                      /\          ___                    /\
              _____  /  \__________||). /\ |\___________/  \  _____
                   \/               |\|/- \|/               \/
 
                                   newsletter
                                     of the  
                      []#[]                            []#[]
                      #[]#|    Synectic Underground    |#[]#
                      []#[]                            []#[]
                      #[]#|   "uniting and educating   |#[]#
                      []#[] the phreak/hack community" []#[]
                      #[]#|  ------------------------  |#[]#
                      []#[] Issue Five - April 3, 1989 []#[]  

------------
Introduction
------------

	Triad is now the official Synectic Underground newsletter.  The
  purpose of the Synectic Underground is simply to pull together the 
  phreak / hack community with information vital to its interests.  We
  will be interviewing members of the community, bringing forth system
  news and development, relaying information on various groups, and 
  presenting quality articles that will educate and inform.   Triad's
  head editor is still Black Peter and is still backed by the Atlantis
  Associates.  Submission's can be made on The Lost City of Atlantis 
  [703-327-6144] or on P-80 International via file email.

	This issue will include:

	o  A Discourse on Token Ring Networks     |   Violence
	o  An interview with Violence             |   URban Lividity
	o  Synectic Underground News              |   Atlantis Associates
	o  Formatting TRIAD Articles              |   Black Peter
------------------------------------------------------------------------------

                       A DISCOURSE ON TOKEN RING NETWORKS

                         An Original File by Violence
                          (C) 1989 by the VOID Hackers

                        Written Especially for The Triad

	There have been many articles released in the past few years
regarding networks and even a few on Local Area Networks  (LANs).
Unfortunately, few of the files released on LANs went into any depth
regarding the individual types of LANs.  I believe that knowledge of
this sort is of importance and thusly, I have decided to release this
article on a specific type of LAN, the Token Ring.  Why on just the
Token Ring,  you ask?  Because it is very likely to become the dominant
LAN standard by the end of the decade.  Released in mid '85 by IBM,
years after the release of the Ethernet and  ARCnet standards,  the
Token Ring already makes up roughly 20% of all LAN applications
worldwide.

	To visualize a Token Ring network think of a circle.  Placed along
the edges of this circle are nodes.  These nodes can be microcomputers,
minicomputers, main- frames, or almost any other type of computer
equipment.  These nodes are elect- ronically connected to eachother.
What we have so far is a 'closed' Token Ring network.  In this type of
configuration there can be no remote users.  As hack- ers we will
probably never be able to see a 'closed' Token Ring,  so let me get on
to the 'open' Token Ring.  The only difference between a 'closed' Token
Ring and an 'open'  Token Ring is that there are  one or more nodes on
the Ring that allow incoming communications,  either from the
telephone network or from some Packet Switched Network (PSN).  These
nodes are called bridge systems, and they are the systems that handle
communications between you  and the individual sys- tems located on the
LAN.  In the following diagram you can see a Token Ring net with 6
nodes.  The Token Ring illustrated in this example is linked to a
packet switched network (like Telenet or Tymnet).


                               O   O <--- Node
                                \_/
                              O-(_)-O
                                / \
                               O   O - - - - - > PACKET SWITCHED NETWORK


	An excellent example of a Token Ring network is Prime Computer,
Inc's  PRIMENET facility.  It links  Prime  computers to eachother
using Token Ring technology.  For more information on PRIMENET please
refer to Part III of my Introduction to PRIMOS series.

	Each node receives information from it's neighboring system (NAUN,
Nearest Act- ive Upstream Neighbor) and transmits it to the node
immediately downstream.  In this fashion any node can transmit
information to any other node by sending it through some or all of the
others.

	That explains the 'ring' part of Token Ring,  but what about the
'token' part?  Well,  as stated previously,  each node can transmit its
own data or retransmit data recieved from its NAUN.  A node can't,
however, transmit and retransmit at the same time.  If this were to
happen,  it is very likely that  the node would transmit its own data
and not retransmit the data received from its NAUN.  This would cause
the entire  LAN to become unworkable.  To avoid this the nodes take
turns at transmitting.  This is done by passing around a 'token'.  The
token is a 24-bit message that says to the node that receives it that
it is okay to send data now.  If a node wants to send data and has
received the token then it per- forms a complicated series of actions.
These actions comprise the actual tran- smitting of data to another
node.  The token is changed into a frame which con- tains it's node
address, the target node address, and the data to be sent.  The frame
is sent to the nearest downstream node and continues,  from node to
node, until it reaches the target node.  When the target node  receives
the  frame it fetches the data and alters the  status bits in the
frame's  header.  The frame is then sent from node to node back to the
sending node  (which, by the way, is still the token  holder).  During
this process no  other nodes can communicate.  When the process is
complete the frame is turned back into the token and passed on to the
next node.  This cycle repeats itself continuously.  Each node gets a
chance to transmit it's own data in turn.

	The Token Ring uses  differential Manchester  encoding to transmit
bits on the ring.  Manchester encoding is a protocol (but not in the
sense that XMODEM is a protocol) and has a set of regulations covering
it.  The Token Ring uses viola- tions in the encoded transmission bits
to denote individual fields of data.

	The token (it's your turn to transmit) format looks like this:

           _________________________________________________________
          |                 |                   |                   |
          |  J K 0 J K 0 0  |  P P P T M R R R  |  J K 1 J K 1 I E  |
          |_________________|___________________|___________________|

            Start Delimeter     Access-Control      End Delimeter
                (SDEL)            Field (AC)            (EDEL)

PPP:  Priority bits.  Identify minimum priority for message to use the Token.
  T:  Token bit.  Identifies that the data is a Token rather than a frame.
  M:  Monitor bit.  Identifies the data as a 'priority token'.
RRR:  Reservation bits.  Normally only used in a frame.
  I:  Intermediate frame bit.  Indicates the frame is part of a sequence (not
      used in most implementations).
  E:  Error Detected Indicator (EDI).  Set if an error is detected.  Any node
      on the ring that finds an error can set the indicator.


The frame (data transmission) format looks like this:

        ________________________________________________________________
       |      |    |    |           |          |      |     |      |    |
       | SDEL | AC | FC | DEST ADDR | SRC ADDR | INFO | FCS | EDEL | FS |
       |______|____|____|___________|__________|______|_____|______|____|

LENGTH    1     1    1        6          6      Varies   4      1     1
(byte)

     SDEL:  Start delimeter; same as in the token.
       AC:  Access-control field.
       FC:  Frame-control field.
DEST ADDR:  Destination address field.
 SRC ADDR:  Source address field.
     INFO:  The data in the frame, possibly preceded by routing instructions.
      FCS:  Frame check sequence.  A 32-bit CRC for the FC, DEST ADDR, SRC ADDR
            and INFO delimeters.
     EDEL:  End delimeter; same as in the token.
       FS:  Frame status; result of frame's trip around the ring.


	There is, of course, a lot more about data transmission that I
have not covered such as what differential Manchester encoding is and
how it differs from stand- ard Manchester encoding,  transmission
priority levels, etc.  Such information would be of interest to anyone
wishing to  manipulate and/or monitor Token Ring transmission, but
information of that sort is beyond the scope of this article.  I have
provided a brief  list of reference material  at the end of this
article should you wish to persue this specific subject further.

	The Token Ring standard also supports  built-in  diagnostic
features that other LANs do not have.  These features are able to
automatically identify fouled-up cables, malfunctioning nodes, and
areas with shielding problems (resulting in a good deal of  line
noise).  When a node is turned off  (most likely in the case of a
microcomputer or a FAX machine) or a node begins to malfunction, the
cont- rol unit  (called a MAU, or Medium Access Unit)  causes the
hardware connection between itself and the node in  question to open a
circuit to  itself.  It then loops continuously to itself,  effectively
doing nothing.  The MAU then reconf- igures the network,  pretending as
if the node never existed.  When a node that is off is turned back on
or a malfunctioning node is repaired then the MAU rev- erses the
operation I just described, causing the node to come back online with
the other nodes on the Token Ring.

	A Token Ring network can also be  much larger  in size than
bus-based networks, such as ARCnet and Ethernet.  Each node  on a Token
Ring can be up to 300m away from its MAU while an Ethernet can span
only 500m maximum.  In addition,  Token Rings can be linked by bridge
systems.  These bridge systems is actually a node on both Token Rings.
When connecting many Token Rings together it is generally wise to have
a 'backbone' ring.  The backbone ring consists of a series of bri-
dges,  each connected to an individual Token Ring.  This makes
intra-ring comm- unication a snap.

	That pretty much sums up what the  Token Ring network is  and how
it goes about its business.  From a user standpoint,  one LAN pretty
much looks like another, but it really goes much deeper than that.  As
you can see,  the Token Ring net- work is well-designed and generally
superior to its predecessors, the bus-based LANs (Ethernets and
ARCnets).  If you wish to persue the Token Ring further,  I suggest
that you obtain one or more of the following reference sources:

LAN Primer (RTC Support Tool).  Dallas: Texas Instruments, 1987.
The IBM Token Ring Network Decision, 2nd ed.  Armonk, NY: IBM, 1986.
Understanding the Token Ring (Byte; Jan).  NY, NY: McGraw-Hill, 1989.
-------------------------------------------------------------------------------

                  []#   An Interview with VIOLENCE  #[]
                                              -URban Lividity


    * What do you think about the purpose of the Synectic Underworld?

	As a whole I think it's a good idea.  The phreak/hack community
has been splintered for far too long and needs unified forces to help
bring it back into organization.  That way more people will prosper and
it will be easier to get a grip on things (in the case of newcomers).

    * Is there anything specific that you would like to see come about?

	I'd like to see the underworld return to it's powerful status as
it had in the early 80's.  Groups didn't fight with each other back
then.  People didn't destroy other people's reputations based on faulty
rumors.  Back then people teached each other. They felt that it was
better for all to know how to do it correctly than only a few and have
everyone else mess things up.  I feel the same way.  The underworld is
splintered and bleeding now.  People are stingy with their data.  It's
a very oppressive scene now.  I'd like to see it become as open and
friendly as it once was.

    * You mentioned 'back then', can you give us the philosophy of the old 
    * school phreak/hacks?

	Why of course.  'Back then' (in the early 80's) phreaks and
hackers were in it to learn.  It seems that nowadays people just abuse
(not all, but a good majority).  Learning was a big deal back then.
Experimentation was a common thing.  People just read old G-files now.
The old school was not into the politics you see happening these days.
It was a more 'family' type of thing.  Not to indicate mafioso
tendencies, but rather friendliness.  That's a rare thing these days.

    * Being a member of the VIOD hackers, can you tell us about your goals,
    * purpose and how it all started?

	Sure.  The VOID Hackers was created in January of 1989 by 3
hackers who were tired of the present vicious cycle the underground has
been tumbling through.  We were sick of the 'eliteness' factor.  We
didn't care who was better.  We just wanted to hack and learn, as well
as teach. In a large part, we base our attitude on the one shared by
the members of the Inner Circle. We simply hack and teach and, strange
enough in a time like this, like people to know that we don't know
everything but continue to study and research.  We're like a throwback
from the old school, but composed of some newer members.  It's a good
thing in my opinion.  We could care less about being 'elite' or any of
that rot.  We just want to learn.  We hope that some people will look
at what we are doing and say, "Hey, that's pretty cool" and follow
along in the same direction.

    * You mentioned to me earlier that you will be setting up a learning 
    * system for fellow phreaks and hackers.  What will this be composed of?

	Basically, the underworld has little or no systems devoted to the
teaching of the uninformed.  This is not a good thing.  With no outlet
for learning the underworld cannot grow and prosper.  The VOID Hackers
will be sponsoring a system sometime after this coming summer that will
be exclusively for teaching.  We want to have about 20 teachers and 30
students on the userlist at any given time. The system will be private
and by invitation only so as to make the teaching environment open for
questionable discussion.  As the students learn we will rotate the
userlist.  A real teaching system, if you will.

    * Back to the VOID hackers, how many members are there and what are thier
    * specialties?

	VOID is composed of five members right now.  We feel that small
groups prosper a lot more than large scale groups.  Communication is
easier.  We have all the major (and several minor) operating systems
completely covered.  From VAX/VMS to PRIMOS to UNIX to STRATUS/VOS,
etc.   We also are highly interested in packet switched networks and
telecommunications as a whole.  At any given time we have about six
projects going on.  The members as of now are Thrashing Rage, The
Scythian, Dr. Psychotic, and Master Micro.  Not to forget me, of
course. :-)

[]#[] 
#[]#|    Violence, interviewed by URban Lividity / Atlantis Associates
[]#[] 
#[]#|   o Handle origin    :  Taken from a San Franscico speed metal band
[]#[]                         of the same name, Violence.
#[]#|   o Years active 
[]#[]     in the Underworld:  6, since mid 83, under different aliases.
#[]#|
[]#[]   o Age at interview :  20
#[]#|
[]#[]   o Hardware owned   :  Apple IIgs, Zenith-Z248 AT
#[]#|

	Violence is active member of the underground community who is more
interested in hacking than phreaking but enjoys them both. He has
acquired a great deal of knowledge from four 'teachers' throughout his
underworld sojourn.  His specialty is the PRIMOS operating system and
has released an extensive series based on such.  Some of his favorite
languages include: C, FORTRAN IV, FORTRAN-77, PL/1 Subset G and Prolog.
His most memorable exerience came about when he was told that he was
going to be 'vaporized' by a PRIMENET administrator.  All in all, "it's
all been a good deal of fun."

------------------------------------------------------------------------------
 
                        []#    UNDERGROUND NEWS   #[]


    o Synectic Underground created 
      ----------------------------

	The Synectic Underground has been founded to better unite the
Phreak/Hack community. The idea was created by URban Lividity, formerly
known as Prynce Fenwick. The main board of the Synectic Underground is
The Lost City of Atlantis [703-327-6144]. The purpose of the Synectic
Underground is to spread information and news about anything concerning
the Underworld. Synectic means, "working together toward a common
goal". This will be done via word of mouth, and TRIAD Magazine.


    o The Downunder Underground Connection 
      ------------------------------------

	The Synectic Underground has established its first overseas
threshhold in Melbourne Australia, on the Further Regions BBS
[011-61-3-725-1923]. Tell the Sysop, The Outsider, that Black Peter
sent you.


     o TAP Staff Answers Questions
       ---------------------------
	The Technology Assistance Program (TAP) has members of its staff
answering your questions on the BeeHIve BBS [703-823-6591].


     o DAMAGE INC, supposedly out to get URban Lividity
       ------------------------------------------------

  Hey,

	I thought i better warn you, it seems we have found the narc that
tried to have Damage Inc. busted, his name is Prynce Fenwyck (A.K.A.
Urban Lividity yes the one using this bbs) this informtion comes
directly from Toxic Offspring and Billy the Kid, i was talking to them
the other night when they asked me 'Brian, do you want to help us blow
up Prynce Fenwyck's house? He is the narc who ratted on Damage Inc.,
Maybe not the one who went to the papers 1st but he did go to the
papers'

	Just thought i'd warn you because you are the Sub-Op of the
Explosives sub-board, you may wish to talk to BeeKeeper if you think he
should know about this.

  Later

	p.s. do you have access to a photocopying machine?

  Jack Flash
  -------------

	This message was Emailed to an Associate on the Beehive BBS, and
then was forwarded to me.  My questions are these:

     -Who is Toxic Offspring?!?!?
     -Are you guys feeling ok?

     Damage, Inc:   

	I did talk to the reporter about the OLD and PASS situation that
needs not be brought up anymore.  For your information the information
I gave was previously discussed among the Associates as suitable for
publishing.  Damage Inc. was NOT mentioned because there was NO reason
to do so.  The story is old and not worth the effort you guys are
putting into it.  It's stupid.

                              URban Lividity

------------------------------------------------------------------------------
                  []#  FORMATTING YOUR TRIAD SUBMISSIONS  #[]

  Anything pure ASCII will do on Atlantis.
                               - URban Lividity


	Well, things are finally starting to pick up here. However, I want
to make some things clear.     I really dont feel like wasting my time
fucking around with your files. This issue took much longer to put out
than was necessary.  Mainly because I had to format this file to TRIAD
standards.

     First off, do not use the underline character. The computer we
edit this shit on is a piece (commodore 128) and my wordprocessor
interprets the underline as a delete (dont ask me why).  So please find
another character to use.  Second, punctuation should be uniform in all
articles. I know this is picky, but YOU AINT THE FUCKEN EDITOR, NOW IS
YOU? Indent all paragraphs 5 spaces.  Use return ONLY at the end of
paragraphs. Use only ONE space after any punctuation marks (period,
comma, etc.). Dont use apostraphes as quotes unless your computer is a
piece of shit and you cant use quotes. And don't worry about using
apostaphes in "aint", "cant", "dont", "wont", "youd", "its", etc...but
use them in "I'm" and "I'd"...we aint writing fucken english papers
here, man!  One reason for this, besides me being a finicky
motherfucker, is it saves memory. That means SHORTER DOWNLOAD TIME! It
also means I will get issues out faster, because I dont have to worry
about editing, and the upload time (I only have 300 baud!!).  I'm the
fucker who gets to upload this to several BBSes...     Well, see ya
later man...

          Keep The Faith,
               Black Peter (4/2/89)
