6c5bfefb7170dd1811fe4d6587728d66e57e7b6e37847a9
Various means, methods, and implications of bugging the public switched phone network.
74c9f070e2f39ba5563461ce57744725d8c61783cb5f59b0c0cdc0bbae236275