2979 lines
151 KiB
Plaintext
2979 lines
151 KiB
Plaintext
|
|
private line: a journal of inquiry into the telephone system
|
|
|
|
private line
|
|
5150 Fair Oaks Blvd. #101-348
|
|
Carmichael, CA 95608 USA
|
|
|
|
privateline@delphi.com
|
|
(916) 978-0810 FAX
|
|
|
|
$27 a year for 6 issues. Mexican and Canadian subscriptions are
|
|
$31 and overseas subscribers have to pay $44 :(
|
|
A sample of the current issue is $4.00.
|
|
|
|
................................................................................
|
|
|
|
I. Editorial Page
|
|
II. Updates and Corrections
|
|
III. Letters
|
|
IV. The Internet Bridge
|
|
V. Cell Phone Basics, Part II
|
|
A. Toll Fraud
|
|
VI. An Interview With Damien Thorn
|
|
VII. The entire Digital Telephony Bill
|
|
VIII The Text of 18 USC 1029
|
|
IX. The Text of 47 CFR 22.919
|
|
(The regulation prohibiting cloning)
|
|
|
|
|
|
I. EDITORIAL PAGE
|
|
|
|
What's All This Stuff About The Law?
|
|
|
|
1. Welcome to a very different issue of private line. It contains
|
|
much more on telecom law than I have ever put in. Much more, in
|
|
fact, than I ever wanted to put in. The first mission of private
|
|
line is to advance technical knowledge, especially for beginners.
|
|
But I promised many people that I would include the text of the
|
|
entire bill in this issue. I think that people should read this
|
|
legislation. The problem was that I underestimated its size. To my
|
|
horror the bill took up five full pages in unreadable eight point
|
|
type once I keyboarded and scanned it in. Check out page 82 to get
|
|
a sample. I then converted the text to nine point type. Better.
|
|
That resulted, however, in nine pages. Gulp.
|
|
|
|
2. Well, since the article would take up so much room in unedited
|
|
form, I decided to expand the magazine to 32 pages this issue.
|
|
This allowed me to put in some comments and a few charts to make
|
|
the bill a little more understandable. This was a very tough bill
|
|
to make sense out of and organize. I used to do legal research for
|
|
a living. My special resentment of this bill has to do with its
|
|
complexity and the fact that an average per son had little chance
|
|
of dealing with it when it was created. I think you'll see what I
|
|
mean when you read it. By the way, my comments are meant to
|
|
breakup the layout of the text -- nothing more. I know every one
|
|
has their own opinion.
|
|
|
|
3. I'm writing this on April 6, 1995. I'm up to 67 subscribers and
|
|
I am very happy about this. Subscriptions, back issue orders and
|
|
news stand sales have now covered the cost of printing Number 4
|
|
and 5. That's a tremendous development. It gives me real
|
|
encouragement to go forward and better the magazine. Thank you
|
|
everybody.
|
|
|
|
4. The next issue will go back to regular telephone stuff. It will
|
|
feature a field guide to outside plant equipment. This is the
|
|
issue that I have wanted to do for a year! I am really looking
|
|
forward to putting It together. It may include as many as twenty
|
|
photographs. You'll be able to use it, for instance, to identify
|
|
all those mysterious green telco boxes by the side of the road.
|
|
1'11 have pictures, too, of things I've mentioned before. Like
|
|
open wire and solar powered payphones and party line phones. I'11
|
|
also have an article on how to build your own telephone system for
|
|
$25. private line marks its first anniversary in June. Thanks
|
|
again and I'11 see you all again in July.
|
|
|
|
|
|
UPDATES AND CORRECTIONS
|
|
|
|
5. More magazines and newsletters: On The Line is the magazine
|
|
of the California Payphone Association. It is a California
|
|
publication but it does have news from around the country. Similar
|
|
in feel to Public Communications. Should you get both? I think so.
|
|
Send them five dollars for a sample and judge for yourself. Their
|
|
address is: On The Line, c/o California Payphone Association, 2610
|
|
Crow Canyon Rd., Suite 150, San Ramon, CA 94583.
|
|
|
|
6. Telecom Publishing Group produces a number of interesting and
|
|
very expensive newsletters and reports. The Report on AT&T, for
|
|
example, claims to be the only newsletter that "focuses on AT&T
|
|
and its bloody turf battles" It comes out twice a month. It goes
|
|
along with The Report on AT&T FaxAlert; a bulletin by fax that
|
|
comes out within 24 hours of any surprise move by the long
|
|
distance carrier. Sounds great but it will cost you $697 a year.
|
|
They also produce Information Networks, Mobile Data Report, FCC
|
|
Report, Telco Business Report, Local Competition Report, State
|
|
Telephone Regulation Report and Advanced Wireless Communications.
|
|
These range from $397 to $591 a year for 24 issues. Oh, well. The
|
|
one good thing is that they don't charge $35 for a sample like the
|
|
Phillips' newsletters. They'll send you a free copy of one if you
|
|
really want it. Telecom Publishing Group, 1101 King Street, Suite
|
|
444, Alexandria, VA 22314. 1-800-739-452-8011 (orders) or (703)
|
|
739-6437.
|
|
|
|
7. Blacklisted! 411 is an interesting, 2600 like magazine that's
|
|
produced quarterly in southern California. They call themselves
|
|
"The Official Hackers Magazine!" You can order it through the
|
|
Tower chain now or in the future, possibly, through Fine Print
|
|
Distributors. Or send $4.95 for a sample to Blacklist! 411, P.O.
|
|
Box 2506, Cypress, CA 90630. (310) 596-4673.
|
|
|
|
8. Maurice Onraet mailed me copies of EDN and Electronic
|
|
Design. EDN bills itself as "The Design Magazine of the
|
|
Electronics Industry." It's a monthly that touches on a few
|
|
telecom subjects from time to time. The Cahners Publishing Company
|
|
publishes it 38 times a year. Supposedly $120 a year to non-
|
|
qualified subscribers in the U.S., though it looks like you could
|
|
get a free sub. Write for a sample: EDN, 8773 South Ridgeline
|
|
Blvd., Highlands Ranch, CO 80126-2329. (303) 470-4445. Electronic
|
|
Design is a real find. It's published by Penton Publishing, Inc.
|
|
This twice monthly magazine occasionally features articles that
|
|
directly impact telecom. Goldberg's article on PCS in the February
|
|
6, 1995 edition, for example, was a better read than a similar
|
|
article in the expensive IEEE Personal Communications. Electronic
|
|
Design has a $105 suggested subscription price but, again, I think
|
|
you ought to try for a free sub. I really recommend that you write
|
|
or call for a sample. Penton Publishing Subscription Lockbox, P.O.
|
|
Box 96732, Chicago, Il 60693. (216) 696-7000.
|
|
|
|
9. Cellular Marketing is another resource for cellular
|
|
information. It's a monthly that David Crowe says is now taking a
|
|
more technical orientation. Annual subscriptions are $29 in the US
|
|
and $39 in Canada and Mexico. Their subscription address is Argus
|
|
Circulation Center, PO Box 41528, Nashville, TN 37204. The
|
|
editorial address is 6300 South Syracuse Way, Suite 650,
|
|
Englewood, CO 80111.
|
|
|
|
10. For you web types, AT&T is offering some of their industry
|
|
newsletters on the web for two months. In a March 6, 1995 press
|
|
release, AT&T promised that their home page would carry samples
|
|
of 24 technical and business newsletters that it produces for its
|
|
internal business units and AT&T Bell Laboratories. Sample issues
|
|
of the publications would be accessible without charge in April
|
|
and May. In return, users will be asked to evaluate the material.
|
|
"The trial will determine how useful the newsletters will be to
|
|
individuals and institutions outside of AT&T," according to Ralph
|
|
Quinn, of the AT&T Information Services Network. "After the trial,
|
|
the publications will be offered on the Internet at special
|
|
charter prices." This seems a mixed blessing. Some of these
|
|
publications may have had a closed subscriber list before. But
|
|
AT&T will undoubtedly charge some very high rates once the trial
|
|
is over. Oh, well. Their URL is:
|
|
http://www.att.com/newsls/index.html.
|
|
For inquiries about the trial, call the AT&T Information Services
|
|
Network at 908-582-2619, or send E-mail to rmq@library.att.com.
|
|
|
|
11. There's been quite a bit of interest in the telecom related
|
|
magazine list. I've decided to consolidate all the magazines
|
|
described in one easy to read list. I'll update it as I get
|
|
additions or corrections. Send me $2.00 (cash only, please) and a
|
|
number 10 S.A.S.E. and I'll send you the current list. In
|
|
addition, I'll extend your subscription by one issue if you can
|
|
supply me some current, detailed information on any of the
|
|
following: Telekom Praxis (German), Funkschau (German),
|
|
Commutations & Refutations (French), Philips Telecommunications
|
|
Review, Electrical Communication (published by Alcatel), Ericsson
|
|
Review; Siemens Telecom Report; Northern Telecom Magazine, or
|
|
Telesis (Canadian). I will also extend your sub if you tell me
|
|
about any other telecom magazine that my readers would be
|
|
interested in.
|
|
|
|
12. I've made a wonderful discovery! The McGraw-Hill
|
|
Telecommunications Factbook is the best overall book about the
|
|
telephone system that I have yet found. It is current and in
|
|
print. Nothing on coin line services or cellular but otherwise a
|
|
great read. It even explains tariffs. Good, clear diagrams. I
|
|
recommend it without reservation. Around $30. Get this book. The
|
|
rent can wait. Here's a quotation from a comprehensive chapter on
|
|
telecommunications fundamentals. This small section is about PBX
|
|
operation in a private network:
|
|
"In the simplest case, referred to as point-to-point tie-line
|
|
service, users access a trunk between two locations by dialing an
|
|
access code (unique to the tie trunk between those two locations),
|
|
followed by the desired station extension. For example a user on a
|
|
PBX in Chicago calling a PBX in New York City might dial 8-368-
|
|
xxxx. The digit 8 accesses a tie trunk group, 368 selects a
|
|
dedicated tie trunk between the Chicago and New York City PBXs,
|
|
and xxxx represents the called party's extension. A user on a PBX
|
|
in Washington, DC, might dial 8-479-xxxx to reach that same New
|
|
York City party over dedicated tie trunks between Washington, DC,
|
|
and New York City. A unique exchange number would thus exist for
|
|
each called location in this rudimentary private network,
|
|
depending upon the location of the originating call. A private
|
|
network call from Chicago to Washington, DC, could also be
|
|
completed via the New York City PBX if the calling party first
|
|
accesses the New York PBX and then manually dials the same access
|
|
code for Washington, DC, that a New York caller would use. This
|
|
type of service is known as manual dial tandem tie-line service
|
|
and it cannot automatically route calls through multiple PBXs to
|
|
take maximum advantage of network transmission facilities, or seek
|
|
alternate routes if first choice trunks are busy."
|
|
Great stuff. And that's just two paragraphs out of 374 pages
|
|
worth of information. The McGraw-Hill Telecommunications Factbook
|
|
is published by McGraw-Hill, Inc. Joseph A. Pecar, Roger
|
|
J.O'Connor and David A. Garbin are the authors. The ISBN number
|
|
is 0-07-049183-6. It's a paperback and it cost me $29.95. You
|
|
should be able to order it from any book store since it is in
|
|
print. You can also call McGraw Hill at 1-800-822-8158 to order.
|
|
Failing that, try writing to them at Order Services, 860 Taylor
|
|
Station Road, Blacklick, Ohio, 43004. And no, I don't make a dime
|
|
off this. Your editor pays for all of his books.
|
|
|
|
13. ImOkey submitted an article from the Numismatic News about
|
|
coin phone tokens. I'll reprint it next issue when I get more
|
|
space.
|
|
|
|
14. A few notes on the Roseville Telephone Company Museum. The
|
|
museum is open from 10 a.m. to 4:00 p.m. on Saturdays only. I
|
|
recommended seeing an antique store that had old telephones. The
|
|
lady who ran American Antiques has since passed away. The
|
|
collection of old telephones got moved out of that building and
|
|
sold to private collectors.
|
|
|
|
15. I stated in the first issue that Ericksson digital were
|
|
installed in many Motorola built cell sites. Uh, no. Ericksson
|
|
installed AXE 10's for many non-wireline carriers. The wireline
|
|
carriers tended to use Motorola equipment. Many non wireline
|
|
carriers use Ericksson. Motorola or Ericsson would only install
|
|
their own equipment. To take this further, each carrier builds
|
|
its own base station, maintains its own tower and uses their own
|
|
MTSO. One carrier will keep functioning even if something happens
|
|
to the other.
|
|
|
|
16. I don't want to turn private line into The Payphone Journal
|
|
but there's something I need to discuss at length. People tired of
|
|
coin line signaling can turn to the next article. I've gone over
|
|
the differences between COCOT and telco payphones at some length.
|
|
Much of that discussion revolved around my argument that red
|
|
boxing wasn't possible from COCOTs. I contended that in the case
|
|
of a 1+ call, for example, the payphone itself fixed the rates and
|
|
checked the coins deposited. It didn't need, consequently, to
|
|
signal any network resource like ACTS. A red box tone, therefore,
|
|
would go into nowhere and do nothing as a result.
|
|
|
|
17. Well, what if you call an operator? What if you wanted them to
|
|
place the call for you? What now? What happens when she asks you
|
|
to deposit $1.25? It's most likely that the standard redbox tone
|
|
gets delivered over the voice channel to the operator. You don't
|
|
hear it on your end because the audio gets muted when it's
|
|
transmitted. Many COCOT owners contract with AT&T or other
|
|
mainstream companies to provide operator services. I cannot
|
|
imagine a special tone to accommodate COCOTs. The bottom line? Red
|
|
boxing may work from certain older COCOTs that haven't been
|
|
updated. Ones that don't use a coin validator or circuitry that
|
|
either mutes the mouthpiece or filters out any quarter tone
|
|
originating from the transmitter.
|
|
|
|
18. Going further, the voice channel may also be used to initiate
|
|
coin return and coin collect. These would have to communicate
|
|
directly with the COCOT since there isn't any special equipment at
|
|
the CO to trigger a COCOT, unlike the telco payphone with its
|
|
dedicated coin line. So what might these COCOT frequencies be? How
|
|
about a steady tone of 697Hz & 1633Hz for coin return, 770Hz &
|
|
1633Hz for splash back (alerts a telco operator that the call
|
|
needs special handling) and 852Hz & 1633Hz for coin collect? These
|
|
tones differ considerably from the telco ones, such as those
|
|
published in the last issue. You should recognize these tones.
|
|
They are silver box tones, the "A", "B", and "C" keys
|
|
respectively. Any extended DTMF keypad should generate them. See
|
|
what you get for reading patents? Check out patent 4,924,497, Pay
|
|
Station Telephone Interface Circuits at your nearest Patent and
|
|
Trademark Libary or send $3.00 to the PTO to get all 33 pages of
|
|
it. Check or money order to: Commissioner of Patents and
|
|
Trademarks, Box 9, Washington, DC 20231.
|
|
|
|
19. There is one caveat to add to the above discussion. The patent
|
|
involved mentions standard red box tones. Yet the other three are
|
|
different from the usual telco tones. Are the normal tones now
|
|
obsolete or do operater service provider equipment distinguish
|
|
between COCOT and telco? They should be able to produce different
|
|
tones but I don't know if they do. COCOTs are registered with
|
|
different databases to prevent such things as calling collect to a
|
|
payphone. It is possible that a particular tone is sent depending
|
|
on the ANI.
|
|
|
|
20. I mention this confusion over signaling because we are moving
|
|
toward the next generation of payphone signals: digital. On The
|
|
Line reports that several telecom companies are working with
|
|
Pacific Bell to "lay the technological groundwork for further
|
|
competition in local service in California." That includes testing
|
|
the delivery of COCOT payphone signals over digital lines. Whoa.
|
|
Amtel, a large COCOT provider, is the sole private payphone
|
|
participant in these tests. They'll work the COCOT angle while the
|
|
rest of the companies "develop standards for interconnection and
|
|
interoperability of multiple networks, the processes and systems
|
|
required to support these standards, and the delivery of support
|
|
services such as 911 . . ." Yeah, yeah, yea. Back to the digital
|
|
line.
|
|
|
|
21. ISDN and Switched 56 need only an extra twisted pair. The
|
|
telco doesn't have to put in any special wiring to support these
|
|
services -- just two sets of conventional twisted pair. It may
|
|
indeed be possible to have a public picture phone in the near
|
|
future, say around the turn of the century. Stay tuned.
|
|
|
|
III LETTERS
|
|
|
|
22. Dear private line,
|
|
|
|
I'm reading the latest issue of private line and have a few
|
|
comments for you. First of all, pages 36 and 49 are totally blank
|
|
in my copy, not even the page numbers are there. I hope this is a
|
|
problem limited to just a few copies.
|
|
Next, debit vs. credit cards. I know this is confusing to folks
|
|
who don't spend their lives as accountants, or, in my case,
|
|
programming accounting software. Debit and credit have nothing to
|
|
do with positive or negative balances -- they mean the left and
|
|
right side of the ledger. The value of the potential calls on the
|
|
cards is an asset -- one increases the accounting for assets by
|
|
increasing the debit side of the balance sheet part of the ledger.
|
|
The bill you run up on your credit card is a liability -- which
|
|
are increased on the right or credit side. The confusion stems
|
|
from banking. Customer accounts in banks are actually liabilities
|
|
to the banks, so crediting one's account means an increase in the
|
|
bank's liability. And that's just the debit, or left side of the
|
|
ledger. . .
|
|
|
|
Enough accounting. You note how the collector appeal of phone
|
|
cards has artificially jacked up the prices. In Japan. where the
|
|
whole thing got started (Local phone calls are dirt cheap in
|
|
Japan), and before the sales tax, I and S yen coins disappeared
|
|
and the 10 yen coin - the cost of a local 2 or 3 minute call, was
|
|
on its way out) calling cards are usually a bargain. Sure, there
|
|
are collector cards, but the generic variety buys more message
|
|
units that a similar amount of 10 and 50 yen coins.
|
|
Regarding magazines -- I wrote an article in Poppin' Zits!,
|
|
later reprinted in Whole Earth Review, about hacking subscriptions
|
|
to invisible literature (or specialized trade magazines). At one
|
|
point, my girlfriend and I collected subs to over 100 of them, and
|
|
we never paid more than a stamp. I got my start in programming
|
|
after devouring issues of Data Nation and related publications. I
|
|
could fax you a copy, and if you're interested in reprinting some
|
|
of it, I might be able to find the original file and email it to
|
|
you. Keep up the great work.
|
|
|
|
Jerod Pore jerod23@netcom.com
|
|
|
|
23. "There were at least 60 defective copies of private line
|
|
Number 5. That's out of a press run of 1000. I found out about it
|
|
after I mailed my subscribers copies. Those with a defective copy
|
|
should drop me a line and 1'11 mail you a good copy with all the
|
|
pages. The terminology of calling cards is confusing. I may run
|
|
through the terms again when I do an article on the switches
|
|
involved."
|
|
|
|
24. Dear private line,
|
|
|
|
I just received private line number 5 in the mail today. I
|
|
think your list of magazines and newsletters is excellent. You did
|
|
miss Cellular Marketing Magazine. While in the past this was
|
|
probably more fluffy than Cellular Business (which isn't as bad as
|
|
your reader says), it now has three excellent columnists: Andy
|
|
Seybold, Lawrence Harte, who wrote a book on digital cellular, and
|
|
myself. (Well, two excellent columnists and one mediocre ...
|
|
myself.) It is trying to take a more technical focus.
|
|
|
|
Your article on cellular fell down on the concept of
|
|
validation. First of all, ESNs and MlNs cannot be fully validated
|
|
independently, they are only valid as a pair. Secondly, the HLR is
|
|
part of the home system, and is only one of three components that
|
|
are used in validation. The MSC (MTSO) has contact with the
|
|
subscriber. The VLR contains a database of roamers (conceptually,
|
|
it is usually physically part of the MSC). The HLR is remote (for
|
|
roamers) and contains the 'master record' for each subscriber. The
|
|
term HLR has been around a lot longer than Coral Systems and is I
|
|
believe a CCIT term (now renamed ITU-T, International
|
|
Telecommunications Union).
|
|
|
|
The databases developed by GTE and EDS are not as important as
|
|
they used to be. Switches and HLRs that comply to the IS-41
|
|
standard can avoid them completely. The GTE and EDS systems did
|
|
contain lists of individual MlNs and, more importantly, ESNs that
|
|
were bad. However. any validation of part of the MIN/ESN pair is
|
|
less good than going whole hog. The reason why GTE and EDS
|
|
developed those databases is that it took so long for the cellular
|
|
industry to develop the standards and networks to allow full real-
|
|
time validation; i.e. TIA Interim Standard IS-41 running over
|
|
mostly SS7 networks.
|
|
|
|
David Crowe 71574.3157@compuserve.com
|
|
|
|
25 "David Crowe writes Cellular Networking Perspectives. Many of
|
|
the terms he discusses above are explained and diagrammatically
|
|
represented in a special issue of that newsletter called "IS-41
|
|
Explained ". You can write for a free copy of it by sending a
|
|
request to Cellular Networking Perspectives, 2636 Toronto Crescent
|
|
NW, Calgary, AB T2N 3WI."
|
|
|
|
26. Dear private line,
|
|
|
|
Please accept this sample copy. As you can see, we have
|
|
advertising only. Buyers and sellers of telecom equipment. The
|
|
"Yellow Paper" of broker/dealers. I'm not sure I under
|
|
stand your publication but please send it to me and I'll send you
|
|
a 3d class subscription (2 years.) Thanks.
|
|
|
|
Judy B. Smith Telephone International, Inc.
|
|
|
|
27. Thanks for the sub. I don't understand this publication
|
|
myself. It's not a hacker zine or a corporate telecom magazine.
|
|
Even my subscribers don't quite understand it, as evidenced by the
|
|
following.
|
|
|
|
28. TO: Mr. TOM FARLEY
|
|
FROM: CHRIS THORNTON
|
|
|
|
I AM GLAD TO HEAR FROM YOU AND I DID RECEIVE THE lST. ISSUE. THE
|
|
INFORMATION LOOKED VERY MUCH LIKE THE CELLULAR PHONE TECHNICAL
|
|
INFO IN THE MOTOROLA CELLULAR PHONE TECHNICIAN GUIDE, WHICH IS THE
|
|
SAME INFO THAT IT SEEMS EVERY ONE IS AFTER IN THE CELLULAR UNDER
|
|
WORLD. BUT I AM NEW AT HACKING, PHONE PHREAKING, ACCESSING GOV.
|
|
COMPUTERS AND ETC. HOW DO I PUT TO USE THE INFO YOU PROVIDED IN
|
|
PRIVATE LINE? PLEASE INCLUDE A STEP BY STEP PROCESS. YOU COULD
|
|
USE THE WORD "MAYBE" TO COVER LEGAL ASPECTS IN FRONT OF SENTENCES
|
|
LIKE "MAYBE THIS IS METHOD A PERSON WOULD USE TO ACCESS & USE
|
|
ANOTHER PERSON'S CELLULAR PHONE OR GOVERNMENT COMPUTER MODEM PHONE
|
|
#. AND PRODUCE DETAILED EXACT STEPS TO GAIN ACCESS AND WHERE TO
|
|
GET THE EQUIPMENT MANUALS TO GET ACCESS. IN MY OPINION YOUR
|
|
FINANCIAL PROBLEMS WILL GO AWAY AS DID THE 2600 MAG WHEN THEY
|
|
BASICALLY DID THE ABOVE BUT NOW 2600 HAS BECAME A LAME DUCK
|
|
BECAUSE THEY GOT AWAY FROM WHAT MADE THEM THE KIND OF STEP BY STEP
|
|
GENERAL AND TECHNICAL INFO LISTED ABOVE. I AM INTERESTED IN THE
|
|
GOV. INTELLIGENCE, TREASURY, FEDERAL RESERVE, GOV. BIOCOMPUTER,
|
|
PHONE COMPANIES' MODEM PHONE #'S /PASSWORDS AND ACCESSING LOCAL
|
|
T.V.A., GOV. COMPUTERS THEN NETWORKING TO OTHER GOV. COMPUTERS
|
|
WHY? TO BE CHARGED ONLY A LOCAL CALL ON A PHONE BILL .
|
|
|
|
29. "HMMM. WHERE TO START? SHOULD I? THE INFORMATION contained in
|
|
the cellular article last issue was derived from all of the
|
|
materials I cited. I do all my own research and writing. It may
|
|
look similar to what others have done but it is not the same. The
|
|
AMPS call processing diagram, for example, is quite similar to a
|
|
chart first produced by OKI and later copied by such people as
|
|
Gibson in Cellular Mobile Radiotelephones. The original chart was,
|
|
to me, unreadable and aimless. I thought I did a good job of
|
|
taking that information and making it understandable. Maybe not.
|
|
I have not seen the Motorola manual you refer to. I can tell you
|
|
that I haven't had any luck getting manual retailers to advertise
|
|
or to correspond. Maybe you'll have better luck: Automated Info:
|
|
Technical Manual Experts (619) 931-0259 or (800) 331-6939; Phone
|
|
Guys USA (714)-843-9999 (800) 322-5443; or Technicom (908) 446-
|
|
0317. There's also Ventura Electronics but I don't have any
|
|
current info.
|
|
|
|
I explained in the last issue that I'm not interested in
|
|
writing specific hacking articles. There are too many things I
|
|
want to cover in general first. In addition, some of my articles
|
|
may not have any practical application. I wrote about post pay in
|
|
the first issue, for example, because no one else had written
|
|
about it, not because the article would be practical.
|
|
|
|
I do encourage people, however, to contribute anything they
|
|
have written that is specific or utilitarian. It would help make
|
|
private line a more interesting magazine. To this date, though,
|
|
there have not been any articles submitted to me for publication.
|
|
Writing an article might help you gain some of the practicality you
|
|
so desire. Pick a subject. Research it. Do some field work. Write
|
|
out your notes and then combine them to produce a story. The only
|
|
way that I really learn something is by experimenting and then
|
|
writing."
|
|
|
|
IV. THE INTERNET BRIDGE
|
|
|
|
I'm starting this service and column to help subscribers who
|
|
have technical questions that Damien or I can't answer. I'm limiting
|
|
it to those with no net access, those who can't take advantage of
|
|
the various telecom groups. I'll post your question to
|
|
comp.dcom.telecom.tech; the most technical of the USENET newsgroups.
|
|
Send me a #10 S.A.S.E. with your question. I'll engage in the
|
|
discussion needed to get an answer. Be prepared to wait -- some of
|
|
the best questions go unanswered or languish for weeks before a
|
|
response comes through. I'll then drop the reply, if any, into the
|
|
mail once I get it. Don't be suprised if the answer produces more
|
|
questions on your part. Let's run through an example of how this
|
|
worked recently. I got a letter and a old Specialized Products
|
|
catalog last week from a subscriber in Minnesota. The reader wrote,
|
|
in part, the following:
|
|
"I have a question. Note on page 167, in the second paragraph
|
|
from the top, the text states, 'Additionally, a momentary send
|
|
2713Hz button is provided to actuate Bell Model 829 Loopback
|
|
devices. The AM-44 fully complies with Bell System Technical
|
|
Reference (BSTR) 41009.' What is a Bell 829 Loopback device? What
|
|
does it do? How does a person access it? Can it generate ringbacks?
|
|
Or test dial speeds? Or provide loopback circuits for testing
|
|
circuit quality? Does the mentioned Technical Reference provide
|
|
insight?"
|
|
Hmmm. Another mystery. Just what I needed. I posted the basic
|
|
question to the group. Two days later I got this private reply from
|
|
Ken Wells in the Marshall Islands:
|
|
"The last time I saw an 829 was seven years ago. I am not sure
|
|
how many are installed these days. But I am sure there are still
|
|
thousands out there. The 829 was used to terminate a 4-wire analog
|
|
circuit at the customer premise. Essentially, it was a demarcation
|
|
point. The 829 could be looped from the central office with the
|
|
2713 tone. It could also be looped from either end of the circuit.
|
|
I can remember looping circuits in Huntsville, Alabama (Marshall
|
|
Space Flight Center) to all parts of the country. We inject a tone
|
|
and loop the distant end and send and receive tones for testing.
|
|
Before the Bell System breakup, the 'telephone company' would
|
|
install their modems (2096A for example) on the 'customer' side of
|
|
the 829. Most 829s I worked with were Western Electric. Some later
|
|
models were made by Telco Systems (called 829AF). Now, the local
|
|
phone company takes the circuit from the long haul carrier and
|
|
terminates it. The customer no longer has to buy or lease the
|
|
analog modem from Telco.
|
|
There were several versions of 829. Some were fixed level.
|
|
Others had adjustable levels (attenuation from WECO). Telco
|
|
Systems units required power and provided gain also. One version
|
|
had front panel jacks and another did not. I think we used 829B
|
|
mostly. I guess the short answer is that an 829 terminates a 4-
|
|
wire analog circuit. I think I have a Bell System Practice on the
|
|
829. If you are interested or just curious, I will be happy to fax
|
|
it to you. Just e-mail your fax number. No problem whatsoever."
|
|
As it turned out, Ken didn't have the BSP on hand but he
|
|
graciously sent the same information from an AT&T manual. The
|
|
BSPs, by the way, were Bell System standards, uniform practices
|
|
and procedures used by the Baby Bells. Bellcore still publishes
|
|
these in an updated form for many phone companies to follow.
|
|
Adding to our discussion was a public reply from Wayne Huffman:
|
|
"The 829 is used to test the levels on a voice-grade analog
|
|
private line -- there used to be tons of these. You accessed the
|
|
circuit (in the AT&T C.O., we used a SMAS panel -- I think that
|
|
stands for Switched Measurement Access System). You'd split the
|
|
circuit, and then send the 2713Hz tone. The 829 loopback unit,
|
|
installed where the line terminated at the customer premise, would
|
|
do exactly that -- loop the tx and rx pair together, to give you
|
|
continuity for testing. A 1004Hz tone was sent out the tx side,
|
|
and measured on the rx side, and compared against the circuit
|
|
layout card, which had the spec for that circuit. If all tested
|
|
well, we'd give it to the LEC to dispatch for a customer premise
|
|
trouble. Sending the 2713Hz again dropped the loopback. If you
|
|
were at the customer premises, you could hear the relay click, and
|
|
there was a 'LPBK' light to show the line was looped. Sometimes,
|
|
that was the only trouble -- someone left it looped. These units
|
|
are small slide-in cards, often mounted in a single 'Teletrend'
|
|
housing with a brick AC adapter. Most of this stuff is digital
|
|
now, I think."
|
|
I think these responses answer the questions put, don't you?
|
|
At least enough to go further? I had been putting off learning
|
|
about four wire signaling but I guess I'll have to read up on it
|
|
now. Would you like to see more of this kind of article? As a
|
|
footnote, I sent both men copies of private line for their
|
|
trouble. In addition, it turns out that Ken has written a ten page
|
|
report on the 900 industry -- a how to guide. Non-corporate
|
|
material on this subject is hard to find. "The Straight Scoop on
|
|
the Pay-Per-Call Industry," is available for $10.00 from Kenneth
|
|
R. Wells, 1142 Auahi Street, Suite 2014, Honolulu, Hawaii. 96814
|
|
(Checks, money orders, VISA, MC) Or order from 1-800-482-FACT.
|
|
|
|
V. CELLULAR PHONE BASICS, PART II
|
|
|
|
We looked at AMPS and analog call processing last issue. Now
|
|
let's go digital. TDMA or time division multiple access is the
|
|
most commonly used digital cellular system in America. Call set up
|
|
is the same as for AMPS. A conversation gets passed to TDMA once
|
|
the call gets going. TDMA systems and most TDMA phones can handle
|
|
AMPS calls as well. TDMA's chief benefit comes from increasing
|
|
call capacity -- a channel can carry three conversations instead
|
|
of just one. But, you say, so can NAMPS, Motorola's analog system
|
|
that we looked at last issue. What's the big deal?
|
|
|
|
NAMPS can carry the same number of calls as most TDMA
|
|
systems. NAMPS though, has the same fading problems as normal
|
|
AMPS, it lacks the error correction that digital systems provide
|
|
and it isn't sophisticated enough to handle encryption or advanced
|
|
services. Things such as calling number identification, extension
|
|
phone service and messaging. In addition, you can't monitor a TDMA
|
|
conversation as easily as an analog call. So, there are other
|
|
reasons than call capacity to move to a different system. Many
|
|
people ascribe these benefits to TDMA because it is a digital
|
|
system. Yes and no.
|
|
Advanced features depend on digital but conserving bandwidth
|
|
does not. How's that? Three conversations get handled on a single
|
|
frequency. Call capacity increases. But is that a virtue of
|
|
digital? No, it is a virtue of multiplexing. A digital signal does
|
|
not automatically mean less bandwidth, in fact, it may mean more.
|
|
[1] Multiplexing means transmitting two or more conversations on
|
|
the same frequency at once. In this case, small parts of three
|
|
conversations get sent simultaneously. This is not the same as
|
|
NAMPS, which splits the frequency band into three discrete sub-
|
|
frequencies of 10khz apiece. TDMA uses the whole frequency to
|
|
transmit while NAMPS does not. NAMPS does not involve
|
|
multiplexing. And besides, TDMA is a hybrid system, combining both
|
|
analog and digital components. It must be since it uses the AMPS
|
|
protocol to set up calls. Despite what the marketing boys say,
|
|
only CDMA or code division multiple access is a fully digital
|
|
system. More on CDMA later. Let's look at some TDMA basics first.
|
|
We see that going digital doesn't mean anything special. A
|
|
multiplexed digital signal is what is key. Each frequency gets
|
|
divided into six repeating time slots or frames. Two slots in each
|
|
frame get assigned for each call. An empty slot serves as a guard
|
|
space. This may sound esoteric but it is not. Time division
|
|
multiplexing is a proven technology. It's the basis for T1, still
|
|
the backbone of digital transmission in this country. Using this
|
|
method, a T1 line can carry 24 separate phone lines into your
|
|
house or business with just an extra twisted pair. Demultiplexing
|
|
those conversations is no more difficult than adding the right
|
|
board to a PC. TDMA is a little different than TDM but it does
|
|
have a long history in satellite working.
|
|
What is important to understand is that the system
|
|
synchronizes each mobile with a master clock when a phone
|
|
initiates or receives a call. It assigns a specific time slot for
|
|
that call to use during the conversation. Think of a circus
|
|
carousel and three groups of kids waiting for a ride. The horses
|
|
represent a time slot. Let's say there are eight horses on the
|
|
carousel. Each group of kids gets told to jump on a different
|
|
colored horse when it comes around. One group rides a red horse,
|
|
one rides a white one and the other one rides a black horse. They
|
|
ride the carousel until they get off at a designated point. Now,
|
|
if our kids were orderly, you'd see three lines of children
|
|
descending on the carousel with one line of kids moving away. In
|
|
the case of TDMA, one revolution of the ride might represent one
|
|
frame. This precisely synchronized system keeps everyone's call in
|
|
order. This synchronization continues throughout the call. Timing
|
|
information is in every frame. Any digital scheme, though, is no
|
|
circus. The actual complexity of these systems is daunting. I
|
|
invite you to read further if you are interested. [2]
|
|
There are variations of TDMA. The only one that I am aware
|
|
of in America is E-TDMA. It's operated in Mobile, Alabama by Bell
|
|
South. Hughes Network Systems developed E-TDMA or Enhanced TDMA.
|
|
It runs on their equipment. Hughes developed much of their
|
|
expertise in this area with satellites. E-TDMA seems to be a
|
|
dynamic system. Slots get assigned a frame position as needed.
|
|
Let's say that you are listening to your wife or a girlfriend.
|
|
She's doing all the talking because you've forgotten her birthday.
|
|
Again. Your transmit path is open but it's not doing much. As I
|
|
understand it, "digital speech interpolation" or DSI stuffs the
|
|
frame that your call would normally use with other bits from other
|
|
calls. In other words, it fills in the quiet spaces in your call
|
|
with other information. DSI kicks in when your signal level drops
|
|
to a pre-determined level. Call capacity gets increased over
|
|
normal TDMA. This trick had been limited before to very high
|
|
density telephone trunks passing traffic between toll offices.
|
|
Their system also uses half rate vocoders, advanced speech
|
|
compression equipment that can double the amount of calls carried.
|
|
Code Division Multiple Access has many variants as well.
|
|
InterDigital, for example, produces a broadband CDMA system called
|
|
B-CDMA that is different from Qualcomm's narrowband CDMA system.
|
|
For this article, however, I'll just mention a few things. I
|
|
give references at the end of the article for those going further.
|
|
[3]
|
|
A CDMA system assigns a specific digital code to each user or
|
|
mobile on the system. It then encodes each bit of information
|
|
transmitted from each user. These codes are so specific that
|
|
dozens of users can transmit simultaneously on the same frequency
|
|
without interference to each other. They are so specific that
|
|
there is no need for adjacent cell sites to use different
|
|
frequencies as in AMPS and TDMA. Every cell site can transmit on
|
|
every frequency available to the wireline or non-wireline carrier.
|
|
CDMA, is also much less prone to interference than AMPS or TDMA.
|
|
That's because the specificity of the coded signals helps a CDMA
|
|
system treat other radio signals and interference as irrelevant
|
|
noise. Some of the details of CDMA are also interesting.
|
|
Qualcomm's CDMA system uses some very advanced speech
|
|
compression techniques, in particular, a variable rate vocoder.
|
|
Phil Karn, one of the principal engineers has written that it
|
|
"[O]perates at data rates of 1200, 2400, 4800 and 9600 bps. When a
|
|
user talks, the 9600 bps data rate is generally used. When the
|
|
user stops talking, the vocoder generally idles at 1200 bps so you
|
|
still hear background noise; the phone doesn't just 'go dead'. The
|
|
vocoder works with 20 millisecond frames, so each frame can be 3,
|
|
6, 12 or 24 bytes long, including overhead. The rate can be
|
|
changed arbitrarily from frame to frame under control of the
|
|
vocoder." This is really sophisticated technology. Expect CDMA to
|
|
get going this year in more markets.
|
|
As I understand it, the Los Angeles area has one carrier
|
|
providing CDMA right at the moment. In the Seattle area, NewVector
|
|
was to have a Qualcomm type CDMA system operating by now but that
|
|
date keeps getting pushed back. Bell Atlantic Mobile and NYNEX
|
|
Mobile recently announced that they will deploy CDMA throughout
|
|
their coverage areas but they gave no dates. My feeling is that
|
|
the future is with this technology.
|
|
|
|
Toll Fraud --
|
|
|
|
I promised a look at some current information on cell fraud
|
|
in the last issue. The information I found, though. doesn't make
|
|
much sense. The ranges of dollar amounts given by industry can
|
|
only be labeled as guesses. Before beginning, let's look at
|
|
telecom in general to give us some perspective. Last yet the FCC
|
|
held a hearing on telecommunication fraud. The report stated that
|
|
industry and Secret Service officials estimate that toll fraud
|
|
runs between I billion and 5 billion dollars a year 141 That's
|
|
against an annual billing of 175 billion in 1993. Let's take the
|
|
high figure and say that toll fraud takes 3.5% of industry
|
|
revenue. Figures on cell fraud vary widely as well. The Seattle
|
|
Post Intelligencer reported late last year that law enforcement
|
|
and industry officials claimed that cell fraud costs between 400
|
|
million and one billion dollars per year. The head of CTlA's
|
|
(Cellular Tele communications Industry Association) fraud task
|
|
force, however, told Newsday on November 30, 1994 that cell fraud
|
|
cost his industry a million dollars a day. I've seen that one
|
|
million dollar figure many times, in articles such as the San
|
|
Francisco Chronicle on November 1, 1994 and the Sacramento
|
|
Business Journal on October 31, 1994. We must assume that they
|
|
were reporting previous year's figures for reasons I explain
|
|
later. I've chosen to stay with this CTIA estimate because they
|
|
are the leading trade organization. Based on 9 billion dollars in
|
|
cellular billing in 1993, we come out with a figure of 4% in fraud
|
|
for the same year. I suspect these figures for several reasons.
|
|
The main problem with industry estimates and CTIA figures is that
|
|
they don't break down the figures. There is no way, therefore, to
|
|
distinguish between subscription fraud, stolen phone fraud or
|
|
access fraud. Everything gets lumped into the big category of
|
|
fraud. Everyone who ever stiffed a carrier to run up a bill or
|
|
stole a phone to call Indonesia is practicing cellular fraud. Yet
|
|
the CTIA makes believe that cell phone cloning is the number one
|
|
problem. I suspect that the real problem Is bad debt. There are
|
|
currently 25 million phones in America with over 27,000
|
|
subscribers signing up every day. A cellular dealer gets a
|
|
percentage from each person they sign up. I know they run credit
|
|
checks but I'd like to see some real accounting on the number of
|
|
bad accounts.
|
|
|
|
The CTIA, though, tightly controls the flow of most
|
|
information about the cellular industry. Even Standard and Poor's
|
|
Industry Surveys, a widely respected publication, is forced to use
|
|
CTIA figures to develop their reports on the cellular trade. 151
|
|
Let me run through an example of how hard it is to get any
|
|
information from them and how worthless it is once you get it.
|
|
New York carriers now require their customers to use PIN numbers
|
|
before making a call, In explaining reasons why, the CTIA came up
|
|
with some specific numbers for the first time. They told the Wall
|
|
Street Journal on February 3d that cellular operators lost $482
|
|
million to fraud in 1994, a 32% increase over the previous year.
|
|
|
|
This lost revenue supposedly amounted to 3.7% of the
|
|
industry's $13 billion revenues in 1994. This figure was sharply
|
|
higher than the million dollar a day mantra they chanted in 1994.
|
|
What gives? Was it $482 million that they claim now or $365
|
|
million like they claimed last year? Part of the problem is that
|
|
they report these figures on a fiscal basis. June instead of
|
|
January. So things get hard to follow. But I hadn't seen anything
|
|
this high when I last checked in with them on January 22, 1995.
|
|
A 32 percent increase in fraud during 1994 would mean that a loss
|
|
of 365 million dollars occurred in the previous fiscal year of
|
|
1993. The cellular industry was a 9 billion dollar industry during
|
|
that time. I have in my possession, however, a CTIA document from
|
|
1993 that contradicts this. A report on fraud dated November 18,
|
|
1993 states that "There is no official reporting system, but
|
|
private estimates by carriers and others range from $100 million
|
|
to $300 million dollars a year." Well, well. What is it this
|
|
time? $365 million? $300 million? $100 million? There's a
|
|
discrepancy of at least 65 million dollars in fiscal year 1993
|
|
according to their own figures.
|
|
|
|
Leaving aside the fact that CTIA knows how to count profits
|
|
but not losses, let me tell you how to get this four page report.
|
|
It's called "Fast Facts: Cellular Telephone Fraud". Dial CTlA's
|
|
free fax on demand service at (202) 758-0721. Press the pound sign
|
|
when you hear the automated operator and then enter 3116 when it
|
|
asks you for a document. Don't hit the wrong key -- you'll wind up
|
|
in their voice mail system:) And believe it or not, this is still
|
|
the document that they deliver to the public by fax to report on
|
|
fraud. How concerned can they be when they don't even update
|
|
their figures? When they don't get them right In the first place?
|
|
And are their new figures any more accurate than what they had
|
|
before? Or does that $482 million dollar figure also have a range?
|
|
And can we assume that there is now an official reporting system?
|
|
And how much of that loss is from dead beats? Or stolen phones?
|
|
The CTIA may well have knocked down the percentage of fraud from
|
|
4% to 3.7%. It may even be below the industry rate for fraud right
|
|
now. But their fraud squad is growing and you won't see them go
|
|
away.
|
|
|
|
They've not only helped the Secret Service rewrite 18 U.S.C. as I
|
|
described on page 81, but they are now buying the S.S. the latest
|
|
cellular equipment to keep them up to date. I resent this shadow
|
|
police force becoming a part of our lives, especially when they
|
|
can't provide the information necessary to support their paranoia.
|
|
|
|
I mentioned that the New York area is moving to PINs. What's
|
|
interesting is that NYNEX uses hookflash to deliver the PIN and
|
|
not an easily poachable DTMF tone or data burst. I'm not sure how
|
|
it gets sent. One hookflash is normally 400 ms. of signaling tone
|
|
sent over the reverse voice channel. A four digit pin would need
|
|
multiple bursts of carefully spaced ST to accomplish the task.
|
|
40% of NYNEX customers have adopted PINs as of April 17. Cellular
|
|
One, though, is floating the idea of requiring customers to use
|
|
digital phones at the end of the year, to help combat fraud. Good
|
|
luck.
|
|
Two competing firms are currently working on radio
|
|
fingerprinting technology to block fraudulent calls. Corsair
|
|
Communications of Sunnyvale is a spin-off of TRW Wireless
|
|
Communications. TRW holds a minority interest in the company.
|
|
Corsair's product is called "PhonePrint" and it is currently
|
|
moving through the patent process so we can't take a look at the
|
|
specifics just yet. Nor will TRW comment. The PTO does not release
|
|
patent information while an invention is being considered (Just to
|
|
let you know, you can get copies of the entire patent file for
|
|
$125 from the PTO once a patent gets approved. This includes
|
|
material submitted by the applicant for the examiner to consider.
|
|
That might be dozens of documents concerning the patent that
|
|
interests you.) I did get one TRW employee to tell me, however,
|
|
that their technology fingerprints each phone off the air when it
|
|
registers. There is no need to bring the phone to a dealer to have
|
|
its profile logged. New phones and existing phones get profiled
|
|
together. Their system stores an analog signal profile of the
|
|
transmissions from a particular phone from any location once it is
|
|
first sent. Cloned phones get denied service when their profile
|
|
doesn't match the signature assigned to the original phone.
|
|
|
|
Cellular Technical Services or CTS is a Seattle software
|
|
company. They write programs for McCaw Cellular and others. Its
|
|
finger printing product is called Blackbird, which they claim has
|
|
been in development for three years. Los Angeles Telephone has
|
|
already installed the system at 50 cell sites. They claim that
|
|
field 90% of cloned phones were blocked during trials. Plans are
|
|
to install the equipment in Miami and New York as well. The
|
|
wireline carrier will probably use one fingerprinting program and
|
|
the non wireline carrier will use the other. Look for these
|
|
programs in only high fraud areas -- NYNEX claims they spend $15
|
|
million a year on anti-fraud technology -- a lot of fraud must
|
|
take place to justify this cost. There are also simple ways to cut
|
|
down on cloning. Motorola's "Clone Clear" is a program that works
|
|
with Motorola switches. It simply denies service to any phone with
|
|
the same ESN/MIN that tries to register while another phone with
|
|
that combination is in use. It doesn't determine which phone is
|
|
valid -- it just keeps one off the air. The carrier gets notified
|
|
of a clone once the legitimate caller complains.
|
|
|
|
Let me leave you with a funny story. Air Touch says that
|
|
over 400 people have been arrested in the Los Angeles area for
|
|
cloned phone fraud. Industry sources claim that 60% to 70% of cell
|
|
phone traffic on a Friday night in Oakland is pirated. Despite the
|
|
notoriety over cloning, it's obvious that the message isn't
|
|
getting out about its legality. A recent post to a USENET group by
|
|
a telecom employee asked if cloning was legal in California. I
|
|
quickly responded by citing case law, regulatory law and statutory
|
|
law to support my view that cloning was definitely NOT LEGAL!
|
|
To assure him that I wasn't some sort of CTIA goon, I wrote back
|
|
later. I said that I didn't have a problem with cloning when a
|
|
husband and wife, for example, shared two different phones with
|
|
the same ESN/MIN. They save a flat monthly by doing that, but it
|
|
is, of course, illegal. Much to my suprise, this employee of a
|
|
major firm wrote back that:
|
|
|
|
"My situation is that I support law enforcement
|
|
communications systems and have been asked by a
|
|
local police chief if I would like for his
|
|
son to clone my phone for me. The PD has
|
|
numerous cloned phones in use. We're asking
|
|
the DA for a legal opinion, based on your information."
|
|
|
|
Thanks again. (name of individual and firm withheld)
|
|
|
|
[1] "The most noticeable disadvantage that is directly associated
|
|
with digital systems is the additional bandwidth necessary to
|
|
carry the digital signal as opposed to its analog counterpart. A
|
|
standard T1 transmission link carrying a DS-1 signal transmits 24
|
|
voice channels of about 4kHz each. The digital transmission rate
|
|
on the link is 1.544 Mbps, and the bandwidth required is about 772
|
|
kHz. Since only 96 kHz would be required to carry 24 analog
|
|
channels (4kHz x 24 channels), about eight times as much bandwidth
|
|
is required to carry the digitally (722kHz / 96 = 8.04). The extra
|
|
bandwidth is effectively traded for the lower signal to noise
|
|
ratio." Fike, John L. and George Friend, Understanding Telephone
|
|
Electronics SAMS, Carmel 1983
|
|
|
|
[2] There's a wealth of general information on TDMA available. You
|
|
won't have any problem looking it up. Aside from magazines, these
|
|
books have snippets of information: Macario, Raymond Cellular
|
|
Radio: Principles and Design McGraw Hill, Inc., New York 1993 161;
|
|
and Myers, Robert A. ed., Encyclopedia of Telecommunications
|
|
Academic Press, Inc. San Diego 1989 321;
|
|
|
|
[3] Karn refers to On the System Design Aspects of Code Division
|
|
Multiple Access (CDMA) Applied to Digital Cellular and Personal
|
|
Communications Networks by Allen Salmasi and Klein S. Gilhousen
|
|
[WT6G], from the Proceedings of the 41st IEEE Vehicular Technology
|
|
Conference, St. Louis MO May 19-22 1991 and the May 1991 IEEE
|
|
Transactions on Vehicular Technology, which has several papers on
|
|
CDMA. (The Transactions are collections of papers published by the
|
|
IEEE on every conceivable piece of electronic technology.)\
|
|
|
|
[4] The paper I'm referring to is contained in a Notice of
|
|
Proposed Rulemaking issued by the FCC in early 1994 based upon an
|
|
En Banc Hearing on Toll Fraud. It is at Compu$erve under the title
|
|
of FRAUD.TXT . It has many interesting comments by industry types
|
|
on PBX fraud, payphone fraud, cell fraud, etc. I don't have an
|
|
exact date on it but the docket number is CC Docket 93-292. It may
|
|
be available from the FCC's duplicating contractor: International
|
|
Transcription Service at (202) 857-3800.
|
|
|
|
[5] Standard and Poors's Industry Surveys come out every week on a
|
|
different trade. Their reports of telecommunications are always
|
|
top notch. Check out the September 22, 1994 (Vol. 162, No. 38,
|
|
Sec 1.) for a good, current analysis of telecom.
|
|
|
|
NB: Write to Communications Test Instruments (CTI) for some
|
|
interesting information on cellular phone tracking and direction
|
|
finding equipment. Rt. 1 South, P.O. Box 712, Kennebunk, Maine
|
|
04043
|
|
|
|
VI. AN INTERVIEW WITH DAMIEN THORN
|
|
|
|
I first met Damien Thorn at Def Con last summer. I was
|
|
impressed that he was writing for Nuts and Volts and that he had
|
|
written for 2600 and Tap. I thought this interview might be a good
|
|
way to introduce him to private line's readers. In the immediate
|
|
future, we may reprint some of his more popular articles for Nuts
|
|
and Volts, but only after they have been expanded, updated and
|
|
revised for private line. They will also have different
|
|
photographs and more of them. This interview was done in Stockton
|
|
in March. It's shorter than I wanted but we were both under
|
|
deadline pressure for other articles and projects. Apologies.
|
|
|
|
What got you interested in hacking?
|
|
|
|
This all goes back to when I was 11 to 13 years old. I
|
|
really wasn't hacking, I was just trying to learn things. Talking
|
|
basically to anyone with the phone company that I could. I grew up
|
|
near Berkeley and my interest was in phones before there were any
|
|
computers to get involved with. The first switches that I saw were
|
|
in Oakland. The office that housed them had an ESS No. 1 and step
|
|
by step equipment. I heard MF tones blaring out of a speaker at a
|
|
test board during one visit to that office. I asked the guy what
|
|
they were. Because I had always heard those when I when I called
|
|
my cousin and I always wondered about them. He said he couldn't
|
|
talk about that and ushered us into the next room.
|
|
I used to go to UC Berkeley and hang out at their computer
|
|
lab and at the Lawrence Hall of Science above the university. I'd
|
|
play with actual teletypes spitting out rolls of yellow teletype
|
|
paper with tape punch readers on the side. There wasn't much
|
|
hacking then, I mean, I looked over people's shoulders, shoulder
|
|
surfing, snag passwords to other accounts, but to this day I
|
|
couldn't even tell you what computer these teletypes were hooked
|
|
up to.
|
|
By the time I was 15 or 16 I was living in the central
|
|
valley. Ronnie Schnell and I had hacked Compuserve and their
|
|
competitor The Source. Several hours into the process of
|
|
downloading all the accounts and passwords that existed on the
|
|
system, including those of the Dialcom computers that ran The
|
|
Source, we kept getting these messages to call a "Fritz" at
|
|
Dialcom immediately. Well, after talking to Fritz, Dialcom offered
|
|
to pay us five bucks an hour to find all their security holes and
|
|
tell them so they could patch them up. Which we did for a long
|
|
time, while installing some back doors of our own. Maybe six
|
|
months into that they thought they had their system pretty secure
|
|
and they sent all their subscribers notices telling them to change
|
|
their passwords. This was unbeknownst to us. In addition, they
|
|
started
|
|
|
|
encrypting their passwords. They changed everything at midnight
|
|
one night and effectively locked us out of the system. The Source
|
|
was a computer service operated by Readers' Digest. They didn't
|
|
own the computers, which were PRIMES, operated by Dialcom in
|
|
Silver Springs, Maryland. Dialcom also did e-mail for the
|
|
government and things like that. Governmental agencies and what
|
|
not. I think that bothered Dialcom a lot more than The Source.
|
|
That's because all their systems were pretty much the same, just
|
|
different applications of software running on them. It wasn't just
|
|
Source user id's we were pulling out but the Environmental
|
|
Protection Agencies' ids, mailboxes and so on.
|
|
|
|
What about TAP magazine?
|
|
|
|
The first issue came out in June, 1971. At that point I think
|
|
it started as YIPL: Youth International Party Line; Abbie Hoffman
|
|
had his hand in there somewhere. I think it was intended more as a
|
|
counterculture, screw the government type of thing. Within a few
|
|
issues it had evolved into being more telco related. Screw the
|
|
telco, here's how it works, here's how you away with something. I
|
|
came in later, say, within 20 issues of its demise.
|
|
The first article I wrote? I'm not sure, there were a couple
|
|
I wrote under several different nom-de-plumes which I'd rather not
|
|
mention. If people want to research it they can go take a look and
|
|
figure it out. But one was on COSMOS; I get to claim the
|
|
distinction of writing the first article on how the COSMOS system
|
|
worked. Essentially, COSMOS is a UNIX application that is used
|
|
basically for data entry and database management for where the
|
|
phone company's wires go. What pair goes with which wire. Things
|
|
like that. At that time that stuff was really cutting edge because
|
|
it was brand new, there were very few hackers, and not a lot of
|
|
phone phreaks. And today I look at things that have been published
|
|
in zines like Phrack. that go on for page after page after page
|
|
about COSMOS and it makes back then look like what it was -- kids
|
|
stuff.
|
|
The end of TAP? The spring of 1984. Some circumstances
|
|
happened with the editor's house apparently burning down, some
|
|
suspicious circumstances. Cheshire Catalyst, the number two person
|
|
in charge tried to revive it. A couple more issues came out and
|
|
then it faded away. He went off into the corporate world and
|
|
became a security consultant.
|
|
|
|
What about blue boxing?
|
|
|
|
I had a friend in the Bay Area who designed and built blue
|
|
boxes and actually got caught. They were able to put an DNR on his
|
|
line. Apparently at the time the way the law was interpreted that
|
|
the telco and law enforcement could also record on audio tape the
|
|
first thirty seconds of your phone calls simply for the purposes
|
|
of identifying who on that number was making the offending calls.
|
|
|
|
Any stupid phone tricks you can relate from yesteryear?
|
|
|
|
The usual. Blue boxing from pay phone to payphone by looping.
|
|
You could also loop with Sprint. There was no easy access, you
|
|
were dialing a seven digit number to access their network. So
|
|
you'd access their network locally, key in your Sprint code and
|
|
then call their POP in Texas. You'd get the Sprint dial tone, key
|
|
in a number back in California or whatever, New York, and start
|
|
looping around until eventualy the signal is so degraded that the
|
|
switch can't decode the touch tones. Or you'll get so much glare
|
|
on the line that the circuit goes into a feedback loop.
|
|
|
|
How is your BBS, Hacking Online, set up?
|
|
|
|
Hacking Online is a small network, running on an Intel
|
|
platform. A 486 DX266 machine with intelligent serial cards. We
|
|
currently support ten lines on that machine. It handles
|
|
communications: works the modems, has a port speed lock of 57.6
|
|
kbps, handles all the basic stuff. Our file libraries exist on two
|
|
SCSI drives which comprise four gigs. There's also two CD ROM
|
|
drives online. The other parts of the network handle our internet
|
|
messaging, e-mail and our USENET feed which comes in by
|
|
satellite. There's a dish on top of the roof which feeds a basic
|
|
PC that gets the data coming from the satellite receiver. It's all
|
|
processed and shot through the network to where the operating
|
|
system (the BBS) can import it. We run Glacticomm's Major BBS
|
|
software.
|
|
|
|
Why a satellite for the USENET feed?
|
|
|
|
USENET feeds can take up 80 megs a day. Transferring 80 megs
|
|
over a dial up phone line with a 14.4 modem would take up about
|
|
twenty hours. That would be an expensive connection, especially
|
|
since there is no local internet provider. Our internet messaging,
|
|
our e-mail, is done through a dial up UUCP, which stands for UNIX
|
|
to UNIX Copy Protocol. Essentially, our PC, for the purposes of
|
|
sending and receiving mail, emulates a UNIX machine, makes a call
|
|
to a Bay Area UNIX machine through an X.25 network so we're not
|
|
paying toll on that. The machines engage in the appropriate
|
|
handshaking, hands off the packets that contain our outgoing mail
|
|
and then receives our incoming mail, the connections terminate at
|
|
each end, the software unbundles and uncompresses the mail and
|
|
distributes it appropriately.
|
|
|
|
|
|
What's slowing down the internet connection?
|
|
|
|
Anyone who wants to get on the internet needs to go through a
|
|
service provider who has a host, connected through a leased line
|
|
or a T1 carrier to the net. Well, "the net" of course is a
|
|
euphemism because there is no net where you just plug in. And then
|
|
they provide the client software such as FTP, telnet, and gopher
|
|
which you use to go places or download files. A lot of areas don't
|
|
have that, including where we are here in Stockton. And you know,
|
|
we're just fifty miles south of Sacramento. So we want to
|
|
establish that service, to become the local internet provider.
|
|
People in Stockton, anyone who wanted to call us here in Stockton,
|
|
or Modesto or wherever we put our own little POPs, could get a
|
|
local internet connection. Once the leased line is in, expanding
|
|
just becomes putting a terminal server in another city with a
|
|
router and connecting a leased line between it and us here. The
|
|
costs are outrageous. There's an initial hardware investment which
|
|
is expected and I can't complain about that. Getting the leased
|
|
line to another provider who will serve as our connection is where
|
|
the expense comes in. California is divided into different LATAs,
|
|
which are geographical and political subdivisions which make no
|
|
sense. If we want to connect to Peter Shipley's service in the Bay
|
|
Area, for example, we have some problems. We may be able to get a
|
|
fractional T1 from Pacific Bell for three or four hundred dollars
|
|
a month up to the LATA point, then we have to pay a long distance
|
|
carrier another couple of hundred bucks to take it across the LATA
|
|
and then pay Pacific Bell again to carry it from the long distance
|
|
carrier's POP to Shipley's facility. Our subscribers, though,
|
|
would benefit from us being accessible from the net. Most of them,
|
|
almost all of them, in fact, are not within our local calling
|
|
area. We have people calling in every day from as far away as
|
|
Venezuela and Scotland, so they would rather call their local
|
|
internet provider and telnet over to us.
|
|
|
|
You're in small claims court with Pacific Bell?
|
|
|
|
We had some problems with installation. I wanted them to
|
|
discount their installation fee for missing their appointment and
|
|
generally screwing up the order. They said they couldn't because
|
|
their fees are regulated by tariff and they have to charge
|
|
everyone the same amount. We then called the state public utility
|
|
commission here in California and they basically said the same
|
|
thing. They told us that the phone company, though, is civilly
|
|
liable for missed appointments like any public utilities under
|
|
Senate Bill 101. They said we should just file a small claims
|
|
suit. So, we called Pacific Bell's corporate office and told them
|
|
what the PUC said. They admitted that was the case and they noted
|
|
in the record that they had missed the appointment. So, because
|
|
they can't discount my bill, I have to force them into court to
|
|
write me a check. It's the principal of the thing. They hide
|
|
behind the tariffs, there's nothing they can do. It pretty much
|
|
shields them from being responsible for their actions. Well,
|
|
|
|
I told them that we would sue them and we did. That's where we are
|
|
right now.
|
|
|
|
Where do you think cellular is going?
|
|
|
|
I don't think we're going to see much change in 1995. The
|
|
cloning problem I think will continue as it does now, which is an
|
|
acceptable loss to the carrier. There's not going to be much done
|
|
about it. I think we'll see some testing
|
|
of fraud prevention systems begin this year but things will
|
|
basically continue as they are.
|
|
|
|
What's up with this video of yours?
|
|
|
|
The intent of the video was to let people actually see the
|
|
technology that I've written about and that others have written
|
|
about. Lot of people have read articles about Motorola programming
|
|
software or how ESNs are snagged out of the air. We try to show
|
|
it. Here's a firmware replacement, this is the chip. Here's the
|
|
ESN in a Radio Shack phone, here's how you type over it. 'Type,
|
|
type type.' We took a lot of technology and demonstrated it.
|
|
Almost all of it was done in different places, none of it was done
|
|
over a kitchen table. We went everywhere from the Berkeley hills
|
|
to just outside the area of our local switch in Stockton. We also
|
|
visited Tech Support Systems in Menlo Park, the manufacturer of a
|
|
cellular surveillance device in a briefcase. We had them demo it.
|
|
Things like that.
|
|
|
|
|
|
-- LOCAL DIAL UP PROBLEMS --
|
|
|
|
|
|
Local internet connections aren't just a problem for
|
|
potential providers such as Hacking Online. Many of my readers
|
|
live beyond a local dialup for internet service. This interesting
|
|
article from Gannet highlights the situation:
|
|
|
|
If he didn't live in Pinehurst, N.C., Sydney Gregory might
|
|
already be on-line. But the retired businessman knows that if he
|
|
joins Prodigy, Compuserve or America Online, he'll have to pay
|
|
expensive long distance charges. Most of the "local" access
|
|
numbers they provide are in larger metro areas, not in small towns
|
|
like Pinehurst, a golfing mecca between Charlotte and
|
|
Fayetteville. "They all spread the word how wonderful these
|
|
programs are, but never mention (phone costs) if you're not in a
|
|
larger community," he says. "They should be more forthcoming."
|
|
Mark Dorosh of Shepherdstown, W.Va., agrees. The musician and
|
|
student, 33, had to quit America Online after racking up a $200
|
|
long-distance bill the first month. Shepherdstown has a state
|
|
college connected to Internet (as a student, Dorosh has access),
|
|
but he covets America Online's extensive library of electronic
|
|
music files. "Here I am, 70 miles from the nation's capital,
|
|
America Online is 73 miles away, and the closest local number is
|
|
300 miles the other way, he says. While Prodigy and Compuserve
|
|
maintain their own local access points, America Online uses phone
|
|
connections provided by SprintNet and Tymnet, says spokeswoman Pam
|
|
McGraw, so adding new numbers is "a net work provider issue."
|
|
Sprint has 500 access points (300 in the USA) and gets many
|
|
letters and petitions asking for more. "This has really become an
|
|
issue with users," says spokeswoman Evette Fulton. "Sprint has to
|
|
prioritize, because demand is coming in big-time." There are "no
|
|
magic numbers," she says, but population density, computer sales
|
|
and higher education are among factors considered in deciding if
|
|
"computer traffic in an area can sustain the cost" of adding new
|
|
points.
|
|
Prodigy's Brian Ek says 80 per cent of its customers have
|
|
local access, through Tymnet sites and its own 442-point network;
|
|
Andy Boyer of Compuserve says it reaches 92 percent, and "100 per
|
|
cent local dial is a very real goal." Compuserve members reach the
|
|
service via 380 access points (340 in the USA). About 120,000 U.S.
|
|
users don't have local access many connect either by an $8-an hour
|
|
phone line or "telneting in" from another computer on the
|
|
Internet.
|
|
|
|
|
|
-- WHAT IS A POP? --
|
|
|
|
|
|
POP stands for point of presence. A POP is a switch. It's
|
|
the place where calls go in a local area or LATA to a long
|
|
distance provider. It's what's accessed when you dial a 10XXX
|
|
code. Let's take an example. Let's say you use Sprint and that
|
|
you want to make a long distance call. Your local exchange
|
|
carrier, the one providing your local phone service, takes the
|
|
call from the central office serving you and routes it to a bigger
|
|
switch, often an access tandem switch like a No. 4ESS. From there,
|
|
your call is routed on trunks to a POP, which is often located
|
|
near a LATA boundary. Your call goes there and gets routed to
|
|
Sprint's long distance network. There can be several POPs in any
|
|
given LATA, depending on geography. You can tell that areas such
|
|
as Cook County or New York city would need several. In Sprint's
|
|
case, it is most probable that they own their own equipment at
|
|
each Point of Presence and that dedicated trunks carry Sprint
|
|
traffic to and from the POP. Is this clear? In other words, a POP
|
|
serves as the point that a long distance carrier connects to the
|
|
local exchange carrier. This connection occurs at a switch. The
|
|
IXC can usually determine the location for its POP.
|
|
|
|
A 10XXX code identifies each long distance carrier. This
|
|
serves to direct the call to the right long distance company
|
|
through the switch at the POP. 102888 for AT&T, 10222 for MCI,
|
|
10333 for Sprint and so on. Smaller companies may lease space on a
|
|
switch if they don't have their own facility. Thus, some LD
|
|
carriers may operate in certain areas but not in others. The
|
|
majority of smaller long distance carriers actually use AT&T's
|
|
network.
|
|
|
|
VII. THE DIGITAL TELEPHONY BILL
|
|
|
|
The article contains the full text of the Digital Telephony
|
|
Bill. It's officially known as the "Communications Assistance for
|
|
Law Enforcement Act." It was originally called "The
|
|
Telecommunications Carrier's Duty Act of 1994" while making its
|
|
way through Congress. Whatever you call it, this bill represents
|
|
the greatest threat to electronic privacy that Americans have ever
|
|
faced. Whether that threat will be carried out is a matter of
|
|
debate and speculation. What is not open to debate is that law
|
|
enforcement has been given the approval, the means and the money
|
|
to listen in on any call at any time from anywhere. The phone
|
|
system will be turned into a giant listening post, with
|
|
capabilities beyond the dreams of any old line communist leader.
|
|
Stalin would be envious.
|
|
|
|
This bill modifies or amends Title 18 of the U.S. Code as well
|
|
as Title 47. Title 18 deals with both federal crimes and federal
|
|
criminal procedure. Criminal law. Think of it as a federal penal
|
|
code. Title 18 comprises 14 volumes in annotated form! That's a
|
|
lot of crime. The bill modifies, for example, section 1029, which
|
|
I covered in the third issue. Title 47 deals with general law
|
|
concerning telegraphs, telephones and radio telegraphs. Civil law.
|
|
The bill creates a new chapter in this title as well amending
|
|
dozens of existing laws. Check out the chart on the opposite page.
|
|
Okay, you say, it's one big bill. Mucho details. What's the bottom
|
|
line?
|
|
|
|
The bottom line is that you and your friends are at risk.
|
|
Aren't there positives? Yes and no. Yes, encryption is not banned.
|
|
But that is not a benefit of the bill. You've had the right to use
|
|
and develop an encryption based phone all along. Some say that
|
|
that the bill requires surveillance to be conducted with the
|
|
"affirmative action of the telecommunications carrier" and that
|
|
this is a good thing. Nonsense. Wiretaps and REMOBS have always
|
|
required such intervention to be legal. The problem now is that
|
|
the such monitoring equipment will be permanently installed into
|
|
nearly every central office switch in America. Big Brother used to
|
|
leave. Well. friends, he's now staying put.
|
|
|
|
The biggest positive is that the system they envision is so complex from a
|
|
legal and
|
|
technical standpoint, that the whole thing may collapse under its
|
|
own weight. We can only hope. Speaking of complexity, the only
|
|
way to put this kind of omnibus legislation into perspective is to
|
|
look at each individual code section affected. And those sections
|
|
are scattered throughout several titles, not just 18 and 47. Teams
|
|
of lawyers drafted this monstrosity. Special interest groups
|
|
fought for various sentences, paragraphs and semi-colons over a
|
|
period of months and countless revisions. It could be argued that
|
|
no one outside of the players involved, could understand the
|
|
entire bill. The average citizen never had a chance. As complex as
|
|
this bill may seem, however, it is really more complicated than it
|
|
appears. That's because statutes don't stand on their own. The
|
|
United States Code constitutes statutory law. A legislative body
|
|
drafts and passes statutes.
|
|
|
|
Regulatory law is made by administrative bodies. Like the FCC or
|
|
the Justice Department. Regulations enable statutes. They make
|
|
the law specific. Statutes tell you what the law is. Regulations tell
|
|
you how the law will be carried out. Not all codes have a corresponding
|
|
regulation but many do. For example, this bill declares that
|
|
$500,000,000 gets paid by the government to the telephone companies.
|
|
This blood money helps with the cost of installing the equipment that the
|
|
bill itself requires. But how do you dispense a half billion
|
|
dollars? Section 109 of this bill requires that the Attorney
|
|
General and the FCC get together to pass the regulations needed to
|
|
carry out the payments. So, this bill is just one part of an even
|
|
bigger body of law. In addition, case law or common law modifies
|
|
both statutory and regulatory law. I featured Section 1029 in the
|
|
last issue. 1029 did not specifically state that cloned cellular
|
|
phones were access devices. $1029, after all, was first drafted
|
|
before cloning became a problem. The court in US v Brady, though,
|
|
strongly suggested that they were. Legislators often incorporate
|
|
or codify statutory law by amending code sections once case law
|
|
comes down. "Oh. we forgot to put in cloned phones? Okay, let's
|
|
change the law and include them. Next problem." It is completely
|
|
predictable that new technology and new court decisions will
|
|
affect the Digital Telephony Bill.
|
|
|
|
So, we have statutory law.
|
|
regulatory law and case law. Each may affect the other.. In
|
|
addition, the law is never administered fairly or evenly in all
|
|
cases at all times. How the law is actually carried out is as
|
|
important as what is written down. The bill makes listening in on
|
|
cord less phones illegal. The penalty, though, is only $500, about
|
|
what they fine you for littering in California. So, there won't be
|
|
much prosecution going forward over that section. Unless you are a
|
|
Mitnick type in which case you will be hounded for it. But if you
|
|
are a member of law enforcement and you just happen to have a
|
|
scanner, well, you know what the response will be.
|
|
|
|
+NOTE: MY COMMENTS ARE FRAMED BY PLUS SIGNS+
|
|
|
|
Diagram of The Digital Telephony Bill .......72
|
|
|
|
Introduction ................................7 3
|
|
|
|
Title 1, Interception of Digital And Other
|
|
Communications..............................74
|
|
|
|
Statute and Regulation Diagram ..............77
|
|
|
|
Title 2, Amendments to Title 18, United States
|
|
Code .......................................7 9
|
|
|
|
18 U.S.C. 1029 (As amended by the Digital
|
|
Telephony Bill) ............................81
|
|
|
|
Title 3, Amendments to the Communications Act
|
|
of 1934 ....................................82
|
|
|
|
TITLE I, INTERCEPTION OF DIGITAL AND OTHER COMMUNICATIONS
|
|
|
|
[Creates a new chapter (Chapter 9) within Title 47 of the United
|
|
States Code. Title 47 deals with "Telegraphs, Telephones & Radio
|
|
Telegraphs." The following section numbers belong to the Digital
|
|
Telephony Bill. The section numbers in Chapter 9 actually start at
|
|
1001. ]
|
|
|
|
SECTION 101. SHORT TITLE
|
|
|
|
This title may be cited as the "Communications Assistance for Law
|
|
Enforcement Act".
|
|
|
|
Section 102. DEFINITIONS
|
|
|
|
For purposes of this title --
|
|
(1) The terms defined in section 2510 of title 18, United
|
|
States Code, have, respectively, the meanings stated in that
|
|
section.
|
|
(2) The term "call-identifying information" means dialing or
|
|
signaling information that identifies the origin, direction,
|
|
destination, or termination of each communication generated or
|
|
received by a subscriber by any means of any equipment, facility,
|
|
or service of a telecommunications carrier.
|
|
(3) The term "Commission" means the Federal Communications
|
|
Commission.
|
|
(4) The term "electronic messaging services" means software-
|
|
based services that enable the sharing of data, images, sound,
|
|
writing, or other information among computing devices controlled
|
|
by the senders or recipients of the messages.
|
|
(5) The term "government" means the government of the United
|
|
States and any agency or instrumentality thereof, the District of
|
|
Columbia, any commonwealth, territory, or possession of the United
|
|
States, and any State or political subdivision thereof authorized
|
|
by law to conduct electronic surveillance.
|
|
(6) The term "information services"--
|
|
(A) means the offering of a capability for generating,
|
|
acquiring, storing, transforming, processing, retrieving,
|
|
utilizing, or making available information via telecommunications;
|
|
and
|
|
(B) includes --
|
|
(i) a service that permits a customer to retrieve
|
|
stored information for storage in, information storage facilities;
|
|
(ii) electronic publishing; and
|
|
(iii) electronic message services; but
|
|
(C) does not include any capability for a
|
|
telecommunications carrier's internal management, control or
|
|
operation of its telecommunications network.
|
|
(7) The term "telecommunications support services" means a
|
|
product, software, or service used by a telecommunications carrier
|
|
for the internal signaling or switching functions of its
|
|
telecommunications network.
|
|
(8) The term "telecommunications carrier"
|
|
(A) means a person or entity engaged in the transmission
|
|
or switching of wire or electronic communications as a common
|
|
carrier for hire; and
|
|
(B) includes--
|
|
(i) a person or entity engaged in providing
|
|
commercial mobile service (as defined in section 332(d) of the
|
|
Communications Act of 1934 (47 U.S.C. 332(d) or
|
|
(ii) a person or entity engaged in providing wire
|
|
or electronic communication switching or transmission service to
|
|
the extent that the Commission finds that such service is a
|
|
replacement for a substantial portion of the local telephone
|
|
exchange service and that it is in the public interest to deem
|
|
such a person or entity to be a telecommunications carrier for
|
|
purposes of this title; but
|
|
(C) does not include--
|
|
(i) persons or entities insofar as they are engaged
|
|
in providing information services; and
|
|
(ii) any class of category of telecommunications
|
|
carriers that the Commission exempts by rule after consultation
|
|
with the Attorney General.
|
|
|
|
+A telecommunications carrier includes local and long distance
|
|
phone companies, as well as cellular and PCS providers. An
|
|
information service provider seems to include any online data
|
|
base, internet provider or a BBS.+
|
|
|
|
SECTION 103. ASSISTANCE CAPABILITY REQUIREMENTS
|
|
|
|
(a) Capability Requirements -- Except as provided in
|
|
subsections (b), (c), and (d) of this section and sections 108(a)
|
|
and 109(b) and (d), a telecommunications carrier shall ensure that
|
|
its equipment, facilities, or services that provide a customer or
|
|
subscriber with the ability to originate, terminate, or direct
|
|
communications are capable of--
|
|
(1) expeditiously isolating and enabling the government
|
|
pursuant to a court order or other lawful authorization to
|
|
intercept, to the exclusion of any other communications, all wire
|
|
and electronic communications carried by the carrier within a
|
|
service area to or from equipment, facilities, or services of a
|
|
subscriber of such carrier concurrently with their transmission to
|
|
or from the subscriber's equipment, facility, or service, or at
|
|
such later time as may be acceptable to the government;
|
|
(2) expeditiously isolating and enabling the government
|
|
pursuant to a court order or other lawful authorization, to access
|
|
call identifying information that is reasonably available to the
|
|
carrier--
|
|
(A) before, during or immediately after the
|
|
transmission of a wire or electronics communication (or at such
|
|
later time as may be acceptable to the Government); and the
|
|
communication to which it pertains, except that, with regard to
|
|
information acquired solely pursuant to the authority for pen
|
|
registers and trap and trace devices (as defined in section 3127
|
|
of title 18, United States Code), such call identifying
|
|
information shall not include any information that may disclose
|
|
the physical location of the subscriber (except to the extent that
|
|
the location may be determined from the telephone number);
|
|
(3) delivering intercepted communications and call-
|
|
identifying information to the government, pursuant to a court
|
|
order or other lawful authorization, in a format such that they
|
|
may be transmitted by means of equipment, facilities or services
|
|
procured by the government to a location other than the premises
|
|
of the carrier; and
|
|
(4) facilitating authorized communications and access to call
|
|
identifying information unobtrusively and with a minimum of
|
|
interference with any subscriber's telecommunications service and
|
|
in a manner that protects --
|
|
(A) The privacy and security of communications and call-
|
|
identifying information not authorized to be intercepted; and
|
|
(B) information regarding the government's interception
|
|
of communications and access to call-identifying information.
|
|
(b) LIMITATIONS.--
|
|
(1) DESIGN OF FEATURES AND SYSTEMS CONFIGURATIONS.-- This
|
|
title not authorize any law enforcement agency or officer --
|
|
(A) to require any specific design of equipment,
|
|
facilities, services, features, or system configurations to be
|
|
adopted by any provider of a wire or electronic communication
|
|
service, any manufacturer or telecommunications equipment, or any
|
|
provider of telecommunications support services; or (B) to
|
|
prohibit the adoption of any equipment, facility, service or
|
|
feature by any provider of a wire or electronic communication
|
|
service, any manufacturer or telecommunications equipment,
|
|
(2) INFORMATION SERVICES; PRIVATE NETWORKS AND INTER-
|
|
CONNECTION SERVICES AND FACILITIES. -- The requirements of
|
|
subsection (a) do not apply to --
|
|
(A) information services; or
|
|
(B) equipment, facilities, or services that support the
|
|
transport or switching of communications for private networks or
|
|
for the sole purpose of interconnecting telecommunications
|
|
carriers.
|
|
(3) ENCRYPTION.-- A telecommunications carrier shall not be
|
|
responsible for decrypting, or ensuring the government's ability
|
|
to decrypt, any communication encrypted by a subscriber or
|
|
customer, unless the encryption was provided by the carrier and
|
|
the carrier possesses the information necessary to decrypt the
|
|
communication.
|
|
(c) EMERGENCY OR EXIGENT CIRCUMSTANCES. -- (including those
|
|
described in sections 2518 (7) or (11)(b) and 3125 of title 18,
|
|
United States Code, and section 1805 (e) of title 50 of such
|
|
Code), a carrier at its discretion may comply with subsection
|
|
(a)(3) by allowing monitoring at its premises if that is the only
|
|
means of accomplishing the interception or access.
|
|
(d) MOBILE SERVICES ASSISTANCE REQUIREMENTS.-- A
|
|
telecommunications carrier that is a provider of commercial mobile
|
|
service (as defined in $332(d) of the Communications Act of 1934)
|
|
offering a feature or service that allows subscribers to redirect,
|
|
hand off, or assign their wire or electronic communications to
|
|
another service area or another service provider or to utilize
|
|
facilities in another service area or of another service provider
|
|
shall ensure that, when the carrier that had been providing
|
|
assistance for the interception of wire or electronic
|
|
communications or access to call identifying information within
|
|
the service area in which interception has been occurring as a
|
|
result of the subscriber's use of such a feature or service,
|
|
information is made available to the government (before, during,
|
|
or immediately after the transfer of such communications)
|
|
identifying the provider of a wire or electronic communication
|
|
service that has acquired access to the communications.
|
|
|
|
+Section 103 is the backbone of the digital telephony bill.
|
|
It spells out what the government requires of the carriers and
|
|
what it does not. Information services seem exempt for now. That
|
|
carves out an exception for devices like the internet phone.
|
|
Expect this code section to be amended as voice over the net
|
|
becomes more common. Note, too, that this code section does
|
|
nothing to guarantee a person's right to use encryption. It just
|
|
states that a carrier won't be held responsible for decrypting
|
|
traffic that it passes. (As if Sprint could decrypt a PGP encoded
|
|
message.)+
|
|
|
|
SECTION 104. NOTICES OF CAPACITY REQUIREMENTS.
|
|
|
|
(a) NOTICES OF MAXIMUM AND ACTUAL CAPACITY REQUIREMENTS.--
|
|
(1) IN GENERAL.-- Not later than 1 year after the date of
|
|
enactment of this title, after consulting with State and local law
|
|
enforcement agencies, telecommunications carriers, providers of
|
|
telecommunications support services, and manufacturers of
|
|
telecommunications equipment, and after notice and comment, the
|
|
Attorney General shall publish in the Federal Register and provide
|
|
to appropriate telecommunications industry associations and
|
|
standards-setting organizations--
|
|
(A) notice of the actual number of communication
|
|
interception, pen register, and trap and trace devices,
|
|
representing a portion of the maximum capacity set forth under
|
|
subparagraph
|
|
(B), that the Attorney General estimates that government
|
|
agencies authorized to conduct electronic surveillance may conduct
|
|
and use simultaneously by the date that is 4 years after the date
|
|
of enactment of this title; and
|
|
(B) notice of the maximum capacity required to
|
|
accommodate all of the communication interceptions, pen registers,
|
|
and trap and trace devices that the Attorney General estimates
|
|
that government agencies authorized to conduct electronic
|
|
surveillance may conduct and use simultaneously after the date
|
|
that is 4 years after the date of enactment of this title.
|
|
(2) BASIS OF NOTICES.-- The notices issued under paragraph
|
|
(1)--
|
|
(A) may be based upon the type of equipment , type of
|
|
service, number of subscribers, type or service or carrier, nature
|
|
of service area, or any other measure; and
|
|
(B) shall identify, to the maximum extent practicable,
|
|
the capacity required at specific geographic locations.
|
|
(b) COMPLIANCE WITH CAPACITY NOTICES.--
|
|
(1) INITIAL CAPACITY.-- Within 3 years after the publication
|
|
by the Attorney General of a notice of capacity requirements or
|
|
within 4 years after the date of enactment of this title,
|
|
whichever is longer, a telecommunications carrier shall,
|
|
subsection (e) ensure that its systems are capable of--
|
|
(A) accommodating simultaneously the number of
|
|
interceptions, pen registers, and trap and trace devices set forth
|
|
in the notice under subsection (a)(1)(A); and
|
|
(B) expanding to the maximum capacity set forth in the
|
|
notice under subsection (a)(1)(B).
|
|
(c) NOTICES OF INCREASED MAXIMUM CAPACITY REQUIREMENTS.--
|
|
(1) NOTICE.-- The Attorney General shall periodically publish
|
|
in the Federal Register, after notice and comment, notice of any
|
|
necessary increases in the maximum capacity requirement set forth
|
|
in the notice under subsection (a)(1)(b).
|
|
(2) COMPLIANCE.-- Within 3 years after notice of increased
|
|
maximum capacity requirements is published under paragraph (1), or
|
|
within such longer time period as the Attorney General may
|
|
specify, a telecommunications carrier shall, subject to subsection
|
|
(e), ensure that its systems are capable of expanding to the
|
|
increased maximum capacity set forth in this notice.
|
|
(d) CARRIER STATEMENT.-- Within 180 days after the publication by
|
|
the Attorney General of a notice of capacity requirements
|
|
pursuant to subsection (a) or (c), a telecommunications carrier
|
|
shall submit to the Attorney General a statement identifying any
|
|
of its systems or services that do not have the capacity to
|
|
simultaneously the number of interceptions, pen registers, and
|
|
trap and trace devices set forth in the notice under such
|
|
subsection.
|
|
(e) REIMBURSEMENT REQUIRED FOR COMPLIANCE.-- The Attorney General
|
|
shall review the statements submitted under subsection (d) and
|
|
may, subject to the availability of appropriations, agree to
|
|
reimburse a telecommunications carrier for costs directly
|
|
associated with modifications to attain such capacity requirement
|
|
that are determined to be reasonable in accordance with section
|
|
109(e), such modification, such carrier shall be considered to be
|
|
in compliance with the capacity notices under subsection (a) or
|
|
(c).
|
|
|
|
Section 104 requires that the government tell the public and
|
|
industry just how much hardware and software it wants. The Justice
|
|
Department, therefore, will have to argue for their bugging
|
|
equipment in public. Perhaps. We may find that a certain amount of
|
|
equipment gets installed without much public discussion. I think
|
|
the only debate will be between the carriers and the government
|
|
over costs and technical matters. The carrier will probably
|
|
install as many devices as the government wants, as long as they
|
|
are compensated for it and so long as the equipment doesn't
|
|
interfere with the telco's operation. The carrier may not want to
|
|
put in the equipment but they really don't have a choice.
|
|
|
|
Section 105 Systems Security and Integrity
|
|
|
|
A telecommunications carrier shall ensure that any
|
|
interception of communications or access to call-identifying
|
|
information effected within its switching premises can be
|
|
activated only in accordance with a court order or other lawful
|
|
authorization and with the affirmative intervention of an
|
|
individual officer or employee of the carrier acting in accordance
|
|
with regulations prescribed by the Commission.
|
|
|
|
+I'm confused by this. I've hear some privacy wonks say that
|
|
this is a great provision. They say it prevents the government
|
|
from snooping at will. Yet the whole idea of this bill is to
|
|
enable remote monitoring at will. Each intercept requires telco
|
|
notification and approval. The telco, in fact, is charged with
|
|
ensuring that all such intercepts meet regs and specs. So, MCI
|
|
tells the FBI to get lost if the feds don't have the right
|
|
paperwork? In reality, it is probably as simple as faxing a
|
|
warrant to the carrier when needed. A more difficult situation
|
|
arises if the telco notices their system being used without
|
|
authorization. What then? In addition, many central offices aren't
|
|
staffed around the clock. There's too many of them. Pacific Bell
|
|
alone has over 800 dial tone producing CO's and remotes. The
|
|
telco, therefore, will need to be able to remotely turn on the
|
|
monitoring equipment. That will create another gateway into the
|
|
system.+
|
|
|
|
Section 106 Cooperation of Equipment Manufacturers and Providers
|
|
of Telecommunications Support Services
|
|
|
|
(a) Consultation.-- A telecommunications carrier shall consult as
|
|
necessary, in a timely fashion with manufacturers or its
|
|
telecommunications transmission and switching equipment and its
|
|
providers of telecommunications support services for the purposes
|
|
of ensuring that current and planned equipment, facilities, and
|
|
services comply with the capability requirements of section 103
|
|
and the capacity requirements identified by the Attorney General
|
|
under section 104.
|
|
(b) Cooperation.-- Subject to sections 104(e), 108(a), and 109(b)
|
|
and (d), a manufacturer of telecommunications transmission or
|
|
switching equipment and a provider of telecommunications support
|
|
services shall, on a reasonably timely basis and at a reasonable
|
|
charge, make available to the telecommunications carriers using
|
|
its equipment, facilities, or services such features or
|
|
modifications are necessary to permit such carriers to comply with
|
|
the capability requirements of section 103 and the capacity
|
|
requirements identified by the Attorney General under section 104.
|
|
|
|
+Gets the manufacturers on board. Big Brother want this bill bad.+
|
|
|
|
Section 107. Technical Requirements and Standards; Extension of
|
|
Compliance Date
|
|
|
|
(a) SAFE HARBOR.--
|
|
(1) CONSULTATION. To ensure the efficient and industry-wide
|
|
implementation of the assistance capability requirements under
|
|
section 103 , the Attorney General, in coordination with other
|
|
Federal, State, and local law enforcement agencies, shall consult
|
|
with appropriate associations and standard-setting organizations
|
|
of the telecommunications industry, with representatives of users
|
|
of telecommunications equipment, facilities, and services, and
|
|
with State utility commissions.
|
|
(2) COMPLIANCE UNDER ACCEPTED STANDARDS. -- A
|
|
telecommunications carrier shall be found to be in compliance with
|
|
the assistance capability requirements under section 103, and a
|
|
manufacturer of telecommunications transmission or switching
|
|
equipment or a provider of telecommunications support services
|
|
shall be found in compliance with section 106, if the carrier,
|
|
manufacturer, or support service provider is in compliance with
|
|
publicly available technical requirements or standards adopted by
|
|
an industry association or standard-setting organization, or by
|
|
the Commission under subsection (b), to meet the requirements of
|
|
section 103.
|
|
(3) ABSENCE OF STANDARDS.-- The absence of technical
|
|
requirements or standards for implementing the assistance
|
|
capability requirements or standards for implementing the
|
|
assistance capability requirements of section 103 shall not--
|
|
(A) preclude a telecommunications carrier, manufacturer,
|
|
or telecommunications support services provider from deploying a
|
|
technology or service; or
|
|
(B) relieve a carrier, manufacturer, or
|
|
telecommunications support services provider of the obligations
|
|
imposed by section 103 or 106, as applicable.
|
|
(b) COMMISSION AUTHORITY. -- If industry associations or standard-
|
|
setting organizations fail to issue technical requirements or
|
|
standards or if a Government agency or any other person believes
|
|
that such requirements or standards are deficient, the agency or
|
|
person may petition the Commission to establish, by rule,
|
|
technical requirements or standards that--
|
|
(1) meet the assistance capability requirements of section
|
|
103 by cost-effective methods;
|
|
(2) protect the privacy and security of communications not
|
|
authorized to be intercepted;
|
|
(3) minimize the cost of such compliance on residential
|
|
ratepayers;
|
|
(4) serve the policy of the United States to encourage the
|
|
provision of new technologies and services to the public; and
|
|
(5) provide a reasonable time and conditions for compliance
|
|
with and the transition to any new standard, including defining
|
|
the obligations of telecommunications carriers under section 103
|
|
during any transition period.
|
|
(c) EXTENSION OF COMPLIANCE DATE FOR EQUIPMENT, FACILITIES, AND
|
|
SERVICES.--
|
|
(1) PETITION.-- A telecommunications carrier proposing to
|
|
install or deploy, or having installed or deployed, any equipment,
|
|
facility or service prior to the effective date of section 103 may
|
|
petition the Commission for 1 or more extensions of the deadline
|
|
for complying with the assistance capability requirements under
|
|
section 103.
|
|
(2) GROUNDS FOR EXTENSION.-- The Commission may, after
|
|
consultation with the Attorney General, grant an extension under
|
|
subsection, if the Commission determines that compliance with the
|
|
assistance capability requirements under section 103 is not
|
|
reasonably achievable through application of technology available
|
|
within the compliance period.
|
|
(3) LENGTH OF EXTENSION.-- An extension under this subsection
|
|
shall extend for no longer than the earlier of--
|
|
(A) the date determined by the Commission as necessary
|
|
for the carrier to comply with the assistance capability
|
|
requirements under section 103; or
|
|
(B) the date that is 2 years after the date on which the
|
|
extension is granted.
|
|
|
|
(4) APPLICABILITY OF EXTENSION.-- An extension under this
|
|
subsection shall apply to only that part of the carrier's business
|
|
on which the new equipment, facility, or service is used.
|
|
|
|
+An industry wide effort is called for to make sure that the
|
|
entire public switched telephone network gets wired according to
|
|
government specifications. Calls for the telecom industry to set
|
|
standards for developing the needed equipment. The FCC gets
|
|
charged with setting standards if industry doesn't. The government
|
|
needs the latest technology for all this to work. Most of us big
|
|
city folks are living under System 7 and CLASS: Custom Local Area
|
|
Signaling Service. Specific circuit boards enable caller ID as
|
|
well as many advanced services when installed in digital switches
|
|
like a 5ESS or DMS 100. It's my guess that the spooks want a board
|
|
designed for existing switches that give them the capabilities
|
|
they want. Along with the software to control it. The other
|
|
possibility is a black box approach. You dedicate and design a PC
|
|
to work along with the switch for a specific purpose. In any case,
|
|
such equipment may not be too difficult to design since the telco
|
|
can already do what the Feds want now. The telco, of course,
|
|
wants to make sure that any such equipment works with the least
|
|
interference to its switch or its network. Such a device will have
|
|
a lot of people involved with its design and sales. No doubt there
|
|
will be product literature to read and patents to look up. . .+
|
|
|
|
SECTION 108 ENFORCEMENT ORDERS
|
|
|
|
(a) GROUNDS FOR ISSUANCE.-- A court shall issue an order
|
|
enforcing this title under section 2522 of title 18, United States
|
|
Code, only if the court finds that--
|
|
(1) alternative technologies or capabilities or the
|
|
facilities of another carrier are not reasonably available to law
|
|
enforcement for implementing the interception of communications or
|
|
access to call-identifying information; and
|
|
(2) compliance with the requirements of this title is
|
|
reasonably available achievable through the application of
|
|
available technology to the equipment, facility or service at
|
|
issue or would have been reasonably achievable if timely action
|
|
had been taken.
|
|
(b) TIME FOR COMPLIANCE.-- Upon issuing an order enforcing this
|
|
title, the court shall specify a reasonable time and conditions
|
|
for complying with its order, considering the good faith efforts
|
|
to comply in a timely manner, any effect on the carrier's,
|
|
manufacturer's or service provider's ability to continue to do
|
|
business, the degree of culpability or delay in undertaking
|
|
efforts to comply, and such other matters as justice may require.
|
|
(c) LIMITATIONS.--An order enforcing this title may not --
|
|
(1) require a telecommunications carrier to meet the
|
|
Government's demand for interception of communications and
|
|
acquisition of call-identifying information to any extent in
|
|
excess of the capacity for which the Attorney General has agreed
|
|
to reimburse such carrier.
|
|
(2) require any telecommunications carrier to comply with the
|
|
capability assistance requirement of section 103 if the Commission
|
|
has determined (pursuant to section 109(b)(1) that compliance is
|
|
not reasonably achievable, unless the Attorney General has agreed
|
|
(pursuant to section 109(b)(2) to pay the costs described in
|
|
section 109(b)(2)(A); or
|
|
(3) require a telecommunications carrier to comply with
|
|
assistance capability requirement of section 103, any equipment,
|
|
facility, or service deployed on or before January 1, 1995, unless
|
|
--
|
|
(A) the Attorney General has agreed to pay the
|
|
telecommunications carrier for all reasonable costs directly
|
|
associated with modifications necessary to bring the equipment,
|
|
facility, or service into compliance with those requirements; or
|
|
(B) the equipment, facility, or service has been
|
|
replaced or significantly upgraded or otherwise undergoes major
|
|
modification.
|
|
No bill is much good unless there's a penalty. Well, here it is.
|
|
Get your act together Mr. Telco or the Feds will drag you into
|
|
court. There is some leeway for a telco with older switches that
|
|
can't be economically retrofitted.
|
|
|
|
SECTION 109 PAYMENT OF COSTS OF TELECOMMUNICATIONS CARRIERS TO
|
|
COMPLY WITH CAPABILITY REQUIREMENTS
|
|
|
|
(a) EQUIPMENT, FACILITIES, AND SERVICES DEPLOYED ON OR BEFORE
|
|
JANUARY 1, 1995. -- The Attorney General may, subject to the
|
|
availability of appropriations, agree to pay telecommunications
|
|
carriers for all reasonable costs directly associated with the
|
|
modifications performed by carriers in connection with equipment,
|
|
facilities, and services installed or deployed on or before
|
|
January 1, 1995, to establish the capabilities necessary to comply
|
|
with section 103.
|
|
(b) EQUIPMENT, FACILITIES, AND SERVICES DEPLOYED AFTER JANUARY 1,
|
|
1995. --
|
|
(1) DETERMINATIONS OF REASONABLE ACHIEVABLE. --
|
|
The Commission, on petition from a telecommunications carrier or
|
|
any other interested person, and after notice to the Attorney
|
|
General, shall determine whether compliance with the assistance
|
|
capability requirements of section 103 is reasonably achievable
|
|
with respect to any equipment, facility, or service installed or
|
|
deployed after January 1, 1995. The Commission shall make such
|
|
determination within one year after the date such petition is
|
|
filed. In making such determination, the Commission shall
|
|
determine whether compliance would impose significant difficulty
|
|
or expense on the carrier or on the users of the carrier's systems
|
|
and shall consider the following factor:
|
|
(A) The effect on public safety and national security.
|
|
(B) The effect on rates for basic residential telephone
|
|
service.
|
|
(C) The need to protect the privacy and security of
|
|
communications not authorized to be intercepted.
|
|
(D) The need to achieve the capability assistance
|
|
requirements of section 103 by cost-effective methods.
|
|
(E) The effect on the nature and cost of the equipment,
|
|
facility, or service at issue.
|
|
(F) The effect on the operation of the equipment,
|
|
facility, or service at issue.
|
|
(G) The policy of the United States to encourage the
|
|
provision of new technologies and services to the public.
|
|
(H) The financial resources of the telecommunications
|
|
carrier.
|
|
(I) The effect on competition in the provision of
|
|
telecommunications services.
|
|
(J) The extent to which the design and development of
|
|
the equipment, facility, or service was initiated before January
|
|
1, 1995.
|
|
(K) Such other factors as the Commission determines are
|
|
appropriate.
|
|
(2) COMPENSATION.-- If compliance with the assistance
|
|
capability requirements of Section 103 is not reasonably
|
|
achievable with respect to equipment, facilities, or services
|
|
deployed after January 1, 1995
|
|
(A) the Attorney General, on application of a
|
|
telecommunications carrier, may agree, subject to the availability
|
|
of appropriations, to pay the telecommunications carrier for the
|
|
additional reasonable costs of making compliance with such
|
|
assistance capability requirements reasonably achievable; and
|
|
(B) if the Attorney General does not agree to pay such
|
|
costs, the telecommunications carrier shall be deemed to be in
|
|
compliance with such capability requirements.
|
|
(c) ALLOCATION OF FUNDS FOR PAYMENT.Q The Attorney General shall
|
|
allocate funds appropriated to carry out this title in accordance
|
|
with law enforcement priorities determined by the Attorney
|
|
General.
|
|
(d) FAILURE TO MAKE PAYMENT WITH RESPECT TO EQUIPMENT FACILITIES,
|
|
AND SERVICES DEPLOYED ON OR BEFORE JANUARY 1, 1995.QIf a carrier
|
|
has requested payment in accordance with procedures promulgated
|
|
pursuant to subsection (e), and the Attorney General has not
|
|
agreed to pay the telecommunications carrier for all reasonable
|
|
costs directly associated with modifications necessary to bring
|
|
any equipment, facility, or service deployed on or before January
|
|
1, 1995, into compliance with the assistance capability
|
|
requirements of section 103, such equipment, facility, or service
|
|
shall be considered to be in compliance with the assistance
|
|
capability requirements of section 103 until the equipment,
|
|
facility, or service or replaced or significantly upgraded or
|
|
otherwise undergoes major modification.
|
|
(e) COST CONTROL REGULATIONS.Q
|
|
(1) IN GENERAL The Attorney General shall, after notice and
|
|
comment, establish regulations necessary to effectuate timely and
|
|
cost-efficient payment to telecommunications carriers under this
|
|
title, under chapters 119 and 121 of title 18, United States Code,
|
|
and under the Foreign Intelligence Surveillance Act of 1978 (60
|
|
U.S.C. 1801 et seq.).
|
|
(2) CONTENTS OF REGULATIONSQThe Attorney General, after
|
|
consultation with the Commission, shall prescribe regulations for
|
|
purposes of determining reasonable costs under this title. Such
|
|
regulations shall seek to minimize the cost to the Federal
|
|
Government and shallQ
|
|
(A) permit recovery from the Federal Government of--
|
|
(i) the direct costs of developing the modification
|
|
described in subsection (a), of providing the capability requested
|
|
under subsection (b)(2), or of providing the capacities requested
|
|
under section 104(e) , but only to the extent that such costs have
|
|
not been recovered from any other governmental or non governmental
|
|
entity;
|
|
(ii) the costs of training personnel in the use
|
|
such capabilities or capacities, and
|
|
(iii) the direct costs of deploying or installing
|
|
such capabilities or capacities;
|
|
(B) in the case of any modification that may be useful
|
|
for any purpose other than lawfully authorized electronic
|
|
surveillance by a law enforcement agency of a government permit
|
|
recovery of only the incremental cost of making the modification
|
|
suitable for such law enforcement purposes, and
|
|
(C) maintain the confidentiality of trade secrets.
|
|
(3) SUBMISSION OF CLAIMS.QSuch regulations shall require any
|
|
telecommunications carrier that the Attorney General has agreed to
|
|
pay for modifications pursuant to this section that has installed
|
|
or deployed such modification to submit to the Attorney General a
|
|
claim for payment that contains or is accompanied by such
|
|
information as the Attorney General may require.
|
|
|
|
The government agrees to pay for most of what they want. The
|
|
telcos are in a bad way. They may not like the law but they can't
|
|
ignore it. Most of these companies, after all, are subject to
|
|
federal regulation in some part of their operations. Speaking of
|
|
regulations, this section creates plenty. The Digital Telephony
|
|
Bill might become a bureaucratic nightmare. Didn't the Newtmeister
|
|
want a one year freeze on all new regs? That would panic
|
|
everybody. All the information used to develop the regs and
|
|
reports should be publicly available but let's wait and see.
|
|
|
|
SECTION 110 AUTHORIZATION OF APPROPRIATIONS.
|
|
|
|
There are authorized to be appropriated to carry out this title a
|
|
total of $500,000,000 for fiscal years 1995, 1996, 1997, and 1998.
|
|
Such sums are authorized to remain available until expended.
|
|
|
|
This bill creates a half billion dollar industry.
|
|
Consultants, programmers, switch technicians, telco employees and
|
|
the feds will all be involved. (As well as the hacker community)
|
|
There will probably be newsletters, articles and conventions
|
|
relating to compliance. Such fun. Count on the feds' equipment and
|
|
procedures to be compromised. A system allowing one to intercept a
|
|
specific call, reroute it, and then listen in on the conversation
|
|
itself, may prove an irresistible target to many. It's my
|
|
understanding that REMOBS is set up on a case by case basis. An
|
|
individual wiretap gets set up and taken down as the need arises.
|
|
But we are talking here about a permanently installed system with
|
|
dedicated ports. The FBI may even get bugged themselves by hackers
|
|
or, more probably, other governmental agencies. We'll know more
|
|
when the regs come out and we can guess about the equipment. For
|
|
all we know, the FBI and Bellcore may be conducting field trials
|
|
right now.
|
|
|
|
SECTION 111. EFFECTIVE DATE
|
|
|
|
(a) IN GENERAL.QExcept as provided in subsection (b), this title
|
|
shall take effect on the date of enactment of this Act.
|
|
(b) ASSISTANCE CAPABILITY AND SYSTEM SECURITY AND INTEGRITY
|
|
REQUIREMENTS.QSections 103 and 105 of this title shall effect on
|
|
the date that is 4 years after the date of enactment of this Act.
|
|
|
|
SECTION 112 REPORTS
|
|
|
|
(a) REPORTS BY THE ATTORNEY GENERAL
|
|
(1) IN GENERAL.QOn or before November 30, 1995 and on or
|
|
before November 30 of each year thereafter, the Attorney General
|
|
shall submit to Congress and make available to the public a report
|
|
on the amounts paid during the pre-fiscal year to
|
|
telecommunications carriers under sections 104(e) and 109.
|
|
(2) CONTENTS.QA report under paragraph (1) shall includeQ
|
|
(A) a detailed accounting of the amounts paid to each
|
|
carrier and the equipment, facility, or service for which the
|
|
amounts were paid; and
|
|
(B) projections of the amounts expected to be paid in
|
|
the current fiscal year, the carrier to which payment is expected
|
|
to be made, and the equipment, facilities, or services for which
|
|
payment is expected to be made.
|
|
(b) REPORT BY THE COMPTROLLER GENERAL.--
|
|
(1) PAYMENT FOR MODIFICATIONS.QOn or before April 1, 1996, and
|
|
every 2 years thereafter, the Comptroller General of the United
|
|
States, after consultation with the Attorney General and the
|
|
telecommunications industry, shall submit to the Congress a
|
|
reportQ
|
|
(A) describing the type of equipment, facilities, and
|
|
services that have been brought into compliance under this title,
|
|
and
|
|
(B) reflecting its analysis of the reasonableness and cost-
|
|
effectiveness of the payments made by the Attorney General to
|
|
telecommunications carriers for modifications necessary to ensure
|
|
compliance with this title.
|
|
(2) COMPLIANCE COST ESTIMATES--
|
|
A report under paragraph (1) shall include the findings and
|
|
conclusions of the Comptroller General on the costs to be incurred
|
|
by telecommunications carriers to comply with the assistance
|
|
capability requirements of section 103 after the effective date of
|
|
such section 103, including projections of the amounts expected to
|
|
be incurred and a description of the equipment, facilities, or
|
|
services for which they are expected to be incurred.
|
|
|
|
TITLE IIQAMENDMENTS TO TITLE 18, UNITED STATES CODE
|
|
|
|
SECTION 201. COURT ENFORCEMENT OF COMMUNICATIONS ASSISTANCE FOR
|
|
LAW ENFORCEMENT ACT.
|
|
|
|
(a) COURT ORDER UNDER CHAPTER 119.QChapter 119 of title 18,
|
|
United States Code, is amended by inserting after section 2521 the
|
|
following new section:
|
|
|
|
$2522. Enforcement of the Communications Assistance for Law
|
|
Enforcement Act
|
|
(a) ENFORCEMENT BY COURT ISSUING SURVEILLANCE ORDER.Q a court
|
|
authorizing an interception under this chapter, a State statute,
|
|
or the Foreign intelligence Surveillance Act of 1978 (60 USC 1801
|
|
et seq.) or authorizing use of a pen register or a tap and trace
|
|
device under chapter 206 or a State statute finds that a
|
|
telecommunications carrier has failed to comply with the
|
|
requirements of the Communications Assistance for Law Enforcement
|
|
Act, the court may, in accordance with section 108 of such act,
|
|
direct that the carrier comply forthwith and may direct that the
|
|
provider of support services to the carrier or the manufacturer of
|
|
the carrier's transmission or switching equipment furnish
|
|
forthwith the modifications necessary for the carrier to comply.
|
|
(b) ENFORCEMENT BY APPLICATION BY ATTORNEY GENERAL.-- may, in a
|
|
civil action in the appropriate United States district court,
|
|
obtain an order, in accordance with section 108 of the
|
|
Communications Assistance for Law Enforcement Act, directing that
|
|
a telecommunications carrier, a manufacturer of telecommunications
|
|
transmission or switching equipment, a provider of
|
|
telecommunications support services comply with such Act.
|
|
(c) CIVIL PENALTY
|
|
In General.- A court issuing an order under the section
|
|
against a telecommunications carrier, a manufacture of
|
|
telecommunications transmission or switching equipment or a
|
|
provider of telecommunications support services impose a civil
|
|
penalty of up to $10,000 per day for each day in violation after
|
|
the issuance of the order or after such future date as the court
|
|
may specify.
|
|
"(2) CONSIDERATIONS.QIn determining whether to impose a civil
|
|
penalty and in determining its amount, the court take into
|
|
accountQ
|
|
"(A) the nature, circumstances, and extent of the violation;
|
|
"(B) the violator's ability to pay, the violator's good faith
|
|
efforts to comply in a timely manner, any effect on the violator's
|
|
ability to continue to do business, the degree of culpability, and
|
|
the length of any delay in undertaking efforts to comply; and
|
|
"(C) such other matters as justice may require.
|
|
"(d) DEFINITIONS.QAs used in this section, the terms defined in
|
|
section 102 of the Communications Assistance for Law Enforcement
|
|
Act have the meanings provided, respectively, in section."
|
|
(b) CONFORMING AMENDMENT.Q
|
|
(1) Section 2518(4) of title 18, United States Code amended by
|
|
adding at the end the following new sentence "Pursuant to section
|
|
2522 of this chapter, an order may also be issued to enforce the
|
|
assistance capability and capacity requirements under the
|
|
Communications Assistance for Enforcement Act.".
|
|
(2) Section 3124 of such title is amended by adding at the
|
|
end the following new subsection:
|
|
"(f) COMMUNICATIONS ASSISTANCE ENFORCEMENT ORDERS Pursuant to
|
|
section 2622, an order may be issued to enforce the assistance
|
|
capability and capacity requirements under the Communications
|
|
Assistance for Law Enforcement Act.".
|
|
(3) The table of sections at the beginning of chapter of title
|
|
18, United States Code, is amended by inserting the item
|
|
pertaining to section 2521 the following new item:
|
|
"2622. Enforcement of the Communications For Law Enforcement
|
|
Assistance Act."
|
|
Another enforcement order? Didn't we just see one in section
|
|
108? we did, but that was for Chapter 9 of Title 47. The section
|
|
above applies to Title 18 in Chapter 119, popularly known as the
|
|
Electronic Communications Privacy Act. The E.C.P.A. is contained
|
|
in 18 U.S.C. 2510 et seq. It's all about wiretaps and electronic
|
|
monitoring. Makes great reading if you have the time. Section
|
|
201 deals with courts that are actually ordering a wiretap. They
|
|
can impose penalties on carriers who can't arrange an interception
|
|
because they haven't yet complied with the Digital Telephony Bill.
|
|
Section 108, on the other hand, does not depend on a wiretap. It
|
|
is, instead, a general enforcement section. It lets the feds sue a
|
|
carrier who hasn't complied with the "Communications Assistance
|
|
for Law Enforcement Act" by a certain amount of time.
|
|
|
|
|
|
SECTION 202 CORDLESS TELEPHONES
|
|
|
|
(a) DEFINITIONSQSection 2510 of title 18, United States Code, is
|
|
amendedQ
|
|
(1) in paragraph (1), by striking "but such term does not
|
|
include" and all that follows through "base unit"; and
|
|
(2) in paragraph (12), by striking subparagraph (A) and
|
|
redesignating subparagraphs (B), (C), and (D) as subparagraphs
|
|
(A), (B), and (C), respectively (b) PENALTYQSection 2511 of title
|
|
18, United States is amendedQ
|
|
(1) in subsection (4)(b)(i) by inserting a "cordless
|
|
communication that is transmitted between the cordless phone
|
|
handset and the base unit," after "cellular telephone
|
|
communication," and
|
|
(2) in subsection (4)(b)(ii) by inserting "a cordless
|
|
telephone communication that is transmitted between the cordless
|
|
telephone handset and the base unit," after "cellular telephone
|
|
communication,".
|
|
|
|
SECTION 203 RADIO-BASED DATA COMMUNICATIONS
|
|
|
|
Section 2510(16) of title 18, United States Code, is amended Q (1)
|
|
by striking "or" at the end of subparagraph (D);
|
|
(2) by inserting "or" at the end of subparagraph (E) and
|
|
(3) by inserting after subparagraph (E) the following new
|
|
subparagraph: "(F) an electronic communication;".
|
|
|
|
SECTION 204 PENALTIES FOR MONITORING RADIO COMMUNICATIONS THAT
|
|
ARE TRANSMITTED USING MODULATION TECHNIQUES WITH NONPUBLIC
|
|
PARAMETERS
|
|
|
|
Section 2511(4)(b) of title 18, United States Code, is amended by
|
|
striking "or encrypted, then" and inserting ", encrypted, or
|
|
transmitted using modulation techniques the essential parameters
|
|
of which have been withheld from the public with the intention
|
|
of preserving the privacy of such communication, then".
|
|
|
|
SECTION 205 TECHNICAL CORRECTION
|
|
|
|
Section 2511(2)a)(i) of title 18, United States Code, is amended
|
|
by striking "used in the transmission of a wire communication" and
|
|
inserting "used in the transmission of a wire or electronic
|
|
communication".
|
|
|
|
SECTION 206 FRAUDULENT AL-ALTERATION OF COMMERCIAL MOBILE RADIO
|
|
INSTRUMENTS
|
|
|
|
Please see the text of this section on the opposite page
|
|
|
|
SECTION 207 TRANSACTIONAL DATA
|
|
|
|
(a) DISCLOSURE OF RECORDS. Section 2703 of title 18, United States
|
|
Code, is amendedQ
|
|
(1) in subsection (c)(1)--
|
|
(A) in subparagraph (B)--
|
|
(i) by striking clause (i) and
|
|
(ii) by redesignating clauses (ii),
|
|
(iii), and (iv) as clauses (i), (ii), and (iii),
|
|
respectively; and
|
|
(B) by adding at the end the following new subparagraph:
|
|
"(C) A provider of electronic communication service or remote
|
|
computing service shall disclose to a governmental entity the
|
|
address, telephone toll billing records, telephone number or other
|
|
subscriber number or identity, and length of service of a
|
|
subscriber to or customer of such service and the types of
|
|
services the subscriber or customer utilized, when the
|
|
governmental entity uses an administrative subpoena authorized by
|
|
a Federal or State statute or a Federal or State grand jury or
|
|
trial subpoena or any means available under subparagraph (B).";
|
|
and
|
|
(2) by amending the first sentence of subsection (d) to read
|
|
as follows: "A court order for disclosure under subsection (b) or
|
|
(c) may be issued by any court that is a court of competent
|
|
jurisdiction described in section 3126(2)(A) and shall issue if
|
|
the governmental entity offers specific and articulable facts
|
|
showing that there are reasonable grounds to believe that the
|
|
contents of a wire or electronic communication, or the records or
|
|
other information sought, are relevant and material to an ongoing
|
|
criminal investigation."
|
|
(b) PEN REGISTER AND TRAP AND TRACE DEVICES -- Section 3121 of
|
|
title 18, United States Code, is amendedQ
|
|
(1) by redesignating subsection (c) as subsection (d);
|
|
(2) by inserting after subsection (b) the following new
|
|
section:
|
|
(C) LIMITATION.QA government agency authorized to install and
|
|
use a pen register under this chapter or under State law
|
|
shall use technology reasonably available to it that restricts
|
|
recording or decoding of electronic or other impulses to the
|
|
dialing and signaling information utilized in call processing.".
|
|
|
|
SECTION. 208. AUTHORIZATION FOR ACTING DEPUTY ATTORNEYS GENERAL
|
|
IN THE CRIMINAL DIVISION TO AP-PROVE CERTAIN COURT APPLICATIONS
|
|
|
|
Section 2616(1) of title 18, United States Code, is amended by
|
|
inserting "or acting Deputy Assistant Attorney General" after
|
|
"Deputy Assistant Attorney General".
|
|
TITLE III--AMENDMENTS TO THE COMMUNICATIONS ACT OF 1934
|
|
|
|
SECTION 301. COMPLIANCE COST RECOVERY.
|
|
|
|
Title II of the Communications Act of 1934 is amended by inserting
|
|
after section 228 (47 U.S.C. 228) the following new section: "SEC.
|
|
229. COMMUNICATIONS ASSISTANCE FOR LAW ENFORCEMENT ACT COMPLIANCE.
|
|
"(a) In General: The Commission shall prescribe such
|
|
rules as are necessary to implement the requirements of the
|
|
Communications Assistance for Law Enforcement Act.
|
|
"(b) Systems Security and Integrity: The rules
|
|
prescribed pursuant to subsection (a) shall include rules to
|
|
implement section 105 of the Communications Assistance for Law
|
|
Enforcement Act that require common carriers--
|
|
"(1) to establish appropriate policies and
|
|
procedures for the supervision and control of its officers and
|
|
employees--
|
|
"(A) to require appropriate authorization to
|
|
activate interception of communications or access to call-
|
|
identifying information; and
|
|
"(B) to prevent any such interception or
|
|
access without such authorization;
|
|
"(2) to maintain secure and accurate records of
|
|
any interception or access with or without such authorization; and
|
|
"(3) to submit to the Commission the policies and
|
|
procedures adopted to comply with the requirements established
|
|
under paragraphs (1) and
|
|
(2). "(c) Commission Review of Compliance: The Commission
|
|
shall review the policies and procedures submitted under
|
|
subsection (b)(3) and
|
|
shall order a common carrier to modify any such policy or
|
|
procedure that the Commission determines does not comply with
|
|
Commission regulations. The Commission shall conduct such
|
|
investigations as may be necessary to insure compliance by common
|
|
carriers with the requirements of the regulations prescribed
|
|
under this section.
|
|
"(d) Penalties: For purposes of this Act, a violation
|
|
by an officer or employee of any policy or procedure adopted by a
|
|
common carrier pursuant to subsection (b), or of a rule prescribed
|
|
by the Commission pursuant to subsection (a), shall be considered
|
|
to be a violation by the carrier of a rule prescribed by the
|
|
Commission pursuant to this Act.
|
|
"(e) Cost Recovery for Communications Assistance for
|
|
Law Enforcement Act Compliance:
|
|
"(1) Petitions authorized: A common carrier may
|
|
petition the Commission to adjust charges, practices,
|
|
classifications, and regulations to recover costs expended for
|
|
making modifications to equipment, facilities, or services
|
|
pursuant to the requirements of section 103 of the Communications
|
|
Assistance for Law Enforcement Act.
|
|
"(2) Commission authority: The Commission may
|
|
grant, with or without modification, a petition under paragraph
|
|
(1) if the Commission determines that such costs are reasonable
|
|
and that permitting recovery is consistent with the public
|
|
interest. The Commission may, consistent with maintaining just and
|
|
reasonable charges, practices, classifications, and regulations in
|
|
connection with the provision of interstate or foreign
|
|
communication by wire or radio by a common carrier, allow carriers
|
|
to adjust such charges, practices, classifications, and
|
|
regulations in order to carry out the purposes of this Act.
|
|
"(3) Joint board: The Commission shall convene a
|
|
Federal-State joint board to recommend appropriate changes to part
|
|
36 of the Commission's rules with respect to recovery of costs
|
|
pursuant to charges, practices, classifications, and regulations
|
|
under the jurisdiction of the Commission.
|
|
|
|
|
|
SECTION 302 RECOVERY OF COST OF COMMISSION PROCEEDINGS.
|
|
|
|
The schedule of application fees in section 8(g) of
|
|
the Communications Act of 1934 (47 U.S.C. 158(g)) is amended by
|
|
inserting under item 1 of the matter pertaining to common carrier
|
|
services the following additional sub-item: "d. Proceeding under
|
|
section 109(b) of the Communications Assistance for Law
|
|
Enforcement Act."
|
|
|
|
SECTION 303. CLERICAL AND
|
|
TECHNICAL AMENDMENTS.
|
|
|
|
(a) Amendments to the Communications Act of 1934: The
|
|
Communications Act of 1934 is amended--
|
|
(1) in section 4(f)(3), by striking "overtime exceeds
|
|
beyond" and inserting "overtime extends beyond";
|
|
(2) in section 5, by redesignating subsection (f)
|
|
as subsection (e);
|
|
(3) in section 8(d)(2), by striking "payment of a"
|
|
and inserting "payment of an";
|
|
(4) in the schedule contained in section 8(g), in
|
|
item 7.f. under the heading "equipment approval
|
|
services/experimental radio" by striking "Additional Charge" and
|
|
inserting "Additional Application Fee";
|
|
(5) in section 9(f)(1), by inserting before the
|
|
second sentence the following: "(2) Installment payments:" ;
|
|
(6) in the schedule contained in section 9(g), in
|
|
the item pertaining to interactive video data services under the
|
|
private radio bureau, insert "95" after "47 C.F.R. Part";
|
|
(7) in section 220(a)--
|
|
(A) by inserting "(1)" after "(a)"; and
|
|
(B) by adding at the end the following new
|
|
paragraph: "(2) The Commission shall, by rule, prescribe a uniform
|
|
system of for use by telephone companies. Such uniform system
|
|
shall require that each common carrier shall maintain a system of
|
|
accounting methods, procedures, and techniques (including accounts
|
|
and supporting records and memoranda) which shall ensure a proper
|
|
allocation of all costs to and among telecommunications services,
|
|
facilities, and products (and to and among classes of such
|
|
services, facilities, and products) which are developed,
|
|
manufactured, or offered by such common carrier.";
|
|
(8) in section 220(b), by striking "classes" and
|
|
inserting "classes";
|
|
(9) in section 223(b)(3), by striking "defendant
|
|
restrict access" and inserting "defendant restricted access";
|
|
(10) in section 226(d), by striking paragraph (2)
|
|
and redesignating paragraphs (3) and (4) as paragraphs (2) and
|
|
(3), respectively;
|
|
(11) in section 227(b)(2)(C), by striking
|
|
"paragraphs" and inserting "paragraph";
|
|
(12) in section 227(e)(2), by striking "national
|
|
database" and inserting "national database";
|
|
(13) in section 228(c), by redesignating the second
|
|
paragraph (2) and paragraphs (3) through (6) as paragraphs (3)
|
|
through (7), respectively;
|
|
(14) in section 228(c)(6)(D), by striking
|
|
"conservation" and inserting "conversation";
|
|
(15) in section 308(c), by striking "May 24, 1921"
|
|
and inserting "May 27, 1921";
|
|
(16) in section 309(c)(2)(F), by striking "section
|
|
325(b)" and inserting "section 325(c)";
|
|
(17) in section 309(i)(4)(A), by striking
|
|
"Communications Technical Amendments Act of 1982" and inserting
|
|
"Communications Amendments Act of 1982";
|
|
(18) in section 331, by amending the heading of
|
|
such section to read as follows: "VERY HIGH FREQUENCY STATIONS AND
|
|
AM RADIO STATIONS";
|
|
(19) in section 358, by striking "(a)";
|
|
(20) in part III of title III--
|
|
(A) by inserting before section 381 the
|
|
following heading: "VESSELS TRANSPORTING MORE THAN SIX PASSENGERS
|
|
FOR HIRE REQUIRED TO
|
|
BE EQUIPPED WITH RADIO TELEPHONE";
|
|
(B) by inserting before section 382 the
|
|
following heading: "VESSELS EXCEPTED FROM RADIO TELEPHONE
|
|
REQUIREMENT";
|
|
(C) by inserting before section 383 the
|
|
following heading: "EXEMPTIONS BY COMMISSION";
|
|
(D) by inserting before section 384 the
|
|
following heading: "AUTHORITY OF COMMISSION; OPERATIONS,
|
|
INSTALLATIONS, AND ADDITIONAL EQUIPMENT";
|
|
(E) by inserting before section 385 the
|
|
following heading: "INSPECTIONS"; AND
|
|
(F) by inserting before section 386 the following
|
|
heading: "FORFEITURES";
|
|
(21) in section 410(c), by striking ", as referred
|
|
to in sections 202(b) and 205(f) of the Interstate Commerce Act,";
|
|
(22) in section 613(b)(2), by inserting a comma
|
|
after "pole" and after "line";
|
|
(23) in section 624(d)(2)(A), by inserting "of"
|
|
after "viewing";
|
|
(24) in section 634(h)(1), by striking "section
|
|
602(6)(A)" and inserting "section 602(7)(A)";
|
|
(25) in section 705(d)(6), by striking "subsection
|
|
(d)" and inserting "subsection (e)";
|
|
(26) in section 705(e)(3)(A), by striking
|
|
"paragraph (4) of subsection (d)" and inserting "paragraph (4) of
|
|
this subsection";
|
|
(27) in section 705, by redesignating subsections
|
|
(f) and (g) (as added by Public Law 100-667) as subsections (g)
|
|
and (h); and
|
|
(28) in section 705(h) (as so redesignated), by
|
|
striking "subsection (f)" and inserting "subsection (g)".
|
|
(b) Amendments to the Communications Satellite Act of 1962: The
|
|
Communications Satellite Act of 1962 is amended--
|
|
(1) in section 303(a)-- (A) by striking "section 27(d)"
|
|
and inserting "section 327(d)";
|
|
(B) by striking "sec. 29-911(d)" and inserting
|
|
"sec. 29-327(d)";
|
|
(C) by striking "section 36" and inserting
|
|
"section 336"; and
|
|
(D) by striking "sec. 29-916d" and inserting
|
|
"section 29-336(d)";
|
|
(2) in section 304(d), by striking "paragraphs
|
|
(1), (2), (3), (4), and (5) of section 310(a)" and inserting
|
|
"subsection (a) and paragraphs (1) through (4) of subsection (b)
|
|
of section 310"; and
|
|
(3) in section 304(e)--
|
|
(A) by striking "section 45(b)" and inserting
|
|
"section 345(b)"; and
|
|
(B) by striking "sec. 29-920(b)" and inserting
|
|
"sec. 29-345(b)"; and
|
|
(4) in sections 502(b) and 503(a)(1), by striking
|
|
"the Communications Satellite Corporation" and inserting "the
|
|
communications satellite corporation established pursuant to title
|
|
III of this Act".
|
|
(c) Amendment to the Children's Television Act of 1990: Section
|
|
103(a) of the Children's Television Act of 1990 (47 U.S.C.
|
|
303b(a)) is amended by striking "non-commercial" and inserting
|
|
"noncommercial".
|
|
(d) Amendments to the Telecommunications Authorization Act of
|
|
1992: Section 205(1) of the Telecommunications Authorization Act
|
|
of 1992 is amended--
|
|
(1) by inserting an open parenthesis before "other
|
|
than"; and
|
|
(2) by inserting a comma after "stations)".
|
|
(e) Conforming Amendment: Section 1253 of the Omnibus Budget
|
|
Reconciliation Act of 1981 is repealed.
|
|
(f) Stylistic Consistency: The Communications Act of 1934 and the
|
|
Communications Satellite Act of 1962 are amended so that the
|
|
section designation and section heading of each section of such
|
|
Acts shall be in the form and typeface of the section designation
|
|
and heading of this section.
|
|
|
|
SECTION 304. ELIMINATION OF EXPIRED AND OUTDATED PROVISIONS
|
|
(a) Amendments to the Communications Act of 1934: The
|
|
Communications Act of 1934 is amended--
|
|
(1) in section 7(b), by striking "or twelve months
|
|
after the date of the enactment of this section, if later" both
|
|
places it;
|
|
(2) in section 212, by striking "After sixty days
|
|
from the enactment of this Act it shall" and inserting "It
|
|
shall";
|
|
(3) in section 213, by striking subsection (g) and
|
|
redesignating subsection (h) as subsection (g);
|
|
(4) in section 214, by striking "section 221 or
|
|
222" and inserting "section 221";
|
|
(5) in section 220(b), by striking ", as soon as
|
|
practicable,";
|
|
(6) by striking section 222;
|
|
(7) in section 224(b)(2), by striking "Within 180
|
|
days from the date of enactment of this section the Commission"
|
|
and inserting "The Commission";
|
|
(8) in 226(e), by striking "within 9 months after
|
|
the date of enactment of this section,";
|
|
|
|
(9) in section 309(i)(4)(A), by striking "The
|
|
commission, not later than 180 days after the date of the
|
|
enactment of the Communications Technical Amendments Act of 1982,
|
|
shall," and inserting "The Commission shall,";
|
|
(10) by striking section 328;
|
|
(11) in section 413, by striking ", within sixty
|
|
days after the taking effect of this Act,";
|
|
(12) in section 624(d)(2)(B)--
|
|
(A) by striking out "(A)";
|
|
(B) by inserting "of" after "restrict the
|
|
viewing"; and
|
|
(C) by striking subparagraph (B);
|
|
(13) by striking sections 702 and 703;
|
|
(14) in section 704--
|
|
(A) by striking subsections (b) and (d); and
|
|
(B) by redesignating subsection (c) as
|
|
subsection (b);
|
|
(15) in section 705(g) (as redesignated by section
|
|
304(25)), by striking "within 6 months after the date of enactment
|
|
of the Satellite Home Viewer Act of 1988, the Federal
|
|
Communications
|
|
Commission" and inserting "The Commission";
|
|
(16) in section 710(f)--
|
|
(A) by striking the first and second
|
|
sentences; and
|
|
(B) in the third sentence, by striking
|
|
"Thereafter, the
|
|
Commission" and inserting "The Commission";
|
|
(17) in section 712(a), by striking ", within 120
|
|
days after the effective date of the Satellite Home Viewer Act of
|
|
1988,"; and
|
|
(18) by striking section 713.
|
|
(b) Amendments to the Communications Satellite Act of
|
|
1962: The Communications Satellite Act of 1962 is amended--
|
|
(1) in section 201(a)(1), by striking "as
|
|
expeditiously as possible,";
|
|
(2) by striking sections 301 and 302 and inserting
|
|
the following:
|
|
"SEC. 301. CREATION OF CORPORATION.
|
|
"There is authorized to be created a communications
|
|
satellite corporation for profit which will not be an agency or
|
|
establishment of the United States Government.
|
|
"SEC. 302. APPLICABLE LAWS.
|
|
"The corporation shall be subject to the provisions of
|
|
this Act and, to the extent consistent with this Act, to the
|
|
District of Columbia Business Corporation Act. The right to
|
|
repeal, alter, or amend this Act at any time is expressly
|
|
reserved.";
|
|
(3) in section 304(a), by striking "at a price not
|
|
in excess
|
|
of $100 for each share and";
|
|
(4) in section 404--
|
|
(A) by striking subsections (a) and (c); and
|
|
(B) by redesignating subsection (b) as section
|
|
404;
|
|
(5) in section 503--
|
|
(A) by striking paragraph (2) of subsection
|
|
(a); and
|
|
(B) by redesignating paragraph (3) of
|
|
subsection (a) as paragraph (2) of such subsection;
|
|
(C) by striking subsection (b);
|
|
(D) in subsection (g)--
|
|
(i) by striking "subsection (c)(3)" and
|
|
inserting
|
|
"subsection (b)(3)"; and
|
|
(ii) by striking the last sentence; and
|
|
(E) by redesignating subsections (c) through
|
|
(h) as
|
|
subsections (b) through (g), respectively;
|
|
(5) by striking sections 505, 506, and 507; and
|
|
(6) by redesignating section 508 as section 505.
|
|
|
|
|
|
VIII THE COMPLETE TEXT OF 18 USC 1029
|
|
|
|
18 U.S.C. 1029 (As Amended By The Digital Telephony Bill)
|
|
|
|
$ 1029. Fraud and related activity in connection with access
|
|
devices
|
|
(a) Whoever --
|
|
(1) knowingly and with intent to defraud produces, uses,
|
|
or traffics in one or more counterfeit access devices;
|
|
(2) knowingly and with intent to defraud traffics in or
|
|
uses one or more unauthorized access devices during any one-year
|
|
period, and by such conduct obtains anything of value aggregating
|
|
$1,000 or more during that period;
|
|
(3) knowingly and with intent to defraud possesses
|
|
fifteen or more devices which are counterfeit or unauthorized
|
|
access devices;
|
|
(4) knowingly, and with intent to defraud, produces,
|
|
traffics in, has control or custody of, or possesses device making
|
|
equipment; or
|
|
(5) knowingly and with intent to defraud uses, produces,
|
|
traffics in, has control or custody of, or possesses a
|
|
telecommunications instruments that has been modified or altered
|
|
to obtain unauthorized use of telecommunications services; or
|
|
(6) knowingly and with intent to defraud uses, produces,
|
|
traffics in, has control or custody of, or possesses--
|
|
(A) a scanning receiver; or
|
|
(B) hardware or software used for altering or
|
|
modifying telecommunications instruments services.
|
|
(b)(1) Whoever attempts to commit an offense under subsection
|
|
(a) of this section shall be punished as provided in subsection
|
|
(c) of this section.
|
|
(2) Whoever is a party to a conspiracy of two or more
|
|
persons to commit an offense under subsection (a) of this section,
|
|
if any of the parties engage in any conduct in furtherance of such
|
|
offense, shall be fined an amount not greater than the amount
|
|
provided as the maximum fine for such offense under subsection (c)
|
|
of this section or imprisoned not longer than one--half of the
|
|
period provided as the maximum imprisonment for such offense under
|
|
subsection (c) of this section, or both.
|
|
(c) The punishment for an offense under subsection (a) or
|
|
(b)(1) of this section is --
|
|
(1) a fine of not more than the greater of $10,000 or
|
|
twice the value obtained by the offense or imprisonment for not
|
|
more than ten years, or both, in the case of an offense under
|
|
subsection (a)(2) or (a)3 of this section which does not occur
|
|
after a conviction for another offense under either subsection, or
|
|
an attempt to commit an offense punishable under this paragraph;
|
|
(2) a fine of not more than the greater of $50,000 or
|
|
twice the value obtained by the offense or imprisonment for not
|
|
more than fifteen years, or both, in the case of a subsection
|
|
(a)(1), (4),(5),(6) of this section which does not occur after a
|
|
conviction for another offense under either such subsection, or an
|
|
attempt to commit an offense punishable under this paragraph; and
|
|
|
|
(3) a fine of not more than the greater of $100,000 or twice the
|
|
value obtained by the offense or imprisonment for not more than
|
|
twenty years, or both, in the case of an offense under subsection
|
|
(a) which occurs after a conviction for another offense under
|
|
this subsection, or an attempt to commit an offense punishable
|
|
under this paragraph.
|
|
(d) The United States Secret Service shall, in addition to
|
|
any other agency having such authority, have the authority to
|
|
investigate offense under this section. Such authority of the
|
|
United States Secret Service shall be exercised in accordance with
|
|
an agreement which shall be entered into by the Secretary of the
|
|
Treasury and the Attorney General.
|
|
(e) As used in this section - -
|
|
(1) the term "access device" means any card, plate, code,
|
|
account number, electronic serial number, mobile identification
|
|
number, personal identification number, or other
|
|
telecommunications service, equipment, or instrument identifier,
|
|
or other means of account access that can be used, alone or in
|
|
conjunction with another access device to obtain money, goods,
|
|
services, or any other thing of value, or that can be used to
|
|
initiate a transfer of funds (other than a transfer originated
|
|
solely by paper instrument);
|
|
(2) the term "counterfeit access device" means any access
|
|
device that is counterfeit, fictitious, altered, or forged, or an
|
|
identifiable component of an access device or a counterfeit access
|
|
device:
|
|
(3) the term "unauthorized access device" means any access
|
|
device that is lost, stolen, expired, revoked, canceled, or
|
|
obtained with intent to defraud;
|
|
(4) the term "produce" includes design, alter, authenticate,
|
|
duplicate or assemble;
|
|
(5) the term "traffic" means transfer, or otherwise dispose
|
|
of, to another, or impression designed or primarily used for
|
|
making an access device or a counterfeit access device and
|
|
(6) the term "device-making equipment" means any equipment,
|
|
mechanism, or impression designed or primarily used for making an
|
|
access device or a counterfeit access device. ;
|
|
(7) the term "scanning receiver" means a device or apparatus
|
|
that can be used to intercept a wire or electronic communication
|
|
in violation of chapter 119.
|
|
(f) This section does not prohibit any lawfully authorized
|
|
investigative, protective or intelligence activity of a law
|
|
enforcement agency of the United States, a State, or a political
|
|
subdivision of a State, or of an intelligence agency of the
|
|
United States, or any activity authorized under chapter 224 of
|
|
this title. For purposes of this subsection, the term "State"
|
|
includes a State of the United States, the District of Columbia,
|
|
and any commonwealth, territory, or possession of the United
|
|
States.
|
|
|
|
"We lobbied for passage of the Telephony bill, which the
|
|
president just signed. The bill enhances the language in Title 18,
|
|
Section 1029. That's the Secret Service statute that deals with
|
|
fraudulent or counterfeit access devices. Prior to this bill being
|
|
signed, there was no reference to wireless communications. Now the
|
|
language in the statute clearly includes the cellular phones. This
|
|
has added that tool to the arsenal of the Secret Service."
|
|
|
|
Tom McLure, director of fraud
|
|
management for the CTIA
|
|
|
|
It's All About Context!
|
|
|
|
The full text of 18 U.S.C. as amended by the digital telephony
|
|
bill is show on this page. Additions are in bold and deletions are
|
|
in cross outs. This shows the value of putting all those scattered
|
|
paragraphs into context. The teams of lawyers who drafted this
|
|
bill had to have looked up every section and reg affected. . .
|
|
|
|
IX. SPECIAL E-ZINE BONUS: THE REGULATION PROHIBITING CLONING AS WELL
|
|
AS SUPPORTING MATERIAL AS SUPPLIED BY ROBERT KELLER TO CompuServe
|
|
|
|
Set forth below are excerpts from FCC rules and policy
|
|
statements regarding cloning and/or modification of the
|
|
electronic serial number (ESN) in cellular phones.
|
|
|
|
=================
|
|
TABLE OF CONTENTS
|
|
=================
|
|
|
|
A. Federal Communications Commission Report and Order
|
|
(CC Docket Nos. 92-115, 94-46, and 93-116)
|
|
Adopted: August 2, 1994 Released: September 9, 1994
|
|
Rule Changes Effective: January 1, 1995
|
|
|
|
1. Excerpt, Paragraphs 54-63
|
|
|
|
2. Excerpt, Appendix A
|
|
Detailed Discussion of Part 22 Rule Amendments
|
|
Section 22.919 Electronic serial numbers.
|
|
|
|
3. Excerpt, Appendix B - Final Rules
|
|
New FCC Rule Section 22.919
|
|
47 C.F.R. Section 22.919
|
|
|
|
B. FCC's Stated Position on Rules and Policy
|
|
Prior to Rule Changes in CC Docket No. 92-115
|
|
|
|
If you have any questions, please feel free to contact me:
|
|
|
|
|
|
Bob Keller (KY3R)
|
|
==============================
|
|
Robert J. Keller, P.C.
|
|
------------------------------
|
|
Federal Telecommunications Law
|
|
4200 Wisconsin Ave NW #106-261
|
|
Washington, DC 20016-2143 USA
|
|
------------------------------
|
|
Internet: rjk@telcomlaw.com
|
|
Telephone: +1 301.229.5208
|
|
Facsimile: +1 301.229.6875
|
|
CompuServe UID: 76100.3333
|
|
==============================
|
|
|
|
===========================================================
|
|
A. Federal Communications Commission
|
|
Report and Order (CC Docket Nos. 92-115, 94-46, and 93-116)
|
|
Adopted: August 2, 1994 Released: September 9, 1994
|
|
Rule Changes Effective: January 1, 1995
|
|
===========================================================
|
|
|
|
--------------------------
|
|
1. Excerpt, Paragraphs 54-63:
|
|
--------------------------
|
|
|
|
Cellular Electronic Serial Numbers
|
|
|
|
54. Proposal. We proposed in the Notice a new rule
|
|
(Section 22.919) intended to help reduce the fraudulent use of
|
|
cellular equipment caused by tampering with the unique
|
|
Electronic Serial Numbers (ESN) that identify mobile equipment
|
|
to cellular systems. The purposes of the ESN in a cellular
|
|
telephone are similar to the Vehicle Identification Numbers in
|
|
automobiles. That is, it uniquely identifies the equipment in
|
|
order to assist in recovery if it is stolen. More importantly,
|
|
in the case of cellular telephones, the ESN enables the
|
|
carriers to bill properly for calls made from the telephone.
|
|
Any alteration of the ESN renders it useless for this purpose.
|
|
The proposed rule explicitly establishes anti-fraud design
|
|
specifications that require, among other things, that the ESN
|
|
must be programmed into the equipment at the factory and must
|
|
not be alterable, removable, or in any way able to be
|
|
manipulated in the field. In addition, the proposed rules
|
|
require that the ESN component be permanently attached to a
|
|
main circuit board of the mobile transmitter and that the
|
|
integrity of the unit's operating software not be alterable.
|
|
|
|
55. Comments. The commenters generally support our
|
|
proposal,[94] but they suggest some modifications. For example,
|
|
BellSouth, Southwestern Bell, GTE, and CIA suggest that our
|
|
proposal should be modified to provide that equipment already
|
|
manufactured, is exempt from the rule.[95] They argue that
|
|
subjecting existing phones to this rule would be very expensive
|
|
and difficult, if not impossible, to implement. Therefore, they
|
|
recommend that the rule apply only to phones manufactured after
|
|
a particular date.[96] NYNEX recommends that we not require
|
|
the ESN chip to be secured to the main circuit board of the
|
|
mobile transmitter as proposed. Rather, NYNEX suggests that the
|
|
ESN chip be attached to the frame of the radio and attached to
|
|
the logic board by cable.[97] In addition, it recommends that
|
|
operating software be encoded or scattered over different
|
|
memory chips.[98] Motorola, Inc. (Motorola) and Ericsson Corp.
|
|
(Ericsson), two manufacturers of cellular mobile equipment,
|
|
suggest that the proposal be modified to allow authorized
|
|
service centers or representatives to make necessary and
|
|
required changes to ESNs in mobile and portable units in the
|
|
field.[99]
|
|
|
|
56. Southwestern Bell recommends that the rule also apply
|
|
to mobile equipment associated with a wireless private branch
|
|
exchange (PBX).[100] CTIA suggests that the proposal be
|
|
modified in several respects. First, it states that we should
|
|
clarify that requiring a mobile transmitter to have a "unique"
|
|
ESN, means that any particular ESN will not exist in more than
|
|
one mobile unit. Second, CTIA suggests that ESN manipulation
|
|
not be permitted "outside a manufacturer's authorized
|
|
facility." Third, it requests that cellular mobile units be
|
|
required to be designed to comply with the "applicable industry
|
|
standard for authentication."[101] New Vector supports the
|
|
proposed rule, but emphasizes that the ESN criteria should be
|
|
incorporated into the type-acceptance rules to clarify that
|
|
manufacturers will be subject to the Commission's enforcement
|
|
procedures if they do not comply with the ESN requirements.[102]
|
|
|
|
57. C2+ Technology (C2+) requests that we allow companies
|
|
to market ancillary cellular equipment that emulates ESNs for
|
|
the purpose of allowing more than one cellular phone to have
|
|
the same telephone number. It argues that emulating ESNs in the
|
|
way it describes benefits the public, does not involve fraud,
|
|
and retains the security and integrity of the cellular
|
|
phones.[103] In opposition, Ericsson asserts that the rules
|
|
should include procedures to ensure that ESNs are not easily
|
|
transferable through the use of an encrypted data transfer
|
|
device.[104] Similarly, New Par suggests that the proposed
|
|
rule proscribe activity that does not physically alter the chip
|
|
yet affects the radiated ESN by translating the ESN signal that
|
|
the mobile unit transmits.[105]
|
|
|
|
58. Discussion. The record before us demonstrates the need
|
|
for measures that will help reduce the fraudulent use of
|
|
cellular equipment caused by tampering with the ESN. We
|
|
therefore adopt the proposed rule for the reasons set forth
|
|
below.
|
|
|
|
59. Contrary to the suggestion of one commenter, the ESN
|
|
rule will not prevent a consumer from having two cellular
|
|
telephones with the same telephone number. Changing the ESN
|
|
emitted by a cellular telephone to be the same as that emitted
|
|
by another cellular telephone does not create an "extension"
|
|
cellular telephone. Rather, it merely makes it impossible for
|
|
the cellular system to distinguish between the two telephones.
|
|
We note that Commission rules do not prohibit assignment of the
|
|
same telephone number to two or more cellular telephones.[106]
|
|
It is technically possible to have the same telephone number
|
|
for two or more cellular telephones, each having a unique
|
|
ESN.[107] If a cellular carrier wishes to provide this
|
|
service, it may. In this connection, we will not require that
|
|
use of cellular telephones comply with an industry
|
|
authentication procedure as requested by CTIA, as this could
|
|
have the unintended effect of precluding multiple cellular
|
|
telephones (each with a unique ESN) from having the same
|
|
telephone number.
|
|
|
|
60. Further, we conclude that the practice of altering
|
|
cellular phones to "emulate" ESNs without receiving the
|
|
permission of the relevant cellular licensee should not be
|
|
allowed because (1) simultaneous use of cellular telephones
|
|
fraudulently emitting the same ESN without the licensee's
|
|
permission could cause problems in some cellular systems such
|
|
as erroneous tracking or billing; (2) fraudulent use of such
|
|
phones without the licensee's permission could deprive cellular
|
|
carriers of monthly per telephone revenues to which they are
|
|
entitled; and (3) such altered phones not authorized by the
|
|
carrier, would therefore not fall within the licensee's blanket
|
|
license, and thus would be unlicensed transmitters in violation
|
|
of Section 301 of the Act. Therefore, we agree with New Par and
|
|
Ericsson that the ESN rule should proscribe activity that does
|
|
not physically alter the ESN, but affects the radiated ESN,
|
|
including activities that transfer ESNs through the use of an
|
|
encrypted data transfer device.
|
|
|
|
61. With respect to the proposal to allow alteration of
|
|
ESNs by manufacturers' authorized service centers or
|
|
representatives, we note that computer software to change ESNs,
|
|
which is intended to be used only by authorized service
|
|
personnel, might become available to unauthorized persons
|
|
through privately operated computer "bulletin boards". We have
|
|
no knowledge that it is now possible to prevent unauthorized
|
|
use of such software for fraudulent purposes. Accordingly, we
|
|
decline to make the exception requested by Motorola and
|
|
Ericsson.
|
|
|
|
62. We further agree with the commenters that it would be
|
|
impractical to apply the new rule to existing equipment.
|
|
Accordingly, we are not requiring that cellular equipment that
|
|
is currently in use or has received a grant of type-acceptance
|
|
be modified or retrofitted to comply with the requirements of
|
|
this rule. Thus, the ESN rule will apply only to cellular
|
|
equipment for which initial type-acceptance is sought after the
|
|
date that our rules become effective. Nevertheless, with regard
|
|
to existing equipment, we conclude that cellular telephones
|
|
with altered ESNs do not comply with the cellular system
|
|
compatibility specification[108] and thus may not be considered
|
|
authorized equipment under the original type acceptance.
|
|
Accordingly, a consumer's knowing use of such altered equipment
|
|
would violate our rules. We further believe that any individual
|
|
or company that knowingly alters cellular telephones to cause
|
|
them to transmit an ESN other than the one originally installed
|
|
by the manufacturer is aiding in the violation of our rules.
|
|
Thus, we advise all cellular licensees and subscribers that the
|
|
use of the C2+ altered cellular telephones constitutes a
|
|
violation of the Act and our rules.
|
|
|
|
63. With respect to NYNEX's proposed modifications for
|
|
securing the ESN chip to the mobile transmitter, the record
|
|
does not convince us that these modifications will make the ESN
|
|
rule more effective. Therefore, we do not adopt NYNEX's
|
|
proposal. We agree with Southwestern Bell that the ESN rule
|
|
should apply to mobile equipment associated with wireless PBX
|
|
if the equipment can also be used on cellular systems. We also
|
|
clarify that the new ESN rule prohibits the installation of an
|
|
ESN in more than one mobile transmitter. Finally, as suggested
|
|
by New Vector, we amend the type-acceptance rule to refer to
|
|
the newly adopted ESN rule.[109]
|
|
|
|
[Footnotes]
|
|
|
|
[94] See PacTel Comments at 2; CTIA Comments at 7-8.
|
|
|
|
[95] BellSouth Comments at Appendix 2, p.36; Southwestern
|
|
Bell Comments at 28-29; GTE Comments at 30; CTIA Comments at 8.
|
|
|
|
[96] For example, BellSouth suggests that the anti-fraud
|
|
measures should not apply to equipment type-accepted before
|
|
January 1, 1993.
|
|
|
|
[97] NYNEX Comments at 8.
|
|
|
|
[98] Id. at 8-9.
|
|
|
|
[99] Ericsson Reply Comments at 2-5; Motorola Reply
|
|
Comments at 3.
|
|
|
|
[100] Southwestern Bell Comments at 29.
|
|
|
|
[101] CTIA Comments at 8.
|
|
|
|
[102] New Vector Comments at Appendix I, p.44.
|
|
|
|
[103] C2+ Comments at 1-2.
|
|
|
|
[104] Ericsson Reply Comments at 3-4.
|
|
|
|
[105] New Par Comments at 21-22.
|
|
|
|
[106] The telephone number is referred to in the cellular
|
|
compatibility specification as the Mobile Identification Number
|
|
or "MIN"
|
|
|
|
[107] It is not technically necessary to have the same
|
|
ESN in order to have the same telephone number. Nevertheless,
|
|
the authentication software used by some cellular systems does
|
|
not permit two cellular telephones with the same telephone
|
|
number. In such cases, cellular carriers should explain to
|
|
consumers who request this service that their system is not yet
|
|
capable of providing it.
|
|
|
|
[108] See old Section 22.915, which becomes new Section
|
|
22.933 in Appendices A and B.
|
|
|
|
[109] See discussion of new Section 22.377 in Appendix A.
|
|
|
|
----------------------------------------------
|
|
2. Excerpt, Appendix A
|
|
Detailed Discussion of Part 22 Rule Amendments
|
|
Section 22.919 Electronic serial numbers.
|
|
----------------------------------------------
|
|
|
|
Section 22.919 Electronic serial numbers.
|
|
|
|
The purpose of this new section is to deter cellular fraud
|
|
by requiring that the Electronic Serial Number (ESN) unique to
|
|
each cellular phone be factory set, inalterable,
|
|
non-transferable, and otherwise tamper-proof and free of
|
|
fraudulent manipulation in the field. This subject received
|
|
substantial attention from commenters and is discussed in the
|
|
Report and Order.
|
|
|
|
---------------------------------
|
|
3. Excerpt, Appendix B - Final Rules
|
|
New FCC Rule Section 22.919
|
|
47 C.F.R. Section 22.919
|
|
---------------------------------
|
|
|
|
22.919 Electronic serial numbers.
|
|
|
|
The Electronic Serial Number (ESN) is a 32 bit binary
|
|
number that uniquely identifies a cellular mobile
|
|
transmitter to any cellular system.
|
|
|
|
(a) Each mobile transmitter in service must have a
|
|
unique ESN.
|
|
|
|
(b) The ESN host component must be permanently attached
|
|
to a main circuit board of the mobile transmitter
|
|
and the integrity of the unit's operating software
|
|
must not be alterable. The ESN must be isolated
|
|
from fraudulent contact and tampering. If the ESN
|
|
host component does not contain other information,
|
|
that component must not be removable, and its
|
|
electrical connections must not be accessible. If
|
|
the ESN host component contains other information,
|
|
the ESN must be encoded using one or more of the
|
|
following techniques:
|
|
|
|
(1) Multiplication or division by a polynomial;
|
|
|
|
(2) Cyclic coding;
|
|
|
|
(3) The spreading of ESN bits over various non-
|
|
sequential memory locations.
|
|
|
|
(c) Cellular mobile equipment must be designed such
|
|
that any attempt to remove, tamper with, or change
|
|
the ESN chip, its logic system, or firmware
|
|
originally programmed by the manufacturer will
|
|
render the mobile transmitter inoperative.
|
|
|
|
(d) The ESN must be factory set and must not be
|
|
alterable, transferable, removable or otherwise
|
|
able to be manipulated in the field. Cellular
|
|
equipment must be designed such that any attempt to
|
|
remove, tamper with, or change the ESN chip, its
|
|
logic system, or firmware originally programmed by
|
|
the manufacturer will render the mobile transmitter
|
|
inoperative.
|
|
|
|
=============================================
|
|
B. FCC's Stated Position on Rules and Policy
|
|
Prior to Rule Changes in CC Docket No. 92-115
|
|
=============================================
|
|
|
|
PUBLIC NOTICE
|
|
|
|
FEDERAL COMMUNICATIONS COMMISSION
|
|
|
|
COMMON CARRIER PUBLIC MOBILE SERVICES INFORMATION
|
|
|
|
October 2, 1991
|
|
Report No. CL-92-3
|
|
|
|
CHANGING ELECTRONIC SERIAL NUMBERS ON CELLULAR
|
|
PHONES IS A VIOLATION OF THE COMMISSION'S RULES
|
|
|
|
It has come to the attention of the Mobile Services
|
|
Division that individuals and companies may be altering
|
|
the Electronic Serial Number ( ESN) on cellular phones.
|
|
Paragraph 2.3.2 in OST Bulletin No. 53 (Cellular System
|
|
Mobile Station - Land Station Compatibility Specification,
|
|
July, 1983) states that "[a]ttempts to change the serial
|
|
number circuitry should render the mobile station
|
|
inoperative." The 1981 edition of these compatibility
|
|
specifications (which contains the same wording) was
|
|
included as Appendix D in CC Docket 79-318 and
|
|
is incorporated into Section 22.915 of the Commission's
|
|
rules.
|
|
|
|
Phones with altered ESNs do not comply with the
|
|
Commission's rules and any individual or company operating
|
|
such phones or performing such alterations is in violation
|
|
of Section 22.915 of the Commission's rules and could be
|
|
subject to appropriate enforcement action.
|
|
|
|
Questions concerning this Public Notice should be addressed
|
|
to Steve Markendorff at 202-653-5560 or Andrew Nachby at
|
|
202-632-6450.
|
|
|
|
| Robert J. Keller, P.C. Internet: rjk@telcomlaw.com |
|
|
| Federal Telecommunications Law Telephone: +1 301.229.5208 |
|
|
| 4200 Wisconsin Ave NW #106-261 Facsimile: +1 301.229.6875 |
|
|
| Washington, DC 20016-2143 USA CompuServe UID: 76100.3333 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|