3678 lines
165 KiB
Plaintext
3678 lines
165 KiB
Plaintext
----=[ CiSSD ]=---- is finally sober over Issue #3 of
|
|
|
|
__ /\
|
|
|__| \ \ :
|
|
_____ _____ _____ _____> \____ __|__ _
|
|
| . | __| | > | | > | |
|
|
---===[ | /_ __| /| | / _ | |__ ]===---
|
|
__|__|__|_____| _/ |__|___/__|__|_____|
|
|
| | / | | :
|
|
. \/ . : .
|
|
.
|
|
- FROGS -
|
|
|
|
=========================================================================
|
|
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY MAY (C) 1993/94
|
|
-------------------------------------------------------------------------
|
|
Once again, the frog has overestimated our stupidity. Surely we will
|
|
not fall for the same trick twice.
|
|
|
|
We have learned a few things about frogs. They don't have very much
|
|
to do. They're rather bored most of the time, but they impress you by
|
|
breathing a lot of hot air out of their lungs, and then they sit quietly
|
|
in order to lure you in. They smell funny, but it's one of those smells
|
|
you have to sniff again to make sure that your nose didn't decieve you
|
|
the first time.
|
|
|
|
If you lick a toad, you get high, but frogs are not toads, so
|
|
everyone sucking up to a frog finds out shortly that it's not all it's
|
|
cracked up to be, and generally leaves it be.. it's smell was unappealing
|
|
in the first place.
|
|
|
|
You can buzz about trying to find a place to observe the frog, in
|
|
order that you might protect yourself from its self serving, greed driven
|
|
actions, but when the frog thinks you are sitting pretty, he tries to
|
|
aggrivate you again. If you are silly enough to become aggrieved by his
|
|
mischeivous tactics, he will stick out his tounge, and swallow you
|
|
whole.
|
|
|
|
For once, a group of flies, known as CiSSD, has outwitted a group of
|
|
amphibians, who for the most part, aren't frogs, but all wish they
|
|
were. We learned the only way to get high from a frog is to smoke him.
|
|
|
|
But we flies don't need to get high.. I think we can be content with
|
|
removing his lilly pad.. He will no longer be part of this amphibian
|
|
community.
|
|
|
|
[No one will appreciate this as much as those who are involved in
|
|
the war against the evil frog. Entertainment for your efforts. Thanks a
|
|
lot guys.. Zap the Frog, rejoin the scene when you grow up. For now you
|
|
are only a tadpole.]
|
|
|
|
---
|
|
|
|
Due to the hustle and bustle of a busy end of school term, some of
|
|
our regular columns were forced to flee. 'NEWS AND NATTERINGS OF THE DOPE
|
|
MAN' will most definately be back for next issue, and will more than
|
|
probably be joined by 'NEWS BYTES (and usually bites too!)'.
|
|
|
|
Despite these ommisions, we hope sincerely that you enjoy this
|
|
issue. After all, some things may come and go in waves, but the computer
|
|
underground is here to stay.
|
|
|
|
- Essence/TX
|
|
|
|
---
|
|
|
|
WARNING, DISCLAIMER
|
|
|
|
|
|
WARNING: THE FOLLOWING TEXT CONTAINS MATERIAL WHICH MAY BE
|
|
CONSIDERED OFFENSIVE BY SOME. CISSD AND ITS MEMBERS BEAR NO
|
|
LIABILITY ON THE PART OF THE READER. READ AT YOUR OWN RISK.
|
|
|
|
DISCLAIMER: THE INFORMATION PRESENTED IN THE FOLLOWING TEXT IS
|
|
NOT INTENDED TO BE USED FOR PURPOSES CONTRARY TO LAWS IN THE
|
|
COUNTRY WHERE THE READER RESIDES. DUE TO AN INTERNATIONAL
|
|
DISTRIBUTION, OUR CHOSEN TOPICS WILL PROVIDE INFORMATION THAT
|
|
COULD POTENTIALLY BE USED FOR PURPOSES ILLEGITIMATE IN NATURE.
|
|
CISSD, AND ITS MEMBERS THEREFORE, BEAR NO RESPONSIBILITY FOR
|
|
THE ACTIONS OF THE READER, BE THEY A DIRECT, OR INDIRECT RESULT
|
|
OF READING THE FOLLOWING TEXT.
|
|
|
|
NOTE: BY READING BEYOND THIS POINT, YOU ARE AGREEING TO THE
|
|
CONDITIONS IN THE ABOVE WARNING, AND DISCLAIMER.
|
|
|
|
ADDITIONAL NOTE: THE EDITOR OF THIS MAGAZINE DOES NOT CONDONE
|
|
PLAUGERISM. IF ANY ARTICLES APPEAR TO HAVE BEEN COPIED WITHOUT
|
|
PROPER CREDIT, NOTIFICATION WOULD BE APPRECIATED. DUE TO THE
|
|
VAST NUMBER OF SUBMISSIONS WE RECIEVE EACH MONTH, IT IS
|
|
DIFFICULT TO FULLY DETERMINE WHAT IS, AND IS NOT ORGINAL
|
|
MATERIAL.
|
|
|
|
---
|
|
|
|
TABLE OF CONTENTS
|
|
|
|
|
|
ITEM CONTRIBUTOR(S) LINE
|
|
==== ============== ====
|
|
|
|
Editorial Essence 17
|
|
|
|
Warning, Disclaimer -- 67
|
|
|
|
Table of Contents -- 95
|
|
|
|
Getting Revival -- 159
|
|
|
|
Letters to the Editor -- 182
|
|
|
|
Telekom Stupidity Revealed Lister 298
|
|
|
|
Politics and The Hacker The Dictator 343
|
|
|
|
Emotional Maturity, Fourteen Essence 430
|
|
Years of Age
|
|
|
|
CyberPunk! The Dictator 471
|
|
|
|
Laserprinter Forgery Kryten 604
|
|
|
|
Caller ID Information and Lister 624
|
|
Specifications
|
|
|
|
The Diatribes of Grappling The Grappler 813
|
|
|
|
FEATURE: Privacy, Line Taps and Lister 937
|
|
The US Government
|
|
|
|
| The Clipper Chip: A Technical Dorothy Denning 944
|
|
| Summary
|
|
|
|
| The White House: Statement by The Press Secretary 1088
|
|
| the Press Secretary
|
|
|
|
Hinterland Who's Who - 800 Exchanges Lister 1346
|
|
|
|
Poetry Corner The Grappler/Essence 1577
|
|
|
|
Official [CiSSD] Bad-Ass Belcore Lister 1657
|
|
glossary
|
|
|
|
Erratum - Corrections from last issue Essence 3241
|
|
|
|
Zen What? The ???? ??? 3321
|
|
|
|
[CiSSD] Membership Information Essence 3533
|
|
|
|
[CiSSD] Contact Addresses -- 3563
|
|
|
|
Last Words From the Editor Essence 3619
|
|
|
|
| Credits 3653
|
|
|
|
169092 ]-[bytes]-------------------------------------------[lines]-[ 3677
|
|
|
|
---
|
|
|
|
GETTING REVIVAL!
|
|
|
|
In order to recieve REVIVAL magazine, you may transfer the latest
|
|
issue every second month from the following address:
|
|
|
|
ftp 141.214.4.135 docs/zines/revival/rvlcissd.xxx
|
|
|
|
where 'xxx' is the issue number. ie: 'rvlcissd.003'. If you do not
|
|
have internet access, the following electronic bulletin board systems are
|
|
REVIVAL(!) distribution sites:
|
|
|
|
|
|
=[North America]==============================[+1]=
|
|
|
|
Der Diz - NuKE '93 (208) 343 5038
|
|
WHQ The Downtown Militarized Zone (416) 450 7087
|
|
CHQ The Revolutionary Front (416) 936 6663
|
|
Atomic Nature (416) 477 9563
|
|
Screaming Revulsion (418) 622 9712
|
|
|
|
|
|
---
|
|
|
|
LETTERS TO THE EDITOR
|
|
|
|
|
|
---=[ ANONYMOUS LETTER re: ABUSE IN THE HOME AND SCHOOL ]=---
|
|
(Edited for Clarity)
|
|
|
|
The look at school system as being a negative aspect in kids lives was
|
|
obviously a biased one by a disgruntled teenager who doesn't have the
|
|
ability to look at the whole picture. I'll give you credit for seeing
|
|
the problem as being the parents. The whole problem lies in the homes.
|
|
These so called disceplinary actions at high schools are those a person
|
|
would face in everyday life, so I say GET USED TO IT! And to answer your
|
|
question, it is the parents jobs! It is not the job of a highly trained
|
|
teaching professional to teach common manners in a high school
|
|
enviornment!
|
|
|
|
I would like to point out that the article had many good points and
|
|
the point of parental expectations in school, is an excellent one! I can
|
|
not count the times a parent has come in saying I should be doing a
|
|
better job! Like what[?] Go home and make the damn student do his/her
|
|
homework! I can't make a student do his/her work[.] It's motivation[that
|
|
is needed!] I remember when a good education and having your parents
|
|
proud of you was motivation enough. You'll make a good adult TX[.] I hope
|
|
you remember the things you know now when you have your own kids.
|
|
|
|
P.S
|
|
|
|
- Blame the government [that] we're underfunded and can't afford the
|
|
extra support personel we would all like for the new generation.
|
|
|
|
|
|
--- Editors Response ---
|
|
|
|
You are perfectly right to refer to me as a disgruntled teenager. I
|
|
think, however, that I do have the ability to look at the whole picture..
|
|
I simply chose not to. That was clearly a serious error on my part.
|
|
|
|
I feel that, maybe not the whole problem, but at least a large
|
|
proportion of the problem lies in the homes. A good chunk of the problem
|
|
would be solved if parents made a concious effort to control the
|
|
environmental variables that are in their hands.
|
|
|
|
It is not the teachers responsibility to teach discepline at school,
|
|
but because it seems so neccesary, and because children are so neglected
|
|
in their homes, I feel that the school system, given appropriate
|
|
government funding, should take a different approach to training the
|
|
large majority of students who have no motivation, and little self-
|
|
respect.
|
|
|
|
Although I believe I was reffering to parents expectations of the
|
|
_students_ in my article, it is also very true that parents expectations
|
|
of _teachers_ are also quite ridiculous in many cases. My own mother used
|
|
to always blame my teachers for anything I would do wrong. I allowed her
|
|
to, because I had no reason to want to take the blame myself, but due to
|
|
this long period of time when I took no responsibility, I later had(and
|
|
am still having) trouble disceplining myself to work effeciently, and
|
|
productively. At this stage in my life, most of my school grades are
|
|
borderline failing due, not to any fault of my teachers, but to my own
|
|
lack of motivation, and my own lack of self discepline.
|
|
|
|
I still feel that proud parents, and achievement in school might be
|
|
enough motivation to continue doing well, but it's up to the parents to
|
|
give their children a kick-start at an early age, so that they might
|
|
continue to maintain their pride in achievement later on in life.
|
|
|
|
I still haven't ranked myself as being responsible enough to have
|
|
kids. Maybe when I'm significantly older, or at least, more mentally
|
|
developed, and able to meet the challenges that modern society places on
|
|
parents, I will reconsider. Too many parents, unfortunately, assume
|
|
that bringing up children is easy.
|
|
|
|
Finally (as this is rather a long response), the government should
|
|
indeed be blamed for underfunding. The problems that I continually pick
|
|
at in the educational system would be solved if any one school had a
|
|
complete, full time staff.. including the neccesary teachers,
|
|
councillors, and administrators it takes to help the children who don't
|
|
get a fair shake at home.
|
|
|
|
- Essence/TX
|
|
|
|
|
|
---=[ Split Adrenalyn's LETTER re: REVIVAL #2 ]=---
|
|
|
|
Well, I just finished reading Revival Issue #002 and I have to say
|
|
that it's the best "underground" mag I've EVER read. The articles are
|
|
well written, discussing topics that we all can relate to, the articles
|
|
pose questions which I'm sure many of us have all asked ourselves about
|
|
whatever topic.
|
|
|
|
It's also not the same old underground mag (it doesn't have a whole
|
|
bunch of TEXT files put together into an "issue"), but more of an
|
|
information mag, giving you the insight to the PHAC scene.
|
|
|
|
Good job on this one guys, when's #003 coming?
|
|
|
|
|
|
--- Editors Response ---
|
|
|
|
Well, it's here! Assuming that I'm sticking to any deadlines, the
|
|
magazine will be released on the last saturday of every other month. The
|
|
deadline for submissions by non-CiSSD members to REVIVAL! magazine will
|
|
be two weeks before the release date.
|
|
|
|
Thanks for the glowing compliments. While I doubt they're fully
|
|
deserved, it is true that the magazine is more than a bunch of text
|
|
files. I think that most CiSSD members take a special pride in the
|
|
magazine, as it acts as a forum for us to air our views to the public,
|
|
and the public to air their views to the rest of the public! It is very
|
|
important that we have an appeal to everyone, from some perspective or
|
|
another.. We will continue to be political, and provocative.
|
|
|
|
- Essence/TX
|
|
|
|
|
|
---
|
|
|
|
TELEKOM STUPIDITY REVEALED
|
|
Lister
|
|
|
|
This week's "Research and Technology" section of the German news magazine
|
|
{Focus} (Nr. 17/93, pg. 106) features an *interesting* article about the
|
|
German telephone network.
|
|
|
|
According to the article all you need to tap into another phone line is a
|
|
phone line which is hooked up to a modern digital switch and a simple 16
|
|
key touch tone beeper. The article shows the original TELEKOM beeper. For
|
|
interested users, {Focus} included the TELEKOM reorder number and its
|
|
approval ID.
|
|
|
|
By dialing one of the special "A","B","C" or "D" keys (rightmost column),
|
|
you get acces to TELEKOMs switch testing facilities. After you are in the
|
|
testing system, you have to enter a three-digit switch id. Then enter the
|
|
phone number you wish to call or listen to. If the phone line is busy,
|
|
then just enter "1" and you will have a *forced* three way call.
|
|
|
|
With a modem or any other computer controlled dialing devices it is
|
|
rather simple to find the available switch ids in several hours.
|
|
|
|
Since the testing facility will identify itstelf by sending a rather
|
|
loud test tone, most persons will find out, that there is something
|
|
strange going on, if they are tapped by someone. But there are also
|
|
others that will never take much care about this situation.
|
|
|
|
Isn't it STUPID that TELEKOM apparently has NOT learned anything what
|
|
happend around 20++ years within the USA with the blue/red/ ... boxes
|
|
that gave interested users nice and mostly free features?
|
|
|
|
This time you even do not need any *illegal* devices, but a rather common
|
|
and widely available touch tone beeper give you full control over several
|
|
local switches!
|
|
|
|
As elementary mathematics shows, any additional key to press would lower
|
|
the chance by 1 to 16 to get access to such a testing system. It would
|
|
have been so simple to hide the access code to this system within a
|
|
normal number range. If that number would have been changed regularly,
|
|
then nobody would ever get access to it. But these measures require work,
|
|
and that seems to be hard for a monopoly company!
|
|
|
|
|
|
---
|
|
|
|
POLITICS AND THE HACKER
|
|
The Dictator
|
|
|
|
Everyone reading this magazine has a reason to do it.. for their
|
|
freedom may depend on it. Why, you ask? Because you are dealing with
|
|
the Cyberpunk Realm of fantasy, virtual reality, and revolution. Fantasy
|
|
is apparant with every hacker or cyberpunk reading this article and
|
|
imagining the possibilities of society and technology, working together
|
|
towards perfect harmony--or anarchy, the Virtual Reality of a world where
|
|
no one's money is their own, where people are not more than the sum of
|
|
their words as they flicker past on your screen, where personality is no
|
|
more than who you can impress with your extended vocabulary or "K-Rad
|
|
K00lness."
|
|
|
|
However, another aspect is not so obvious, but it is there, perhaps
|
|
more than any other. We, as hackers, phreakers, cyberpunks etc. have the
|
|
want, the burning desire to change the world into a place that we have
|
|
all had a glimpse of, The 'New World' of the 90's, so to speak.
|
|
|
|
The underground is not a happy place. It is a place where one can
|
|
obtain seemingly endless flows of information, but where one must
|
|
constantly be prepared to show up a counterpart, and to deal with the
|
|
obligations of group affiliation, the backbone of the Underground.
|
|
|
|
It's all for status, for knowledge, for power. But the power,
|
|
ultimately, is for the change of OUR lives, for the change of our ability
|
|
to control what will become of the future. it is SO enticing that we may,
|
|
at times, forget that the methods we use are the methods we have all
|
|
strived to pull away from: Commercialism, and Capitalism. We attempt to
|
|
use all means necessary to amass power, power which will ultimately
|
|
affect our future for the better.
|
|
|
|
We do this by squeezing money, time, and belongings from the average
|
|
citizen, thereby undermining our very goals, for when we have amassed all
|
|
the power required, and are ready to return to normal life, we will be
|
|
forced to deal with the same CyberPunks who were once our allies,
|
|
partners, or even counterparts, thereby, in the end, succombing to the
|
|
realities of our ways, the same realities as Capatalism: the reality that
|
|
there is NO escape.
|
|
|
|
It does NOT have to be that way, however! We have all seen the world
|
|
in which we all work together to further a common cause, to accomplish
|
|
certain tasks. We all know the power of the underground. we all know that
|
|
the power held by each individual, if harnessed, would produce an
|
|
invaluable machine for change.
|
|
|
|
We NEED to pull together. CiSSD has created a group whose purpose lies
|
|
in the free-flow of information, and we consistantly work towards that
|
|
goal. We all know what can be, if we only try. In Toronto, Canada in
|
|
early may, the working class held a march on parliment hill demanding a
|
|
reform. If this was backed by the prowess of every hacker in the
|
|
underground, we would have a message that could be heard EVERYWHERE the
|
|
telephone or computer screen reached!
|
|
|
|
What we need is ORGANIZED REVOLUTION!
|
|
|
|
The Great Dope Man put it best when he remarked that "Deviency is its
|
|
own reward." Whether or not he realised it at the time, this phrase had
|
|
the potential to be the catalyst for the greatest revolution ever
|
|
recorded. Deviency, the art of going against the norms of society, if
|
|
proctised by enough people with enough frequency, WOULD become the norm,
|
|
thereby rewarding all who wished it with an altered standard of living.
|
|
|
|
Now the only way to ensure that this standard of living would be for
|
|
the better, would be to have 'organized deviency' or an ORGANIZED
|
|
REVOLUTION. One in which the entire underground drove for something,
|
|
putting all of our amassed strength against those we hate in society,
|
|
instead of one another. The potential is enormous. We are not limited by
|
|
restrections on what information we can amass, nor on how far this
|
|
information can be destributed. We are not limited as to what aspects of
|
|
this Capatalist world we live in we can gain control of. We CAN make a
|
|
difference! We CAN change our downward plummet into extinction. But a
|
|
CAPATALIST world will never be able to make the changes, as the changes
|
|
would be looked upon as inefficient or irrelevant.
|
|
|
|
|
|
We have the power in our HANDS! We now need only make use of it.
|
|
For we have the reasons, just look into you paper.
|
|
The time is Upon us, we must act. The WORLD calls for a change. It's our
|
|
responsibility, because WE are the only people who can change it.
|
|
|
|
HACKERS, PHREAKERS, CYBERPUNKS OF THE WORLD, UNITE TO BRING ABOUT
|
|
THE NEW WORLD ORDER!
|
|
|
|
|
|
---
|
|
|
|
EMOTIONAL MATURITY, FOURTEEN YEARS OF AGE!
|
|
Essence/TX
|
|
|
|
Most of my articles are provoked by a real life experience that
|
|
leads me to think about a topic from a completely different perspective.
|
|
This one is no different, but I am quite shocked and surprised that I
|
|
haven't seen anyone take my perspective before.. and why?.. Maybe because
|
|
it's a confusing one.
|
|
|
|
I've never been one to base decisions on age. I feel that generally,
|
|
age is an unimportant factor when deciding what privelidges are
|
|
appropriate for each individual. More important than age, is maturity.
|
|
Clearly, when it comes to this, 'The law is an ass'.
|
|
|
|
Canadian law bases emotional maturity on i) age and ii) chasteness
|
|
of character. More notably, the law states that any female, fourteen
|
|
years or older, who has not previously been of chaste character, is
|
|
emotionally mature enough to make the decision to have sex. In plain
|
|
english, this means that any girl age fourteen who acts like a whore can
|
|
be taken advantage of. Any girl age fourteen who acts decently is not
|
|
mature enough to have sex. Having sex with any girl age 14 to 18
|
|
inclusive who has behaved decently and with self respect, is rape.
|
|
|
|
Despite all the complaints about males having to worry about rape
|
|
charges, whether or not they rape a girl, I think the laws pertaining to
|
|
rape are particularily flacid, and weak. There are clauses that shift the
|
|
responsibility of rape onto the victim females if the male can show the
|
|
female to have 'provoked' the incident. Are we in a day and age where sex
|
|
is so important that the male partner can't even take the time to be
|
|
reasonably sure about the emotional stability, and maturity of his
|
|
partner?
|
|
|
|
Any guy who justifies his sexual activities by rattling off
|
|
sex-laws, and how they pertain to his case, should be removed from our
|
|
society. We don't need the inconsiderate. We don't need the low-lifes.
|
|
|
|
|
|
- Essence/TX
|
|
|
|
---
|
|
|
|
CYBERPUNK!
|
|
The Dictator
|
|
|
|
The following article was featured in TIME magazine. I felt it was
|
|
an accurate portrayal of cyberpunks in the computer underground
|
|
community.
|
|
|
|
BEGIN _|
|
|
|
|
In the 50s it was the beatniks, staging a coffehouse rebellion against
|
|
the conformity of America in the Eisenhower era. In the 60s the Hippies
|
|
arrived, combining anti-war activism with the energy of Sex, Drugs, and
|
|
Rock'N'Roll. Now a new subculture is bubbling up from the underground,
|
|
popping up from computer screens around the world like a piece of
|
|
hypertext.
|
|
|
|
It's called CYBERPUNK, a late - 20th centure term derived from
|
|
CYBERNETICS, the science of communication and control, and PUNK, an
|
|
antisocial rebel or hoodlum.
|
|
|
|
Within this odd pairing lurks the essence of CYBERPUNK's international
|
|
culture: a way of looking at the world that combines infatuation with
|
|
high-tech tools and disdain for conventional ways of using them.
|
|
|
|
Origionally applied to a school of hard-boiled science-fiction writers
|
|
and then to certain semi-tough computer hackers, the word CYBERPUNK now
|
|
covers a broad range of music, art, psychedelics, smart drugs and
|
|
cutting-edge technology, as well as the computer hacker who laboriously
|
|
tries to put this new subculture to work. I have heard CYBERPUNK called
|
|
everything from "Technology with an Attitude" (Stewart Brand, Whole Earth
|
|
Catalog) to "An unholy alliance of the technical world with the
|
|
underground of pop culture and street-level anarchy" (Bruce Sterling,
|
|
Science-Fiction writer).
|
|
|
|
As in any counterculture movement, some denziens would deny they are
|
|
part of a movement at all. Although the largest CYBERPUNK journal (PUNK!
|
|
Magazine) claims to have a readership of 70 000, there are probably no
|
|
more than a few thousand computer hackers, futurists, phreakers,
|
|
computer-savvy artists and musicians, and assorted science-fiction
|
|
'geeks' on the planet who would actually call themselfes CYBERPUNKS.
|
|
|
|
Nevertheless, this may be the defining counterculture of the computer
|
|
age. It embraces, in spirit at least, not just the nearest
|
|
thirtysomething hacker hunched over a terminal, but also nose-ringed
|
|
twentysomethings gathered at clandestine RAVES, teenagers who feel about
|
|
the Amiga the way their parents felt about records, and even
|
|
preadolescent VIDKIDS fused to their SNES and Genesis games -- the
|
|
training of CYBERPUNK.
|
|
|
|
Obsessed with technology, CYBERPUNKS are future-oriented to a fault.
|
|
CYBERPUNKS already have one foot in the 21st century, certain that in the
|
|
long run, everyone will be a CYBERPUNK.
|
|
|
|
The CYBERPUNK look, a kind of science-fiction surrealism tweaked by
|
|
computer graphics, is finding its way into art galleries, music videos,
|
|
and Hollywood movies. CYBERPUNK magazines, many cheaply published or
|
|
distributed by electronic medium, are multiplying like cable-TV channels.
|
|
CYBERPUNK music is hot enough to keep several record companies and scores
|
|
of bands cranking out CD's. CYBERPUNK oriented books are snatched up as
|
|
soon as they hit the market. And CYBERPUNK films like BLADERUNNER,
|
|
ROBOCOP, VIDEODROME, TOTAL RECALL, TERMINATOR 2 and THE LAWNMOWER MAN
|
|
have moved out of the cult market and into the mainstream.
|
|
|
|
In the US (and therefore Canada), CYBERPUNK culture is likely to get a
|
|
boost from of all things, the Clinton Administartion, due to his intrest
|
|
in the US's "Data Highways" and what the CYBERPUNKS refer to as
|
|
CYBERSPACE. Both terms refer to the globe-circling, interconnected
|
|
telephone network that is the conduit for billions of voice, fax, and
|
|
data transmissions. This huge CYBERSPACE, the INTERNET, stretches across
|
|
the atlantic, touching down in Iceland, and western Europe, then on to
|
|
Japan, South Korea, Indonesia, Australia and New Zealand. CYBERPUNKS look
|
|
at the wires from the inside; and talk of the network as if it were an
|
|
actual place, a virtual reality that can be entered, explored, and
|
|
manipulated.
|
|
|
|
CYBERSPACE playes a major role in the CYBERPUNK world view. The
|
|
literature is filled with 'Console Cowboys' who prove themselves by
|
|
donning virtual realitry gear and performing heroic feats in the imagery
|
|
'matrix' of CYBERSPACE. "CYBERPUNK", a 1991 book, features profiles of
|
|
three canonical CYBERPUNK hackers, including Robert Morris, the Cornell
|
|
University student whose computer virus brought the entire INTERNET to a
|
|
halt in 1988.
|
|
|
|
However, CYBERSPACE is more than a playground. It's a medium. Every
|
|
night on GEnie, Compuserve, and thousands of smaller BBSes, people by the
|
|
hundreds of thousands are logging on to a great computer-mediated
|
|
talkfest, an interactive debate that allows them to leap over barriers of
|
|
time, place nationality, sex, and social status.
|
|
|
|
Most computer users are content to visit cyberspace now and then, but
|
|
the CYBERPUNK goes there to live, and play, and even DIE. the WELL (Whole
|
|
Earth 'lectronic Link), an INTERNET site, was shaken 2 1/2 years ago when
|
|
one of its most active participants ran a program that erased every
|
|
message he had ever left - it involved thousands of posts - an act that
|
|
amounted to virtual suicide. A few weeks later he committed suicide for
|
|
real.
|
|
|
|
The WELL has been a magnet for CYBERPUNK thinkers, and the question
|
|
is, is there a CYBERPUNK movement? The WELL launched a freewheeling
|
|
campeign that ran for months and filled more than 300 pages of text. The
|
|
debate yielded, among other things, a concise list of wants of the
|
|
CYBERPUNK movement:
|
|
|
|
INFORMATION WANTS TO BE FREE. A good piece of information will
|
|
eventually get into the hands of thouse who can make the best use of it,
|
|
despite the best efforts of censors, copyright lawyers and the secret
|
|
service.
|
|
|
|
ALWAYS YIELD TO THE HANDS-ON IMPERATIVE. CYBERPUNKS maintain that they
|
|
can run the world for the better, if they can only get there hands on the
|
|
control box.
|
|
|
|
PROMOTE CENTRALIZATION. Society is splintering into hundreds of
|
|
subcultures and designer cults, which is a no-no.
|
|
|
|
'SURF THE EDGES'. When the world is changing by the nanosecond, the
|
|
best way to keep your head above the water is to stay at the front end of
|
|
the Zeitgeist.
|
|
|
|
|
|
For CYBERPUNKS, pondering history is not so important as coming to
|
|
terms with the future. For all the flaws, they have found ways to live
|
|
with technology, to make it theirs, something the back-to-the-land
|
|
hippies never accomplished. CYBERPUNKS use the technology to bridge the
|
|
gulf between art and science, between the world of literature and the
|
|
world of industry. Most of all, CYBERPUNKS realize that if you didn't
|
|
control technology, it would eventually control you. It is a lesson that
|
|
will serve CYBERPUNKS - and the rest of the world - well into the next
|
|
century.
|
|
|
|
|~ END
|
|
---
|
|
|
|
LASERPRINTER FORGERY
|
|
Kryten
|
|
|
|
Most of us remember those pre-historic typewriter things. If you do then
|
|
the correction key that some models had was your best friend, and can
|
|
be your best friend again. That is the correctable (carbon film) ribbon.
|
|
The manual warned against using this ribbon for typing legal documents
|
|
because undetectable alterations would be too easy.
|
|
|
|
Recently I heard a taped interview with Frank Abagnale, a reformed forger
|
|
who now advises companies on fraud prevention. It was a quite an
|
|
interesting cassette. This is where I tie in my first paragraph.
|
|
|
|
Abagnale said that output from most laserprinters and photocopiers can be
|
|
removed in a similar manner with correction tape because the toner
|
|
powder, like carbon film ribbon, only sits on the surface of the paper
|
|
but does not impregnate the fibers. I tried it and he's right.
|
|
|
|
---
|
|
|
|
CALLER ID INFORMATION AND SPECIFICATIONS
|
|
Lister
|
|
|
|
I know this information may be regarded as old hat, and that it's
|
|
not very sensitive in nature; but it makes an interesting read
|
|
nonetheless. Hopefully, it will shed a bit of insight as to the inner
|
|
workings of Caller ID.
|
|
|
|
|
|
INTRODUCTION
|
|
|
|
Calling Number Delivery (CND), better known as Caller ID, is a
|
|
telephone service intended for residential and small business
|
|
customers. It allows the called Customer Premises Equipment
|
|
(CPE) to receive a calling party's directory number and the date
|
|
and time of the call during the first 4 second silent interval in
|
|
the ringing cycle. The customer must contact a Bellcore Client
|
|
Company to initiate CND service.
|
|
|
|
According to Pacific Bell representatives, the following states
|
|
and district currently support CND service: Delaware, District
|
|
of Columbia, Florida, Georgia, Idaho, Kentucky, Louisiana, Maine,
|
|
Maryland, Nebraska, Nevada, New Jersey, Oklahoma, Tennessee,
|
|
Vermont, Virginia, and West Virginia.
|
|
|
|
The following states are scheduled to support CND service by
|
|
April, 1992: Alaska, Arizona, California, Colorado, Illinois,
|
|
Indiana, Iowa, Massachusetts, Mississippi, New Hampshire, New
|
|
York, North Carolina, North Dakota, Ohio, Oregon, Rhode Island,
|
|
and South Carolina.
|
|
|
|
PARAMETERS
|
|
|
|
The data signalling interface has the following characteristics:
|
|
|
|
Link Type 2-wire, simplex
|
|
Transmission Scheme Analog, phase-coherent FSK
|
|
Logical 1 (mark) 1200 +/- 12 Hz
|
|
Logical 0 (space) 2200 +/- 22 Hz
|
|
Transmission Rate 1200 bps
|
|
Transmission Level 13.5 +/- dBm into 900 ohm load
|
|
|
|
PROTOCOL
|
|
|
|
The protocol uses 8-bit data words (bytes), each bounded by a
|
|
start bit and a stop bit. The CND message uses the Single Data
|
|
Message format shown below.
|
|
|
|
Channel Carrier Message Message Data Checksum
|
|
Seizure Signal Type Length Word(s) Word
|
|
Signal Word Word
|
|
|
|
CHANNEL SEIZURE SIGNAL
|
|
|
|
The channel seizure is 30 continuous bytes of 55h (01010101)
|
|
providing a detectable alternating function to the CPE (i.e. the
|
|
modem data pump).
|
|
|
|
CARRIER SIGNAL
|
|
|
|
The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to
|
|
condition the receiver for data.
|
|
|
|
MESSAGE TYPE WORD
|
|
|
|
The message type word indicates the service and capability
|
|
associated with the data message. The message type word for CND
|
|
is 04h (00000100).
|
|
|
|
MESSAGE LENGTH WORD
|
|
|
|
The message length word specifies the total number of data words
|
|
to follow.
|
|
|
|
DATA WORDS
|
|
|
|
The data words are encoded in ASCII and represent the following
|
|
information:
|
|
|
|
o The first two words represent the month
|
|
o The next two words represent the day of the month
|
|
o The next two words represent the hour in local military time
|
|
o The next two words represent the minute after the hour
|
|
o The calling party's directory number is represented by the
|
|
remaining words in the data word field
|
|
|
|
If the calling party's directory number is not available to the
|
|
terminating central office, the data word field contains an ASCII
|
|
"O". If the calling party invokes the privacy capability, the
|
|
data word field contains an ASCII "P".
|
|
|
|
CHECKSUM WORD
|
|
|
|
The Checksum Word contains the twos complement of the modulo 256
|
|
sum of the other words in the data message (i.e., message type,
|
|
message length, and data words). The receiving equipment may
|
|
calculate the modulo 256 sum of the received words and add this
|
|
sum to the reveived checksum word. A result of zero generally
|
|
indicates that the message was correctly received. Message
|
|
retransmission is not supported.
|
|
|
|
EXAMPLE CND SINGLE DATA MESSAGE
|
|
|
|
An example of a received CND message, beginning with the message
|
|
type word, follows:
|
|
|
|
04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51
|
|
|
|
04h= Calling number delivery information code (message type
|
|
word)
|
|
|
|
12h= 18 decimal; Number of data words (date,time, and directory
|
|
number words)
|
|
|
|
ASCII 30,39= 09;
|
|
September
|
|
|
|
ASCII 33,30= 30;
|
|
30th day
|
|
|
|
ASCII 31,32= 12;
|
|
12:00 PM
|
|
|
|
ASCII 32,34= 24;
|
|
24 minutes (i.e., 12:24 PM)
|
|
|
|
ASCII 36,30,39,35,35,35,31,32,31,32= 6095551212;
|
|
calling party's directory number (609) 555-1212
|
|
|
|
51h= Checksum Word
|
|
|
|
DATA ACCESS ARRANGEMENT (DAA) REQUIREMENTS
|
|
|
|
To receive CND information, the modem monitors the phone line
|
|
between the first and second ring bursts without causing the DAA
|
|
to go off hook in the conventional sense, which would inhibit the
|
|
transmission of CND by the local central office. A simple
|
|
modification to an existing DAA circuit easily accomplishes the
|
|
task.
|
|
|
|
MODEM REQUIREMENTS
|
|
|
|
Although the data signalling interface parameters match those of
|
|
a Bell 202 modem, the receiving CPE need not be a Bell 202
|
|
modem. A V.23 1200 bps modem receiver may be used to demodulate
|
|
the Bell 202 signal. The ring indicate bit (RI) may be used on a
|
|
modem to indicate when to monitor the phone line for CND
|
|
information. After the RI bit sets, indicating the first ring
|
|
burst, the host waits for the RI bit to reset. The host then
|
|
configures the modem to monitor the phone line for CND
|
|
information.
|
|
|
|
According to Bellcore specifications, CND signalling starts as
|
|
early as 300 mS after the first ring burst and ends at least 475
|
|
mS before the second ring burst
|
|
|
|
APPLICATIONS
|
|
|
|
Modem manufacturers will soon be implementing new modem features
|
|
based on CND information as this service becomes widely
|
|
available.
|
|
|
|
Once CND information is received the user may process the
|
|
information in a number of ways.
|
|
|
|
1. The date, time, and calling party's directory number can be
|
|
displayed.
|
|
|
|
2. Using a look-up table, the calling party's directory number
|
|
can be correlated with his or her name and the name
|
|
displayed.
|
|
|
|
3. CND information can also be used in additional ways such as
|
|
for:
|
|
|
|
a. Bulletin board applications
|
|
b. Black-listing applications
|
|
c. Keeping logs of system user calls, or
|
|
d. Implementing a telemarketing data base
|
|
|
|
REFERENCES
|
|
|
|
For more information on Calling Number Delivery (CND), refer to
|
|
Bellcore publications TR-TSY-000030 and TR-TSY-000031.
|
|
|
|
|
|
---
|
|
|
|
|
|
THE DIATRIBES OF GRAPPLING
|
|
The Grappler
|
|
|
|
"My non-existence never bothered me before I was born."
|
|
|
|
Grappler Speaks:
|
|
|
|
From the electronic wilderness, As I look down upon the scene with
|
|
dismay a question formulates within the depths of my conscious reasoning:
|
|
What the hell is going on? All I see is the senseless leeching of text
|
|
files, etc. So you've got all this info on pbx, freemasonry, virus's,
|
|
etc. but what good is it if it only ends up on some disk, never to be
|
|
read again? What are we really trying to accomplish here? I mean so
|
|
what if you can call long distance for free via some pbx if you only use
|
|
that pbx to call your friends, etc. Do you think that BELL really cares
|
|
if you hack someone's calling card? They only benifet from the average
|
|
phreaks activities and you are just playing into their game, and they
|
|
only tend to prosecute when activities get out of hand and the customer
|
|
catches on that some 15 yr. old computer devotee just charged $1000 on
|
|
his/her calling card.
|
|
|
|
What is the gain in this situation? The only winning party is Bell
|
|
and no one besides! This brings me to my point, everything you do must
|
|
be oriented towards a specific goal by which you as a person will profit
|
|
by. Now when I say profit, I am not just referring to the materialistic
|
|
sense of the word, I am also talking about the spiritual and emotional
|
|
aspects of this as well.
|
|
|
|
One of the #1 rules of Grappling is:
|
|
|
|
"Strive for the Infinite in all that you do."
|
|
|
|
|
|
It is upon this law that all of grappling hangs so therefore we can
|
|
say that it is a solid foundation upon which to build from. Now what this
|
|
means is that in order to get anywhere in this lifetime, one must be
|
|
prepared to always sacrifice the lower for the higher. One must
|
|
carefully weigh every move and make sure that any actions will not be a
|
|
regression to any previous plane of existence. A classic demonstration
|
|
of this principle is as follows: (Fantasy)
|
|
|
|
You sign a pact with the devil which states that he will provide you
|
|
with 1 million dollars in exchange for your soul. You being an average
|
|
person consent, you end up spending all of the money within a years time
|
|
and going broke. With this abrupt end to your material wealth comes the
|
|
sudden realization that you have nothing left to sell.
|
|
|
|
So as you can see, as illustrated above one must always ascend the
|
|
planes and never ever move down as you may end up stuck there!
|
|
|
|
Now I realize that the illustration above is not a very good example
|
|
of how one may apply this theory to everyday living but I think that you
|
|
get the gist of it. (I hope)
|
|
|
|
I believe that our time on earth is far too limited and we must take
|
|
advantage of every single second that we are alive. Conformity is for the
|
|
weak and those who fall into society 's trap are as lambs to the
|
|
slaughter. By this I am not saying that one must deliberatley go out and
|
|
break the law but what I am saying is that if you always play according
|
|
to societies rules then you are just wasting time. Let's look at the
|
|
average persons life:
|
|
|
|
birth -> school -> marriage/kids -> job -> death.
|
|
|
|
Now this is not necessarily in the stated order and there may be
|
|
some deviancy from this projection but not by any significant margin. So
|
|
as you can see nothing that the average person does is really of any
|
|
importance other than the obvious procreation bit. Now you may object to
|
|
this statement and if you do then I welcome a debate but if you look at
|
|
this from an unbiased viewpoint and step out of the confines of everyday
|
|
thinking you will come to realize that the only thing that really matters
|
|
in the end is death. This is a rather morbid statement but if you think
|
|
about it: Death is a fact of life and therefore something which must be
|
|
confronted everyday, death makes everything that we do irrelevant and in
|
|
the end the average joe's life has amounted to a 15 minute eulogy that no
|
|
one really cares about anyway. So you may be right now sitting before
|
|
your computer screen with a look of "what the fuck is going on here, this
|
|
guy is baked!". How does this pertain to you or fit into the context of
|
|
this article? Well I'll tell you: What I am trying to do with this
|
|
article is to make you analyze things very acutely, I want you to
|
|
scrutinize every action you take from this point forward, and realize
|
|
that any action that you do take should be in conformance with your own
|
|
will. If you commit an action against your own personal will then you
|
|
are stepping back into the chaos that is society and well on your way to
|
|
becoming a slave.
|
|
|
|
"Your all a bunch of FUCKING SLAVES!"
|
|
*Jim Morrison
|
|
|
|
So applying this to computers and the point of this article, it's
|
|
all fine and dandy to download thousands of text files on HPACV but is
|
|
this all that the scene is about? Are we merely content with this? I
|
|
for one am not and actively utilize my HPACV knowledge to attain
|
|
information that the average person is not even aware exists. Why let
|
|
those in control reap the rewards of the slavedog morality which is
|
|
society when you can have a piece of the pie to? Computers practically
|
|
run the world or at least play a sizeable role in wordly affairs and
|
|
therefore it would be safe to assume that if you own one then you
|
|
probably have access to the same. Organization is the key and that is
|
|
why I have recently applied to CiSSD in the hopes that membership will
|
|
raise me up to bigger and better things as opposed to just being a
|
|
spectator as most are.
|
|
|
|
Now, I have noticed that there is alot of interest in conspiracy
|
|
among the members of the local boards, well so what if there is a
|
|
conspiracy because what can we really do about it if there is? Awareness
|
|
is only 1/8 of the big picture, what I am saying is that why not create
|
|
your own conspiracies?
|
|
|
|
|
|
"I don't know about you but I'm gonna have my kicks before the
|
|
whole shithouse goes up in flames man!"
|
|
*Jim Morrison
|
|
|
|
|
|
I feel that I have rambled on incoherently long enough, I know this
|
|
article has jumped around alot but that is merely a reflection of my
|
|
frustrated state of mind. I feel very strongly about all that I have
|
|
said and will accept with open arms any criticisms, flak, etc for these
|
|
views. I have chosen to embrace this life with unbending determination
|
|
to achieve something of significance, have you? This ends the diatribe.
|
|
|
|
---
|
|
|
|
PRIVACY, LINE TAPS AND THE US GOVERNMENT
|
|
Lister
|
|
|
|
Here guys (and gals), this is a nice little article by Dorothy Denning,
|
|
and it may be of interest to you. Quite a frightening prospect if you'd
|
|
ask me...
|
|
|
|
BEGIN __|
|
|
|
|
Subject: THE CLIPPER CHIP: A TECHNICAL SUMMARY
|
|
Date: 19 Apr 93 18:23:27 -0400
|
|
Organization: Georgetown University
|
|
|
|
|
|
The following document summarizes the Clipper Chip, how it is used,
|
|
how programming of the chip is coupled to key generation and the
|
|
escrow process, and how law enforcement decrypts communications.
|
|
|
|
Since there has been some speculation on this news group about my
|
|
own involvement in this project, I'd like to add that I was not in any
|
|
way involved. I found out about it when the FBI briefed me on Thursday
|
|
evening, April 15. Since then I have spent considerable time talking
|
|
with the NSA and FBI to learn more about this, and I attended the NIST
|
|
briefing at the Department of Commerce on April 16. The document
|
|
below is the result of that effort.
|
|
|
|
|
|
Dorothy Denning
|
|
|
|
|
|
THE CLIPPER CHIP: A TECHNICAL SUMMARY
|
|
Dorothy Denning
|
|
April 19, 1993
|
|
|
|
|
|
INTRODUCTION
|
|
|
|
On April 16, the President announced a new initiative that will bring
|
|
together the Federal Government and industry in a voluntary program to
|
|
provide secure communications while meeting the legitimate needs of
|
|
law enforcement. At the heart of the plan is a new tamper-proof
|
|
encryption chip called the "Clipper Chip" together with a split-key
|
|
approach to escrowing keys. Two escrow agencies are used, and the key
|
|
parts from both are needed to reconstruct a key.
|
|
|
|
CHIP STRUCTURE
|
|
|
|
The Clipper Chip contains a classified 64-bit block encryption
|
|
algorithm called "Skipjack." The algorithm uses 80 bit keys (compared
|
|
with 56 for the DES) and has 32 rounds of scrambling (compared with 16
|
|
for the DES). It supports all 4 DES modes of operation. Throughput
|
|
is 16 Mbits a second.
|
|
|
|
Each chip includes the following components:
|
|
|
|
the Skipjack encryption algorithm
|
|
F, an 80-bit family key that is common to all chips
|
|
N, a 30-bit serial number
|
|
U, an 80-bit secret key that unlocks all messages encrypted with the
|
|
chip.
|
|
|
|
ENCRYPTING WITH THE CHIP
|
|
|
|
To see how the chip is used, imagine that it is embedded in the AT&T
|
|
telephone security device (as it will be). Suppose I call someone and
|
|
we both have such a device. After pushing a button to start a secure
|
|
conversation, my security device will negotiate a session key K with
|
|
the device at the other end (in general, any method of key exchange
|
|
can be used). The key K and message stream M (i.e., digitized voice)
|
|
are then fed into the Clipper Chip to produce two values:
|
|
|
|
E[M; K], the encrypted message stream, and
|
|
E[E[K; U] + N; F], a law enforcement block.
|
|
|
|
The law enforcement block thus contains the session key K encrypted
|
|
under the unit key U concatenated with the serial number N, all
|
|
encrypted under the family key F.
|
|
|
|
CHIP PROGRAMMING AND ESCROW
|
|
|
|
All Clipper Chips are programmed inside a SCIF (secure computer
|
|
information facility), which is essentially a vault. The SCIF
|
|
contains a laptop computer and equipment to program the chips. About
|
|
300 chips are programmed during a single session. The SCIF is located
|
|
at Mikotronx.
|
|
|
|
At the beginning of a session, a trusted agent from each of the two
|
|
key escrow agencies enters the vault. Agent 1 enters an 80-bit value
|
|
S1 into the laptop and agent 2 enters an 80-bit value S2. These values
|
|
serve as seeds to generate keys for a sequence of serial numbers.
|
|
|
|
To generate the unit key for a serial number N, the 30-bit value N is
|
|
first padded with a fixed 34-bit block to produce a 64-bit block N1.
|
|
S1 and S2 are then used as keys to triple-encrypt N1, producing a
|
|
64-bit block R1:
|
|
|
|
R1 = E[D[E[N1; S1]; S2]; S1] .
|
|
|
|
Similarly, N is padded with two other 34-bit blocks to produce N2 and
|
|
N3, and two additional 64-bit blocks R2 and R3 are computed:
|
|
|
|
R2 = E[D[E[N2; S1]; S2]; S1]
|
|
R3 = E[D[E[N3; S1]; S2]; S1] .
|
|
|
|
R1, R2, and R3 are then concatenated together, giving 192 bits. The
|
|
first 80 bits are assigned to U1 and the second 80 bits to U2. The
|
|
rest are discarded. The unit key U is the XOR of U1 and U2. U1 and
|
|
U2 are the key parts that are separately escrowed with the two escrow
|
|
agencies.
|
|
|
|
As a sequence of values for U1, U2, and U are generated, they are
|
|
written onto three separate floppy disks. The first disk contains a
|
|
file for each serial number that contains the corresponding key part
|
|
U1. The second disk is similar but contains the U2 values. The third
|
|
disk contains the unit keys U. Agent 1 takes the first disk and agent
|
|
2 takes the second disk. The third disk is used to program the chips.
|
|
After the chips are programmed, all information is discarded from the
|
|
vault and the agents leave. The laptop may be destroyed for
|
|
additional assurance that no information is left behind.
|
|
|
|
The protocol may be changed slightly so that four people are in the
|
|
room instead of two. The first two would provide the seeds S1 and S2,
|
|
and the second two (the escrow agents) would take the disks back to
|
|
the escrow agencies.
|
|
|
|
The escrow agencies have as yet to be determined, but they will not be
|
|
the NSA, CIA, FBI, or any other law enforcement agency. One or both
|
|
may be independent from the government.
|
|
|
|
LAW ENFORCEMENT USE
|
|
|
|
When law enforcement has been authorized to tap an encrypted line,
|
|
they will first take the warrant to the service provider in order to
|
|
get access to the communications line. Let us assume that the tap is
|
|
in place and that they have determined that the line is encrypted with
|
|
Clipper. They will first decrypt the law enforcement block with the
|
|
family key F. This gives them E[K; U] + N. They will then take a
|
|
warrant identifying the chip serial number N to each of the key escrow
|
|
agents and get back U1 and U2. U1 and U2 are XORed together to
|
|
produce the unit key U, and E[K; U] is decrypted to get the session
|
|
key K. Finally the message stream is decrypted. All this will be
|
|
accomplished through a special black box decoder operated by the FBI.
|
|
|
|
ACKNOWLEDGMENT AND DISTRIBUTION NOTICE. All information is based on
|
|
information provided by NSA, NIST, and the FBI. Permission to
|
|
distribute this document is granted.
|
|
|
|
|
|
|~~ END
|
|
|
|
|
|
BEGIN |__
|
|
|
|
THE WHITE HOUSE
|
|
Office of the Press Secretary
|
|
|
|
For Immediate Release April 16, 1993
|
|
|
|
STATEMENT BY THE PRESS SECRETARY
|
|
|
|
The President today announced a new initiative that will bring the
|
|
Federal Government together with industry in a voluntary program to
|
|
improve the security and privacy of telephone communications while
|
|
meeting the legitimate needs of law enforcement.
|
|
|
|
The initiative will involve the creation of new products to accelerate
|
|
the development and use of advanced and secure telecommunications
|
|
networks and wireless communications links.
|
|
|
|
For too long there has been little or no dialogue between our private
|
|
sector and the law enforcement community to resolve the tension
|
|
between economic vitality and the real challenges of protecting
|
|
Americans. Rather than use technology to accommodate the sometimes
|
|
competing interests of economic growth, privacy and law enforcement,
|
|
previous policies have pitted government against industry and the
|
|
rights of privacy against law enforcement.
|
|
|
|
Sophisticated encryption technology has been used for years to protect
|
|
electronic funds transfer. It is now being used to protect electronic
|
|
mail and computer files. While encryption technology can help
|
|
Americans protect business secrets and the unauthorized release of
|
|
personal information, it also can be used by terrorists, drug dealers,
|
|
and other criminals.
|
|
|
|
A state-of-the-art microcircuit called the "Clipper Chip" has been
|
|
developed by government engineers. The chip represents a new approach
|
|
to encryption technology. It can be used in new, relatively
|
|
inexpensive encryption devices that can be attached to an ordinary
|
|
telephone. It scrambles telephone communications using an encryption
|
|
algorithm that is more powerful than many in commercial use today.
|
|
|
|
This new technology will help companies protect proprietary
|
|
information, protect the privacy of personal phone conversations and
|
|
prevent unauthorized release of data transmitted electronically. At
|
|
the same time this technology preserves the ability of federal, state
|
|
and local law enforcement agencies to intercept lawfully the phone
|
|
conversations of criminals.
|
|
|
|
A "key-escrow" system will be established to ensure that the "Clipper
|
|
Chip" is used to protect the privacy of law-abiding Americans. Each
|
|
device containing the chip will have two unique "keys," numbers that
|
|
will be needed by authorized government agencies to decode messages
|
|
encoded by the device. When the device is manufactured, the two keys
|
|
will be deposited separately in two "key-escrow" data bases that will
|
|
be established by the Attorney General. Access to these keys will be
|
|
limited to government officials with legal authorization to conduct a
|
|
wiretap.
|
|
|
|
The "Clipper Chip" technology provides law enforcement with no new
|
|
authorities to access the content of the private conversations of
|
|
Americans.
|
|
|
|
To demonstrate the effectiveness of this new technology, the Attorney
|
|
General will soon purchase several thousand of the new devices. In
|
|
addition, respected experts from outside the government will be
|
|
offered access to the confidential details of the algorithm to assess
|
|
its capabilities and publicly report their findings.
|
|
|
|
The chip is an important step in addressing the problem of
|
|
encryption's dual-edge sword: encryption helps to protect the privacy
|
|
of individuals and industry, but it also can shield criminals and
|
|
terrorists. We need the "Clipper Chip" and other approaches that can
|
|
both provide law-abiding citizens with access to the encryption they
|
|
need and prevent criminals from using it to hide their illegal
|
|
activities. In order to assess technology trends and explore new
|
|
approaches (like the key-escrow system), the President has directed
|
|
government agencies to develop a comprehensive policy on encryption
|
|
that accommodates:
|
|
|
|
-- the privacy of our citizens, including the need to
|
|
employ voice or data encryption for business purposes;
|
|
|
|
-- the ability of authorized officials to access telephone
|
|
calls and data, under proper court or other legal
|
|
order, when necessary to protect our citizens;
|
|
|
|
-- the effective and timely use of the most modern
|
|
technology to build the National Information
|
|
Infrastructure needed to promote economic growth and
|
|
the competitiveness of American industry in the global
|
|
marketplace; and
|
|
|
|
-- the need of U.S. companies to manufacture and export
|
|
high technology products.
|
|
|
|
The President has directed early and frequent consultations with
|
|
affected industries, the Congress and groups that advocate the privacy
|
|
rights of individuals as policy options are developed.
|
|
|
|
The Administration is committed to working with the private sector to
|
|
spur the development of a National Information Infrastructure which
|
|
will use new telecommunications and computer technologies to give
|
|
Americans unprecedented access to information. This infrastructure of
|
|
high-speed networks ("information superhighways") will transmit video,
|
|
images, HDTV programming, and huge data files as easily as today's
|
|
telephone system transmits voice.
|
|
|
|
Since encryption technology will play an increasingly important role
|
|
in that infrastructure, the Federal Government must act quickly to
|
|
develop consistent, comprehensive policies regarding its use. The
|
|
Administration is committed to policies that protect all Americans'
|
|
right to privacy while also protecting them from those who break the
|
|
law.
|
|
|
|
Further information is provided in an accompanying fact sheet. The
|
|
provisions of the President's directive to acquire the new encryption
|
|
technology are also available.
|
|
|
|
For additional details, call Mat Heyman, National Institute of
|
|
Standards and Technology, (301) 975-2758.
|
|
|
|
---------------------------------
|
|
|
|
QUESTIONS AND ANSWERS ABOUT THE CLINTON ADMINISTRATION'S
|
|
TELECOMMUNICATIONS INITIATIVE
|
|
|
|
Q: Does this approach expand the authority of government
|
|
agencies to listen in on phone conversations?
|
|
|
|
A: No. "Clipper Chip" technology provides law enforcement with
|
|
no new authorities to access the content of the private
|
|
conversations of Americans.
|
|
|
|
Q: Suppose a law enforcement agency is conducting a wiretap on
|
|
a drug smuggling ring and intercepts a conversation
|
|
encrypted using the device. What would they have to do to
|
|
decipher the message?
|
|
|
|
A: They would have to obtain legal authorization, normally a
|
|
court order, to do the wiretap in the first place. They
|
|
would then present documentation of this authorization to
|
|
the two entities responsible for safeguarding the keys and
|
|
obtain the keys for the device being used by the drug
|
|
smugglers. The key is split into two parts, which are
|
|
stored separately in order to ensure the security of the key
|
|
escrow system.
|
|
|
|
Q: Who will run the key-escrow data banks?
|
|
|
|
A: The two key-escrow data banks will be run by two independent
|
|
entities. At this point, the Department of Justice and the
|
|
Administration have yet to determine which agencies will
|
|
oversee the key-escrow data banks.
|
|
|
|
Q: How strong is the security in the device? How can I be sure
|
|
how strong the security is?
|
|
|
|
A: This system is more secure than many other voice encryption
|
|
systems readily available today. While the algorithm will
|
|
remain classified to protect the security of the key escrow
|
|
system, we are willing to invite an independent panel of
|
|
cryptography experts to evaluate the algorithm to assure all
|
|
potential users that there are no unrecognized
|
|
vulnerabilities.
|
|
|
|
Q: Whose decision was it to propose this product?
|
|
|
|
A: The National Security Council, the Justice Department, the
|
|
Commerce Department, and other key agencies were involved in
|
|
this decision. This approach has been endorsed by the
|
|
President, the Vice President, and appropriate Cabinet
|
|
officials.
|
|
|
|
Q: Who was consulted? The Congress? Industry?
|
|
|
|
A: We have on-going discussions with Congress and industry on
|
|
encryption issues, and expect those discussions to intensify
|
|
as we carry out our review of encryption policy. We have
|
|
briefed members of Congress and industry leaders on the
|
|
decisions related to this initiative.
|
|
|
|
Q: Will the government provide the hardware to manufacturers?
|
|
|
|
A: The government designed and developed the key access
|
|
encryption microcircuits, but it is not providing the
|
|
microcircuits to product manufacturers. Product
|
|
manufacturers can acquire the microcircuits from the chip
|
|
manufacturer that produces them.
|
|
|
|
Q: Who provides the "Clipper Chip"?
|
|
|
|
A: Mykotronx programs it at their facility in Torrance,
|
|
California, and will sell the chip to encryption device
|
|
manufacturers. The programming function could be licensed
|
|
to other vendors in the future.
|
|
|
|
Q: How do I buy one of these encryption devices?
|
|
|
|
A: We expect several manufacturers to consider incorporating
|
|
the "Clipper Chip" into their devices.
|
|
|
|
Q: If the Administration were unable to find a technological
|
|
solution like the one proposed, would the Administration be
|
|
willing to use legal remedies to restrict access to more
|
|
powerful encryption devices?
|
|
|
|
A: This is a fundamental policy question which will be
|
|
considered during the broad policy review. The key escrow
|
|
mechanism will provide Americans with an encryption product
|
|
that is more secure, more convenient, and less expensive
|
|
than others readily available today, but it is just one
|
|
piece of what must be the comprehensive approach to
|
|
encryption technology, which the Administration is
|
|
developing.
|
|
|
|
The Administration is not saying, "since encryption
|
|
threatens the public safety and effective law enforcement,
|
|
we will prohibit it outright" (as some countries have
|
|
effectively done); nor is the U.S. saying that "every
|
|
American, as a matter of right, is entitled to an
|
|
unbreakable commercial encryption product." There is a
|
|
false "tension" created in the assessment that this issue is
|
|
an "either-or" proposition. Rather, both concerns can be,
|
|
and in fact are, harmoniously balanced through a reasoned,
|
|
balanced approach such as is proposed with the "Clipper
|
|
Chip" and similar encryption techniques.
|
|
|
|
Q: What does this decision indicate about how the Clinton
|
|
Administration's policy toward encryption will differ from
|
|
that of the Bush Administration?
|
|
|
|
A: It indicates that we understand the importance of encryption
|
|
technology in telecommunications and computing and are
|
|
committed to working with industry and public-interest
|
|
groups to find innovative ways to protect Americans'
|
|
privacy, help businesses to compete, and ensure that law
|
|
enforcement agencies have the tools they need to fight crime
|
|
and terrorism.
|
|
|
|
Q: Will the devices be exportable? Will other devices that use
|
|
the government hardware?
|
|
|
|
A: Voice encryption devices are subject to export control
|
|
requirements. Case-by-case review for each export is
|
|
required to ensure appropriate use of these devices. The
|
|
same is true for other encryption devices. One of the
|
|
attractions of this technology is the protection it can give
|
|
to U.S. companies operating at home and abroad. With this
|
|
in mind, we expect export licenses will be granted on a
|
|
case-by-case basis for U.S. companies seeking to use these
|
|
devices to secure their own communications abroad. We plan
|
|
to review the possibility of permitting wider exportability
|
|
of these products.
|
|
|
|
|
|
|~~ END
|
|
|
|
---
|
|
|
|
HINTERLAND WHO'S WHO - 800 EXCHANGES
|
|
Lister
|
|
|
|
Exchanges - 800 Service
|
|
|
|
0 1 2 3 4 5 6 7 8 9
|
|
+------+------+------+------+------+------+------+------+------+------+
|
|
20| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
21| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
22| ---- | AT&T | AT&T | AT&T | LDL | AT&T | MIC | AT&T | AT&T | C&W |
|
|
23| NTK | AT&T | AT&T | AT&T | MCI | AT&T | SCH | AT&T | AT&T |Delta |
|
|
24| SIR | AT&T | AT&T | AT&T | ---- | AT&T | ---- | AT&T | AT&T | ---- |
|
|
25| ---- | AT&T | AT&T | AT&T | TTU | AT&T | LSI | AT&T | AT&T | ---- |
|
|
26| ---- | SCH | AT&T |CanCO | ICT |CanSWO| COM |CanEO |CanTor| FDG |
|
|
27| ---- | ---- | AT&T | ---- | MCI | ITT | ONE | SNT | ---- | MAL |
|
|
28| ADG | ---- | AT&T | MCI | MCI | ---- | ---- | ---- | MCI | MCI |
|
|
29| ---- | ---- | AT&T | PRO | ---- | ---- | ---- | ARE | ---- | CDC |
|
|
30| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
31| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
32| ---- | AT&T | AT&T | AT&T | HNI | AT&T |Sprint| AT&T | AT&T | TET |
|
|
33| TET | AT&T | AT&T | MCI | AT&T | SCH | AT&T | FST | AT&T | ---- |
|
|
34| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T |Sprint| AT&T | DCT |
|
|
35| COM | AT&T | AT&T | ---- | AT&T | ---- | AT&T | ---- | AT&T |Sprint|
|
|
36| ---- |CanMtl| AT&T |CanMtl| HNI | MCI |Sprint| AT&T | AT&T |Teleco|
|
|
37|Teleco| ---- | AT&T |Teleco| ---- |ATCCig| ---- |Telnet| ---- | ---- |
|
|
38| ---- | ---- | AT&T |Teleco| FDT |Hedges| TBQ |CanTor| MCI | ---- |
|
|
39| ---- | ---- | AT&T | EXF | ---- | MCI | ---- |Teleco| ---- |Americ|
|
|
40| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
41| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
42| ---- | AT&T | AT&T | AT&T | AT&T | TTH | AT&T | ---- | AT&T | ---- |
|
|
43| ---- | AT&T | AT&T | AT&T | AGN | AT&T | IDN | AT&T | AT&T | ---- |
|
|
44| TXN | AT&T | AT&T | AT&T | MCI | AT&T | AT&T | AT&T | AT&T | ---- |
|
|
45| USL | AT&T | AT&T | AT&T | ALN | ---- | MCI | AT&T | AT&T | ---- |
|
|
46| ---- |CanNCO| AT&T |CanEQu| ---- |CanNWO| ALN | ICT | AT&T | ---- |
|
|
47| ---- | ALN | AT&T |Sprint| ---- |Teleco|Teleco| MCI |Alascm| ---- |
|
|
48| ---- | ---- | AT&T | ---- |Teleco|Teleco| C&W |Sprint|Sprint| TOM |
|
|
49| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
50| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
51| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
52| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T |Midco |
|
|
53| ---- | AT&T | AT&T | AT&T | ---- | AT&T | ALN | AT&T | AT&T | ---- |
|
|
54| ---- | AT&T | AT&T | AT&T | AT&T | AT&T |Sprint| AT&T | AT&T | ---- |
|
|
55| CMA | AT&T | AT&T | AT&T | AT&T |[Diry]| AT&T | ALN | AT&T | ---- |
|
|
56| ---- |CanNB | AT&T |CanNfl| ---- |CanNSP| ALN |CanWQu| ---- | ---- |
|
|
57| ---- | ---- | AT&T | ---- | AMM | ---- | ---- |Telnet| ---- | LNS |
|
|
58| WES | ---- | AT&T |Teleco|Teleco| ---- |Action| LTQ |Action| LGT |
|
|
59| ---- | ---- | AT&T |Teleco|Teleco| ---- | ---- | ---- | ---- | ---- |
|
|
60| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
61| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
62| ---- | AT&T | AT&T | ---- | AT&T | NLD | AT&T | MCI | AT&T | ---- |
|
|
63| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | CQU | AT&T | AT&T | BUR |
|
|
64| ---- | AT&T | AT&T | AT&T | CMA | AT&T | ---- | AT&T | AT&T | ---- |
|
|
65| ---- | ---- | AT&T | ---- | AT&T | ---- | ---- |Teleco|Teleco| ---- |
|
|
66| ---- |CanAlb| AT&T |CanBC |Sprint|CanMan| MCI |CanSsk|CanTor|Sprint|
|
|
67| ---- | ---- | AT&T |Teleco|Teleco| ---- |Sprint| MCI | MCI | ---- |
|
|
68| ---- | ---- | AT&T | MTD | ---- | ---- | LGT | NTS | MCI | ---- |
|
|
69| ---- | ---- | AT&T | ---- | ---- | MCI | ---- | ---- | NYC | PLG |
|
|
70| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
71| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
72| TGN | ---- | AT&T | ---- | RCI | SAN |Sprint| MCI |Teleco|Sprint|
|
|
73| ---- | ---- | AT&T |Sprint| ---- |Sprint|Sprint| MEC | MEC | ---- |
|
|
74| ---- | MIC | AT&T | EDS | ---- |Sprint| ---- |Teleco|Teleco|Teleco|
|
|
75| ---- | ---- | AT&T | MCI | TSH | SPR | ---- | TID | ---- | MCI |
|
|
76| ---- | ---- | AT&T | ---- |Alascm| MCI | MCI |Sprint| SNT | ---- |
|
|
77| GCN | SNT | AT&T | CTI | ---- | ---- |Sprint| MCI |Sprint|Teleco|
|
|
78|Teleco| ---- | AT&T | ALN |Allnet| SNH |(Futu)| ---- | ---- | TMU |
|
|
79| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | TID |Teleco| ---- |
|
|
80|Sprint| ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
81| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
82| ---- | AT&T | AT&T | THA | AT&T | MCI | AT&T |Sprint| AT&T |Sprint|
|
|
83| ---- | AT&T | AT&T | AT&T | ---- | AT&T |Teleco|Teleco| ---- | Star |
|
|
84| ---- | AT&T | AT&T | AT&T | LDD | AT&T | ---- | AT&T | AT&T | ---- |
|
|
85| TKC | AT&T | AT&T | ---- | AT&T | AT&T | ---- | TLS | AT&T | ---- |
|
|
86| ---- | ---- | AT&T | ALN | TEN | ---- | MCI | ---- | SNT |Sprint|
|
|
87| ---- | ---- | AT&T | MCI | AT&T | ALN | MCI |Sprint| ALN | MCI |
|
|
88| NAS | NAS | AT&T | ---- |Sprint| AT&T | ALN | ETS | MCI | ---- |
|
|
89| ---- | ---- | AT&T | ---- | ---- | ---- | TXN | ---- | CGI | C&W |
|
|
90| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
91| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
92| ---- | ---- | AT&T | ALN | ---- | ---- | MCI |Sprint| CIS | ---- |
|
|
93| ---- | ---- | AT&T | MCI | ---- | ---- |R-Comm| MCI | ---- | ---- |
|
|
94| TSF | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
95| MCI |PhAmer| AT&T | ---- | ---- | MCI | ---- | ---- |[T-??]|[T-??]|
|
|
96| CNO | ---- | AT&T | SOC | ---- | ---- | C&W | ---- | TED | C&W |
|
|
97| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- |
|
|
98| ---- | ---- | AT&T | WUT | ---- | ---- | WUT | ---- | WUT | C&W |
|
|
99| ---- | ---- | AT&T | ---- | ---- | ---- | Valu | ---- | ---- | MCI |
|
|
+------+------+------+------+------+------+------+------+------+------+
|
|
0 1 2 3 4 5 6 7 8 9
|
|
|
|
Exchanges - 800 Service - Appendix
|
|
|
|
Abbreviations of carriers/regions used in the table:
|
|
|
|
Action - Action Telecom Co.
|
|
ADG - Advantage Network, Inc.
|
|
AGN - AMRIGON
|
|
Alascm - ALASCOM
|
|
Allnet - Allnet Communication Services
|
|
Americ - AmeriCall Corporation (Calif.)
|
|
AMM - Access Long Distance
|
|
ARE - American Express TRS
|
|
AT&T - AT&T
|
|
ATCCig - ATC Cignal Communications
|
|
BUR - Burlington Tel.
|
|
C&W - Cable & Wireless Comm.
|
|
CanAlb - Telecom Canada/Alberta (403)
|
|
CanBC - Telecom Canada/British Columbia (604)
|
|
CanCO - Telecom Canada/Central Ontario (416)
|
|
CanEO - Telecom Canada/Eastern Ontario (613)
|
|
CanEQu - Telecom Canada/Eastern Quebec (418)
|
|
CanMan - Telecom Canada/Manitoba (204)
|
|
CanMtl - Telecom Canada/Montreal Area (514)
|
|
CanNB - Telecom Canada/New Brunswick (506)
|
|
CanNfl - Telecom Canada/Newfoundland (709)
|
|
CanNCO - Telecom Canada/North Central Ontario (705)
|
|
CanNSP - Telecom Canada/Nova Scotia, PEI (902)
|
|
CanNWO - Telecom Canada/NW Ontario (807)
|
|
CanSsk - Telecom Canada/Saskatchewan (306)
|
|
CanSWO - Telecom Canada/SW Ontario (519)
|
|
CanTor - Telecom Canada/Toronto Area (416)
|
|
CanWQu - Telecom Canada/Western Quebec (819)
|
|
CDC - ClayDesta Communications
|
|
CNO - COMTEL of New Orleans
|
|
COM - COM Systems
|
|
CQU - ConQuest Comm. Corp
|
|
CTI - Compu-Tel Inc.
|
|
DCT - Direct Communications, Inc.
|
|
Delta - Delta Communications, Inc.
|
|
EDS - Electronic Data Systems Corp.
|
|
ETS - Eastern Telephone Systems, Inc.
|
|
EXF - Execulines of Florida, Inc.
|
|
FDG - First Digital Network
|
|
FDN - Florida Digital Network
|
|
FDT - Friend Technologies
|
|
FST - First Data Resources
|
|
GCN - General Communications, Inc.
|
|
Hedges - Hedges Communications
|
|
HNI - Houston Network, Inc.
|
|
ITT - United States Transmission System
|
|
LDD - LDDS-II, Inc.
|
|
LDL - Long Distance for Less
|
|
LGT - LITEL
|
|
LNS - Lintel Systems
|
|
LSI - Long Distance Savers
|
|
LTQ - Long Distance for Less
|
|
MAL - MIDAMERICAN
|
|
MCI - MCI Telecommunications Corp.
|
|
MDE - Meade Associates
|
|
MEC - Mercury, Inc.
|
|
MIC - Microtel, Inc.
|
|
Midco - Midco Communications
|
|
MTD - Metromedia Long Distance
|
|
NLD - National Data Corp.
|
|
NTK - Network Telemanagement Svcs.
|
|
NTS - NTS Communications
|
|
ONC - OMNICALL, Inc.
|
|
ONE - One Call Communications, Inc.
|
|
PhAmer - Phone America
|
|
PHE - Phone Mail, Inc.
|
|
PLG - Pilgrim Telephone Co.
|
|
PRO - PROTO-COL
|
|
R-Comm - R-Comm
|
|
RCI - RCI Corporation
|
|
SAN - Satelco
|
|
SCH - Schneider Communications
|
|
SIR - Southern Interexchange Services
|
|
SLS - Southland Systems, Inc.
|
|
SNH - Sunshine Telephone Co.
|
|
SNT - SouthernNet, Inc.
|
|
SOC - State of California
|
|
Sprint - U.S. Telcom, Inc. (U.S. Sprint)
|
|
Star - STAR-LINE
|
|
TBQ - Telecable Corp.
|
|
TED - TeleDial America
|
|
Teleco - Teleconnect
|
|
Telnet - Telenet Comm. Corp.
|
|
TEN - Telesphere Network, Inc.
|
|
TET - Teltec Savings Communications Co.
|
|
TGN - Telemanagement Consult't Corp.
|
|
THA - Touch America
|
|
TID - TMC South Central Indiana
|
|
TKC - TK Communications, Inc.
|
|
TLS - TELE-SAV
|
|
TMU - Tel-America, Inc.
|
|
TOM - TMC of Montgomery
|
|
TSF - SOUTH-TEL
|
|
TSH - Tel-Share
|
|
TTH - Tele Tech, Inc.
|
|
TTU - Total-Tel USA
|
|
TXN - Tex-Net
|
|
USL - U.S. Link Long Distance
|
|
Valu - Valu-Line
|
|
WES - Westel
|
|
WUT - Western Union Telegraph Co.
|
|
|
|
|
|
Other abbreviations
|
|
|
|
(Futu) - for future assignment
|
|
(Pagr) - reserved for radio paging
|
|
[Diry] - Directory Assistance Exchange
|
|
[T-??] - reserved for testing
|
|
|
|
Notes on 800
|
|
------------
|
|
|
|
Where local telcos, such as Illinois Bell offer 800 service, they
|
|
purchase blocks of numbers from AT&T on prefixes assigned to AT&T. They
|
|
are free to purchase blocks of numbers from any carrier of their choice
|
|
however.
|
|
|
|
Often, exchanges of the form NN2 are used internally within an area code
|
|
or region, such as 552 or 772 in Saskatchewan, or for intra-state use.
|
|
Specific intra-state or intra-provincial uses are not mentioned in this
|
|
document.
|
|
|
|
The information was updated according to carriers accessible from Canada.
|
|
As far as can be determined, only the AT&T, MCI and Sprint 800 services
|
|
are accessible from Canada at present. However, 337 (assigned to First
|
|
Data Resources) seems to be connected to MCI. This could be due to the
|
|
purchase of some companies; the prefixes would then be assumed by the
|
|
buyer.
|
|
|
|
N0X/N1X prefixes for 800 service are starting to appear. The first widely
|
|
known one is 800 used by Sprint (as in 1 800 800 xxxx). This is the only
|
|
N(0/1)X prefix for 800 to be accessible from Canada at present.
|
|
|
|
|
|
---
|
|
|
|
POETRY CORNER
|
|
The Grappler - Essence
|
|
|
|
|
|
With the unquenchable thirst of an ocean
|
|
Death drinks of lifetimes in a flinch
|
|
I am but a cups worth of this
|
|
As meaningless as a glass of water
|
|
To know this is the mortal cross
|
|
we all must bear.
|
|
|
|
(C)1993 The Grappler
|
|
|
|
|
|
|
|
|
|
|
|
My Teddy Bear
|
|
|
|
Without my teddy bear, I cannot sleep.
|
|
I cannot breathe, or concentrate.
|
|
I cannot set my mind out straight,
|
|
but my teddy bear doesn't miss me.
|
|
|
|
Without my teddy bear, I cannot feel.
|
|
I play a game, I act in haste,
|
|
romantic thoughts are put to waste,
|
|
but my teddy bear doesn't miss me.
|
|
|
|
Without my teddy bear, I cannot see.
|
|
It's all pitch black, and in the day,
|
|
without a map, i've lost my way,
|
|
but my teddy bear doesn't miss me.
|
|
|
|
Without my teddy bear, I cannot smell.
|
|
There's no purfume, no sweet soft skin,
|
|
No hugs to be supported in,
|
|
but my teddy bear doesn't miss me.
|
|
|
|
Without my teddy bear, I cannot taste.
|
|
I cannot taste her loving kiss,
|
|
the interweaved celestial bliss,
|
|
but my teddy bear doesn't miss me.
|
|
|
|
My teddy bear, come back to me.
|
|
It sickens me to think you might,
|
|
alone and lost, be filled with fright,
|
|
and maybe, you might miss me.
|
|
|
|
(C)1993 Essence
|
|
|
|
|
|
|
|
|
|
Victim
|
|
|
|
Like ice, her cold heart controls her warm hands.
|
|
Inticing me to join her,
|
|
Inviting me to touch her,
|
|
|
|
She melts my heart but inside she is cruel.
|
|
My face her hands carressing,
|
|
My body, hers is blessing.
|
|
|
|
Intense her hatred runs right through her blood.
|
|
Her passion makes her sexy,
|
|
Her warm lips make her sexy.
|
|
|
|
I enter her, and let my heart breathe fire.
|
|
My fire, and love exhausted,
|
|
yet she has just molested,
|
|
|
|
Another Victim.
|
|
|
|
(C)1993 Essence
|
|
|
|
|
|
|
|
---
|
|
|
|
OFFICIAL [CiSSD] BAD-ASS BELLCORE GLOSSARY
|
|
Lister
|
|
|
|
The following I picked up in my travels on the Internet. I
|
|
rarely find a COMPREHENSIVE glossary like this one. Although it is
|
|
intended for Bellcore employees, it has obvious uses for social
|
|
engineering; or just for reference. All in all, it makes and interesting
|
|
read and I hope you benefit out of it..
|
|
|
|
|
|
A & B LEADS
|
|
Designation of leads derived from the midpoints of the two
|
|
pairs comprising a 4-wire circuit.
|
|
|
|
ABBREVIATED DIALING
|
|
Preprogramming of a caller's phone system or long distance
|
|
company's switch to recognize a 2- to 4-digit number as an
|
|
abbreviation for a frequently dialed phone number, and
|
|
automatically dial the whole number.
|
|
Synonym: Speed Dialing.
|
|
|
|
ACCESS CHARGE
|
|
Monies collected by local phone companies for use of their
|
|
circuits to originate and terminate long distance calls.
|
|
Can be per minute fees levied on long distance companies,
|
|
Subscriber Line Charges (SLCs) levied directly on regular
|
|
local lines, fixed monthly fees for special telco circuits
|
|
(ie. WAL, DAL,T-1), or Special Access Surcharge (SAS) on
|
|
special access circuits.
|
|
|
|
ACCESS LINE
|
|
A telephone circuit which connects a customer location to
|
|
a network switching center.
|
|
|
|
AIRLINE MILEAGE
|
|
Calculated point-to-point mileage between terminal
|
|
facilities.
|
|
|
|
ALL TRUNKS BUSY (ATB)
|
|
A single tone interrupted at a 120 ipm (impulses per
|
|
minute) rate to indicate all lines or trunks in a routing
|
|
group are busy.
|
|
|
|
ALTERNATE ROUTE
|
|
A secondary communications path used to reach a
|
|
destination if the primary path is unavailable.
|
|
|
|
ALTERNATE USE
|
|
The ability to switch communications facilities from one
|
|
type to another, i.e., voice to data, etc.
|
|
|
|
ALTERNATE VOICE DATA (AVD)
|
|
A single transmission facility which can be used for
|
|
either voice or data.
|
|
|
|
ANALOG SIGNAL
|
|
A signal in the form of a continuous varying physical
|
|
quantity, e.g., voltage which reflects variations in some
|
|
quantity, e.g., loudness in the human voice.
|
|
|
|
ANNUNCIATOR
|
|
An audible intercept device that states the condition or
|
|
restrictions associated with circuits or procedures.
|
|
|
|
ANSWER BACK
|
|
An electrical and/or visual indication to the calling or
|
|
sending end that the called or received station is on
|
|
the line.
|
|
|
|
ANSWER SUPERVISION
|
|
An electrical signal fed back up the line by the local
|
|
telephone company at the distant end of a long distance
|
|
call to indicate positively the call has been answered by
|
|
the called party. Tells billing equipment to start timing
|
|
the call.
|
|
|
|
AREA CODE
|
|
A three digit number identifying more than 150 geographic
|
|
areas of the United States and Canada which permits direct
|
|
distance dialing on the telephone system. A similar
|
|
global numbering plan has been established for
|
|
international subscriber dialing.
|
|
|
|
Synonym: Numbering Plan Area (NPA).
|
|
|
|
ATTENDANT POSITION
|
|
A telephone switchboard operator's position. It provides
|
|
either automatic (cordless) or manual (plug and jack)
|
|
operator controls for incoming and/or outgoing telephone
|
|
calls.
|
|
|
|
ATTENTUATION
|
|
A general term used to denote the decrease in power
|
|
between that transmitted and that received due to loss
|
|
through equipment, lines, or other transmission devices.
|
|
It is usually expressed as a ratio in dB (decibel).
|
|
|
|
AUDIBLE RINGING TONE
|
|
An audible signal heard by the calling party during the
|
|
ringing-interval.
|
|
|
|
AUTHORIZATION CODE
|
|
A 5- to 14-digit number entered using a touch-tone phone
|
|
to identify the caller as a customer of the long distance
|
|
service. Used primarily before Equal Access as a way to
|
|
verify the caller as a customer and bill calls.
|
|
|
|
AUTO ANSWER
|
|
A machine feature that allows a transmission control unit
|
|
or station to automatically respond to a call that it
|
|
receives.
|
|
|
|
AUTOMATIC CALL DISTRIBUTOR (ACD)
|
|
A switching system designed to queue and/or distribute a
|
|
large volume of incoming calls to a group of attendants to
|
|
the next available "answering" position.
|
|
|
|
AUTOMATIC DIALING UNIT
|
|
A device which is programmed with frequently called
|
|
numbers. The caller presses one to three digits and the
|
|
preprogrammed number is automatically dialed into the
|
|
phone circuit.
|
|
|
|
AUTOMATIC IDENTIFICATION OF OUTWARD DIALING (AIOD)
|
|
The ability of some centrex units to provide an itemized
|
|
breakdown of charges (including individual charges for
|
|
toll calls) for calls made by each telephone extension.
|
|
|
|
AUTOMATIC NUMBER IDENTIFICATION (ANI)
|
|
On long distance calls, the process by which the local
|
|
phone company passes a caller's local billing phone number
|
|
to his/her long distance company when a "1+" or "10-XXX"
|
|
call is made. With ANI a caller's long distance carrier
|
|
knows who (what phone number) to bill without requiring
|
|
the caller to enter any extra digits to be identified.
|
|
|
|
AUTOMATIC ROUTE SELECTION (ARS)
|
|
|
|
Synonym: Least Cost Routing
|
|
|
|
BAND
|
|
(1) The range of frequencies between two defined limits.
|
|
|
|
(2) In reference to WATS, one of the five specific
|
|
geographic areas as defined by the carrier.
|
|
|
|
Synonym: Bandwidth.
|
|
|
|
BANDWIDTH
|
|
see BAND.
|
|
|
|
BASEBAND
|
|
The total frequency band occupied by the aggregate of
|
|
all the voice and data signals used to modulate a radio
|
|
carrier.
|
|
|
|
BAUD
|
|
A unit of signaling speed. The speed in Baud is the number
|
|
of discrete conditions or signal elements per second. If
|
|
each signal event represents only one bit condition, then
|
|
Baud is the same as bits per second. Baud does not equal
|
|
bits per second.
|
|
|
|
BLOCKED CALLS
|
|
Attempted calls that are not connected because (1) all
|
|
lines to the central offices are in use; or (2) all
|
|
connecting paths through the PBX/switch are in use.
|
|
|
|
BREAK
|
|
A means of interrupting transmission, a momentary
|
|
interruption of a circuit.
|
|
|
|
BREAKEVEN POINT
|
|
Level of usage at which the total cost of a service with a
|
|
high fixed up-front monthly fee but low minute costs
|
|
becomes equal to the total cost of another service with
|
|
low (or zero) monthly fee but relatively high per minute
|
|
cost. At usage levels higher than breakeven, the service
|
|
with the high monthly fee is cheaper.
|
|
|
|
BROADBAND
|
|
A transmission facility having a bandwidth of greater than
|
|
20 kHz.
|
|
|
|
BUS
|
|
A heavy conductor, or group of conductors, to which
|
|
several units of the same type of equipment may be
|
|
connected.
|
|
|
|
BUSY
|
|
The condition in which facilities over which a call is to
|
|
be transmitted are already in use.
|
|
|
|
BUSY HOUR
|
|
The time of day when phone lines are most in demand.
|
|
|
|
BUSY TONE
|
|
A single tone that is interrupted at 60 ipm (impulses per
|
|
minute) to indicate that the terminal point of a call is
|
|
already in use.
|
|
|
|
BYPASS
|
|
The direct connection to customer-premises equipment by an
|
|
IC. This occurs when an IC connects its own facilities
|
|
(or facilities leased from a non-BOC entity) directly to
|
|
an end user's premises, circumventing the use of the BOC
|
|
network..
|
|
|
|
CARRIER
|
|
A long distance company which uses primarily its own
|
|
transmission facilities, as opposed to resellers which
|
|
lease or buy most or all transmission facilities from
|
|
carriers. Many people refer to any type of long distance
|
|
company, whether it has its own network or not, as a
|
|
carrier, so the term is not as restrictive as it used to
|
|
be.
|
|
|
|
CARRIER ACCESS CODE (CAC)
|
|
The sequence an end user dials to obtain access to the
|
|
switched services of a carrier. Carrier Access Codes for
|
|
Feature Group D are composed of five digits, in the form
|
|
10XXX, where XXX is the Carrier Identification Code.
|
|
|
|
CARRIER COMMON LINE CHARGE (CCLC)
|
|
A per minute charge paid by long distance companies to
|
|
local phone companies for the use of local public switched
|
|
networks at either or both ends of a long distance call.
|
|
This charge goes to pay part of the cost of telephone
|
|
poles, wires, etc.
|
|
|
|
CARRIER IDENTIFICATION CODE (CIC)
|
|
The three-digit number that uniquely identifies a carrier.
|
|
The Carrier Identification Code is indicated by XXX in the
|
|
Carrier Access Code. The same code applies to an
|
|
individual carrier throughout the area served by the North
|
|
American Numbering Plan.
|
|
|
|
CARRIER SYSTEM
|
|
A system for providing several communications channels
|
|
over a single path.
|
|
|
|
CELLULAR MOBILE RADIO
|
|
A high capacity land mobile radio system in which an
|
|
assigned frequency spectrum is divided into discrete
|
|
channels that are assigned to a cellular geographic
|
|
serving area.
|
|
|
|
CENTRAL OFFICE (CO)
|
|
With local telephone companies, the nearby building
|
|
containing the local telco switch which provides local
|
|
telephone service. Also the physical point where calls
|
|
enter the long distance network. Sometimes referred to as
|
|
Class 5 office, end office, or Local Dial Office.
|
|
|
|
CENTREX, CO
|
|
PBX Service provided by a switch located at the telephone
|
|
company central office.
|
|
|
|
CENTREX, CU
|
|
A variation on Centrex CO provided by a telephone company
|
|
maintained "Central Office" type switch located at the
|
|
customer's premises.
|
|
|
|
CHANNEL
|
|
A communications path via a carrier or microwave radio.
|
|
|
|
CIRCUIT
|
|
A path for the transmission of electromagnetic signals to
|
|
include all conditioning and signaling equipment.
|
|
|
|
Synonym: Facility.
|
|
|
|
CIRCUIT SWITCHING
|
|
A switching system that completes a dedicated transmission
|
|
path from sender to receiver at the time of transmission.
|
|
|
|
CISSD
|
|
An elite group of hackers and phreakers with the skills to
|
|
bring the h/p scene into the 21st century. Unlike other
|
|
more conventional groups, CiSSD holds revolutionary and
|
|
new ideas that bing a fresh new perspective the the h/p
|
|
community.
|
|
|
|
Synonym: HeLL Inc.
|
|
|
|
CLASS OF SERVICE/CLASS MARK (COS)
|
|
A subgrouping of telephone customers or users for the sake
|
|
of rate distinction or limitation of service.
|
|
|
|
COAXIAL CABLE
|
|
A cable with a solid outer shield, a space and then a
|
|
solid inner conductor. The electromagnetic wave travels
|
|
between the outer shield and the conductor. It can carry a
|
|
much higher band width than a wire pair.
|
|
|
|
CODEC
|
|
Coder-Decoder. Used to convert analog signals to digital
|
|
form for transmission over a digital median and back again
|
|
to the original analog form.
|
|
|
|
COMMON CARRIER
|
|
A government regulated private company that provides the
|
|
general public with telecommunications services and
|
|
facilities.
|
|
|
|
COMMON CHANNEL INTEROFFICE SIGNALING (CCIS)
|
|
A digital technology used by AT&T to enhance their
|
|
Integrated Services Digital Network. It uses a separate
|
|
data line to route interoffice signals to provide faster
|
|
call set-up and more efficient use of trunks.
|
|
|
|
COMMON CONTROL SWITCHING ARRANGEMENT (CCSA)
|
|
The use of carrier switches under a carrier's control as
|
|
part of a customer's private network. The carrier's
|
|
software controls and switches the customer's calls over
|
|
private lines the customer has rented. Control of the
|
|
switch and switching functions is done in common for all
|
|
users using the software and switching system.
|
|
|
|
CONDITIONING EQUIPMENT
|
|
Equipment modifications or adjustments necessary to match
|
|
transmission levels and impedances and which equalize
|
|
transmission and delay to bring circuit losses, levels,
|
|
and distortion within established standards.
|
|
|
|
CONFIGURATION
|
|
The combination of long-distance services and/or equipment
|
|
that make up a communications system.
|
|
|
|
CONTROL UNIT (CU)
|
|
The central processor of a telephone switching device.
|
|
|
|
COST COMPONENT
|
|
The price of each type of long distance service and/or
|
|
equipment that constitutes a configuration.
|
|
|
|
CROSS CONNECTION
|
|
The wire connections running between terminals on the two
|
|
sides of a distribution frame, or between binding posts in
|
|
a terminal.
|
|
|
|
CROSS TALK
|
|
The unwanted energy (speech or tone) transferred from one
|
|
circuit to another circuit.
|
|
|
|
CUSTOMER ACCESS LINE CHARGE (CALC)
|
|
The FCC-imposed monthly surcharge added to all local lines
|
|
to recover a portion of the cost of telephone poles,
|
|
wires, etc., from end users. Before deregulation, a large
|
|
part of these costs were financed by long distance users
|
|
in the form of higher charges.
|
|
|
|
CUSTOMER OWNED AND MAINTAINED (COAM)
|
|
Customer provided communications apparatus and associated
|
|
wiring.
|
|
|
|
CUSTOMER PREMISE EQUIPMENT (CPE)
|
|
Telephone equipment, usually including wiring located
|
|
within the customer's part of a building.
|
|
|
|
CUT
|
|
To transfer a service from one facility to another.
|
|
|
|
CUT THROUGH
|
|
The establishment of a complete path for signaling and/or
|
|
audio communications.
|
|
|
|
DATA SET
|
|
A device which converts data into signals suitable for
|
|
transmission over communications lines.
|
|
|
|
DATA TERMINAL
|
|
A station in a system capable of sending and/or receiving
|
|
data signals.
|
|
|
|
DECIBEL (dB)
|
|
A unit measurement represented as a ratio of two voltages,
|
|
currents or powers and is used to measure transmission
|
|
loss or gain.
|
|
|
|
DEDICATED ACCESS LINE (DAL)
|
|
An analog special access line going from a caller's own
|
|
equipment directly to a long distance company's switch or
|
|
POP. Usually provided by a local telephone company. The
|
|
line may go through the local telco Central Office, but
|
|
the local telco does not switch calls on this line.
|
|
|
|
DELAY DIAL
|
|
A dialing configuration whereby local dial equipment will
|
|
wait until it receives the entire telephone number before
|
|
seizing a circuit to transmit the call.
|
|
|
|
DELTA MODULATION (DM)
|
|
A variant of pulse code modulation whereby a code
|
|
representing the difference between the amplitude of a
|
|
sample and the amplitude of the previous one is sent.
|
|
Operates well in the presence of noise, but requires a
|
|
wide frequency band.
|
|
|
|
DEMODULATION
|
|
The process of retrieving data from a modulated signal.
|
|
|
|
DIAL LEVEL
|
|
The selection of stations or services associated with a
|
|
PBX using a one to four digit code (e.g., dialing 9 for
|
|
access to outside dial tone).
|
|
|
|
DIAL PULSING
|
|
The transmitting of telephone address signals by
|
|
momentarily opening a DC circuit a number of times
|
|
corresponding to the decimal digit which is dialed.
|
|
|
|
DIAL REPEATING TIE LINE/DIAL REPEATING TIE TRUNK
|
|
A tie line arrangement which permits direct trunk to trunk
|
|
connections without use of the attendant.
|
|
|
|
DIAL SELECTIVE SIGNALING
|
|
A multipoint network in which the called party is selected
|
|
by a prearranged dialing code.
|
|
|
|
DIAL TONE
|
|
A tone indicating that automatic switching equipment is
|
|
ready to receive dial signals.
|
|
|
|
DIALING PLAN
|
|
A description of the dialing arrangements for customer use
|
|
on a network.
|
|
|
|
DIRECT DISTANCE DIALING (DDD)
|
|
A basic toll service that permits customers to dial their
|
|
own long distance call without the aid of an operator.
|
|
|
|
DIRECT INWARD DIALING (DID)
|
|
A PBX or CENTREX feature that allows a customer outside
|
|
the system to directly dial a station within the system.
|
|
|
|
DIRECT OUTWARD DIALING
|
|
A PBX or CENTREX feature that allows a station user to
|
|
gain direct access to an exchange network.
|
|
|
|
DROP
|
|
The portion of outside telephone plant which extends from
|
|
the telephone distribution cable to the subscriber's
|
|
premises.
|
|
|
|
DRY CIRCUIT
|
|
A circuit which transmits voice signals and carries no
|
|
direct current.
|
|
|
|
DUAL TONE MULTI-FREQUENCY (DTMF)
|
|
Also known as Touch-Tone. A type of signaling which emits
|
|
two distinct frequencies for each indicated digit.
|
|
|
|
DUPLEX
|
|
Simultaneous two-way independent transmission.
|
|
|
|
DUPLEX SIGNALING
|
|
A long-range bidirectional signaling method using paths
|
|
derived from transmission cable pairs. It is based on a
|
|
balanced and symmetrical circuit that is identical at both
|
|
ends. This circuit presents an E&M lead interface to
|
|
connecting circuits.
|
|
|
|
ECHO
|
|
A signal that has been reflected or otherwise returned
|
|
with sufficient magnitude and delay to be perceived by the
|
|
speaker.
|
|
|
|
ECHO RETURN LOSS (ERL)
|
|
The loss which must be in the echo path to reduce echo to
|
|
a tolerable amount.
|
|
|
|
ECHO SUPPRESSOR
|
|
A device which detects speech signals transmitted in
|
|
either direction on a four-wire circuit, and introduces
|
|
loss in the direction of transmission.
|
|
|
|
EITHER END HOP OFF (EEHO)
|
|
In private networks, a switch program that allows a call
|
|
destined for an off-net location to be placed into the
|
|
public network at either the closest switch to the
|
|
origination or to the destination. The choice is usually
|
|
by time of day. Uses either Head End Hop Off or Tail End
|
|
Hop Off.
|
|
|
|
ELECTRONIC KEY TELEPHONE SETS (EKTS)
|
|
A generic term indicating key telephones with built-in
|
|
microprocessors which allow access to PBX-like features as
|
|
well as access to multiple CO lines, using 2 to 4 pair
|
|
wiring.
|
|
|
|
ELECTRONIC SWITCH
|
|
Modern programmable switch (often denoted ESS, for
|
|
Electronic Switching System) used in most BOC telephone
|
|
companies, many independent telephone companies, and by
|
|
virtually all new long distance companies. Completely
|
|
solid state electronics, as opposed to older
|
|
electro-mechanical switches.
|
|
|
|
ELECTRONIC SWITCHING SYSTEM (ESS)
|
|
Used as a station instrument on a PBX. Also a Bell System
|
|
term for electronic exchange switching equipment.
|
|
|
|
ELECTRONIC TANDEM NETWORK (ETN)
|
|
(1) A private network automatically and electronically
|
|
connecting the calling office to the called office through
|
|
Tandem-Tie Trunks. The network switches also function as
|
|
PBXs. (2) An AT&T product name. (3) Used as a generic term
|
|
for a PBX base network.
|
|
|
|
ENHANCED PRIVATE SWITCHED COMMUNICATIONS SERVICE (EPSCS)
|
|
A private network utilizing Bell provided equipment
|
|
located in the central office and dedicated to a specific
|
|
customer.
|
|
|
|
E&M LEADS
|
|
A pair of leads which carry signals between trunk
|
|
equipment and separate signaling equipment unit. The M
|
|
lead transmits battery or ground signals to the signaling
|
|
equipment, and the E lead receives open or ground signals
|
|
from the signaling equipment.
|
|
|
|
E&M SIGNALING
|
|
An arrangement whereby signaling between a trunk circuit
|
|
and an associated signaling unit is effected over two
|
|
leads providing full-time, 2-way, 2-level supervision.
|
|
|
|
ENTERPRISE NUMBER
|
|
A unique telephone exchange number that permits the called
|
|
party to be automatically billed for incoming calls.
|
|
|
|
EQUAL ACCESS
|
|
Reprogramming of Local Exchange Company (LEC) switches to
|
|
allow other long distance companies besides AT&T to be the
|
|
"1+" primary long distance company for users of long
|
|
distance (by creating a new type of Feature Group access
|
|
circuit, FGD). Also provides "10-XXX" dialing for
|
|
secondary and casual calling, generates true hardware
|
|
Answer Supervision when calls are terminated over FGD
|
|
circuits, and provides ANI (Automatic Number
|
|
Identification) on originating calls.
|
|
|
|
EQUALIZATION
|
|
The procedure of compensating for fluctuation in circuit
|
|
amplitude, delay, or distortion.
|
|
|
|
ERLANG
|
|
A unit of traffic intensity. One Erlang is the intensity
|
|
at which one traffic path would be continuously occupied,
|
|
e.g. one call per hour.
|
|
|
|
ERLANG B TABLE
|
|
A widely used table derived from a mathematical formula
|
|
which allows the determination of the traffic capacity of
|
|
a given group of circuits.
|
|
|
|
EXCHANGE
|
|
A telephone switching center.
|
|
|
|
EXCHANGE NETWORK FACILITIES FOR INTERSTATE ACCESS (ENFIA)
|
|
AT&T's pricing arrangement for local loops offered to OCCs
|
|
for connecting the OCC's network to the local telephone
|
|
company's central office.
|
|
|
|
EXTENDED AREA SERVICE (EAS)
|
|
Adding expanded local calling areas to a caller's basic
|
|
local calling area for a (generally) small additional
|
|
monthly fee. The EAS local calls can be either free
|
|
(after a small additional monthly fee is paid) or at a
|
|
cost of reduced per call charges.
|
|
|
|
FACILITIES
|
|
Typically refers to transmission lines or circuits, or
|
|
long distance services. A caller's facilities are the
|
|
circuits available to make calls.
|
|
|
|
FACSIMILE
|
|
The transmission of pictures, maps or other documents via
|
|
communications circuits using a device which scans the
|
|
original document, transforms the image into coded signals
|
|
and reproduces the original document at a distant point.
|
|
|
|
FEATURE GROUP A
|
|
Line-side originating and terminating LATA access for
|
|
which an originating subscriber dials an assigned
|
|
telephone number that connects to a specific IC. The IC
|
|
returns a tone to signal the caller to input additional
|
|
tone-generated digits of the called number.
|
|
|
|
FEATURE GROUP B
|
|
Trunk-side originating and terminating LATA access for
|
|
which an originating subscriber dials a 950-WXXX number
|
|
(where W=0,1 and XXX is the Carrier Access Code), which is
|
|
translated to a specified XXX carrier trunk group.
|
|
Optional rotary dial service and ANI may be available.
|
|
|
|
FEATURE GROUP C
|
|
Trunk-side LATA access for AT&T, generally, on a direct
|
|
basis between each EO and an AT&T switching system.
|
|
|
|
FEATURE GROUP D
|
|
Also referred to as "Equal Access," Feature Group D is
|
|
trunk-side LATA access affording call supervision to an
|
|
IC, a uniform access code (10XXX), optional calling-party
|
|
identification, recording of access-charge billing
|
|
details, and presubscription to a customer-specified IC.
|
|
|
|
FEDERAL COMMUNICATIONS COMMISSION (FCC)
|
|
The government agency established by the Communications
|
|
Act of 1934 which regulates the interstate communications
|
|
industry.
|
|
|
|
FIBER OPTICS
|
|
High speed transmission using light to send images (in
|
|
telecommunications: voice or data) through a flexible
|
|
bundle of glass fibers.
|
|
|
|
FOUR WIRE CIRCUITS
|
|
Circuits which use two separate one-way transmission paths
|
|
of two wires each, as opposed to regular local lines which
|
|
usually only have two wires to carry conversations in both
|
|
directions. One set of wires carries conversation in one
|
|
direction, the other in the opposite direction.
|
|
|
|
FREQUENCY
|
|
The number of complete cycles per unit of time.
|
|
|
|
FREQUENCY DIVISION MULTIPLEXING (FDM)
|
|
The division of an available frequency range (bandwidth)
|
|
into various subdivisions, each having enough bandwidth to
|
|
carry one voice or data channel.
|
|
|
|
FREQUENCY RESPONSE
|
|
The reaction of frequencies to the circuit components.
|
|
|
|
FULL DUPLEX
|
|
A circuit which allows transmission of a message in both
|
|
directions at the same time.
|
|
|
|
Synonym: 4-wire.
|
|
|
|
FULL PERIOD
|
|
Relates to private line service, which is rented for the
|
|
exclusive use of a single customer for an entire month.
|
|
|
|
FX (FOREIGN EXCHANGE) SERVICE
|
|
A service which allows a customer to appear to have a
|
|
local presence in a distant part of town or, a different
|
|
town altogether, by connecting his/her phone directly to a
|
|
local business line in a part of town with a different
|
|
exchange than his/her local calling area over a leased
|
|
private line, or to a local telco in a distant town
|
|
through long haul private lines purchased from a long
|
|
distance carrier.
|
|
|
|
GRADE OF SERVICE
|
|
The probability of a call being blocked by busy trunks,
|
|
expressed as a decimal fraction, and usually meaning the
|
|
busy-hour probability.
|
|
|
|
GROUP
|
|
12 circuits processed as a unit in a carrier system.
|
|
|
|
HALF DUPLEX
|
|
A circuit for transmitting or receiving signals in one
|
|
direction at a time.
|
|
|
|
HARDWIRE
|
|
To wire or cable directly between units of equipment.
|
|
|
|
HARMONIC
|
|
The full multiple of a base frequency.
|
|
|
|
HARMONIC DISTORTION
|
|
The ratio, expressed in decibels, of the power at the
|
|
fundamental frequency, to the power of a harmonic of that
|
|
fundamental.
|
|
|
|
HEAD END HOP OFF (HEHO)
|
|
A method of traffic engineering whereby calls are
|
|
completed by using long distance facilities directly off
|
|
the switch that serves that location.
|
|
|
|
HERTZ (Hz)
|
|
International standard unit of frequency. Replaces, and is
|
|
identical to, the order unit "Cycles-per-second."
|
|
|
|
HOMING
|
|
Returning to the starting position, as in a rotary
|
|
stepping switch.
|
|
|
|
HOOKSWITCH
|
|
The device on which the telephone receiver hangs or on
|
|
which a telephone handset hangs or rests when not in use.
|
|
The weight of the receiver or handset operates a switch
|
|
which opens the telephone circuit, leaving only the bell
|
|
connected to the line.
|
|
|
|
HOT-CUT
|
|
Virtually instantaneous replacement of one line with
|
|
another.
|
|
|
|
HYBRID
|
|
An electronic circuit which performs the wire conversions
|
|
necessary for the connection of a local loop with a long-
|
|
haul facility.
|
|
|
|
INTERCEPT
|
|
To stop a telephone call directed to an improper telephone
|
|
number, and redirect that call to an operator or a
|
|
recording.
|
|
|
|
INTERCONNECT
|
|
(1) The arrangement that permits the connection of
|
|
customer's telecommunications equipment to a
|
|
communications common carrier network. (2) The industry
|
|
name for manufacturers, excluding the Bell system, which
|
|
provide telephone equipment for the customer premises.
|
|
|
|
INTER-EXCHANGE MILEAGE (IXC)
|
|
The airline mileage between two cities.
|
|
|
|
Synonym: Long Haul Mileage.
|
|
|
|
INTEREXCHANGE PLANT
|
|
The facilities between the subscriber switching center and
|
|
another switching center.
|
|
|
|
INTERFACE
|
|
The junction or point of interconnection between two
|
|
systems or equipment having different characteristics.
|
|
|
|
INTERFERENCE
|
|
Any unwanted noise or crosstalk on a communications
|
|
circuit which acts to reduce the intelligibility of the
|
|
desired signal or speech.
|
|
|
|
INTER-MACHINE TRUNK (IMT)
|
|
A circuit which connects two automatic switching centers.
|
|
|
|
INTER-OFFICE TRUNK (IOT)
|
|
A direct trunk between local exchange offices.
|
|
|
|
INTERNATIONAL RECORD CARRIER (IRC)
|
|
Carriers providing international telecommunications
|
|
services, including voice, telex, and data communications.
|
|
|
|
INTERSTATE
|
|
Any connection made between two states.
|
|
|
|
INTRASTATE
|
|
Any connection made that remains within the boundaries of
|
|
a single state.
|
|
|
|
JITTER
|
|
Short term instability of the amplitude and/or phase of a
|
|
signal. Commonly called PHASE JITTER.
|
|
|
|
KEYSET
|
|
A telephone instrument having an appearance of two or more
|
|
telephone lines which can be accessed by depressing a
|
|
button (key) on the face of the set.
|
|
|
|
KEY SYSTEM
|
|
The equipment utilized to provide the features associated
|
|
with key sets, including keysets, multipair cable, key
|
|
service unit, distribution frames.
|
|
|
|
LEASED LINES
|
|
Any circuit or combination of circuits designated to be at
|
|
the exclusive disposal of a given subscriber.
|
|
|
|
Synonym: Private line; Full Period Line.
|
|
|
|
LEAST COST ROUTING (LCR)
|
|
A method of automatically selecting the least costly
|
|
facility for transmission of a call.
|
|
|
|
Synonym: Most Economical Route Selection (MERS);
|
|
Automatic Route Selection; Flexible Route Selection.
|
|
|
|
LEVEL
|
|
An expression of the relative signal strength at a point
|
|
in a communications circuit compared to a standard.
|
|
|
|
LOADING
|
|
A system for adding regularly spaced inductance units to a
|
|
circuit to improve its transmission characteristics.
|
|
|
|
LOCAL ACCESS AND TRANSPORT AREA (LATA)
|
|
A geographic area (called "exchange" or "exchange area" in
|
|
the MFJ) within each BOC's franchised area that has been
|
|
established by a BOC in accordance with the provisions of
|
|
the MFJ for the purpose of defining the territory within
|
|
which a BOC may offer its telecommunications services.
|
|
|
|
LOCAL AREA NETWORK (LAN)
|
|
Intraoffice communication system usually used to provide
|
|
data transmission in addition to voice transmission.
|
|
|
|
LOCAL EXCHANGE CARRIER (LEC)
|
|
A local telephone company, either one of the Bell
|
|
Operating Companies or one of the 1400+ independent local
|
|
telephone companies.
|
|
|
|
LOCAL LOOP
|
|
The local connection between the end user and the Class 5
|
|
central office.
|
|
|
|
LONG HAUL
|
|
Circuits spanning considerable distances.
|
|
|
|
LOOP BACK
|
|
A method of performing transmission tests on a circuit not
|
|
requiring the assistance of personnel at the distant end.
|
|
|
|
LOOP SIGNALING
|
|
Any of the three signaling methods which use the metallic
|
|
loop formed by the trunk conductors and the terminating
|
|
equipment bridges.
|
|
|
|
MAIN DISTRIBUTION FRAME (MDF)
|
|
The point where outside plant cables terminate and from
|
|
which they cross connect to terminal or central office
|
|
line equipment.
|
|
|
|
MAIN PBX
|
|
A PBX directly connected to a tandem switch via an access
|
|
trunk group.
|
|
|
|
MANUAL TIE LINE
|
|
A tie line which requires the assistance of an attendant
|
|
at both ends of the circuit in order to complete a call.
|
|
|
|
MASTER GROUP (MG)
|
|
240 circuits processed as a unit in a carrier system.
|
|
|
|
MESSAGE TELEPHONE SERVICE (MTS)
|
|
AT&T's tariffed pricing name for long distance telephone
|
|
calls.
|
|
|
|
MESSAGE UNIT (MU)
|
|
A local toll rate calling plan which is time and distance
|
|
sensitive.
|
|
|
|
MICROWAVE (M/W)
|
|
Radio transmission using very short lengths, corresponding
|
|
to a frequency of 1,000 megahertz or greater.
|
|
|
|
Synonym: Microwave Radio.
|
|
|
|
MICROWAVE RADIO
|
|
|
|
Synonym: Microwave.
|
|
|
|
MODEM
|
|
A device which modulates and demodulates signals on a
|
|
carrier frequency and allows the interface of digital
|
|
terminals with analog carrier systems.
|
|
|
|
MODIFIED FINAL JUDGEMENT (MFJ)
|
|
The agreement between the U.S. Department of Justice and
|
|
AT&T governing the breakup of the pre-Divestiture Bell
|
|
System into AT&T and 22 Bell Operating Companies and other
|
|
entities. On August 26, 1982, U.S. District Court Judge
|
|
Harold Greene accepted, with modifications, an
|
|
AT&T/Justice Department settlement terminating the
|
|
government's 1974 antitrust suit against AT&T. Judge
|
|
Greene's decree did away with the provisions of the 1956
|
|
consent decree that had kept AT&T out of competitive,
|
|
unregulated ventures.
|
|
|
|
MODULATION
|
|
Alterations in the characteristics of carrier waves.
|
|
Usually impressed on the amplitude and/or the frequency.
|
|
|
|
MONITORING DEVICE
|
|
Records data on calls placed through a company's telephone
|
|
system: number called, length of calls, calling location.
|
|
|
|
MOST ECONOMICAL ROUTE SELECTION (MERS)
|
|
|
|
Synonym: Least Cost Routing.
|
|
|
|
MULTIPLEXING
|
|
The act of combining a number of individual message
|
|
circuits for transmission over a common path. Two methods
|
|
are used: (1) frequency division, and (2) time division.
|
|
|
|
NETWORK
|
|
A collection of switches connected to one another by
|
|
transmission facilities.
|
|
|
|
NETWORK NUMBERING EXCHANGE (NXX)
|
|
The three digit location code representing the central
|
|
office. "N" may be any number between "2" and "9" and "X"
|
|
may be any number.
|
|
|
|
NETWORK TRUNKS
|
|
Circuits connecting switching centers.
|
|
|
|
NNX CODES
|
|
The 3-digit code used historically for local Exchange
|
|
Codes. "N" can be any number from 0 to 2, "X" can be any
|
|
digit. The current numbering plan allows for more
|
|
variation in assigning Exchange Codes, and under it
|
|
Exchange Codes are commonly referred to as "NXXs."
|
|
|
|
NODE
|
|
A major switching center of a network.
|
|
|
|
NON-BLOCKING
|
|
A switching network having a sufficient number of paths
|
|
such that a subscriber originating a call can always reach
|
|
any other idle subscriber without encountering a busy.
|
|
|
|
NUMBERING PLAN AREA (NPA)
|
|
A geographical division within which no two telephones
|
|
will have the same 7 digit number. "N" is any number
|
|
between "2" and "9"; "P" is always "1" or "0"; and "A" is
|
|
any number excluding "0". Commonly referred to as "area
|
|
code."
|
|
|
|
NXX CODES
|
|
The current general configuration for Exchange Codes
|
|
within each Area Code. See also: "NNX Codes"
|
|
|
|
OFFERED TRAFFIC
|
|
The number of call attempts in any specified period of
|
|
time.
|
|
|
|
OFF HOOK
|
|
The condition which results when a telephone is lifted
|
|
from its mounting, allowing the hookswitch to operate.
|
|
|
|
OFF-NETWORK ACCESS LINE (ONAL)
|
|
A local exchange (Feature Group access), Foreign Exchange,
|
|
or WATS line connecting both incoming and outgoing traffic
|
|
from a long distance company's network to the public
|
|
switched network. Generally a circuit leased by a long
|
|
distance carrier to be used by many customers not hooked
|
|
directly into the long distance carrier's network.
|
|
|
|
OFF NETWORK CALLING
|
|
Telephone calls through a private switching system and
|
|
transmission network which extend to the public telephone
|
|
system.
|
|
|
|
OFF PREMISES EXTENSION (OPX)
|
|
An extension telephone or keyset that is geographically
|
|
separated from its associated PBX.
|
|
|
|
ON HOOK
|
|
The condition which results when a telephone handset is
|
|
placed on its mounting, which causes the hook-switch to
|
|
open its contacts.
|
|
|
|
ON NETWORK CALLING
|
|
A term used to describe a call that originates and
|
|
terminates on a private network.
|
|
|
|
OPERATOR ASSISTED CALLS
|
|
Non-DDD calls requiring manual intervention.
|
|
|
|
ORIGINATING OFFICE
|
|
The central office that serves the calling party.
|
|
|
|
OTHER COMMON CARRIER (OCC)
|
|
A long distance company other than AT&T having many of its
|
|
own long distance circuits, either owned or leased. Some
|
|
people use OCC to refer to all AT&T long distance
|
|
competitors, including resellers, but this is not
|
|
technically correct.
|
|
|
|
OUT-OF-BAND
|
|
Any frequency outside the band used for voice frequencies.
|
|
|
|
OUT-OF-BAND SIGNALING
|
|
Use of narrow band filters to place the voice signal on a
|
|
carrier channel below 3,400 CPS, reserving the 3,400 -
|
|
3,700 CPS band for supervisory signals.
|
|
|
|
OVERBUILD
|
|
Adding radio capacity to a telecommunications network.
|
|
|
|
OVERFLOW
|
|
Switching equipment which operates when the traffic load
|
|
exceeds the capacity of the regular equipment.
|
|
|
|
PAD
|
|
A non-adjustable resistance network used to insert
|
|
transmission loss into a circuit.
|
|
|
|
PHASE JITTER
|
|
SEE Jitter
|
|
|
|
POINT OF PRESENCE (POP)
|
|
A physical location within a LATA at which an IC
|
|
establishes itself for the purpose of obtaining LATA
|
|
access and to which the BOC provides access services.
|
|
|
|
POINT-TO-POINT
|
|
A communications circuit between two terminations which
|
|
does not connect with a public telephone system.
|
|
|
|
PORT
|
|
Entrance or access point to a computer, multiplexor device
|
|
or network where signals may be supplied, extracted or
|
|
observed.
|
|
|
|
POSTAL TELEPHONE AND TELEPGRAPH (PTT)
|
|
Foreign government agencies responsible for regulating
|
|
communications.
|
|
|
|
PRIMARY AREA
|
|
A customer's local telphone calling area.
|
|
|
|
PRIMARY INTEREXCHANGE CARRIER (PIC)
|
|
The IC designated by a customer to provide inter-LATA
|
|
service automatically without requiring the customer to
|
|
dial an access code for that carrier.
|
|
|
|
PRIMARY ROUTING POINT
|
|
The switch designated as the control point for a longhaul
|
|
telephone call.
|
|
|
|
PRIVATE BRANCH EXCHANGE (PBX)
|
|
A private phone system (switch) used by medium and large
|
|
companies which is connected to the public telephone
|
|
network (local telco) and performs a variety of in-house
|
|
routing and switching. User usually dial "9" to get
|
|
outside system to the local lines.
|
|
|
|
PRIVATE LINE (PL)
|
|
A full-time leased line directly connecting two points,
|
|
used soley by purchaser. The most common form is a tie
|
|
line connecting two pieces of a user's own phone equipment
|
|
- flat rate billing, not usage sensitive.
|
|
|
|
PRIVATE USE NETWORK
|
|
Two or more private line channels contracted for by a
|
|
customer and restricted for use by that customer only.
|
|
|
|
PUBLIC SWITCHED NETWORK (PSN)
|
|
The pre-Divestiture nationwide network maintained by AT&T
|
|
and the independent telephone companies which provides
|
|
nationwide, unrestricted telephone service.
|
|
|
|
PUBLIC UTILITY COMMISION (PUC)/PUBLIC SERVICE COMMISSION (PSC)
|
|
The state commissions regulating intrastate
|
|
communications.
|
|
|
|
PULSE CODE MODULATION (PCM)
|
|
The form of modulation in which the information signals
|
|
are sampled at regular intervals and a series of pulses in
|
|
coded form are transmitted representing the amplitude of
|
|
the information signal at that time.
|
|
|
|
PULSE-LINK REPEATER
|
|
Connects one E&M signaling circuit directly to another.
|
|
|
|
PULSE MODULATION
|
|
The modulation of a series of pulses which represents
|
|
information - bearing signals. Typical methods involve
|
|
modifying the amplitude (PAM), width or duration (PWM) or
|
|
position (PPM). Pulse Code Modulation (PCM) is the most
|
|
common modulation technique involved in telephone work.
|
|
|
|
PUSH BUTTON DIALING
|
|
Synonym: Dual Tone Multi-Frequency.
|
|
|
|
QUEUE
|
|
A temporary delay in providing service caused by the
|
|
inability of the system provided to handle the number of
|
|
messages or calls attempted.
|
|
|
|
RADIO COMMON CARRIER (RCC)
|
|
A communications common carrier that provides radio paging
|
|
and mobile telephone services to the public.
|
|
|
|
RATE CENTER
|
|
A specified geographic location used by the telephone
|
|
company to determine interchange mileage for rate
|
|
determination purposes.
|
|
|
|
REDUNDANCY
|
|
Duplicate equipment that is provided to minimize the
|
|
effect of failures or equipment breakdowns.
|
|
|
|
REGENERATION
|
|
The process of receiving distorted signal pulses and from
|
|
them recreating new pulses at the correct repetition rate,
|
|
pulse amplitude, and pulse width.
|
|
|
|
RE-HOMING
|
|
A major network change which involves moving customer
|
|
services from one switching center to another and
|
|
establishing the necessary trunking facilities to do so.
|
|
|
|
REMOTE ACCESS
|
|
The ability of transmission points to gain access to a
|
|
computer which is at a different location.
|
|
|
|
REPEATER
|
|
An electronic device used to amplify signals which have
|
|
become too weak.
|
|
|
|
REPEATING COIL
|
|
The telephone industry's term for a voice-frequency
|
|
transformer.
|
|
|
|
RESELLER
|
|
A long distance company that purchases large amounts of
|
|
transmission capacity or calls from other carriers and
|
|
resells it to smaller users.
|
|
|
|
RESTORATION
|
|
The re-establishment of service by rerouting, substitution
|
|
of component parts, or as otherwise determined.
|
|
|
|
RETARD COIL
|
|
A coil having a large inductance which retards sudden
|
|
changes of the current flowing through its winding.
|
|
|
|
RINGBACK TONE
|
|
Synonym: Audible Ringing Tone.
|
|
|
|
RINGDOWN
|
|
A circuit or method of signaling where the incoming signal
|
|
is actuated by alternating current over the circuit.
|
|
|
|
ROUTE DIVERSITY
|
|
Two (or more) private line channels (circuits) furnished
|
|
partially or entirely over two physically separate routes.
|
|
Serves to prevent total loss of service if one cable gets
|
|
cut or goes out.
|
|
|
|
ROUTE OPTIMIZATION
|
|
Synonym: Least Cost Routing.
|
|
|
|
ROTARY HUNT
|
|
An arrangement which allows calls placed to seek out an
|
|
idle circuit in a prearranged multi-circuit group and find
|
|
the next open line to establish a through circuit.
|
|
|
|
SATELLITE RELAY
|
|
An active or passive repeater in geosynchronous orbit
|
|
around the Earth which amplifies the signal it receives
|
|
before transmitting it back to earth.
|
|
|
|
SELECTIVE CALLING
|
|
The ability of a transmitting station to specify by the
|
|
use of assigned codes which of several stations is to
|
|
receive a message.
|
|
|
|
SERVICE AND EQUIPMENT RECORD
|
|
A list of equipment billed to customer by type, quantity,
|
|
monthly charge, location and billing dates.
|
|
|
|
SF SIGNALING (SINGLE-FREQUENCY)
|
|
A signaling system which uses a 2,600 Hz in-band signal on
|
|
the voice path. The tone is on in the idle condition,
|
|
pulsed for dialing, and off when the circuit is in use.
|
|
|
|
SHORT HAUL
|
|
Circuits designed for use over distances of 10-200 miles.
|
|
|
|
SIGNALING
|
|
The process of transferring information between two parts
|
|
of a telephone network to control the establishment of
|
|
communications between long distance carrier terminal
|
|
points, and customer equipment required for voice grade
|
|
dedicated circuits.
|
|
|
|
SIGNALING CONVERTER
|
|
A device with input and output signals that contain the
|
|
same information but employ different electrical systems
|
|
for transmitting that information. Used at the terminal
|
|
of a trunk to convert the equipment signals to the system
|
|
used on the trunk. Examples are: (1) ring down to SF,
|
|
(2) E&M to SF.
|
|
|
|
SIGNALING, IN-BAND
|
|
A type of signaling using an AC signal (usually 2,600 Hz)
|
|
within the normal voice band. This signal can be
|
|
transmitted from end to end of a long voice circuit
|
|
without an intermediate signaling equipment. Since the
|
|
signaling is audible, the signaling equipment must be
|
|
arranged for "tone on when idle" operation.
|
|
|
|
SIGNAL TO NOISE RATIO
|
|
Ratio of the signal power to the noise power in a
|
|
specified bandwidth, usually expressed in db.
|
|
|
|
SIMPLEX (SX) SIGNALING
|
|
A signaling path over a dry talking circuit which uses the
|
|
two sides of the circuit in parallel, derived by
|
|
connecting the midpoints of repeating coils or retardation
|
|
coils which are across the circuit.
|
|
|
|
SINGLE SIDEBAND RADIO (SSB)
|
|
A form of amplitude modulation of a radio signal in which
|
|
only one of the two sidebands is transmitted. Either of
|
|
the two sidebands may be transmitted, and the carrier may
|
|
be transmitted, reduced or suppressed.
|
|
|
|
SINGING
|
|
A continued whistle or howl in an amplified telephone
|
|
circuit. It occurs when the sum of the repeater gains
|
|
exceeds the sum of the circuit losses.
|
|
|
|
SOFTWARE DEFINED NETWORK (SDN)
|
|
A switched long distance service for very large users with
|
|
multiple locations. Instead of putting together their own
|
|
network, large users can get special usage rates for calls
|
|
made on regular long distance company switched long
|
|
distance services.
|
|
|
|
Synonym: Virtual Private Network.
|
|
|
|
SPECIAL GRADE NETWORK TRUNK
|
|
A trunk specially conditioned by providing amplitude and
|
|
delay equilization for the purpose of handling special
|
|
services such as medium-speed data (600 to 2400 BPS).
|
|
|
|
SPECIALIZED COMMON CARRIER (SCC)
|
|
Synonym: Other Common Carrier.
|
|
|
|
SPEED NUMBER
|
|
A one, three, or four digit number that replaces a seven
|
|
or ten digit telephone number. These numbers are
|
|
programmed into the switch in the carrier's office or in a
|
|
PBX.
|
|
|
|
STATION
|
|
Any customer location on a network capable of sending or
|
|
receiving messages or calls.
|
|
|
|
STATION MESSAGE DETAIL RECORDING (SMDR)
|
|
A computer generated report showing internal usage on a
|
|
telephone system. Usually including extension number,
|
|
trunk number used, phone number dialed, time of call,
|
|
duration and operator involvement.
|
|
|
|
STORE-AND-FORWARD
|
|
A technique in which a message is received from the
|
|
originator and held in storage until a circuit to the
|
|
addressee becomes available.
|
|
|
|
STORED PROGRAM CONTROL (SPC)
|
|
A system whereby the instructions are placed in the memory
|
|
of a commoncontrolled switching unit and to which it
|
|
refers while processing a call for instructions regarding
|
|
class marks, code conversions, routing, as well as for
|
|
trouble analysis.
|
|
|
|
SUPERGROUP (SG)
|
|
60 circuits processed as a unit in a carrier system.
|
|
|
|
SUPERMASTERGROUP (SMG)
|
|
600 circuits processed as a unit in a carrier system.
|
|
|
|
SUPERVISION
|
|
Synonym: Answer Supervision.
|
|
|
|
SUPERVISORY SIGNALS
|
|
A signal, such as "on-hook" or "off-hook," which indicates
|
|
whether a circuit or line is in use.
|
|
|
|
SWITCH
|
|
Equipment used to interconnect lines and trunks.
|
|
|
|
SWITCHED ACCESS
|
|
Connection between caller's phone system and switch of
|
|
chosen long distance carrier when a regular long distance
|
|
call using regular local lines is made. Also the
|
|
connection between the switch of caller's long distance
|
|
carrier in the distant city and the phone being called.
|
|
|
|
SWITCH HOOK
|
|
Synonym: Hookswitch.
|
|
|
|
SWITCHING
|
|
The operations involved in interconnecting circuits in
|
|
order to establish communications.
|
|
|
|
SWITCHING CENTER
|
|
A location at which telephone traffic, either local or
|
|
toll, is switched or connected from one circuit or line to
|
|
another.
|
|
|
|
SWITCHING OFFICE
|
|
A telephone company office which contains a switch.
|
|
|
|
T-1
|
|
24 voice channels digitized at 64,000 bps, combined into a
|
|
single 1.544 Mbps digital stream (8,000 bps signaling),
|
|
and carried over two pairs of regular copper telephone
|
|
wires. Used primarily by telephone companies until 1983.
|
|
Now used for dedicated local access to long distance
|
|
facilities, long-haul private lines, and for regular local
|
|
service. Today, most any 1.544 Mbps digital stream is
|
|
called T-1, regardless of its makeup or what the
|
|
transmission medium is.
|
|
|
|
T-CARRIER
|
|
A time-division, pulse-code modulation, voice carrier used
|
|
on exchange cable to provide short-haul trunks.
|
|
|
|
TAIL END HOP OFF (TEHO)
|
|
In a private network, a call which is carried over flat
|
|
rate facilities (Intermachine Trunks or IMT) to the
|
|
closest switch node to the destination of the call, and
|
|
then connected into the public network as a local call.
|
|
|
|
TANDEM
|
|
A switching arrangement in which the trunk from the
|
|
calling office is connected to a trunk to the called
|
|
office through an intermediate point.
|
|
|
|
TANDEM SWITCHING SYSTEM
|
|
Synonym: Tandem Tie Trunk Network.
|
|
|
|
TANDEM TIE TRUNK NETWORK (TTTN)
|
|
A serving arrangement which permits sequential connection
|
|
of tie trunks between PBX/CENTREX locations by utilizing
|
|
tandem operation.
|
|
|
|
TANDEM TRUNKING
|
|
Trunks which connect two or more switches together.
|
|
|
|
TARIFF
|
|
The published rates, regulations, and descriptions
|
|
governing the provisions of communications service.
|
|
|
|
TELCO
|
|
Local telephone company.
|
|
|
|
TELECOMMUNICATIONS
|
|
The transmission of voice and/or data through a medium by
|
|
means of electrical impulses and includes all aspects of
|
|
transmitting information.
|
|
|
|
TELEGRAPH
|
|
A system employing the interruption of, or change in, the
|
|
polarity of DC current signaling to convey coded
|
|
information.
|
|
|
|
TELEPHONE
|
|
A device which converts acoustical (sound) energy into
|
|
electrical energy for transmission to a distant point.
|
|
|
|
TELETYPEWRITER
|
|
A machine used to transmit and/or receive communications
|
|
on printed page and/or tape.
|
|
|
|
TERMINAL
|
|
A point at which information can enter or leave a
|
|
communications network.
|
|
|
|
TERMINAL EQUIPMENT
|
|
Devices, apparatus and their associated interfaces used to
|
|
forward information to a local customer or distant
|
|
terminal.
|
|
|
|
TERMINATION
|
|
(1) An item that is connected to the terminal of a circuit
|
|
or equipment. (2) An impedance connected to the end of a
|
|
circuit being tested. (3)The points on a switching network
|
|
to which a trunk or line may be attached.
|
|
|
|
TIE-LINE
|
|
A private leased line linking two phones or phone systems
|
|
directly. Can ring distant phone automatically when
|
|
telephone is lifted from its mounting, or when a short
|
|
code is dialed.
|
|
|
|
TIME DIVISION MULTIPLEXING (TDM)
|
|
Equipment which enables the transmitting of a number of
|
|
signals over a single common path by transmitting them
|
|
sequentially at different instants of time.
|
|
|
|
TOLL CALL
|
|
Any call to a point outside the local service area.
|
|
|
|
TOLL CENTER
|
|
A central office where operators (human or mechanical) are
|
|
present to assist in completing incoming toll calls.
|
|
|
|
TOLL OFFICE
|
|
A center for the switching of toll calls.
|
|
|
|
TOLL PLANT
|
|
The facilities that connect toll offices throughout the
|
|
country.
|
|
|
|
TOLL RESTRICTION
|
|
A restriction in outgoing trunks which counts the first
|
|
three digits dialed and diverts calls to forbidden codes
|
|
either to a busy tone, to the operator, or to a recorded
|
|
announcement.
|
|
|
|
TOUCH-TONE ADAPTOR
|
|
A device that can be connected to a rotary dial telephone
|
|
to allow for DTMF signaling.
|
|
|
|
TRAFFIC
|
|
Calls being sent and received over a communications
|
|
network.
|
|
|
|
TRAFFIC MEASUREMENT AND RECORDING SYSTEMS (TMRS)
|
|
A computer generated report showing usage information of
|
|
telephone systems. Usually this includes trunk
|
|
utilization, outages, queueing time, and the need for
|
|
additional common equipment.
|
|
|
|
TRAFFIC SERVICE POSITION SYSTEM (TSPS)
|
|
A toll switchboard position configured as a push button
|
|
console.
|
|
|
|
TRANSMISSION
|
|
The electrical transfer of a signal, message or other form
|
|
of data from one location to another without unacceptable
|
|
loss of information content due to attenuation,
|
|
distortion, or noise.
|
|
|
|
TRANSMISSION LEVEL
|
|
The level of power of a signal, normally 1,000 Hz, which
|
|
should be measured at a particular reference point.
|
|
|
|
TRANSMISSION SPEED
|
|
Number of pulses or bits transmitted in a given period of
|
|
time, usually expressed as Bits Per Second (BPS) or Words
|
|
Per Minute (WPM).
|
|
|
|
TRUNK
|
|
A telephone circuit or path between two switches, at least
|
|
one of which is usually a telephone company Central Office
|
|
or switching center. Regular local CO circuits are called
|
|
PBX trunks, because there is a switch at both ends of the
|
|
circuit.
|
|
|
|
TRUNK GROUP
|
|
An arrangement of communications channels into an
|
|
identical group.
|
|
|
|
TRUNK TYPE (TT)
|
|
Trunks that use the same type of equipment going to the
|
|
same terminating location.
|
|
|
|
TRUNK UTILIZATION REPORT (TUR)
|
|
A computer printout detailing the traffic use of a trunk.
|
|
|
|
TWO-WIRE CIRCUIT
|
|
(1) A channel for transmitting data in one direction at a
|
|
time. (2) A short distance channel using a single
|
|
send/receive pathway, usually 2 copper wires, connecting a
|
|
telephone to a switch.
|
|
|
|
TELETYPEWRITER EXCHANGE SERVICE (TWX)
|
|
A service whereby a customer's leased teletypewriter is
|
|
connected to a "TWX" switchboard and from there connected
|
|
over regular toll circuits to a teletypewriter of any U.S.
|
|
customer who subscribes to a similar service.
|
|
|
|
UNIFORM CALL DISTRIBUTOR (UCD)
|
|
A device located at the telephone office or in a PABX
|
|
which distributes incoming calls evenly among individuals.
|
|
|
|
UNIFORM SERVICE ORDER CODE (USOC)
|
|
The information in coded form for billing purposes by the
|
|
local telephone company pertaining to information on
|
|
service orders and service equipment records.
|
|
|
|
VALUE-ADDED NETWORK SERVICE (VANS)
|
|
A data transmission network which routes messages
|
|
according to available paths, assures that the message
|
|
will be received as it was sent, provides for user
|
|
security, high speed transmission and conferencing among
|
|
terminals.
|
|
|
|
VIA NET LOSS (VNL)
|
|
The lowest loss in dB at which a trunk facility can be
|
|
operated considering limitations of echo, crosstalk, noise
|
|
and singing.
|
|
|
|
VOICE CONNECTING ARRANGEMENT
|
|
An interface arrangement provided by the telephone company
|
|
to accomodate the connections of non-carrier provided
|
|
voice terminal equipment to the public switched telephone
|
|
network.
|
|
|
|
VOICE FREQUENCY (VF)
|
|
Any of the frequencies in the band 300-3,400 Hz which must
|
|
be transmitted to reproduce the voice with reasonable
|
|
fidelity.
|
|
|
|
VOICE GRADE
|
|
An access line suitable for voice, low-speed data,
|
|
facsimile, or telegraph service. Generally, it has a
|
|
frequency range of about 300-3000 Hz.
|
|
|
|
VOICE GRADE FACILITY (VGF)
|
|
A circuit designed to DDD network standards which is
|
|
suitable for voice, low-speed data, facsimile, or
|
|
telegraph service.
|
|
|
|
WIDE AREA TELECOMMUNICATIONS SERVICE (WATS)
|
|
WATS permits customers to make (OUTWATS) or receive
|
|
(INWATS) long-distance calls and to have them billed on a
|
|
bulk rather than individual call basis. The service is
|
|
provided within selected service areas, or bands, by means
|
|
of special private access lines connected to the pubic
|
|
telephone network via WATS-equipped central offices. A
|
|
single access line permits inward or outward service, but
|
|
not both.
|
|
|
|
WIDEBAND
|
|
A term applied to facilities or circuits where bandwidths
|
|
are greater than that required for one voice channel.
|
|
|
|
WIRE CENTER
|
|
The physical structure that houses one or more central
|
|
office switching systems.
|
|
|
|
"0" or "0-"
|
|
Zero minus dialing. Allows a caller to dial zero and
|
|
nothing else to get the Operator.
|
|
|
|
"0+"
|
|
Zero plus dialing. An operator assisted long distance call
|
|
which is charged to the calling party.
|
|
|
|
"00+" or "00-"
|
|
Double zero dialing. Allows a caller to get an AT&T
|
|
Operator in areas in which dialing only one zero would
|
|
connect the caller with the local Operator because AT&T
|
|
has given Operators back to the local telephone company.
|
|
|
|
"1+" DIALING
|
|
The capability to dial "1" plus the long distance number
|
|
for calls withing the North American Numbering Plan area.
|
|
Intra-LATA calls are carried by the local telephone
|
|
company. Inter-LATA calls are carried by the caller's
|
|
primary carrier, or by AT&T if equal access has not come
|
|
to the caller's area yet.
|
|
|
|
"10-XXX" DIALING
|
|
The ability to send calls over a carrier other than a
|
|
caller's primary carrier by dialing "10-XXX" then "1+" the
|
|
long distance number, where "XXX" is the 3-digit Carrier
|
|
Code of the alternative long distance company (also called
|
|
a secondary carrier). Available only to Equal Access
|
|
customers.
|
|
|
|
800 SERVICE
|
|
The ability of a caller to dial a long distance telephone
|
|
number without incurring a charge for the call, which is
|
|
paid for by the party offering the 800 number.
|
|
|
|
Synonym: Inward WATS service.
|
|
|
|
900 SERVICE
|
|
Allows callers to receive information from the service
|
|
provider via a recorded audio message, which can range
|
|
from 60 seconds to a continuous live hookup, by calling a
|
|
900 number. This service can also be used to enable
|
|
callers to vote or "make a choice" by dialing one of two
|
|
900 numbers. 900 calls are typically billed to the caller
|
|
at $.50 for the first minute of any call and $.35 for each
|
|
additional minute.
|
|
|
|
976 NUMBERS
|
|
Service which allows callers to listen to recorded
|
|
messages such as horoscopes, 'adult' dialogue, stock
|
|
market or sports reports by calling 976-xxxx. The local
|
|
telephone company charges callers a fee which is split
|
|
between the local telephone company and the service
|
|
provider.
|
|
|
|
|
|
---
|
|
|
|
|
|
ERRATUM - CORRECTIONS FROM LAST ISSUE
|
|
Essence
|
|
|
|
Last issue got through the mill pretty well.. the errors were small
|
|
and misplaced, but a few notable errors should be taken into
|
|
consideration.
|
|
|
|
i. You Didn't Get Duped
|
|
|
|
You weren't actually given an imitation file if your filesize was
|
|
wrong.. the official distribution copies were screwed around in the
|
|
quality control phase, and there was a discrepancy in the official
|
|
distribution. Here are the reported, and actual file sizes in the
|
|
distribution copies.
|
|
|
|
REPORTED SIZE IN BYTES [119895]
|
|
ACTUAL SIZE IN BYTES [120034]
|
|
|
|
The byte size of the magazine is reported in every issue(except for
|
|
the first) so that we won't have multiple distribution errors as we did
|
|
with the first issue. It is a quality control measure. Of course, this
|
|
will not prevent imitation files from spreading. Anyone can fake a file
|
|
and adjust the file size. Zencor Technologies(tm) has threatened to
|
|
discredit us, and we feel they may potentially be a source of imitation
|
|
files. We will leave it up to the reader to determine if the magazine
|
|
lives up to the standards you have come to expect from CiSSD, and whether
|
|
it is therefore, a fake.
|
|
|
|
If you want to be sure to get the real deal every issue, you can
|
|
download the official distribution version from the internet site:
|
|
|
|
ftp 141.214.4.135 docs/zines/revival/rvlcissd.xxx
|
|
|
|
where 'xxx' is the issue number. ie: 'rvlcissd.003'. If you do not
|
|
have internet access, then check 'Getting Revival', near the beggining of
|
|
this magazine for distribution sites.
|
|
|
|
|
|
ii. Voice Mail BBS date was WACkO!
|
|
|
|
The projected date for the Voice Mail BBS was somewhat unrealistic.
|
|
Several CiSSD members, including myself, are undergoing geographical
|
|
repositioning at this time, which would make it impossible to run a
|
|
stable voice mail. This date has been corrected in this issue, to
|
|
September 1st 1993.
|
|
|
|
The FAX date, on the other hand, accurate to a week, and the fax
|
|
line is now active.
|
|
|
|
|
|
|
|
---
|
|
|
|
ADVERTISEMENT:
|
|
|
|
____________________________________________________________________
|
|
- REVIVAL: New Distribution Sites -
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Revival magazine is looking for new distribution sites all over
|
|
the world. Requirements are not stringent. Any board with a positive
|
|
image, a few megs of hard-drive space, any hacking oriented message
|
|
base, and a knowledgable Sysop qualifies to be the first in its area.
|
|
|
|
Revival issue #4 is on its way, and we would like to set up sites
|
|
for distribution right away. Preffered sites are those who have
|
|
access to Internet, who can request revival from our internet site
|
|
automatically every other month.
|
|
|
|
To apply as a REVIVAL distribution site, write a message to
|
|
annon08ea@nyx.cs.du.edu, containing the password to an account by the
|
|
name 'REVIVAL'. For a faster response, phone The Downtown Militarized
|
|
Zone (+1 416 450 7087), and comment with your boards name and number,
|
|
as well as the password to the 'REVIVAL' account, or finally, you can
|
|
call voice to +1 416 417 0214, and have the same information handy.
|
|
____________________________________________________________________
|
|
- -
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
---
|
|
|
|
ZEN WHAT?
|
|
The Dope Man/Essence
|
|
|
|
Over the last few months, CiSSD has been having a problem with a
|
|
group named Zencor. We found it rather disturbing when we recieved
|
|
several apologies, for Zencor's misjudging our intent, and specially when
|
|
we stopped recieving threats from Zencor members, but all the quiet
|
|
seemed only to be a cover. Now they've gone and thrown the following
|
|
underground newsletter in our path. Mind you, they did TELL members not
|
|
to give it to us, but unfortunately, not all of their members are as
|
|
intellegent as their leader Zoth The Frog, and now we have a chance for
|
|
rebuttle. Oh and, shhhh.. don't tell Zencor!
|
|
|
|
|
|
Z> ZENCOR
|
|
Z> ======
|
|
Z>
|
|
Z> Progenerate Newletter Issue #1 : April 1993
|
|
Z> ===========================================
|
|
|
|
Y'know, that's mighty interesting Zoth. I clearly remember you
|
|
lecturing me on how our group was in it's infancy, and Zencor was
|
|
experienced. You told me about how Zencor was King of the Commodore 64
|
|
scene back in the day and we would die put up against a group with your
|
|
experience and knowledge. Hrmm.. Issue #1? Your first newsletter?.. Oh
|
|
that's because you used to teleport to group members houses right? Tsk
|
|
Tsk.. I'd hate to think you were telling a fib!
|
|
|
|
Z> CiSSD Group Exposed As CanTel Informants!
|
|
Z> -----------------------------------------
|
|
Z>
|
|
Z> The Canadian International Society Of Social Deviancy, composed of
|
|
Z> Dope Man, Terminator X, and Lister, has been exposed as a group bent
|
|
Z> on causing legal troubles for various underground societies, including
|
|
Z> ZENCOR.
|
|
|
|
Shoot! How'd you find out about this one? BTW: It's "Society FOR
|
|
Social Deviancy", but you don't have times to remember unimportant things
|
|
like that, Zoth A Frog.
|
|
|
|
Z> While Frog was in prison, members of ZENCOR (particularly ShortMan and
|
|
Z> Mystic Ruler) became friendly with these so-called hackers, and
|
|
Z> disclosed quite a bit of sensitive information to them.
|
|
|
|
While Frog was in prison? Oh yeah! I remember when you were in
|
|
Juvinile Hall having your asshole reamed*. BTW, you're group wasn't
|
|
exactly freindly with us, but they were as nice as you could expect
|
|
anyoine to be to their babysitter. Like you said Zoth A Frog, "They're a
|
|
bunch of fucking lamers, and you can babysit them if you want to". Sorry,
|
|
we're done babysitting for now.
|
|
|
|
Sensitive information? Since when was your Ex-Girlfreinds name
|
|
considered sensitive information? BTW: She's a wonderful person.. you
|
|
should take her out sometime!
|
|
|
|
Z> Suspicions on the part of high-level ZENCOR members lead to entry into
|
|
Z> the CiSSD VoiceMailBox.
|
|
|
|
Suspicions on the part of your high-level Zencor member(s)? Who are
|
|
they? I mean, I know there (is one)/(are some), but who are they, and
|
|
more importantly, why? By the way, you're the first person to ever
|
|
penetrate our voicemail box. I feel so raped. I'm sure you know the
|
|
feeling, fluffy.
|
|
|
|
Z> A number of messages were intercepted and recorded.
|
|
|
|
Congratulations. Which amazing Zencor brand phone did you use to do
|
|
it? The 'Super ZencordaPhone II'? What's the list price on that anyways?
|
|
$1580? Oh. Out of my budget, but since members pay to be in your group,
|
|
they get a 10% discount, right? How do I join?
|
|
|
|
Z> Amongst these were communications with a CanTel security
|
|
Z> officer. Apparantly this pig had apprehended CiSSD members (who were
|
|
Z> never overly adept at hacking activities) hacking VoiceMailBoxes for
|
|
Z> their own use.
|
|
|
|
... as opposed to for sale to the general public, like yours.
|
|
|
|
Z> There had been a deal arranged in which CiSSD members
|
|
Z> would inform the security officer (known as Bird Of Prey) of other
|
|
Z> hacker's activities in exchange for immunity. Frog extrapolates on
|
|
Z> this and theorizes, with supportive evidence that the thought-dead
|
|
Z> bunch of lamers (YAM) contracted CiSSD to "shut down rival groups".
|
|
|
|
Aha! And what supportive evidence would that be? Really! Please
|
|
write, and let me know.. more than likely this would be based on the same
|
|
supportive evidence that showed santa clause to deliver presents by
|
|
reindeer rather than via Federal Express.
|
|
|
|
Z> The following is a transcript of two of the most important messages
|
|
Z> intercepted:
|
|
|
|
In order to improve readability, I will title them for you.
|
|
|
|
Message #1:
|
|
|
|
Z> Dope Man, I havn't talked to you in a while, not that I'm sick of you
|
|
Z> or anything. I enjoy the conference calling that you guys do. You guys
|
|
Z> blend together, did you know that? Here's today's give and take.
|
|
Z> Here's my take and I'll give you my give after. I was talking to
|
|
Z> someone at Metro 55 division today, fraud, and someone has been
|
|
Z> hacking into some additional VMBs, nothing new, but this time leaving
|
|
Z> threatening messages to customers. On a tip from Bell Security they
|
|
Z> are going to the home of [SHORT MAN]. I don't know if your eyebrows
|
|
Z> have lifted or not, but it happens that this guy is also blind. It
|
|
Z> happens that this guy is hacking into US networks and has done about
|
|
Z> thirty-five thousand in fraud. [SHORT MAN] is going to be in a lot of
|
|
Z> shit, the guys in the US want to prosecute. Mabye you want to chat
|
|
Z> with him a bit. That's between you and I. I'm gonna give you the VMB
|
|
Z> and the password to SATAN and STAR. The conversations you will hear
|
|
Z> are the result of me taking back their VMBs, much like I did with you
|
|
Z> guys, but these guys aren't as trusting. These guys are on the heavy
|
|
Z> metal/drug end from what I can tell.
|
|
|
|
Now quickly, before we go on, lets take some time to organize our
|
|
minds. What did Bird of Prey say in this message?
|
|
|
|
GIVE TAKE
|
|
---- ----
|
|
|
|
- Password to a random Drugee's - Request for us to talk to
|
|
Voice Mail System. Short Man regarding his phone
|
|
hacking.
|
|
|
|
Shall we go on now then? Good.
|
|
|
|
Message #2:
|
|
|
|
Z> Bird Of Prey. Gotta like that. Satan has won the award for the
|
|
Z> stupidest non-paying subscriber ever at CanTel. So we've had to rub
|
|
Z> him out of the VMB hacking community for good. I was up till 1 last
|
|
Z> night, all he did was complain, calling me OPP, Rent-A-Cop, and I
|
|
Z> offered many times to do something and he kept saying "What's your
|
|
Z> game?". Well, he's toast, so goodbye. The total was about twenty-eight
|
|
Z> VMBs.
|
|
|
|
Now let's summarize this message. Bird Of Prey wipes out the VMB's
|
|
belonging to some hackers because they wouldn't accept the new ones he
|
|
was trying to give them, and he had to go to bed.
|
|
|
|
Z> Disgusting, isn't it?
|
|
|
|
Oh, I'd say! Gawd forbid he should get some sleep! (?!)
|
|
|
|
Z> Now then, what is ZENCOR going to do about it?
|
|
Z> The following plan has been enacted:
|
|
Z>
|
|
Z> 1) The RCMP has been dispatched to shut down all pirate CiSSD BBS
|
|
Z> systems, with ZENCOR-obtained file and user lists, recorded
|
|
Z> conversations and other evidence. All CiSSD computer equipment will
|
|
Z> be confiscated and a number of criminal charges will be laid.
|
|
|
|
Oh good! Call the police! That's what we should have done, but
|
|
you're the smarter hacking group.. only you would think of bringing the
|
|
Canadian equivelant of the FBI into it!
|
|
|
|
Only shutting down the CiSSD pirate systems? Oh! BTW, which ones
|
|
were those again? If you could let me know, we'll shut them down for
|
|
you.
|
|
|
|
Also, seing as you're so adept to taking down Pirate BBS's, I'm sure
|
|
that you'll have a great time getting access to any in the next little
|
|
while.
|
|
|
|
Z> 2) CanTel management has been informed of their "double-agent". Bird
|
|
Z> Of Prey will lose his fucking job.
|
|
|
|
Well, actually, it's not a fucking job, but coincidentally, it's
|
|
rather close to yonge street. Either way, the fucking jobs are best out
|
|
on jarvis.. oh.. and watch me shiver as I take you seriously. Unlike you,
|
|
Bird of Prey still has a job.
|
|
|
|
Z> 3) Other groups have been informed of CiSSD's plans to harm them.
|
|
|
|
Which would explain why they've been posting in our network so much
|
|
recently. I await their revenge. BTW: Are these the plans you've
|
|
SPECULATED we have to harm other groups? Or are these the ones I keep
|
|
hidden in the cookie jar, underneath the section carefully labeled
|
|
'DOUBLE FUDGE' in red ink?
|
|
|
|
Z> 4) Everyone involved in or connected with CiSSD has been successfully
|
|
Z> CN/Aed and all their personal information is on file.
|
|
|
|
Successfully? Wow! I'm impressed. I was beggining to think you
|
|
didn't know how to speak to an operator in english.
|
|
|
|
Z> 5) All ZENCOR systems to which CiSSD has any knowledge has been shut
|
|
Z> down completely.
|
|
|
|
Actually, no. Would you like a list?
|
|
|
|
Z> Furthermore, there will be NO FURTHER fraternization with CiSSD. Frog
|
|
Z> warned everyone about this sort of thing!
|
|
|
|
Frog this, frog that. Apparently, frog is a schizophrenic,
|
|
constantly reffering to himself in the third person, but I won't
|
|
complain.. as long as _Zoth A Frog_ doesn't fraternize with me, I'm
|
|
happy. Oh wait, did you want the last word? Here you go:
|
|
|
|
Z> Furthermore, there will be NO FURTHER fraternization with CiSSD. Frog
|
|
Z> warned everyone about this sort of thing!
|
|
|
|
_Notes:_
|
|
|
|
(+) Texts based on pre-release version of newsletter. Release version
|
|
was not avaliable at time of editing.
|
|
|
|
(*) See USENet Sex FAQ
|
|
|
|
---
|
|
|
|
|
|
CiSSD MEMBERSHIP INFORMATION
|
|
|
|
With a large resurganse in CiSSD activities, we have decided to
|
|
begin accepting some members through an application process. Our commune
|
|
is not yet large enough to accept the masses without rebellion, but is
|
|
open enough to accept those with ideas similar to our own, and open
|
|
minded enough to publish comment from those who are opposed to us. Please
|
|
write to annon08ea@nyx.cs.du.edu, and I will publish your comments, and
|
|
respond to 'letters to the editor.'
|
|
|
|
If you are seriously interested in becoming a CiSSD member, you can
|
|
download the CiSSD application from any CiSSD Headquarters BBS, and
|
|
upload the completed form, FAX(NEW!) the form to the CiSSD fax line, or
|
|
send the completed form E-Mail to annon08ea@nyx.cs.du.edu.
|
|
|
|
In addition to members, CiSSD will honour those who have special
|
|
achievements, members, or non members alike. If you know someone you
|
|
believe to deserve CiSSD recognition, please write to the same
|
|
address(annon08ea@nyx.cs.du.edu), leave a message on our voice mail, or
|
|
fax us information on why this person deserves special recognition.
|
|
|
|
NOTICE: richfair@eastern.com, mentioned in last issue, has ceased to
|
|
exist. The problem may be temporary, but the site is not reliable. Any
|
|
letters, or work that was sent to richfair@eastern.com last month was
|
|
lost. Many Apologies. Please use Lister's address
|
|
(annon08ea@nyx.cs.du.edu) until our mail problems are rectified.
|
|
|
|
|
|
---
|
|
|
|
[CiSSD] CONTACT ADDRESSES
|
|
|
|
|
|
The Downtown Militarized Zone BBS
|
|
(416) 450 7087 Sysop - The Dope Man
|
|
Revival Distribution Site
|
|
[CiSSD] WHQ/HeLL
|
|
|
|
The Revolutionary Front BBS
|
|
(416) 936 6663 Sysop - Lister
|
|
Revival Distribution Site
|
|
[CiSSD]/HeLL/cDc
|
|
|
|
CiSSD Voice Mail Canada
|
|
(416) 417 0214 Users - Essence - The Dope Man - Lister
|
|
|
|
NEW! - CiSSD Fax Line - (416) 250 5264
|
|
c/o The Dictator
|
|
|
|
CiSSD Voice Mail BBS - Projected for September 1 1993 (Canada Day)
|
|
(Projected date changed due to geograhical difficulties)
|
|
|
|
Lister - annon08ea@nyx.cs.du.edu
|
|
|
|
---
|
|
|
|
ADVERTISMENT:
|
|
|
|
______/\___/\X__ /\______ ___________ _______/\ /\____/\
|
|
\ ____/ __/ /_/ / / / / _\ /__ _//_/ / ____/
|
|
/ _ / / / // / /\ / / /\ / __/ / _/ // / _ /
|
|
/ \_/ /__ _ / |/ / / |/ / _/ / / _ / \_/
|
|
\____/_____X_// /_____/ /_____/ _/ / _/__// /\____/
|
|
\/ \/ \/ \/
|
|
____________________________________________________________________
|
|
- D A M N E D -
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Echo of the Damned is currently looking for Nodes in North
|
|
America [1:2773/NPA.0], and internationally where english is spoken on
|
|
Bulletin Board Systems [CoutryCode:2773/Node.0].
|
|
|
|
Echo of the Damned is dedicated towards the free flow of
|
|
information, and productivity in the h/p scene.
|
|
|
|
To apply as an Echo of the Damned node, please leave a voice
|
|
message, containing your bulletin boards name and telephone number, as
|
|
well as the password to an account named 'EOTD STAFF', at
|
|
+1 416 417 0214.
|
|
____________________________________________________________________
|
|
- -
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
|
|
---
|
|
|
|
LAST WORDS FROM THE EDITOR
|
|
Essence/TX
|
|
|
|
I pushed my luck long enough. It was only a few weeks, but my
|
|
parents got sick and tired. When sleeping at home becomes an optional
|
|
extra, you definately have family problems. Interestingly enough, I
|
|
enjoyed being out on my own. I relied on my parents for food every few
|
|
days when I needed it; and if I was exhausted from overactivity, and
|
|
unable to sleep in -5c degree weather, I still had a bed at home where I
|
|
could sleep but I rathered not to. I was sick of being at home. I was
|
|
sick of my two parent, boy and girl child, middle class family. I hated
|
|
the american dream.
|
|
|
|
The dream was never quite what the stories tell you. Whenever I
|
|
showed my love for someone else, they were unresponsive. I gather, I too
|
|
was unresponsive when someone loved me. Whenever there was an argument, I
|
|
was reason and my mother, or my sister was emotion. My dad and I never
|
|
fight. He too is reasonable. He too argues with my mother. They should
|
|
never have stayed together, as respectively they are 'bad logic', and
|
|
'bad love'.
|
|
|
|
Had they only loosened the noose a little, and let me be me, instead
|
|
of someone they were moulding me into, I might still want to be with
|
|
them; I might still care. But they didn't and I don't. They reach for me,
|
|
and I break their hearts. I don't have time for them, I need to get out
|
|
and be with my freinds.
|
|
|
|
Had they only seen what I was feeling, heard what I was saying,
|
|
known what I knew, we could still be the american dream. Sometimes, to
|
|
really love someone, you have to let them go. I guess, they were only
|
|
dreaming. Maybe next time round, they'll listen closer.
|
|
|
|
|
|
|
|
CREDITS
|
|
|
|
The Dope Man Repeat contributor, and CiSSD President. There's no
|
|
CiSSD/HeLL business like .. Show Business.
|
|
|
|
Lister Interpersonal relations and repeat contributor. If
|
|
CiSSD/HeLL you like his articles, send him some Vodka.
|
|
|
|
The Dictator Repeat offender, who feels that political revolt is
|
|
CiSSD payment enough for his writings.
|
|
|
|
The Grappler Spreading diatribes to and fro, he's progressing from
|
|
CiSSD the imaginary world of C=64, that so many of us hated
|
|
to leave behind when we grew up.
|
|
|
|
Kryten Contributor who attends many CiSSD meetings for the
|
|
Independant free pizza. Gusto's *SUCKS* when it's cold.
|
|
|
|
City-TV Thanks for making our release weekend enjoyable. Drop
|
|
Chum by anytime!
|
|
|
|
Essence/TX Editor. See you next issue.
|
|
CiSSD
|
|
-------------------------------------------------------------------------
|
|
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY (C) 1993/94
|
|
------------------------------------------------------------------------- |