----=[ CiSSD ]=---- is finally sober over Issue #3 of __ /\ |__| \ \ : _____ _____ _____ _____> \____ __|__ _ | . | __| | > | | > | | ---===[ | /_ __| /| | / _ | |__ ]===--- __|__|__|_____| _/ |__|___/__|__|_____| | | / | | : . \/ . : . . - FROGS - ========================================================================= THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY MAY (C) 1993/94 ------------------------------------------------------------------------- Once again, the frog has overestimated our stupidity. Surely we will not fall for the same trick twice. We have learned a few things about frogs. They don't have very much to do. They're rather bored most of the time, but they impress you by breathing a lot of hot air out of their lungs, and then they sit quietly in order to lure you in. They smell funny, but it's one of those smells you have to sniff again to make sure that your nose didn't decieve you the first time. If you lick a toad, you get high, but frogs are not toads, so everyone sucking up to a frog finds out shortly that it's not all it's cracked up to be, and generally leaves it be.. it's smell was unappealing in the first place. You can buzz about trying to find a place to observe the frog, in order that you might protect yourself from its self serving, greed driven actions, but when the frog thinks you are sitting pretty, he tries to aggrivate you again. If you are silly enough to become aggrieved by his mischeivous tactics, he will stick out his tounge, and swallow you whole. For once, a group of flies, known as CiSSD, has outwitted a group of amphibians, who for the most part, aren't frogs, but all wish they were. We learned the only way to get high from a frog is to smoke him. But we flies don't need to get high.. I think we can be content with removing his lilly pad.. He will no longer be part of this amphibian community. [No one will appreciate this as much as those who are involved in the war against the evil frog. Entertainment for your efforts. Thanks a lot guys.. Zap the Frog, rejoin the scene when you grow up. For now you are only a tadpole.] --- Due to the hustle and bustle of a busy end of school term, some of our regular columns were forced to flee. 'NEWS AND NATTERINGS OF THE DOPE MAN' will most definately be back for next issue, and will more than probably be joined by 'NEWS BYTES (and usually bites too!)'. Despite these ommisions, we hope sincerely that you enjoy this issue. After all, some things may come and go in waves, but the computer underground is here to stay. - Essence/TX --- WARNING, DISCLAIMER WARNING: THE FOLLOWING TEXT CONTAINS MATERIAL WHICH MAY BE CONSIDERED OFFENSIVE BY SOME. CISSD AND ITS MEMBERS BEAR NO LIABILITY ON THE PART OF THE READER. READ AT YOUR OWN RISK. DISCLAIMER: THE INFORMATION PRESENTED IN THE FOLLOWING TEXT IS NOT INTENDED TO BE USED FOR PURPOSES CONTRARY TO LAWS IN THE COUNTRY WHERE THE READER RESIDES. DUE TO AN INTERNATIONAL DISTRIBUTION, OUR CHOSEN TOPICS WILL PROVIDE INFORMATION THAT COULD POTENTIALLY BE USED FOR PURPOSES ILLEGITIMATE IN NATURE. CISSD, AND ITS MEMBERS THEREFORE, BEAR NO RESPONSIBILITY FOR THE ACTIONS OF THE READER, BE THEY A DIRECT, OR INDIRECT RESULT OF READING THE FOLLOWING TEXT. NOTE: BY READING BEYOND THIS POINT, YOU ARE AGREEING TO THE CONDITIONS IN THE ABOVE WARNING, AND DISCLAIMER. ADDITIONAL NOTE: THE EDITOR OF THIS MAGAZINE DOES NOT CONDONE PLAUGERISM. IF ANY ARTICLES APPEAR TO HAVE BEEN COPIED WITHOUT PROPER CREDIT, NOTIFICATION WOULD BE APPRECIATED. DUE TO THE VAST NUMBER OF SUBMISSIONS WE RECIEVE EACH MONTH, IT IS DIFFICULT TO FULLY DETERMINE WHAT IS, AND IS NOT ORGINAL MATERIAL. --- TABLE OF CONTENTS ITEM CONTRIBUTOR(S) LINE ==== ============== ==== Editorial Essence 17 Warning, Disclaimer -- 67 Table of Contents -- 95 Getting Revival -- 159 Letters to the Editor -- 182 Telekom Stupidity Revealed Lister 298 Politics and The Hacker The Dictator 343 Emotional Maturity, Fourteen Essence 430 Years of Age CyberPunk! The Dictator 471 Laserprinter Forgery Kryten 604 Caller ID Information and Lister 624 Specifications The Diatribes of Grappling The Grappler 813 FEATURE: Privacy, Line Taps and Lister 937 The US Government | The Clipper Chip: A Technical Dorothy Denning 944 | Summary | The White House: Statement by The Press Secretary 1088 | the Press Secretary Hinterland Who's Who - 800 Exchanges Lister 1346 Poetry Corner The Grappler/Essence 1577 Official [CiSSD] Bad-Ass Belcore Lister 1657 glossary Erratum - Corrections from last issue Essence 3241 Zen What? The ???? ??? 3321 [CiSSD] Membership Information Essence 3533 [CiSSD] Contact Addresses -- 3563 Last Words From the Editor Essence 3619 | Credits 3653 169092 ]-[bytes]-------------------------------------------[lines]-[ 3677 --- GETTING REVIVAL! In order to recieve REVIVAL magazine, you may transfer the latest issue every second month from the following address: ftp 141.214.4.135 docs/zines/revival/rvlcissd.xxx where 'xxx' is the issue number. ie: 'rvlcissd.003'. If you do not have internet access, the following electronic bulletin board systems are REVIVAL(!) distribution sites: =[North America]==============================[+1]= Der Diz - NuKE '93 (208) 343 5038 WHQ The Downtown Militarized Zone (416) 450 7087 CHQ The Revolutionary Front (416) 936 6663 Atomic Nature (416) 477 9563 Screaming Revulsion (418) 622 9712 --- LETTERS TO THE EDITOR ---=[ ANONYMOUS LETTER re: ABUSE IN THE HOME AND SCHOOL ]=--- (Edited for Clarity) The look at school system as being a negative aspect in kids lives was obviously a biased one by a disgruntled teenager who doesn't have the ability to look at the whole picture. I'll give you credit for seeing the problem as being the parents. The whole problem lies in the homes. These so called disceplinary actions at high schools are those a person would face in everyday life, so I say GET USED TO IT! And to answer your question, it is the parents jobs! It is not the job of a highly trained teaching professional to teach common manners in a high school enviornment! I would like to point out that the article had many good points and the point of parental expectations in school, is an excellent one! I can not count the times a parent has come in saying I should be doing a better job! Like what[?] Go home and make the damn student do his/her homework! I can't make a student do his/her work[.] It's motivation[that is needed!] I remember when a good education and having your parents proud of you was motivation enough. You'll make a good adult TX[.] I hope you remember the things you know now when you have your own kids. P.S - Blame the government [that] we're underfunded and can't afford the extra support personel we would all like for the new generation. --- Editors Response --- You are perfectly right to refer to me as a disgruntled teenager. I think, however, that I do have the ability to look at the whole picture.. I simply chose not to. That was clearly a serious error on my part. I feel that, maybe not the whole problem, but at least a large proportion of the problem lies in the homes. A good chunk of the problem would be solved if parents made a concious effort to control the environmental variables that are in their hands. It is not the teachers responsibility to teach discepline at school, but because it seems so neccesary, and because children are so neglected in their homes, I feel that the school system, given appropriate government funding, should take a different approach to training the large majority of students who have no motivation, and little self- respect. Although I believe I was reffering to parents expectations of the _students_ in my article, it is also very true that parents expectations of _teachers_ are also quite ridiculous in many cases. My own mother used to always blame my teachers for anything I would do wrong. I allowed her to, because I had no reason to want to take the blame myself, but due to this long period of time when I took no responsibility, I later had(and am still having) trouble disceplining myself to work effeciently, and productively. At this stage in my life, most of my school grades are borderline failing due, not to any fault of my teachers, but to my own lack of motivation, and my own lack of self discepline. I still feel that proud parents, and achievement in school might be enough motivation to continue doing well, but it's up to the parents to give their children a kick-start at an early age, so that they might continue to maintain their pride in achievement later on in life. I still haven't ranked myself as being responsible enough to have kids. Maybe when I'm significantly older, or at least, more mentally developed, and able to meet the challenges that modern society places on parents, I will reconsider. Too many parents, unfortunately, assume that bringing up children is easy. Finally (as this is rather a long response), the government should indeed be blamed for underfunding. The problems that I continually pick at in the educational system would be solved if any one school had a complete, full time staff.. including the neccesary teachers, councillors, and administrators it takes to help the children who don't get a fair shake at home. - Essence/TX ---=[ Split Adrenalyn's LETTER re: REVIVAL #2 ]=--- Well, I just finished reading Revival Issue #002 and I have to say that it's the best "underground" mag I've EVER read. The articles are well written, discussing topics that we all can relate to, the articles pose questions which I'm sure many of us have all asked ourselves about whatever topic. It's also not the same old underground mag (it doesn't have a whole bunch of TEXT files put together into an "issue"), but more of an information mag, giving you the insight to the PHAC scene. Good job on this one guys, when's #003 coming? --- Editors Response --- Well, it's here! Assuming that I'm sticking to any deadlines, the magazine will be released on the last saturday of every other month. The deadline for submissions by non-CiSSD members to REVIVAL! magazine will be two weeks before the release date. Thanks for the glowing compliments. While I doubt they're fully deserved, it is true that the magazine is more than a bunch of text files. I think that most CiSSD members take a special pride in the magazine, as it acts as a forum for us to air our views to the public, and the public to air their views to the rest of the public! It is very important that we have an appeal to everyone, from some perspective or another.. We will continue to be political, and provocative. - Essence/TX --- TELEKOM STUPIDITY REVEALED Lister This week's "Research and Technology" section of the German news magazine {Focus} (Nr. 17/93, pg. 106) features an *interesting* article about the German telephone network. According to the article all you need to tap into another phone line is a phone line which is hooked up to a modern digital switch and a simple 16 key touch tone beeper. The article shows the original TELEKOM beeper. For interested users, {Focus} included the TELEKOM reorder number and its approval ID. By dialing one of the special "A","B","C" or "D" keys (rightmost column), you get acces to TELEKOMs switch testing facilities. After you are in the testing system, you have to enter a three-digit switch id. Then enter the phone number you wish to call or listen to. If the phone line is busy, then just enter "1" and you will have a *forced* three way call. With a modem or any other computer controlled dialing devices it is rather simple to find the available switch ids in several hours. Since the testing facility will identify itstelf by sending a rather loud test tone, most persons will find out, that there is something strange going on, if they are tapped by someone. But there are also others that will never take much care about this situation. Isn't it STUPID that TELEKOM apparently has NOT learned anything what happend around 20++ years within the USA with the blue/red/ ... boxes that gave interested users nice and mostly free features? This time you even do not need any *illegal* devices, but a rather common and widely available touch tone beeper give you full control over several local switches! As elementary mathematics shows, any additional key to press would lower the chance by 1 to 16 to get access to such a testing system. It would have been so simple to hide the access code to this system within a normal number range. If that number would have been changed regularly, then nobody would ever get access to it. But these measures require work, and that seems to be hard for a monopoly company! --- POLITICS AND THE HACKER The Dictator Everyone reading this magazine has a reason to do it.. for their freedom may depend on it. Why, you ask? Because you are dealing with the Cyberpunk Realm of fantasy, virtual reality, and revolution. Fantasy is apparant with every hacker or cyberpunk reading this article and imagining the possibilities of society and technology, working together towards perfect harmony--or anarchy, the Virtual Reality of a world where no one's money is their own, where people are not more than the sum of their words as they flicker past on your screen, where personality is no more than who you can impress with your extended vocabulary or "K-Rad K00lness." However, another aspect is not so obvious, but it is there, perhaps more than any other. We, as hackers, phreakers, cyberpunks etc. have the want, the burning desire to change the world into a place that we have all had a glimpse of, The 'New World' of the 90's, so to speak. The underground is not a happy place. It is a place where one can obtain seemingly endless flows of information, but where one must constantly be prepared to show up a counterpart, and to deal with the obligations of group affiliation, the backbone of the Underground. It's all for status, for knowledge, for power. But the power, ultimately, is for the change of OUR lives, for the change of our ability to control what will become of the future. it is SO enticing that we may, at times, forget that the methods we use are the methods we have all strived to pull away from: Commercialism, and Capitalism. We attempt to use all means necessary to amass power, power which will ultimately affect our future for the better. We do this by squeezing money, time, and belongings from the average citizen, thereby undermining our very goals, for when we have amassed all the power required, and are ready to return to normal life, we will be forced to deal with the same CyberPunks who were once our allies, partners, or even counterparts, thereby, in the end, succombing to the realities of our ways, the same realities as Capatalism: the reality that there is NO escape. It does NOT have to be that way, however! We have all seen the world in which we all work together to further a common cause, to accomplish certain tasks. We all know the power of the underground. we all know that the power held by each individual, if harnessed, would produce an invaluable machine for change. We NEED to pull together. CiSSD has created a group whose purpose lies in the free-flow of information, and we consistantly work towards that goal. We all know what can be, if we only try. In Toronto, Canada in early may, the working class held a march on parliment hill demanding a reform. If this was backed by the prowess of every hacker in the underground, we would have a message that could be heard EVERYWHERE the telephone or computer screen reached! What we need is ORGANIZED REVOLUTION! The Great Dope Man put it best when he remarked that "Deviency is its own reward." Whether or not he realised it at the time, this phrase had the potential to be the catalyst for the greatest revolution ever recorded. Deviency, the art of going against the norms of society, if proctised by enough people with enough frequency, WOULD become the norm, thereby rewarding all who wished it with an altered standard of living. Now the only way to ensure that this standard of living would be for the better, would be to have 'organized deviency' or an ORGANIZED REVOLUTION. One in which the entire underground drove for something, putting all of our amassed strength against those we hate in society, instead of one another. The potential is enormous. We are not limited by restrections on what information we can amass, nor on how far this information can be destributed. We are not limited as to what aspects of this Capatalist world we live in we can gain control of. We CAN make a difference! We CAN change our downward plummet into extinction. But a CAPATALIST world will never be able to make the changes, as the changes would be looked upon as inefficient or irrelevant. We have the power in our HANDS! We now need only make use of it. For we have the reasons, just look into you paper. The time is Upon us, we must act. The WORLD calls for a change. It's our responsibility, because WE are the only people who can change it. HACKERS, PHREAKERS, CYBERPUNKS OF THE WORLD, UNITE TO BRING ABOUT THE NEW WORLD ORDER! --- EMOTIONAL MATURITY, FOURTEEN YEARS OF AGE! Essence/TX Most of my articles are provoked by a real life experience that leads me to think about a topic from a completely different perspective. This one is no different, but I am quite shocked and surprised that I haven't seen anyone take my perspective before.. and why?.. Maybe because it's a confusing one. I've never been one to base decisions on age. I feel that generally, age is an unimportant factor when deciding what privelidges are appropriate for each individual. More important than age, is maturity. Clearly, when it comes to this, 'The law is an ass'. Canadian law bases emotional maturity on i) age and ii) chasteness of character. More notably, the law states that any female, fourteen years or older, who has not previously been of chaste character, is emotionally mature enough to make the decision to have sex. In plain english, this means that any girl age fourteen who acts like a whore can be taken advantage of. Any girl age fourteen who acts decently is not mature enough to have sex. Having sex with any girl age 14 to 18 inclusive who has behaved decently and with self respect, is rape. Despite all the complaints about males having to worry about rape charges, whether or not they rape a girl, I think the laws pertaining to rape are particularily flacid, and weak. There are clauses that shift the responsibility of rape onto the victim females if the male can show the female to have 'provoked' the incident. Are we in a day and age where sex is so important that the male partner can't even take the time to be reasonably sure about the emotional stability, and maturity of his partner? Any guy who justifies his sexual activities by rattling off sex-laws, and how they pertain to his case, should be removed from our society. We don't need the inconsiderate. We don't need the low-lifes. - Essence/TX --- CYBERPUNK! The Dictator The following article was featured in TIME magazine. I felt it was an accurate portrayal of cyberpunks in the computer underground community. BEGIN _| In the 50s it was the beatniks, staging a coffehouse rebellion against the conformity of America in the Eisenhower era. In the 60s the Hippies arrived, combining anti-war activism with the energy of Sex, Drugs, and Rock'N'Roll. Now a new subculture is bubbling up from the underground, popping up from computer screens around the world like a piece of hypertext. It's called CYBERPUNK, a late - 20th centure term derived from CYBERNETICS, the science of communication and control, and PUNK, an antisocial rebel or hoodlum. Within this odd pairing lurks the essence of CYBERPUNK's international culture: a way of looking at the world that combines infatuation with high-tech tools and disdain for conventional ways of using them. Origionally applied to a school of hard-boiled science-fiction writers and then to certain semi-tough computer hackers, the word CYBERPUNK now covers a broad range of music, art, psychedelics, smart drugs and cutting-edge technology, as well as the computer hacker who laboriously tries to put this new subculture to work. I have heard CYBERPUNK called everything from "Technology with an Attitude" (Stewart Brand, Whole Earth Catalog) to "An unholy alliance of the technical world with the underground of pop culture and street-level anarchy" (Bruce Sterling, Science-Fiction writer). As in any counterculture movement, some denziens would deny they are part of a movement at all. Although the largest CYBERPUNK journal (PUNK! Magazine) claims to have a readership of 70 000, there are probably no more than a few thousand computer hackers, futurists, phreakers, computer-savvy artists and musicians, and assorted science-fiction 'geeks' on the planet who would actually call themselfes CYBERPUNKS. Nevertheless, this may be the defining counterculture of the computer age. It embraces, in spirit at least, not just the nearest thirtysomething hacker hunched over a terminal, but also nose-ringed twentysomethings gathered at clandestine RAVES, teenagers who feel about the Amiga the way their parents felt about records, and even preadolescent VIDKIDS fused to their SNES and Genesis games -- the training of CYBERPUNK. Obsessed with technology, CYBERPUNKS are future-oriented to a fault. CYBERPUNKS already have one foot in the 21st century, certain that in the long run, everyone will be a CYBERPUNK. The CYBERPUNK look, a kind of science-fiction surrealism tweaked by computer graphics, is finding its way into art galleries, music videos, and Hollywood movies. CYBERPUNK magazines, many cheaply published or distributed by electronic medium, are multiplying like cable-TV channels. CYBERPUNK music is hot enough to keep several record companies and scores of bands cranking out CD's. CYBERPUNK oriented books are snatched up as soon as they hit the market. And CYBERPUNK films like BLADERUNNER, ROBOCOP, VIDEODROME, TOTAL RECALL, TERMINATOR 2 and THE LAWNMOWER MAN have moved out of the cult market and into the mainstream. In the US (and therefore Canada), CYBERPUNK culture is likely to get a boost from of all things, the Clinton Administartion, due to his intrest in the US's "Data Highways" and what the CYBERPUNKS refer to as CYBERSPACE. Both terms refer to the globe-circling, interconnected telephone network that is the conduit for billions of voice, fax, and data transmissions. This huge CYBERSPACE, the INTERNET, stretches across the atlantic, touching down in Iceland, and western Europe, then on to Japan, South Korea, Indonesia, Australia and New Zealand. CYBERPUNKS look at the wires from the inside; and talk of the network as if it were an actual place, a virtual reality that can be entered, explored, and manipulated. CYBERSPACE playes a major role in the CYBERPUNK world view. The literature is filled with 'Console Cowboys' who prove themselves by donning virtual realitry gear and performing heroic feats in the imagery 'matrix' of CYBERSPACE. "CYBERPUNK", a 1991 book, features profiles of three canonical CYBERPUNK hackers, including Robert Morris, the Cornell University student whose computer virus brought the entire INTERNET to a halt in 1988. However, CYBERSPACE is more than a playground. It's a medium. Every night on GEnie, Compuserve, and thousands of smaller BBSes, people by the hundreds of thousands are logging on to a great computer-mediated talkfest, an interactive debate that allows them to leap over barriers of time, place nationality, sex, and social status. Most computer users are content to visit cyberspace now and then, but the CYBERPUNK goes there to live, and play, and even DIE. the WELL (Whole Earth 'lectronic Link), an INTERNET site, was shaken 2 1/2 years ago when one of its most active participants ran a program that erased every message he had ever left - it involved thousands of posts - an act that amounted to virtual suicide. A few weeks later he committed suicide for real. The WELL has been a magnet for CYBERPUNK thinkers, and the question is, is there a CYBERPUNK movement? The WELL launched a freewheeling campeign that ran for months and filled more than 300 pages of text. The debate yielded, among other things, a concise list of wants of the CYBERPUNK movement: INFORMATION WANTS TO BE FREE. A good piece of information will eventually get into the hands of thouse who can make the best use of it, despite the best efforts of censors, copyright lawyers and the secret service. ALWAYS YIELD TO THE HANDS-ON IMPERATIVE. CYBERPUNKS maintain that they can run the world for the better, if they can only get there hands on the control box. PROMOTE CENTRALIZATION. Society is splintering into hundreds of subcultures and designer cults, which is a no-no. 'SURF THE EDGES'. When the world is changing by the nanosecond, the best way to keep your head above the water is to stay at the front end of the Zeitgeist. For CYBERPUNKS, pondering history is not so important as coming to terms with the future. For all the flaws, they have found ways to live with technology, to make it theirs, something the back-to-the-land hippies never accomplished. CYBERPUNKS use the technology to bridge the gulf between art and science, between the world of literature and the world of industry. Most of all, CYBERPUNKS realize that if you didn't control technology, it would eventually control you. It is a lesson that will serve CYBERPUNKS - and the rest of the world - well into the next century. |~ END --- LASERPRINTER FORGERY Kryten Most of us remember those pre-historic typewriter things. If you do then the correction key that some models had was your best friend, and can be your best friend again. That is the correctable (carbon film) ribbon. The manual warned against using this ribbon for typing legal documents because undetectable alterations would be too easy. Recently I heard a taped interview with Frank Abagnale, a reformed forger who now advises companies on fraud prevention. It was a quite an interesting cassette. This is where I tie in my first paragraph. Abagnale said that output from most laserprinters and photocopiers can be removed in a similar manner with correction tape because the toner powder, like carbon film ribbon, only sits on the surface of the paper but does not impregnate the fibers. I tried it and he's right. --- CALLER ID INFORMATION AND SPECIFICATIONS Lister I know this information may be regarded as old hat, and that it's not very sensitive in nature; but it makes an interesting read nonetheless. Hopefully, it will shed a bit of insight as to the inner workings of Caller ID. INTRODUCTION Calling Number Delivery (CND), better known as Caller ID, is a telephone service intended for residential and small business customers. It allows the called Customer Premises Equipment (CPE) to receive a calling party's directory number and the date and time of the call during the first 4 second silent interval in the ringing cycle. The customer must contact a Bellcore Client Company to initiate CND service. According to Pacific Bell representatives, the following states and district currently support CND service: Delaware, District of Columbia, Florida, Georgia, Idaho, Kentucky, Louisiana, Maine, Maryland, Nebraska, Nevada, New Jersey, Oklahoma, Tennessee, Vermont, Virginia, and West Virginia. The following states are scheduled to support CND service by April, 1992: Alaska, Arizona, California, Colorado, Illinois, Indiana, Iowa, Massachusetts, Mississippi, New Hampshire, New York, North Carolina, North Dakota, Ohio, Oregon, Rhode Island, and South Carolina. PARAMETERS The data signalling interface has the following characteristics: Link Type 2-wire, simplex Transmission Scheme Analog, phase-coherent FSK Logical 1 (mark) 1200 +/- 12 Hz Logical 0 (space) 2200 +/- 22 Hz Transmission Rate 1200 bps Transmission Level 13.5 +/- dBm into 900 ohm load PROTOCOL The protocol uses 8-bit data words (bytes), each bounded by a start bit and a stop bit. The CND message uses the Single Data Message format shown below. Channel Carrier Message Message Data Checksum Seizure Signal Type Length Word(s) Word Signal Word Word CHANNEL SEIZURE SIGNAL The channel seizure is 30 continuous bytes of 55h (01010101) providing a detectable alternating function to the CPE (i.e. the modem data pump). CARRIER SIGNAL The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to condition the receiver for data. MESSAGE TYPE WORD The message type word indicates the service and capability associated with the data message. The message type word for CND is 04h (00000100). MESSAGE LENGTH WORD The message length word specifies the total number of data words to follow. DATA WORDS The data words are encoded in ASCII and represent the following information: o The first two words represent the month o The next two words represent the day of the month o The next two words represent the hour in local military time o The next two words represent the minute after the hour o The calling party's directory number is represented by the remaining words in the data word field If the calling party's directory number is not available to the terminating central office, the data word field contains an ASCII "O". If the calling party invokes the privacy capability, the data word field contains an ASCII "P". CHECKSUM WORD The Checksum Word contains the twos complement of the modulo 256 sum of the other words in the data message (i.e., message type, message length, and data words). The receiving equipment may calculate the modulo 256 sum of the received words and add this sum to the reveived checksum word. A result of zero generally indicates that the message was correctly received. Message retransmission is not supported. EXAMPLE CND SINGLE DATA MESSAGE An example of a received CND message, beginning with the message type word, follows: 04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51 04h= Calling number delivery information code (message type word) 12h= 18 decimal; Number of data words (date,time, and directory number words) ASCII 30,39= 09; September ASCII 33,30= 30; 30th day ASCII 31,32= 12; 12:00 PM ASCII 32,34= 24; 24 minutes (i.e., 12:24 PM) ASCII 36,30,39,35,35,35,31,32,31,32= 6095551212; calling party's directory number (609) 555-1212 51h= Checksum Word DATA ACCESS ARRANGEMENT (DAA) REQUIREMENTS To receive CND information, the modem monitors the phone line between the first and second ring bursts without causing the DAA to go off hook in the conventional sense, which would inhibit the transmission of CND by the local central office. A simple modification to an existing DAA circuit easily accomplishes the task. MODEM REQUIREMENTS Although the data signalling interface parameters match those of a Bell 202 modem, the receiving CPE need not be a Bell 202 modem. A V.23 1200 bps modem receiver may be used to demodulate the Bell 202 signal. The ring indicate bit (RI) may be used on a modem to indicate when to monitor the phone line for CND information. After the RI bit sets, indicating the first ring burst, the host waits for the RI bit to reset. The host then configures the modem to monitor the phone line for CND information. According to Bellcore specifications, CND signalling starts as early as 300 mS after the first ring burst and ends at least 475 mS before the second ring burst APPLICATIONS Modem manufacturers will soon be implementing new modem features based on CND information as this service becomes widely available. Once CND information is received the user may process the information in a number of ways. 1. The date, time, and calling party's directory number can be displayed. 2. Using a look-up table, the calling party's directory number can be correlated with his or her name and the name displayed. 3. CND information can also be used in additional ways such as for: a. Bulletin board applications b. Black-listing applications c. Keeping logs of system user calls, or d. Implementing a telemarketing data base REFERENCES For more information on Calling Number Delivery (CND), refer to Bellcore publications TR-TSY-000030 and TR-TSY-000031. --- THE DIATRIBES OF GRAPPLING The Grappler "My non-existence never bothered me before I was born." Grappler Speaks: From the electronic wilderness, As I look down upon the scene with dismay a question formulates within the depths of my conscious reasoning: What the hell is going on? All I see is the senseless leeching of text files, etc. So you've got all this info on pbx, freemasonry, virus's, etc. but what good is it if it only ends up on some disk, never to be read again? What are we really trying to accomplish here? I mean so what if you can call long distance for free via some pbx if you only use that pbx to call your friends, etc. Do you think that BELL really cares if you hack someone's calling card? They only benifet from the average phreaks activities and you are just playing into their game, and they only tend to prosecute when activities get out of hand and the customer catches on that some 15 yr. old computer devotee just charged $1000 on his/her calling card. What is the gain in this situation? The only winning party is Bell and no one besides! This brings me to my point, everything you do must be oriented towards a specific goal by which you as a person will profit by. Now when I say profit, I am not just referring to the materialistic sense of the word, I am also talking about the spiritual and emotional aspects of this as well. One of the #1 rules of Grappling is: "Strive for the Infinite in all that you do." It is upon this law that all of grappling hangs so therefore we can say that it is a solid foundation upon which to build from. Now what this means is that in order to get anywhere in this lifetime, one must be prepared to always sacrifice the lower for the higher. One must carefully weigh every move and make sure that any actions will not be a regression to any previous plane of existence. A classic demonstration of this principle is as follows: (Fantasy) You sign a pact with the devil which states that he will provide you with 1 million dollars in exchange for your soul. You being an average person consent, you end up spending all of the money within a years time and going broke. With this abrupt end to your material wealth comes the sudden realization that you have nothing left to sell. So as you can see, as illustrated above one must always ascend the planes and never ever move down as you may end up stuck there! Now I realize that the illustration above is not a very good example of how one may apply this theory to everyday living but I think that you get the gist of it. (I hope) I believe that our time on earth is far too limited and we must take advantage of every single second that we are alive. Conformity is for the weak and those who fall into society 's trap are as lambs to the slaughter. By this I am not saying that one must deliberatley go out and break the law but what I am saying is that if you always play according to societies rules then you are just wasting time. Let's look at the average persons life: birth -> school -> marriage/kids -> job -> death. Now this is not necessarily in the stated order and there may be some deviancy from this projection but not by any significant margin. So as you can see nothing that the average person does is really of any importance other than the obvious procreation bit. Now you may object to this statement and if you do then I welcome a debate but if you look at this from an unbiased viewpoint and step out of the confines of everyday thinking you will come to realize that the only thing that really matters in the end is death. This is a rather morbid statement but if you think about it: Death is a fact of life and therefore something which must be confronted everyday, death makes everything that we do irrelevant and in the end the average joe's life has amounted to a 15 minute eulogy that no one really cares about anyway. So you may be right now sitting before your computer screen with a look of "what the fuck is going on here, this guy is baked!". How does this pertain to you or fit into the context of this article? Well I'll tell you: What I am trying to do with this article is to make you analyze things very acutely, I want you to scrutinize every action you take from this point forward, and realize that any action that you do take should be in conformance with your own will. If you commit an action against your own personal will then you are stepping back into the chaos that is society and well on your way to becoming a slave. "Your all a bunch of FUCKING SLAVES!" *Jim Morrison So applying this to computers and the point of this article, it's all fine and dandy to download thousands of text files on HPACV but is this all that the scene is about? Are we merely content with this? I for one am not and actively utilize my HPACV knowledge to attain information that the average person is not even aware exists. Why let those in control reap the rewards of the slavedog morality which is society when you can have a piece of the pie to? Computers practically run the world or at least play a sizeable role in wordly affairs and therefore it would be safe to assume that if you own one then you probably have access to the same. Organization is the key and that is why I have recently applied to CiSSD in the hopes that membership will raise me up to bigger and better things as opposed to just being a spectator as most are. Now, I have noticed that there is alot of interest in conspiracy among the members of the local boards, well so what if there is a conspiracy because what can we really do about it if there is? Awareness is only 1/8 of the big picture, what I am saying is that why not create your own conspiracies? "I don't know about you but I'm gonna have my kicks before the whole shithouse goes up in flames man!" *Jim Morrison I feel that I have rambled on incoherently long enough, I know this article has jumped around alot but that is merely a reflection of my frustrated state of mind. I feel very strongly about all that I have said and will accept with open arms any criticisms, flak, etc for these views. I have chosen to embrace this life with unbending determination to achieve something of significance, have you? This ends the diatribe. --- PRIVACY, LINE TAPS AND THE US GOVERNMENT Lister Here guys (and gals), this is a nice little article by Dorothy Denning, and it may be of interest to you. Quite a frightening prospect if you'd ask me... BEGIN __| Subject: THE CLIPPER CHIP: A TECHNICAL SUMMARY Date: 19 Apr 93 18:23:27 -0400 Organization: Georgetown University The following document summarizes the Clipper Chip, how it is used, how programming of the chip is coupled to key generation and the escrow process, and how law enforcement decrypts communications. Since there has been some speculation on this news group about my own involvement in this project, I'd like to add that I was not in any way involved. I found out about it when the FBI briefed me on Thursday evening, April 15. Since then I have spent considerable time talking with the NSA and FBI to learn more about this, and I attended the NIST briefing at the Department of Commerce on April 16. The document below is the result of that effort. Dorothy Denning THE CLIPPER CHIP: A TECHNICAL SUMMARY Dorothy Denning April 19, 1993 INTRODUCTION On April 16, the President announced a new initiative that will bring together the Federal Government and industry in a voluntary program to provide secure communications while meeting the legitimate needs of law enforcement. At the heart of the plan is a new tamper-proof encryption chip called the "Clipper Chip" together with a split-key approach to escrowing keys. Two escrow agencies are used, and the key parts from both are needed to reconstruct a key. CHIP STRUCTURE The Clipper Chip contains a classified 64-bit block encryption algorithm called "Skipjack." The algorithm uses 80 bit keys (compared with 56 for the DES) and has 32 rounds of scrambling (compared with 16 for the DES). It supports all 4 DES modes of operation. Throughput is 16 Mbits a second. Each chip includes the following components: the Skipjack encryption algorithm F, an 80-bit family key that is common to all chips N, a 30-bit serial number U, an 80-bit secret key that unlocks all messages encrypted with the chip. ENCRYPTING WITH THE CHIP To see how the chip is used, imagine that it is embedded in the AT&T telephone security device (as it will be). Suppose I call someone and we both have such a device. After pushing a button to start a secure conversation, my security device will negotiate a session key K with the device at the other end (in general, any method of key exchange can be used). The key K and message stream M (i.e., digitized voice) are then fed into the Clipper Chip to produce two values: E[M; K], the encrypted message stream, and E[E[K; U] + N; F], a law enforcement block. The law enforcement block thus contains the session key K encrypted under the unit key U concatenated with the serial number N, all encrypted under the family key F. CHIP PROGRAMMING AND ESCROW All Clipper Chips are programmed inside a SCIF (secure computer information facility), which is essentially a vault. The SCIF contains a laptop computer and equipment to program the chips. About 300 chips are programmed during a single session. The SCIF is located at Mikotronx. At the beginning of a session, a trusted agent from each of the two key escrow agencies enters the vault. Agent 1 enters an 80-bit value S1 into the laptop and agent 2 enters an 80-bit value S2. These values serve as seeds to generate keys for a sequence of serial numbers. To generate the unit key for a serial number N, the 30-bit value N is first padded with a fixed 34-bit block to produce a 64-bit block N1. S1 and S2 are then used as keys to triple-encrypt N1, producing a 64-bit block R1: R1 = E[D[E[N1; S1]; S2]; S1] . Similarly, N is padded with two other 34-bit blocks to produce N2 and N3, and two additional 64-bit blocks R2 and R3 are computed: R2 = E[D[E[N2; S1]; S2]; S1] R3 = E[D[E[N3; S1]; S2]; S1] . R1, R2, and R3 are then concatenated together, giving 192 bits. The first 80 bits are assigned to U1 and the second 80 bits to U2. The rest are discarded. The unit key U is the XOR of U1 and U2. U1 and U2 are the key parts that are separately escrowed with the two escrow agencies. As a sequence of values for U1, U2, and U are generated, they are written onto three separate floppy disks. The first disk contains a file for each serial number that contains the corresponding key part U1. The second disk is similar but contains the U2 values. The third disk contains the unit keys U. Agent 1 takes the first disk and agent 2 takes the second disk. The third disk is used to program the chips. After the chips are programmed, all information is discarded from the vault and the agents leave. The laptop may be destroyed for additional assurance that no information is left behind. The protocol may be changed slightly so that four people are in the room instead of two. The first two would provide the seeds S1 and S2, and the second two (the escrow agents) would take the disks back to the escrow agencies. The escrow agencies have as yet to be determined, but they will not be the NSA, CIA, FBI, or any other law enforcement agency. One or both may be independent from the government. LAW ENFORCEMENT USE When law enforcement has been authorized to tap an encrypted line, they will first take the warrant to the service provider in order to get access to the communications line. Let us assume that the tap is in place and that they have determined that the line is encrypted with Clipper. They will first decrypt the law enforcement block with the family key F. This gives them E[K; U] + N. They will then take a warrant identifying the chip serial number N to each of the key escrow agents and get back U1 and U2. U1 and U2 are XORed together to produce the unit key U, and E[K; U] is decrypted to get the session key K. Finally the message stream is decrypted. All this will be accomplished through a special black box decoder operated by the FBI. ACKNOWLEDGMENT AND DISTRIBUTION NOTICE. All information is based on information provided by NSA, NIST, and the FBI. Permission to distribute this document is granted. |~~ END BEGIN |__ THE WHITE HOUSE Office of the Press Secretary For Immediate Release April 16, 1993 STATEMENT BY THE PRESS SECRETARY The President today announced a new initiative that will bring the Federal Government together with industry in a voluntary program to improve the security and privacy of telephone communications while meeting the legitimate needs of law enforcement. The initiative will involve the creation of new products to accelerate the development and use of advanced and secure telecommunications networks and wireless communications links. For too long there has been little or no dialogue between our private sector and the law enforcement community to resolve the tension between economic vitality and the real challenges of protecting Americans. Rather than use technology to accommodate the sometimes competing interests of economic growth, privacy and law enforcement, previous policies have pitted government against industry and the rights of privacy against law enforcement. Sophisticated encryption technology has been used for years to protect electronic funds transfer. It is now being used to protect electronic mail and computer files. While encryption technology can help Americans protect business secrets and the unauthorized release of personal information, it also can be used by terrorists, drug dealers, and other criminals. A state-of-the-art microcircuit called the "Clipper Chip" has been developed by government engineers. The chip represents a new approach to encryption technology. It can be used in new, relatively inexpensive encryption devices that can be attached to an ordinary telephone. It scrambles telephone communications using an encryption algorithm that is more powerful than many in commercial use today. This new technology will help companies protect proprietary information, protect the privacy of personal phone conversations and prevent unauthorized release of data transmitted electronically. At the same time this technology preserves the ability of federal, state and local law enforcement agencies to intercept lawfully the phone conversations of criminals. A "key-escrow" system will be established to ensure that the "Clipper Chip" is used to protect the privacy of law-abiding Americans. Each device containing the chip will have two unique "keys," numbers that will be needed by authorized government agencies to decode messages encoded by the device. When the device is manufactured, the two keys will be deposited separately in two "key-escrow" data bases that will be established by the Attorney General. Access to these keys will be limited to government officials with legal authorization to conduct a wiretap. The "Clipper Chip" technology provides law enforcement with no new authorities to access the content of the private conversations of Americans. To demonstrate the effectiveness of this new technology, the Attorney General will soon purchase several thousand of the new devices. In addition, respected experts from outside the government will be offered access to the confidential details of the algorithm to assess its capabilities and publicly report their findings. The chip is an important step in addressing the problem of encryption's dual-edge sword: encryption helps to protect the privacy of individuals and industry, but it also can shield criminals and terrorists. We need the "Clipper Chip" and other approaches that can both provide law-abiding citizens with access to the encryption they need and prevent criminals from using it to hide their illegal activities. In order to assess technology trends and explore new approaches (like the key-escrow system), the President has directed government agencies to develop a comprehensive policy on encryption that accommodates: -- the privacy of our citizens, including the need to employ voice or data encryption for business purposes; -- the ability of authorized officials to access telephone calls and data, under proper court or other legal order, when necessary to protect our citizens; -- the effective and timely use of the most modern technology to build the National Information Infrastructure needed to promote economic growth and the competitiveness of American industry in the global marketplace; and -- the need of U.S. companies to manufacture and export high technology products. The President has directed early and frequent consultations with affected industries, the Congress and groups that advocate the privacy rights of individuals as policy options are developed. The Administration is committed to working with the private sector to spur the development of a National Information Infrastructure which will use new telecommunications and computer technologies to give Americans unprecedented access to information. This infrastructure of high-speed networks ("information superhighways") will transmit video, images, HDTV programming, and huge data files as easily as today's telephone system transmits voice. Since encryption technology will play an increasingly important role in that infrastructure, the Federal Government must act quickly to develop consistent, comprehensive policies regarding its use. The Administration is committed to policies that protect all Americans' right to privacy while also protecting them from those who break the law. Further information is provided in an accompanying fact sheet. The provisions of the President's directive to acquire the new encryption technology are also available. For additional details, call Mat Heyman, National Institute of Standards and Technology, (301) 975-2758. --------------------------------- QUESTIONS AND ANSWERS ABOUT THE CLINTON ADMINISTRATION'S TELECOMMUNICATIONS INITIATIVE Q: Does this approach expand the authority of government agencies to listen in on phone conversations? A: No. "Clipper Chip" technology provides law enforcement with no new authorities to access the content of the private conversations of Americans. Q: Suppose a law enforcement agency is conducting a wiretap on a drug smuggling ring and intercepts a conversation encrypted using the device. What would they have to do to decipher the message? A: They would have to obtain legal authorization, normally a court order, to do the wiretap in the first place. They would then present documentation of this authorization to the two entities responsible for safeguarding the keys and obtain the keys for the device being used by the drug smugglers. The key is split into two parts, which are stored separately in order to ensure the security of the key escrow system. Q: Who will run the key-escrow data banks? A: The two key-escrow data banks will be run by two independent entities. At this point, the Department of Justice and the Administration have yet to determine which agencies will oversee the key-escrow data banks. Q: How strong is the security in the device? How can I be sure how strong the security is? A: This system is more secure than many other voice encryption systems readily available today. While the algorithm will remain classified to protect the security of the key escrow system, we are willing to invite an independent panel of cryptography experts to evaluate the algorithm to assure all potential users that there are no unrecognized vulnerabilities. Q: Whose decision was it to propose this product? A: The National Security Council, the Justice Department, the Commerce Department, and other key agencies were involved in this decision. This approach has been endorsed by the President, the Vice President, and appropriate Cabinet officials. Q: Who was consulted? The Congress? Industry? A: We have on-going discussions with Congress and industry on encryption issues, and expect those discussions to intensify as we carry out our review of encryption policy. We have briefed members of Congress and industry leaders on the decisions related to this initiative. Q: Will the government provide the hardware to manufacturers? A: The government designed and developed the key access encryption microcircuits, but it is not providing the microcircuits to product manufacturers. Product manufacturers can acquire the microcircuits from the chip manufacturer that produces them. Q: Who provides the "Clipper Chip"? A: Mykotronx programs it at their facility in Torrance, California, and will sell the chip to encryption device manufacturers. The programming function could be licensed to other vendors in the future. Q: How do I buy one of these encryption devices? A: We expect several manufacturers to consider incorporating the "Clipper Chip" into their devices. Q: If the Administration were unable to find a technological solution like the one proposed, would the Administration be willing to use legal remedies to restrict access to more powerful encryption devices? A: This is a fundamental policy question which will be considered during the broad policy review. The key escrow mechanism will provide Americans with an encryption product that is more secure, more convenient, and less expensive than others readily available today, but it is just one piece of what must be the comprehensive approach to encryption technology, which the Administration is developing. The Administration is not saying, "since encryption threatens the public safety and effective law enforcement, we will prohibit it outright" (as some countries have effectively done); nor is the U.S. saying that "every American, as a matter of right, is entitled to an unbreakable commercial encryption product." There is a false "tension" created in the assessment that this issue is an "either-or" proposition. Rather, both concerns can be, and in fact are, harmoniously balanced through a reasoned, balanced approach such as is proposed with the "Clipper Chip" and similar encryption techniques. Q: What does this decision indicate about how the Clinton Administration's policy toward encryption will differ from that of the Bush Administration? A: It indicates that we understand the importance of encryption technology in telecommunications and computing and are committed to working with industry and public-interest groups to find innovative ways to protect Americans' privacy, help businesses to compete, and ensure that law enforcement agencies have the tools they need to fight crime and terrorism. Q: Will the devices be exportable? Will other devices that use the government hardware? A: Voice encryption devices are subject to export control requirements. Case-by-case review for each export is required to ensure appropriate use of these devices. The same is true for other encryption devices. One of the attractions of this technology is the protection it can give to U.S. companies operating at home and abroad. With this in mind, we expect export licenses will be granted on a case-by-case basis for U.S. companies seeking to use these devices to secure their own communications abroad. We plan to review the possibility of permitting wider exportability of these products. |~~ END --- HINTERLAND WHO'S WHO - 800 EXCHANGES Lister Exchanges - 800 Service 0 1 2 3 4 5 6 7 8 9 +------+------+------+------+------+------+------+------+------+------+ 20| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 21| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 22| ---- | AT&T | AT&T | AT&T | LDL | AT&T | MIC | AT&T | AT&T | C&W | 23| NTK | AT&T | AT&T | AT&T | MCI | AT&T | SCH | AT&T | AT&T |Delta | 24| SIR | AT&T | AT&T | AT&T | ---- | AT&T | ---- | AT&T | AT&T | ---- | 25| ---- | AT&T | AT&T | AT&T | TTU | AT&T | LSI | AT&T | AT&T | ---- | 26| ---- | SCH | AT&T |CanCO | ICT |CanSWO| COM |CanEO |CanTor| FDG | 27| ---- | ---- | AT&T | ---- | MCI | ITT | ONE | SNT | ---- | MAL | 28| ADG | ---- | AT&T | MCI | MCI | ---- | ---- | ---- | MCI | MCI | 29| ---- | ---- | AT&T | PRO | ---- | ---- | ---- | ARE | ---- | CDC | 30| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 31| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 32| ---- | AT&T | AT&T | AT&T | HNI | AT&T |Sprint| AT&T | AT&T | TET | 33| TET | AT&T | AT&T | MCI | AT&T | SCH | AT&T | FST | AT&T | ---- | 34| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T |Sprint| AT&T | DCT | 35| COM | AT&T | AT&T | ---- | AT&T | ---- | AT&T | ---- | AT&T |Sprint| 36| ---- |CanMtl| AT&T |CanMtl| HNI | MCI |Sprint| AT&T | AT&T |Teleco| 37|Teleco| ---- | AT&T |Teleco| ---- |ATCCig| ---- |Telnet| ---- | ---- | 38| ---- | ---- | AT&T |Teleco| FDT |Hedges| TBQ |CanTor| MCI | ---- | 39| ---- | ---- | AT&T | EXF | ---- | MCI | ---- |Teleco| ---- |Americ| 40| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 41| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 42| ---- | AT&T | AT&T | AT&T | AT&T | TTH | AT&T | ---- | AT&T | ---- | 43| ---- | AT&T | AT&T | AT&T | AGN | AT&T | IDN | AT&T | AT&T | ---- | 44| TXN | AT&T | AT&T | AT&T | MCI | AT&T | AT&T | AT&T | AT&T | ---- | 45| USL | AT&T | AT&T | AT&T | ALN | ---- | MCI | AT&T | AT&T | ---- | 46| ---- |CanNCO| AT&T |CanEQu| ---- |CanNWO| ALN | ICT | AT&T | ---- | 47| ---- | ALN | AT&T |Sprint| ---- |Teleco|Teleco| MCI |Alascm| ---- | 48| ---- | ---- | AT&T | ---- |Teleco|Teleco| C&W |Sprint|Sprint| TOM | 49| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- | 50| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 51| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 52| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T |Midco | 53| ---- | AT&T | AT&T | AT&T | ---- | AT&T | ALN | AT&T | AT&T | ---- | 54| ---- | AT&T | AT&T | AT&T | AT&T | AT&T |Sprint| AT&T | AT&T | ---- | 55| CMA | AT&T | AT&T | AT&T | AT&T |[Diry]| AT&T | ALN | AT&T | ---- | 56| ---- |CanNB | AT&T |CanNfl| ---- |CanNSP| ALN |CanWQu| ---- | ---- | 57| ---- | ---- | AT&T | ---- | AMM | ---- | ---- |Telnet| ---- | LNS | 58| WES | ---- | AT&T |Teleco|Teleco| ---- |Action| LTQ |Action| LGT | 59| ---- | ---- | AT&T |Teleco|Teleco| ---- | ---- | ---- | ---- | ---- | 60| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 61| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 62| ---- | AT&T | AT&T | ---- | AT&T | NLD | AT&T | MCI | AT&T | ---- | 63| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | CQU | AT&T | AT&T | BUR | 64| ---- | AT&T | AT&T | AT&T | CMA | AT&T | ---- | AT&T | AT&T | ---- | 65| ---- | ---- | AT&T | ---- | AT&T | ---- | ---- |Teleco|Teleco| ---- | 66| ---- |CanAlb| AT&T |CanBC |Sprint|CanMan| MCI |CanSsk|CanTor|Sprint| 67| ---- | ---- | AT&T |Teleco|Teleco| ---- |Sprint| MCI | MCI | ---- | 68| ---- | ---- | AT&T | MTD | ---- | ---- | LGT | NTS | MCI | ---- | 69| ---- | ---- | AT&T | ---- | ---- | MCI | ---- | ---- | NYC | PLG | 70| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 71| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 72| TGN | ---- | AT&T | ---- | RCI | SAN |Sprint| MCI |Teleco|Sprint| 73| ---- | ---- | AT&T |Sprint| ---- |Sprint|Sprint| MEC | MEC | ---- | 74| ---- | MIC | AT&T | EDS | ---- |Sprint| ---- |Teleco|Teleco|Teleco| 75| ---- | ---- | AT&T | MCI | TSH | SPR | ---- | TID | ---- | MCI | 76| ---- | ---- | AT&T | ---- |Alascm| MCI | MCI |Sprint| SNT | ---- | 77| GCN | SNT | AT&T | CTI | ---- | ---- |Sprint| MCI |Sprint|Teleco| 78|Teleco| ---- | AT&T | ALN |Allnet| SNH |(Futu)| ---- | ---- | TMU | 79| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | TID |Teleco| ---- | 80|Sprint| ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 81| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 82| ---- | AT&T | AT&T | THA | AT&T | MCI | AT&T |Sprint| AT&T |Sprint| 83| ---- | AT&T | AT&T | AT&T | ---- | AT&T |Teleco|Teleco| ---- | Star | 84| ---- | AT&T | AT&T | AT&T | LDD | AT&T | ---- | AT&T | AT&T | ---- | 85| TKC | AT&T | AT&T | ---- | AT&T | AT&T | ---- | TLS | AT&T | ---- | 86| ---- | ---- | AT&T | ALN | TEN | ---- | MCI | ---- | SNT |Sprint| 87| ---- | ---- | AT&T | MCI | AT&T | ALN | MCI |Sprint| ALN | MCI | 88| NAS | NAS | AT&T | ---- |Sprint| AT&T | ALN | ETS | MCI | ---- | 89| ---- | ---- | AT&T | ---- | ---- | ---- | TXN | ---- | CGI | C&W | 90| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 91| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- | 92| ---- | ---- | AT&T | ALN | ---- | ---- | MCI |Sprint| CIS | ---- | 93| ---- | ---- | AT&T | MCI | ---- | ---- |R-Comm| MCI | ---- | ---- | 94| TSF | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- | 95| MCI |PhAmer| AT&T | ---- | ---- | MCI | ---- | ---- |[T-??]|[T-??]| 96| CNO | ---- | AT&T | SOC | ---- | ---- | C&W | ---- | TED | C&W | 97| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- | 98| ---- | ---- | AT&T | WUT | ---- | ---- | WUT | ---- | WUT | C&W | 99| ---- | ---- | AT&T | ---- | ---- | ---- | Valu | ---- | ---- | MCI | +------+------+------+------+------+------+------+------+------+------+ 0 1 2 3 4 5 6 7 8 9 Exchanges - 800 Service - Appendix Abbreviations of carriers/regions used in the table: Action - Action Telecom Co. ADG - Advantage Network, Inc. AGN - AMRIGON Alascm - ALASCOM Allnet - Allnet Communication Services Americ - AmeriCall Corporation (Calif.) AMM - Access Long Distance ARE - American Express TRS AT&T - AT&T ATCCig - ATC Cignal Communications BUR - Burlington Tel. C&W - Cable & Wireless Comm. CanAlb - Telecom Canada/Alberta (403) CanBC - Telecom Canada/British Columbia (604) CanCO - Telecom Canada/Central Ontario (416) CanEO - Telecom Canada/Eastern Ontario (613) CanEQu - Telecom Canada/Eastern Quebec (418) CanMan - Telecom Canada/Manitoba (204) CanMtl - Telecom Canada/Montreal Area (514) CanNB - Telecom Canada/New Brunswick (506) CanNfl - Telecom Canada/Newfoundland (709) CanNCO - Telecom Canada/North Central Ontario (705) CanNSP - Telecom Canada/Nova Scotia, PEI (902) CanNWO - Telecom Canada/NW Ontario (807) CanSsk - Telecom Canada/Saskatchewan (306) CanSWO - Telecom Canada/SW Ontario (519) CanTor - Telecom Canada/Toronto Area (416) CanWQu - Telecom Canada/Western Quebec (819) CDC - ClayDesta Communications CNO - COMTEL of New Orleans COM - COM Systems CQU - ConQuest Comm. Corp CTI - Compu-Tel Inc. DCT - Direct Communications, Inc. Delta - Delta Communications, Inc. EDS - Electronic Data Systems Corp. ETS - Eastern Telephone Systems, Inc. EXF - Execulines of Florida, Inc. FDG - First Digital Network FDN - Florida Digital Network FDT - Friend Technologies FST - First Data Resources GCN - General Communications, Inc. Hedges - Hedges Communications HNI - Houston Network, Inc. ITT - United States Transmission System LDD - LDDS-II, Inc. LDL - Long Distance for Less LGT - LITEL LNS - Lintel Systems LSI - Long Distance Savers LTQ - Long Distance for Less MAL - MIDAMERICAN MCI - MCI Telecommunications Corp. MDE - Meade Associates MEC - Mercury, Inc. MIC - Microtel, Inc. Midco - Midco Communications MTD - Metromedia Long Distance NLD - National Data Corp. NTK - Network Telemanagement Svcs. NTS - NTS Communications ONC - OMNICALL, Inc. ONE - One Call Communications, Inc. PhAmer - Phone America PHE - Phone Mail, Inc. PLG - Pilgrim Telephone Co. PRO - PROTO-COL R-Comm - R-Comm RCI - RCI Corporation SAN - Satelco SCH - Schneider Communications SIR - Southern Interexchange Services SLS - Southland Systems, Inc. SNH - Sunshine Telephone Co. SNT - SouthernNet, Inc. SOC - State of California Sprint - U.S. Telcom, Inc. (U.S. Sprint) Star - STAR-LINE TBQ - Telecable Corp. TED - TeleDial America Teleco - Teleconnect Telnet - Telenet Comm. Corp. TEN - Telesphere Network, Inc. TET - Teltec Savings Communications Co. TGN - Telemanagement Consult't Corp. THA - Touch America TID - TMC South Central Indiana TKC - TK Communications, Inc. TLS - TELE-SAV TMU - Tel-America, Inc. TOM - TMC of Montgomery TSF - SOUTH-TEL TSH - Tel-Share TTH - Tele Tech, Inc. TTU - Total-Tel USA TXN - Tex-Net USL - U.S. Link Long Distance Valu - Valu-Line WES - Westel WUT - Western Union Telegraph Co. Other abbreviations (Futu) - for future assignment (Pagr) - reserved for radio paging [Diry] - Directory Assistance Exchange [T-??] - reserved for testing Notes on 800 ------------ Where local telcos, such as Illinois Bell offer 800 service, they purchase blocks of numbers from AT&T on prefixes assigned to AT&T. They are free to purchase blocks of numbers from any carrier of their choice however. Often, exchanges of the form NN2 are used internally within an area code or region, such as 552 or 772 in Saskatchewan, or for intra-state use. Specific intra-state or intra-provincial uses are not mentioned in this document. The information was updated according to carriers accessible from Canada. As far as can be determined, only the AT&T, MCI and Sprint 800 services are accessible from Canada at present. However, 337 (assigned to First Data Resources) seems to be connected to MCI. This could be due to the purchase of some companies; the prefixes would then be assumed by the buyer. N0X/N1X prefixes for 800 service are starting to appear. The first widely known one is 800 used by Sprint (as in 1 800 800 xxxx). This is the only N(0/1)X prefix for 800 to be accessible from Canada at present. --- POETRY CORNER The Grappler - Essence With the unquenchable thirst of an ocean Death drinks of lifetimes in a flinch I am but a cups worth of this As meaningless as a glass of water To know this is the mortal cross we all must bear. (C)1993 The Grappler My Teddy Bear Without my teddy bear, I cannot sleep. I cannot breathe, or concentrate. I cannot set my mind out straight, but my teddy bear doesn't miss me. Without my teddy bear, I cannot feel. I play a game, I act in haste, romantic thoughts are put to waste, but my teddy bear doesn't miss me. Without my teddy bear, I cannot see. It's all pitch black, and in the day, without a map, i've lost my way, but my teddy bear doesn't miss me. Without my teddy bear, I cannot smell. There's no purfume, no sweet soft skin, No hugs to be supported in, but my teddy bear doesn't miss me. Without my teddy bear, I cannot taste. I cannot taste her loving kiss, the interweaved celestial bliss, but my teddy bear doesn't miss me. My teddy bear, come back to me. It sickens me to think you might, alone and lost, be filled with fright, and maybe, you might miss me. (C)1993 Essence Victim Like ice, her cold heart controls her warm hands. Inticing me to join her, Inviting me to touch her, She melts my heart but inside she is cruel. My face her hands carressing, My body, hers is blessing. Intense her hatred runs right through her blood. Her passion makes her sexy, Her warm lips make her sexy. I enter her, and let my heart breathe fire. My fire, and love exhausted, yet she has just molested, Another Victim. (C)1993 Essence --- OFFICIAL [CiSSD] BAD-ASS BELLCORE GLOSSARY Lister The following I picked up in my travels on the Internet. I rarely find a COMPREHENSIVE glossary like this one. Although it is intended for Bellcore employees, it has obvious uses for social engineering; or just for reference. All in all, it makes and interesting read and I hope you benefit out of it.. A & B LEADS Designation of leads derived from the midpoints of the two pairs comprising a 4-wire circuit. ABBREVIATED DIALING Preprogramming of a caller's phone system or long distance company's switch to recognize a 2- to 4-digit number as an abbreviation for a frequently dialed phone number, and automatically dial the whole number. Synonym: Speed Dialing. ACCESS CHARGE Monies collected by local phone companies for use of their circuits to originate and terminate long distance calls. Can be per minute fees levied on long distance companies, Subscriber Line Charges (SLCs) levied directly on regular local lines, fixed monthly fees for special telco circuits (ie. WAL, DAL,T-1), or Special Access Surcharge (SAS) on special access circuits. ACCESS LINE A telephone circuit which connects a customer location to a network switching center. AIRLINE MILEAGE Calculated point-to-point mileage between terminal facilities. ALL TRUNKS BUSY (ATB) A single tone interrupted at a 120 ipm (impulses per minute) rate to indicate all lines or trunks in a routing group are busy. ALTERNATE ROUTE A secondary communications path used to reach a destination if the primary path is unavailable. ALTERNATE USE The ability to switch communications facilities from one type to another, i.e., voice to data, etc. ALTERNATE VOICE DATA (AVD) A single transmission facility which can be used for either voice or data. ANALOG SIGNAL A signal in the form of a continuous varying physical quantity, e.g., voltage which reflects variations in some quantity, e.g., loudness in the human voice. ANNUNCIATOR An audible intercept device that states the condition or restrictions associated with circuits or procedures. ANSWER BACK An electrical and/or visual indication to the calling or sending end that the called or received station is on the line. ANSWER SUPERVISION An electrical signal fed back up the line by the local telephone company at the distant end of a long distance call to indicate positively the call has been answered by the called party. Tells billing equipment to start timing the call. AREA CODE A three digit number identifying more than 150 geographic areas of the United States and Canada which permits direct distance dialing on the telephone system. A similar global numbering plan has been established for international subscriber dialing. Synonym: Numbering Plan Area (NPA). ATTENDANT POSITION A telephone switchboard operator's position. It provides either automatic (cordless) or manual (plug and jack) operator controls for incoming and/or outgoing telephone calls. ATTENTUATION A general term used to denote the decrease in power between that transmitted and that received due to loss through equipment, lines, or other transmission devices. It is usually expressed as a ratio in dB (decibel). AUDIBLE RINGING TONE An audible signal heard by the calling party during the ringing-interval. AUTHORIZATION CODE A 5- to 14-digit number entered using a touch-tone phone to identify the caller as a customer of the long distance service. Used primarily before Equal Access as a way to verify the caller as a customer and bill calls. AUTO ANSWER A machine feature that allows a transmission control unit or station to automatically respond to a call that it receives. AUTOMATIC CALL DISTRIBUTOR (ACD) A switching system designed to queue and/or distribute a large volume of incoming calls to a group of attendants to the next available "answering" position. AUTOMATIC DIALING UNIT A device which is programmed with frequently called numbers. The caller presses one to three digits and the preprogrammed number is automatically dialed into the phone circuit. AUTOMATIC IDENTIFICATION OF OUTWARD DIALING (AIOD) The ability of some centrex units to provide an itemized breakdown of charges (including individual charges for toll calls) for calls made by each telephone extension. AUTOMATIC NUMBER IDENTIFICATION (ANI) On long distance calls, the process by which the local phone company passes a caller's local billing phone number to his/her long distance company when a "1+" or "10-XXX" call is made. With ANI a caller's long distance carrier knows who (what phone number) to bill without requiring the caller to enter any extra digits to be identified. AUTOMATIC ROUTE SELECTION (ARS) Synonym: Least Cost Routing BAND (1) The range of frequencies between two defined limits. (2) In reference to WATS, one of the five specific geographic areas as defined by the carrier. Synonym: Bandwidth. BANDWIDTH see BAND. BASEBAND The total frequency band occupied by the aggregate of all the voice and data signals used to modulate a radio carrier. BAUD A unit of signaling speed. The speed in Baud is the number of discrete conditions or signal elements per second. If each signal event represents only one bit condition, then Baud is the same as bits per second. Baud does not equal bits per second. BLOCKED CALLS Attempted calls that are not connected because (1) all lines to the central offices are in use; or (2) all connecting paths through the PBX/switch are in use. BREAK A means of interrupting transmission, a momentary interruption of a circuit. BREAKEVEN POINT Level of usage at which the total cost of a service with a high fixed up-front monthly fee but low minute costs becomes equal to the total cost of another service with low (or zero) monthly fee but relatively high per minute cost. At usage levels higher than breakeven, the service with the high monthly fee is cheaper. BROADBAND A transmission facility having a bandwidth of greater than 20 kHz. BUS A heavy conductor, or group of conductors, to which several units of the same type of equipment may be connected. BUSY The condition in which facilities over which a call is to be transmitted are already in use. BUSY HOUR The time of day when phone lines are most in demand. BUSY TONE A single tone that is interrupted at 60 ipm (impulses per minute) to indicate that the terminal point of a call is already in use. BYPASS The direct connection to customer-premises equipment by an IC. This occurs when an IC connects its own facilities (or facilities leased from a non-BOC entity) directly to an end user's premises, circumventing the use of the BOC network.. CARRIER A long distance company which uses primarily its own transmission facilities, as opposed to resellers which lease or buy most or all transmission facilities from carriers. Many people refer to any type of long distance company, whether it has its own network or not, as a carrier, so the term is not as restrictive as it used to be. CARRIER ACCESS CODE (CAC) The sequence an end user dials to obtain access to the switched services of a carrier. Carrier Access Codes for Feature Group D are composed of five digits, in the form 10XXX, where XXX is the Carrier Identification Code. CARRIER COMMON LINE CHARGE (CCLC) A per minute charge paid by long distance companies to local phone companies for the use of local public switched networks at either or both ends of a long distance call. This charge goes to pay part of the cost of telephone poles, wires, etc. CARRIER IDENTIFICATION CODE (CIC) The three-digit number that uniquely identifies a carrier. The Carrier Identification Code is indicated by XXX in the Carrier Access Code. The same code applies to an individual carrier throughout the area served by the North American Numbering Plan. CARRIER SYSTEM A system for providing several communications channels over a single path. CELLULAR MOBILE RADIO A high capacity land mobile radio system in which an assigned frequency spectrum is divided into discrete channels that are assigned to a cellular geographic serving area. CENTRAL OFFICE (CO) With local telephone companies, the nearby building containing the local telco switch which provides local telephone service. Also the physical point where calls enter the long distance network. Sometimes referred to as Class 5 office, end office, or Local Dial Office. CENTREX, CO PBX Service provided by a switch located at the telephone company central office. CENTREX, CU A variation on Centrex CO provided by a telephone company maintained "Central Office" type switch located at the customer's premises. CHANNEL A communications path via a carrier or microwave radio. CIRCUIT A path for the transmission of electromagnetic signals to include all conditioning and signaling equipment. Synonym: Facility. CIRCUIT SWITCHING A switching system that completes a dedicated transmission path from sender to receiver at the time of transmission. CISSD An elite group of hackers and phreakers with the skills to bring the h/p scene into the 21st century. Unlike other more conventional groups, CiSSD holds revolutionary and new ideas that bing a fresh new perspective the the h/p community. Synonym: HeLL Inc. CLASS OF SERVICE/CLASS MARK (COS) A subgrouping of telephone customers or users for the sake of rate distinction or limitation of service. COAXIAL CABLE A cable with a solid outer shield, a space and then a solid inner conductor. The electromagnetic wave travels between the outer shield and the conductor. It can carry a much higher band width than a wire pair. CODEC Coder-Decoder. Used to convert analog signals to digital form for transmission over a digital median and back again to the original analog form. COMMON CARRIER A government regulated private company that provides the general public with telecommunications services and facilities. COMMON CHANNEL INTEROFFICE SIGNALING (CCIS) A digital technology used by AT&T to enhance their Integrated Services Digital Network. It uses a separate data line to route interoffice signals to provide faster call set-up and more efficient use of trunks. COMMON CONTROL SWITCHING ARRANGEMENT (CCSA) The use of carrier switches under a carrier's control as part of a customer's private network. The carrier's software controls and switches the customer's calls over private lines the customer has rented. Control of the switch and switching functions is done in common for all users using the software and switching system. CONDITIONING EQUIPMENT Equipment modifications or adjustments necessary to match transmission levels and impedances and which equalize transmission and delay to bring circuit losses, levels, and distortion within established standards. CONFIGURATION The combination of long-distance services and/or equipment that make up a communications system. CONTROL UNIT (CU) The central processor of a telephone switching device. COST COMPONENT The price of each type of long distance service and/or equipment that constitutes a configuration. CROSS CONNECTION The wire connections running between terminals on the two sides of a distribution frame, or between binding posts in a terminal. CROSS TALK The unwanted energy (speech or tone) transferred from one circuit to another circuit. CUSTOMER ACCESS LINE CHARGE (CALC) The FCC-imposed monthly surcharge added to all local lines to recover a portion of the cost of telephone poles, wires, etc., from end users. Before deregulation, a large part of these costs were financed by long distance users in the form of higher charges. CUSTOMER OWNED AND MAINTAINED (COAM) Customer provided communications apparatus and associated wiring. CUSTOMER PREMISE EQUIPMENT (CPE) Telephone equipment, usually including wiring located within the customer's part of a building. CUT To transfer a service from one facility to another. CUT THROUGH The establishment of a complete path for signaling and/or audio communications. DATA SET A device which converts data into signals suitable for transmission over communications lines. DATA TERMINAL A station in a system capable of sending and/or receiving data signals. DECIBEL (dB) A unit measurement represented as a ratio of two voltages, currents or powers and is used to measure transmission loss or gain. DEDICATED ACCESS LINE (DAL) An analog special access line going from a caller's own equipment directly to a long distance company's switch or POP. Usually provided by a local telephone company. The line may go through the local telco Central Office, but the local telco does not switch calls on this line. DELAY DIAL A dialing configuration whereby local dial equipment will wait until it receives the entire telephone number before seizing a circuit to transmit the call. DELTA MODULATION (DM) A variant of pulse code modulation whereby a code representing the difference between the amplitude of a sample and the amplitude of the previous one is sent. Operates well in the presence of noise, but requires a wide frequency band. DEMODULATION The process of retrieving data from a modulated signal. DIAL LEVEL The selection of stations or services associated with a PBX using a one to four digit code (e.g., dialing 9 for access to outside dial tone). DIAL PULSING The transmitting of telephone address signals by momentarily opening a DC circuit a number of times corresponding to the decimal digit which is dialed. DIAL REPEATING TIE LINE/DIAL REPEATING TIE TRUNK A tie line arrangement which permits direct trunk to trunk connections without use of the attendant. DIAL SELECTIVE SIGNALING A multipoint network in which the called party is selected by a prearranged dialing code. DIAL TONE A tone indicating that automatic switching equipment is ready to receive dial signals. DIALING PLAN A description of the dialing arrangements for customer use on a network. DIRECT DISTANCE DIALING (DDD) A basic toll service that permits customers to dial their own long distance call without the aid of an operator. DIRECT INWARD DIALING (DID) A PBX or CENTREX feature that allows a customer outside the system to directly dial a station within the system. DIRECT OUTWARD DIALING A PBX or CENTREX feature that allows a station user to gain direct access to an exchange network. DROP The portion of outside telephone plant which extends from the telephone distribution cable to the subscriber's premises. DRY CIRCUIT A circuit which transmits voice signals and carries no direct current. DUAL TONE MULTI-FREQUENCY (DTMF) Also known as Touch-Tone. A type of signaling which emits two distinct frequencies for each indicated digit. DUPLEX Simultaneous two-way independent transmission. DUPLEX SIGNALING A long-range bidirectional signaling method using paths derived from transmission cable pairs. It is based on a balanced and symmetrical circuit that is identical at both ends. This circuit presents an E&M lead interface to connecting circuits. ECHO A signal that has been reflected or otherwise returned with sufficient magnitude and delay to be perceived by the speaker. ECHO RETURN LOSS (ERL) The loss which must be in the echo path to reduce echo to a tolerable amount. ECHO SUPPRESSOR A device which detects speech signals transmitted in either direction on a four-wire circuit, and introduces loss in the direction of transmission. EITHER END HOP OFF (EEHO) In private networks, a switch program that allows a call destined for an off-net location to be placed into the public network at either the closest switch to the origination or to the destination. The choice is usually by time of day. Uses either Head End Hop Off or Tail End Hop Off. ELECTRONIC KEY TELEPHONE SETS (EKTS) A generic term indicating key telephones with built-in microprocessors which allow access to PBX-like features as well as access to multiple CO lines, using 2 to 4 pair wiring. ELECTRONIC SWITCH Modern programmable switch (often denoted ESS, for Electronic Switching System) used in most BOC telephone companies, many independent telephone companies, and by virtually all new long distance companies. Completely solid state electronics, as opposed to older electro-mechanical switches. ELECTRONIC SWITCHING SYSTEM (ESS) Used as a station instrument on a PBX. Also a Bell System term for electronic exchange switching equipment. ELECTRONIC TANDEM NETWORK (ETN) (1) A private network automatically and electronically connecting the calling office to the called office through Tandem-Tie Trunks. The network switches also function as PBXs. (2) An AT&T product name. (3) Used as a generic term for a PBX base network. ENHANCED PRIVATE SWITCHED COMMUNICATIONS SERVICE (EPSCS) A private network utilizing Bell provided equipment located in the central office and dedicated to a specific customer. E&M LEADS A pair of leads which carry signals between trunk equipment and separate signaling equipment unit. The M lead transmits battery or ground signals to the signaling equipment, and the E lead receives open or ground signals from the signaling equipment. E&M SIGNALING An arrangement whereby signaling between a trunk circuit and an associated signaling unit is effected over two leads providing full-time, 2-way, 2-level supervision. ENTERPRISE NUMBER A unique telephone exchange number that permits the called party to be automatically billed for incoming calls. EQUAL ACCESS Reprogramming of Local Exchange Company (LEC) switches to allow other long distance companies besides AT&T to be the "1+" primary long distance company for users of long distance (by creating a new type of Feature Group access circuit, FGD). Also provides "10-XXX" dialing for secondary and casual calling, generates true hardware Answer Supervision when calls are terminated over FGD circuits, and provides ANI (Automatic Number Identification) on originating calls. EQUALIZATION The procedure of compensating for fluctuation in circuit amplitude, delay, or distortion. ERLANG A unit of traffic intensity. One Erlang is the intensity at which one traffic path would be continuously occupied, e.g. one call per hour. ERLANG B TABLE A widely used table derived from a mathematical formula which allows the determination of the traffic capacity of a given group of circuits. EXCHANGE A telephone switching center. EXCHANGE NETWORK FACILITIES FOR INTERSTATE ACCESS (ENFIA) AT&T's pricing arrangement for local loops offered to OCCs for connecting the OCC's network to the local telephone company's central office. EXTENDED AREA SERVICE (EAS) Adding expanded local calling areas to a caller's basic local calling area for a (generally) small additional monthly fee. The EAS local calls can be either free (after a small additional monthly fee is paid) or at a cost of reduced per call charges. FACILITIES Typically refers to transmission lines or circuits, or long distance services. A caller's facilities are the circuits available to make calls. FACSIMILE The transmission of pictures, maps or other documents via communications circuits using a device which scans the original document, transforms the image into coded signals and reproduces the original document at a distant point. FEATURE GROUP A Line-side originating and terminating LATA access for which an originating subscriber dials an assigned telephone number that connects to a specific IC. The IC returns a tone to signal the caller to input additional tone-generated digits of the called number. FEATURE GROUP B Trunk-side originating and terminating LATA access for which an originating subscriber dials a 950-WXXX number (where W=0,1 and XXX is the Carrier Access Code), which is translated to a specified XXX carrier trunk group. Optional rotary dial service and ANI may be available. FEATURE GROUP C Trunk-side LATA access for AT&T, generally, on a direct basis between each EO and an AT&T switching system. FEATURE GROUP D Also referred to as "Equal Access," Feature Group D is trunk-side LATA access affording call supervision to an IC, a uniform access code (10XXX), optional calling-party identification, recording of access-charge billing details, and presubscription to a customer-specified IC. FEDERAL COMMUNICATIONS COMMISSION (FCC) The government agency established by the Communications Act of 1934 which regulates the interstate communications industry. FIBER OPTICS High speed transmission using light to send images (in telecommunications: voice or data) through a flexible bundle of glass fibers. FOUR WIRE CIRCUITS Circuits which use two separate one-way transmission paths of two wires each, as opposed to regular local lines which usually only have two wires to carry conversations in both directions. One set of wires carries conversation in one direction, the other in the opposite direction. FREQUENCY The number of complete cycles per unit of time. FREQUENCY DIVISION MULTIPLEXING (FDM) The division of an available frequency range (bandwidth) into various subdivisions, each having enough bandwidth to carry one voice or data channel. FREQUENCY RESPONSE The reaction of frequencies to the circuit components. FULL DUPLEX A circuit which allows transmission of a message in both directions at the same time. Synonym: 4-wire. FULL PERIOD Relates to private line service, which is rented for the exclusive use of a single customer for an entire month. FX (FOREIGN EXCHANGE) SERVICE A service which allows a customer to appear to have a local presence in a distant part of town or, a different town altogether, by connecting his/her phone directly to a local business line in a part of town with a different exchange than his/her local calling area over a leased private line, or to a local telco in a distant town through long haul private lines purchased from a long distance carrier. GRADE OF SERVICE The probability of a call being blocked by busy trunks, expressed as a decimal fraction, and usually meaning the busy-hour probability. GROUP 12 circuits processed as a unit in a carrier system. HALF DUPLEX A circuit for transmitting or receiving signals in one direction at a time. HARDWIRE To wire or cable directly between units of equipment. HARMONIC The full multiple of a base frequency. HARMONIC DISTORTION The ratio, expressed in decibels, of the power at the fundamental frequency, to the power of a harmonic of that fundamental. HEAD END HOP OFF (HEHO) A method of traffic engineering whereby calls are completed by using long distance facilities directly off the switch that serves that location. HERTZ (Hz) International standard unit of frequency. Replaces, and is identical to, the order unit "Cycles-per-second." HOMING Returning to the starting position, as in a rotary stepping switch. HOOKSWITCH The device on which the telephone receiver hangs or on which a telephone handset hangs or rests when not in use. The weight of the receiver or handset operates a switch which opens the telephone circuit, leaving only the bell connected to the line. HOT-CUT Virtually instantaneous replacement of one line with another. HYBRID An electronic circuit which performs the wire conversions necessary for the connection of a local loop with a long- haul facility. INTERCEPT To stop a telephone call directed to an improper telephone number, and redirect that call to an operator or a recording. INTERCONNECT (1) The arrangement that permits the connection of customer's telecommunications equipment to a communications common carrier network. (2) The industry name for manufacturers, excluding the Bell system, which provide telephone equipment for the customer premises. INTER-EXCHANGE MILEAGE (IXC) The airline mileage between two cities. Synonym: Long Haul Mileage. INTEREXCHANGE PLANT The facilities between the subscriber switching center and another switching center. INTERFACE The junction or point of interconnection between two systems or equipment having different characteristics. INTERFERENCE Any unwanted noise or crosstalk on a communications circuit which acts to reduce the intelligibility of the desired signal or speech. INTER-MACHINE TRUNK (IMT) A circuit which connects two automatic switching centers. INTER-OFFICE TRUNK (IOT) A direct trunk between local exchange offices. INTERNATIONAL RECORD CARRIER (IRC) Carriers providing international telecommunications services, including voice, telex, and data communications. INTERSTATE Any connection made between two states. INTRASTATE Any connection made that remains within the boundaries of a single state. JITTER Short term instability of the amplitude and/or phase of a signal. Commonly called PHASE JITTER. KEYSET A telephone instrument having an appearance of two or more telephone lines which can be accessed by depressing a button (key) on the face of the set. KEY SYSTEM The equipment utilized to provide the features associated with key sets, including keysets, multipair cable, key service unit, distribution frames. LEASED LINES Any circuit or combination of circuits designated to be at the exclusive disposal of a given subscriber. Synonym: Private line; Full Period Line. LEAST COST ROUTING (LCR) A method of automatically selecting the least costly facility for transmission of a call. Synonym: Most Economical Route Selection (MERS); Automatic Route Selection; Flexible Route Selection. LEVEL An expression of the relative signal strength at a point in a communications circuit compared to a standard. LOADING A system for adding regularly spaced inductance units to a circuit to improve its transmission characteristics. LOCAL ACCESS AND TRANSPORT AREA (LATA) A geographic area (called "exchange" or "exchange area" in the MFJ) within each BOC's franchised area that has been established by a BOC in accordance with the provisions of the MFJ for the purpose of defining the territory within which a BOC may offer its telecommunications services. LOCAL AREA NETWORK (LAN) Intraoffice communication system usually used to provide data transmission in addition to voice transmission. LOCAL EXCHANGE CARRIER (LEC) A local telephone company, either one of the Bell Operating Companies or one of the 1400+ independent local telephone companies. LOCAL LOOP The local connection between the end user and the Class 5 central office. LONG HAUL Circuits spanning considerable distances. LOOP BACK A method of performing transmission tests on a circuit not requiring the assistance of personnel at the distant end. LOOP SIGNALING Any of the three signaling methods which use the metallic loop formed by the trunk conductors and the terminating equipment bridges. MAIN DISTRIBUTION FRAME (MDF) The point where outside plant cables terminate and from which they cross connect to terminal or central office line equipment. MAIN PBX A PBX directly connected to a tandem switch via an access trunk group. MANUAL TIE LINE A tie line which requires the assistance of an attendant at both ends of the circuit in order to complete a call. MASTER GROUP (MG) 240 circuits processed as a unit in a carrier system. MESSAGE TELEPHONE SERVICE (MTS) AT&T's tariffed pricing name for long distance telephone calls. MESSAGE UNIT (MU) A local toll rate calling plan which is time and distance sensitive. MICROWAVE (M/W) Radio transmission using very short lengths, corresponding to a frequency of 1,000 megahertz or greater. Synonym: Microwave Radio. MICROWAVE RADIO Synonym: Microwave. MODEM A device which modulates and demodulates signals on a carrier frequency and allows the interface of digital terminals with analog carrier systems. MODIFIED FINAL JUDGEMENT (MFJ) The agreement between the U.S. Department of Justice and AT&T governing the breakup of the pre-Divestiture Bell System into AT&T and 22 Bell Operating Companies and other entities. On August 26, 1982, U.S. District Court Judge Harold Greene accepted, with modifications, an AT&T/Justice Department settlement terminating the government's 1974 antitrust suit against AT&T. Judge Greene's decree did away with the provisions of the 1956 consent decree that had kept AT&T out of competitive, unregulated ventures. MODULATION Alterations in the characteristics of carrier waves. Usually impressed on the amplitude and/or the frequency. MONITORING DEVICE Records data on calls placed through a company's telephone system: number called, length of calls, calling location. MOST ECONOMICAL ROUTE SELECTION (MERS) Synonym: Least Cost Routing. MULTIPLEXING The act of combining a number of individual message circuits for transmission over a common path. Two methods are used: (1) frequency division, and (2) time division. NETWORK A collection of switches connected to one another by transmission facilities. NETWORK NUMBERING EXCHANGE (NXX) The three digit location code representing the central office. "N" may be any number between "2" and "9" and "X" may be any number. NETWORK TRUNKS Circuits connecting switching centers. NNX CODES The 3-digit code used historically for local Exchange Codes. "N" can be any number from 0 to 2, "X" can be any digit. The current numbering plan allows for more variation in assigning Exchange Codes, and under it Exchange Codes are commonly referred to as "NXXs." NODE A major switching center of a network. NON-BLOCKING A switching network having a sufficient number of paths such that a subscriber originating a call can always reach any other idle subscriber without encountering a busy. NUMBERING PLAN AREA (NPA) A geographical division within which no two telephones will have the same 7 digit number. "N" is any number between "2" and "9"; "P" is always "1" or "0"; and "A" is any number excluding "0". Commonly referred to as "area code." NXX CODES The current general configuration for Exchange Codes within each Area Code. See also: "NNX Codes" OFFERED TRAFFIC The number of call attempts in any specified period of time. OFF HOOK The condition which results when a telephone is lifted from its mounting, allowing the hookswitch to operate. OFF-NETWORK ACCESS LINE (ONAL) A local exchange (Feature Group access), Foreign Exchange, or WATS line connecting both incoming and outgoing traffic from a long distance company's network to the public switched network. Generally a circuit leased by a long distance carrier to be used by many customers not hooked directly into the long distance carrier's network. OFF NETWORK CALLING Telephone calls through a private switching system and transmission network which extend to the public telephone system. OFF PREMISES EXTENSION (OPX) An extension telephone or keyset that is geographically separated from its associated PBX. ON HOOK The condition which results when a telephone handset is placed on its mounting, which causes the hook-switch to open its contacts. ON NETWORK CALLING A term used to describe a call that originates and terminates on a private network. OPERATOR ASSISTED CALLS Non-DDD calls requiring manual intervention. ORIGINATING OFFICE The central office that serves the calling party. OTHER COMMON CARRIER (OCC) A long distance company other than AT&T having many of its own long distance circuits, either owned or leased. Some people use OCC to refer to all AT&T long distance competitors, including resellers, but this is not technically correct. OUT-OF-BAND Any frequency outside the band used for voice frequencies. OUT-OF-BAND SIGNALING Use of narrow band filters to place the voice signal on a carrier channel below 3,400 CPS, reserving the 3,400 - 3,700 CPS band for supervisory signals. OVERBUILD Adding radio capacity to a telecommunications network. OVERFLOW Switching equipment which operates when the traffic load exceeds the capacity of the regular equipment. PAD A non-adjustable resistance network used to insert transmission loss into a circuit. PHASE JITTER SEE Jitter POINT OF PRESENCE (POP) A physical location within a LATA at which an IC establishes itself for the purpose of obtaining LATA access and to which the BOC provides access services. POINT-TO-POINT A communications circuit between two terminations which does not connect with a public telephone system. PORT Entrance or access point to a computer, multiplexor device or network where signals may be supplied, extracted or observed. POSTAL TELEPHONE AND TELEPGRAPH (PTT) Foreign government agencies responsible for regulating communications. PRIMARY AREA A customer's local telphone calling area. PRIMARY INTEREXCHANGE CARRIER (PIC) The IC designated by a customer to provide inter-LATA service automatically without requiring the customer to dial an access code for that carrier. PRIMARY ROUTING POINT The switch designated as the control point for a longhaul telephone call. PRIVATE BRANCH EXCHANGE (PBX) A private phone system (switch) used by medium and large companies which is connected to the public telephone network (local telco) and performs a variety of in-house routing and switching. User usually dial "9" to get outside system to the local lines. PRIVATE LINE (PL) A full-time leased line directly connecting two points, used soley by purchaser. The most common form is a tie line connecting two pieces of a user's own phone equipment - flat rate billing, not usage sensitive. PRIVATE USE NETWORK Two or more private line channels contracted for by a customer and restricted for use by that customer only. PUBLIC SWITCHED NETWORK (PSN) The pre-Divestiture nationwide network maintained by AT&T and the independent telephone companies which provides nationwide, unrestricted telephone service. PUBLIC UTILITY COMMISION (PUC)/PUBLIC SERVICE COMMISSION (PSC) The state commissions regulating intrastate communications. PULSE CODE MODULATION (PCM) The form of modulation in which the information signals are sampled at regular intervals and a series of pulses in coded form are transmitted representing the amplitude of the information signal at that time. PULSE-LINK REPEATER Connects one E&M signaling circuit directly to another. PULSE MODULATION The modulation of a series of pulses which represents information - bearing signals. Typical methods involve modifying the amplitude (PAM), width or duration (PWM) or position (PPM). Pulse Code Modulation (PCM) is the most common modulation technique involved in telephone work. PUSH BUTTON DIALING Synonym: Dual Tone Multi-Frequency. QUEUE A temporary delay in providing service caused by the inability of the system provided to handle the number of messages or calls attempted. RADIO COMMON CARRIER (RCC) A communications common carrier that provides radio paging and mobile telephone services to the public. RATE CENTER A specified geographic location used by the telephone company to determine interchange mileage for rate determination purposes. REDUNDANCY Duplicate equipment that is provided to minimize the effect of failures or equipment breakdowns. REGENERATION The process of receiving distorted signal pulses and from them recreating new pulses at the correct repetition rate, pulse amplitude, and pulse width. RE-HOMING A major network change which involves moving customer services from one switching center to another and establishing the necessary trunking facilities to do so. REMOTE ACCESS The ability of transmission points to gain access to a computer which is at a different location. REPEATER An electronic device used to amplify signals which have become too weak. REPEATING COIL The telephone industry's term for a voice-frequency transformer. RESELLER A long distance company that purchases large amounts of transmission capacity or calls from other carriers and resells it to smaller users. RESTORATION The re-establishment of service by rerouting, substitution of component parts, or as otherwise determined. RETARD COIL A coil having a large inductance which retards sudden changes of the current flowing through its winding. RINGBACK TONE Synonym: Audible Ringing Tone. RINGDOWN A circuit or method of signaling where the incoming signal is actuated by alternating current over the circuit. ROUTE DIVERSITY Two (or more) private line channels (circuits) furnished partially or entirely over two physically separate routes. Serves to prevent total loss of service if one cable gets cut or goes out. ROUTE OPTIMIZATION Synonym: Least Cost Routing. ROTARY HUNT An arrangement which allows calls placed to seek out an idle circuit in a prearranged multi-circuit group and find the next open line to establish a through circuit. SATELLITE RELAY An active or passive repeater in geosynchronous orbit around the Earth which amplifies the signal it receives before transmitting it back to earth. SELECTIVE CALLING The ability of a transmitting station to specify by the use of assigned codes which of several stations is to receive a message. SERVICE AND EQUIPMENT RECORD A list of equipment billed to customer by type, quantity, monthly charge, location and billing dates. SF SIGNALING (SINGLE-FREQUENCY) A signaling system which uses a 2,600 Hz in-band signal on the voice path. The tone is on in the idle condition, pulsed for dialing, and off when the circuit is in use. SHORT HAUL Circuits designed for use over distances of 10-200 miles. SIGNALING The process of transferring information between two parts of a telephone network to control the establishment of communications between long distance carrier terminal points, and customer equipment required for voice grade dedicated circuits. SIGNALING CONVERTER A device with input and output signals that contain the same information but employ different electrical systems for transmitting that information. Used at the terminal of a trunk to convert the equipment signals to the system used on the trunk. Examples are: (1) ring down to SF, (2) E&M to SF. SIGNALING, IN-BAND A type of signaling using an AC signal (usually 2,600 Hz) within the normal voice band. This signal can be transmitted from end to end of a long voice circuit without an intermediate signaling equipment. Since the signaling is audible, the signaling equipment must be arranged for "tone on when idle" operation. SIGNAL TO NOISE RATIO Ratio of the signal power to the noise power in a specified bandwidth, usually expressed in db. SIMPLEX (SX) SIGNALING A signaling path over a dry talking circuit which uses the two sides of the circuit in parallel, derived by connecting the midpoints of repeating coils or retardation coils which are across the circuit. SINGLE SIDEBAND RADIO (SSB) A form of amplitude modulation of a radio signal in which only one of the two sidebands is transmitted. Either of the two sidebands may be transmitted, and the carrier may be transmitted, reduced or suppressed. SINGING A continued whistle or howl in an amplified telephone circuit. It occurs when the sum of the repeater gains exceeds the sum of the circuit losses. SOFTWARE DEFINED NETWORK (SDN) A switched long distance service for very large users with multiple locations. Instead of putting together their own network, large users can get special usage rates for calls made on regular long distance company switched long distance services. Synonym: Virtual Private Network. SPECIAL GRADE NETWORK TRUNK A trunk specially conditioned by providing amplitude and delay equilization for the purpose of handling special services such as medium-speed data (600 to 2400 BPS). SPECIALIZED COMMON CARRIER (SCC) Synonym: Other Common Carrier. SPEED NUMBER A one, three, or four digit number that replaces a seven or ten digit telephone number. These numbers are programmed into the switch in the carrier's office or in a PBX. STATION Any customer location on a network capable of sending or receiving messages or calls. STATION MESSAGE DETAIL RECORDING (SMDR) A computer generated report showing internal usage on a telephone system. Usually including extension number, trunk number used, phone number dialed, time of call, duration and operator involvement. STORE-AND-FORWARD A technique in which a message is received from the originator and held in storage until a circuit to the addressee becomes available. STORED PROGRAM CONTROL (SPC) A system whereby the instructions are placed in the memory of a commoncontrolled switching unit and to which it refers while processing a call for instructions regarding class marks, code conversions, routing, as well as for trouble analysis. SUPERGROUP (SG) 60 circuits processed as a unit in a carrier system. SUPERMASTERGROUP (SMG) 600 circuits processed as a unit in a carrier system. SUPERVISION Synonym: Answer Supervision. SUPERVISORY SIGNALS A signal, such as "on-hook" or "off-hook," which indicates whether a circuit or line is in use. SWITCH Equipment used to interconnect lines and trunks. SWITCHED ACCESS Connection between caller's phone system and switch of chosen long distance carrier when a regular long distance call using regular local lines is made. Also the connection between the switch of caller's long distance carrier in the distant city and the phone being called. SWITCH HOOK Synonym: Hookswitch. SWITCHING The operations involved in interconnecting circuits in order to establish communications. SWITCHING CENTER A location at which telephone traffic, either local or toll, is switched or connected from one circuit or line to another. SWITCHING OFFICE A telephone company office which contains a switch. T-1 24 voice channels digitized at 64,000 bps, combined into a single 1.544 Mbps digital stream (8,000 bps signaling), and carried over two pairs of regular copper telephone wires. Used primarily by telephone companies until 1983. Now used for dedicated local access to long distance facilities, long-haul private lines, and for regular local service. Today, most any 1.544 Mbps digital stream is called T-1, regardless of its makeup or what the transmission medium is. T-CARRIER A time-division, pulse-code modulation, voice carrier used on exchange cable to provide short-haul trunks. TAIL END HOP OFF (TEHO) In a private network, a call which is carried over flat rate facilities (Intermachine Trunks or IMT) to the closest switch node to the destination of the call, and then connected into the public network as a local call. TANDEM A switching arrangement in which the trunk from the calling office is connected to a trunk to the called office through an intermediate point. TANDEM SWITCHING SYSTEM Synonym: Tandem Tie Trunk Network. TANDEM TIE TRUNK NETWORK (TTTN) A serving arrangement which permits sequential connection of tie trunks between PBX/CENTREX locations by utilizing tandem operation. TANDEM TRUNKING Trunks which connect two or more switches together. TARIFF The published rates, regulations, and descriptions governing the provisions of communications service. TELCO Local telephone company. TELECOMMUNICATIONS The transmission of voice and/or data through a medium by means of electrical impulses and includes all aspects of transmitting information. TELEGRAPH A system employing the interruption of, or change in, the polarity of DC current signaling to convey coded information. TELEPHONE A device which converts acoustical (sound) energy into electrical energy for transmission to a distant point. TELETYPEWRITER A machine used to transmit and/or receive communications on printed page and/or tape. TERMINAL A point at which information can enter or leave a communications network. TERMINAL EQUIPMENT Devices, apparatus and their associated interfaces used to forward information to a local customer or distant terminal. TERMINATION (1) An item that is connected to the terminal of a circuit or equipment. (2) An impedance connected to the end of a circuit being tested. (3)The points on a switching network to which a trunk or line may be attached. TIE-LINE A private leased line linking two phones or phone systems directly. Can ring distant phone automatically when telephone is lifted from its mounting, or when a short code is dialed. TIME DIVISION MULTIPLEXING (TDM) Equipment which enables the transmitting of a number of signals over a single common path by transmitting them sequentially at different instants of time. TOLL CALL Any call to a point outside the local service area. TOLL CENTER A central office where operators (human or mechanical) are present to assist in completing incoming toll calls. TOLL OFFICE A center for the switching of toll calls. TOLL PLANT The facilities that connect toll offices throughout the country. TOLL RESTRICTION A restriction in outgoing trunks which counts the first three digits dialed and diverts calls to forbidden codes either to a busy tone, to the operator, or to a recorded announcement. TOUCH-TONE ADAPTOR A device that can be connected to a rotary dial telephone to allow for DTMF signaling. TRAFFIC Calls being sent and received over a communications network. TRAFFIC MEASUREMENT AND RECORDING SYSTEMS (TMRS) A computer generated report showing usage information of telephone systems. Usually this includes trunk utilization, outages, queueing time, and the need for additional common equipment. TRAFFIC SERVICE POSITION SYSTEM (TSPS) A toll switchboard position configured as a push button console. TRANSMISSION The electrical transfer of a signal, message or other form of data from one location to another without unacceptable loss of information content due to attenuation, distortion, or noise. TRANSMISSION LEVEL The level of power of a signal, normally 1,000 Hz, which should be measured at a particular reference point. TRANSMISSION SPEED Number of pulses or bits transmitted in a given period of time, usually expressed as Bits Per Second (BPS) or Words Per Minute (WPM). TRUNK A telephone circuit or path between two switches, at least one of which is usually a telephone company Central Office or switching center. Regular local CO circuits are called PBX trunks, because there is a switch at both ends of the circuit. TRUNK GROUP An arrangement of communications channels into an identical group. TRUNK TYPE (TT) Trunks that use the same type of equipment going to the same terminating location. TRUNK UTILIZATION REPORT (TUR) A computer printout detailing the traffic use of a trunk. TWO-WIRE CIRCUIT (1) A channel for transmitting data in one direction at a time. (2) A short distance channel using a single send/receive pathway, usually 2 copper wires, connecting a telephone to a switch. TELETYPEWRITER EXCHANGE SERVICE (TWX) A service whereby a customer's leased teletypewriter is connected to a "TWX" switchboard and from there connected over regular toll circuits to a teletypewriter of any U.S. customer who subscribes to a similar service. UNIFORM CALL DISTRIBUTOR (UCD) A device located at the telephone office or in a PABX which distributes incoming calls evenly among individuals. UNIFORM SERVICE ORDER CODE (USOC) The information in coded form for billing purposes by the local telephone company pertaining to information on service orders and service equipment records. VALUE-ADDED NETWORK SERVICE (VANS) A data transmission network which routes messages according to available paths, assures that the message will be received as it was sent, provides for user security, high speed transmission and conferencing among terminals. VIA NET LOSS (VNL) The lowest loss in dB at which a trunk facility can be operated considering limitations of echo, crosstalk, noise and singing. VOICE CONNECTING ARRANGEMENT An interface arrangement provided by the telephone company to accomodate the connections of non-carrier provided voice terminal equipment to the public switched telephone network. VOICE FREQUENCY (VF) Any of the frequencies in the band 300-3,400 Hz which must be transmitted to reproduce the voice with reasonable fidelity. VOICE GRADE An access line suitable for voice, low-speed data, facsimile, or telegraph service. Generally, it has a frequency range of about 300-3000 Hz. VOICE GRADE FACILITY (VGF) A circuit designed to DDD network standards which is suitable for voice, low-speed data, facsimile, or telegraph service. WIDE AREA TELECOMMUNICATIONS SERVICE (WATS) WATS permits customers to make (OUTWATS) or receive (INWATS) long-distance calls and to have them billed on a bulk rather than individual call basis. The service is provided within selected service areas, or bands, by means of special private access lines connected to the pubic telephone network via WATS-equipped central offices. A single access line permits inward or outward service, but not both. WIDEBAND A term applied to facilities or circuits where bandwidths are greater than that required for one voice channel. WIRE CENTER The physical structure that houses one or more central office switching systems. "0" or "0-" Zero minus dialing. Allows a caller to dial zero and nothing else to get the Operator. "0+" Zero plus dialing. An operator assisted long distance call which is charged to the calling party. "00+" or "00-" Double zero dialing. Allows a caller to get an AT&T Operator in areas in which dialing only one zero would connect the caller with the local Operator because AT&T has given Operators back to the local telephone company. "1+" DIALING The capability to dial "1" plus the long distance number for calls withing the North American Numbering Plan area. Intra-LATA calls are carried by the local telephone company. Inter-LATA calls are carried by the caller's primary carrier, or by AT&T if equal access has not come to the caller's area yet. "10-XXX" DIALING The ability to send calls over a carrier other than a caller's primary carrier by dialing "10-XXX" then "1+" the long distance number, where "XXX" is the 3-digit Carrier Code of the alternative long distance company (also called a secondary carrier). Available only to Equal Access customers. 800 SERVICE The ability of a caller to dial a long distance telephone number without incurring a charge for the call, which is paid for by the party offering the 800 number. Synonym: Inward WATS service. 900 SERVICE Allows callers to receive information from the service provider via a recorded audio message, which can range from 60 seconds to a continuous live hookup, by calling a 900 number. This service can also be used to enable callers to vote or "make a choice" by dialing one of two 900 numbers. 900 calls are typically billed to the caller at $.50 for the first minute of any call and $.35 for each additional minute. 976 NUMBERS Service which allows callers to listen to recorded messages such as horoscopes, 'adult' dialogue, stock market or sports reports by calling 976-xxxx. The local telephone company charges callers a fee which is split between the local telephone company and the service provider. --- ERRATUM - CORRECTIONS FROM LAST ISSUE Essence Last issue got through the mill pretty well.. the errors were small and misplaced, but a few notable errors should be taken into consideration. i. You Didn't Get Duped You weren't actually given an imitation file if your filesize was wrong.. the official distribution copies were screwed around in the quality control phase, and there was a discrepancy in the official distribution. Here are the reported, and actual file sizes in the distribution copies. REPORTED SIZE IN BYTES [119895] ACTUAL SIZE IN BYTES [120034] The byte size of the magazine is reported in every issue(except for the first) so that we won't have multiple distribution errors as we did with the first issue. It is a quality control measure. Of course, this will not prevent imitation files from spreading. Anyone can fake a file and adjust the file size. Zencor Technologies(tm) has threatened to discredit us, and we feel they may potentially be a source of imitation files. We will leave it up to the reader to determine if the magazine lives up to the standards you have come to expect from CiSSD, and whether it is therefore, a fake. If you want to be sure to get the real deal every issue, you can download the official distribution version from the internet site: ftp 141.214.4.135 docs/zines/revival/rvlcissd.xxx where 'xxx' is the issue number. ie: 'rvlcissd.003'. If you do not have internet access, then check 'Getting Revival', near the beggining of this magazine for distribution sites. ii. Voice Mail BBS date was WACkO! The projected date for the Voice Mail BBS was somewhat unrealistic. Several CiSSD members, including myself, are undergoing geographical repositioning at this time, which would make it impossible to run a stable voice mail. This date has been corrected in this issue, to September 1st 1993. The FAX date, on the other hand, accurate to a week, and the fax line is now active. --- ADVERTISEMENT: ____________________________________________________________________ - REVIVAL: New Distribution Sites - ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Revival magazine is looking for new distribution sites all over the world. Requirements are not stringent. Any board with a positive image, a few megs of hard-drive space, any hacking oriented message base, and a knowledgable Sysop qualifies to be the first in its area. Revival issue #4 is on its way, and we would like to set up sites for distribution right away. Preffered sites are those who have access to Internet, who can request revival from our internet site automatically every other month. To apply as a REVIVAL distribution site, write a message to annon08ea@nyx.cs.du.edu, containing the password to an account by the name 'REVIVAL'. For a faster response, phone The Downtown Militarized Zone (+1 416 450 7087), and comment with your boards name and number, as well as the password to the 'REVIVAL' account, or finally, you can call voice to +1 416 417 0214, and have the same information handy. ____________________________________________________________________ - - ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- ZEN WHAT? The Dope Man/Essence Over the last few months, CiSSD has been having a problem with a group named Zencor. We found it rather disturbing when we recieved several apologies, for Zencor's misjudging our intent, and specially when we stopped recieving threats from Zencor members, but all the quiet seemed only to be a cover. Now they've gone and thrown the following underground newsletter in our path. Mind you, they did TELL members not to give it to us, but unfortunately, not all of their members are as intellegent as their leader Zoth The Frog, and now we have a chance for rebuttle. Oh and, shhhh.. don't tell Zencor! Z> ZENCOR Z> ====== Z> Z> Progenerate Newletter Issue #1 : April 1993 Z> =========================================== Y'know, that's mighty interesting Zoth. I clearly remember you lecturing me on how our group was in it's infancy, and Zencor was experienced. You told me about how Zencor was King of the Commodore 64 scene back in the day and we would die put up against a group with your experience and knowledge. Hrmm.. Issue #1? Your first newsletter?.. Oh that's because you used to teleport to group members houses right? Tsk Tsk.. I'd hate to think you were telling a fib! Z> CiSSD Group Exposed As CanTel Informants! Z> ----------------------------------------- Z> Z> The Canadian International Society Of Social Deviancy, composed of Z> Dope Man, Terminator X, and Lister, has been exposed as a group bent Z> on causing legal troubles for various underground societies, including Z> ZENCOR. Shoot! How'd you find out about this one? BTW: It's "Society FOR Social Deviancy", but you don't have times to remember unimportant things like that, Zoth A Frog. Z> While Frog was in prison, members of ZENCOR (particularly ShortMan and Z> Mystic Ruler) became friendly with these so-called hackers, and Z> disclosed quite a bit of sensitive information to them. While Frog was in prison? Oh yeah! I remember when you were in Juvinile Hall having your asshole reamed*. BTW, you're group wasn't exactly freindly with us, but they were as nice as you could expect anyoine to be to their babysitter. Like you said Zoth A Frog, "They're a bunch of fucking lamers, and you can babysit them if you want to". Sorry, we're done babysitting for now. Sensitive information? Since when was your Ex-Girlfreinds name considered sensitive information? BTW: She's a wonderful person.. you should take her out sometime! Z> Suspicions on the part of high-level ZENCOR members lead to entry into Z> the CiSSD VoiceMailBox. Suspicions on the part of your high-level Zencor member(s)? Who are they? I mean, I know there (is one)/(are some), but who are they, and more importantly, why? By the way, you're the first person to ever penetrate our voicemail box. I feel so raped. I'm sure you know the feeling, fluffy. Z> A number of messages were intercepted and recorded. Congratulations. Which amazing Zencor brand phone did you use to do it? The 'Super ZencordaPhone II'? What's the list price on that anyways? $1580? Oh. Out of my budget, but since members pay to be in your group, they get a 10% discount, right? How do I join? Z> Amongst these were communications with a CanTel security Z> officer. Apparantly this pig had apprehended CiSSD members (who were Z> never overly adept at hacking activities) hacking VoiceMailBoxes for Z> their own use. ... as opposed to for sale to the general public, like yours. Z> There had been a deal arranged in which CiSSD members Z> would inform the security officer (known as Bird Of Prey) of other Z> hacker's activities in exchange for immunity. Frog extrapolates on Z> this and theorizes, with supportive evidence that the thought-dead Z> bunch of lamers (YAM) contracted CiSSD to "shut down rival groups". Aha! And what supportive evidence would that be? Really! Please write, and let me know.. more than likely this would be based on the same supportive evidence that showed santa clause to deliver presents by reindeer rather than via Federal Express. Z> The following is a transcript of two of the most important messages Z> intercepted: In order to improve readability, I will title them for you. Message #1: Z> Dope Man, I havn't talked to you in a while, not that I'm sick of you Z> or anything. I enjoy the conference calling that you guys do. You guys Z> blend together, did you know that? Here's today's give and take. Z> Here's my take and I'll give you my give after. I was talking to Z> someone at Metro 55 division today, fraud, and someone has been Z> hacking into some additional VMBs, nothing new, but this time leaving Z> threatening messages to customers. On a tip from Bell Security they Z> are going to the home of [SHORT MAN]. I don't know if your eyebrows Z> have lifted or not, but it happens that this guy is also blind. It Z> happens that this guy is hacking into US networks and has done about Z> thirty-five thousand in fraud. [SHORT MAN] is going to be in a lot of Z> shit, the guys in the US want to prosecute. Mabye you want to chat Z> with him a bit. That's between you and I. I'm gonna give you the VMB Z> and the password to SATAN and STAR. The conversations you will hear Z> are the result of me taking back their VMBs, much like I did with you Z> guys, but these guys aren't as trusting. These guys are on the heavy Z> metal/drug end from what I can tell. Now quickly, before we go on, lets take some time to organize our minds. What did Bird of Prey say in this message? GIVE TAKE ---- ---- - Password to a random Drugee's - Request for us to talk to Voice Mail System. Short Man regarding his phone hacking. Shall we go on now then? Good. Message #2: Z> Bird Of Prey. Gotta like that. Satan has won the award for the Z> stupidest non-paying subscriber ever at CanTel. So we've had to rub Z> him out of the VMB hacking community for good. I was up till 1 last Z> night, all he did was complain, calling me OPP, Rent-A-Cop, and I Z> offered many times to do something and he kept saying "What's your Z> game?". Well, he's toast, so goodbye. The total was about twenty-eight Z> VMBs. Now let's summarize this message. Bird Of Prey wipes out the VMB's belonging to some hackers because they wouldn't accept the new ones he was trying to give them, and he had to go to bed. Z> Disgusting, isn't it? Oh, I'd say! Gawd forbid he should get some sleep! (?!) Z> Now then, what is ZENCOR going to do about it? Z> The following plan has been enacted: Z> Z> 1) The RCMP has been dispatched to shut down all pirate CiSSD BBS Z> systems, with ZENCOR-obtained file and user lists, recorded Z> conversations and other evidence. All CiSSD computer equipment will Z> be confiscated and a number of criminal charges will be laid. Oh good! Call the police! That's what we should have done, but you're the smarter hacking group.. only you would think of bringing the Canadian equivelant of the FBI into it! Only shutting down the CiSSD pirate systems? Oh! BTW, which ones were those again? If you could let me know, we'll shut them down for you. Also, seing as you're so adept to taking down Pirate BBS's, I'm sure that you'll have a great time getting access to any in the next little while. Z> 2) CanTel management has been informed of their "double-agent". Bird Z> Of Prey will lose his fucking job. Well, actually, it's not a fucking job, but coincidentally, it's rather close to yonge street. Either way, the fucking jobs are best out on jarvis.. oh.. and watch me shiver as I take you seriously. Unlike you, Bird of Prey still has a job. Z> 3) Other groups have been informed of CiSSD's plans to harm them. Which would explain why they've been posting in our network so much recently. I await their revenge. BTW: Are these the plans you've SPECULATED we have to harm other groups? Or are these the ones I keep hidden in the cookie jar, underneath the section carefully labeled 'DOUBLE FUDGE' in red ink? Z> 4) Everyone involved in or connected with CiSSD has been successfully Z> CN/Aed and all their personal information is on file. Successfully? Wow! I'm impressed. I was beggining to think you didn't know how to speak to an operator in english. Z> 5) All ZENCOR systems to which CiSSD has any knowledge has been shut Z> down completely. Actually, no. Would you like a list? Z> Furthermore, there will be NO FURTHER fraternization with CiSSD. Frog Z> warned everyone about this sort of thing! Frog this, frog that. Apparently, frog is a schizophrenic, constantly reffering to himself in the third person, but I won't complain.. as long as _Zoth A Frog_ doesn't fraternize with me, I'm happy. Oh wait, did you want the last word? Here you go: Z> Furthermore, there will be NO FURTHER fraternization with CiSSD. Frog Z> warned everyone about this sort of thing! _Notes:_ (+) Texts based on pre-release version of newsletter. Release version was not avaliable at time of editing. (*) See USENet Sex FAQ --- CiSSD MEMBERSHIP INFORMATION With a large resurganse in CiSSD activities, we have decided to begin accepting some members through an application process. Our commune is not yet large enough to accept the masses without rebellion, but is open enough to accept those with ideas similar to our own, and open minded enough to publish comment from those who are opposed to us. Please write to annon08ea@nyx.cs.du.edu, and I will publish your comments, and respond to 'letters to the editor.' If you are seriously interested in becoming a CiSSD member, you can download the CiSSD application from any CiSSD Headquarters BBS, and upload the completed form, FAX(NEW!) the form to the CiSSD fax line, or send the completed form E-Mail to annon08ea@nyx.cs.du.edu. In addition to members, CiSSD will honour those who have special achievements, members, or non members alike. If you know someone you believe to deserve CiSSD recognition, please write to the same address(annon08ea@nyx.cs.du.edu), leave a message on our voice mail, or fax us information on why this person deserves special recognition. NOTICE: richfair@eastern.com, mentioned in last issue, has ceased to exist. The problem may be temporary, but the site is not reliable. Any letters, or work that was sent to richfair@eastern.com last month was lost. Many Apologies. Please use Lister's address (annon08ea@nyx.cs.du.edu) until our mail problems are rectified. --- [CiSSD] CONTACT ADDRESSES The Downtown Militarized Zone BBS (416) 450 7087 Sysop - The Dope Man Revival Distribution Site [CiSSD] WHQ/HeLL The Revolutionary Front BBS (416) 936 6663 Sysop - Lister Revival Distribution Site [CiSSD]/HeLL/cDc CiSSD Voice Mail Canada (416) 417 0214 Users - Essence - The Dope Man - Lister NEW! - CiSSD Fax Line - (416) 250 5264 c/o The Dictator CiSSD Voice Mail BBS - Projected for September 1 1993 (Canada Day) (Projected date changed due to geograhical difficulties) Lister - annon08ea@nyx.cs.du.edu --- ADVERTISMENT: ______/\___/\X__ /\______ ___________ _______/\ /\____/\ \ ____/ __/ /_/ / / / / _\ /__ _//_/ / ____/ / _ / / / // / /\ / / /\ / __/ / _/ // / _ / / \_/ /__ _ / |/ / / |/ / _/ / / _ / \_/ \____/_____X_// /_____/ /_____/ _/ / _/__// /\____/ \/ \/ \/ \/ ____________________________________________________________________ - D A M N E D - ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Echo of the Damned is currently looking for Nodes in North America [1:2773/NPA.0], and internationally where english is spoken on Bulletin Board Systems [CoutryCode:2773/Node.0]. Echo of the Damned is dedicated towards the free flow of information, and productivity in the h/p scene. To apply as an Echo of the Damned node, please leave a voice message, containing your bulletin boards name and telephone number, as well as the password to an account named 'EOTD STAFF', at +1 416 417 0214. ____________________________________________________________________ - - ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --- LAST WORDS FROM THE EDITOR Essence/TX I pushed my luck long enough. It was only a few weeks, but my parents got sick and tired. When sleeping at home becomes an optional extra, you definately have family problems. Interestingly enough, I enjoyed being out on my own. I relied on my parents for food every few days when I needed it; and if I was exhausted from overactivity, and unable to sleep in -5c degree weather, I still had a bed at home where I could sleep but I rathered not to. I was sick of being at home. I was sick of my two parent, boy and girl child, middle class family. I hated the american dream. The dream was never quite what the stories tell you. Whenever I showed my love for someone else, they were unresponsive. I gather, I too was unresponsive when someone loved me. Whenever there was an argument, I was reason and my mother, or my sister was emotion. My dad and I never fight. He too is reasonable. He too argues with my mother. They should never have stayed together, as respectively they are 'bad logic', and 'bad love'. Had they only loosened the noose a little, and let me be me, instead of someone they were moulding me into, I might still want to be with them; I might still care. But they didn't and I don't. They reach for me, and I break their hearts. I don't have time for them, I need to get out and be with my freinds. Had they only seen what I was feeling, heard what I was saying, known what I knew, we could still be the american dream. Sometimes, to really love someone, you have to let them go. I guess, they were only dreaming. Maybe next time round, they'll listen closer. CREDITS The Dope Man Repeat contributor, and CiSSD President. There's no CiSSD/HeLL business like .. Show Business. Lister Interpersonal relations and repeat contributor. If CiSSD/HeLL you like his articles, send him some Vodka. The Dictator Repeat offender, who feels that political revolt is CiSSD payment enough for his writings. The Grappler Spreading diatribes to and fro, he's progressing from CiSSD the imaginary world of C=64, that so many of us hated to leave behind when we grew up. Kryten Contributor who attends many CiSSD meetings for the Independant free pizza. Gusto's *SUCKS* when it's cold. City-TV Thanks for making our release weekend enjoyable. Drop Chum by anytime! Essence/TX Editor. See you next issue. CiSSD ------------------------------------------------------------------------- THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY (C) 1993/94 -------------------------------------------------------------------------