Copy Link
Add to Bookmark
Report

Private Line different issue

eZine's profile picture
Published in 
Private Line
 · 5 years ago

  


private line: a journal of inquiry into the telephone system

private line
5150 Fair Oaks Blvd. #101-348
Carmichael, CA 95608 USA

privateline@delphi.com
(916) 978-0810 FAX

$27 a year for 6 issues. Mexican and Canadian subscriptions are
$31 and overseas subscribers have to pay $44 :(
A sample of the current issue is $4.00.

................................................................................

I. Editorial Page
II. Updates and Corrections
III. Letters
IV. The Internet Bridge
V. Cell Phone Basics, Part II
A. Toll Fraud
VI. An Interview With Damien Thorn
VII. The entire Digital Telephony Bill
VIII The Text of 18 USC 1029
IX. The Text of 47 CFR 22.919
(The regulation prohibiting cloning)


I. EDITORIAL PAGE

What's All This Stuff About The Law?

1. Welcome to a very different issue of private line. It contains
much more on telecom law than I have ever put in. Much more, in
fact, than I ever wanted to put in. The first mission of private
line is to advance technical knowledge, especially for beginners.
But I promised many people that I would include the text of the
entire bill in this issue. I think that people should read this
legislation. The problem was that I underestimated its size. To my
horror the bill took up five full pages in unreadable eight point
type once I keyboarded and scanned it in. Check out page 82 to get
a sample. I then converted the text to nine point type. Better.
That resulted, however, in nine pages. Gulp.

2. Well, since the article would take up so much room in unedited
form, I decided to expand the magazine to 32 pages this issue.
This allowed me to put in some comments and a few charts to make
the bill a little more understandable. This was a very tough bill
to make sense out of and organize. I used to do legal research for
a living. My special resentment of this bill has to do with its
complexity and the fact that an average per son had little chance
of dealing with it when it was created. I think you'll see what I
mean when you read it. By the way, my comments are meant to
breakup the layout of the text -- nothing more. I know every one
has their own opinion.

3. I'm writing this on April 6, 1995. I'm up to 67 subscribers and
I am very happy about this. Subscriptions, back issue orders and
news stand sales have now covered the cost of printing Number 4
and 5. That's a tremendous development. It gives me real
encouragement to go forward and better the magazine. Thank you
everybody.

4. The next issue will go back to regular telephone stuff. It will
feature a field guide to outside plant equipment. This is the
issue that I have wanted to do for a year! I am really looking
forward to putting It together. It may include as many as twenty
photographs. You'll be able to use it, for instance, to identify
all those mysterious green telco boxes by the side of the road.
1'11 have pictures, too, of things I've mentioned before. Like
open wire and solar powered payphones and party line phones. I'11
also have an article on how to build your own telephone system for
$25. private line marks its first anniversary in June. Thanks
again and I'11 see you all again in July.


UPDATES AND CORRECTIONS

5. More magazines and newsletters: On The Line is the magazine
of the California Payphone Association. It is a California
publication but it does have news from around the country. Similar
in feel to Public Communications. Should you get both? I think so.
Send them five dollars for a sample and judge for yourself. Their
address is: On The Line, c/o California Payphone Association, 2610
Crow Canyon Rd., Suite 150, San Ramon, CA 94583.

6. Telecom Publishing Group produces a number of interesting and
very expensive newsletters and reports. The Report on AT&T, for
example, claims to be the only newsletter that "focuses on AT&T
and its bloody turf battles" It comes out twice a month. It goes
along with The Report on AT&T FaxAlert; a bulletin by fax that
comes out within 24 hours of any surprise move by the long
distance carrier. Sounds great but it will cost you $697 a year.
They also produce Information Networks, Mobile Data Report, FCC
Report, Telco Business Report, Local Competition Report, State
Telephone Regulation Report and Advanced Wireless Communications.
These range from $397 to $591 a year for 24 issues. Oh, well. The
one good thing is that they don't charge $35 for a sample like the
Phillips' newsletters. They'll send you a free copy of one if you
really want it. Telecom Publishing Group, 1101 King Street, Suite
444, Alexandria, VA 22314. 1-800-739-452-8011 (orders) or (703)
739-6437.

7. Blacklisted! 411 is an interesting, 2600 like magazine that's
produced quarterly in southern California. They call themselves
"The Official Hackers Magazine!" You can order it through the
Tower chain now or in the future, possibly, through Fine Print
Distributors. Or send $4.95 for a sample to Blacklist! 411, P.O.
Box 2506, Cypress, CA 90630. (310) 596-4673.

8. Maurice Onraet mailed me copies of EDN and Electronic
Design. EDN bills itself as "The Design Magazine of the
Electronics Industry." It's a monthly that touches on a few
telecom subjects from time to time. The Cahners Publishing Company
publishes it 38 times a year. Supposedly $120 a year to non-
qualified subscribers in the U.S., though it looks like you could
get a free sub. Write for a sample: EDN, 8773 South Ridgeline
Blvd., Highlands Ranch, CO 80126-2329. (303) 470-4445. Electronic
Design is a real find. It's published by Penton Publishing, Inc.
This twice monthly magazine occasionally features articles that
directly impact telecom. Goldberg's article on PCS in the February
6, 1995 edition, for example, was a better read than a similar
article in the expensive IEEE Personal Communications. Electronic
Design has a $105 suggested subscription price but, again, I think
you ought to try for a free sub. I really recommend that you write
or call for a sample. Penton Publishing Subscription Lockbox, P.O.
Box 96732, Chicago, Il 60693. (216) 696-7000.

9. Cellular Marketing is another resource for cellular
information. It's a monthly that David Crowe says is now taking a
more technical orientation. Annual subscriptions are $29 in the US
and $39 in Canada and Mexico. Their subscription address is Argus
Circulation Center, PO Box 41528, Nashville, TN 37204. The
editorial address is 6300 South Syracuse Way, Suite 650,
Englewood, CO 80111.

10. For you web types, AT&T is offering some of their industry
newsletters on the web for two months. In a March 6, 1995 press
release, AT&T promised that their home page would carry samples
of 24 technical and business newsletters that it produces for its
internal business units and AT&T Bell Laboratories. Sample issues
of the publications would be accessible without charge in April
and May. In return, users will be asked to evaluate the material.
"The trial will determine how useful the newsletters will be to
individuals and institutions outside of AT&T," according to Ralph
Quinn, of the AT&T Information Services Network. "After the trial,
the publications will be offered on the Internet at special
charter prices." This seems a mixed blessing. Some of these
publications may have had a closed subscriber list before. But
AT&T will undoubtedly charge some very high rates once the trial
is over. Oh, well. Their URL is:
http://www.att.com/newsls/index.html.
For inquiries about the trial, call the AT&T Information Services
Network at 908-582-2619, or send E-mail to rmq@library.att.com.

11. There's been quite a bit of interest in the telecom related
magazine list. I've decided to consolidate all the magazines
described in one easy to read list. I'll update it as I get
additions or corrections. Send me $2.00 (cash only, please) and a
number 10 S.A.S.E. and I'll send you the current list. In
addition, I'll extend your subscription by one issue if you can
supply me some current, detailed information on any of the
following: Telekom Praxis (German), Funkschau (German),
Commutations & Refutations (French), Philips Telecommunications
Review, Electrical Communication (published by Alcatel), Ericsson
Review; Siemens Telecom Report; Northern Telecom Magazine, or
Telesis (Canadian). I will also extend your sub if you tell me
about any other telecom magazine that my readers would be
interested in.

12. I've made a wonderful discovery! The McGraw-Hill
Telecommunications Factbook is the best overall book about the
telephone system that I have yet found. It is current and in
print. Nothing on coin line services or cellular but otherwise a
great read. It even explains tariffs. Good, clear diagrams. I
recommend it without reservation. Around $30. Get this book. The
rent can wait. Here's a quotation from a comprehensive chapter on
telecommunications fundamentals. This small section is about PBX
operation in a private network:
"In the simplest case, referred to as point-to-point tie-line
service, users access a trunk between two locations by dialing an
access code (unique to the tie trunk between those two locations),
followed by the desired station extension. For example a user on a
PBX in Chicago calling a PBX in New York City might dial 8-368-
xxxx. The digit 8 accesses a tie trunk group, 368 selects a
dedicated tie trunk between the Chicago and New York City PBXs,
and xxxx represents the called party's extension. A user on a PBX
in Washington, DC, might dial 8-479-xxxx to reach that same New
York City party over dedicated tie trunks between Washington, DC,
and New York City. A unique exchange number would thus exist for
each called location in this rudimentary private network,
depending upon the location of the originating call. A private
network call from Chicago to Washington, DC, could also be
completed via the New York City PBX if the calling party first
accesses the New York PBX and then manually dials the same access
code for Washington, DC, that a New York caller would use. This
type of service is known as manual dial tandem tie-line service
and it cannot automatically route calls through multiple PBXs to
take maximum advantage of network transmission facilities, or seek
alternate routes if first choice trunks are busy."
Great stuff. And that's just two paragraphs out of 374 pages
worth of information. The McGraw-Hill Telecommunications Factbook
is published by McGraw-Hill, Inc. Joseph A. Pecar, Roger
J.O'Connor and David A. Garbin are the authors. The ISBN number
is 0-07-049183-6. It's a paperback and it cost me $29.95. You
should be able to order it from any book store since it is in
print. You can also call McGraw Hill at 1-800-822-8158 to order.
Failing that, try writing to them at Order Services, 860 Taylor
Station Road, Blacklick, Ohio, 43004. And no, I don't make a dime
off this. Your editor pays for all of his books.

13. ImOkey submitted an article from the Numismatic News about
coin phone tokens. I'll reprint it next issue when I get more
space.

14. A few notes on the Roseville Telephone Company Museum. The
museum is open from 10 a.m. to 4:00 p.m. on Saturdays only. I
recommended seeing an antique store that had old telephones. The
lady who ran American Antiques has since passed away. The
collection of old telephones got moved out of that building and
sold to private collectors.

15. I stated in the first issue that Ericksson digital were
installed in many Motorola built cell sites. Uh, no. Ericksson
installed AXE 10's for many non-wireline carriers. The wireline
carriers tended to use Motorola equipment. Many non wireline
carriers use Ericksson. Motorola or Ericsson would only install
their own equipment. To take this further, each carrier builds
its own base station, maintains its own tower and uses their own
MTSO. One carrier will keep functioning even if something happens
to the other.

16. I don't want to turn private line into The Payphone Journal
but there's something I need to discuss at length. People tired of
coin line signaling can turn to the next article. I've gone over
the differences between COCOT and telco payphones at some length.
Much of that discussion revolved around my argument that red
boxing wasn't possible from COCOTs. I contended that in the case
of a 1+ call, for example, the payphone itself fixed the rates and
checked the coins deposited. It didn't need, consequently, to
signal any network resource like ACTS. A red box tone, therefore,
would go into nowhere and do nothing as a result.

17. Well, what if you call an operator? What if you wanted them to
place the call for you? What now? What happens when she asks you
to deposit $1.25? It's most likely that the standard redbox tone
gets delivered over the voice channel to the operator. You don't
hear it on your end because the audio gets muted when it's
transmitted. Many COCOT owners contract with AT&T or other
mainstream companies to provide operator services. I cannot
imagine a special tone to accommodate COCOTs. The bottom line? Red
boxing may work from certain older COCOTs that haven't been
updated. Ones that don't use a coin validator or circuitry that
either mutes the mouthpiece or filters out any quarter tone
originating from the transmitter.

18. Going further, the voice channel may also be used to initiate
coin return and coin collect. These would have to communicate
directly with the COCOT since there isn't any special equipment at
the CO to trigger a COCOT, unlike the telco payphone with its
dedicated coin line. So what might these COCOT frequencies be? How
about a steady tone of 697Hz & 1633Hz for coin return, 770Hz &
1633Hz for splash back (alerts a telco operator that the call
needs special handling) and 852Hz & 1633Hz for coin collect? These
tones differ considerably from the telco ones, such as those
published in the last issue. You should recognize these tones.
They are silver box tones, the "A", "B", and "C" keys
respectively. Any extended DTMF keypad should generate them. See
what you get for reading patents? Check out patent 4,924,497, Pay
Station Telephone Interface Circuits at your nearest Patent and
Trademark Libary or send $3.00 to the PTO to get all 33 pages of
it. Check or money order to: Commissioner of Patents and
Trademarks, Box 9, Washington, DC 20231.

19. There is one caveat to add to the above discussion. The patent
involved mentions standard red box tones. Yet the other three are
different from the usual telco tones. Are the normal tones now
obsolete or do operater service provider equipment distinguish
between COCOT and telco? They should be able to produce different
tones but I don't know if they do. COCOTs are registered with
different databases to prevent such things as calling collect to a
payphone. It is possible that a particular tone is sent depending
on the ANI.

20. I mention this confusion over signaling because we are moving
toward the next generation of payphone signals: digital. On The
Line reports that several telecom companies are working with
Pacific Bell to "lay the technological groundwork for further
competition in local service in California." That includes testing
the delivery of COCOT payphone signals over digital lines. Whoa.
Amtel, a large COCOT provider, is the sole private payphone
participant in these tests. They'll work the COCOT angle while the
rest of the companies "develop standards for interconnection and
interoperability of multiple networks, the processes and systems
required to support these standards, and the delivery of support
services such as 911 . . ." Yeah, yeah, yea. Back to the digital
line.

21. ISDN and Switched 56 need only an extra twisted pair. The
telco doesn't have to put in any special wiring to support these
services -- just two sets of conventional twisted pair. It may
indeed be possible to have a public picture phone in the near
future, say around the turn of the century. Stay tuned.

III LETTERS

22. Dear private line,

I'm reading the latest issue of private line and have a few
comments for you. First of all, pages 36 and 49 are totally blank
in my copy, not even the page numbers are there. I hope this is a
problem limited to just a few copies.
Next, debit vs. credit cards. I know this is confusing to folks
who don't spend their lives as accountants, or, in my case,
programming accounting software. Debit and credit have nothing to
do with positive or negative balances -- they mean the left and
right side of the ledger. The value of the potential calls on the
cards is an asset -- one increases the accounting for assets by
increasing the debit side of the balance sheet part of the ledger.
The bill you run up on your credit card is a liability -- which
are increased on the right or credit side. The confusion stems
from banking. Customer accounts in banks are actually liabilities
to the banks, so crediting one's account means an increase in the
bank's liability. And that's just the debit, or left side of the
ledger. . .

Enough accounting. You note how the collector appeal of phone
cards has artificially jacked up the prices. In Japan. where the
whole thing got started (Local phone calls are dirt cheap in
Japan), and before the sales tax, I and S yen coins disappeared
and the 10 yen coin - the cost of a local 2 or 3 minute call, was
on its way out) calling cards are usually a bargain. Sure, there
are collector cards, but the generic variety buys more message
units that a similar amount of 10 and 50 yen coins.
Regarding magazines -- I wrote an article in Poppin' Zits!,
later reprinted in Whole Earth Review, about hacking subscriptions
to invisible literature (or specialized trade magazines). At one
point, my girlfriend and I collected subs to over 100 of them, and
we never paid more than a stamp. I got my start in programming
after devouring issues of Data Nation and related publications. I
could fax you a copy, and if you're interested in reprinting some
of it, I might be able to find the original file and email it to
you. Keep up the great work.

Jerod Pore jerod23@netcom.com

23. "There were at least 60 defective copies of private line
Number 5. That's out of a press run of 1000. I found out about it
after I mailed my subscribers copies. Those with a defective copy
should drop me a line and 1'11 mail you a good copy with all the
pages. The terminology of calling cards is confusing. I may run
through the terms again when I do an article on the switches
involved."

24. Dear private line,

I just received private line number 5 in the mail today. I
think your list of magazines and newsletters is excellent. You did
miss Cellular Marketing Magazine. While in the past this was
probably more fluffy than Cellular Business (which isn't as bad as
your reader says), it now has three excellent columnists: Andy
Seybold, Lawrence Harte, who wrote a book on digital cellular, and
myself. (Well, two excellent columnists and one mediocre ...
myself.) It is trying to take a more technical focus.

Your article on cellular fell down on the concept of
validation. First of all, ESNs and MlNs cannot be fully validated
independently, they are only valid as a pair. Secondly, the HLR is
part of the home system, and is only one of three components that
are used in validation. The MSC (MTSO) has contact with the
subscriber. The VLR contains a database of roamers (conceptually,
it is usually physically part of the MSC). The HLR is remote (for
roamers) and contains the 'master record' for each subscriber. The
term HLR has been around a lot longer than Coral Systems and is I
believe a CCIT term (now renamed ITU-T, International
Telecommunications Union).

The databases developed by GTE and EDS are not as important as
they used to be. Switches and HLRs that comply to the IS-41
standard can avoid them completely. The GTE and EDS systems did
contain lists of individual MlNs and, more importantly, ESNs that
were bad. However. any validation of part of the MIN/ESN pair is
less good than going whole hog. The reason why GTE and EDS
developed those databases is that it took so long for the cellular
industry to develop the standards and networks to allow full real-
time validation; i.e. TIA Interim Standard IS-41 running over
mostly SS7 networks.

David Crowe 71574.3157@compuserve.com

25 "David Crowe writes Cellular Networking Perspectives. Many of
the terms he discusses above are explained and diagrammatically
represented in a special issue of that newsletter called "IS-41
Explained ". You can write for a free copy of it by sending a
request to Cellular Networking Perspectives, 2636 Toronto Crescent
NW, Calgary, AB T2N 3WI."

26. Dear private line,

Please accept this sample copy. As you can see, we have
advertising only. Buyers and sellers of telecom equipment. The
"Yellow Paper" of broker/dealers. I'm not sure I under
stand your publication but please send it to me and I'll send you
a 3d class subscription (2 years.) Thanks.

Judy B. Smith Telephone International, Inc.

27. Thanks for the sub. I don't understand this publication
myself. It's not a hacker zine or a corporate telecom magazine.
Even my subscribers don't quite understand it, as evidenced by the
following.

28. TO: Mr. TOM FARLEY
FROM: CHRIS THORNTON

I AM GLAD TO HEAR FROM YOU AND I DID RECEIVE THE lST. ISSUE. THE
INFORMATION LOOKED VERY MUCH LIKE THE CELLULAR PHONE TECHNICAL
INFO IN THE MOTOROLA CELLULAR PHONE TECHNICIAN GUIDE, WHICH IS THE
SAME INFO THAT IT SEEMS EVERY ONE IS AFTER IN THE CELLULAR UNDER
WORLD. BUT I AM NEW AT HACKING, PHONE PHREAKING, ACCESSING GOV.
COMPUTERS AND ETC. HOW DO I PUT TO USE THE INFO YOU PROVIDED IN
PRIVATE LINE? PLEASE INCLUDE A STEP BY STEP PROCESS. YOU COULD
USE THE WORD "MAYBE" TO COVER LEGAL ASPECTS IN FRONT OF SENTENCES
LIKE "MAYBE THIS IS METHOD A PERSON WOULD USE TO ACCESS & USE
ANOTHER PERSON'S CELLULAR PHONE OR GOVERNMENT COMPUTER MODEM PHONE
#. AND PRODUCE DETAILED EXACT STEPS TO GAIN ACCESS AND WHERE TO
GET THE EQUIPMENT MANUALS TO GET ACCESS. IN MY OPINION YOUR
FINANCIAL PROBLEMS WILL GO AWAY AS DID THE 2600 MAG WHEN THEY
BASICALLY DID THE ABOVE BUT NOW 2600 HAS BECAME A LAME DUCK
BECAUSE THEY GOT AWAY FROM WHAT MADE THEM THE KIND OF STEP BY STEP
GENERAL AND TECHNICAL INFO LISTED ABOVE. I AM INTERESTED IN THE
GOV. INTELLIGENCE, TREASURY, FEDERAL RESERVE, GOV. BIOCOMPUTER,
PHONE COMPANIES' MODEM PHONE #'S /PASSWORDS AND ACCESSING LOCAL
T.V.A., GOV. COMPUTERS THEN NETWORKING TO OTHER GOV. COMPUTERS
WHY? TO BE CHARGED ONLY A LOCAL CALL ON A PHONE BILL .

29. "HMMM. WHERE TO START? SHOULD I? THE INFORMATION contained in
the cellular article last issue was derived from all of the
materials I cited. I do all my own research and writing. It may
look similar to what others have done but it is not the same. The
AMPS call processing diagram, for example, is quite similar to a
chart first produced by OKI and later copied by such people as
Gibson in Cellular Mobile Radiotelephones. The original chart was,
to me, unreadable and aimless. I thought I did a good job of
taking that information and making it understandable. Maybe not.
I have not seen the Motorola manual you refer to. I can tell you
that I haven't had any luck getting manual retailers to advertise
or to correspond. Maybe you'll have better luck: Automated Info:
Technical Manual Experts (619) 931-0259 or (800) 331-6939; Phone
Guys USA (714)-843-9999 (800) 322-5443; or Technicom (908) 446-
0317. There's also Ventura Electronics but I don't have any
current info.

I explained in the last issue that I'm not interested in
writing specific hacking articles. There are too many things I
want to cover in general first. In addition, some of my articles
may not have any practical application. I wrote about post pay in
the first issue, for example, because no one else had written
about it, not because the article would be practical.

I do encourage people, however, to contribute anything they
have written that is specific or utilitarian. It would help make
private line a more interesting magazine. To this date, though,
there have not been any articles submitted to me for publication.
Writing an article might help you gain some of the practicality you
so desire. Pick a subject. Research it. Do some field work. Write
out your notes and then combine them to produce a story. The only
way that I really learn something is by experimenting and then
writing."

IV. THE INTERNET BRIDGE

I'm starting this service and column to help subscribers who
have technical questions that Damien or I can't answer. I'm limiting
it to those with no net access, those who can't take advantage of
the various telecom groups. I'll post your question to
comp.dcom.telecom.tech; the most technical of the USENET newsgroups.
Send me a #10 S.A.S.E. with your question. I'll engage in the
discussion needed to get an answer. Be prepared to wait -- some of
the best questions go unanswered or languish for weeks before a
response comes through. I'll then drop the reply, if any, into the
mail once I get it. Don't be suprised if the answer produces more
questions on your part. Let's run through an example of how this
worked recently. I got a letter and a old Specialized Products
catalog last week from a subscriber in Minnesota. The reader wrote,
in part, the following:
"I have a question. Note on page 167, in the second paragraph
from the top, the text states, 'Additionally, a momentary send
2713Hz button is provided to actuate Bell Model 829 Loopback
devices. The AM-44 fully complies with Bell System Technical
Reference (BSTR) 41009.' What is a Bell 829 Loopback device? What
does it do? How does a person access it? Can it generate ringbacks?
Or test dial speeds? Or provide loopback circuits for testing
circuit quality? Does the mentioned Technical Reference provide
insight?"
Hmmm. Another mystery. Just what I needed. I posted the basic
question to the group. Two days later I got this private reply from
Ken Wells in the Marshall Islands:
"The last time I saw an 829 was seven years ago. I am not sure
how many are installed these days. But I am sure there are still
thousands out there. The 829 was used to terminate a 4-wire analog
circuit at the customer premise. Essentially, it was a demarcation
point. The 829 could be looped from the central office with the
2713 tone. It could also be looped from either end of the circuit.
I can remember looping circuits in Huntsville, Alabama (Marshall
Space Flight Center) to all parts of the country. We inject a tone
and loop the distant end and send and receive tones for testing.
Before the Bell System breakup, the 'telephone company' would
install their modems (2096A for example) on the 'customer' side of
the 829. Most 829s I worked with were Western Electric. Some later
models were made by Telco Systems (called 829AF). Now, the local
phone company takes the circuit from the long haul carrier and
terminates it. The customer no longer has to buy or lease the
analog modem from Telco.
There were several versions of 829. Some were fixed level.
Others had adjustable levels (attenuation from WECO). Telco
Systems units required power and provided gain also. One version
had front panel jacks and another did not. I think we used 829B
mostly. I guess the short answer is that an 829 terminates a 4-
wire analog circuit. I think I have a Bell System Practice on the
829. If you are interested or just curious, I will be happy to fax
it to you. Just e-mail your fax number. No problem whatsoever."
As it turned out, Ken didn't have the BSP on hand but he
graciously sent the same information from an AT&T manual. The
BSPs, by the way, were Bell System standards, uniform practices
and procedures used by the Baby Bells. Bellcore still publishes
these in an updated form for many phone companies to follow.
Adding to our discussion was a public reply from Wayne Huffman:
"The 829 is used to test the levels on a voice-grade analog
private line -- there used to be tons of these. You accessed the
circuit (in the AT&T C.O., we used a SMAS panel -- I think that
stands for Switched Measurement Access System). You'd split the
circuit, and then send the 2713Hz tone. The 829 loopback unit,
installed where the line terminated at the customer premise, would
do exactly that -- loop the tx and rx pair together, to give you
continuity for testing. A 1004Hz tone was sent out the tx side,
and measured on the rx side, and compared against the circuit
layout card, which had the spec for that circuit. If all tested
well, we'd give it to the LEC to dispatch for a customer premise
trouble. Sending the 2713Hz again dropped the loopback. If you
were at the customer premises, you could hear the relay click, and
there was a 'LPBK' light to show the line was looped. Sometimes,
that was the only trouble -- someone left it looped. These units
are small slide-in cards, often mounted in a single 'Teletrend'
housing with a brick AC adapter. Most of this stuff is digital
now, I think."
I think these responses answer the questions put, don't you?
At least enough to go further? I had been putting off learning
about four wire signaling but I guess I'll have to read up on it
now. Would you like to see more of this kind of article? As a
footnote, I sent both men copies of private line for their
trouble. In addition, it turns out that Ken has written a ten page
report on the 900 industry -- a how to guide. Non-corporate
material on this subject is hard to find. "The Straight Scoop on
the Pay-Per-Call Industry," is available for $10.00 from Kenneth
R. Wells, 1142 Auahi Street, Suite 2014, Honolulu, Hawaii. 96814
(Checks, money orders, VISA, MC) Or order from 1-800-482-FACT.

V. CELLULAR PHONE BASICS, PART II

We looked at AMPS and analog call processing last issue. Now
let's go digital. TDMA or time division multiple access is the
most commonly used digital cellular system in America. Call set up
is the same as for AMPS. A conversation gets passed to TDMA once
the call gets going. TDMA systems and most TDMA phones can handle
AMPS calls as well. TDMA's chief benefit comes from increasing
call capacity -- a channel can carry three conversations instead
of just one. But, you say, so can NAMPS, Motorola's analog system
that we looked at last issue. What's the big deal?

NAMPS can carry the same number of calls as most TDMA
systems. NAMPS though, has the same fading problems as normal
AMPS, it lacks the error correction that digital systems provide
and it isn't sophisticated enough to handle encryption or advanced
services. Things such as calling number identification, extension
phone service and messaging. In addition, you can't monitor a TDMA
conversation as easily as an analog call. So, there are other
reasons than call capacity to move to a different system. Many
people ascribe these benefits to TDMA because it is a digital
system. Yes and no.
Advanced features depend on digital but conserving bandwidth
does not. How's that? Three conversations get handled on a single
frequency. Call capacity increases. But is that a virtue of
digital? No, it is a virtue of multiplexing. A digital signal does
not automatically mean less bandwidth, in fact, it may mean more.
[1] Multiplexing means transmitting two or more conversations on
the same frequency at once. In this case, small parts of three
conversations get sent simultaneously. This is not the same as
NAMPS, which splits the frequency band into three discrete sub-
frequencies of 10khz apiece. TDMA uses the whole frequency to
transmit while NAMPS does not. NAMPS does not involve
multiplexing. And besides, TDMA is a hybrid system, combining both
analog and digital components. It must be since it uses the AMPS
protocol to set up calls. Despite what the marketing boys say,
only CDMA or code division multiple access is a fully digital
system. More on CDMA later. Let's look at some TDMA basics first.
We see that going digital doesn't mean anything special. A
multiplexed digital signal is what is key. Each frequency gets
divided into six repeating time slots or frames. Two slots in each
frame get assigned for each call. An empty slot serves as a guard
space. This may sound esoteric but it is not. Time division
multiplexing is a proven technology. It's the basis for T1, still
the backbone of digital transmission in this country. Using this
method, a T1 line can carry 24 separate phone lines into your
house or business with just an extra twisted pair. Demultiplexing
those conversations is no more difficult than adding the right
board to a PC. TDMA is a little different than TDM but it does
have a long history in satellite working.
What is important to understand is that the system
synchronizes each mobile with a master clock when a phone
initiates or receives a call. It assigns a specific time slot for
that call to use during the conversation. Think of a circus
carousel and three groups of kids waiting for a ride. The horses
represent a time slot. Let's say there are eight horses on the
carousel. Each group of kids gets told to jump on a different
colored horse when it comes around. One group rides a red horse,
one rides a white one and the other one rides a black horse. They
ride the carousel until they get off at a designated point. Now,
if our kids were orderly, you'd see three lines of children
descending on the carousel with one line of kids moving away. In
the case of TDMA, one revolution of the ride might represent one
frame. This precisely synchronized system keeps everyone's call in
order. This synchronization continues throughout the call. Timing
information is in every frame. Any digital scheme, though, is no
circus. The actual complexity of these systems is daunting. I
invite you to read further if you are interested. [2]
There are variations of TDMA. The only one that I am aware
of in America is E-TDMA. It's operated in Mobile, Alabama by Bell
South. Hughes Network Systems developed E-TDMA or Enhanced TDMA.
It runs on their equipment. Hughes developed much of their
expertise in this area with satellites. E-TDMA seems to be a
dynamic system. Slots get assigned a frame position as needed.
Let's say that you are listening to your wife or a girlfriend.
She's doing all the talking because you've forgotten her birthday.
Again. Your transmit path is open but it's not doing much. As I
understand it, "digital speech interpolation" or DSI stuffs the
frame that your call would normally use with other bits from other
calls. In other words, it fills in the quiet spaces in your call
with other information. DSI kicks in when your signal level drops
to a pre-determined level. Call capacity gets increased over
normal TDMA. This trick had been limited before to very high
density telephone trunks passing traffic between toll offices.
Their system also uses half rate vocoders, advanced speech
compression equipment that can double the amount of calls carried.
Code Division Multiple Access has many variants as well.
InterDigital, for example, produces a broadband CDMA system called
B-CDMA that is different from Qualcomm's narrowband CDMA system.
For this article, however, I'll just mention a few things. I
give references at the end of the article for those going further.
[3]
A CDMA system assigns a specific digital code to each user or
mobile on the system. It then encodes each bit of information
transmitted from each user. These codes are so specific that
dozens of users can transmit simultaneously on the same frequency
without interference to each other. They are so specific that
there is no need for adjacent cell sites to use different
frequencies as in AMPS and TDMA. Every cell site can transmit on
every frequency available to the wireline or non-wireline carrier.
CDMA, is also much less prone to interference than AMPS or TDMA.
That's because the specificity of the coded signals helps a CDMA
system treat other radio signals and interference as irrelevant
noise. Some of the details of CDMA are also interesting.
Qualcomm's CDMA system uses some very advanced speech
compression techniques, in particular, a variable rate vocoder.
Phil Karn, one of the principal engineers has written that it
"[O]perates at data rates of 1200, 2400, 4800 and 9600 bps. When a
user talks, the 9600 bps data rate is generally used. When the
user stops talking, the vocoder generally idles at 1200 bps so you
still hear background noise; the phone doesn't just 'go dead'. The
vocoder works with 20 millisecond frames, so each frame can be 3,
6, 12 or 24 bytes long, including overhead. The rate can be
changed arbitrarily from frame to frame under control of the
vocoder." This is really sophisticated technology. Expect CDMA to
get going this year in more markets.
As I understand it, the Los Angeles area has one carrier
providing CDMA right at the moment. In the Seattle area, NewVector
was to have a Qualcomm type CDMA system operating by now but that
date keeps getting pushed back. Bell Atlantic Mobile and NYNEX
Mobile recently announced that they will deploy CDMA throughout
their coverage areas but they gave no dates. My feeling is that
the future is with this technology.

Toll Fraud --

I promised a look at some current information on cell fraud
in the last issue. The information I found, though. doesn't make
much sense. The ranges of dollar amounts given by industry can
only be labeled as guesses. Before beginning, let's look at
telecom in general to give us some perspective. Last yet the FCC
held a hearing on telecommunication fraud. The report stated that
industry and Secret Service officials estimate that toll fraud
runs between I billion and 5 billion dollars a year 141 That's
against an annual billing of 175 billion in 1993. Let's take the
high figure and say that toll fraud takes 3.5% of industry
revenue. Figures on cell fraud vary widely as well. The Seattle
Post Intelligencer reported late last year that law enforcement
and industry officials claimed that cell fraud costs between 400
million and one billion dollars per year. The head of CTlA's
(Cellular Tele communications Industry Association) fraud task
force, however, told Newsday on November 30, 1994 that cell fraud
cost his industry a million dollars a day. I've seen that one
million dollar figure many times, in articles such as the San
Francisco Chronicle on November 1, 1994 and the Sacramento
Business Journal on October 31, 1994. We must assume that they
were reporting previous year's figures for reasons I explain
later. I've chosen to stay with this CTIA estimate because they
are the leading trade organization. Based on 9 billion dollars in
cellular billing in 1993, we come out with a figure of 4% in fraud
for the same year. I suspect these figures for several reasons.
The main problem with industry estimates and CTIA figures is that
they don't break down the figures. There is no way, therefore, to
distinguish between subscription fraud, stolen phone fraud or
access fraud. Everything gets lumped into the big category of
fraud. Everyone who ever stiffed a carrier to run up a bill or
stole a phone to call Indonesia is practicing cellular fraud. Yet
the CTIA makes believe that cell phone cloning is the number one
problem. I suspect that the real problem Is bad debt. There are
currently 25 million phones in America with over 27,000
subscribers signing up every day. A cellular dealer gets a
percentage from each person they sign up. I know they run credit
checks but I'd like to see some real accounting on the number of
bad accounts.

The CTIA, though, tightly controls the flow of most
information about the cellular industry. Even Standard and Poor's
Industry Surveys, a widely respected publication, is forced to use
CTIA figures to develop their reports on the cellular trade. 151
Let me run through an example of how hard it is to get any
information from them and how worthless it is once you get it.
New York carriers now require their customers to use PIN numbers
before making a call, In explaining reasons why, the CTIA came up
with some specific numbers for the first time. They told the Wall
Street Journal on February 3d that cellular operators lost $482
million to fraud in 1994, a 32% increase over the previous year.

This lost revenue supposedly amounted to 3.7% of the
industry's $13 billion revenues in 1994. This figure was sharply
higher than the million dollar a day mantra they chanted in 1994.
What gives? Was it $482 million that they claim now or $365
million like they claimed last year? Part of the problem is that
they report these figures on a fiscal basis. June instead of
January. So things get hard to follow. But I hadn't seen anything
this high when I last checked in with them on January 22, 1995.
A 32 percent increase in fraud during 1994 would mean that a loss
of 365 million dollars occurred in the previous fiscal year of
1993. The cellular industry was a 9 billion dollar industry during
that time. I have in my possession, however, a CTIA document from
1993 that contradicts this. A report on fraud dated November 18,
1993 states that "There is no official reporting system, but
private estimates by carriers and others range from $100 million
to $300 million dollars a year." Well, well. What is it this
time? $365 million? $300 million? $100 million? There's a
discrepancy of at least 65 million dollars in fiscal year 1993
according to their own figures.

Leaving aside the fact that CTIA knows how to count profits
but not losses, let me tell you how to get this four page report.
It's called "Fast Facts: Cellular Telephone Fraud". Dial CTlA's
free fax on demand service at (202) 758-0721. Press the pound sign
when you hear the automated operator and then enter 3116 when it
asks you for a document. Don't hit the wrong key -- you'll wind up
in their voice mail system:) And believe it or not, this is still
the document that they deliver to the public by fax to report on
fraud. How concerned can they be when they don't even update
their figures? When they don't get them right In the first place?
And are their new figures any more accurate than what they had
before? Or does that $482 million dollar figure also have a range?
And can we assume that there is now an official reporting system?
And how much of that loss is from dead beats? Or stolen phones?
The CTIA may well have knocked down the percentage of fraud from
4% to 3.7%. It may even be below the industry rate for fraud right
now. But their fraud squad is growing and you won't see them go
away.

They've not only helped the Secret Service rewrite 18 U.S.C. as I
described on page 81, but they are now buying the S.S. the latest
cellular equipment to keep them up to date. I resent this shadow
police force becoming a part of our lives, especially when they
can't provide the information necessary to support their paranoia.

I mentioned that the New York area is moving to PINs. What's
interesting is that NYNEX uses hookflash to deliver the PIN and
not an easily poachable DTMF tone or data burst. I'm not sure how
it gets sent. One hookflash is normally 400 ms. of signaling tone
sent over the reverse voice channel. A four digit pin would need
multiple bursts of carefully spaced ST to accomplish the task.
40% of NYNEX customers have adopted PINs as of April 17. Cellular
One, though, is floating the idea of requiring customers to use
digital phones at the end of the year, to help combat fraud. Good
luck.
Two competing firms are currently working on radio
fingerprinting technology to block fraudulent calls. Corsair
Communications of Sunnyvale is a spin-off of TRW Wireless
Communications. TRW holds a minority interest in the company.
Corsair's product is called "PhonePrint" and it is currently
moving through the patent process so we can't take a look at the
specifics just yet. Nor will TRW comment. The PTO does not release
patent information while an invention is being considered (Just to
let you know, you can get copies of the entire patent file for
$125 from the PTO once a patent gets approved. This includes
material submitted by the applicant for the examiner to consider.
That might be dozens of documents concerning the patent that
interests you.) I did get one TRW employee to tell me, however,
that their technology fingerprints each phone off the air when it
registers. There is no need to bring the phone to a dealer to have
its profile logged. New phones and existing phones get profiled
together. Their system stores an analog signal profile of the
transmissions from a particular phone from any location once it is
first sent. Cloned phones get denied service when their profile
doesn't match the signature assigned to the original phone.

Cellular Technical Services or CTS is a Seattle software
company. They write programs for McCaw Cellular and others. Its
finger printing product is called Blackbird, which they claim has
been in development for three years. Los Angeles Telephone has
already installed the system at 50 cell sites. They claim that
field 90% of cloned phones were blocked during trials. Plans are
to install the equipment in Miami and New York as well. The
wireline carrier will probably use one fingerprinting program and
the non wireline carrier will use the other. Look for these
programs in only high fraud areas -- NYNEX claims they spend $15
million a year on anti-fraud technology -- a lot of fraud must
take place to justify this cost. There are also simple ways to cut
down on cloning. Motorola's "Clone Clear" is a program that works
with Motorola switches. It simply denies service to any phone with
the same ESN/MIN that tries to register while another phone with
that combination is in use. It doesn't determine which phone is
valid -- it just keeps one off the air. The carrier gets notified
of a clone once the legitimate caller complains.

Let me leave you with a funny story. Air Touch says that
over 400 people have been arrested in the Los Angeles area for
cloned phone fraud. Industry sources claim that 60% to 70% of cell
phone traffic on a Friday night in Oakland is pirated. Despite the
notoriety over cloning, it's obvious that the message isn't
getting out about its legality. A recent post to a USENET group by
a telecom employee asked if cloning was legal in California. I
quickly responded by citing case law, regulatory law and statutory
law to support my view that cloning was definitely NOT LEGAL!
To assure him that I wasn't some sort of CTIA goon, I wrote back
later. I said that I didn't have a problem with cloning when a
husband and wife, for example, shared two different phones with
the same ESN/MIN. They save a flat monthly by doing that, but it
is, of course, illegal. Much to my suprise, this employee of a
major firm wrote back that:

"My situation is that I support law enforcement
communications systems and have been asked by a
local police chief if I would like for his
son to clone my phone for me. The PD has
numerous cloned phones in use. We're asking
the DA for a legal opinion, based on your information."

Thanks again. (name of individual and firm withheld)

[1] "The most noticeable disadvantage that is directly associated
with digital systems is the additional bandwidth necessary to
carry the digital signal as opposed to its analog counterpart. A
standard T1 transmission link carrying a DS-1 signal transmits 24
voice channels of about 4kHz each. The digital transmission rate
on the link is 1.544 Mbps, and the bandwidth required is about 772
kHz. Since only 96 kHz would be required to carry 24 analog
channels (4kHz x 24 channels), about eight times as much bandwidth
is required to carry the digitally (722kHz / 96 = 8.04). The extra
bandwidth is effectively traded for the lower signal to noise
ratio." Fike, John L. and George Friend, Understanding Telephone
Electronics SAMS, Carmel 1983

[2] There's a wealth of general information on TDMA available. You
won't have any problem looking it up. Aside from magazines, these
books have snippets of information: Macario, Raymond Cellular
Radio: Principles and Design McGraw Hill, Inc., New York 1993 161;
and Myers, Robert A. ed., Encyclopedia of Telecommunications
Academic Press, Inc. San Diego 1989 321;

[3] Karn refers to On the System Design Aspects of Code Division
Multiple Access (CDMA) Applied to Digital Cellular and Personal
Communications Networks by Allen Salmasi and Klein S. Gilhousen
[WT6G], from the Proceedings of the 41st IEEE Vehicular Technology
Conference, St. Louis MO May 19-22 1991 and the May 1991 IEEE
Transactions on Vehicular Technology, which has several papers on
CDMA. (The Transactions are collections of papers published by the
IEEE on every conceivable piece of electronic technology.)\

[4] The paper I'm referring to is contained in a Notice of
Proposed Rulemaking issued by the FCC in early 1994 based upon an
En Banc Hearing on Toll Fraud. It is at Compu$erve under the title
of FRAUD.TXT . It has many interesting comments by industry types
on PBX fraud, payphone fraud, cell fraud, etc. I don't have an
exact date on it but the docket number is CC Docket 93-292. It may
be available from the FCC's duplicating contractor: International
Transcription Service at (202) 857-3800.

[5] Standard and Poors's Industry Surveys come out every week on a
different trade. Their reports of telecommunications are always
top notch. Check out the September 22, 1994 (Vol. 162, No. 38,
Sec 1.) for a good, current analysis of telecom.

NB: Write to Communications Test Instruments (CTI) for some
interesting information on cellular phone tracking and direction
finding equipment. Rt. 1 South, P.O. Box 712, Kennebunk, Maine
04043

VI. AN INTERVIEW WITH DAMIEN THORN

I first met Damien Thorn at Def Con last summer. I was
impressed that he was writing for Nuts and Volts and that he had
written for 2600 and Tap. I thought this interview might be a good
way to introduce him to private line's readers. In the immediate
future, we may reprint some of his more popular articles for Nuts
and Volts, but only after they have been expanded, updated and
revised for private line. They will also have different
photographs and more of them. This interview was done in Stockton
in March. It's shorter than I wanted but we were both under
deadline pressure for other articles and projects. Apologies.

What got you interested in hacking?

This all goes back to when I was 11 to 13 years old. I
really wasn't hacking, I was just trying to learn things. Talking
basically to anyone with the phone company that I could. I grew up
near Berkeley and my interest was in phones before there were any
computers to get involved with. The first switches that I saw were
in Oakland. The office that housed them had an ESS No. 1 and step
by step equipment. I heard MF tones blaring out of a speaker at a
test board during one visit to that office. I asked the guy what
they were. Because I had always heard those when I when I called
my cousin and I always wondered about them. He said he couldn't
talk about that and ushered us into the next room.
I used to go to UC Berkeley and hang out at their computer
lab and at the Lawrence Hall of Science above the university. I'd
play with actual teletypes spitting out rolls of yellow teletype
paper with tape punch readers on the side. There wasn't much
hacking then, I mean, I looked over people's shoulders, shoulder
surfing, snag passwords to other accounts, but to this day I
couldn't even tell you what computer these teletypes were hooked
up to.
By the time I was 15 or 16 I was living in the central
valley. Ronnie Schnell and I had hacked Compuserve and their
competitor The Source. Several hours into the process of
downloading all the accounts and passwords that existed on the
system, including those of the Dialcom computers that ran The
Source, we kept getting these messages to call a "Fritz" at
Dialcom immediately. Well, after talking to Fritz, Dialcom offered
to pay us five bucks an hour to find all their security holes and
tell them so they could patch them up. Which we did for a long
time, while installing some back doors of our own. Maybe six
months into that they thought they had their system pretty secure
and they sent all their subscribers notices telling them to change
their passwords. This was unbeknownst to us. In addition, they
started

encrypting their passwords. They changed everything at midnight
one night and effectively locked us out of the system. The Source
was a computer service operated by Readers' Digest. They didn't
own the computers, which were PRIMES, operated by Dialcom in
Silver Springs, Maryland. Dialcom also did e-mail for the
government and things like that. Governmental agencies and what
not. I think that bothered Dialcom a lot more than The Source.
That's because all their systems were pretty much the same, just
different applications of software running on them. It wasn't just
Source user id's we were pulling out but the Environmental
Protection Agencies' ids, mailboxes and so on.

What about TAP magazine?

The first issue came out in June, 1971. At that point I think
it started as YIPL: Youth International Party Line; Abbie Hoffman
had his hand in there somewhere. I think it was intended more as a
counterculture, screw the government type of thing. Within a few
issues it had evolved into being more telco related. Screw the
telco, here's how it works, here's how you away with something. I
came in later, say, within 20 issues of its demise.
The first article I wrote? I'm not sure, there were a couple
I wrote under several different nom-de-plumes which I'd rather not
mention. If people want to research it they can go take a look and
figure it out. But one was on COSMOS; I get to claim the
distinction of writing the first article on how the COSMOS system
worked. Essentially, COSMOS is a UNIX application that is used
basically for data entry and database management for where the
phone company's wires go. What pair goes with which wire. Things
like that. At that time that stuff was really cutting edge because
it was brand new, there were very few hackers, and not a lot of
phone phreaks. And today I look at things that have been published
in zines like Phrack. that go on for page after page after page
about COSMOS and it makes back then look like what it was -- kids
stuff.
The end of TAP? The spring of 1984. Some circumstances
happened with the editor's house apparently burning down, some
suspicious circumstances. Cheshire Catalyst, the number two person
in charge tried to revive it. A couple more issues came out and
then it faded away. He went off into the corporate world and
became a security consultant.

What about blue boxing?

I had a friend in the Bay Area who designed and built blue
boxes and actually got caught. They were able to put an DNR on his
line. Apparently at the time the way the law was interpreted that
the telco and law enforcement could also record on audio tape the
first thirty seconds of your phone calls simply for the purposes
of identifying who on that number was making the offending calls.

Any stupid phone tricks you can relate from yesteryear?

The usual. Blue boxing from pay phone to payphone by looping.
You could also loop with Sprint. There was no easy access, you
were dialing a seven digit number to access their network. So
you'd access their network locally, key in your Sprint code and
then call their POP in Texas. You'd get the Sprint dial tone, key
in a number back in California or whatever, New York, and start
looping around until eventualy the signal is so degraded that the
switch can't decode the touch tones. Or you'll get so much glare
on the line that the circuit goes into a feedback loop.

How is your BBS, Hacking Online, set up?

Hacking Online is a small network, running on an Intel
platform. A 486 DX266 machine with intelligent serial cards. We
currently support ten lines on that machine. It handles
communications: works the modems, has a port speed lock of 57.6
kbps, handles all the basic stuff. Our file libraries exist on two
SCSI drives which comprise four gigs. There's also two CD ROM
drives online. The other parts of the network handle our internet
messaging, e-mail and our USENET feed which comes in by
satellite. There's a dish on top of the roof which feeds a basic
PC that gets the data coming from the satellite receiver. It's all
processed and shot through the network to where the operating
system (the BBS) can import it. We run Glacticomm's Major BBS
software.

Why a satellite for the USENET feed?

USENET feeds can take up 80 megs a day. Transferring 80 megs
over a dial up phone line with a 14.4 modem would take up about
twenty hours. That would be an expensive connection, especially
since there is no local internet provider. Our internet messaging,
our e-mail, is done through a dial up UUCP, which stands for UNIX
to UNIX Copy Protocol. Essentially, our PC, for the purposes of
sending and receiving mail, emulates a UNIX machine, makes a call
to a Bay Area UNIX machine through an X.25 network so we're not
paying toll on that. The machines engage in the appropriate
handshaking, hands off the packets that contain our outgoing mail
and then receives our incoming mail, the connections terminate at
each end, the software unbundles and uncompresses the mail and
distributes it appropriately.


What's slowing down the internet connection?

Anyone who wants to get on the internet needs to go through a
service provider who has a host, connected through a leased line
or a T1 carrier to the net. Well, "the net" of course is a
euphemism because there is no net where you just plug in. And then
they provide the client software such as FTP, telnet, and gopher
which you use to go places or download files. A lot of areas don't
have that, including where we are here in Stockton. And you know,
we're just fifty miles south of Sacramento. So we want to
establish that service, to become the local internet provider.
People in Stockton, anyone who wanted to call us here in Stockton,
or Modesto or wherever we put our own little POPs, could get a
local internet connection. Once the leased line is in, expanding
just becomes putting a terminal server in another city with a
router and connecting a leased line between it and us here. The
costs are outrageous. There's an initial hardware investment which
is expected and I can't complain about that. Getting the leased
line to another provider who will serve as our connection is where
the expense comes in. California is divided into different LATAs,
which are geographical and political subdivisions which make no
sense. If we want to connect to Peter Shipley's service in the Bay
Area, for example, we have some problems. We may be able to get a
fractional T1 from Pacific Bell for three or four hundred dollars
a month up to the LATA point, then we have to pay a long distance
carrier another couple of hundred bucks to take it across the LATA
and then pay Pacific Bell again to carry it from the long distance
carrier's POP to Shipley's facility. Our subscribers, though,
would benefit from us being accessible from the net. Most of them,
almost all of them, in fact, are not within our local calling
area. We have people calling in every day from as far away as
Venezuela and Scotland, so they would rather call their local
internet provider and telnet over to us.

You're in small claims court with Pacific Bell?

We had some problems with installation. I wanted them to
discount their installation fee for missing their appointment and
generally screwing up the order. They said they couldn't because
their fees are regulated by tariff and they have to charge
everyone the same amount. We then called the state public utility
commission here in California and they basically said the same
thing. They told us that the phone company, though, is civilly
liable for missed appointments like any public utilities under
Senate Bill 101. They said we should just file a small claims
suit. So, we called Pacific Bell's corporate office and told them
what the PUC said. They admitted that was the case and they noted
in the record that they had missed the appointment. So, because
they can't discount my bill, I have to force them into court to
write me a check. It's the principal of the thing. They hide
behind the tariffs, there's nothing they can do. It pretty much
shields them from being responsible for their actions. Well,

I told them that we would sue them and we did. That's where we are
right now.

Where do you think cellular is going?

I don't think we're going to see much change in 1995. The
cloning problem I think will continue as it does now, which is an
acceptable loss to the carrier. There's not going to be much done
about it. I think we'll see some testing
of fraud prevention systems begin this year but things will
basically continue as they are.

What's up with this video of yours?

The intent of the video was to let people actually see the
technology that I've written about and that others have written
about. Lot of people have read articles about Motorola programming
software or how ESNs are snagged out of the air. We try to show
it. Here's a firmware replacement, this is the chip. Here's the
ESN in a Radio Shack phone, here's how you type over it. 'Type,
type type.' We took a lot of technology and demonstrated it.
Almost all of it was done in different places, none of it was done
over a kitchen table. We went everywhere from the Berkeley hills
to just outside the area of our local switch in Stockton. We also
visited Tech Support Systems in Menlo Park, the manufacturer of a
cellular surveillance device in a briefcase. We had them demo it.
Things like that.


-- LOCAL DIAL UP PROBLEMS --


Local internet connections aren't just a problem for
potential providers such as Hacking Online. Many of my readers
live beyond a local dialup for internet service. This interesting
article from Gannet highlights the situation:

If he didn't live in Pinehurst, N.C., Sydney Gregory might
already be on-line. But the retired businessman knows that if he
joins Prodigy, Compuserve or America Online, he'll have to pay
expensive long distance charges. Most of the "local" access
numbers they provide are in larger metro areas, not in small towns
like Pinehurst, a golfing mecca between Charlotte and
Fayetteville. "They all spread the word how wonderful these
programs are, but never mention (phone costs) if you're not in a
larger community," he says. "They should be more forthcoming."
Mark Dorosh of Shepherdstown, W.Va., agrees. The musician and
student, 33, had to quit America Online after racking up a $200
long-distance bill the first month. Shepherdstown has a state
college connected to Internet (as a student, Dorosh has access),
but he covets America Online's extensive library of electronic
music files. "Here I am, 70 miles from the nation's capital,
America Online is 73 miles away, and the closest local number is
300 miles the other way, he says. Whil

  
e Prodigy and Compuserve
maintain their own local access points, America Online uses phone
connections provided by SprintNet and Tymnet, says spokeswoman Pam
McGraw, so adding new numbers is "a net work provider issue."
Sprint has 500 access points (300 in the USA) and gets many
letters and petitions asking for more. "This has really become an
issue with users," says spokeswoman Evette Fulton. "Sprint has to
prioritize, because demand is coming in big-time." There are "no
magic numbers," she says, but population density, computer sales
and higher education are among factors considered in deciding if
"computer traffic in an area can sustain the cost" of adding new
points.
Prodigy's Brian Ek says 80 per cent of its customers have
local access, through Tymnet sites and its own 442-point network;
Andy Boyer of Compuserve says it reaches 92 percent, and "100 per
cent local dial is a very real goal." Compuserve members reach the
service via 380 access points (340 in the USA). About 120,000 U.S.
users don't have local access many connect either by an $8-an hour
phone line or "telneting in" from another computer on the
Internet.


-- WHAT IS A POP? --


POP stands for point of presence. A POP is a switch. It's
the place where calls go in a local area or LATA to a long
distance provider. It's what's accessed when you dial a 10XXX
code. Let's take an example. Let's say you use Sprint and that
you want to make a long distance call. Your local exchange
carrier, the one providing your local phone service, takes the
call from the central office serving you and routes it to a bigger
switch, often an access tandem switch like a No. 4ESS. From there,
your call is routed on trunks to a POP, which is often located
near a LATA boundary. Your call goes there and gets routed to
Sprint's long distance network. There can be several POPs in any
given LATA, depending on geography. You can tell that areas such
as Cook County or New York city would need several. In Sprint's
case, it is most probable that they own their own equipment at
each Point of Presence and that dedicated trunks carry Sprint
traffic to and from the POP. Is this clear? In other words, a POP
serves as the point that a long distance carrier connects to the
local exchange carrier. This connection occurs at a switch. The
IXC can usually determine the location for its POP.

A 10XXX code identifies each long distance carrier. This
serves to direct the call to the right long distance company
through the switch at the POP. 102888 for AT&T, 10222 for MCI,
10333 for Sprint and so on. Smaller companies may lease space on a
switch if they don't have their own facility. Thus, some LD
carriers may operate in certain areas but not in others. The
majority of smaller long distance carriers actually use AT&T's
network.

VII. THE DIGITAL TELEPHONY BILL

The article contains the full text of the Digital Telephony
Bill. It's officially known as the "Communications Assistance for
Law Enforcement Act." It was originally called "The
Telecommunications Carrier's Duty Act of 1994" while making its
way through Congress. Whatever you call it, this bill represents
the greatest threat to electronic privacy that Americans have ever
faced. Whether that threat will be carried out is a matter of
debate and speculation. What is not open to debate is that law
enforcement has been given the approval, the means and the money
to listen in on any call at any time from anywhere. The phone
system will be turned into a giant listening post, with
capabilities beyond the dreams of any old line communist leader.
Stalin would be envious.

This bill modifies or amends Title 18 of the U.S. Code as well
as Title 47. Title 18 deals with both federal crimes and federal
criminal procedure. Criminal law. Think of it as a federal penal
code. Title 18 comprises 14 volumes in annotated form! That's a
lot of crime. The bill modifies, for example, section 1029, which
I covered in the third issue. Title 47 deals with general law
concerning telegraphs, telephones and radio telegraphs. Civil law.
The bill creates a new chapter in this title as well amending
dozens of existing laws. Check out the chart on the opposite page.
Okay, you say, it's one big bill. Mucho details. What's the bottom
line?

The bottom line is that you and your friends are at risk.
Aren't there positives? Yes and no. Yes, encryption is not banned.
But that is not a benefit of the bill. You've had the right to use
and develop an encryption based phone all along. Some say that
that the bill requires surveillance to be conducted with the
"affirmative action of the telecommunications carrier" and that
this is a good thing. Nonsense. Wiretaps and REMOBS have always
required such intervention to be legal. The problem now is that
the such monitoring equipment will be permanently installed into
nearly every central office switch in America. Big Brother used to
leave. Well. friends, he's now staying put.

The biggest positive is that the system they envision is so complex from a
legal and
technical standpoint, that the whole thing may collapse under its
own weight. We can only hope. Speaking of complexity, the only
way to put this kind of omnibus legislation into perspective is to
look at each individual code section affected. And those sections
are scattered throughout several titles, not just 18 and 47. Teams
of lawyers drafted this monstrosity. Special interest groups
fought for various sentences, paragraphs and semi-colons over a
period of months and countless revisions. It could be argued that
no one outside of the players involved, could understand the
entire bill. The average citizen never had a chance. As complex as
this bill may seem, however, it is really more complicated than it
appears. That's because statutes don't stand on their own. The
United States Code constitutes statutory law. A legislative body
drafts and passes statutes.

Regulatory law is made by administrative bodies. Like the FCC or
the Justice Department. Regulations enable statutes. They make
the law specific. Statutes tell you what the law is. Regulations tell
you how the law will be carried out. Not all codes have a corresponding
regulation but many do. For example, this bill declares that
$500,000,000 gets paid by the government to the telephone companies.
This blood money helps with the cost of installing the equipment that the
bill itself requires. But how do you dispense a half billion
dollars? Section 109 of this bill requires that the Attorney
General and the FCC get together to pass the regulations needed to
carry out the payments. So, this bill is just one part of an even
bigger body of law. In addition, case law or common law modifies
both statutory and regulatory law. I featured Section 1029 in the
last issue. 1029 did not specifically state that cloned cellular
phones were access devices. $1029, after all, was first drafted
before cloning became a problem. The court in US v Brady, though,
strongly suggested that they were. Legislators often incorporate
or codify statutory law by amending code sections once case law
comes down. "Oh. we forgot to put in cloned phones? Okay, let's
change the law and include them. Next problem." It is completely
predictable that new technology and new court decisions will
affect the Digital Telephony Bill.

So, we have statutory law.
regulatory law and case law. Each may affect the other.. In
addition, the law is never administered fairly or evenly in all
cases at all times. How the law is actually carried out is as
important as what is written down. The bill makes listening in on
cord less phones illegal. The penalty, though, is only $500, about
what they fine you for littering in California. So, there won't be
much prosecution going forward over that section. Unless you are a
Mitnick type in which case you will be hounded for it. But if you
are a member of law enforcement and you just happen to have a
scanner, well, you know what the response will be.

+NOTE: MY COMMENTS ARE FRAMED BY PLUS SIGNS+

Diagram of The Digital Telephony Bill .......72

Introduction ................................7 3

Title 1, Interception of Digital And Other
Communications..............................74

Statute and Regulation Diagram ..............77

Title 2, Amendments to Title 18, United States
Code .......................................7 9

18 U.S.C. 1029 (As amended by the Digital
Telephony Bill) ............................81

Title 3, Amendments to the Communications Act
of 1934 ....................................82

TITLE I, INTERCEPTION OF DIGITAL AND OTHER COMMUNICATIONS

[Creates a new chapter (Chapter 9) within Title 47 of the United
States Code. Title 47 deals with "Telegraphs, Telephones & Radio
Telegraphs." The following section numbers belong to the Digital
Telephony Bill. The section numbers in Chapter 9 actually start at
1001. ]

SECTION 101. SHORT TITLE

This title may be cited as the "Communications Assistance for Law
Enforcement Act".

Section 102. DEFINITIONS

For purposes of this title --
(1) The terms defined in section 2510 of title 18, United
States Code, have, respectively, the meanings stated in that
section.
(2) The term "call-identifying information" means dialing or
signaling information that identifies the origin, direction,
destination, or termination of each communication generated or
received by a subscriber by any means of any equipment, facility,
or service of a telecommunications carrier.
(3) The term "Commission" means the Federal Communications
Commission.
(4) The term "electronic messaging services" means software-
based services that enable the sharing of data, images, sound,
writing, or other information among computing devices controlled
by the senders or recipients of the messages.
(5) The term "government" means the government of the United
States and any agency or instrumentality thereof, the District of
Columbia, any commonwealth, territory, or possession of the United
States, and any State or political subdivision thereof authorized
by law to conduct electronic surveillance.
(6) The term "information services"--
(A) means the offering of a capability for generating,
acquiring, storing, transforming, processing, retrieving,
utilizing, or making available information via telecommunications;
and
(B) includes --
(i) a service that permits a customer to retrieve
stored information for storage in, information storage facilities;
(ii) electronic publishing; and
(iii) electronic message services; but
(C) does not include any capability for a
telecommunications carrier's internal management, control or
operation of its telecommunications network.
(7) The term "telecommunications support services" means a
product, software, or service used by a telecommunications carrier
for the internal signaling or switching functions of its
telecommunications network.
(8) The term "telecommunications carrier"
(A) means a person or entity engaged in the transmission
or switching of wire or electronic communications as a common
carrier for hire; and
(B) includes--
(i) a person or entity engaged in providing
commercial mobile service (as defined in section 332(d) of the
Communications Act of 1934 (47 U.S.C. 332(d) or
(ii) a person or entity engaged in providing wire
or electronic communication switching or transmission service to
the extent that the Commission finds that such service is a
replacement for a substantial portion of the local telephone
exchange service and that it is in the public interest to deem
such a person or entity to be a telecommunications carrier for
purposes of this title; but
(C) does not include--
(i) persons or entities insofar as they are engaged
in providing information services; and
(ii) any class of category of telecommunications
carriers that the Commission exempts by rule after consultation
with the Attorney General.

+A telecommunications carrier includes local and long distance
phone companies, as well as cellular and PCS providers. An
information service provider seems to include any online data
base, internet provider or a BBS.+

SECTION 103. ASSISTANCE CAPABILITY REQUIREMENTS

(a) Capability Requirements -- Except as provided in
subsections (b), (c), and (d) of this section and sections 108(a)
and 109(b) and (d), a telecommunications carrier shall ensure that
its equipment, facilities, or services that provide a customer or
subscriber with the ability to originate, terminate, or direct
communications are capable of--
(1) expeditiously isolating and enabling the government
pursuant to a court order or other lawful authorization to
intercept, to the exclusion of any other communications, all wire
and electronic communications carried by the carrier within a
service area to or from equipment, facilities, or services of a
subscriber of such carrier concurrently with their transmission to
or from the subscriber's equipment, facility, or service, or at
such later time as may be acceptable to the government;
(2) expeditiously isolating and enabling the government
pursuant to a court order or other lawful authorization, to access
call identifying information that is reasonably available to the
carrier--
(A) before, during or immediately after the
transmission of a wire or electronics communication (or at such
later time as may be acceptable to the Government); and the
communication to which it pertains, except that, with regard to
information acquired solely pursuant to the authority for pen
registers and trap and trace devices (as defined in section 3127
of title 18, United States Code), such call identifying
information shall not include any information that may disclose
the physical location of the subscriber (except to the extent that
the location may be determined from the telephone number);
(3) delivering intercepted communications and call-
identifying information to the government, pursuant to a court
order or other lawful authorization, in a format such that they
may be transmitted by means of equipment, facilities or services
procured by the government to a location other than the premises
of the carrier; and
(4) facilitating authorized communications and access to call
identifying information unobtrusively and with a minimum of
interference with any subscriber's telecommunications service and
in a manner that protects --
(A) The privacy and security of communications and call-
identifying information not authorized to be intercepted; and
(B) information regarding the government's interception
of communications and access to call-identifying information.
(b) LIMITATIONS.--
(1) DESIGN OF FEATURES AND SYSTEMS CONFIGURATIONS.-- This
title not authorize any law enforcement agency or officer --
(A) to require any specific design of equipment,
facilities, services, features, or system configurations to be
adopted by any provider of a wire or electronic communication
service, any manufacturer or telecommunications equipment, or any
provider of telecommunications support services; or (B) to
prohibit the adoption of any equipment, facility, service or
feature by any provider of a wire or electronic communication
service, any manufacturer or telecommunications equipment,
(2) INFORMATION SERVICES; PRIVATE NETWORKS AND INTER-
CONNECTION SERVICES AND FACILITIES. -- The requirements of
subsection (a) do not apply to --
(A) information services; or
(B) equipment, facilities, or services that support the
transport or switching of communications for private networks or
for the sole purpose of interconnecting telecommunications
carriers.
(3) ENCRYPTION.-- A telecommunications carrier shall not be
responsible for decrypting, or ensuring the government's ability
to decrypt, any communication encrypted by a subscriber or
customer, unless the encryption was provided by the carrier and
the carrier possesses the information necessary to decrypt the
communication.
(c) EMERGENCY OR EXIGENT CIRCUMSTANCES. -- (including those
described in sections 2518 (7) or (11)(b) and 3125 of title 18,
United States Code, and section 1805 (e) of title 50 of such
Code), a carrier at its discretion may comply with subsection
(a)(3) by allowing monitoring at its premises if that is the only
means of accomplishing the interception or access.
(d) MOBILE SERVICES ASSISTANCE REQUIREMENTS.-- A
telecommunications carrier that is a provider of commercial mobile
service (as defined in $332(d) of the Communications Act of 1934)
offering a feature or service that allows subscribers to redirect,
hand off, or assign their wire or electronic communications to
another service area or another service provider or to utilize
facilities in another service area or of another service provider
shall ensure that, when the carrier that had been providing
assistance for the interception of wire or electronic
communications or access to call identifying information within
the service area in which interception has been occurring as a
result of the subscriber's use of such a feature or service,
information is made available to the government (before, during,
or immediately after the transfer of such communications)
identifying the provider of a wire or electronic communication
service that has acquired access to the communications.

+Section 103 is the backbone of the digital telephony bill.
It spells out what the government requires of the carriers and
what it does not. Information services seem exempt for now. That
carves out an exception for devices like the internet phone.
Expect this code section to be amended as voice over the net
becomes more common. Note, too, that this code section does
nothing to guarantee a person's right to use encryption. It just
states that a carrier won't be held responsible for decrypting
traffic that it passes. (As if Sprint could decrypt a PGP encoded
message.)+

SECTION 104. NOTICES OF CAPACITY REQUIREMENTS.

(a) NOTICES OF MAXIMUM AND ACTUAL CAPACITY REQUIREMENTS.--
(1) IN GENERAL.-- Not later than 1 year after the date of
enactment of this title, after consulting with State and local law
enforcement agencies, telecommunications carriers, providers of
telecommunications support services, and manufacturers of
telecommunications equipment, and after notice and comment, the
Attorney General shall publish in the Federal Register and provide
to appropriate telecommunications industry associations and
standards-setting organizations--
(A) notice of the actual number of communication
interception, pen register, and trap and trace devices,
representing a portion of the maximum capacity set forth under
subparagraph
(B), that the Attorney General estimates that government
agencies authorized to conduct electronic surveillance may conduct
and use simultaneously by the date that is 4 years after the date
of enactment of this title; and
(B) notice of the maximum capacity required to
accommodate all of the communication interceptions, pen registers,
and trap and trace devices that the Attorney General estimates
that government agencies authorized to conduct electronic
surveillance may conduct and use simultaneously after the date
that is 4 years after the date of enactment of this title.
(2) BASIS OF NOTICES.-- The notices issued under paragraph
(1)--
(A) may be based upon the type of equipment , type of
service, number of subscribers, type or service or carrier, nature
of service area, or any other measure; and
(B) shall identify, to the maximum extent practicable,
the capacity required at specific geographic locations.
(b) COMPLIANCE WITH CAPACITY NOTICES.--
(1) INITIAL CAPACITY.-- Within 3 years after the publication
by the Attorney General of a notice of capacity requirements or
within 4 years after the date of enactment of this title,
whichever is longer, a telecommunications carrier shall,
subsection (e) ensure that its systems are capable of--
(A) accommodating simultaneously the number of
interceptions, pen registers, and trap and trace devices set forth
in the notice under subsection (a)(1)(A); and
(B) expanding to the maximum capacity set forth in the
notice under subsection (a)(1)(B).
(c) NOTICES OF INCREASED MAXIMUM CAPACITY REQUIREMENTS.--
(1) NOTICE.-- The Attorney General shall periodically publish
in the Federal Register, after notice and comment, notice of any
necessary increases in the maximum capacity requirement set forth
in the notice under subsection (a)(1)(b).
(2) COMPLIANCE.-- Within 3 years after notice of increased
maximum capacity requirements is published under paragraph (1), or
within such longer time period as the Attorney General may
specify, a telecommunications carrier shall, subject to subsection
(e), ensure that its systems are capable of expanding to the
increased maximum capacity set forth in this notice.
(d) CARRIER STATEMENT.-- Within 180 days after the publication by
the Attorney General of a notice of capacity requirements
pursuant to subsection (a) or (c), a telecommunications carrier
shall submit to the Attorney General a statement identifying any
of its systems or services that do not have the capacity to
simultaneously the number of interceptions, pen registers, and
trap and trace devices set forth in the notice under such
subsection.
(e) REIMBURSEMENT REQUIRED FOR COMPLIANCE.-- The Attorney General
shall review the statements submitted under subsection (d) and
may, subject to the availability of appropriations, agree to
reimburse a telecommunications carrier for costs directly
associated with modifications to attain such capacity requirement
that are determined to be reasonable in accordance with section
109(e), such modification, such carrier shall be considered to be
in compliance with the capacity notices under subsection (a) or
(c).

Section 104 requires that the government tell the public and
industry just how much hardware and software it wants. The Justice
Department, therefore, will have to argue for their bugging
equipment in public. Perhaps. We may find that a certain amount of
equipment gets installed without much public discussion. I think
the only debate will be between the carriers and the government
over costs and technical matters. The carrier will probably
install as many devices as the government wants, as long as they
are compensated for it and so long as the equipment doesn't
interfere with the telco's operation. The carrier may not want to
put in the equipment but they really don't have a choice.

Section 105 Systems Security and Integrity

A telecommunications carrier shall ensure that any
interception of communications or access to call-identifying
information effected within its switching premises can be
activated only in accordance with a court order or other lawful
authorization and with the affirmative intervention of an
individual officer or employee of the carrier acting in accordance
with regulations prescribed by the Commission.

+I'm confused by this. I've hear some privacy wonks say that
this is a great provision. They say it prevents the government
from snooping at will. Yet the whole idea of this bill is to
enable remote monitoring at will. Each intercept requires telco
notification and approval. The telco, in fact, is charged with
ensuring that all such intercepts meet regs and specs. So, MCI
tells the FBI to get lost if the feds don't have the right
paperwork? In reality, it is probably as simple as faxing a
warrant to the carrier when needed. A more difficult situation
arises if the telco notices their system being used without
authorization. What then? In addition, many central offices aren't
staffed around the clock. There's too many of them. Pacific Bell
alone has over 800 dial tone producing CO's and remotes. The
telco, therefore, will need to be able to remotely turn on the
monitoring equipment. That will create another gateway into the
system.+

Section 106 Cooperation of Equipment Manufacturers and Providers
of Telecommunications Support Services

(a) Consultation.-- A telecommunications carrier shall consult as
necessary, in a timely fashion with manufacturers or its
telecommunications transmission and switching equipment and its
providers of telecommunications support services for the purposes
of ensuring that current and planned equipment, facilities, and
services comply with the capability requirements of section 103
and the capacity requirements identified by the Attorney General
under section 104.
(b) Cooperation.-- Subject to sections 104(e), 108(a), and 109(b)
and (d), a manufacturer of telecommunications transmission or
switching equipment and a provider of telecommunications support
services shall, on a reasonably timely basis and at a reasonable
charge, make available to the telecommunications carriers using
its equipment, facilities, or services such features or
modifications are necessary to permit such carriers to comply with
the capability requirements of section 103 and the capacity
requirements identified by the Attorney General under section 104.

+Gets the manufacturers on board. Big Brother want this bill bad.+

Section 107. Technical Requirements and Standards; Extension of
Compliance Date

(a) SAFE HARBOR.--
(1) CONSULTATION. To ensure the efficient and industry-wide
implementation of the assistance capability requirements under
section 103 , the Attorney General, in coordination with other
Federal, State, and local law enforcement agencies, shall consult
with appropriate associations and standard-setting organizations
of the telecommunications industry, with representatives of users
of telecommunications equipment, facilities, and services, and
with State utility commissions.
(2) COMPLIANCE UNDER ACCEPTED STANDARDS. -- A
telecommunications carrier shall be found to be in compliance with
the assistance capability requirements under section 103, and a
manufacturer of telecommunications transmission or switching
equipment or a provider of telecommunications support services
shall be found in compliance with section 106, if the carrier,
manufacturer, or support service provider is in compliance with
publicly available technical requirements or standards adopted by
an industry association or standard-setting organization, or by
the Commission under subsection (b), to meet the requirements of
section 103.
(3) ABSENCE OF STANDARDS.-- The absence of technical
requirements or standards for implementing the assistance
capability requirements or standards for implementing the
assistance capability requirements of section 103 shall not--
(A) preclude a telecommunications carrier, manufacturer,
or telecommunications support services provider from deploying a
technology or service; or
(B) relieve a carrier, manufacturer, or
telecommunications support services provider of the obligations
imposed by section 103 or 106, as applicable.
(b) COMMISSION AUTHORITY. -- If industry associations or standard-
setting organizations fail to issue technical requirements or
standards or if a Government agency or any other person believes
that such requirements or standards are deficient, the agency or
person may petition the Commission to establish, by rule,
technical requirements or standards that--
(1) meet the assistance capability requirements of section
103 by cost-effective methods;
(2) protect the privacy and security of communications not
authorized to be intercepted;
(3) minimize the cost of such compliance on residential
ratepayers;
(4) serve the policy of the United States to encourage the
provision of new technologies and services to the public; and
(5) provide a reasonable time and conditions for compliance
with and the transition to any new standard, including defining
the obligations of telecommunications carriers under section 103
during any transition period.
(c) EXTENSION OF COMPLIANCE DATE FOR EQUIPMENT, FACILITIES, AND
SERVICES.--
(1) PETITION.-- A telecommunications carrier proposing to
install or deploy, or having installed or deployed, any equipment,
facility or service prior to the effective date of section 103 may
petition the Commission for 1 or more extensions of the deadline
for complying with the assistance capability requirements under
section 103.
(2) GROUNDS FOR EXTENSION.-- The Commission may, after
consultation with the Attorney General, grant an extension under
subsection, if the Commission determines that compliance with the
assistance capability requirements under section 103 is not
reasonably achievable through application of technology available
within the compliance period.
(3) LENGTH OF EXTENSION.-- An extension under this subsection
shall extend for no longer than the earlier of--
(A) the date determined by the Commission as necessary
for the carrier to comply with the assistance capability
requirements under section 103; or
(B) the date that is 2 years after the date on which the
extension is granted.

(4) APPLICABILITY OF EXTENSION.-- An extension under this
subsection shall apply to only that part of the carrier's business
on which the new equipment, facility, or service is used.

+An industry wide effort is called for to make sure that the
entire public switched telephone network gets wired according to
government specifications. Calls for the telecom industry to set
standards for developing the needed equipment. The FCC gets
charged with setting standards if industry doesn't. The government
needs the latest technology for all this to work. Most of us big
city folks are living under System 7 and CLASS: Custom Local Area
Signaling Service. Specific circuit boards enable caller ID as
well as many advanced services when installed in digital switches
like a 5ESS or DMS 100. It's my guess that the spooks want a board
designed for existing switches that give them the capabilities
they want. Along with the software to control it. The other
possibility is a black box approach. You dedicate and design a PC
to work along with the switch for a specific purpose. In any case,
such equipment may not be too difficult to design since the telco
can already do what the Feds want now. The telco, of course,
wants to make sure that any such equipment works with the least
interference to its switch or its network. Such a device will have
a lot of people involved with its design and sales. No doubt there
will be product literature to read and patents to look up. . .+

SECTION 108 ENFORCEMENT ORDERS

(a) GROUNDS FOR ISSUANCE.-- A court shall issue an order
enforcing this title under section 2522 of title 18, United States
Code, only if the court finds that--
(1) alternative technologies or capabilities or the
facilities of another carrier are not reasonably available to law
enforcement for implementing the interception of communications or
access to call-identifying information; and
(2) compliance with the requirements of this title is
reasonably available achievable through the application of
available technology to the equipment, facility or service at
issue or would have been reasonably achievable if timely action
had been taken.
(b) TIME FOR COMPLIANCE.-- Upon issuing an order enforcing this
title, the court shall specify a reasonable time and conditions
for complying with its order, considering the good faith efforts
to comply in a timely manner, any effect on the carrier's,
manufacturer's or service provider's ability to continue to do
business, the degree of culpability or delay in undertaking
efforts to comply, and such other matters as justice may require.
(c) LIMITATIONS.--An order enforcing this title may not --
(1) require a telecommunications carrier to meet the
Government's demand for interception of communications and
acquisition of call-identifying information to any extent in
excess of the capacity for which the Attorney General has agreed
to reimburse such carrier.
(2) require any telecommunications carrier to comply with the
capability assistance requirement of section 103 if the Commission
has determined (pursuant to section 109(b)(1) that compliance is
not reasonably achievable, unless the Attorney General has agreed
(pursuant to section 109(b)(2) to pay the costs described in
section 109(b)(2)(A); or
(3) require a telecommunications carrier to comply with
assistance capability requirement of section 103, any equipment,
facility, or service deployed on or before January 1, 1995, unless
--
(A) the Attorney General has agreed to pay the
telecommunications carrier for all reasonable costs directly
associated with modifications necessary to bring the equipment,
facility, or service into compliance with those requirements; or
(B) the equipment, facility, or service has been
replaced or significantly upgraded or otherwise undergoes major
modification.
No bill is much good unless there's a penalty. Well, here it is.
Get your act together Mr. Telco or the Feds will drag you into
court. There is some leeway for a telco with older switches that
can't be economically retrofitted.

SECTION 109 PAYMENT OF COSTS OF TELECOMMUNICATIONS CARRIERS TO
COMPLY WITH CAPABILITY REQUIREMENTS

(a) EQUIPMENT, FACILITIES, AND SERVICES DEPLOYED ON OR BEFORE
JANUARY 1, 1995. -- The Attorney General may, subject to the
availability of appropriations, agree to pay telecommunications
carriers for all reasonable costs directly associated with the
modifications performed by carriers in connection with equipment,
facilities, and services installed or deployed on or before
January 1, 1995, to establish the capabilities necessary to comply
with section 103.
(b) EQUIPMENT, FACILITIES, AND SERVICES DEPLOYED AFTER JANUARY 1,
1995. --
(1) DETERMINATIONS OF REASONABLE ACHIEVABLE. --
The Commission, on petition from a telecommunications carrier or
any other interested person, and after notice to the Attorney
General, shall determine whether compliance with the assistance
capability requirements of section 103 is reasonably achievable
with respect to any equipment, facility, or service installed or
deployed after January 1, 1995. The Commission shall make such
determination within one year after the date such petition is
filed. In making such determination, the Commission shall
determine whether compliance would impose significant difficulty
or expense on the carrier or on the users of the carrier's systems
and shall consider the following factor:
(A) The effect on public safety and national security.
(B) The effect on rates for basic residential telephone
service.
(C) The need to protect the privacy and security of
communications not authorized to be intercepted.
(D) The need to achieve the capability assistance
requirements of section 103 by cost-effective methods.
(E) The effect on the nature and cost of the equipment,
facility, or service at issue.
(F) The effect on the operation of the equipment,
facility, or service at issue.
(G) The policy of the United States to encourage the
provision of new technologies and services to the public.
(H) The financial resources of the telecommunications
carrier.
(I) The effect on competition in the provision of
telecommunications services.
(J) The extent to which the design and development of
the equipment, facility, or service was initiated before January
1, 1995.
(K) Such other factors as the Commission determines are
appropriate.
(2) COMPENSATION.-- If compliance with the assistance
capability requirements of Section 103 is not reasonably
achievable with respect to equipment, facilities, or services
deployed after January 1, 1995
(A) the Attorney General, on application of a
telecommunications carrier, may agree, subject to the availability
of appropriations, to pay the telecommunications carrier for the
additional reasonable costs of making compliance with such
assistance capability requirements reasonably achievable; and
(B) if the Attorney General does not agree to pay such
costs, the telecommunications carrier shall be deemed to be in
compliance with such capability requirements.
(c) ALLOCATION OF FUNDS FOR PAYMENT.Q The Attorney General shall
allocate funds appropriated to carry out this title in accordance
with law enforcement priorities determined by the Attorney
General.
(d) FAILURE TO MAKE PAYMENT WITH RESPECT TO EQUIPMENT FACILITIES,
AND SERVICES DEPLOYED ON OR BEFORE JANUARY 1, 1995.QIf a carrier
has requested payment in accordance with procedures promulgated
pursuant to subsection (e), and the Attorney General has not
agreed to pay the telecommunications carrier for all reasonable
costs directly associated with modifications necessary to bring
any equipment, facility, or service deployed on or before January
1, 1995, into compliance with the assistance capability
requirements of section 103, such equipment, facility, or service
shall be considered to be in compliance with the assistance
capability requirements of section 103 until the equipment,
facility, or service or replaced or significantly upgraded or
otherwise undergoes major modification.
(e) COST CONTROL REGULATIONS.Q
(1) IN GENERAL The Attorney General shall, after notice and
comment, establish regulations necessary to effectuate timely and
cost-efficient payment to telecommunications carriers under this
title, under chapters 119 and 121 of title 18, United States Code,
and under the Foreign Intelligence Surveillance Act of 1978 (60
U.S.C. 1801 et seq.).
(2) CONTENTS OF REGULATIONSQThe Attorney General, after
consultation with the Commission, shall prescribe regulations for
purposes of determining reasonable costs under this title. Such
regulations shall seek to minimize the cost to the Federal
Government and shallQ
(A) permit recovery from the Federal Government of--
(i) the direct costs of developing the modification
described in subsection (a), of providing the capability requested
under subsection (b)(2), or of providing the capacities requested
under section 104(e) , but only to the extent that such costs have
not been recovered from any other governmental or non governmental
entity;
(ii) the costs of training personnel in the use
such capabilities or capacities, and
(iii) the direct costs of deploying or installing
such capabilities or capacities;
(B) in the case of any modification that may be useful
for any purpose other than lawfully authorized electronic
surveillance by a law enforcement agency of a government permit
recovery of only the incremental cost of making the modification
suitable for such law enforcement purposes, and
(C) maintain the confidentiality of trade secrets.
(3) SUBMISSION OF CLAIMS.QSuch regulations shall require any
telecommunications carrier that the Attorney General has agreed to
pay for modifications pursuant to this section that has installed
or deployed such modification to submit to the Attorney General a
claim for payment that contains or is accompanied by such
information as the Attorney General may require.

The government agrees to pay for most of what they want. The
telcos are in a bad way. They may not like the law but they can't
ignore it. Most of these companies, after all, are subject to
federal regulation in some part of their operations. Speaking of
regulations, this section creates plenty. The Digital Telephony
Bill might become a bureaucratic nightmare. Didn't the Newtmeister
want a one year freeze on all new regs? That would panic
everybody. All the information used to develop the regs and
reports should be publicly available but let's wait and see.

SECTION 110 AUTHORIZATION OF APPROPRIATIONS.

There are authorized to be appropriated to carry out this title a
total of $500,000,000 for fiscal years 1995, 1996, 1997, and 1998.
Such sums are authorized to remain available until expended.

This bill creates a half billion dollar industry.
Consultants, programmers, switch technicians, telco employees and
the feds will all be involved. (As well as the hacker community)
There will probably be newsletters, articles and conventions
relating to compliance. Such fun. Count on the feds' equipment and
procedures to be compromised. A system allowing one to intercept a
specific call, reroute it, and then listen in on the conversation
itself, may prove an irresistible target to many. It's my
understanding that REMOBS is set up on a case by case basis. An
individual wiretap gets set up and taken down as the need arises.
But we are talking here about a permanently installed system with
dedicated ports. The FBI may even get bugged themselves by hackers
or, more probably, other governmental agencies. We'll know more
when the regs come out and we can guess about the equipment. For
all we know, the FBI and Bellcore may be conducting field trials
right now.

SECTION 111. EFFECTIVE DATE

(a) IN GENERAL.QExcept as provided in subsection (b), this title
shall take effect on the date of enactment of this Act.
(b) ASSISTANCE CAPABILITY AND SYSTEM SECURITY AND INTEGRITY
REQUIREMENTS.QSections 103 and 105 of this title shall effect on
the date that is 4 years after the date of enactment of this Act.

SECTION 112 REPORTS

(a) REPORTS BY THE ATTORNEY GENERAL
(1) IN GENERAL.QOn or before November 30, 1995 and on or
before November 30 of each year thereafter, the Attorney General
shall submit to Congress and make available to the public a report
on the amounts paid during the pre-fiscal year to
telecommunications carriers under sections 104(e) and 109.
(2) CONTENTS.QA report under paragraph (1) shall includeQ
(A) a detailed accounting of the amounts paid to each
carrier and the equipment, facility, or service for which the
amounts were paid; and
(B) projections of the amounts expected to be paid in
the current fiscal year, the carrier to which payment is expected
to be made, and the equipment, facilities, or services for which
payment is expected to be made.
(b) REPORT BY THE COMPTROLLER GENERAL.--
(1) PAYMENT FOR MODIFICATIONS.QOn or before April 1, 1996, and
every 2 years thereafter, the Comptroller General of the United
States, after consultation with the Attorney General and the
telecommunications industry, shall submit to the Congress a
reportQ
(A) describing the type of equipment, facilities, and
services that have been brought into compliance under this title,
and
(B) reflecting its analysis of the reasonableness and cost-
effectiveness of the payments made by the Attorney General to
telecommunications carriers for modifications necessary to ensure
compliance with this title.
(2) COMPLIANCE COST ESTIMATES--
A report under paragraph (1) shall include the findings and
conclusions of the Comptroller General on the costs to be incurred
by telecommunications carriers to comply with the assistance
capability requirements of section 103 after the effective date of
such section 103, including projections of the amounts expected to
be incurred and a description of the equipment, facilities, or
services for which they are expected to be incurred.

TITLE IIQAMENDMENTS TO TITLE 18, UNITED STATES CODE

SECTION 201. COURT ENFORCEMENT OF COMMUNICATIONS ASSISTANCE FOR
LAW ENFORCEMENT ACT.

(a) COURT ORDER UNDER CHAPTER 119.QChapter 119 of title 18,
United States Code, is amended by inserting after section 2521 the
following new section:

$2522. Enforcement of the Communications Assistance for Law
Enforcement Act
(a) ENFORCEMENT BY COURT ISSUING SURVEILLANCE ORDER.Q a court
authorizing an interception under this chapter, a State statute,
or the Foreign intelligence Surveillance Act of 1978 (60 USC 1801
et seq.) or authorizing use of a pen register or a tap and trace
device under chapter 206 or a State statute finds that a
telecommunications carrier has failed to comply with the
requirements of the Communications Assistance for Law Enforcement
Act, the court may, in accordance with section 108 of such act,
direct that the carrier comply forthwith and may direct that the
provider of support services to the carrier or the manufacturer of
the carrier's transmission or switching equipment furnish
forthwith the modifications necessary for the carrier to comply.
(b) ENFORCEMENT BY APPLICATION BY ATTORNEY GENERAL.-- may, in a
civil action in the appropriate United States district court,
obtain an order, in accordance with section 108 of the
Communications Assistance for Law Enforcement Act, directing that
a telecommunications carrier, a manufacturer of telecommunications
transmission or switching equipment, a provider of
telecommunications support services comply with such Act.
(c) CIVIL PENALTY
In General.- A court issuing an order under the section
against a telecommunications carrier, a manufacture of
telecommunications transmission or switching equipment or a
provider of telecommunications support services impose a civil
penalty of up to $10,000 per day for each day in violation after
the issuance of the order or after such future date as the court
may specify.
"(2) CONSIDERATIONS.QIn determining whether to impose a civil
penalty and in determining its amount, the court take into
accountQ
"(A) the nature, circumstances, and extent of the violation;
"(B) the violator's ability to pay, the violator's good faith
efforts to comply in a timely manner, any effect on the violator's
ability to continue to do business, the degree of culpability, and
the length of any delay in undertaking efforts to comply; and
"(C) such other matters as justice may require.
"(d) DEFINITIONS.QAs used in this section, the terms defined in
section 102 of the Communications Assistance for Law Enforcement
Act have the meanings provided, respectively, in section."
(b) CONFORMING AMENDMENT.Q
(1) Section 2518(4) of title 18, United States Code amended by
adding at the end the following new sentence "Pursuant to section
2522 of this chapter, an order may also be issued to enforce the
assistance capability and capacity requirements under the
Communications Assistance for Enforcement Act.".
(2) Section 3124 of such title is amended by adding at the
end the following new subsection:
"(f) COMMUNICATIONS ASSISTANCE ENFORCEMENT ORDERS Pursuant to
section 2622, an order may be issued to enforce the assistance
capability and capacity requirements under the Communications
Assistance for Law Enforcement Act.".
(3) The table of sections at the beginning of chapter of title
18, United States Code, is amended by inserting the item
pertaining to section 2521 the following new item:
"2622. Enforcement of the Communications For Law Enforcement
Assistance Act."
Another enforcement order? Didn't we just see one in section
108? we did, but that was for Chapter 9 of Title 47. The section
above applies to Title 18 in Chapter 119, popularly known as the
Electronic Communications Privacy Act. The E.C.P.A. is contained
in 18 U.S.C. 2510 et seq. It's all about wiretaps and electronic
monitoring. Makes great reading if you have the time. Section
201 deals with courts that are actually ordering a wiretap. They
can impose penalties on carriers who can't arrange an interception
because they haven't yet complied with the Digital Telephony Bill.
Section 108, on the other hand, does not depend on a wiretap. It
is, instead, a general enforcement section. It lets the feds sue a
carrier who hasn't complied with the "Communications Assistance
for Law Enforcement Act" by a certain amount of time.


SECTION 202 CORDLESS TELEPHONES

(a) DEFINITIONSQSection 2510 of title 18, United States Code, is
amendedQ
(1) in paragraph (1), by striking "but such term does not
include" and all that follows through "base unit"; and
(2) in paragraph (12), by striking subparagraph (A) and
redesignating subparagraphs (B), (C), and (D) as subparagraphs
(A), (B), and (C), respectively (b) PENALTYQSection 2511 of title
18, United States is amendedQ
(1) in subsection (4)(b)(i) by inserting a "cordless
communication that is transmitted between the cordless phone
handset and the base unit," after "cellular telephone
communication," and
(2) in subsection (4)(b)(ii) by inserting "a cordless
telephone communication that is transmitted between the cordless
telephone handset and the base unit," after "cellular telephone
communication,".

SECTION 203 RADIO-BASED DATA COMMUNICATIONS

Section 2510(16) of title 18, United States Code, is amended Q (1)
by striking "or" at the end of subparagraph (D);
(2) by inserting "or" at the end of subparagraph (E) and
(3) by inserting after subparagraph (E) the following new
subparagraph: "(F) an electronic communication;".

SECTION 204 PENALTIES FOR MONITORING RADIO COMMUNICATIONS THAT
ARE TRANSMITTED USING MODULATION TECHNIQUES WITH NONPUBLIC
PARAMETERS

Section 2511(4)(b) of title 18, United States Code, is amended by
striking "or encrypted, then" and inserting ", encrypted, or
transmitted using modulation techniques the essential parameters
of which have been withheld from the public with the intention
of preserving the privacy of such communication, then".

SECTION 205 TECHNICAL CORRECTION

Section 2511(2)a)(i) of title 18, United States Code, is amended
by striking "used in the transmission of a wire communication" and
inserting "used in the transmission of a wire or electronic
communication".

SECTION 206 FRAUDULENT AL-ALTERATION OF COMMERCIAL MOBILE RADIO
INSTRUMENTS

Please see the text of this section on the opposite page

SECTION 207 TRANSACTIONAL DATA

(a) DISCLOSURE OF RECORDS. Section 2703 of title 18, United States
Code, is amendedQ
(1) in subsection (c)(1)--
(A) in subparagraph (B)--
(i) by striking clause (i) and
(ii) by redesignating clauses (ii),
(iii), and (iv) as clauses (i), (ii), and (iii),
respectively; and
(B) by adding at the end the following new subparagraph:
"(C) A provider of electronic communication service or remote
computing service shall disclose to a governmental entity the
address, telephone toll billing records, telephone number or other
subscriber number or identity, and length of service of a
subscriber to or customer of such service and the types of
services the subscriber or customer utilized, when the
governmental entity uses an administrative subpoena authorized by
a Federal or State statute or a Federal or State grand jury or
trial subpoena or any means available under subparagraph (B).";
and
(2) by amending the first sentence of subsection (d) to read
as follows: "A court order for disclosure under subsection (b) or
(c) may be issued by any court that is a court of competent
jurisdiction described in section 3126(2)(A) and shall issue if
the governmental entity offers specific and articulable facts
showing that there are reasonable grounds to believe that the
contents of a wire or electronic communication, or the records or
other information sought, are relevant and material to an ongoing
criminal investigation."
(b) PEN REGISTER AND TRAP AND TRACE DEVICES -- Section 3121 of
title 18, United States Code, is amendedQ
(1) by redesignating subsection (c) as subsection (d);
(2) by inserting after subsection (b) the following new
section:
(C) LIMITATION.QA government agency authorized to install and
use a pen register under this chapter or under State law
shall use technology reasonably available to it that restricts
recording or decoding of electronic or other impulses to the
dialing and signaling information utilized in call processing.".

SECTION. 208. AUTHORIZATION FOR ACTING DEPUTY ATTORNEYS GENERAL
IN THE CRIMINAL DIVISION TO AP-PROVE CERTAIN COURT APPLICATIONS

Section 2616(1) of title 18, United States Code, is amended by
inserting "or acting Deputy Assistant Attorney General" after
"Deputy Assistant Attorney General".
TITLE III--AMENDMENTS TO THE COMMUNICATIONS ACT OF 1934

SECTION 301. COMPLIANCE COST RECOVERY.

Title II of the Communications Act of 1934 is amended by inserting
after section 228 (47 U.S.C. 228) the following new section: "SEC.
229. COMMUNICATIONS ASSISTANCE FOR LAW ENFORCEMENT ACT COMPLIANCE.
"(a) In General: The Commission shall prescribe such
rules as are necessary to implement the requirements of the
Communications Assistance for Law Enforcement Act.
"(b) Systems Security and Integrity: The rules
prescribed pursuant to subsection (a) shall include rules to
implement section 105 of the Communications Assistance for Law
Enforcement Act that require common carriers--
"(1) to establish appropriate policies and
procedures for the supervision and control of its officers and
employees--
"(A) to require appropriate authorization to
activate interception of communications or access to call-
identifying information; and
"(B) to prevent any such interception or
access without such authorization;
"(2) to maintain secure and accurate records of
any interception or access with or without such authorization; and
"(3) to submit to the Commission the policies and
procedures adopted to comply with the requirements established
under paragraphs (1) and
(2). "(c) Commission Review of Compliance: The Commission
shall review the policies and procedures submitted under
subsection (b)(3) and
shall order a common carrier to modify any such policy or
procedure that the Commission determines does not comply with
Commission regulations. The Commission shall conduct such
investigations as may be necessary to insure compliance by common
carriers with the requirements of the regulations prescribed
under this section.
"(d) Penalties: For purposes of this Act, a violation
by an officer or employee of any policy or procedure adopted by a
common carrier pursuant to subsection (b), or of a rule prescribed
by the Commission pursuant to subsection (a), shall be considered
to be a violation by the carrier of a rule prescribed by the
Commission pursuant to this Act.
"(e) Cost Recovery for Communications Assistance for
Law Enforcement Act Compliance:
"(1) Petitions authorized: A common carrier may
petition the Commission to adjust charges, practices,
classifications, and regulations to recover costs expended for
making modifications to equipment, facilities, or services
pursuant to the requirements of section 103 of the Communications
Assistance for Law Enforcement Act.
"(2) Commission authority: The Commission may
grant, with or without modification, a petition under paragraph
(1) if the Commission determines that such costs are reasonable
and that permitting recovery is consistent with the public
interest. The Commission may, consistent with maintaining just and
reasonable charges, practices, classifications, and regulations in
connection with the provision of interstate or foreign
communication by wire or radio by a common carrier, allow carriers
to adjust such charges, practices, classifications, and
regulations in order to carry out the purposes of this Act.
"(3) Joint board: The Commission shall convene a
Federal-State joint board to recommend appropriate changes to part
36 of the Commission's rules with respect to recovery of costs
pursuant to charges, practices, classifications, and regulations
under the jurisdiction of the Commission.


SECTION 302 RECOVERY OF COST OF COMMISSION PROCEEDINGS.

The schedule of application fees in section 8(g) of
the Communications Act of 1934 (47 U.S.C. 158(g)) is amended by
inserting under item 1 of the matter pertaining to common carrier
services the following additional sub-item: "d. Proceeding under
section 109(b) of the Communications Assistance for Law
Enforcement Act."

SECTION 303. CLERICAL AND
TECHNICAL AMENDMENTS.

(a) Amendments to the Communications Act of 1934: The
Communications Act of 1934 is amended--
(1) in section 4(f)(3), by striking "overtime exceeds
beyond" and inserting "overtime extends beyond";
(2) in section 5, by redesignating subsection (f)
as subsection (e);
(3) in section 8(d)(2), by striking "payment of a"
and inserting "payment of an";
(4) in the schedule contained in section 8(g), in
item 7.f. under the heading "equipment approval
services/experimental radio" by striking "Additional Charge" and
inserting "Additional Application Fee";
(5) in section 9(f)(1), by inserting before the
second sentence the following: "(2) Installment payments:" ;
(6) in the schedule contained in section 9(g), in
the item pertaining to interactive video data services under the
private radio bureau, insert "95" after "47 C.F.R. Part";
(7) in section 220(a)--
(A) by inserting "(1)" after "(a)"; and
(B) by adding at the end the following new
paragraph: "(2) The Commission shall, by rule, prescribe a uniform
system of for use by telephone companies. Such uniform system
shall require that each common carrier shall maintain a system of
accounting methods, procedures, and techniques (including accounts
and supporting records and memoranda) which shall ensure a proper
allocation of all costs to and among telecommunications services,
facilities, and products (and to and among classes of such
services, facilities, and products) which are developed,
manufactured, or offered by such common carrier.";
(8) in section 220(b), by striking "classes" and
inserting "classes";
(9) in section 223(b)(3), by striking "defendant
restrict access" and inserting "defendant restricted access";
(10) in section 226(d), by striking paragraph (2)
and redesignating paragraphs (3) and (4) as paragraphs (2) and
(3), respectively;
(11) in section 227(b)(2)(C), by striking
"paragraphs" and inserting "paragraph";
(12) in section 227(e)(2), by striking "national
database" and inserting "national database";
(13) in section 228(c), by redesignating the second
paragraph (2) and paragraphs (3) through (6) as paragraphs (3)
through (7), respectively;
(14) in section 228(c)(6)(D), by striking
"conservation" and inserting "conversation";
(15) in section 308(c), by striking "May 24, 1921"
and inserting "May 27, 1921";
(16) in section 309(c)(2)(F), by striking "section
325(b)" and inserting "section 325(c)";
(17) in section 309(i)(4)(A), by striking
"Communications Technical Amendments Act of 1982" and inserting
"Communications Amendments Act of 1982";
(18) in section 331, by amending the heading of
such section to read as follows: "VERY HIGH FREQUENCY STATIONS AND
AM RADIO STATIONS";
(19) in section 358, by striking "(a)";
(20) in part III of title III--
(A) by inserting before section 381 the
following heading: "VESSELS TRANSPORTING MORE THAN SIX PASSENGERS
FOR HIRE REQUIRED TO
BE EQUIPPED WITH RADIO TELEPHONE";
(B) by inserting before section 382 the
following heading: "VESSELS EXCEPTED FROM RADIO TELEPHONE
REQUIREMENT";
(C) by inserting before section 383 the
following heading: "EXEMPTIONS BY COMMISSION";
(D) by inserting before section 384 the
following heading: "AUTHORITY OF COMMISSION; OPERATIONS,
INSTALLATIONS, AND ADDITIONAL EQUIPMENT";
(E) by inserting before section 385 the
following heading: "INSPECTIONS"; AND
(F) by inserting before section 386 the following
heading: "FORFEITURES";
(21) in section 410(c), by striking ", as referred
to in sections 202(b) and 205(f) of the Interstate Commerce Act,";
(22) in section 613(b)(2), by inserting a comma
after "pole" and after "line";
(23) in section 624(d)(2)(A), by inserting "of"
after "viewing";
(24) in section 634(h)(1), by striking "section
602(6)(A)" and inserting "section 602(7)(A)";
(25) in section 705(d)(6), by striking "subsection
(d)" and inserting "subsection (e)";
(26) in section 705(e)(3)(A), by striking
"paragraph (4) of subsection (d)" and inserting "paragraph (4) of
this subsection";
(27) in section 705, by redesignating subsections
(f) and (g) (as added by Public Law 100-667) as subsections (g)
and (h); and
(28) in section 705(h) (as so redesignated), by
striking "subsection (f)" and inserting "subsection (g)".
(b) Amendments to the Communications Satellite Act of 1962: The
Communications Satellite Act of 1962 is amended--
(1) in section 303(a)-- (A) by striking "section 27(d)"
and inserting "section 327(d)";
(B) by striking "sec. 29-911(d)" and inserting
"sec. 29-327(d)";
(C) by striking "section 36" and inserting
"section 336"; and
(D) by striking "sec. 29-916d" and inserting
"section 29-336(d)";
(2) in section 304(d), by striking "paragraphs
(1), (2), (3), (4), and (5) of section 310(a)" and inserting
"subsection (a) and paragraphs (1) through (4) of subsection (b)
of section 310"; and
(3) in section 304(e)--
(A) by striking "section 45(b)" and inserting
"section 345(b)"; and
(B) by striking "sec. 29-920(b)" and inserting
"sec. 29-345(b)"; and
(4) in sections 502(b) and 503(a)(1), by striking
"the Communications Satellite Corporation" and inserting "the
communications satellite corporation established pursuant to title
III of this Act".
(c) Amendment to the Children's Television Act of 1990: Section
103(a) of the Children's Television Act of 1990 (47 U.S.C.
303b(a)) is amended by striking "non-commercial" and inserting
"noncommercial".
(d) Amendments to the Telecommunications Authorization Act of
1992: Section 205(1) of the Telecommunications Authorization Act
of 1992 is amended--
(1) by inserting an open parenthesis before "other
than"; and
(2) by inserting a comma after "stations)".
(e) Conforming Amendment: Section 1253 of the Omnibus Budget
Reconciliation Act of 1981 is repealed.
(f) Stylistic Consistency: The Communications Act of 1934 and the
Communications Satellite Act of 1962 are amended so that the
section designation and section heading of each section of such
Acts shall be in the form and typeface of the section designation
and heading of this section.

SECTION 304. ELIMINATION OF EXPIRED AND OUTDATED PROVISIONS
(a) Amendments to the Communications Act of 1934: The
Communications Act of 1934 is amended--
(1) in section 7(b), by striking "or twelve months
after the date of the enactment of this section, if later" both
places it;
(2) in section 212, by striking "After sixty days
from the enactment of this Act it shall" and inserting "It
shall";

  
(3) in section 213, by striking subsection (g) and
redesignating subsection (h) as subsection (g);
(4) in section 214, by striking "section 221 or
222" and inserting "section 221";
(5) in section 220(b), by striking ", as soon as
practicable,";
(6) by striking section 222;
(7) in section 224(b)(2), by striking "Within 180
days from the date of enactment of this section the Commission"
and inserting "The Commission";
(8) in 226(e), by striking "within 9 months after
the date of enactment of this section,";

(9) in section 309(i)(4)(A), by striking "The
commission, not later than 180 days after the date of the
enactment of the Communications Technical Amendments Act of 1982,
shall," and inserting "The Commission shall,";
(10) by striking section 328;
(11) in section 413, by striking ", within sixty
days after the taking effect of this Act,";
(12) in section 624(d)(2)(B)--
(A) by striking out "(A)";
(B) by inserting "of" after "restrict the
viewing"; and
(C) by striking subparagraph (B);
(13) by striking sections 702 and 703;
(14) in section 704--
(A) by striking subsections (b) and (d); and
(B) by redesignating subsection (c) as
subsection (b);
(15) in section 705(g) (as redesignated by section
304(25)), by striking "within 6 months after the date of enactment
of the Satellite Home Viewer Act of 1988, the Federal
Communications
Commission" and inserting "The Commission";
(16) in section 710(f)--
(A) by striking the first and second
sentences; and
(B) in the third sentence, by striking
"Thereafter, the
Commission" and inserting "The Commission";
(17) in section 712(a), by striking ", within 120
days after the effective date of the Satellite Home Viewer Act of
1988,"; and
(18) by striking section 713.
(b) Amendments to the Communications Satellite Act of
1962: The Communications Satellite Act of 1962 is amended--
(1) in section 201(a)(1), by striking "as
expeditiously as possible,";
(2) by striking sections 301 and 302 and inserting
the following:
"SEC. 301. CREATION OF CORPORATION.
"There is authorized to be created a communications
satellite corporation for profit which will not be an agency or
establishment of the United States Government.
"SEC. 302. APPLICABLE LAWS.
"The corporation shall be subject to the provisions of
this Act and, to the extent consistent with this Act, to the
District of Columbia Business Corporation Act. The right to
repeal, alter, or amend this Act at any time is expressly
reserved.";
(3) in section 304(a), by striking "at a price not
in excess
of $100 for each share and";
(4) in section 404--
(A) by striking subsections (a) and (c); and
(B) by redesignating subsection (b) as section
404;
(5) in section 503--
(A) by striking paragraph (2) of subsection
(a); and
(B) by redesignating paragraph (3) of
subsection (a) as paragraph (2) of such subsection;
(C) by striking subsection (b);
(D) in subsection (g)--
(i) by striking "subsection (c)(3)" and
inserting
"subsection (b)(3)"; and
(ii) by striking the last sentence; and
(E) by redesignating subsections (c) through
(h) as
subsections (b) through (g), respectively;
(5) by striking sections 505, 506, and 507; and
(6) by redesignating section 508 as section 505.


VIII THE COMPLETE TEXT OF 18 USC 1029

18 U.S.C. 1029 (As Amended By The Digital Telephony Bill)

$ 1029. Fraud and related activity in connection with access
devices
(a) Whoever --
(1) knowingly and with intent to defraud produces, uses,
or traffics in one or more counterfeit access devices;
(2) knowingly and with intent to defraud traffics in or
uses one or more unauthorized access devices during any one-year
period, and by such conduct obtains anything of value aggregating
$1,000 or more during that period;
(3) knowingly and with intent to defraud possesses
fifteen or more devices which are counterfeit or unauthorized
access devices;
(4) knowingly, and with intent to defraud, produces,
traffics in, has control or custody of, or possesses device making
equipment; or
(5) knowingly and with intent to defraud uses, produces,
traffics in, has control or custody of, or possesses a
telecommunications instruments that has been modified or altered
to obtain unauthorized use of telecommunications services; or
(6) knowingly and with intent to defraud uses, produces,
traffics in, has control or custody of, or possesses--
(A) a scanning receiver; or
(B) hardware or software used for altering or
modifying telecommunications instruments services.
(b)(1) Whoever attempts to commit an offense under subsection
(a) of this section shall be punished as provided in subsection
(c) of this section.
(2) Whoever is a party to a conspiracy of two or more
persons to commit an offense under subsection (a) of this section,
if any of the parties engage in any conduct in furtherance of such
offense, shall be fined an amount not greater than the amount
provided as the maximum fine for such offense under subsection (c)
of this section or imprisoned not longer than one--half of the
period provided as the maximum imprisonment for such offense under
subsection (c) of this section, or both.
(c) The punishment for an offense under subsection (a) or
(b)(1) of this section is --
(1) a fine of not more than the greater of $10,000 or
twice the value obtained by the offense or imprisonment for not
more than ten years, or both, in the case of an offense under
subsection (a)(2) or (a)3 of this section which does not occur
after a conviction for another offense under either subsection, or
an attempt to commit an offense punishable under this paragraph;
(2) a fine of not more than the greater of $50,000 or
twice the value obtained by the offense or imprisonment for not
more than fifteen years, or both, in the case of a subsection
(a)(1), (4),(5),(6) of this section which does not occur after a
conviction for another offense under either such subsection, or an
attempt to commit an offense punishable under this paragraph; and

(3) a fine of not more than the greater of $100,000 or twice the
value obtained by the offense or imprisonment for not more than
twenty years, or both, in the case of an offense under subsection
(a) which occurs after a conviction for another offense under
this subsection, or an attempt to commit an offense punishable
under this paragraph.
(d) The United States Secret Service shall, in addition to
any other agency having such authority, have the authority to
investigate offense under this section. Such authority of the
United States Secret Service shall be exercised in accordance with
an agreement which shall be entered into by the Secretary of the
Treasury and the Attorney General.
(e) As used in this section - -
(1) the term "access device" means any card, plate, code,
account number, electronic serial number, mobile identification
number, personal identification number, or other
telecommunications service, equipment, or instrument identifier,
or other means of account access that can be used, alone or in
conjunction with another access device to obtain money, goods,
services, or any other thing of value, or that can be used to
initiate a transfer of funds (other than a transfer originated
solely by paper instrument);
(2) the term "counterfeit access device" means any access
device that is counterfeit, fictitious, altered, or forged, or an
identifiable component of an access device or a counterfeit access
device:
(3) the term "unauthorized access device" means any access
device that is lost, stolen, expired, revoked, canceled, or
obtained with intent to defraud;
(4) the term "produce" includes design, alter, authenticate,
duplicate or assemble;
(5) the term "traffic" means transfer, or otherwise dispose
of, to another, or impression designed or primarily used for
making an access device or a counterfeit access device and
(6) the term "device-making equipment" means any equipment,
mechanism, or impression designed or primarily used for making an
access device or a counterfeit access device. ;
(7) the term "scanning receiver" means a device or apparatus
that can be used to intercept a wire or electronic communication
in violation of chapter 119.
(f) This section does not prohibit any lawfully authorized
investigative, protective or intelligence activity of a law
enforcement agency of the United States, a State, or a political
subdivision of a State, or of an intelligence agency of the
United States, or any activity authorized under chapter 224 of
this title. For purposes of this subsection, the term "State"
includes a State of the United States, the District of Columbia,
and any commonwealth, territory, or possession of the United
States.

"We lobbied for passage of the Telephony bill, which the
president just signed. The bill enhances the language in Title 18,
Section 1029. That's the Secret Service statute that deals with
fraudulent or counterfeit access devices. Prior to this bill being
signed, there was no reference to wireless communications. Now the
language in the statute clearly includes the cellular phones. This
has added that tool to the arsenal of the Secret Service."

Tom McLure, director of fraud
management for the CTIA

It's All About Context!

The full text of 18 U.S.C. as amended by the digital telephony
bill is show on this page. Additions are in bold and deletions are
in cross outs. This shows the value of putting all those scattered
paragraphs into context. The teams of lawyers who drafted this
bill had to have looked up every section and reg affected. . .

IX. SPECIAL E-ZINE BONUS: THE REGULATION PROHIBITING CLONING AS WELL
AS SUPPORTING MATERIAL AS SUPPLIED BY ROBERT KELLER TO CompuServe

Set forth below are excerpts from FCC rules and policy
statements regarding cloning and/or modification of the
electronic serial number (ESN) in cellular phones.

=================
TABLE OF CONTENTS
=================

A. Federal Communications Commission Report and Order
(CC Docket Nos. 92-115, 94-46, and 93-116)
Adopted: August 2, 1994 Released: September 9, 1994
Rule Changes Effective: January 1, 1995

1. Excerpt, Paragraphs 54-63

2. Excerpt, Appendix A
Detailed Discussion of Part 22 Rule Amendments
Section 22.919 Electronic serial numbers.

3. Excerpt, Appendix B - Final Rules
New FCC Rule Section 22.919
47 C.F.R. Section 22.919

B. FCC's Stated Position on Rules and Policy
Prior to Rule Changes in CC Docket No. 92-115

If you have any questions, please feel free to contact me:


Bob Keller (KY3R)
==============================
Robert J. Keller, P.C.
------------------------------
Federal Telecommunications Law
4200 Wisconsin Ave NW #106-261
Washington, DC 20016-2143 USA
------------------------------
Internet: rjk@telcomlaw.com
Telephone: +1 301.229.5208
Facsimile: +1 301.229.6875
CompuServe UID: 76100.3333
==============================

===========================================================
A. Federal Communications Commission
Report and Order (CC Docket Nos. 92-115, 94-46, and 93-116)
Adopted: August 2, 1994 Released: September 9, 1994
Rule Changes Effective: January 1, 1995
===========================================================

--------------------------
1. Excerpt, Paragraphs 54-63:
--------------------------

Cellular Electronic Serial Numbers

54. Proposal. We proposed in the Notice a new rule
(Section 22.919) intended to help reduce the fraudulent use of
cellular equipment caused by tampering with the unique
Electronic Serial Numbers (ESN) that identify mobile equipment
to cellular systems. The purposes of the ESN in a cellular
telephone are similar to the Vehicle Identification Numbers in
automobiles. That is, it uniquely identifies the equipment in
order to assist in recovery if it is stolen. More importantly,
in the case of cellular telephones, the ESN enables the
carriers to bill properly for calls made from the telephone.
Any alteration of the ESN renders it useless for this purpose.
The proposed rule explicitly establishes anti-fraud design
specifications that require, among other things, that the ESN
must be programmed into the equipment at the factory and must
not be alterable, removable, or in any way able to be
manipulated in the field. In addition, the proposed rules
require that the ESN component be permanently attached to a
main circuit board of the mobile transmitter and that the
integrity of the unit's operating software not be alterable.

55. Comments. The commenters generally support our
proposal,[94] but they suggest some modifications. For example,
BellSouth, Southwestern Bell, GTE, and CIA suggest that our
proposal should be modified to provide that equipment already
manufactured, is exempt from the rule.[95] They argue that
subjecting existing phones to this rule would be very expensive
and difficult, if not impossible, to implement. Therefore, they
recommend that the rule apply only to phones manufactured after
a particular date.[96] NYNEX recommends that we not require
the ESN chip to be secured to the main circuit board of the
mobile transmitter as proposed. Rather, NYNEX suggests that the
ESN chip be attached to the frame of the radio and attached to
the logic board by cable.[97] In addition, it recommends that
operating software be encoded or scattered over different
memory chips.[98] Motorola, Inc. (Motorola) and Ericsson Corp.
(Ericsson), two manufacturers of cellular mobile equipment,
suggest that the proposal be modified to allow authorized
service centers or representatives to make necessary and
required changes to ESNs in mobile and portable units in the
field.[99]

56. Southwestern Bell recommends that the rule also apply
to mobile equipment associated with a wireless private branch
exchange (PBX).[100] CTIA suggests that the proposal be
modified in several respects. First, it states that we should
clarify that requiring a mobile transmitter to have a "unique"
ESN, means that any particular ESN will not exist in more than
one mobile unit. Second, CTIA suggests that ESN manipulation
not be permitted "outside a manufacturer's authorized
facility." Third, it requests that cellular mobile units be
required to be designed to comply with the "applicable industry
standard for authentication."[101] New Vector supports the
proposed rule, but emphasizes that the ESN criteria should be
incorporated into the type-acceptance rules to clarify that
manufacturers will be subject to the Commission's enforcement
procedures if they do not comply with the ESN requirements.[102]

57. C2+ Technology (C2+) requests that we allow companies
to market ancillary cellular equipment that emulates ESNs for
the purpose of allowing more than one cellular phone to have
the same telephone number. It argues that emulating ESNs in the
way it describes benefits the public, does not involve fraud,
and retains the security and integrity of the cellular
phones.[103] In opposition, Ericsson asserts that the rules
should include procedures to ensure that ESNs are not easily
transferable through the use of an encrypted data transfer
device.[104] Similarly, New Par suggests that the proposed
rule proscribe activity that does not physically alter the chip
yet affects the radiated ESN by translating the ESN signal that
the mobile unit transmits.[105]

58. Discussion. The record before us demonstrates the need
for measures that will help reduce the fraudulent use of
cellular equipment caused by tampering with the ESN. We
therefore adopt the proposed rule for the reasons set forth
below.

59. Contrary to the suggestion of one commenter, the ESN
rule will not prevent a consumer from having two cellular
telephones with the same telephone number. Changing the ESN
emitted by a cellular telephone to be the same as that emitted
by another cellular telephone does not create an "extension"
cellular telephone. Rather, it merely makes it impossible for
the cellular system to distinguish between the two telephones.
We note that Commission rules do not prohibit assignment of the
same telephone number to two or more cellular telephones.[106]
It is technically possible to have the same telephone number
for two or more cellular telephones, each having a unique
ESN.[107] If a cellular carrier wishes to provide this
service, it may. In this connection, we will not require that
use of cellular telephones comply with an industry
authentication procedure as requested by CTIA, as this could
have the unintended effect of precluding multiple cellular
telephones (each with a unique ESN) from having the same
telephone number.

60. Further, we conclude that the practice of altering
cellular phones to "emulate" ESNs without receiving the
permission of the relevant cellular licensee should not be
allowed because (1) simultaneous use of cellular telephones
fraudulently emitting the same ESN without the licensee's
permission could cause problems in some cellular systems such
as erroneous tracking or billing; (2) fraudulent use of such
phones without the licensee's permission could deprive cellular
carriers of monthly per telephone revenues to which they are
entitled; and (3) such altered phones not authorized by the
carrier, would therefore not fall within the licensee's blanket
license, and thus would be unlicensed transmitters in violation
of Section 301 of the Act. Therefore, we agree with New Par and
Ericsson that the ESN rule should proscribe activity that does
not physically alter the ESN, but affects the radiated ESN,
including activities that transfer ESNs through the use of an
encrypted data transfer device.

61. With respect to the proposal to allow alteration of
ESNs by manufacturers' authorized service centers or
representatives, we note that computer software to change ESNs,
which is intended to be used only by authorized service
personnel, might become available to unauthorized persons
through privately operated computer "bulletin boards". We have
no knowledge that it is now possible to prevent unauthorized
use of such software for fraudulent purposes. Accordingly, we
decline to make the exception requested by Motorola and
Ericsson.

62. We further agree with the commenters that it would be
impractical to apply the new rule to existing equipment.
Accordingly, we are not requiring that cellular equipment that
is currently in use or has received a grant of type-acceptance
be modified or retrofitted to comply with the requirements of
this rule. Thus, the ESN rule will apply only to cellular
equipment for which initial type-acceptance is sought after the
date that our rules become effective. Nevertheless, with regard
to existing equipment, we conclude that cellular telephones
with altered ESNs do not comply with the cellular system
compatibility specification[108] and thus may not be considered
authorized equipment under the original type acceptance.
Accordingly, a consumer's knowing use of such altered equipment
would violate our rules. We further believe that any individual
or company that knowingly alters cellular telephones to cause
them to transmit an ESN other than the one originally installed
by the manufacturer is aiding in the violation of our rules.
Thus, we advise all cellular licensees and subscribers that the
use of the C2+ altered cellular telephones constitutes a
violation of the Act and our rules.

63. With respect to NYNEX's proposed modifications for
securing the ESN chip to the mobile transmitter, the record
does not convince us that these modifications will make the ESN
rule more effective. Therefore, we do not adopt NYNEX's
proposal. We agree with Southwestern Bell that the ESN rule
should apply to mobile equipment associated with wireless PBX
if the equipment can also be used on cellular systems. We also
clarify that the new ESN rule prohibits the installation of an
ESN in more than one mobile transmitter. Finally, as suggested
by New Vector, we amend the type-acceptance rule to refer to
the newly adopted ESN rule.[109]

[Footnotes]

[94] See PacTel Comments at 2; CTIA Comments at 7-8.

[95] BellSouth Comments at Appendix 2, p.36; Southwestern
Bell Comments at 28-29; GTE Comments at 30; CTIA Comments at 8.

[96] For example, BellSouth suggests that the anti-fraud
measures should not apply to equipment type-accepted before
January 1, 1993.

[97] NYNEX Comments at 8.

[98] Id. at 8-9.

[99] Ericsson Reply Comments at 2-5; Motorola Reply
Comments at 3.

[100] Southwestern Bell Comments at 29.

[101] CTIA Comments at 8.

[102] New Vector Comments at Appendix I, p.44.

[103] C2+ Comments at 1-2.

[104] Ericsson Reply Comments at 3-4.

[105] New Par Comments at 21-22.

[106] The telephone number is referred to in the cellular
compatibility specification as the Mobile Identification Number
or "MIN"

[107] It is not technically necessary to have the same
ESN in order to have the same telephone number. Nevertheless,
the authentication software used by some cellular systems does
not permit two cellular telephones with the same telephone
number. In such cases, cellular carriers should explain to
consumers who request this service that their system is not yet
capable of providing it.

[108] See old Section 22.915, which becomes new Section
22.933 in Appendices A and B.

[109] See discussion of new Section 22.377 in Appendix A.

----------------------------------------------
2. Excerpt, Appendix A
Detailed Discussion of Part 22 Rule Amendments
Section 22.919 Electronic serial numbers.
----------------------------------------------

Section 22.919 Electronic serial numbers.

The purpose of this new section is to deter cellular fraud
by requiring that the Electronic Serial Number (ESN) unique to
each cellular phone be factory set, inalterable,
non-transferable, and otherwise tamper-proof and free of
fraudulent manipulation in the field. This subject received
substantial attention from commenters and is discussed in the
Report and Order.

---------------------------------
3. Excerpt, Appendix B - Final Rules
New FCC Rule Section 22.919
47 C.F.R. Section 22.919
---------------------------------

22.919 Electronic serial numbers.

The Electronic Serial Number (ESN) is a 32 bit binary
number that uniquely identifies a cellular mobile
transmitter to any cellular system.

(a) Each mobile transmitter in service must have a
unique ESN.

(b) The ESN host component must be permanently attached
to a main circuit board of the mobile transmitter
and the integrity of the unit's operating software
must not be alterable. The ESN must be isolated
from fraudulent contact and tampering. If the ESN
host component does not contain other information,
that component must not be removable, and its
electrical connections must not be accessible. If
the ESN host component contains other information,
the ESN must be encoded using one or more of the
following techniques:

(1) Multiplication or division by a polynomial;

(2) Cyclic coding;

(3) The spreading of ESN bits over various non-
sequential memory locations.

(c) Cellular mobile equipment must be designed such
that any attempt to remove, tamper with, or change
the ESN chip, its logic system, or firmware
originally programmed by the manufacturer will
render the mobile transmitter inoperative.

(d) The ESN must be factory set and must not be
alterable, transferable, removable or otherwise
able to be manipulated in the field. Cellular
equipment must be designed such that any attempt to
remove, tamper with, or change the ESN chip, its
logic system, or firmware originally programmed by
the manufacturer will render the mobile transmitter
inoperative.

=============================================
B. FCC's Stated Position on Rules and Policy
Prior to Rule Changes in CC Docket No. 92-115
=============================================

PUBLIC NOTICE

FEDERAL COMMUNICATIONS COMMISSION

COMMON CARRIER PUBLIC MOBILE SERVICES INFORMATION

October 2, 1991
Report No. CL-92-3

CHANGING ELECTRONIC SERIAL NUMBERS ON CELLULAR
PHONES IS A VIOLATION OF THE COMMISSION'S RULES

It has come to the attention of the Mobile Services
Division that individuals and companies may be altering
the Electronic Serial Number ( ESN) on cellular phones.
Paragraph 2.3.2 in OST Bulletin No. 53 (Cellular System
Mobile Station - Land Station Compatibility Specification,
July, 1983) states that "[a]ttempts to change the serial
number circuitry should render the mobile station
inoperative." The 1981 edition of these compatibility
specifications (which contains the same wording) was
included as Appendix D in CC Docket 79-318 and
is incorporated into Section 22.915 of the Commission's
rules.

Phones with altered ESNs do not comply with the
Commission's rules and any individual or company operating
such phones or performing such alterations is in violation
of Section 22.915 of the Commission's rules and could be
subject to appropriate enforcement action.

Questions concerning this Public Notice should be addressed
to Steve Markendorff at 202-653-5560 or Andrew Nachby at
202-632-6450.

| Robert J. Keller, P.C. Internet: rjk@telcomlaw.com |
| Federal Telecommunications Law Telephone: +1 301.229.5208 |
| 4200 Wisconsin Ave NW #106-261 Facsimile: +1 301.229.6875 |
| Washington, DC 20016-2143 USA CompuServe UID: 76100.3333 |























← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT