💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › UPI › upi16.phk captured on 2022-06-12 at 14:56:52.

View Raw

More Information

-=-=-=-=-=-=-

                 -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 1 of 11

                           Released Date May 23, 1992

    Well UPi has finally made its return to the scene.  We have gotten back
some of the old members and quite a new ones as well.  As you have probably
noticed while you were you downloading it took considerably more time then any
of the previous issues.  In the previous issues they only contained one or
possibly two articles, this is issue size has greatly increased over our pre-
vious issues.  The file size of the previous issue only ranged from about
20-25k which is quite small, but this is no more, as this issue is
approximately 250k we hope to keep up this quantity and quality of the UPi
magazine while having it much larger than the previous issues.

    In this issue you will see many changes we have followed examples of some
of the larger magazines and newsletters out there.  Along with adding ideas of
our own, such as the 'busts' cloumn which will cover stories of peoples
unfortunate encounters with the law.  Look for the return of The Lost Avenger's
Datapac for Beginners of which he has improved greatly upon.  Also in next
future issue we hope to have an article by Black Flag on how to build a device
to modulate the frequency that your voice travels over the phone so you can
make use of loops with voice filters, or whatever other use you might come up
for it.  For details on how to get in contact with, become a member, or write a
freelance article for UPi see the end of this issue.  Now on with Issue #6!

                      YOU CAN CONTACT THE EDITORS OF UPI AT

                          Voice Mail Box: 416-402-0788
                               Telex:6505271625MCI
                                MCI Mail: 5271625
                      Internet E-Mail: tla@maria.wustl.edu


 Article  Article Name                           Writer(s)           Size
 Number
 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 6.1      Introduction To UPi Magazine           Arch Bishop         (2k)
 6.2      Card A PBX                             Arch Bishop         (6k)
 6.3      A Not-So-Editorial                     Hardwire            (3k)
 6.4      ALLIANCE Teleconferencing Services     The Lost Avenger    (40k)
          Boost Business Efficiency
 6.5      Anarchy Times                          Silicon Phreaker    (12k)
          Last Week Of School
 6.6      How To Make A Million Dollars In Your  VC Hacker           (7k)
          Own Basement!
 6.7      The Beginner's Guide To Hacking On     The Lost Avenger    (75k)
          On Datapac 1992 Update
 6.8      The Lost Avenger/Wiz Kid Bust          Black Manta         (35k)
                                                 The Lost Avenger
                                                 Wiz Kid
 6.9      UPi Underground Newsline               Arch Bishop         (69k)
                                                 The Lost Avenger
 6.10     Member & Site Application Form         UPi Editorial Staff (2k)
 6.11     Member & Site Listing                  UPi Editorial Staff (3k)


-------------------------------------------------------------------------------


                -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 2 of 11

                     ________________________________________
                    |             Card A PBX                 |
                    |           By: Arch Bishop              |
                    |________________________________________|



   Have PBX accounts been dry to long in your area?  Are you tired of leaving
your hacker on all night and coming up with nothing in the morning.  Why not
try an alternative way of acquiring an account, why not card an account?

Materials
~~~~~~~~~~
1 Credit Card Number
1 Drop-Site
1 Newspaper


   The credit card is best to get virgin with the all the owners information.
Which can be done by either trashing, or getting a CBI account.  If you go
trashing.  I would highly recommend Budget Rent-A-Car or some other place where
they would require much information about the customer.  At budget the carbons
are full size like a regular piece of paper and contain almost everything you
could possibly want to know about the owner of the card.

   You will also need to find a drop-site if you live in a house take a drive
around you neighborhood for houses that are up for sale and not occupied
currently, or if you know someone that is on vacation for a long enough period
of time.  Now if you live in an apartment building you can usually just have
the drop-site be another apartment in your building.  Most people in apartment
buildings will just put mail that is not for them in the lobby which you can
then easily pickup.  You can also try your mailbox key in other peoples
mailbox's they will usually fit more than just yours a friend of mine has a key
that fits 3 other box's besides his own.  If you still have not found a place
to mail to you can rent a mailbox very cheaply at most variety stores, also
money marts and they don't tend to care if you use your real information or
not.

   After you have your credit card number, and your drop site, start looking
through your local newspaper in the classified section.  Look for ad's that
are advertising Private Branch Exchanges, or 'Alternative long distance
carriers' and preferably ones that do not have 1800 numbers because you are
looking for small businesses.  If there is more than one ad advertising long
distance carriers, or private branch exchanges, copy all the numbers and names
of the companies down.  Then call up the companies and tell them you are
interested in acquiring an account on their system, they will sometimes ask
where you heard about it, if you found it in the paper then just say that.

   You should plan what you are going to say before you call, make it sound
good without any "Uhmm" or "Hmm" words in it, which shows that you are thinking
about the answer.  Which is always a tip-off that you are up to something, so
try to polish it as much as possible, the main thing is just stay relaxed.  You
should integrate the card information with the drop-site information to look
something like this e.g.

[ This is only Sample information and does not represent actual credit card
  information. ]

Visa                     < - Type of Card
George Brown             < - Owners Name
4517 288 921 612 715     < - Card Number
08/92                    < - Expiration Date
672 Baker St, Hilton.    < - Address            [Use Drop-Site Address]
L4C2B5                   < - Postal Code        [Use Drop-Site Postal Code]
419-761-2529             < - Home Phone Number
419-892-1842             < - Work Phone Number
Attorney General         < - Place of Employment
General Manager          < - Job Position


   If you have this information in-front of you while you are calling the
company it should prepare you for any questions they might ask you.  If they
throw you a question that you are not expecting answer it to the best of your
ability and don't say "Uhmm" before you answer.  You might not have that much
information on the owner of the credit card, the address and postal code are
not really necessary since you replthose with the drop-site address and
postal code anyways.  You should have the home phone number but if not just get
a local direct dial VMB and set it up as an answering machine, do the same for
the work number the message should sound something like this.  "Hi you have
reached George Brown General Manager at Attorney General please leave a
detailed message about why you are calling and I will get back to you." Some
companies may ask if you want your pin number mailed to you or for them to call
you and tell you your pin number, I have never asked them to phone me but it
might be possible to have them leave the pin number on a voice mailbox if they
thought it was your answering machine.  Sometimes it is even possible to do
this without a credit card, depending on how new/stupid the company is.  A
friend of mine once called up just to get information from a company offering
long distance service and they started asking him lots of questions then they
asked him for a credit card number.  Now this guy had never carded anything in
his life so he just gave them a bogus card number and expiration date, and an
apartment in his building, and they sent the pin number too!  Although this
company had only been up and running for two days but seeing as how my friend
rang up a $45 000 bill in a period of 2 months I'm sure its a lesson they won't
forget soon.

   Anyways that should be enough information to card yourself an account so
start looking through the classifieds!


 ------------------------------------------------------------------------------

                 -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 3 of 11

                         A Not-So-Editorial by Hardwire

  Well the first(?) issue of UPi is here and I've been found lacking!
Originally scheduled for this space was an interview with the FBI about
hackers, phreakers, and pirates (oh my!), but they are NEVER in their office!
I called consistently for the better part of 3 weeks but I always go a message
informing me that regretfully "all agents are currently out of the office" and
not wanting to leave a message I promptly hung up.  So our FBI coverage failed
miserably...  but wait the CIA handles this stuff to right??  Yup, indeed they
do, but they just wouldn't talk!  I ran the interesting channels to get the
number (Hello information?  can I have the number for the Central Intelligence
Agency?  Thank You) and called them up.  I get some air-head with an accent and
she says, "I'm sure someone here can help you...  hold on.." I get an interlude
of silence at wich point I'm undoubtably being traced..  and five minutes later
"Hello, what can I do for you sir?"

Hwire:I'm doing a school project on computer crimes, methods, and punishments
      I was wondering if I could ask you a few questions...
CIA:Well I'm not too sure if I can help but sure
Hwire:OK,thanks, uhhmmm... what are some of the more typical methods used
      by yourselves for catching computer hackers?
CIA:That's a really good question, but I'm afraid we can't tell you, most of
    our information isn't available for public access.
Hwire:Can you tell me some of the most common things that trip up computer
      criminals?
CIA:Actually you know who deals more with hackers and such? the FBI...
Hwire:Really?
CIA:Yes, you should try calling them.
Hwire:Oh, ok thanks <CLICK>

  All of this took place in the space of three minutes... enough time to trace
and get rid of me no doubt...  Now to me this seems like a little bit of a
violation to our freedom of information.  Granted Canada's Bill of rights may
differ slightly, it still guarantees freedom of information.  So I call and get
the boot, this from a branch of the government belonging to "The Education"
President, I was denied a chance to aid my education (like I care hahahaha) So
I figure maybe it just wasn't meant to be, All us phreakers/hackers/ anarchists
and even pirates are destined to charge blindly ahead heedless of what may
become of us.


 ------------------------------------------------------------------------------

                -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 4 of 11

          ALLIANCE Teleconferencing Services Boost Business Efficiency

                              By The Lost Avenger


    Editor's Note:  OK, guys I found this article in a magazine in my school's
library called AT&T Technology.  The article is from an old magazine but it
interesting because it explains how AT&T ALLIANCE Teleconferences work when you
are called by someone who set up one or when you try to set up one yourself.
Hope you guys learn a lot about AT&T ALLIANCE Teleconferences from this file.

    Audio and audiographics teleconferencing can help business raise
productivity, save time, and reduce travel expenses.  For over 25 years AT&T
has offered Operator Handled Conference Service, which allows operators to set
up conference calls.  Recently AT&T introduced new state-of-the-art
conferencing services: ALLIANCE 1000/2000/3000 Teleconferencing Services and
ALLIANCE Dedicated Teleconferencing Service (ADTS).  The former is a public
conferencing service that, for the first time, allows anyone with a  touch-tone
phone to set up his or her own audio or audiographics conference calls. The
use of digital technology gives conferees the same high quality, full-duplex
connections they'd normally get with one-to-one phone calls.

    ADTS, on the other hand, uses analog technology and also provides
exceptional audio quality.  ADTS is dedicated to one customer whose attendants
control connections from a terminal on their premises.  ADTS also can connect
to such AT&T services as the long-distance network, WATS, and 800 Service.
This article describes the customer advantages, design rationale, technology,
and applications of these state-of-the-art services.

    Teleconferencing is changing the ways we manage our business.  It lets us
attend meetings wherever a touch-tone phone is available.  By means of a
variety of telephone, terminals, and networks, teleconferencing enable more
people to get involved in making or influencing decisions - and making them
faster.  Teleconferencing also results in better planned and shorter meetings,
reduced travel expenses improved relations between business locations and,
above all, significant improvements in management efficiency.

    AT&T now offers two new state-of-the-art multipoint conferencing services -
in additional to the long-standing Operator Handled Conferencing Service (OHCS)
- that are easy to use, provide a high-quality connection with good speech
volume levels from all locations, permit users to interact fully, are very
reliable, and are low in cost.

    The first service, ALLIANCE Teleconferencing, is available to everyone in
the United States via any touch-tone phone.  The originator of the calls must
be in the United States, but calls can be made to conferees that can be reached
by international direct distance dialing (DDD).  Users can set up their own
conference calls, with up to 58 other parties, or have an attendant set them
up.

    The second service is call ALLIANCE Dedicated Teleconferencing Service
(ADTS).  With ADTS each bridge (24 to 56 ports - or parties - per bridge) is
dedicated to one customer.  (A bridge is an electronic device that connects
many conferencing transmission paths.)  AT&T expects that heavy users with
users large volumes of teleconferencing will prefer this feature-rich services.
The bridge is located in the AT&T network; however, the customer controls it
remotely via dedicated voice and data lines and a computer terminal such as an
AT&T 5420, a PC 6300, or equivalent.

    AT&T original audio teleconferencing service, OHCS has been meeting the
teleconferencing needs of customers for over 25 years.  It appeals to those who
prefer the convenience of place a single call to an AT&T conference operator.
The operator then sets up and controls the call based on the customer's needs
and instructions.  OHCS currently uses the same state-of-the-art technology as
ADTS

    The bridges for all services are on AT&T premises and are connected high in
the network hierarchy, providing significant transmission advantages over
customer-premises or local phone-company based bridges.  (See figure 1.)  The
primary advantage of this elimination of the added noise and transmission loss
caused by signals going back and forth to the network, as would happen with a
customer-premises based bridge.

    Other advantages of having the bridge located in an AT&T central office are
high reliability, battery back up, prompt repairs, and no need for customers to
allocate their floor space for equipment.



ALLIANCE TELECONFERENCING SERVICE

    This service permits anyone with a touch-tone phone and access to the AT&T
public switched network to make ALLIANCE Teleconferencing calls.  The
connections are superior to any alternative, and automatic gain control, echo
cancellation, and noise suppression make the conference calls sound as good as
conventional two-party calls.  Other features include:

    o    User setup and control or set-up by an attendant and control by the
         user.

    o    Conference setup guided by computer-stored voice prompts with dialing
         possible during most of the announcements.

    o    Ability to include both domestic and IDDD parties on the conference.

    o    Full-duplex digital voice conferencing, which allows all conferees to
         speak and be heard simultaneously.

    o    Unique tones to identify parties added to or dropped from the
         conference.

    The service is being offered as ALLIANCE 1000 for audio, as ALLIANCE 2000
for voiceband-data graphics, and ALLIANCE 3000 for digital-protocol graphics at
4.8 kilobits per second (kb/s), with 56 kb/s planned for the future.

ALLIANCE 1000 Service

    Users establish conference calls by dialing 0-700-456-1000.  If access
isn't available via the 700 number - because of an intervening independent
phone company - the conferee can dial 1-800-544-6363.  This will get an
operator who will initiate the conference; that is, dial the bridge to connect
the caller to it.  For an additional charge the operator will set up the call
by calling all the conferees.

    If most of the conferees are clustered in one area, charges can be reduced
by dialing 0-700-456-100X to reach a specific bridge location.  The X = 1 for
Reno; 2 for Chicago; 3 for White Plains, NY; 4 for Dallas. (See Billing
Information at the end of this file.)

    An example of the regular use of ALLIANCE 1000 service is the daily
teleconference held by the operations department of a major trunk airline.  At
9 a.m., ten domestic and five European operations locations are bridged to
discuss the previous day's performance, cancellations, departure delays, load
factors, and to establish the causes of problems and plan corrective action.
This immediate feedback allows all parties to be aware of the circumstances
affecting each operations center and to talk about items of mutual, immediate
interest that would be impossible to discuss with any other kind of meeting.

    An example of a unique (but infrequent) applications of ALLIANCE 1000
service was its use by the board of directors of a major manufacturer that was
the target of a hostile takeover bid.  As developments unfolded, quick-response
decisions by the board were required.  Even though the directors were
geographically dispersed, ALLIANCE teleconferencing allowed immediate
discussion in an environment that reasonably approximated an across-the-table
meeting.  This was due to the high-quality, full-duplex transmission offered by
the ALLIANCE bridge.

ALLIANCE 2000 Service

    This service is intended for conferencing data terminals.  It uses the same
equipment as ALLIANCE 1000 service.  But unlike that service, ALLIANCE 2000
allows only one conferee to transmit at a time so that data won't be scrambled.
The service would be used for conferencing non-protocol voiceband data/graphics
devices such as AT&T's PC Conferencing system using the OVERVIEW scanner with
SCANWARE software, the Gemini 100 Electronic Blackboard System or freeze-frame
video equipment.  The dialing codes are 0-700-456-2000 for the nearest bridge,
or 0-700-456-200X for a particular bridge location.

    An ALLIANCE 2000 service application is the weekly production meeting of a
division of an automobile manufacturer.  A concurrent audio and graphics
conference is established among the six plant locations in the midwest.  Formal
presentations are made by each plant location and the graphics (charts, PERT
diagrams, graphs) at the presenting location are shown to all other locations
simultaneously.

ALLIANCE 3000 Service

    This service allows high-quality graphics conferencing at 4.8 kb/s using
terminals that provide the CCITT Telematic Services Protocol (previously the
Group 4 Facsimile Protocol.)  ALLIANCE 3000 connections to Accunet Switched 56
service are planned for the future.

    Initially the only bridge location will be Chicago.  Separate bridge
conference leg connections are required for the audio and graphics portions of
ALLIANCE 3000 audiographics conference calls.  Both are established and
controlled from one touch-tone phone.

    Using ALLIANCE 3000 service, a large manufacturer will have the ability to
bridge PC workstations at the headquarters, computer design center, and
manufacturing locations to review computer-aided design images developed by the
deign center.  Engineers, designers, and marketers will have the ability to
view, comment on, and modify these images on an interactive, real-time basis.
Using scanning devices, people at workstations at up to 59 locations also can
view the actual parts.



BEHIND THE SCENES

    All ALLIANCE bridging and control equipment is located in the Network
Services Complex - NSCX.  (See figure 2.)  The NSCX is located with and
connected to selected 4ESS switches (toll) via five T1 transmission lines and
two signaling links that carry, respectively, the conference connections and
signaling.

    A user establishes a conference call by dialing 0-700-456-1000.  (See
figure 3.)  The "0" prefix routes the call via the end office to the AT&T
Traffic Service Position System (TSPS), which recognizes the 700 + 456 numbers
as a request for ALLIANCE Teleconferencing service.  The "0" prefix is ignored
and the call is handled without an operator.  After the TSPS obtains the
originating line number via automatic number ID, or operator number ID, the
TSPS performs a six-digit translation of 700 + 456 to 800-XXX.  The 800-XXX is
prefixed to the original line number and outpulsed to the office serving the
TSPS.

    This number will then be sent to a WATS originating screening office that
accesses a data base to derive the telephone number of the ALLIANCE bridge.
The bridge number and calling number ID are sent to the toll office, and the
connection is then established to the bridge in the NSCX.  The TSPS will screen
out switchhook flashes for operator service or requests for service from either
coin phones or hotels since billing can't be done.

    Under control of the NSCX processor, the announcement system welcomes the
originator/controller and asks the person how many conference ports are
required.  It then connects a register and waits for touch-tone digits.  The
person then touch-tone dials the number of total conference ports required,
including one for him or herself.

    The announcement system verifies the number of ports and then gives
instructions on how to dial all conference locations.  Through a sequence of
dialing and announcements, the conference is established and the parties are
added to a common time-slot connection on the audio (Type I) bridge.  (See
The ALLIANCE 1000/2000 (Type I) bridge at the end of this file.)  All
connections from the bridge are established over the five T1 lines to the 4ESS
switch and out into the network.



DEDICATED TELECONFERENCING SERVICE

    ALLIANCE Dedicated Teleconferencing Service (ADTS) provides high-quality
audio teleconferencing to large customers.  The service is provided by
dedicating an entire bridge to one customer.  Its features complement other
AT&T teleconferencing services, such as Operator Handled Conferencing Service
and ALLIANCE 1000, 2000, and 3000 Teleconferencing Services.  ADTS is intended
for customers with 30 or more teleconferences per month, or whose
teleconferencing needs can best be accommodated by the many special ADTS
features.

    ADTS is now provided by the microprocessor controlled, remotely
programmable conference arranger, which is located in an AT&T central office.
The many ADTS features are under direct control of the customer's attendants.
Each of up to three independent attendant positions uses both a voice and data
connection, via private lines to the ADTS, to control the 24 to 56 conferee
ports.

    The port capacity can be installed in increments of eight ports, based on
customer needs.  Conference ports are assigned in any order on an individual
port basis based on the connection arrangement for each.  Half the ports, for
example, may be designated for AT&T 800 Service while the other half are
designated for AT&T Long Distance service.  ADTS provides domestic and
international teleconferencing capabilities in a variety of modes that are
under total customer control.  These include:

    o    Blast-up preset conferences.  In these conferences, ADTS dials all
         conferees at the same time.  When people answer they're first
         connected to a voice announcement and then are added to the
         conference.

    o    Attendant assisted preset conferences, where the attendant adds one
         party at a time.

    o    Meet-me conferences.  The attendant reserves these, and all
         conferees are required to call into the conference directly on an
         assigned phone number at the designated time.  Once the ADTS voice
         announcement responds, each conferee must enter a security code to
         join the conference.

    o    Combinations of the above conferences are possible.

    o    Conference ports can be assigned in any order on a port-by-port basis.
         Based on the customer's desire, however, some ports may be committed
         to special connections, such as normal DDD, WATS, 800 Service, or
         private line.

    o    Unique voice announcement capability, with six system announcements,
         such as "Please enter you touch-tone code for your conference,"  or
         "Please hold for your ADTS call."

    o    The ability to connect private-line circuits to message (DDD) lines.

    o    An attendant's directory of 1500 names and phone numbers.

    o    Up to 100 preset conferences of any size (up to the 56-port capacity)
         that the attendant can recall and set up quickly.

    o    Conferees may be added or dropped, and can be placed in interactive or
         listen only mode.

    o    Conferences may be divided into subconferences and then recombined
         later under attendant control.

    The ADTS has the technical ability to operate with other switching
arrangements such as the Common-Control Switching Arrangement (CCSA) and
Enhanced Private Switched Communication Service (EPSCS) switches, and 4ESS
switches.  (See Figure 5.)

ADTS Operation

    The customer's attendant puts conference information into the ADTS with a
data terminal that's connected by a private data channel.  (See Figure 6.)  The
attendant controls the conference directly, and call processing functions, such
as dialing and call supervision, and performed by the ADTS microprocessor.

    Conversations between the attendant and the conferees and carried  on a
dedicated private-line phone that's connected directly to the same ADTS
attendant port circuit as the private-line data channel.

    High-quality audio is achieved with a four-wire transmission path and a
level-compensating circuit that reduces noise, cancels echos, and automatically
controls gain.  Analog data-bridging transmission is possible at up to 4.8 kb/s

Customized Applications

    Each ADTS bridge is installed in the AT&T office nearest to the customer's
switching network for connections to CCSA, Centrex, EPSCS or some other
company-based switching system.  In the case of DDD, WATS, or 800 Service, the
bridge is generally put in the 4ESS switch office nearest to the customer's
attendants.

    Other customer alternatives included placing the bridge nearest the point
of the largest number of conferees or at a location where time-of-day discounts
have a significant impact on the conference leg charges.

ADTS In Action

    One ADTS application is in a New York City stock brokerage office that
makes heavy use of a 56-port ADTS bridge that's also in the city.  Bridge
connections permit use of WATS, 800 Service, as well as Message
Telecommunications Service (MTS) connections for normal teleconferencing
involving combinations of Meet-Me and Preset conferences.  In addition, the
customer has a twelve-location private-line network that's used during trading
hours.

    The network has open microphones that allow people to talk at any time
without having to dial a number or push a button.  By connecting the
private-line network to ADTS, the customer easily can add parties.  The
attendant does not receive any signaling information from the private-line
networks; therefore, specific time arrangements have to be made to insure that
the additional conferees are added and dropped at the correct time.

    Another ADTS applications is for a business customer that does a lot of
teletraining.  The customer has a 56-port bridge connected directly to the 4ESS
switch where all connections are MTS.  This customer uses the preset conference
blast-up feature for virtually all of its conferences.  All conferees are
automatically called at the scheduled time and asked to please stand by for
their conference call.



A LOOK AHEAD

    Reservations and Meet-Me enrichments were made available with ALLIANCE 1000
and 2000 teleconferencing service in late 1987.  (Tariffs became effective in
December, 1987).  This will permit customers to reserve their conference
facilities up to two months in advance.  Using Meet-Me, the conference host may
have conferees dial directly into the conference using special access numbers
supplied when the Meet-Me reservation is made.

    The host also may call the conferees directly from the bridge and add them
to the conference.  Other Meet-Me options include screening of each conferee by
a customer-provided attendant; the ability for conferees to call from hotels,
motels, or coin phones; and shared billing of transport costs.

    Multimedia PC-based terminals (these include a PC, phone, modem, and a
high-speed digital interface) will open a wide range of conferencing,
applications for businesses, allowing them to use any combination of voice,
data, graphics, and video.  It is anticipated that these terminals will be
equipped with Automatic Machine Interface, which will permit totally automatic
conference setup.

    Conference control and status information will be transmitted over a
separate Integrated Services Digital Network (ISDN) signaling channel, thereby
improving throughput for data, graphics, and video.  This will also greatly
enhance the management of a teleconferencing call by allowing the use of
terminals that display the status of each location participating in the
conference.

    The development of and adherence to international standards will ensure a
truly multinational capability for the full spectrum of network and conference
services in the relatively near future.  As price and performance improve for
both network access and terminal equipment, it is also anticipated that
applications will be expanded to meet the needs of residential customers.



FIGURE 1: Losses

    Transmission differences between network bridges and customer-premises
bridges: (A) normal two-party DDD call, (B) conferencing call using a
customer-premises bridge, and (C) conference call using a network bridge such
as ALLIANCE.  Network bridging has a significant transmission advantages over
customer-premises bridges.

A: Normal Two-Party DDD call.

ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
3Station    3  3End        3  3AT&T       3  3End        3  3Station    3
31          3  3Office     3  3Network    3  3Office     3  32          3
3           CDD4           CDD4           CDD4           CDD4           3
3           3  3           3  3           3  3           3  3           3
3           3  3           3  3           3  3           3  3           3
@DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY

Loss from Station 1 to Station 2 = 14dB.


B: Conference call using a customer-premises bridge.

               ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
AT&T Network   3Switching  3  3End        3  3Station    3
               3Point      3  3Office     3  31          3
      ZDDDDDDDD4           CDD4           CDD4           3
      3        3           3  3           3  3           3
      3        3           3  3           3  3           3
      3        @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY
ZDDDDDADDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
34ESS       3  3Switching  3  3End        3  3Station    3
3Switch     3  3Point      3  3Office     3  32          3
3           CDD4           CDD4           CDD4           3
3           3  3           3  3           3  3           3
3           3  3           3  3           3  3           3
@DDDDBBBBDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY
     3333      ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
     333@DDDDDD4Switching  3  3End        3  3Station    3
     33@DDDDDDD4Point      3  3Office     3  33          3
     3@DDDDDDDD4           CDD4           CDD4           3
     @DDDDDDDDD4           3  3           3  3           3
               3           3  3           3  3           3
               @DDDDBBBDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY
ZDDDDDDDDDDD?  ZDDDDAAADDDD?
3Customer-  3  3End        3
3Premises   CDD4Office     3
3Bridge     CDD4           3
3           CDD4           3
3           3  3           3
@DDDDDDDDDDDY  @DDDDDDDDDDDY

Losses: 1 to 2, 2 to 3, 1 to 3 = 28dB.


C: Conference call using ALLIANCE bridging service.

                              ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
AT&T Network                  3Switching  3  3End        3  3Station    3
                              3Point      3  3Office     3  31          3
                     ZDDDDDDDD4           CDD4           CDD4           3
                     3        3           3  3           3  3           3
                     3        3           3  3           3  3           3
                     3        @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY
ZDDDDDDDDDDD?  ZDDDDDADDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
3ALLIANCE   3  34ESS       3  3Switching  3  3End        3  3Station    3
3Bridge     CDD4Switch     3  3Point      3  3Office     3  32          3
3           CDD4           CDD4           CDD4           CDD4           3
3           CDD4           3  3           3  3           3  3           3
3           3  3           3  3           3  3           3  3           3
@DDDDDDDDDDDY  @DDDDDBDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY
                     3        ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
                     3        3Switching  3  3End        3  3Station    3
                     3        3Point      3  3Office     3  33          3
                     @DDDDDDDD4           CDD4           CDD4           3
                              3           3  3           3  3           3
                              3           3  3           3  3           3
                              @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY

Losses: 1 to 2, 2 to 3, 1 to 3 = 14dB.



FIGURE 2: Network Services Complex

    The Network Services Complex (NSCX) is the heart of ALLIANCE
teleconferencing, providing control, announcements, tones and bridging (both
audio and graphics).

      3            ZDDDDDDDDDDD?  ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
      3            3Signaling  3  3Main       3  3Micro-     3
      3            3Terminal   3  3Processor  3  3Processor  3
      CDDDDDDDDDDDD4           CDD4           CDD4           CDDDDD?
      CDDDDDDDDDDDD4           3  3           3  3           3     3Serial
      3            3           3  3           3  3           3     3Control
  To  3            @DDDDDDDDDDDY  @DDDDDDDDDDDY  @DDDDDDDDDDDY     3Bus
      3                                                            3
 Host 3                                                            3
      3                                                            3
Switch3            ZDDDDDDDDDDD?  ZDDDDDDDDDDD?     ZDDDDDDDDDDD?  3
      3 T1 Lines   3DS1        3  3Time Slot  3     3Announce-  3  3
      CDDDDDDDDDDDD4Interface  3  3Interchange3     3ment       3  3
      CDDDDDDDDDDDD4           CDD4Unit       CDDBDD4System     CDD4
      CDDDDDDDDDDDD4           3  3           3  3  3           3  3
      CDDDDDDDDDDDD4           3  3           3  3  3           3  3
      3            @DDDDDDDDDDDY  @DDDDDDDDDDDY  3  @DDDDDDDDDDDY  3
                                                 3  ZDDDDDDDDDDD?  3
                                                 3  3Tone       3  3
                                                 3  3Receiver   3  3
                                                 CDD4Bridge     CDD4
                                                 3  3           3  3
                                                 3  3           3  3
                                                 3  @DDDDDDDDDDDY  3
                                                 3  ZDDDDDDDDDDD?  3
                                                 3  3Type I     3  3
                                                 3  3Bridge     3  3
                                                 CDD4           CDD4
                                                 3  3           3  3
                                             Time3  3           3  3
                                      Multiplexed3  @DDDDDDDDDDDY  3
                                         Data Bus3  ZDDDDDDDDDDD?  3
                                                 3  3Type II    3  3
                                                 3  3Bridge     3  3
                                                 @DD4           CDDY
                                                    3           3
                                                    3           3
                                                    @DDDDDDDDDDDY



FIGURE 3: Call Setup

    ALLIANCE calls use TSPS for Automatic Number Identification (ANI) and the
800 database to get the Network Services Complex (NTSX).  All parties are
connected to the NSCX bridge and out into the network via the serving AT&T 4ESS
Switch.

ZDDDDDDDDDDD?
3Database   3
3           3                 ANI = Automatic Number Identification
3           3
3           3                 ONI = Operator Number Identification
3           3
@DDDDBDDDDDDY
ZDDDDADDDDDD?                 ZDDDDDDDDDDD?  ZDDDDDDDDDDD?
3Signal     3                 34ESS       3  3Network    3
3Transfer   3                 3Switch     3  3Services   3
3Point      CDDDDDDDD?ZDDDDDDD4Office     CDD4Complex    3
3           3        33       3           3  3           3
3           3        33       3           3  3           3
@DDDDDDDDDDDY  ZDDDDDAADDDD?  @DDDDDDDDDDDY  @DDDDDDDDDDDY
               3Originating3
               3Screening  3
               3Office     3
               3           3
ZDDDDDDDDDDD?  3           3
3Traffic    3  @DDDDDBDDDDDY
3Services   3ADDS    3
3Position   CDDDDDDD>3
3System     3ANI/ONI 3
3           3  ZDDDDDADDDDD?                ZDDDDDDDDDDD?
@DDDDDDDDDDDY  3End        3                3Station    3
               3Office     3 0-700-456-1000 3           3
               3           CDDDDDDDDDDDDDDDD4           3
               3           3                3           3
               3           3                3           3
               @DDDDDDDDDDDY                @DDDDDDDDDDDY



FIGURE 4: Type I Bridge

    Type I bridge permits a fully interactive multipoint audio connection.
This bridge provides for noise suppression, automatic gain control, and echo
control.

To Main
Processor
      ZDDDDDDDDDDD?
      3Control    3
      3Interface  3         Control                               ZDDDDDDDDDDD?
<DDDDD4           CDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD?         3Level      3
      3           3         Data                        3         3Control    3
      3           3        ZDDDDDDDDDDDDDBDDDDDDDDDDDDDDEDDDDDDDDD4           3
      @DDDDDDDDDDDY        3             3              3         3           3
      ZDDDDDDDDDDD?  ZDDDDDADDDDD?  ZDDDDADDDDDD?  ZDDDDADDDDDD?  3           3
      3Data       3  3Echo       3  3Speech     3  3Bridge     3  @DDDDDBDDDDDY
      3Interface  3  3Canceler   3  3Detector   3  3Processor  CDDDDDDDDY
<DDDDD4           CDD4           3  3           3  3           3
      3           3  3           3  3           3  3           CDDDDDDDD?
      3           3  3           3  3           3  3           3  ZDDDDDADDDDD?
      @DDDDDBDDDDDY  @DDDDDBDDDDDY  @DDDDDBDDDDDY  @DDDDDBDDDDDY  3Conference 3
To Time-Slot3              3              3              3        3Summation  3
Interchange @DDDDDDDDDDDDDDADDDDDDDDDDDDDDADDDDDDDDDDDDDDADDDDDDDD4           3
Unit                                                              3           3
                                                                  3           3
                                                                  @DDDDDDDDDDDY



FIGURE 5: ADTS Connection Options

    This customer-dedicated network bridge is located in the AT&T central
office with the 4ESS switch.  Direct bridge connections to the switch are
possible for completing and receiving MTS, WATS, and 800 calls.  Other possible
connections include other networks, class-5 end offices, and private networks.

     ZDDDDDDDDDDD?  ZDDDDDDDDDDD?1  ZDDDDDDDDDDD? ZDDDDDDDDDDD?
     3Attendant  3  3ALLIANCE   3<D>3D4         CD44ESS       3
Voice3           31 3Dedicated  32  3Channel    CD4Switch     3
DDDDD4           CDD4Telecon-   3<D>3Bank       CD4           3
DDDDD4           3  3ferencing  3   3           CD4           3
Data 3           3  3Service    3<D>3           CD4           3
     @DDDDDDDDDDDY  3           3   @DDDDDDDDDDDY 3           3
To Customer       2 3           3                 CDDDDDDDDDDD4   ZDDDDDDDDDDD?
Premises Via  DDDDDD4           CDD> To Other     3        MTS3<D>3AT&T       3
2001 And 3001     3 3           CDD> Networks     CDDDDDDDDDDD4   3Network    3
Private Lines DDDDDD4           CDD> CCSA, EPSCS, 3       WATSCDD>3           3
                    3           3    CTX          CDDDDDDDDDDD4   3           3
                    3           3                 3800 Service3<DD4           3
                    3           CDD> Private      @DDDDDDDDDDDY   @DDDDDDDDDDDY
                    3           3    Line
                    3           3
                    3           CDD> To End
                    3           CDD> Office
                    3           CDD> (Class 5)
                    3           3
                    @DDDDDDDDDDDY56

CCSA  = Common Control Switching Arrangement
EPSCS = Enhanced Private-Switched Communications Service
CTX   = Centrex
MTS   = Message Telecommunications Service



FIGURE 6: ADTS Dedicated Attendant Connections

    Each attendant position requires a separate private line for voice and
another for data.

                           Local
                           Exchange
             ZDDDDDDDDDDD?3       3
             34-Wire Talk33       3
             3Battery Via33       3              Voice
             3Telephone  C4<DDDDDDEDDDDDDDDDDDDDDDDDD?
             3Unit       33S2001  3                  3
             3           33Private3                  3
             @DDDDDDDDDDDY3Line   3                  3
                          3(Voice)3                  3
                          3       3             ZDDDDADDDDDD?   ZDDDDDDDDDDD?1
                          3       3             3AT&T       3   3ALLIANCE   CD
                          3       3             3Port       3 1 3Dedicated  3
                          3       3             3           CDDD4Telecon-   3
                          3       3             3           3   3ferencing  3
                          3       3             3           3   3Service    3
                          3       3             @DDDDDBDDDDDY 2 3           3
                          3       3               Data3       DD4           3
ZDDDDDDDDDDD?ZDDDDDDDDDDD?3       3ZDDDDDDDDDDD?ZDDDDDADDDDD?   3           3
3202T       33B29        33       33B29        33202T       3 3 3           3
3Modem      C4Data Set   C4<DDDDDDE4Data Set   C4Modem      3 DD4           3
3           33           33S3001  33           33           3   3           3
@DDDDDBDDDDDY@DDDDDDDDDDDY3Private3@DDDDDDDDDDDY@DDDDDDDDDDDY   3           3
      3                   3Line   3                             3           3
ZDDDDDADDDDD?             3(Data) 3                             3           3
3Computer   3             3       3                             3AT&T       3
3Terminal   3             3       3                             3Network    3
3           3             3       3                             3           3
3           3             3       3                             3           3
3           3             3       3                             3           CD
@DDDDDDDDDDDY             3       3                             @DDDDDDDDDDDY56



The ALLIANCE 1000/2000 (Type I) Bridge

    The type I bridge, a subsystem of the Network Services Complex (NSCX),
bridges (connects) the conferees' channels.  (See Figure 2) Actually there are
two of these bridges, each of which handles 59 channels.  The bridge interacts
with the NSCX's main processor via the serial control bus.

    The NSCX receives digitized voice channels at the DS1 rate on five T1
transmission lines.  Under control of the main processor, the TS1 unit routes
channels to this bridge.  (See Figure 4)

    Bridge operation is controlled by the bridge processor, a high-speed,
bit-sliced microprocessor.  Upon receiving control information from the NSCX;s
main processor, the type I bridge determines the channels to be bridged, the
conferees to be heard, then adjusts the gain.

    Echos on incoming channels are eliminated by the echo canceller (an AT&T
IC) and an adjustable digital filter that subtract a simulated echo from the
signals.  A digital signal processor (DSP) IC, in the level-control unit,
detects the presence of speech, estimates its level, and sends the results to
the bridge processor, which returns the appropriate gain setting.  The DSP
also suppresses noise, keeping the connection quiet when speech isn't present.

    Bridging is done in the conference summation unit, which sums the digitized
voice samples from each speaker.  (The level of each speaker's input signal is
adjusted first.)  Each conferee gets back from the bridge the digital sum of
all speech on all legs of the conference, minus the speech he or she puts in.
This allows for multiple talkers.

    As information on each conferee is sent to the bridge processor, all speech
channels associated with the same conference are examined every four
milliseconds for the presence and amplitude of speech.  Where speech is
detected, that conferee's voice sample is included in the conference summation
if the total number of speakers has not reached the limit of three.  Further
processing of speaker signals by the bridge processor produces an "inertia
effect" - an averaging of signal levels that eliminates transient noise and
allows for pauses in speech.

    Once a conference is set up, there's no further communication with the main
processor until the conference ends or the originator exercises further control
options.  If parts of the NSCX fail, the type I bridge may be able to continue
the conferences without interruption.



The ALLIANCE 3000 (Type II) Bridge

    The type II bridge is a subsystems of the Network Services Complex (NSCX).
It provides the multipoint CCITT Telematic Services Protocol, a high-speed
point-to-point protocol for facsimile transmission at 4.8 kilobits per second
(kb/s), with 56 kb/s planned for the future.  Like the type I bridge, this
bridge furnishes 59 ports that are configurable in any combination from a
single 59-port conference to 19 three-port conferences.

    The type II bridge interface to the customer is either at 4.8 kb/s
half-duplex via the long-distance network, or at 56 kb/s (planned for the
future) for the new Accunet Switched 56 service.  The lower speed gives
customers ubiquitous access to teleconferencing, while the higher speed ensures
a top level of performance for graphics, and a potential transmission time of
about four seconds per page.

    Two key concepts guided the design of the bridge's hardware and software.
The first, transparency, makes the bridge look like a terminal, allowing
terminals in a conference to operate as if they were each on a two-point
connection.

    The second concept, symmetry, ensures that each terminal will have the same
access to the conference.  To achieve this symmetry the bridge accepts requests
>from terminals to transmit, then performs contention resolution, allowing
terminals to transmit in an orderly and equitable way.

    The type II bridge also performs capability negotiations and flow control
to differ differences in terminal operating speed (4.8 kb/s or 56 kb/s), error
control and recovery, and transmission.



Billing Information

    There are no recurring monthly or installation charges for ALLIANCE
Teleconferencing Services.  Calls are billed as follows:

    o    Regular AT&T long-distance charges apply between the ALLIANCE Services
Access Center (White Plains, Chicago, Dallas, Reno) and each location on the
conference call (including your own).  A charge of 25 cents per minute also
applies for each location on the call.

    o    If the ALLIANCE Services operator is asked to set up the conference
call, there's an additional charge of $3 per location.

RENO, NEVADA                           WHITE PLAINS, NEW YORK

0-700-456-1001 Audio                   0-700-456-1003 Audio
0-700-456-2001 Graphics                0-700-456-2003 Graphics

CHICAGO, ILLINOIS                      DALLAS, TEXAS

0-700-456-1002 Audio                   0-700-456-1004 Audio
0-700-456-2002 Graphics                0-700-456-2004 Graphics



    Editor's Note: Well that's the end of the this file.  Hope you learned a
lot about how AT&T ALLIANCE Teleconferences really work.  I hope you have
enjoyed reading this file as I had typing it.  (Yeah right...hehe.)
next time you are on an AT&T ALLIANCE Teleconference you'll now exactly
how they work.


 ------------------------------------------------------------------------------


                -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 5 of 11

 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
                                ANARCHY TiMES
 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
                             All Rights Reserved
                              Released on 04/92
                               Property of UPi
 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD


                            Last Week of School

 Ok you're one week away from your two month trippin' period... BUT! You
 don't want the bunch of fuckers to forget about you hehe? Well here are
 a few way of making sure you'll have the best days of your life next year.

 First : A few things are in and many are totally out.

 IN : Bombing
      Vandalism
      Assassination <NOT! You want the teacher to suffer from you again.>
      Black Mailing


 OUT: Kiddie stuff like : "I'm going to kill your wife... Sir..."
      Stupid prank of the Full-Of-Shit-Paper Bag-Caught-On-Fire-That-The
      -Teacher-Will-Try-To-Extinguish-By-Jumping-On-It.

 Anyhow you get the idea of what TO do and what NOT to do.


 - Bombing -

 I won't go over the various explosives substances, because their are many
 good text philes on these babies.  Get you hands on "The Anarchist Cookbook"
 published by God-Know-Who, it explains how to make various explosives.

 What to bomb ?? Easy Teacher's Restroom, Cafeteria's garbage can,
 janitor's bin, and other school property. To blow the teacher's rest room,
 I would not advise using a Light Activated bomb that'll blow up when the
 teacher lift the lid of the bowl. I'd rather suggest a good ol' plastic
 based explosive placed right in the tank [Scheme 1]

VDDDDDDDDDDDD[ Scheme Number 1 ]DDDDDDDDDDD7  This explain where to place
:        _____                             :  the bomb. If you can, wrap
:        |Z?  |        Z?                  :  the explosive in a plastic
:        |@#  |  /     @Y= Plastic Charge  :  bag to avoid water damage on
:        |    | /      # = Timer Fuse      :  the timer. You wouldn't want
:        |____|/_    _                     :  it to go off right under a
:          33  3 ---- )                    :  teachers ass would you ?
:          33  3     /                     :
:     DDDDDY@DD/DDDDD\                     :
:                                          :
SDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD=

 - Vandalism -

 This, I'm sure everybody has performed at least once in his life. Either
 by painting a complete wall, or only by writing his name on a desk. Well
 why don't you combine the two of them ? PAINT your NAME on a DESK nailed to
 a WALL ??? NOT! Here it goes... Usually, school invest in cheap art pieces.
 Sometime, it's a statue of the school's funder, or painting of some smart-ass
 dope weirdo, that made big bucks by painting little fucked up square in
 puke colors. Well the statue is pretty easy to wreck, just saw the heads
 off the rest of the body. Or glue a Dick and two balls just in the right
 place. If you're daring enough, remove the statue from one school, and switch
 the two of them. Only problem here is transportation. Another neat trick is
 to offer an haircut to the jerk. Make him a red, white and blue mohawk, or
 paint it in more living colors, smear artificial blood everywhere.

 Okie painting? Use some sort of thinner to fix these up. Fill a squirt
 gun with some Varsol (tm) and spray-n-wash (tm) the thing... It's just gonna
 look a bit more psychadelic... WHO GIVES A SHIT ?!??!?

 Break-In and Entering a school. Easy if the school is cheap, just enter by
 breaking a window. If not, try the roof, or pick some lock, get to the
 principal's office. Make some re-decoration thing. Take the previous
 mentioned statue and allow him to sit in the principal's chair... Or HANG
 the statue in the principal's office... What else ? Hang the PRINCIPAL'S in
 his office. Paint some devilish signs in the office, and use the desk as
 a ceremonial table... Spill some sheep blood everywhere, and leave a sheep's
 dead carcass lying around. Now... Something that work all the time, is to
 connect the phone to the intercom. If you're smart 'nuff you will figure
 out a way to make the intercom go online as the fucker lift the receiver.
 Sure... It may take some time to fix, but hey! Who said pranking was easy ?

 - Various Fraud -

 Ok, lock pick your way inside the teacher's wardrobe. In there you will
 most probably find some various shit as Kleenex (tm), Kotex (tm), and you
 might even find some useful thing... Cash, Credit Card, Calling Card,
 agenda, driver's license, and various paper (Which we'll use later, to
 blackmail the subject). Also, rule #1 of Break-In, is PUT BACK EVERYTHING
 IN IT'S PLACE ! You don't want them to notice that someone browsed through
 their possessions.

 Cash is always useful, but be sure not to get your ass jailed.  I'm
 sure that if you find cash you'll know what to do with it.

 Credit Card, well again here, you probably know what to do with it, but
 one thing : DO NOT STEAL THE CARD... Note the Number, Expiration Date, and
 every information you can, but for god sake, leave the card in place... If
 the card is missing, the asshole will cancel it in the following 24 hrs.

 Calling Cards, must I remind you that THESE are FUCKEN' UNSAFE ?? I got
 nailed for nearly 450$ once, and promised myself not to ever use one of
 these on my own line. Use them for pay-phone transactions.  It's pretty
 useful and can save you lotsa bucks.

 Agenda's are mostly used to pick up owner's street address, phone number
 birth date, and various information ranging from friend's phone, password
 on the school net, and shit like that.

 The driver's license, you can take. No one will care, beside him, perfect
 when you need false ID, and shit like that.

 Papers, who said there was nothing interesting in the phone, gas,
 electricity and other kind of bills? phone bill can supply you phone number
 and sometimes, Calling Card numbers, and Gas bills, well, these are not as
 useful as phone bill, but still, you can rip off address and phone number.
 Electricity bills are the same as gas bill. One thing you should look for is
 the receipt that the subject collects from various sources. I know for one
 that gas stations emit receipts when you pay by Credit Card. Seek them out.


 - Blackmailing -

 If you really want to piss off you mark, this is the way to go first,
 let me tell you that sticking newspaper letter on a piece of paper is not
 the best way. It's long and it's dirty too, I'd rather suggest that you
 use some of the modern ways of blackmailing, phone and Typewriter. If
 you're good at that, you can fool around with pictures, sending your
 favorite teacher a letter containing pictures of him and another chick in a
 whorehouse, or a picture of him in a gay bar. If you prefer the old way,
 ask him to give you 500$ if he wants his dog back alive...Include a picture
 of the dog hanging to a rope. Then, you'll have to plan for a collect site
 ... Again, Public park garbage can are NOT recommended... You would prefer
 a dark alley which you've sweeped out completely for cops and various
 unwanted people... Clearly state in your letter that if cops are warned, or
 that if he's not alone, the animal will be tortured and the mutilated before
 being killed. Ok...Enough bullshitting... Blackmailing is useful, because
 you can get almost everybody to do whatever you want, and whenever you want
 them to do it.

 This, I hope will keep you busy until the end of the school year.

 - Assassination -

 Yeah, I know, I wasn't supposed to cover this in, but what the heck. I
 feel like it today (Rainy Day, Bad Day at school etc).

 One of the best way to kill or seriously harm somebody with the less chances
 of you getting caught, is your mark's car... A gas tank could easily catch
 on fire while he's driving the car.

 Follow the next simple steps to clean assassination.

 1. Find out where the asshole lives.
 2. If the car is in a garage, forget it, and wait 'till the car is out.
 3. Always do this at night, you don't wanna be seen.
 4. Open the tank and check if it's full, you don't want him to see you
    messed with the tank.
 5.
 VDDDDDDDDDD[Scheme Number 2]DDDDDDDDDDDD7   Ok. Remove the back light cover
 :  \_______                             :   on the gas tank side, and just
 : _ _.---._)                            :   hook a wire on the red wire that
 :(_[o]  /__| <- Break Light.            :   is supposed to be there. Hook
 : __       |     _ _                    :   another on the black wire.
 : _  \     |    (_[o] = Opened Gas Tank :   Discreetly tape the wire with
 : _)  ]___/                             :   transparent tape the closest
 : ___/          .---. = Wiring          :   possible to the car, and open
 SDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD=   the gas tank. now, twist the
 wires together, and work them the deeper you can in the tank. You may need
 a screwdriver to pierce a hole through the small metal net that stop thieves
 from suckin' the gas from the tank. Now, just stick the cover back in place
 and close the tank. If your thing is too obvious, the guy will probably
 check it and remove it, but if it's concealed enough, he's cooked the next
 time he'll hit the break... 'Cuz if you have not yet figured out what is
 gonna happen, well... The two wires will induce a short circuit, which will
 most likely produce a spark, which will ignite the fumes, and BAM!


 - Basic Anarchy -

 This is a `Say Everything that is nasty and comes out of your head' section.
 In here, I will give you a few tips, and let your brain do the hard work.
 Which is : Gathering the material and putting the thing in place...

 1.  Light the neighbor's tree(s) on fire.

     Simple. Make some napalm ( Gas and Palmolive <tm> in a can + an
     ammonia tablet which is to fall into it...), and put it under the
     tree...You'll have about 5 sec to run away, before the things
     transform into a fireball. You can light various things with
     napalm... Skunks, Rats, Skin Heads, Dog, Krishna, or your favorite
     ethnic minority specimen.

 2.  Smoke Show...

     Take about 4 gal. of Gas, pour it into a sewer and light the
     things out... The sewer will catch on fire and everything in it
     (Shit,Dead rats,dead skunks,dead skin heads, dead krishna...)
     will catch on fire too... Emitting a large amount of smoke, which
     will be grey, and will stink like a living-dead congress in Brazil.

 3.  Kar Krash...

     For that one, you will need a few screw drivers, 6" nails, a hammer
     and lotsa guts. Go out at night spot your favorite neighbors car.
     nail is tire valves, so when he removes the nails, the tires will
     flat out. Then, take a flat screwdriver, and push it through the car
     locks. Take a Phillip's one, and make the hole bigger, being sure
     that the lock will be useless... On certain car, you can even unscrew
     the back windows (Honda, Hyundai) and then, you can slash the entire
     car interior.

 Well... This wrap it up for this issue. Greets are out to : TLA, Arch Bishop
 The Darkman, Frozen Tormentor, Dark Angel, The Black Legend, LTD, Mind Bomb,
 Prince of Thieves, and to all Anarchist out there.
     ____
    / /\ \
 --(-/__\-)--
    X____X  narchy Rules. Call NDC (514)899-5435 and leave me mail.
   /      \

 - Disclaimer -

  This file is intended to various illegal use. The author here by
  is not to be involved in these activities. (Well, somebody must
  have tried these out hehe?) And you pigs can't fucken' do anything
  about it. God Bless the 1st Ammendment!

                                        Silicon Phreaker


 ------------------------------------------------------------------------------


                -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 6 of 11

                             How to make a million
                         dollars in your own basement!

                        
                                  By VC Hacker


How do you make a million dollars in your own basement? EASY!
Grow Marijuana! It is possible to grow a higher quality product
indoors than those normally available on the street! The most
important step is choosing your "strain". Try to pick some seeds
>from the best pot you ever smoked. Or if possible get some
"clones" from someone already growing. Follow these simple rules
and you can achieve yields anywhere from 3 to 8 ounces of dry bud
marijuana (with no seeds!) per plant!

Step 1
------
Location. Choose a site which has easy access to water and hydro,
yet is somewhat discreet, and will facilitate ventilation ducts
leading directly outdoors.

Surround Growing Area with a heavy reflective material. This will
keep bright lights from shining out, make the area airtight, and
reflect the excess light back onto the plants. A flat white
plastic (available at some garden centers) is ideal.

Next, run a water hose into the room. It is best to have a Y type
connector hooked up to the hot and cold so you can make the water
lukewarm.

It is time to get some Hydro. Using minimum of 14 gauge wire, run
power directly from source. It is not advisable to use the wall
outlets unless you know for sure there is nothing else on the cir-
cuit. Remember, you will need 1 15 Amp circuit for every light.

Now you are ready for ventilation. Run an intake fan into the area
using duct work. This air must come from outdoors. The intake
should enter the room near the floor, and have a damper on it
to prevent air from leaking in while the fan is off. An exhaust
fan will need to be located on the opposite wall, near the ceil-
ing and leading directly outdoors. The ventilation system must be
able to clear the entire area in 5 minutes. To figure out what
size of fans and duct work, calculate the total cubic footage of
the area. Then, divide it by 5. That result is the approximate
rating of the fans in CFM. Find the closest to that rating with
out going under it, and use the corresponding size duct work. Both
fans should be run using a thermostat. The proper temperatures
will be discussed later. Although the ventilation is probably the
most intense part of setting up your grow-room, it is also one
of the most overlooked parts. IT CAN MAKE OR BREAK YOUR SUCCESS!

Step 2
------
Now, choose how many lights you want to run. One 1 000 watt
light will light approx. a 10 by 10 area, while in vegetative
state. Go to a Hydroponic store or Electrical wholesaler and
purchase 1 000 Metal Malide lamps. Later, when your plants are
in flowering, you will need an equal number of High Pressure
Sodium lamps. Remember to run only one light per 15 amp. circuit.
You still have enough room to run fans on a circuit with one
1 000 watt light. Hang the lights on chains so they can be raised
or lowered.

Now, start your seeds or clones. It is most advisable to start
them under fluorescent tubes until you see roots coming out of
the bottom of the pots. Then, transplant them into 4 to 5 gallon
pots with PRO-MIX BX (available at garden centers) and place them
in the grow room. Limit yourself to 6 to 8 plants per light.This
may not seem like much at first, but they grow quick! Lower the
lights so they are 6 or so inches away. It is important to keep
the lights as close as possible to the plants without burning
them.

Run the lights on Timers, so they operate 18 hours per day. It
is usually easier to control the temperature if you run the
lights at night.

After about a week it is time to start fertilizing. Get some
18-9-27 fertilizer (any garden center) and mix according to the
directions. When the plants are dry about 3 to 4 inches under the
top of the soil, it is time to water. Water one time with fertil-
izer, one time without. Every 2 weeks flush out each plant fully
with 5 gallons of pure water. This will clean out all unused
nutrient and keep plants healthy.

During this whole time the thermostat should be set to keep the
room temperature at 80 degrees.

Step 3
------
After 4 weeks of vigorous growth your plants should be ready to
flower. Usually they should be 36 inches in height.

It is time to add the High Pressure Sodium lights. Change the
light cycle to 12 hours. This will trigger the plants into
flower production (buds!!!).

Obtain 10-52-10 fertilizer. This will stimulate the maximum
flower growth. Mix as to directions, and apply the same as above.
As above, flush plants out every 2 weeks.

Thermostat should be set a little higher during flowering. Usually
80 to 85 degrees, depending on the strain.

After about 2 weeks of flowering the gender of the plants will
start to show. Female plants will have little white hairs at
every branch node, and male plants will have 2 little balls
hanging underneath. Remove and destroy all the male plants. They
do not produce any buds, and will cause you to have seeds in
your crop.

Now, let your remaining female plants flourish for 6 more weeks.
For the last 4 to 5 days it is a good idea to use only fresh water
with no fertilizer in order to clean the nutrient out of the plant
and allow the true taste of the strain to prevail. This will allow
in sweet, flowery tasting buds.

Step 3
------
 When your buds are nice and big and fluffy, it's time to cut 'em
down. Plant by plant remove all bud material and separate all the
leaves from the bud. Throw out the leaves. The remaining bud may
be dried on screens, or even on newspapers spread on the floor. It
is most advisable to dry it in a cool, dark place as THC's biggest
enemies are heat and light. This will keep your pot fresh and
potent. Normal drying time is 3 to 4 days.

Now, obtain 4 things: 1) Zip-Loc bags 2) Scale 3) Zig Zag White
Rolling Papers 4) Matches. Roll a big reefer, get stoned, weigh
out some dope, and make some money!



P.S.  Aluminum briefcases are very handy for burying money. They
are air and watertight, and can hold twenty-thousand dollars
worth of 20's!


Have Phun


 ------------------------------------------------------------------------------

                -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 7 of 11

             The Beginner's Guide To Hacking On Datapac 1992 Update

                          Written By The Lost Avenger


    Welcome to once again to the first return issue of the UPi newsletter.
This file was originally released for Spectrum Issue #1, and then re-released
in the very first UPi Newsletter (Volume 1, Issue 1) and from there I have now
decided that the public's positive reaction to this file was still so
tremendous that it made me decide to re-release the file again and also
re-write and update it to the 1992 specifications for Datapac.  Hope you enjoy
reading this file as I did writing it.

    After reading through my large collection of g-files.  I have found that
there hasn't been a good text file for beginner about hacking the Datapac
network.  This guide will give a general incite on how to identity different
types of operating systems when you are hacking about Datapac, and on generally
basic information about Datapac.  I hope this will give you more knowledge
about the Datapac network to help get you started.  Hope you learn a lot about
Datapac and enjoy reading it at the same time.  I have released this file in
UPi Issue Number 1 but I have updated it and re-releasing it.

    These are the ten rules of hacking that I go by when I hack around on
systems.  These rules are important in order maintain from being caught or
discovered illegally hacking on a system.

I.    Do not intentionally damage *any* system.
II.   Do not alter any system files other than ones needed to ensure your
      escape from detection and your future access (Trojan Horses, Altering
      Logs, and the like are all necessary to your survival for as long as
      possible.)
III.  Do not leave your (or anyone else's) real name, real handle, or real
      phone number on any system that you access illegally.  They *can* and
      will track you down from your handle!
IV.   Be careful who you share information with.  Feds are getting trickier.
      Generally, if you don't know their voice phone number, name, and
      occupation or haven't spoken with them voice on non-info trading
      conversations, be wary.
V.    Do not leave your real phone number to anyone you don't know.  This
      includes logging on boards, no matter how k-rad they seem.  If you
      don't know the sysop, leave a note telling some trustworthy people
      that will validate you.
VI.   Do not hack government computers.  Yes, there are government systems
      that are safe to hack, but they are few and far between.  And the
      government has infinitely more time and resources to track you down than
      a company who has to make a profit and justify expenses.
VII.  Don't use codes unless there is *NO* way around it (you don't have a
      local Telenet or Tymnet outdial and can't connect to anything 800...)
      You use codes long enough, you will get caught.  Period.
VIII. Don't be afraid to be paranoid.  Remember, you *are* breaking the law.
      It doesn't hurt to store everything encrypted on your hard disk, or
      keep your notes buried in the backyard or in the trunk of your car.
      You may feel a little funny, but you'll feel a lot funnier when you
      when you meet Bruno, your transvestite cellmate who axed his family to
      death.
IX.   Watch what you post on boards.  Most of the really great hackers in the
      country post *nothing* about the system they're currently working
      except in the broadest sense (I'm working on a UNIX, or a COSMOS, or
      something generic.  Not "I'm hacking into General Electric's Voice Mail
      System" or something inane and revealing like that.)
X.    Don't be afraid to ask questions.  That's what more experienced hackers
      are for.  Don't expect *everything* you ask to be answered, though.
      There are some things (LMOS, for instance) that a beginning hacker
      shouldn't mess with.  You'll either get caught, or screw it up for
      others, or both.

    I think in my own opinion the best way to find systems is by scanning them
out.  Getting them off a board or off a friend is not very safe as they may
already have been hacked to death.  Now you are probably wondering how you scan
for systems, well this is what you do.  First you select a four digit number
representing the area you want to scan, for example 4910 or something like
that.  What you do from there is when you connect to the Datapac network (See
Part V for more details on how to connect to Datapac) you type ".." and press
enter.  You should get some kind message such as "DATAPAC: XXXX XXXX" (with
XXXX XXXX the Datapac node number you are on).  Once you get that message you
will enter a four digit number (the prefix) that you have selected, but don't
press enter yet.  After that type in another four digit number (the suffix)
your have selected and press enter.  Datapac will give respond to that by
giving you a Network Message which is discussed later (see Part VII for the
Datapac Network Messages).  These messages will tell you if the system you are
trying to reach is out of service, up, busy, and so on.  If you have
successfully connected to a system and want to disconnect from if and go back
into Datapac type in the following string "<Control>-P Clear <Enter>".  To
continue scanning for more systems just keep on adding one to the last digit of
the number in the suffix that you entered before and press enter.  To keep on
scanning just continue this until whatever suits your needs, for example you
may start scanning at 4910 0000 and could stop scanning at 4910 1000.

    Ok now in this section I will discuss on how to connect to the Datapac
network.  Ok what you do to connect to Datapac is first make sure you computer
is on.  Then you load your terminal program, next call your local Datapac
node.  Once connected type to Datapac type in "..<Enter>".  Datapac will
respond to this with the following message:

    DATAPAC: XXXX XXXX

The XXXX XXXX is the Datapac node number you are on.  If you have a Network
User Identifier (NUI) then you can enter it in the following way, if you don't
have one then skip this part:

    NUI <Your NUI> <Enter>

you will then see the next message:

    PASSWORD:
    XXXXXX

If Datapac did not send that message then that means that NUI that you entered
is not a valid one.  If you did get this message then enter the password
assigned and press enter.  Datapac will respond with either one of the
following messages:

    DATAPAC: network user identifier <Your NUI> active.

which means that the password entered is correct or

    DATAPAC: network user identifier error

which means that the password entered is not correct.  Take note that if you
have the valid NUI and it is on and you want to turn it off then type in the
following command:

    NUI Off<Enter>

>from there Datapac will send:

    DATAPAC: network user identifier not active

which means that you are no longer using the NUI, which also means that won't
be able to connect to NUA's  that don't accept collect calls.  Once you enter
in all that information.. you can know enter in a NUA.  To enter in a NUA just
type in 1+DNIC+NUA (example 1208057040540 for QSD).  If you connect to the NUA
properly then you will get this message:

    DATAPAC: Call connected to: XXXX XXXX

The XXXX XXXX is the NUA that you have requested to connected to, otherwise it
will display a different message which is discussed later on in this document.

    When a Datapac call is established through the network, a call connected
message is received at the originating DTE.  All or some of the following
messages may be identified depending on the type of call, options used for the
call, and the type of destination.

Example:

[HUNTED] [BACKED UP] [BACKED UP & HUNTED]
[i LCN] [P/N PACKETSIZE: (128 OR 256)] [NUI (6 to 8 CHAR)CHARGING]
[CUG:(CUG#)] [REVERSE CHARGE]

MESSAGE                         EXPLANATION

Call connected to: XXXXXXXX     A virtual circuit has been established between
                                an originating DTE and a remote (receiving)
                                DTE.

Hunted                          The remote logical channel is part of a hunt
                                group.

Backed Up                       The call attempt to the remote DTE has failed.
                                The network has re-directed the call to another
                                predetermined DTE that has been optioned as
                                backup.

i                               The call has been placed to an international
                                address.

P                               Priority service.  Packet size: 128.

N                               Normal service.  Packet size: 128 or 256.

DNA                             Data Network Address of the originating DTE.

LCN                             Logical Channel Number of the recipient DTE.

NUI                             The call will be billed to the 6 to 8 character
                                Network User Identifier.

CUG                             The recipient DTE is part of a closed user
                                group.

Reverse Charge                  The recipient DTE has accepted the charge
                                associated with the established call.

    There are thirty-three messages which may appear when you are accessing the
Datapac network.  All of these network-generated messages which are sent to a
terminal, are written as "Datapac: text".  The "text" will be one of the
following messages:

ADDRESS
    This is a Datapac herald message for an SVC terminal.  The "address"
displayed is your Datapac network address.  This message indicates that you are
connected to the Datapac network.  Proceed with the call request command.

{P,R} TERMINAL ADDRESS -- (DESTINATION ADDRESS LOGICAL CHANNEL)
    This is a Datapac herald message for a PVC terminal.  It indicates that you
are connected to the network (address and destination address)

CLOSED USER GROUP ERROR INVALID ADDRESS, MORE THAN 12 DATA CHARACTERS, or COMMA
REQUIRED BEFORE DATA CHARACTERS
    These messages indicate an error in the call request command--correct and
re-enter the command.

CALLED BY [P][R] or [N][I] ADDRESS (XXX)
    This message indicates that a host or terminal has called you.  Proceed
with sign-on.  (Note: P or N denotes grade of service.  R specifies the
charging option, if applicable.  I specifies that it is an international call.
(XXX) specifies the logical channel number if it is a national call, and
specifies the gateway id if it is an international call.

CALL CONNECTED
    This message indicates that the SVC connection between your terminal and
the destination has been established successfully.

RE-ENTER
    This message indicates that a transmission error has occurred in the
current input line.  Re-enter the line.  If the problem persists, report the
trouble to Telecom Canada.

INPUT DATA LOST
    This message indicates that a transmission error has occurred.  Since part
of your input line has already been transmitted to the destination, enter a
"line delete" character for your application and a carriage return (CR).  When
the destination replies, re-enter the line.

PARITY ERROR
    This message indicates that a parity error has occurred in the current
input line from a terminal which is operating in echo mode.  The character
which is in error is not echoed.  Re-enter the character and continue normal
input.  If the problem persists, report the trouble to Telecom Canada.

INPUT ERROR
    This message indicates that there is a network problem, due to overruns.
If the problem occurs often, contact Telecom Canada.

PVC DISCONNECTED - TEMPORARY NETWORK PROBLEM
    This message indicates that a network problem is preventing the requested
call from continuing.  Wait for the Datapac herald message, then continue.  If
the condition persists, contact Telecom Canada.

PVC DISCONNECTED - DESTINATION NOT RESPONDING
    This message indicates that either the access line to the destination, or
the destination itself is down.  Try again later.  If the condition persists,
contact the destination.

PVC DISCONNECTED - REMOTE REQUEST
    This message indicates that the destination has asked that the connection
be discontinued.

INVALID COMMAND
    This message indicates that there is a syntax error in the command.
Correct it and re-enter the command.

COMMAND NOT ALLOWED
    This message indicates that the command which was entered, although
syntactically correct, cannot be implemented either due to the NIM state, or
because it violates and/or conflicts with the service options selected --e.g.,
a call request command, when an SVC is already established.

CALL CLEARED -- DESTINATION BUSY
    This message indicates that the destination computer cannot accept another
call.  Try again later.

CALL CLEARED -- INCOMPATIBLE CALL OPTIONS
    This message indicates that the call request command includes facilities
which are not available at the destination or are incompatible with it.  Verify
and try the call again.  If the problem persists, contact the destination.

CALL CLEARED -- TEMPORARY NETWORK PROBLEM
    This message indicates that a network problem has occurred--try again
later. If the problem persists, report it to Telecom Canada.

CALL CLEARED -- DESTINATION NOT RESPONDING
    This message indicates that the destination is either not acknowledging
your request to connect or it is inoperable.  Try again later.  If the problem
persists, contact the destination.

CALL CLEARED -- ACCESS BARRED
    This message indicates that the network has blocked your call because of a
Closer User Group violation.  Verify the call establishment procedures with the
destination.

CALL CLEARED -- ADDRESS NOT IN SERVICE
    This message indicates that the network address in the call request command
identifies a non-existent destination-- i.e., the address is not yet (or is no
longer) assigned.  Verify the address and re-enter the call request command.
If the condition persists, contact the destination.

CALL CLEARED -- COLLECT CALL REFUSED
    This message indicates that the destination is not willing to accept the
charges for the connection (e.g., it does not accept calls from Datapac public
dial ports).  Verify the call establishment procedures and try the call
again.  If the condition persists, contact the destination.  (See Part VII and
Part VIII for more information.

CALL CLEARED -- LOCAL PROCEDURE ERROR
    This message indicates that a network protocol error has occurred.  Try the
call again.  If the condition persists, report the trouble to Telecom Canada.

CALL CLEARED -- REMOTE PROCEDURE ERROR
    This message indicates that a destination protocol error has occurred.  Try
the call again.  If the condition persists, contact the destination.

CALL CLEARED -- LOCAL DIRECTIVE
    This message indicates that a virtual circuit has been cleared in response
to a clear command from a terminal user.

CALL CLEARED -- REMOTE DIRECTIVE
    This message indicates that a virtual circuit has been cleared in response
to a clear request packet from the destination.

CALL CLEARED -- REMOTE REQUEST
    This message indicates that a virtual circuit has been cleared in response
to an invitation from the destination to clear the call.

RESET -- TEMPORARY NETWORK PROBLEM
    This message indicates that a network problem has occurred on the PVC
connection.  Wait for the Datapac herald message, then continue.  If the
condition persists, report the trouble to Telecom Canada.

RESET -- DESTINATION NOT RESPONDING
    This message indicates that the destination end of the PVC connection is
not responding-- i.e., either the access line to the destination, or the
destination itself, is down.  Try again later.  If the condition persists,
contact the destination.

RESET -- LOCAL PROCEDURE ERROR
    This message indicates that the PVC has been reset because of a network
protocol error.  Wait for the Datapac herald message, then continue.  If the
condition persists, report the trouble to Telecom Canada.

RESET -- REMOTE PROCEDURE ERROR
    This message indicates that the PVC has been reset because of the
destination protocol error.  Wait for the Datapac herald message, then
continue.  If the condition persists, contact the destination.
    If the host computer is connected via the ITHI option, this message
indicates that data has been disregarded due to the host not reacting to flow
control conditions sent by the PAD.

RESET -- LOCAL DESTINATION
    This message is the network's response to a reset command from the terminal
user.  Continue.

RESET -- BY DESTINATION
    This message indicates that the destination has reset the virtual circuit.
Data may have been lost.  Continue.  If the condition persists; report it to
the destination.

RESET -- TEMPORARY NETWORK PROBLEM
    These messages indicate that the network has reset the switched virtual
circuit.  Data may have been lost.  Continue.  If the problem persists, report
it to Telecom Canada.

RESET -- LOCAL PROCEDURE ERROR
    These messages indicate that the network has reset the switched virtual
circuit.  Data may have been lost.  Continue.  If the problem persists, report
it to Telecom Canada.

    Well let me just get back and discuss something that I was talking about
before but didn't go into any great detail about.  The Network User Identifier
(NUI) is a credit card-like system associated with the Datapac Network -
similar to a calling card used to bill long distance calls.  A NUI is a 6-8
character alphanumeric code which is entered during call set-up to indicate an
account to which Datapac calls may be billed.  Associated with each NUI is a
password which is used as a security check when establishing a connection to
the Datapac network.  The password is confidential, known only to the user.

    The purpose of a NUI is to allow a Datapac user to make use of the Datapac
network for data communications without the requirement of a dedicated Datapac
connection or the need for the destination to accept reverse charge calls.
Once the NUI/password pair has been correctly validated, the call is set up to
the requested destination and call usage billed to the NUI/Datapac account
number.

    At call set-up time, the user specifies the NUI and password to the
network.  The password is used by the network to authenticate the use of the
NUI.  After the NUI/password pair has been correctly validated (process whereby
NUI/password is checked by NUI application), the user will be able to bill all
subsequent session usage to the specified NUI.

    There are many useful applications for NUI.  NUI, when provided to
authorized users, can eliminate the need for host to accept reverse charge
calls.  NUI is required by users of public dial who are placing calls to a host
application with the reverse charge blocking option.  NUI permits subscribers
of dedicated and private dial Datapac services to "Third Party" usage charges
to a NUI account.  For example, some users may decide that they do not want
usage charged to the dedicated access line which they are using (i.e., if using
someone else's line/terminal).  By entering the NUI, all usage for subsequent
calls during the same session would be billed to the account associated with
the specified NUI.  NUI permits sender paid calls to domestic Datapac network
addresses and to foreign networks.  Users can make international calls to
overseas networks and charge the call usage to their NUI when using public dial
ports.  Offshore networks accessed via Teleglobe do not accept collect calls.
Users also have the capability of placing sender paid calls to Domestic Datapac
addresses, Telenet, Tymnet, Autonet, ACUNET and DASNET in the United Sates.
NUI is required to complete calls using Datapac indial/outdial ports (i.e.,
devices at destination not connected to Datapac).  NUI can be used to achieve
benefits of departmental accounting.  The Datapac bill is itemized to indicate
the charges related to each NUI.  This will assist in determining which
department has generated usage and the associated charges.

    There are two main components to Datapac billing which is access and usage
Both are billed on a monthly basis.  These are the monthly recurring charges
for dedicated access to the Datapac network.

    Included in this component are; Service charges - The one time service
charge associated with a request for new service or a change to an existing
one.  Monthly charges - The recurring charge for basic dedicated access to the
Datapac network.  Other monthly - The additional recurring charges for any
optional charges features or enhancements (additional VCs, PVCs, CUGs, etc.) to
a dedicated access.

    These are the charges for the variable amounts of customer data sent to and
>from the network.  Included in this component are; Hold charges - Per minute.
This applies only to Public Dial Port and International calls.  Call set-ups
(Call Requests) - Per attempt.  Does not apply to Permanent Virtual Circuit
(PVCs) arrangements.  Resets - Per occurrence when generated by the customer.
PAD usage - Per segment*.  Applies to all services except Datapac 3000.
Network usage - Per segment*.  Rateant  the grade (1,2,3) of the
cities involved (DPSAs) and the distance between them.  Surcharges - An
incremental 5% to 25% surcharge applies to network usage when a premium
throughput class is ordered.  - A 25% surcharge applies to network usage with
customer requested Priority calls.  NUI - although this is a recurring monthly
charge, it is grouped with usage for billing.

    Billing of data packets in Datapac is done in segments and commonly
referred to as KILOSEGMENTS (1000 segments).  In most cases, one segment is
equal to one packet containing from one to 256 characters.  There are some
exceptions; Priority packets - Are a maximum 128 characters and are billed as
one segment, surcharge applies.  512 character packets - Are billed as two
segments.  Packets to/from U.S. networks - Are a maximum 128 characters and
are billed as one segment.  Packets to/from Overseas networks - The
international standard packet size is a maximum 64 characters and is billed as
one segment by Datapac.  Some overseas networks have 128 character packets but
these are billed as two segments.

Network User Identifier (NUI) Charges

                                    Monthly          Service
                                     Rate             Charge

General NUI                          $2.40            $75.00
Corporate NUI                       $50.00           $125.00
Sub-NUI                              $2.40         No charge


General Access Rates

                                      Monthly        Service
                                       Rate           Charge

Closed User Group (CUG)                $1.35          $75.00
  - no charge for CUG options
Reverse Charge Call Feature            $1.35          $22.00
Direct Call Feature                    $4.20          $75.00
Hunt Group                            $55.00          $22.00
Call Redirection                     $157.00          $22.00
- additional charge for diversity
  where available


Usage Rates

Datapac usage includes the following billable components:

Hold Time (1,2)        $0.04/min.    Public Dial and
                                     International ONLY
Call Set-up            $0.01 each    Public Dial/SVCs ONLY
Reset                  $0.01 each    Customer initiated ONLY
PAD usage (1,2)
    Datapac 3101       $0.50/kilosegment
    Datapac 3201       $0.85/kilosegment
    Datapac 3303       $0.70/kilosegment

Network Usage (1)      see following table based on distance
                       and grade

(1) A 25% discount applies to these components for calls initiated and
    completed between 7 PM and 7 AM and on weekends and certain holidays.
    Applies to ** PUBLIC DIAL ONLY**.

(2) PAD and Hold Time charges are applied at both the calling and called end,
    where applicable.

                         M I L E A G E

DPSA (city)      1-100     101-400     401-1000       1000+
-----------      -----     -------     --------       ------
1 to 1           $0.40      $0.65       $1.06          $1.80
1 to 2           $1.01      $1.70       $2.33          $3.50
1 to 3           $1.70      $3.50       $4.13          $4.77
2 to 2           $1.75      $3.34       $4.24          $5.57
2 to 3           $2.44      $4.24       $5.30          $6.41
3 to 3           $3.13      $5.30       $6.36          $7.00


         cities are grade 3 DPSA's

    The Datapac Summary Usage Statement is monthly statement is free of charge.
It is a summary of all calls that have been billed to the addresses or NUIs
that are part of an account for that billing period

    Because this is a summary, it is not possible to accurately reconcile the
details of any totals on this statement. This is due to the standard accounting
practices of rounding rules, minimum charging and taxing procedures that have
been applied.  If your organization needs this capability, it must be done from
a Detailed Usage Statement.  There are other options that can be considered to
meet these needs such as; reverse charging, NUI, separate accounts or division
codes (where available).  Please discuss this with the Sales Representative of
your local telephone company.

    In addition to the customers account number, dates of the billing period
involved, tax totals and grand total, the following information is supplied;
Billed Address (or NUI and city); Other Address (or City Code if Public Dial
call), # of calls, # of resets, billable units (kilosegments), indication of
surcharges (if applicable), duration of calls, hold charges (if applicable),
and usage charges; A sub total of all above information for each billed address
and Service type of each address

    This information is sorted in descending numerical/ alphabetical order.
This same information is given for the U.S.  and Overseas Summary Usage
Statements and is grouped by Packet Switching Network name.

    A new format for the Datapac Summary Usage Statement will begin
introduction in mid to late 1991.  Improved methods of grouping, sorting and
reporting usage have been introduced as well as some additional details.  Some
major highlights; Title page to display previous 12 months billing history,
page break by service type, sub-totals by service type, final page with
sub-totals of domestic, overseas and International usage with taxes and a grand
total.  The information you need from a summary statement will be easier to
find and handle.

    The Datapac Detailed Usage Statement which is chargeable option.  It is
a monthly statement that details each and every call that has been billed to
the addresses or NUIs that are part of an account for that billing period.

    In addition to the customers account number, the dates of the billing
period involved, tax totals and the grand total, the following information is
supplied for each call; Billed Address or NUI and city, service type, logical
channel (virtual circuit #), throughput class; Other Address and city (only
City if Public Dial call), service type, logical channel (virtual circuit #),
throughput class; Date, local start time and local stop time; Number of resets
(if any); Clear Cause Code; Billable Units (segments) received transmitted;
Call Set-up Class; Hold charges (if applicable); Usage charges and Taxing
province

    This same information is given for the U.S. and overseas calls and grouped
by Packet Switching Network name.

    The calls on this statement are grouped by billed address and other address
then sorted in descending numerical order.  The calls between the Billed and
Other Address are sorted in descending chronological order.

    Each call record on this statement can represent either a portion of or a
complete call.  Under normal circumstances, an accounting record for a call is
generated when a call is cleared, or every 12 hours.  If required, accounting
records can be generated on a call still in session (for variety of network
maintenance reasons).  Therefore, a complete accounting record for a particular
call may appear on more than one line.  Such instances are identified by the
Class and Clear Codes.  If call total is required, it must be calculated
manually.

    Well up to now I have discussed how to connect to Datapac, what a NUI is
and how much it cost for a NUI, summary usage statement, detailed usage
statements and usage statement codes.  Let me changes topics for a minute and
describe the different type of Datapac services available.

    Datapac 3000 is synchronous, application independent service that allows
data terminals (DTE's) and data communicating equipment (DCE) to exchange data
in a packet-mode over a public or private packet switching network.

    The DTE/DCE interface connection, disconnection and transmission rules are
defined in a packet switching protocol called X.25 recommendation which is
developed and governed by the international telephone and telegraph consultativ
committee (CCITT).

    X.25 protocol is a bit oriented framing structure based on the high level
data link control (HDLC).  The CCITT recommendations for X.25 are divided into
three levels, namely:

    The Physical Interface (Level 1) - Specifies the use of four-wire,
point-to-point synchronous circuit between the DTE and the network (DCE).  This
circuit includes two modems or datasets (one connected to the DTE and the other
connected to the network).  Characteristics are: 4-wire point-to-point or dial
via a V.22 bis modem; Full duplex via RS232 convention.

    The Frame Level Logical Interface (Level 2) - Defines the frame level link
procedures used to synchronize transmission, initiate the "handshaking"
necessary to establish the 'R-U-There'/Yes-I-Am sequence, flow control
mechanism and perform error checking of data exchange across the DTE/DCE
interface (link).  the DTE is usually located at the customer premises and is
called host while the DCE is located in the network.  the procedures used to
control the link are defined as commands and responses.  Characteristics are:
HDLC; Link access procedure balanced (LAPB) X.25(80) or X.25(84).

    The Packet Level Logical Interface (Level 3) - Defines the packet formats
and control procedures required to establish a logical path (call request),
exchange information (data packets) and for removing the logical path (clear
request) between the DTE and DCR.  Characteristics are: Logical Channels
(LCN`s); Packet Size; Window Size; And Throughput Class.

    The customer's terminal (Host) is connected to a local modem which in turn,
is connected to a second modem (Remote) in the central office via by 4 wires
which in turn, is connected to a line processing module in the Datapac network.
This configuration is called the DTE/DCE link and can be assigned speeds of
1200 bps through 19200 bps.

    This DTE/DCE link is assigned a unique Datapac network address (DNA) and
other link parameters such as line speed, modem type, flow control and security
by Telecom Canada.

    When the electrical signals are in the correct state as specified in level
1, the Datapac line processing module continuously transmits a CCITT command
called SBMM (Set Asynchronous Balanced Node) to the customer's terminal (Host)
every three seconds.  If the host is ready, it responds to the SABM with a
CCITT response UA (Unnumbered Acknowledgement).  When this occurs, the link is
initialized (level 2 ready), the host and Datapac module exchange restarts or
restart/restart confirmation commands.  When this occurs, the DTE/DCE link
generates a transition to the next X.25 level, level 3.

    The DTE then signals the address it wishes to communicate with in a CCITT
defined call request format (8 digits ), 10 digits if using 9th and 10th digit
subaddressing on a Logical Channel (LCN) Datapac then routes the call request
to the appropriate destination (national or international) and awaits a CCITT
defined call accept packet.  If this occurs, the accept packet is transmitted
back to the originating host and both hosts may now exchange CCITT defined data
packets.  This is called a Switched Virtual Call (SVC); permanent virtual calls
(PVC's) are also offered.  At the end of the session, either host can terminate
the SVC by transmitting a CCITT defined clear request packet.  Up to 255 SVC's
may be supported simultaneously.

    Dial access service is also offered at 2400 bps with a maximum of eight
LCN's over the public telephone network

    Datapac 3000 provides customers with a cost effective service derived from
packet switching technology and X.25 protocol.  Some benefits are: Simultaneous
communication with many (up to 255) different locations, national and
international, error free transmission, system expansion flexibility, cost
containment through reduced host port connections, 24 hours 7 days-a-week
service, lower communication costs, call parameter selection to suit particular
applications.

    Datapac 3101 is a network access service which enables teletypewriter
compatible devices, such as time-sharing terminals, to access the Datapac
network.

    Low speed, asynchronous devices are supported through an Interactive
Terminal Interface (ITI) in a Packet Assembler/Disassembler (PAD), which allows
the devices to access the network over dial-up (DDD) or dedicated access lines.

    ITI, the end-to-end protocol for Datapac 3101 conforms to the CCITT
recommendations X.3, X.28 and X.29 and supports access to the Datapac network
for asynchronous, start-stop character mode terminals.

    X.3 specifies the operation of the pad.  It contains the specifications for
the twelve international parameters and their operation.  Additional domestic
parameters are also in place to meet Canadian market requirements.

    X.28 specifies the command language between the terminal and the PAD.  It
also specifies the conditions which define the command mode and the data
transfer mode.

    X.29 specifies the procedures to be followed by an X.25 DTE to access and
modify the parameters in the pad as well as the data transfer procedure.

    The user needs no special hardware or software to interface a terminal to
the Datapac network.  A knowledge of the ITI procedures is the only requirement
at the terminal end.

    The Datapac 3101 service provides for terminal to host (user's computer)
and terminal to terminal communication.  The host access should conform with
the X.25 protocol, using the Datapac 3000 access service, and also support the
higher level protocol conventions of ITI.  host access may also be provided via
the Datapac 3101 service for some applications.  The Datapac 3101 service also
provides block mode and tape support.

    The Datapac 3201 Network access service which enables various terminals
that are buffered, pollable and operate asynchronously to communicate with host
computers through the Datapac network.

    The Datapac 3201 service is typically used by the general merchandise and
specialty sectors of the retail industry in Canada.  It provides a cost
effective communication solution whenever there is a requirement for sending
small amounts of information to a host computer and obtaining a short response.
The primary applications are on-line compilation of sales data to help in
inventory control, and on-line credit verification to detect fraudulent credit
cards.  Other emerging applications involve trust companies, credit unions,
banks and service stations.

    Datapac 3201 provides support at the customers' terminal end (for example a
retail store) by means of a Packet Assembler/Disassembler (PAD) which is
located in a Telecom Canada member company central office.  The PAD polls the
various devices for information in an on-line real time environment.

    Devices may communicate to the pad via two options: Shared multipoint
multidrop access at 1200 bps, or Dedicated access at 1200, 2400 bps.

    Communication between the PAD and the terminal conforms to the ANSI
(American National Standards Institute) X3.28-1976 ISO (International Standards
Organization) poll/select asynchronous protocol.  Telecom Canada undertakes to
test terminals which support this protocol, prior to connecting them to the
Datapac 3201 network.

    Communication between the customers host computer location and the Datapac
network is accomplished by the use of a X.25 (Datapac 3000) interface which
supports the Datapac 3201 host to PAD "Point-Of-Sale (POS) end to end protocol"
specification.

- Data Collection:  Average 1.7 to 2.3 seconds in the peak periods.

- Inquiry-Response (Credit Check):  Average 2.7 to 4.2 seconds in
  the peak periods.

    A typical retail Datapac 3201 application uses short input and output
messages.  (For example an average of 50 characters).  One kilopacket (1,000
packets or 256,000 bytes) is equal to approximately 1,000 sales transactions or
500 credit authorizations.  Average transaction volume would be less than 5000
packets per day.

    Other optional Datapac network features include Closed User Group (CUG):
Allows devices within one group to communicate only with accredited devices of
the same group, resulting in a high degree of data security.  Additional
options are available to limit call attempts between closed user groups or
within a closed user group, reverse charge call: Allows a user to charge a call
to the destination address, reverse charge call: Reverse charged calls destined
to a Datapac 3201 blocking: address will be blocked by the network.

    Datapac 3303 (BSC) provides polled BSC communications protocol support for
IBM 3270 information display systems or their emulators.

    Datapac 3303 (BSC) supports all the typical on-line inquiry response and
data entry applications normally accessed with these 3270 terminal clusters.

    Datapac 3303 (BSC) is a PAD based service.  The 3270 controllers connect to
the network via PAD's (Packet Assemblers/Disassemblers).  PAD's perform the
host functions of communicating with the 3270 controllers in the binary
synchronous communications polling protocol, and in doing so, eliminate
cross-network polling.

    Datapac 3303 (BSC) connections are dedicated facilities (one per
controller) at speeds of 2400, 4800, or 9600 bps.  A virtual circuit is
maintained for each terminal across the network and out to the host at the
other end via a Datapac 3000 line.  Most Datapac 3303 (BSC) connections
dialogue with hosts that are running Telecom Canada's Datapac access software
(DAS) in their IBM 3720, 3705, 3725 or Amdahl look-alikes front ends.  DAS
supports X.25 connecting.  To the network via Datapac 3000.  It also supports
the end-to-end protocol transporting the 3270 data across the network.

    Aside from lower communications costs, the main reasons for using Datapac
3303 (BSC) are: Ease of network reconfiguration, and dynamic multiple terminal
functionally.

    New on-line systems are economically feasible and equipment changes can be
easily accommodated without disrupting service or affecting the network.
Terminals are now much more versatile than ever before.  The capability exists
to dynamically access multiple hosts and/or applications from the same
destination (either manually, or via a user friendly mnemonic addressing
scheme).  This means terminals behind the same controller can access different
destinations at the same time, saving equipment and communications facilities
costs.  In conjunction with DAS (Datapac Access Software) in the host's front
end, that 3270 terminal can also act as an ASCII asynchronous device and access
such systems as Envoy/100 and iNet.  In addition, each terminal now has the
ability to appear as either a BSC device to a non-SNA host or an SDLC device to
an SNA host in a matter of a few keystrokes.

    There are currently 2 services under Datapac 3303 (SDLC).  They are Datapac
3303/SDLC and Datapac 3303/SDLC Plus.

    Both services allow IBM (and their emulators) devices to access the Datapac
network for the purpose of transmitting data using the SDLC link level
protocol.

    Some common features of the Datapac 3303 (SDLC) are terminal pad based:
The service provides the X.25 framing and de-framing for SDLC data stream as
well as the packetization and de-packetization, QLLC end-to-end protocol: the
service conforms to IBM's QLLC specifications thus making it compatible with
most host X.25 PAD software/hardware implementations, physical unit type 2
accessibility: services such as the IBM 3270, 3177, 52xx, 36xx, 37xx, 47xx,
ATM's, etc.  2.4, 4.8, 9.6 kbps access speeds, Point to point and multipoint
on-net and off-net access, terminal or host initiated calling, normal or
priority packet size option and Closed User Group (CUG) options.

    Datapac 3303/SDLC offers 1 VC per PU (controller), switched and permanent
virtual circuit support, and the following applications: virtual private line
emulation, centralized host processing simple call set up, international (via
Telenet/US) access, and token ring gateway support using the IBM 3174

    Datapac 3303/SDLC Plus offers 1 VC per LU (end user terminal), local
command mode allows call set up and clearing from users terminal, automatic
direct call, mnemonic DMA dialing methods of call set up, switched virtual
circuit support, and the following applications: disaster recovery, alternate
host access using switching capability from user terminal and Datapac options
(packet size, charging, CUG's) at user terminal level.

    Datapac 3304 offers batch terminal support.  It supports RJE (or Remote Job
Entry) batch work stations or communications terminals operating under binary
synchronous communications (BSC) protocols.

    Datapac 3304 allows users operating under IBM's Multileaving Interface
(MLI) protocol to access the Datapac network.  It also supports compatible
computers and terminals using this protocol.  Datapac 3304 supports the bulk
data transfer applications from these remote job entry (RJE) work stations
whin as 'transparent' s'pad-to-pad operation'.  Devices are connected to the Da
dedicated lines aor 9600 bps.  As users groimplement new technology, the termin
upgraded to X.25.

    A typical user profile would include a host with a spooling or queueing
subsystem such as HASP II, JES 2, JES 3, ASP and RSCS, batch terminals such as
the IBM 3777 M2 and Data 100 and to have low to medium volumes to transmit.

    Datapac 3305 also supports a variety of BSC RJE batch work stations such
as IBM 2770, IBM 2780, IBM 3740, IBM 3770 and IBM 3780.

    It provides network access support for those customers using equipment
operating under IBM's point-to-point contention mode protocol and those
compatible computers and terminals using the same protocol.

    Datapac 3305 supports the bulk data transfer (batch transmissions)
applications that occur between terminals, hosts, and a variety of other
devices such as communicating word processors.

    Datapac 3305 provides savings for those customers running low to medium
volume applications.

    Datapac 3305 is a PAD based service.  The RJE (Remote Job-Entry) work
stations access the network via PAD's while the host computer may also use the
Datapac 3305 PAD or connect via an X.25 link on Datapac 3000.

    Datapac 3305 supports three modes of access: Dedicated lines at 2400 or
4800 bps, private dial at 2400 bps and public dial at 2400 bps

    It should be noted that the destination must be dedicated in order to
receive a call.

    Datapac access software (DAS) provides a Datapac (X.25) compatibility for
IBM host computer environments.  Datapac access software (DAS) resides in
customer-provided IBM hardware; the communications controller or front end
processor such as the IBM 3725 or IBM 3705, and co-exists with its compatible
IBM software such as NCP (Network Control Program), EP (Emulation Program) or
PEP (Partitioned Emulation Program).  Datapac access software (DAS)
compatibility also extends to IBM look-alike hardware manufacturers such as
Amdahl.

    DAS-installed host computer environments have access to their Datapac-bound
devices, such as those connected via Datapac 3101, Datapac 3303 (DSI/DSP),
Datapac 3303 (QLLC)*, and Datapac 3305, as well as those devices which are
connected via conventional communications facilities, such as private line or
dial-up.

    DAS can also provide SNA conversion for non-SNA devices, such as conversion
>from 3270 BSC-3 (Datapac 3303 DSI/DSP) to physical unit type 2 (SNA 3270 SDLC
representation), and ASCII/asynchronous (Datapac 3101) to physical unit type 1
(SNA ASCII SDLC representation).  These SNA conversion features allow the
customer to convert his host environment to SNA without modifying or replacing
his existing terminal/device population.  DAS also provides an extended
conversion feature for 3270 devices that modifies the incoming data (3270) to
an ASCII/asynchronous datastream and re-routes the traffic into the Datapac
network.  Thus providing external ASCII database access to the 3270 device
population.

    Other DAS features include multiple host support, transparent path, host to
network callout, extended console routines, code conversion, etc.

    Datapac International provides outgoing and incoming access to 6 U.S. based
Networks and to over 100 packet-switched networks around the world.  To
successfully complete such calls, Datapac has implemented the International
CCITT X.75 procedures and X.121 International numbering plan.  Thus, the
Datapac user originating an international call must use the following format:

                                          (1) (DNIC) (FOREIGN ADDRESS)
                                           :     :          :
     One defines the Datapac International.:     :          :
     Prefix.                                     :          :
                                                 :          :
     Packet networks are identified by a ........:          :
     four digit number called a DNIC                        :
     (data network identification code)                     :
                                                            :
     The foreign national address is .......................:
     expressed as an eight to ten digit
     address.

    Calls to international networks, other than those to the U.S., must be pre-
paid; that is, placed from dedicated or private dial access, m

    The packet size for an international call must be 128 characters.

    On both the Summary and Detailed Usage Statements, Service Type (ST) codes
are used to identify the type of Datapac service involved with a particular
address.

Service  Service
Type     Description
Code

00       U.S. and overseas
01       3000     Dedicated
02       3101     De   Private Dial (300-1200 bps)
04*        "      Pub05 06         "      Out -Dial
07       3201     Shared
08       3303     BSC (DSP)
09       3304     MLI
112        "        "  Private12        "        "  P14       3101     Dedicat1
16*       "       Public Dial (2.4Kbps)
18       3000     Public Dial
19       3303     SDLC (Terminal)
20       3201     Dedicated
21       3303     SDLC (Multihost)
25       3303     SNA/SDLC - Private and Dedicated
26       3001     Enhanced Datapac 3000 Dial trial for off-net in-dial
27       3002     Enhanced Datapac 3000 Dial trial for off-net out-dial

    On the Detailed Usage Statement, a code is used to indicate the class of
the call set-up associated with the associated accounting record of a call.
The following codes are used; C Regular call set-up - A call set-up charge
applies; CP Priority Call set-up - A call set-up charge applies; N No call
set-up - A call set-up charge DOES NOT apply and NP Priority no call set-up - A
call set-up charge DOES NOT apply.

    On the Detailed Usage Statement, a code is used to describe the reason a
particular call cleared.

    At the present time a 3 number code is being used.  This will be replaced
by a 2 character alpha-numeric code in mid-1991.

    A call set-up charge applies to those clear codes denoted by an *

Clear Code     Description

000     00     Trunk network congested
001     01     DSR is invalid
002     02     DSR cannot be reached
003     03     TM not responding
004     04     Address not in tree
005     05     Service down
006     06     Address served not in tree
007     07     Addressed service not ready
010     0A     CPM busy
013     0D     CPM busy
015     0F     Out of norm state - reset
160     A0     Trunk network congested
161     A1     DSR invalid
162     A2     DSR unreachable
163     A3     Time out
164     A4     Address not in tree
165     A5     Service down
166     A6     Network address not found
167 *   A7     Addressed service not ready
173     AD     CPM busy
174     AE     Reset address error
175     AF     Reset state error
176 *   B0     Local user clear (see note)
177 *   B1     Remote user clear
178     B2     Close request from above
179 *   B3     Local procedure error
180 *   B4     Remote procedure error
181     B5     Message not wanted
182     B6     Packet not wanted
183     B7     CPM shot
184     B8     Call collision
185     B9     Network congestion
186     BA     Common block fail
187     BB     Local block fail
189     BD     Invalid call
190     BE     Incoming call prohibited
193 *   C1     Local clear before remote accepted
194     C2     X.75 call to clear
195     C3     X.75 reset to clear
196     C4     NUI barred
198     C6     RPOA required
199     C7     RPOA invalid
208     D0     Packet network address error
209     D1     Service not up
210     D2     Service to go down
212     D3     No links up
212     D4     Links restarting
213 *   D5     Link out of service
214     D6     No more calls
215     D7     Invalid logical channel number
216 *   D8     No free logical channels at called address
217     D9     Nonexistent CUP
218     DA     Failure to set up CUP
219     DB     Application processor busy
220     DC     No application processor
221     DD     Maximum number of facilities exceeded
222 *   DE     Collect call refused
223     DF     CUG violation
224     E0     Illegal facility
225     E1     LRC fail
226     E2     Service coming up
227     E3     Service not up

    Clear code 176 (B0) can also indicate a record was generated by the network
for accounting purposes.  This is most often associated with PVCs or long calls
with a greater than 12 hour duration.  The class for this type of record would
be N or NP.

    In addition to the fixed monthly rates for Datapac access lines and
options, the following charges apply: Internetwork Usage Rates and Holding Time
Charges

                                            $/HOUR FOR       $/HOUR FOR
                       $/KS      $/KS    US ORIGINATED    CDN. ORIGINATED
NETWORK       DNIC    DP3000    DP3101        CALLS            CALLS

ACCUNET       3134    $ 2.65    $ 3.90        $ 2.00       DED.      = $2.00
                                                           PUB. DIAL = $3.80
AUTONET       3126    $ 3.75    $ 5.10        $ 5.10       DED.      = $0.60
                                                           PUB. DIAL = $2.40
BT TYMNET     3106    $ 2.75    $ 5.00        $ 5.60       DED.      = $0.60
                                                           PUB. DIAL = $2.40
FEDEX         3138    $ 2.75    $ 5.10        $ 6.30       DED.      = $0.60
              3150                                         PUB. DIAL = $2.40
NET EXPRESS   3139    $ 2.50     N/A          $ 0.60       DED.      = $0.60
WESTERN       3101    $ 2.50    $ 5.00        $ 1.85       DED.      = $0.60
UNION         3124                                         PUB.DIAL  = $2.40
SPRINTNET     3120    $ 2.75    $ 5.10        $ 6.30       DED.      = $0.60
                                                           PUB. DIAL = $2.40

(NOTE: DATAPAC 3303 (SDLC) IS ALSO SUPPORTED THROUGH SPRINTNET DP 3303 $/KS =
       $5.90 $/HR = NIL )

Notes:
(1) Packet Assembler/Disassembler (PAD) charges are included each band.
(2) Each individual call is rounded up to the next higher minute
(3) Usage charges are calculated on a per Kilo-segment basis.  A KS is 1000
    segments; each segment is up to 128 characters.

    In addition to the fixed monthly rates for U.S. access lines, the
following charges apply: Internetwork Usage Rates and Holding Time Charges

NETWORK       DNIC     $/KS      $/KS       $/HOUR FOR       $/HOUR FOR
                      DP3000    DP3101    US ORIGINATED    CDN. ORIGINATED
                                             CALLS             CALLS

ACCUNET       3134    $ 2.25    $ 3.25       $ 1.80        DED.        $1.80
                                                           PUB. DIAL = $3.25
AUTONET       3126    $ 0.12    $ 0.15       $ 4.50        DED.      = $0.60
                      (kchar)   (kchar)                    PUB. DIAL = $2.40
BT TYMNET     3106    $ 0.07    $ 0.12       $ 4.98        DED.      = $0.48
                      (kchar)   (kchar)                    PUB. DIAL = $1.92
FEDEX         3138    $ 1.50 (   0-1000 ks)  $ 6.00        Not applicable
                      $ 1.40 (1001-2999 ks)
                      $ 1.30 (3000- +   ks)
NET EXPRESS   3139    $2.00       N/A        $ 0.30        DED.      = $0.48
WESTERN UNION 3101    (Not available...)
SPRINTNET     3120    $ 2.35    $ 5.10    DED. = $0.60     DED.      = $0.60
                                          DIAL = $5.10     PUB. DIAL = $2.40

(NOTE: SDLC SERVICE IS ALSO SUPPORTED THROUGH SPRINTNET) DP 3303 $/KS = $4.80
       $/HR = NIL)

Notes:  All above rates are in U.S. Currency
(1) These charges represent both Datapac and selected U.S.  Network holding
    time charges.
(2) BT Tymnet cannot currently make sent-paid calls, but will be able to do so
    shortly.

    The Datapac outdial service is available in eighteen major centers (DPSA's)
are being served by outdial.  They are: Vancouver, Calgary, Edmonton, Regina,
Saskatoon, Winnipeg, Toronto, Clarkson, London, Windsor, Kitchener, Hamilton,
Ottawa, Montreal, Quebec, Halifax, Saint John (NB) and St John's (Nfld) and is
only available at 300 and 1200 BPS.

    The outdial port uses profile 6, except that the user of the is allowed to
escape to command mode by using outdial port "Control P".  The destination
terminal must be set at even parity in order to receive the outdial call.  Once
connected, Datapac 3000 users can set and read the remote ITI parameters by
sending level 1 packets (X.29).

    Establish a call to Datapac via a dedicated or dial-in access.  Note: If
using a dial-in access, a network user identifier (NUI) must be activated
before establishing the call.  Enter the address of the outdial port.  Datapac
will respond with the following:

    DATAPAC:  call connected
    ENTER DESTINATION TELEPHONE NUMBER/ENTRER LE
    NUMERO DE TELEPHONE DU DESTINAIRE

Enter the 7-digit telephone number (Local) of the destination terminal.
Datapac will respond with the following:

    DIALING/COMPOSITION DU NUMERO (XXX-XXXX)

Printing the destination telephone number as it is dialed.  Datapac will
then indicate:

    RINGING/SONNERIE

as the modem detects ringback tone.  When the destination modem answers the
call, Datapac will send the following message to the originating end:

    CALL CONNECTED/COMMUNICATION ETABLIE

then proceed with your call.  To clear a call upon completion, enter the clear
command:

    (Control P) Clear <Enter>

Datapac will respond with the following:

    DATAPAC: call cleared - remote Note: If you have used a NUI to place the ca
the network with the command:

    NUI Off <Enter>

Datapac will respond with the following:

    DATAPAC: network user identifier not active

    Well I have talked about Datapac outdials know I will include a list of
outdial ports for the 18 cities that I mentioned above.  Well here's the list.

Calgary (ALTA)        300       63300900
                     1200       63300901
Clarkson (ONT)        300       91900900
                     1200       91900901
Edmonton (ALTA)       300       58700900
                     1200       58700901
Halifax (NS)          300       76101900
                     1200       76101901
Hamilton (ONT)        300       38500900
                     1200       38500901
Kitchener (ONT)       300       33400900
                     1200       33400901
London (ONT)          300       35600900
                     1200       35600901
Montreal (QUE)        300       82700902
                     1200       82700903
Ottawa (ONT)          300       85700901
                     1200       85700902
Quebec City (QUE)     300       48400900
                     1200       48400901
Regina (SASK)         300       72100900
                     1200       72100901
St-John's (NB)        300       74600900
                     1200       74600901
Saskatoon (SASK)      300       71200900
                     1200       71200901
St. John (NFLD)       300       78100900
                     1200       78100901
Toronto (ONT)         300       91600901
                     1200       91600902
Vancouver (BC)        300       67100900
                     1200       67100901
Windsor (ONT)         300       29500900
                     1200       29500901
Winnipeg (MAN)        300       69200902
                     1200       69200901

    You want to hack a system on Datapac.  So you decided to call and it
connects onto the NUA you want, but you find you are having troubles getting
the system to recognize your input.  So here are some answers to some common
problems people find when connecting to systems.

    The screen remains blank A physical link has failed - check the cables
between computer, modem and phone line.  The remote modem needs waking up -
send a <CR> or failing that, a ENQ <Ctrl> E, character The remote modem is
operating at a different speed.  Some modems can be brought up to speed by
hitting successive <CR>'s; they usually begin at 120 Bps and then go to 300,
and so on up the ladder.  The remote is not working at V21 standards, either
because it is different CCITT standard.  Since different standards tend to have
different wake-up tones which are easily recognized with practice, you may be
able to spot what is happening.  If you are calling a North American service
you should assume Bell tones.  Both your modem and that of the remote service
are in answer or in originate and so cannot speak to each other.  Always assume
you are in the originate mode.

    The screen fills with random characters.  Data format different from your
defaults - check 7 or 8 bit characters, even/odd parity, stop and start bits.
Mismatch of characters owing to misdefined protocol - check start/stop, try
alternatively EOB/ACK and XON/XOFF.  Remote computer operating at a different
speed from you - try in order, 120, 300, 600, 1200, 2400, 4800, 9600, 14400,
19200, 38400.  Poor physical connection - if using an acoustic coupler check
location of handset, if not, listen on line to see if it is noisy or crossed.
The remote service is not using ASCII/International Alphabet No 5.

    Every character appears twice.  You are actually in half-duplex mode and
the remote computer as well as your own are both sending characters to your
screen - switch to full-duplex/echo o    All information appears on only one li
has the facility, enable it to induce carriage returns when each display line
is filled.  many online services and public dial-up ports let you configure the
remote port to send carriage returns and vary line length.  Your software may
have a facility to show control characters, in which case you will see <Ctrl>-K
is the remote service is sending carriage returns.

    Most of the display makes sense, but every so often it becomes garbled.
You have intermittent line noise - check if you can command line the remote
computer to send the same stream again and see if you get the garbling.  The
remote service is sending graphics instructions which your computer and
software can't resolve.

    The display contains recognized characters in definite groupings, but
otherwise makes no sense.  The data is intended for an intelligent terminal
which will combine the transmitted data with a local program so that it makes
sense.  The data is intended for batch processing.  The data is encrypted.

    Data seems to come from the remote computer in jerky bursts rather than as
a smooth stream.  If you are using PSS or a similar packet-switched service and
it is near peak business hours either in your time zone or in that of the host
you are accessing, the effect is due to heavy packet traffic.  There is nothing
you can do - do not send extra commands to speed up twill arrive at the host ev
    Most of the time everything works smoothly, but I can't get past certain
prompts.  The remote servr computenormally generate - check your terminal softw
sending them.

    The following is a list of acronyms and terms which are often referred to
in this document and others dealing with this subject.

ACP - Adapter/Concentrator of Packets.
ASCII - American Standard Code for Information Interchange alternate name for
    International Telegraph Alphabet No 5 - 7 bit code to symbolize common
    characters and comms instructions, usually transmitted as 8 bit code to
    include a parity bit.
Asynchronous - Description of communications which rely on start and stop bits
    synchronize originator and receiver of data = hence asynchronous protocols,
    channels, modems, terminals, etc.
Call Accept - In packet switching, the packet that confirms the party is
    willing to proceed with the call.
Call Redirection - In packet switching, allows call to automatically
    redirected from original address to another, nominated address.
Call Request - In packet switching, packet sent to initiate a datacall.
Closed User Group - A type of high security NUI in use on several PSNs
    throughout the world.  CUG users can access optional parameters and NUAs
    blocked out by security.
CUG - Closed User Group.
Data Circuit Terminating Equipment - Officalese for modems.
Data Country Code - The first three digits in the four digits of any given
    DNIC.
Data Network Identifier Code - The four digits which come before the area
    code/address/port address of any given NUA.  The DNIC shows which PSN any
    given host is based upon.  The DNIC can also be broken down into two parts,
    the DCC and the NC.  For more information, see part VIII.
Data Terminal Equipment - Officalese for computers.
DCC - Data Country Code.
DCE - Data circuit terminating equipment.
Destination Paid Call - A collect call to a NUA which accepts collect charges.
DNIC - Data Network Identifier Code.
DTE - Data Terminal Equipment.
DTE Address - The five digits following the area code of the host on any given
    NUA.  For example, the NUA 234122345678 has a DTE address of 45678.
Gateway - A host on a given PSN which is connected both the the originating PSN
    and one or more different or same PSN's.  Gateways also allow one user on
    one PSN the ability to move to another PSN and operate on the second as if
    the first was not interfering.
Host - Any system accessible by NUA on the PSN.
Hunt/Confirm Sequence - String of characters sent to the SprintNet POTS
    dialin/port which allows SprintNet to determine the speed and data type to
    translate to on its PAD.
ITI Parameters - Online PAD parameters (X.3 or ITI) which allow the user to
    modify existing physical measurements of packet length and otherwise.
LAN - Local Area Network.
Local Area Network - A data network which operates within the confines of an
    office building or other physical structure where several computers are
    linked together into a network in order to share data, hardware, resources,
    etc.  These may or may not own a host address on any data network, and if
    so, may be accessed via NUA; otherwise direct dialin is the only
    alternative.
NC - Network Code.
NCP - Nodes of Communication of Packets.
Network Code - The fourth digit of any given PSN's DNIC.
Network Protocol - The hardware protocol which allows the host systems to
    communicate efficiently with the PSN it is connected to.  Generally,
    synchronous protocols (X.??) are used within the network and asynchronous
    protocols (V.??) are used to access the network, but asynchronous protocols
    within the network and/or synchronous dialin points are not unheard of.
    The standard protocol for packet transfer today is the X.25 synchronous
    data protocol.  For detailed information, please see part V and Appendix F.
Network User Address - The address of any given host system on any PSN.  This
    address is thought of as a "phone number" which is dialed to access the
    desired host.
Network User Identifier - The ID and password which allow the user which has
    logged onto the PSN's PAD to originate calls to host systems which do not
    accept collect calls.  it is often thought of as a "k0de" or a calling card
    which will be billed for at the end of every month.
NUA - Network User Address.
NUI - Network User Identifier.
Outdial - Any system which allows local, national, or international dialing
    from the host system.  PC-Pursuit can be defined as a local outdial system.
    Most outdials operate using the Hayes AT command set and others may be menu
    oriented.
Packet Assembler/Disassembler - The device/host which translates the actual
    input/output between the host and the user.  The PAD often translates
    between baud rates, parities, data bits, stop bits, hardware protocols, and
    other hardware dependant data which reduces the hassle of continual
    modification of terminal and hardware parameters local to the originating
    terminal.
Packet Switched Exchange - Enables packet switching in a network.
Packet Switched Network - A network based upon the principle of packet
    switching, which is the input/output of packets to and from the PAD which
    translates input and output between the user and the host.  For detailed
    information, please see part IV.
Packet Switched System - Another name for the PSN.
Packet Switch Stream - The PSN used by British Telecom.
PAD Delay - The extra time that is used to translate incoming and outgoing
    packets of data which is composed of a continuous stream of clear-to-send
    and ready-to-send signals.  PAD delay can vary depending on the type of
    network protocol and network/port speed is being used.
PAD - Packet Assembler/Disassembler (technical), Public Access Device (customer
    service description).
PDN - Public Data Network or Private Data Network.
Port Address - The two optional digits at the end of any given NUA which allow
    the PAD/PSN to access a given port.  For example, 131202129922255 would
    reach the NUA 31202129922255, 55 being the port address.
Private Data Network - Any network (LAN/WAN/PSN) which is owned and operated by
    a private company.  Private networks are usually smaller than public
    networks and may host a myriad of features such as gateways to other
    public/private networks, servers, or outdials.
PSE - Packet Switch Exchange.
PSN - Packet Switched Network.
PSS - Packet Switch Stream or Packet Switched System.
PTSN - Public Switched Telephone Network.
Public Data Network - Another name for the PSN.
Public Switched Telephone Network - The voice grade telephone network dialed
    from a phone.  Contrast with leased lines, digital networks, conditioned
    lines.
Server - A type of network which is connected to a host system which can be
    reached either via NUA or direct dial which provides the "brain" for a LAN
    or WAN.
V.?? - Asynchronous network protocol.
V1 - Power levels for data transmission over telephone lines.
V3 - International Alphabet No 5 (ASCII).
V4 - General structure of signals of IA5 code for data transmission over public
    telephone network.
V5 - Standardization of modulation rates and data signalling rates for
    synchronous transmission in general switched network.
V6 - Standardization of modulation rates and data signalling rates for
    synchronous transmission on leased circuits.
V13 - Answerback simulator.
V15 - Use of acoustic coupling for data transmission.
V19 - Modems for parallel data transmission using telephone signalling
    frequencies.
V20 - Parallel data transmission modems standardized for universal use in the
    general switched telephone network.
V21 - 300 bps modem standarized.
V22 - 1200 bps full duplex 2-wire modem for PTSN.
V22 bis - 2400 bps full duplex 2-wire modem for PTSN.
V23 - 600/1200 bps modem for PTSN.
V24 - List of definitions for interchange circuits between data terminal
    equipment and data circuit terminating equipment.
V25 - Automatic calling and/or answering equipment on PTSN.
V26 - 2400 bps mode on 4-wire circuit.
V26 bis - 2400/1200 bps modem for PTSN.
V27 - 4800 bps modem for leased circuits.
V27 bis - 4800 bps modem (equalized) for leased circuits.
V27 ter - 4800 bps modem for PTSN.
V29 - 9600 bps modem for leased circuits.
V35 - Data transmission at 48 kbps using 60-108 kHz band circuits.
V42 - Combined error correction and data compression standard to give 9600 bps
    on dial-up lines.
WAN - Wide Area Network.
Wide Area Network - A data network which operates on a continuous link basis as
    opposed to the packet switched basis.  These do not operate on the X.25
    protocol and may only be accessed via direct-dial or a host on a PSN which
    is linked with the WAN.
X.?? - Generally symbolizes some type of synchronous network protocol.
X1 - International user classes of services in public data networks.
X2 - International user facilities in public data networks.
X3 - Packet assembly/disassembly facility (PAD).
X4 - General structure of signals of IA5 code for transmission over public data
    networks.
X20 - Interface between data terminal equipment and a data circuit terminating
    equipment for start stop transmission services on public data networks.
X20 bis - V21 compatible interface.
X21 - Interface for synchronous operation.
X25 - Interface between data terminal equipment and data circuit terminating
    equipment for terminals operating in the packet switch mode on public data
    networks.
X28 - DTE/DCE interface for start/stop mode terminal equipment accessing a
    PAD on a public data network.
X29 - Procedures for exchange of control information and user data between a
    packet modem DTE and a PAD X95 - Network parameters in public data
    networks.
X96 - Call process signals in public data networks X121 - International
    addressing scheme for PDN's.
X400 - Standards for electronic mail, covering addressing and presentation.

    Some interesting books I think you should read that are related to
Phreaking & Hacking:

Cyberpunk - Outlaws And Hackers On The Computer Frontier, By Katie Hafner And
John Markoff, Simon And Schuster Incorporated, Simon And Schuster Building,
Rockefeller Center, 1230 Avenue Of The Americas, New York City, NY 10020, 1991,
368 Pages

Data Theft, By Hugo Cornwall, Mandarin Paperbacks, Michelin House, 81 Fulham
Road, London, England SW3 6RB, 1989, 402 pages

Hacker's - Heros Of The Computer Revolution, By Steven Levy, Bantam Doubleday
Dell Publishing Group Incorporated, 666 Fifth Avenue, New York City, New York
10103, 1985, 448 Pages

New Hacker's Handbook, By Hugo Cornwall, Century Hutchinson Limited,
Brookmount House, 62-65 Chandos Place, Covent Garden, London, England WC2N 4NW,
1989, 194 pages

The Cuckoo's Egg, By Cliff Stoll, Pocket Books A Division Of Simon And Schuster
Incorporated, Simon And Schuster Building, Rockefeller Center, 1230 Avenue Of
The Americas, New York City, NY 10020, 1990, 356 Pages

The Hacker's Handbook, By Hugo Cornwall, E Author Brown Company, 3404 Pawnee
Drive, Alexandia, MN 56308, 1986, 186 Pages


 ------------------------------------------------------------------------------


                -=- United Phreaker's Incorporated Magazine -=-

                       Volume Two, Issue Six, File 8 of 11

                         The Lost Avenger/Wiz Kid Bust

                       By Black Manta & The Lost Avenger


         As some of you may know Wiz Kid and I got busted in Jan of 1991 for
    Theft of Telecommunications times three and Illegal Use Of A Computer.  The
     theft of telecommunications was for a couple conference calls that they
    did.  One of the conference calls was on the Saturday, which went through
     without any problems, and the other two were on Sunday.  The first one on
    Sunday was screwed up totally since we couldn't make any overseas calls.
     We should of know something funny was going on and should of left but
    instead we set up another one from the same location and in turn got
     busted.  Oh well that's li    a half inch diskette on me with a bunch of o
     related stuff.  Oh well enough of this bullshit here's the complete story
    as told as it happened by Black Manta, The Lost Avenger and Wiz Kid.

         On Sunday January 27th 1991 at approximately 12pm, The Lost Avenger
    and John Medica aka: Crackerjack, Wrath Child, Byte Bandit, Wiz Kid &
     Heavy Dee were caught for Theft Of Telecommunications (Conference call
    with a Bell calling card).  The call consisted of: LD calls made to
     Australia, U.S., France, Denmark etc.. 2 Bomb threats were made to the
    White House in Washington D.C., and in Australia crank calls were made to
     a Drug information center + Pizza Hut (Pathetic!).

         The whole of the calls, were recorded on tape. "Anybody on the line
    that said anything about P\H\C or pirating, might be in danger." -- TLA
     Also when caught, TLA had a 'Black Book', which consisted of Pirate BBS
    numbers, and home phone numbers & names of at least 150 pirates (You
     might well be on it!).  So be very careful about what your hard drive
    consists of..  Since a statement was made, that all the people on the
     list would be visited and checked. (Somehow I think this is bullshit!)
    But regarding of the seriousness of the incident, I would be careful from
     now on.  On the 28th TLA, and JM where sent to court at old city hall
    in Toronto, Ontario.  They got set for another court date, which took
     place shortly after the fist, on the 30th of January.  Now I write this
    file right after arriving from court with TLA.  Also Morkoth, and an
     other unnamed person were attending the session.  Nothing much was
    happening there, except for a quick overview of the situation.  Then yet
     another court date was set for March 4th, 1991.  At College Park At
    College and Yonge, at 10am in Room 503.  Pirates are not advised to
     attend it because of previous experiences.  One of the Cops who arrested
    TLA started questioning me and the others, and said "So you must be
     hackers too, you will be found out about on the list (of numbers)".

    Here is an exclusive intervi    BM: So what happened, from your p
    TLA: We were sitting there, talking on the phone.  We were faced towards
          the alcove at Royal York Hotel.  And then two uniform & and two
         detectives appeared from no where and arrested us.  They took the
          phones out of our hands, and and put handcuffs on me and JM.  They
         then look through the notes I had on me and gave me my rights.  They
          then shoved us into a Cop car outside the hotel (Boy was it every
         cramped in the back.  My fucking knees where up near the top of the
          cage).  If you don't know what a police car inside is like here's a
         short description.  It's a normal car, but back behind the two front
          seats is a cage so you can't hit or do anything to the cops in
         front.  But with handcuffs on its even worse.  Oh well.  Anyways back
          to the story.  They took us down to 52 Division and we each sat
         around in little room (one room for each of us).  They came in did a
          strip search on me.  They left the room and for the next couple of
         hours they came in and out asking me questions and shit, this lasted
          to approximately 2:30am Sunday morning.  They then brought me
         downstairs and finger printed me and took a picture of me and
          Released on a Form 10 (A Promise To Appear Form).  I was released
         at approximately 3:15am and           to court the next day also for 1
         station most likely all that night as he had other charges against
          him.  I was sure happy to get home.  I went to court the next day
         (At Old City Hall) a          another court date up On Wednesday Janua
         time).  Then on Wednesday I went to court again (At Old City Hall
          Again) and again it was to set up another court date appearance for
         today (Thursday Febru991).  Today I went to court (At College
          Park) and again another fucking court date was set up.  This time
         for March 4 at College Park (again) at 10am, Room 503.  What a pile
          of shit three times and it was for diddly twat (what a major waste
         of time).  If you want to come to the next trial please feel free to
         come to it but just be warned to watch out and becareful.  Anyways
         that's what happen up to today.

    I thank TLA for that interview.  (He wrote it himself).

     So here you see, You are never too good to get caught, TLA was
    considered an expert at what he was doing, and still the long hand of
     law caught him.  So be warned in the future..

                                        -- Black Manta, Feb 7th 1991.


         Yesterday, March the 4th.  Was TLA's, and Whiz Kid's fourth time at
    court. This time they actually got on trail!  Here's a quick overview of
     what happened in the courtroom:

         TLA and WK were called up to the stand.. The accusation    loud, and i
     by request) and John Medica we're caught at Royal York hotel for misusing
    Bell Canada wire's with a unauthorized calling card number.  The cost of
     the calls made summed up to no less than a thousand dollars."

         The lady who was reading it out, repeated it about 3-4 times. I have
    no clue as to why, but, all I can say is that it got hard to hold your
     laugh. Sounded like the record player kept on repeating the same track..
    After she had taken her time, and finally realized that she had already
     read it numerous times, she then asked the two guys, who were shitting
    bricks buy now.. "What do you plead?", TLA replied "Hmm, Guilty I guess",
     Medica blurted out loudly and proudly "GUILTY" like he was the jury or
    something...

         After this the judge issued the date of sentence, and told TLA and JM
    to visit the probation officer.    This didn't come too easy though..
     Me, my friend, TLA, and JM found ourselves sitting in the front hallway of
    the courthouse, waiting, waiting, and waiting, that the stupid idiot in
     the this little office would get the papers done (I don't understand what
    these papers were, but the probation officer wanted them before he'd talk
     to the two guys).     yet another hour passed by, but no papers were done.
     kind person in the office to hurry it up.. And then we were all hit by
    shock, when he said that they never even started to make them. Because
     the the lawyer had already cleared it up, all of 3 hours ago.
    We then found out that it had all been John's fault, he was told what to do
     by the lawyer before he left, but must have been picking his ear at the
    time or something.. So, we gave Mcfly a big lecture, and then kicked his
     ass into the probation office.

         Everything then got cleared up. TLA that night called his lawyer, and
    was told that the sentence would not be very rough at all.. Nothing like
     going to jail, or paying a huge fine..  Just community work, or something.
    John in the other hand is probably heading to the slammer, because of his
     previous offenses.

         But, to see exactly what happens to TLA, PLEASE! Attend the final
    court date on April 17th - 1991.  (What happened to those people that were
     supposed to be there yesterday!!).  College Park provincial court (Get off
    at College if using the subway) Room 503, at 10 o'clock am.

                                        -- Black Manta --
                                       -=March 5th - 1991=-


         TLA here...  Ok it is now one year later, today's date is March 25,
    1992.  We never did write a final edition to this so I will report on what
     happened that final court date, and all the events that happened there
    after Wiz Kid and I went to court on the 17th of April, 1991.

         It was the day that we were going to find out what was going to happen
    to us.  What happened in court is our lawyer talked to the judge in the
     court jargon (didn't know what they where talking about), and then the
    judge called JM (he stood up).  The judge read him his sentence.  What we
     got was a suspended sentence in that we have to do 100 hours community
    service (10 hours per month) and 2 years probation, and if we didn't do
     this we could wind up in court again on the same charges (that's all I
    wanted...to waste more of my time in court).  After the judge ready JM his
     sentence the judge then proceeded to called me (I had to stand
    up...whoopie), and read the same sentence to me.  Well to make a long story
     into a short one, (I don't really want to write about everything that
    happened in court that day as it world take forever to write and I don't
     really remember exactly what happened and don't really care to either).

         We have both finished our community service within the designated time
    period specified by the judge.  But we still have just under 1 year of
     probation left to do (which is a major waste of my valuable time in
    which I could be hacking). At least we got off basically and won't have a
     criminal record.

         Another thing I have found is my probation officer is cool compared to
    the one JM has.  There was also one more subclause on our sentence which
     was there is no making of Long Distance calls (argh..).  Well JM's
    probation officer makes him brings his telephone bill in every time he sees
     her which once every month, while I don't have to (she doesn't even ask me
    if I make any LD calls and if she does I say no even though I did make a
     couple.  (I do pay for LD calls every once in a while when I have nothing
    else to phreak with).

         Another thing I have found is that for a couple of months I didn't
    bother doing my community service.  While I could of been charged but
     neither my community service officer nor my probation officer bothered
    doing anything.  All they did was sit on there ass and just told me to
     start doing some or else they would charge with Breech Of Probation..
    (whoppie).  But I have met other people who didn't do community service for
     a while and got charged (they got even more community service..).  One
    last thing I found interesting about my probation officer is that sometimes
     I would forget to go to a probation checkup (which I have to go an see her
    every month) or even sometimes I would go on the wrong day and the bitch
     wouldn't even give a flying fuck.  This give you an idea how screwed up
    and laided back the Corrections system here in Canada, also it tells you
     that my probation officer is really lazy and doesn't give a shit what
    clients do and she's getting paid for doing it too.

         Ah well I will be glad when this is all over.  If you ever do get
    busted just pray to god that you are as lucky as we were.  Well that's it
     for now, I want to go and do some hacking on Datapac (hahaha).  Talk to
    you all later.

                                       The Lost Avenger/UPi
                                        - March 25, 1992 -


         This will give you some idea of what happened before the conference
    bust. It was cold winters day, I was leaning back on my chair upstairs in
     my room sitting around my three computers.  One of them hacking CallNet (a
    local PBX company) and second system hacking a 1-800 PBX system, letting my
     computer hack day & night, I finally figured out a couple of days later, I
    wasn't really getting anywhere.

         Shortly later that week on Tuesday evening around 8pm I was walking
    downstairs heading towards the kitchen, when I looked through the window
     and saw three men walking towards house.  I opened the door and there
    stood three plain clothes cops.  The search warrant was issued and showed
     to me.  One of the plain clothes cops was standing beside me while I was
    standing with my feet to the wall, drinking a two liter bottle of coke and
     wondering fuck going on.

         Well shortly after one of the cops got chance to talk to my parents
    about what was going on.  My dad kept screaming "Lock him up!".  Sergeant
     Gord Rothledge then came up to me and said lets go upstairs John.  We then
    walked upstairs entering my room, he then proceeded to ask me not to touch
     anything.  Snap shots of my computer systems, my room and my notes were
    taken.  Phreaking & hacking related papers, some other computer related
     books, and 3 computers were removed from my desk and packed away in
    cardboard boxes.  These cops made my room into a war zone, by dumping
     everything not bolted down into the center of the room.

         They then proceeded downstairs.  Two of the men where from the Metro
    Police Criminal Investigations (Fraud Squad) and the other was a Manager of
     Bell Securities, Walter Heapy.  They was a couple of laughs here and there
    about how I hard-wired the phone line so I had a phone extension in my
     room.  Shortly after I was dragged into private room, in which I picked my
    parents room.  We then sat down and they explained what was going down and
     told me the method they used to drag me down.  To catch me it took one
    year of investigation and 24 hour surveillance by Bell Canada and Metro
     Police.  They recorded all numbers that were in-coming and out-going and
    all illegal activities I was doing.

         The interview was recorded and fortunately couldn't be used in court,
    so I didn't have to worry about what I said.  Questions were asked such as
     how I got started, and certain numbers like CallNet, Video One, Bell
    Cellular, Cantel Cellular and other numbers which I said I didn't remember
     every using them.  If you know what I had, this guy had twice as much.
    All numbers were reordered (in-coming and out-going), the time and date of
     the calls and even the duration of the call.  You name it the assholes had
    me nailed to the wall.  About an hour later after the interview we returned
     back to my room and there was some talk between my parents and the cops.
    After that they took all the stuff they packed away and left my house.

         A few days later during the morning, I got a call, asking if I could
    come down to the Metro Police Headquarters.  I went down to there and sat
     down on a bench waiting to be called.  A little while later I was then
    called and dragged up a flight of stairs, and thrown into a chair.  Well so
     far, so good, one of the other officers I saw a few days earlier popped in
    and said 'Hello'.  He seemed to be an ok guy.  Shortly after that two men
     entered the room and closed the door and started asking questions.  I
    played stupid to the questions.  The sergeant left the room and the other
     officers kept asking me questions.  This went on, and on, and on (it
    seemed like forever).  They kept giving bullshit as I didn't know anything.
     The sergeant came back in the room with a cardboard box with cables, notes
    and books packed to the rim.  I went through the cardboard box to see if I
     could recognized anything.

         They read me my rights and took me downstairs.  Before leaving the
    headquarters they asked me if I had any sharp articles on me in which I
     replied "No".  They stuck in the back of a police car and drove me to the
    Old City Hall Jail.  Once we arrived at the Old City Hall Jail they strip
     searched me and then put in a jail cell.  After waiting five hours in a
    dingy jail cell they called my name.  A cop opened the cell door and
     escorted me down a small through the side cell into a doorway which led to
    a small box looking towards the side of the cell.  They called up the case
     and discussed it for a couple minutes.  After that I was escorted to a
    different jail cell and shoved back into it.  While waiting in the jail
     cell the cops were working on my paper work.  After waiting for another
    hour and a half they released me on my own free will.

         During the hours of 8pm on January 26 we headed down to the Royal York
    Hotel.  TLA kept bugging me about making a phone call, well, ok fine, so we
     headed towards a payphone in the hotel up in the upstairs lobby.  He made
    the call and after he hung up we decided that we would fuck around for a
     sometime more.  After fucking around for an hour or so.  We decided we
    would head back to the lobby of the Royal York Hotel.

         Shortly after returning to the Royal York Hotel, we were looking
    around the main upstairs lobby and noticed and the end of one side of the
     lobby just outside the short hallway was a restaurant.  Outside the
    restaurant was a bellboy standing around looking bored as hell.  So we
     decided to talk him and give him something interesting to do.

    Wiz Kid> Hey guy, how's it going.
    BellBoy> Ok.
    Wiz Kid> Hmm ok.
    TLA    > (doesn't know to say.)
    Wiz Kid> Food good.
    Bellboy> Yes.
    Wiz Kid> Comment->TLA must be mid 30's.
    Wiz Kid> Expensive?  (Guy must think some tourist from another country.)
    BellBoy> Well,..  Not really.
    TLA    > What kind food you guy's have?  What kind food you serve?
             (Can't remember exactly what was said.)
    Wiz KID> Huh!  Ok. Hmm, ya ok.
    TLA    > (Laughs)
    Wiz Kid> (Smiles)

         We then returned back to the short lobby and TLA then made a call to
    Australia.  He talked to a friend of his for about an hour and then hung
     up since his friend had to go out.  We left the short hallway and returned
    to main lobby of hotel.  We then were trying to decide what to do next.
     TLA had idea, he wanted to go up to the 21th floor and take a look around.
    Heck, why not browse around what harm can that do?  Anyways during the way
     up 21th floor the elevator stopped at 15th floor and a couple joined us in
    the ride up.  Talk about feeling like right at home 'Shezz' their where in
     bath robs.  TLA and I just laughed and we wondered about each other
    thoughts.

         Well seems they were just going for dip!  Well they seemed to be a
    nice couple.  We got chance to talk each other on the way up asked them
     where their from and shit like that.  Anyways TLA then changed his mind,
    and decided to go to the 23th floor.  Well, nothing really to see, but just
     then we got stopped by security guard, asking us if we guests or looking
    for someone.  Well, TLA replied we were guests.  The security guard said
     can I see your pass.  My reply to the security guard we looking for some
    one who staying here.  The security guard asked what room are they in.  My
     reply was that we weren't to not sure.  Security Guard then replied "Leave
    this floor or you will be charged with trespassing."  Our reply to that was
     "Yah right, fuck you buddy".

         We then headed back to the 20th floor.  We called downstairs from
    an in-house phone just for the fuck of it and tried to get an outside line.
     We got the hotel operator and asked here if she can dial number for us.
    Her reply was you're calling from in-house phone you have to call from your
     room.  Well, we then headed down the hall and up a flight of stairs.  Hmm
    people must be having a party up here.  Well nothing really interesting to
     see.  We walked down another hall and to another staircase leading to the
    pool.  We checked out the pool for a while and decided to go back down the
     elevator an back to the main lobby.  From the main lobby we walked down
    another flight stairs to lower floor of the hotel.  We came across another
     batch of in-house phone's and TLA started fucking around with those for a
    bit.  We then started walking back upstairs and proceeded to walk back to
     little hallway.  We stayed in the little hallway for a while talking to
    each other about various things and screwing around with the phones (both
     the in-house and payphones).

         Ten minutes later a tourist bitch entered the hall from the outside
    main lobby, and started to use the phone next booth over from us.  Well,
     knowing me I looked over her shoulder and low and behold their was a
    calling card facing towards the other side of the phone booth.  After
     jumping up and down and yelling grabbing a pen and piece of paper from
    TLA.  I looked through a crack trying to find out the numbers on the
     calling card.  I started writing the numbers of the calling card down but
    about one minute later while still trying to get the full number written
     down the bitch started moving around which made it harder to the complete
    number.

         TLA then took a crack at getting the calling card number.  Well a
    minute went by and all you could here was 'Click, Click'.  Which was TLA
     hitting the pen on his teeth while leaning back making it look like he was
    using the phone.  Well it's hard to remember everything did happened but
     that's most of it.  We did finally get the calling card to work after a
    couple of tries.  Shortly after 10pm we headed towards to Union Station
     which is almost right beside the Royal York Hotel.  For those who don't
    know what Union Station is, it's basically nothing but seats where you sit
     around doing nothing except for waiting for either a Via Rail Train, Go
    Train or TTC Subway.  But knowing Toronto it's a bum hang out for quick a
     buck.

         Walking through the doors of Union Station's Go-Train waiting platform
    from the Royal York Hotel we came upon a set of payphones.  Anyways now it
     came the time to decide who was going to start the conference.  Well it
    turned out to be me.  The conference that night wasn't too bad.  There was
     couple of overseas people as well a some US and even some local people on
    the conference.  Over two hours worth of conference calls with TLA having
     the control what can go wrong.

         At approximately 12:30am a security guard from the CN Police came to
    us and and asked us to finish our calls since they wanted to close the
     station down.  Well TLA kept on talking and talking and not bothering to
    listen to what the CN security guard had to say.  It seemed like there was
     never going to be a end to TLA's talking.  Well the CN security guard came
    back to us after five minutes and started yelling at TLA, asking to finish
     his call.  Finally, TLA wasn't really to happy having to hang up on the
    conference, but he did.  After hanging up he started yelling and screaming
     at the CN security guard.  Yelling and screaming at the CN security guard
    didn't seem to get us anywhere so we decided to pack it in for the night
     and head for home.

         Most of what was said earlier by TLA in his story is basically the
    same.  However, once we arrived at 52 division just after getting busted
     there were some differences between what happened to me and what happened
    to him.  Here's the story of what happened Sunday night when we got busted.
     We where sitting down at the payphone faced back to front.  We where on
    the lower floor of the Royal York Hotel, sitting in a little alcove next to
     a flight of stairs leading up to the main lobby.  We decided to get
    something to eat.  Walking down the hall we came to the small restaurant.
     I grabbed a Coke, and sandwich and TLA got a Coke and piece of Black
    Forest Cake.  Well we walked back towards the payphones as sounds of music
     and voices was heard in the background coming from a small local bar just
    outside the alcove.  Walking back to the alcove, we decided who would start
     the conference and as it turned out I would start the conference (again).

    Operator> "Operator" in a hi pitch voice.
    Wiz Kid > "Yes, can I have the conference operator."
    Operator> The operators reply "Yes, one moment please".
    Operator> Operators reply, "Yes, party calling from a local coin box number
              XXX-XXXX, go ahead sir".
    Operator> Conference operators reply "Yes sir, can I help you"
    Wiz Kid > My reply was "Yes".  I proceed to tell her I wanted to set up a
              conference call.  She proceeded to ask me for my billing
              information, in which I gave it to her.

         About five minutes later a guest came up the payphone asking if he
    could use phone.  My reply was sorry I am waiting for a call.  He
     questioned us what we where up to.  TLA and I reply was just screwing
    around.  Nothing was really said however we did talk him about five
     minutes.  Shortly after the bitch finally called back with a local phone
    number to call.  TLA who was standing around looking puzzled and said to me
     "Let me control the conference".  My reply to that was "Well, I have the
    controller's dial-in phone number".  Well we compromised and I let him
     control the conference.  TLA started calling away to everyone who he knew
    and even people who he didn't know.

         However the first conference we did on Sunday had a problems calling
    overseas.  TLA called the conference operator inquiring about the trouble
     we have with the it.  TLA kept and yelling and screaming at the conference
    operator.  Finally after about five minutes the conference operator asked
     him if he would like to re-start the the conference.  The reply from the
    TLA was "Yes of course I would (stupid bitch)".  Well after talking to the
     conference operator TLA then came back on the conference and asked
    everyone hang up as he was going to restart it.  We should of know
     something funny was going on when the first conference didn't work but we
    didn't realize that until it was too late.  The conference got restarted
     and TLA started to call everyone back.

         Sitting back at the Royal York Hotel everything seem to be going well.
    Shortly after around 11pm a hand reached out so quick that TLA and I didn't
     know what the fuck was happening.  I looked over and TLA and his face
    wasn't too happy!  The rest of the story told earlier is basically the
     same.  TLA gave me chance to write about the horror side of my part of the
    story.  I asked the guy if he was a "Cop".  It was a stupid question but
     someone had to do it.  The guys reply was "Yes".  Shortly after we were
    escorted down the long hall and outside to a waiting cop car.  While
     walking down the long hall, people started to stare at us.  I guess these
    people have never seen anyone get arrested before.  They shove us in the
     back of an awaiting cop car and they proceeded to drive to 52 Division.

         We arrived at 52 division a few minutes later and taken out of the
    car and escorted to garage door at the side of 52 division.  One of the
     officers opened a small phone box, asking the person inside to open the
    door.  The garage door opened and we proceeded to walk inside.  Once inside
     an officer then asked us for our names if we know why here for.  We were
    escorted up some stairs, down a long hallway and put into separate small
     white rooms.  During the short walk upstairs, small talk broke up between
    the officer and me.  I kept saying that I have this addiction.  The officer
     kept on saying "Sure", as he really fucking cared.  Some more small talk
    then broke up dealing with something to do with ripping off phone company.

         Well shortly after fours hours of standing around in white room an
    officer then came in asking which articles belong to me well.  The only
     really thing I had was Cellular Phone, knowing that the 3 1/2" diskette, a
    three ring binder, a World Radio Television Handbook, and a garage door
     opener belonged to TLA.  Walking outside the room the officer then asked
    about articles.  Looking at long short table I saw my Cellular Phone and
     TLA's book, garage door opener, 3 1/2" diskette, and three ring binder.
    I then pointer which article belong to me and then was escorted back to the
     little white room.

         I knew I would be staying for the night.  The next day I was escorted
    downstairs to a room with steel door with 1 camera faced to the door.
     At least I had someone to talk to.  Well the person seemed alright.  He
    was talking away, telling me what the fuck he done explaining he stolen a
     leather Jacket from The Bay.  Well I explained what the I did, and not
    much of a reply was said.  A little later I was escorted outside.
     Escorting me outside I was handcuffed to 3 people and away we went like
    the three stoogies.

         Stepping into the back of the paddy wagon we sat down front to front.
    Looking outside the back window looking to see where we were going, looking
     outside the side window seeing people going to work, thinking to myself
    what I am missing.  We came to a stop and heard the door getting open, we
     walked out of the paddy wagon and escorted through a long corridor.
    Sounds of shouting, talking, other weird things that I couldn't make out
     echoed in the hall.  I waited to be uncuffed, checked out and shoved into
    a cell.  After being uncuffed I had to pull my pants down and get checked
     out by a officer with white gloves who was checking for any weapons that I
    might have.

         I was escorted through a main corridor of jail cell was then put in
    cell.  One half hour went by and once again put out of one jail cell and
     put into another jail cell waiting to hear my case be brought up.  I
    wasn't really to thrilled with my companions in the cell.  Hours passed by
     sitting on the ground, sitting down and try to get a bit of sleep, you
    could hear talk going back and forth to between the other cell mates, "Hey,
     I like those Runners, I have to have them.  I will make sure I get them by
    time night is over".  I got escorted once again to another jail cell, which
     you could say this cell had been overcrowded with people, looking the
    doors of the jail cell I could see on the left table with an officer
     signing people out, and other side basically where you pick up your
    personal belongings.

         I was once again moved to another jail cell waiting around 2 hours
    with three other people in this cell, talking away to the officer they once
     again moved to another jail cell waiting to be moved to The Don Jail.
    After about one hour I was once again handcuffed and put in the back the
     paddywagon and off to The Don Jail I went.  We arrived at the Don Jail and
    escorted to a front of desk with officer asking if I had any valuables.
     AFter that he asked me to remove my cloths.  Standing in front of me was a
    officer who asked me to hang my cloths up on hanger.  I though just didn't
     give fuck and just hung them as I pleased.  Well the officer wasn't really
    pleased who I hung them and did it for me.

         Shortly after we where giving cloths to wear, which were cheap, neon
    and polyister but it's than better been nude!  We where put small room with
     showers, having to change into these cheap cloths and shoes.  I was then
    put in a chair with a Korean person and asked a bunch of questions.
     Shortly after a picture was taken with number.  I was given a tray of food
    but the food tasted like the kind of stuff you get in hospitals.

         Anyways standing at the elevator of the Don Jail awaiting to be
    escorted to my jail cell.  I waited to use the phone to call home and
     asking my parents to bail me out well.  I finally got a chance to use the
    payphone to call home but no one was home.  Well, I then called friend to
     see if he could contact my parents.  Well my friend answered but doesn't
    know what the happened.  Shortly after my name was called.  I was escorted
     to small room looking around was glassed window, and a visiting room of
    some kind.  I was surprised to see friend well got chance to talk.  We
     talked away to each other, asking what each other we have done.  After I
    talked to my friend for a while I was once again escorted to another small
     room.

         There was short person at a table signing people out, the bail was set
    at $2,000, and I agreed to show up in court at the set date.  I am not
     going to say anything about the court appearances as they were basically
    the same as TLA said earlier and is nothing really interesting happened
     during that time.

         It's December of 91, the World of Commodore show.  It's been nine
    months since I last heard of each TLA, however I was looking around
     thinking about what to buy and watching an interesting seminar at the same
    time.  Well thought's went thought my mind when looking ahead and I though
     I saw TLA's color jacket.  I was surprised to see TLA after nine months.
    During this first time their wasn't really much to say, however during
     months TLA and I got a chance to clear up some misunderstandings that
    happened over the years.

         Well I hope you enjoyed this article, as it was fucking hell just
    writing it alone.  Well that's about all, thanks again to The Lost Avenger
     and all members of UPi.

         You may contact me, and leave comment or general replies to my private
    VMB at, 416-505-4785 24 hours.  Thanks again.  Wiz Kid, RaDD Corp.

                               Written By Wiz Kid
                                  May 18, 1992


------------------------------------------------------------------------------


                -=- United Phreaker's Incorporated Magazine -=-

                      Volume Two, Issue Six, File 9 of 11

              United Phreaker's Incorporated Underground Newsline

                       By Arch Bishop & The Lost Avenger


              Bell Protects Customers Against Long Distance Fraud
              ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                    [ Courtesy of Bell News April 6, 1992 ]

    On March 19, 1992, Bell began to verify charges on all long distance calls
charged to a third number as a way of protecting customers against fraudulently
billed calls.

    As a result when a customer asks the operator to bill a long distance call
to a third number, the charges must be accepted at that number before the call
goes through.

    This procedure was already in effect for such call when made from public
pay phones.  Applying the measure to all third number calls is intended to stop
a type of fraud which has increased sharply over the past few months.

    If no one is available to accept the charges, there are still several
options for customers, including billing their call to a Bell Calling Card,
calling collect or dialing direct.

    To order a Calling Card, customers can dial 0 and place their request
through an operator.

    There is no subscription fee to order the card.  Calling cards are more
economical than billing calls to another number, and they allow customers to
bill long distance call to their account when they are away from home or the
office.

Informing Customers

    We're letting customers know about the change in several ways.

    First, Bell operators are informing customers who want to place this type
of call.

    Second, a short informational message has been printed on customer bills.

    Third, information was issued to the news media about the change.

    Finally, customers who have made at least three such calls over the past
three months and do not have a Bell Calling Card (about 200,000 customers in
Quebec and Ontario) will receive a letter informing them of the change and
letting them know what alternatives there are.


     To Curtail Fraud, Restrictions Are Put On Calling Cards From Payphones
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                    [ Courtesy of Bell News April 20, 1992 ]

    Increasing fraud prompted Bell to discontinue the use of calling cards to
make calls to overseas destinations from payphones in Bell Canada territory.

    All calling cards, those of Canadian, American, and international telephone
companies, were affected by the restriction which took effect April 13.
Consumers, however, are able to continue to use calling cards for calls to
Canada and the United States.

    The Need to control fraud on calling card from payphones led to this
security measure.  Recent investigandicated losses of over a quarter of
a million dollars a day from payphone calling card fraud.  In practical terms,
this represented a loss of $500 for every $10 the company made, from overseas
payphone calls.

    While Bell recognized this decision will inconvenience some customers,
fraud has escalated to such a degree that it is was felt a security measure had
to be implemented to protect customers and the company from further risk.

    Customers are being advised to use alternative calling methods such as:

    o    billing validated calls to third parties;

    o    using credit cards (American Express, VISA or Mastercard) with
         Millenium payphones.

    Located in key airports and hotels, these payphones use magnetic band
screening to validate calls;

    o    making collect calls;

    o    using the Bell calling cards from non-coin telephones and, finally

    o    making cash calls from payphones.

    On March 17 Bell made validated of calls billed to third parties mandatory
whether the calls were being placed from payphones, homes or businesses.  The
new measure was introduced to protect customers against fraudulently billed
calls.


                   PBX Fraud Takes Toll On Unsuspecting Users
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
            [ Courtesy Of Business First Of Columbus April 6, 1992 ]

    Private branch exchanges can develop privacy--and pricey--problems of
their own.

    PBXs, as they are commonly called, are internal telephone switching systems
that businesses use to route calls made by their employees.  And in recent
years, PBXs have become the targets of crooks who illegally use such switches
to place long-distance calls without paying for them.

    "This is one of the most under-reported stories around," says Marsha
Schermer, a Columbus-based partner with the law firm of Arter & Hadden who
specializes in public utility issues.

    "PBX manufacturers and long-distance carriers don't want to talk about PBX
fraud because it's bad publicity for them," she says.  "And companies that have
been victimized also don't like to publicize that fact, out of fear of being
targeted by other thieves."

    Telecommunications specialists say the most common route thieves use to
break into PBXs is through their remote-access features, which allow employees
located outside the office to place long- distance calls and charge them to
their employer.  To use that feature, employees must first enter a toll-free
"800" number to get access to the PBX, followed by a multi-digit authorization
code that allows them to place long-distance calls.

    Thieves reportedly use several different methods to find the toll-free num-
bers and related authorization codes.  Among the more popular: the use of "war
dialers," which are computer software programs that electronically dial numbers
until they find a combination that gets a dial tone; "Dumpster diving," in
which the thieves look through trash bins in search of coding information
that's been written down and discarded; and "shoulder surfing"-- spying on
business people as they dial into their PBX from a pay phone.

    Kim Koeller, a manager within Andersen Consulting's Network Solutions
Group, says thieves have also found ways to break into PBXs via their
voice-mail systems.

    "As PBXs have gotten more sophisticated, so have the methods thieves use to
break into them," notes Koeller, who is based in Andersen's Chicago office.

    Once they break into a given PBX, the thieves often set up "call-sell"
operations in which they sell the stolen long-distance time to someone else,
often recent immigrants who want to talk with friends or relatives back in
their homeland.  However, Arter & Hadden's Schermer says much of the illegal
calling activity funneled through PBXs probably involves drug deals and weapons
sales.

    Telecommunications experts say thieves operating out of New York City are
the largest source of PBX fraud.  But such problems can strike just about
anywhere.

    That situation is reflected in an informational brochure on PBX problems
that was issued by the Communications Fraud Control Association (CFCA) in
Washington, D.C.

    According to that publication, entities that have been hit by PBX fraud
include the Tennessee Valley Authority, which lost $65,000; Philadelphia
Newspapers Inc., which was bilked for $150,000; a Midwest chemical company,
which lost $700,000; and an Ohio manufacturer, which lost $300,000.  In all,
CFCA says toll fraud costs companies more than $1 billion a year.

    It's hard to say just how much of this illegal activity is striking Central
Ohio PBXs.  The Columbus office of the FBI, for example, recently reported that
it had received a half-dozen reports of PBX-related fraud during the past nine
months.

    The potential for PBX problems here is further reflected in statistics
compiled by the North American Telecommunications Association, which show there
are about 1,000 PBXs now in operation in Columbus.

    If your firm is using one of those switches, the CFCA recommends taking the
following defensive steps to reduce the chances of thieves breaking into them:

    o Assign authorization codes for remote-access use on a need-to- have
basis.  Also, use random numbers for such codes--never have them match the
user's telephone station or corporate badge number.

    o    If possible, limit remote-access trunk lines to domestic calls only.

    o    If your PBX has a time-of-day control feature, use it to block the
placement of long-distance calls after business hours.

    o    Regularly monitor your long-distance billing and traffic for unusual
patterns.  Numerous attempted calls that are short in duration, for example,
might indicate a computer "hacker" seeking to break into your system.

    o    Try "hacking" your PBX to seek weaknesses in its defenses.

    If your company PBX does get hit by thieves, who pays for the illegal
calls?  Thus far, at least, legal and regulatory bodies have held that the firm
owning or leasing the PBX--and not the equipment manufacturer or the
long-distance carrier involved--is responsible for paying such charges.


          AT&T To Reopen Direct Calling Service Between U.S., Vietnam
          ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    [ Courtesy of Dow Jones News Service/Wall Street Journal April 6, 1992 ]

    WASHINGTON -DJ- American Telephone & Telegraph Co.  said it reached an
agreement with Vietnam communications officials to reopen direct communications
service between the United States and Vietnam for the first time in 17 years.

    The company said the start of service hinges on acquiring all necessary
U.S.  regulatory approvals.  AT&T said in a press release that it hoped to
offer limited direct dial service in a few days by sending calls between the
United States and Vietnam through third countries.  The company said direct
links could be available in a matter of weeks.

    Calls to Vietnam from the U.S.  mainland will cost between $2.51 and $2.91
for the first minute, depending on the time, and between $1.77 and $2.17 for
each additional minute, AT&T said.

    Currently, callers trying to reach Vietnam from the U.S.  pay as much as $8
a minute to black market telephone operators.

    AT&T said it has been working since 1988 to seek approvals from U.S.
government officials to provide telephone service for the 700,000
Vietnamese-Americans living in the United States.

    The State Department on April 13 said it would grant an exception to the
U.S. economic embargo with Vietnam to allow telephone calls between the United
States and Vietnam.  Payments due the Vietnamese for completing calls will be
placed in a blocked account under the jurisdiction of the United States
government.


             AT&T Unveils New Consumer Long Distance Phone Service
             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
             [ Courtesy of Dow Jones News Service April 28, 1992 ]

    NEW YORK -DJ- American Telephone & Telegraph Co.  unveiled its EasyReach
700 Service, a portable, permanent long distance telephone number.

    For $7 a month, customers will receive a 700 number that is theirs for as
long as they remain EasyReach 700 subscribers, no matter where on the U.S.
mainland they travel or move, the company said in a press release.

    Sucribers also get selective call forwarding and the option to receive
calls that are toll-free to the caller.

    AT&T said the service is designed primarily for long distance calling and
subscribers are expected to retain a local telephone number.  The EasyReach 700
calls will be billed at fixed per-minute prices, regardless of the distance.

    In its filing with the Federal Communications Commission, the company said
the service will be introduced June 15.

    Merrill Tutton, president AT&T consumer communications services, explained
that the new service will permit customers to use a single telephone number at
their homes, office, vacation or wherever they might choose.  The customer has
only to give friends, family or associates, his 700-number, tell AT&T the
telephone number where he can be reached and AT&T will forward all calls to the
700-number called to the location the customer desires.  AT&T also will provide
a mechanism that will allow certain calls to be billed automatically to the
700-service customer.

    AT&T said it will charge $7 a month for service.  For calls billed
automatically to the 700-service customer, AT&T will charge 25 cents a minute
at peak hours and 15 cents a minute off peak - both about the same as a regular
direct-dialed long distance rates.

    "You can give it to a child, friends, army buddies, whoever you want, and
they can reach you wherever you are," Tutton said.  He acknowledged, however,
that "there is a finite number of people that will feel this is a service they
want." Tutton said, "this is aimed at people who move around a lot, have a
couple of homes or also own a cellular phone."

    Customers can designate those whose calls can be billed to the 700-service
customer by providing them with a four-digit personal identification number.

    The charge to the subscriber is 25 cents a minute during peak hours and 15
cents off-peak, or "a penny or so more than regular long-distance rates,"
Tutton said.  Customers must make the call over an AT&T line or dial an extra
five-digit access code to send the call over the AT&T network, AT&T said.

    "That doesn't strike me as very user friendly," said Patricia Proferes,
director of card and Personal 800 Services at MCI Communications Corp.  She
noted that MCI has been offering a "Follow Me" service that allows a customer
to use a toll-free 800 number and give it out to friends or business
associates.  "People are confused by 700 numbers," she said.

    A Sprint Corp.  spokesman said the company "looked into offering the type
of service announced by AT&T and while we're not ruling out offering a similar
one in the future, we're now focusing our resources on other services."

    While Tutton wouldn't offer an estimate on the size of the potential
market, a spokeswoman noted that AT&T Bell Laboratories figured there are about
six million possible combinations of ten-digit numbers that can be offered
using the 700 prefix.  There are more than 100 million phone customers in the
U.S.  Moreover, nothing is keeping rivals MCI and Sprint from offering similar
programs based on 700 numbers.

    "This is a nifty way for AT&T to condition its customers to think of AT&T
in terms of mobile communications and local communications," said Jack B.
Grubman, telecommunications analyst at PaineWebber Inc.  Currently AT&T offers
neither of those services, and this could pave the way for the company to wade
into these markets.


                   AT&T Unveils New Fraud Protection Program
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
               [ Courtesy of Dow Jones News Servic May 13, 1992 ]

    NEW YORK -DJ- American Telephone & Telegraph Co.  said it is introducing a
new program to help its customers secure their communications systems and
control telephone fraud.

    The company said its NetProtect Basic Service, which monitors calling to
countries experiencing the highest amounts of long-distance fraud and domestic
800 service 24 hours a day, seven days a week, and alerts customers to
suspected fraud, will be offered to all business customers of AT&T's
long-distance and domestic 800 services at no additional charge.

    AT&T said it began this week monitoring its 800 service to prevent thieves
>from using the network to commit fraud.  It said it will begin monitoring
international long-distance service Aug.  1.

    The company said in addition to basic service, its customers will be able
to choose optional NetProtect products and services, for a cost, to meet their
individual security needs.

    Among the other options it plans to offer are NetProtect Enhanced Service,
which includes all NetProtect Basic Service options, provides more customized
monitoring and - pending Federal Communications Commission approval - will
offer a $25,000-per-incident limit on customers' financial liability for fraud
caused by thieves using a company's PBX; Hacker Tracker, a software package
that works with AT&T's PBX Call Accounting System Plus to detect and alert
customers to suspicious calling patterns; and AT&T Fraud Intervention Service,
which gives AT&T's PBX and voice messaging customers access to a team of
technical and security experts who can help them detect and stop fraud.

    The company said it expects the liability cap component of the program,
pending FCC approval, to take effect Sept 1.

    The problem of phone-service theft has been a bone of contention between
long-distance carriers and corporate customers, some of whom have complained
that the carriers haven't done as much as they could to stop the problem.  At
issue is whether the customer or the phone company is responsible for the costs
rung up by thieves, primarily professional hackers who get access to companies'
internal telephone systems.

    AT&T also will offer seminars to companies in watching for fraud and in
developing phone security measures for companies' staffs.  Corporate customers
would remain liable for fraudulent phone charges that do occur.

    AT&T's announcement follows a similar move several weeks ago by rival
Sprint Corp.  Unlike the other long-distance carriers, though, AT&T also makes
telephone equipment, so it could face possible complaints from customers about
insufficient equipment as well as service.  Also, AT&T's fee-based enhanced
protection programs require customers to have AT&T 800 service and AT&T
outbound long-distance traffic at each location.  Such theft is estimated to
cost companies more than $1 billion annually, according to the Communications
Fraud Control Association, a Washington-based group.  Jerre Stead, president of
AT&T's business communications systems unit, and Joseph Nacchio, president of
business communications services, said they see the cost for enhanced
protection as "only marginal" to companies.  But they noted that toll-call
fraud has increased sharply in the last few years, as companies try to make
their phone systems more user-friendly to their employees.


            AT&T - World Connect Service: English-Speaking Operators
            ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
             [ Courtesy of Dow Jones News Service April 30, 1992 ]

    NEW YORK -DJ- American Telephone & Telegraph said its World Connect
Service, beginning today, eliminates language barriers and unfamiliar dialing
procedures for Americans living or traveling abroad.

    Users of AT&T's World Connect Service will be able to place calls from 34
countries by using their AT&T Calling Card or AT&T Universal Card.  Calls will
be completed with the assistance of an English-speaking AT&T operator.

    Customers can access AT&T World Connect Service by dialing the AT&T
USADirect Service number from the countries where World Connect is available.

    Callers then give the AT&T operator the country code, city code and local
number of the person they want to reach, along with their AT&T Calling Card or
Universal Card number and the operator completes the call, the company said in
a press release.


           Sprint Unveils Calling Card To Facilitate Calling Process
           ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
             [ Courtesy of Dow Jones News Service April 20, 1992 ]

    KANSAS CITY, Mo.  -DJ- Sprint Corp.  unveiled a new Sprint FONCARD that
will enable customers to dial fewer digits to complete a call, place calls with
a card number and use new technology.

    In a press release, the company said the new Sprint FONCARD has a variety
of features designed for domestic and international business travelers.  It
will make FONCARD long distance calling simpler and enable customers to save
time, effort and money.


            Pacific Bell Delays Ending Grace Period For 213/310 Code
            ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
               [ Courtesy of Dow Jones News Service May 1, 1992 ]

    SAN FRANCISCO -DJ- Pacific Bell, citing unrest in Los Angeles, said it will
delay indefinitely the end of its six-month grace period for users of the 213
and 310 area codes.

    On Nov.  2, the company, a unit of Pacific Telesis, introduced the 310 area
code and announced that its ''permissive dialing'' period would last through
May 2.  After tomorrow, callers were supposed to be connected to a recording
asking them to redial using the correct code.

    There is no new conversion date at this time, the company said in a
statement.  Callers will still be able to use either area code 213 or area code
310 for calls into the region, the company said.


          Pacific Bell To Suspend Some Charges For Victims Of LA Riot
          ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
               [ Courtesy of Dow Jones News Service May 1, 1992 ]

    SAN FRANCISCO -DJ- Pacific Bell, a unit of Pacific Telesis, said it will
suspend certain charges for its call forwarding, remote call forwarding, and
Pacific Bell voice mail and message center services.

    In a news release, the company said it is suspending the charges in order
to help telephone calls reach the victims of civil unrest in Los Angeles.  The
offer will be available to those customers who have been forced to flee their
homes or whose businesses have been burned or abandoned.

    The suspended charges include installation fees and recurring charges for
30 days.  Usage charges won't be waived.

    It's difficult to look natural while committing a computer crime.  A sweaty
brow or quickened heart beat is not going to give you away, but activities like
logging on in the middle of the night or accessing a file that you normally
have no interest in, may.

    For a year now, the US Federal Bureau Of Investigations has been testing a
new kind of security system which attempts to trap malicious computer users, or
intruders masquerading as staff, by highlighting statistically-unusual
behavior.

    At present the system is confined to one IBM mainframe serving three or
four field officers in the Washington DC area, but there are plans to extend it
across the country.

    Over the next few years similar systems are likely to surface at other
sensitive computer sites in government agencies, defense ministries and also
the armed forces.

    The FBI's package, called Intruder Detection Expert Systems (Ides), has
been developed over six years by SRI International of Menlo Park, California,
1.5m) of funding, mainly from the US Navy.  The software monitors
individual users and groups of users and builds up a historical profile of
their "normal" behavior on the computer.

    It then monitors their current activity, and sends out an immediate alert
if there is a significant difference between the two.

    In this way Ides detects instructions that go unnoticed by conventional
password and access-control systems.  For example, it can detect hackers who
have gained access to a computer through exploiting unknown vulnerabilities.

    The FBI has uncovered some "interesting events" says Teresa Lunt,
programmer director at SRI.  "Typically," she says, "they're concerned that a
user might be providing information to someone on the street.  An FBI employee
who normally works on stolen cars, for example, might be contacted by a
drug-related criminal and asked to look something up."

    FBI cases tend to overlap department boundaries, says Lunt, so computer
users may have the authority to access a wide range of files.  With Ides,
however, they will be asked to justify any unusual actions.

    Ides also includes a second kind of snare - it is able to recognize
specific actions that are regarded as suspicious, such as a string of
unsuccessful attempts at logging on.  It archives this with an expert or
"knowledge-based" system programmed to look for particular sets of
circumstances.

    Hackers are predictable, says Lunt.  "There's a cookbook of ways to
break into a Unix or Vax system for example - you can encode that information
and look for those particular exploitations."

    Lunt says the prototype Ides, which runs on a Sun workstation connected to
the computer being monitored, may spawn a product within two to three years.

    The institute has funding for another three years of research but "we think
we can start turning out useful prototypes now," says Lunt.  SRI is not
product-orientated but the research group is looking for a joint-venture
partner to bring Ides to market.


                  Thrifty Tel's Lament: Hackers Back on Attack
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
          [ Courtesy of Orange County Business Journal April 9, 1992 ]

    "They're baaack!" says Thrifty Tel Inc.'s Rebecca Bigley.

    "They" are the computer hackers that plagued the long-distance telephone
company two years ago, as it was struggling through a difficult bankruptcy.

    Hackers are computer jockeys who gain illegal access to a target computer
system and often wreak havoc within the system.  Bigley had battled the hackers
once before --and thought she had won.  Now they have returned.

    "This time we're prepared, and they are not going to get away with it,"
Bigley said.  As if to underscore this, she has taken the offensive, calling on
the state Public Utilities Commission to help Thrifty Tel in its fight.

    As previously reported in the Business Journal, Thrifty Tel emerged from
bankruptcy in January after surviving a fire, an investigation by the
Securities and Exchange Commission and infiltration by hackers.  The company
was cleared of any wrongdoing in the SEC case.

    Then came a faulty billing package that threw the company into
bankruptcy--a hole that took two years to climb out of.

    Now hackers have started entering the company's billing system once again.
Bigley, the company's vice president, said that six hackers--all from the San
Diego area--have been tracked and caught.

    "There seems to be a group of kids operating together down there," Bigley
said. "I'm here to tell them that we know how to catch them."

    The hackers, she said, all are children of "well-to-do business people" in
the San Diego area.  She characterized one as the son of a "very prominent" San
Diego businessman.  As a condition of settlement, she agreed not to disclose
their names.

    Computer hackers have continuously plagued the long-distance telephone
industry, obtaining access codes to make their own long- distance calls without
paying for them.

    "It's a huge problem, especially for the major companies like AT&T, MCI and
Sprint," said Jeff Buckingham, president of Cal-Tel, a statewide organization
made up of 30 long-distance telephone companies.  He estimated that hackers
cost the phone companies hundreds of millions of dollars nationwide.

    Nearly two years ago, Thrifty Tel was hit with the first rash of several
dozen computer hackers, who repeatedly broke into the company's computer system
and stole long-distance access codes.  Unchecked, the problem could have put
the company out of business, Bigley said.

    Bigley mounted a personal and much-publicized counterattack against the
hackers.  After first coming up with a system that gave instant notification
when a hacker was tapping into the telephone network, Bigley applied to the PUC
for the right to impose $6,000 in "accessfees" against hackers.

    "But that does not always seem to faze them that much.  For them, the worst
is the condition of settlement: They must forfeit their computers to us,"
Bigley said.


        Illegal CB Equipment Seized From Four Dealers In Amarillo, Texas
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                [ Courtesy of Popular Communication June, 1992 ]

    Under the direction Of Assistant United States Attorney Mark Nichols, the
United States Marshalls with the assistance of the FCC's Dallas office and the
Amarillo Police Swat Team, seized an estimated $20,000 of illegal electronic
equipment.  The equipment was seized from four businesses in the Amarillo,
Texas, area: S&S CB Shop, Radio Depot CB Sales, Ben's CB Sales and Repeair and
Tri State Radio.

    After receiving a report from the Crime Stoppers office of the Amarillo
Police Department, an investigation was conducted by the FCC's Dallas Office
with the assistance of the Amarillo Police Department.  The seized equipment
included linear amplifiers and non-type accepted CB transceivers capable of
boosting transmitter power to over 1000 watts.  This level of power is well
over the legal 4 watt limit.

    The use, sale, or manufacture of linear amplifiers or other devices that
boost CB radio power beyond legal limits os prohibited by the Communications
Act and the FCC's Rules and Regulations.  These devices are capable of
disrupting public safety and aeronautical communications, and causing
interference to home electronic entertainment equipment.

    Federal law provided penalties, which include fines up to $100,000 and
imprisonment for up to one year, for a first offense.


                        Three Pirates Sentenced In Texas
                        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                [ Courtesy of Popular Communication June, 1992 ]

    Three Odessa, Texas, men have been sentenced by a United States District
Court for operating two unlicensed FM broadcast stations.  The unlicensed FM
stations used the callsigns "KROX" and "KFRE" and identified the operation as
the "Pirate Radio Network".  Agents of the Federal Communications Commission,
United States Border Patrol, United States Marshalls Service and the Odessa
Police Department cooperated in the investigation and issuances of search
warrants which led to the arrests.

    Thomas Euguene Barnes pled guilty to one count of aiding and abetting
unlawful operation of a radio station.  Both men were ordered to perform 100
hours community service and placed on a three year probation term.

    Unauthorized operation of a broadcast station creates potential of harmful
interference to stations licensed by the FCC and is a violation of Section 301
of the Communications Act of 1984, as amended


                         Area Firms Stung by PBX Fraud
                         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        [ Courtesy of South Bend Tribune Business Weekly April 18, 1992]

    SOUTH BEND--At least two area companies have recently been defrauded of
between $60,000 and $200,000 worth of long-distance telephone calls.  Both
firms requested anonymity, but confirmed the problem and the amounts.

    The local loss is part of a larger problem called PBX fraud, which has been
plaguing companies around the country.  PBX fraud usually involves breaking
through telephone switches and selling toll-free calling access to criminals.

    The fraud was discovered in Michiana when the two firms noticed a dramatic
increase in the number of calls placed to area code 809-- the code for
Colombia, South America.

    PBX fraud is accomplished by a network of hackers who randomly dial 800
numbers and attempt to break through telephone switches, commonly called PBX's,
located in companies around the country.  If successful, the hackers notify a
ready and willing band of thieves who pay for the number and use it for
"business" purposes.  The victims of the fraud are then charged for the
criminal's calls.

    In an article in the September/October 1991 issue of ISP News, published by
the MIS Training Institute Press, William J.  Cook of the United States
Attorney's office in Chicago, cited a case of PBX fraud involving Mitsubishi,
which lost over $430,000, and AT&T, which provided the telephone system.

    Although the case has not yet been resolved, Cook reported that "AT&T
responded that its standard practice was and is to give customers ample warning
of the dangers of toll fraud and that users (of telephone equipment) typically
lose out when they implement poor maintenance and security procedures."

    The fraud is not as difficult to pull off as it may seem.  At a recent AT&T
Consultants' Liaison seminar, an instructor from DePaul University in Chicago
revealed that there is a catalog available which lists software products
guaranteed to break into telephone switches or voice mail systems.

    A typical PBX fraud scenario might begin with an employee unable to place
outside calls.  The lines of the system are occupied by the criminals.  The
telecommunications department specialist may receive a call from the long
distance carrier inquiring about an increase in calls to a certain area code.
Further investigation may reveal that nearly all outgoing calls are placed to
the suspect area code.

    How should a company deal with PBX fraud?  First, if the fraud is already
established, the firm's telecommunications specialist should remove from the
system valid access to the area code the criminals are using.

    To prevent fraud from occurring, a company systems administrator should
check "call detail reports" on a daily basis looking for failed attempts to
access the telephone system or multiple calls to unusual locations.  In
addition, the firm should work with its PBX or voice mail manufacturer or a
competent telecommunications consultant to determine where the company is at
risk and what hardware, software, or procedures can be implemented to prevent
toll fraud.

    The firm should be sure to report any known attempts at fraud to federal,
state, or local law enforcement officials.



       Canadian Phone Companies Form New Holding Firms And Revise Mandate
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                 [ Courtesy of The Computer Paper March 1992 ]

    Canada's major telephone companies last month announced the creation of two
jointly held companies Stentor Resource Center Inc.  and Stentor Telecom Policy
Inc.  In addition, they announced a revised mandate for Telecom Canada, which
will now be known as Stentor Canadian Network management.

    The CEOs of the nine telephone companies unveiled their plans at an Ottawa
news conference that was to Montreal, Toronto and Vancouver, Stentor Resource
Center will consolidate the shareholder companies marketing and engineering
development activities at the national and international levels.  Stentor
Resource Center will develop and deliver national telecommunications products
and services, will develop national technology standards, will conduct or sub-
contract researches and development projects for the telephone companies, and
will establish international alliances with other telecommunications organ-
izations.  It may also become involved in systems development with the
telephone companies.

    Stentor Resource Center will officially be in operation as of January 1,
1993.  It is expected to have approximately 2,500 employees drawn from the
member telephone companies.  it will be centered in Ottawa, but will also have
operations in other parts of the country.  Brian Hewat, currently Executive
Vice-President Marketing for Bell Canada, will be appointed President and Chief
Executive Officer of Stentor Resource Center.


                      Kapor Praises ISDN As Key To Future
                      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                 [ Courtesy of The Computer Paper March 1992 ]

    Mitch Kapor, founder of Lotus Development and the Electronic Frontier
Foundation (EFF), used the keynote address at the Winter '92 Usenix technical
conference to hammer home the EFF's vision of a civilized network world, with
networking for all.

    Kapor feels that ISDN a technology considered by many to be obsolete even
before it has become widely available is in face the key to universal access to
the network world.ISDN provides digital service using the same basic equipment
used by voice technology.  An ISDN connection provides 2 channels of data at 64
kilobits/second and an additional control channel at 16 kilobits per second.
Voice communication requires 56 kilobits without compression, and typical
high-speed modems attain little more than 9600 or 14400 bits per second by
contrast.

    In theory, ISDN should cost no more than voice phone calls, because many
phone companies already transmit most of their voice by digitizing it and
sending it over the 64-kilobit channels that ISDN uses.

    Because ISDN uses the copper wires that are already in place throughout the
network world, it requires no additional physical equipment unlike plans for
fiber optic multi-megabit data connections.  ISDN is also sufficiently fast for
good quality videotelephony.

    Kapor suggested, and the audience agreed, that almost every member of the
audience would buy such ISDN service if it were available under the terms he
describes.  Such could be the start of a network world for everybody in the
USA.

    Kapor also pushed for more commercialization of the TCP/IP "Internet" that
already hooks together tens of thousands of computer systems around the world.
Kapor offered some free business ideas to the audience, suggesting that people
work to start network service bureaus to allow the exchange of money, and even
a network bank that accepted checks signed with digital signatures.

    The EFF has recently opened an office in Washington, DC to assist with its
public policy lobbying efforts.  In addition to promoting universal network
availability the EFF has worked to make itself the ACLU of the network world,
assisting those whose rights are abused by law-enforcement officers who
misunderstand or fear computer and network technology.


                New For Networks: Hayes Announces ISDN Extender
                ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                 [ Courtesy of The Computer Paper March 1992 ]

    Hayes Microcomputer Products has announced the Hayes ISDN eXTender, a
network interface module providing both ISDN (Intergrated Services Digital
Network) service under its Basic Rate Interface, and analog phone service to
users of the NeXT computer.

    The product provides an eight-pin connector to an analog telephone line.
When used in conjunction with NeXTstep release 3.0 applications, the eXTender
can be used for remote connections to local area networks, as well as high-
speed voice, data, fax and multimedia communications.

    The product represents a strategic relationship between two of the computer
industry's first wave of entrepreneurs, Dennis Hayes and Steve Jobs.

    Hayes created some of the first PC modems on a kitchen table in 1977, about
the same time Steve Jobs was forced out at Apple while Hayes faced hard times
resulting from price-cutting in the modem market.

    Since then, Jobs has founded his NeXT company while Hayes has rebuilt his
firm around ISDN and local area network access, using a subsidiary called
Practical Peripherals to fight the modem price war.  Hayes was also one of the
first U.S modem makers to aggressively search out international markets, and
has been a leader in opening the Chinese market.


             Phone Rate Hikes Are Likely to Continue, Analysts Say
             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
              [ Courtesy of The Los Angeles Times March 27, 1992 ]

    After eight years of price cuts, long-distance telephone rates for most of
the nation's households are rising, and analysts said the trend is likely to
continue as carriers retreat from the bruising competition that followed the
breakup of American Telephone & Telegraph.

    Industry leader AT&T, as well as MCI and Sprint, Thursday acknowledged the
rate increases for 1991 _ which ranged from less than 1 percent to nearly 3
percent.  The increases were necessary, they said, because the cost of doing
business also rose.

    The increases came as the carriers backed away from the intense price
competition that hammered interstate phone rates down by 40 percent since 1984.
Carriers instead are focusing their efforts on winning the loyalty of
high-volume long-distance callers with special discount programs.  While these
plans can offer significant savings, it is estimated that less than one-third
of the nation's households enjoy bargain rates.

    The trend toward high-volume discounts concerns consumer activists who
worry that low-income or elderly people who make few long-distance calls are
subsidizing the low rates enjoyed by people who can afford to call more often.

    "We are moving away from the social commitment to inexpensive, basic phone
service," said Audrie Krause, executive director of Toward Utility Rate
Normalization, a San Francisco-based consumer group.

    Representatives of the nation's three largest long-distance carriers
rejected the notion that affluent people benefit at the expense of those who
can't afford to make enough calls to qualify for a discount.

    "We do not view (basic) long-distance customers as a cash cow of any
kind," MCI spokesman John Swenson said.

    For most consumers, the increase in long-distance rates last year was
barely perceptible.  Consumer Action, a San Francisco-based consumer advocacy
organization, released a survey Thursday indicating that AT&T rates rose by a
fraction of a percent, and that MCI's rates rose by 1.2 percent.  Consumer
Action said its survey showed Sprint's rates shot up by 3.94 percent.

    Consumer Action calculated the increases by comparing the costs of calling
between four pairs of cities during the day, evening and at night to capture
time-sensitive changes in phone rates.

    The group noted that its survey is only a sampling and may not reflect
actual rate changes experienced by consumers.  In fact, Sprint disputed the
survey's findings, saying that it raised basic long-distance rates by 2.7
percent last year.

    Consumer Action spokesman Michael Heffer said MCI and Sprint raised their
rates to more closely match the rates set by AT&T, the largest and usually the
high-price carrier.  The survey indicated that Sprint's rates now match AT&T's
in some cases, while MCI continues to price itself below AT&T.

    In a statement, Consumer Action Executive Director Ken McEldowney
criticized the rate increases as unjustified.

    "At first glance, it looks as if the carriers are raising rates to offset
revenue losses they may be incurring from their discount calling plans."

    But the carriers disputed this.  AT&T specifically attributed its rate jump
to a government-ordered rise in the amount the company must pay local phone
companies to offset the cost of doing business in low-income areas.

    While AT&T would not disclose the size of the federally mandated cost
increase, spokesman Michael D.  Johnson said, ``AT&T did not pass along the
full extent of our costs.''


                          Computer Virus Fails To Byte
          Canadian Tipped Off In Time But Other Countries Not So Lucky
          ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                 [ Courtesy of The Toronto Star March 7, 1992 ]

    It was billed as the great plague, but it turned out to be nothing more
than a sniffle.

    Advanced precautions taken by Canada's governments, universities and
corporations served as immunization against a lethal computer virus known as
Michelangelo.

    Other countries, however awoke to the Italian Renaissance artist's 517th
birthday yesterday with gibberish on their IBM-compatible computers.

    The virus, which attacked sporadically around the globe, left South Africa
hardest hit, with more thank 1,000 computers affected in 450 to 500 businesses,
most of them pharmacies.

    Police in Amsterdam said the virus was unwittingly spread around the world
by a Taiwanese software copying house, by Taiwanese authorities have not
identified the firm.

    Immunization techniques appeared to have avoided the worst effects in
Europe and Asia and, with Middle Eastern offices closed for the Muslim day of
prayer yesterday, the extent of damage there was not know.

    John McAfee, president of the U.S.-based Computer Virus Industry
Association, a research group of software and hardware makers, estimated that
at least 10,000 computers has been hit world-wide and had lost data.

    The virus, scheduled to strike at 12:01 a.m. yesterday, wipes out the
contents of hard disks of infected computers as they are switched on.

    Any computer compatible with IBM equipment is a potential target, but the
virus can be eradicated by special software.

    Only a handful of cases were reported in Toronto, Ottawa and Kitchener, and
these occurred days before the artist's birthday.

    Over-all, government agencies seemed to escape the deadly virus, said
Constable Greg Peters of The Royal Canadian Mounted Police in Ottawa.

    "We notified 150 government agencies and private contact and advised them
to prepare themselves," Peters said yesterday.

    "We're quite confident that preventive measures halted the virus."

    IBM Canada Ltd. reported no problems from its customers, who own 1 million
PCs across the country, adding that a warning earlier this week about the virus
gave people time to prepare.

    Maclean's magazine suffered some minor disruption from the virus, but it
did not affect editorial content, an official said, and most of the wiped-out
information was backed up on other files.

    Bell Canada kicked in its anti-virus software this week, searching for bugs
in the system, but none were found, said David Goldsmith, associate director of
corporate security.

    Norton anti-viral software used on computers at the Toronto Stock Exchange
seemed to prevent any problems, said Olaf Kraulis, vice-president of
information systems.

    The University of Toronto - which was hit with the virus in a test last
week - also didn't experience problems, said Wilfred Camilleri, the
university's manager of security.


                       Computer Crime Problem Highlighted
                       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                 [ Courtesy of The Toronto Star March 9, 1992 ]

    With the growing corporate dependence on computers, "information crimes"
have become easier to commit but harder to detect, says a Toronto-based
security company.

    "Electric intrusion is probably the most serious threat to companies that
rely on computerized information systems," Intercon Security Limited says in
its Allpoints publication.

    Allpoints cited a study of 900 businesses and law enforcement agencies in
Florida showing that one of four businesses had been the victim of some form of
computer crime.

    "While most of the media attention has focused on `hackers,' individuals
who deliberately and maliciously try to disrupt business and government
systems, one estimate indicates that 75 per cent plus of electronic intrusion
crimes may be `insider attacks' by disgruntled employees," the publication said

    In Intercon's experience, vice president Richard Chenoweth said the company
is as likely to find a corporate crime committed by a disgruntled employee as
one one perpetrated by an outsider.

    Intercon said the technology exists to guard against most electronic
intrusion.  "The problem is that many information managers still don't believe
there is a risk, so they are not making the best possible use of what is
available."

    More on computer security and corporate crime in Allpoints, Telephone:
(416)229-6812.


                  MCI, Sprint Take Steps to Cut Off Swindlers
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
               [ Courtesy of The Washington Times March 1, 1992 ]

    MCI and Sprint yesterday said they are cracking down on telephone fraud.

    The two long-distance carriers are tackling different kinds of
swindles, though:

    o    MCI said it will stop sending out bills for pay-per-call operators who
promise help getting a loan, credit, a credit card or a job.

    o    Sprint said it will offer large business customers a form of liability
insurance against unauthorized use of corporate switchboard lines.

    MCI Communications Corp.  of the District said it wanted to protect
consumers who might be gulled into overpaying for some "900- number" services
during economic troubles.

    But long-distance carriers are also guarding their own bottom lines by
tightening up pay-per-call standards, said telecommunications analyst James
Ivers.

    "They're acting fiscally responsibly because traditionally these were the
types of programs that created a high level of uncollectable" bills when
ripped-off consumers refused to pay, said Mr.  Ivers, senior analyst with
Strategic Telemedia, a consulting firm in New York.

    Last September, Sprint Corp., of Kansas City, Mo., told more than 90
percent of its 900-number customers it would no longer do their billing.
Long-distance firms cannot refuse to carry pay-per- call services, but most
900-number operators do not want the expense and trouble of doing their own
collections.

    American Telephone & Telegraph Co., of New York, said it has set up strict
guidelines for all 900-number firms, such as disclosing in advertising any fees
charged for credit processing.

    AT&T spokesman Bob Nersesian said: "We still think there are legitimate
providers of this kind of service and our guidelines keep the dishonest guys
off the network."

    Sprint's switchboard-fraud liability protection is aimed at big customers,
whose Sprint bills are more than $30,000 per month.

    For an installation fee (up to $5,000) and a monthly charge (also up to
$5,000), Sprint will absorb fraudulent phone charges above $25,000 per
switchboard.  The customer pays the first $25,000.  Sprint's liability ends at
$1 million.

    Large and medium-sized companies can rack up huge bills if their private
switches, known as private branch exchanges or PBXes, are broken into and used
to make calls to other countries.

    In a recent case, more than 20,000 calls were made on a company's PBX over
a weekend, with the charges estimated at more than $1 million, said M.R.
Snyder, executive director of Communications Fraud Control Association, a
Washington trade group.

    "It is certainly (a fraud target) that is ripe for being abused," Ms.
Snyder said, especially since telephone carriers have improved their ability to
spot unauthorized credit-card calls more quickly.

    Overall, telecommunications fraud costs phone carriers and customers an
estimated $1.2 billion per year although the figure is really just a
"guesstimate," Ms.  Snyder said.

    Company PBXes often have features that allow traveling employees, or
distant customers, to call in and tap an outgoing line.  With computer
programs, hackers can randomly dial numbers until they hit security codes.

    Sometimes the codes are only four digits, so hackers don't even need a
computer said Bob Fox, Sprint's assistant vice president of corporate security

    Along with the fees, customers must agree to take certain precautions.
Those include using security codes at least eight digits long and eliminating
the ability to tap outside lines through voice mail.  In return, Sprint will
also monitor PBX use every day, instead of the five days per week currently
done free for customers, Mr.  Fox said.

    MCI spokesman John Houser said his company will be watching Sprint to see
if the program is a success.  Spokesman Andrew Myers said AT&T offers fraud
protection to some corporate customers but is not considering extending that to
cover PBX abuse.

    AT&T is currently involved in several lawsuits over disputed PBX charges
that total "many millions" of dollars, Mr.  Myers said.  Sprint officials said
they have not sued any customers to collect on PBX fraud bills.


                      Province Careless With Data: Auditor
                      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                  [ Courtesy of Toronto Computes March 1992 ]

    When lunch hour moves in, government employees move out, abandoning desks
and computers in search of sustenance.  Dutifully, they stuff confidential
papers into safes and cabinets.

    But those diskettes holding private credit data and other confidential
information are often casually strewn atop desks.

    Nearly 65 percent of government staff don't lock up diskettes containing
confidential information when they leave their stations, according to Douglas
Archer who recently retired as provincial auditor, Ontario's watchdog for
government spending.

    Are we governed by a computer-careless, if not computer illiterate, body?
Yes, according to Archer's last report.

    "The problems we identified were so widespread, we felt it was fair to be
critical of the entire system government-wide," said John Sciarra, executive
assistant to the auditor.

    In the daily use of desktop computers by government employees, the auditor
found information inadequately protected, staff unaware of when they were
handling confidential data, few guards against viruses and incidents of
unlicensed copies of commercial software.

    Also present was that bane of computer equipped organizations, inadequate
selection and protection of passwords.

    At five different ministries, said the auditor, it was easy to find phone
numbers, user names and passwords all the supposedly confidential information
anyone would need to gain acces to computers via modem.  In some cases, that
information was pinned to a wall, taped to keyboards or left on a desk.

    Lax security precautions were also found in the powerful government
mainframes.  The auditor examined five mainframes, focusing on how each
managed its security software, known as Resources Access Control Facility, or
RACF.

    The report gave very low marks to the Ministry of Correctional Services.
But Bill Gray, director of management information systems at the ministry's
North Bay data center, said security is not lax.

    "The wording (of the report) is much more pejorative than the reality.
It's not terribly lax."

    According to the report, the data center's mainframe had too many
privileged users and poor password controls.  As well, some users were capable
of altering the audit trail information, allowing them to erase records of
their activities.

    The Information Security group at North Bay didn't have control of the
command to turn RACF off, nor had it changed the original password required to
use that command.

    Gray said Corrections' poor showing was because RACF had just been
installed in December 1990.  "When they audited, the data center had been in
operation for only weeks.

    "Most people, I think, would recognize that when you set up something new
there are lots of things to do and we missed some of these, frankly.  The
auditor pointed them out to us and we thanked them for it.  It helped us
improve our security, and for us, because of the line of business we are in, we
take security very seriously probably more seriously than most organizations."

    Gray said the center has done a review of its technical staff and
"documented who can and should have access, and the number has been reduced."

    The only recommendation not implemented is encryption.  "We have evaluated
that and we are still uncertain if that's a wise thing to do," said Gray.

    He said there are some questions about the RACF encryption system.  "That
option apparently doesn't work all the time.  It causes some failures under
certain conditions."

    Only the Ministry of Revenue received a glowing report card from the
auditor.

    "It's and educational thing, the knowledge level of people," said John
Thompson, manager of technology security at the Revenue Ministry.

    "Revenue has a fairly strong technology base and I think we are alert to
the technology concerns."

    One ministry spokesperson said mini-computers were at fault for security
problems.

    "Minicomputers were initially purchased to process information for small
numbers of people...The minis were traditionally much less well protected
since the loss of a mini threatened only local interests."

    The next step for the auditor's office is to return to the ministries to
check on whether its recommendations are being implimented.

    "It's still to early, "Sciarra said." "We'll probably do follow-ups in the
summer."

    Follow-ups aren't as detailed as audits, and the next audit isn't due for
five or six years, he said.

    "We audit government programs on a cyclical basis. There are too many
government programs to allow annual audits."

    Sciarra said a detailed follow-up will have to come from the standing
committee on public accounts of the Ontario Legisature.  That all-party
committee made up of 11 MPPs is designed to keep government bureaucracy
accountable by holding public hearings on issues raised by the auditor.

    "There are so many weaknesses we identified." Sciarra said, "I think the
public accounts committee will be selecting those three sections of the 1991
report (dealing with computer security) for more detailed review.  It is on
their agenda, but hasn't been scheduled for hearing yet."

    Sciarra said that once the committee tackles the problem, there will be
considerable "pressure exerted" for better security measures.


                    Virus Helped United States Win Gulf War
                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                  [ Courtesy of Toronto Computes March 1992 ]

    Computer virii have moved from the basements of techno-weenies into the
Cloak-and-dagger world of military espionage.  According to an American
newsmagazine, the U.S military used a virus to cripple the Iraqi airforce
during last year's Gulf War.

    In an operation worthy of James Bond, American intelligence agents
identified a French printer about to be smuggled to the Iraqi army from Jordan,
according to unidentified senior U.S officials who leaked the story to U.S News
and World Report.  The agents then removed a chip in the printer and replaced
it with a chip that contained a virus.  The virus was designed the National
Security agency, the magazine said.  A spokesperson for the NSA told Toronto
Computes that it would be inappropriate to comment on the story.

    According to the magazine article, the virus was intended to foul up a
mainframe computer tied to Iraq's air defense system, said the magazine.  "Once
the virus was in the system, the U.S officials explained, each time an Iraqi
technician opened a window on his computer screen to access information, the
contents of the screen simply vanished."

    Because the virus originated in a printer, it evaded detection by the Iraqi
computer.  "It's a very sneaky way to get a virus in," said Glenn Price-Jones,
technical services director for Wanikas Software Inc.  of Toronto which
provides a wide range of anti-virus services and distributes VirusBuster
software for Leprechaun Software International.  "It would make it very
difficult to find the source of the virus.  You wouldn't expect a printer to
cause software subverstion."

    The operation must have been incredibly sophisticated, he said.  "You'd
have to know how a central processor and a printer communicate with each other
in great detail and how to subvert that." But a virus writer could figure out
how to confound a mainframe system if it's one that's widely used, he added.

    "It's pretty easy to know the system if its in use many areas." But the
operation would have been difficult.  "Someone would have to have the printer
stolen between France and Iraq, change the chip, then put the printer back on
the transportation route without any detection."

   The virus directed against Iraq could also infect innocent victims, said
Price-Jones. Such a virus could have infected civil aviation systems, causing
civilian airplanes to be misguided by air traffic controllers, he said.

    It's likely the military and the civilian air control systems used the same
type of hardware, making it possible for the virus to spread, he said.

    "They have to talk to each other or they'll be straying into each others'
air space." If the Iraqi military passed along any data to civil aviation
authorities, the virus might have ridden along with the data.  "With something
as insidious as this the virus could hide itself as a data record."

    But it's highly unlikely the virus would have spread to civil aviation
authorities in other countries because they'd have to be using the same
hardware and software as the Iraqi military was using, he said.  There's a
greater risk that the Iraqis discovered which printer chip carried the virus,
cloned it, then smuggled it into a printer destined for the military of the
U.S.  or some other country.  But such a smuggling operation would probably be
detected before it did any damage.  it would be easy for security officials to
check for tainted chips by examining every chip and seeing whether they match
the specifications of a good chip.

    Price-Jones said there was no possibility that such a virus could be used
to foster world peace, say by disabling every country's nuclear arsenal.

    "In theory you could do it, but there are too many layer of failuch as DOS 
Macintosh, and very difficult on mainframes, said Price-Jones.  "There's
built-in security in a mainframe.  You usually can't get access into a
mainframe without being detected."

    It's virtually impossible to run a mainframe without first entering a
personal password.  And once you've given it your password, the system
maintains a record of everything you do.  So most mainframe virii would carry
the electronic fingerprints of its creator.

    DOS systems, however are very virus-prone and are becoming increasingly
susceptible, said Price-Jones.

    "There is zero security in DOS systems.  You can look at anything you want.
It's wide open.  As PCs become the global-village network, the risk is getting
higher.  There are 100 million DOS PCs in the world and they're getting
cheaper.

    A $200 compiler program lets you write a very elegant little virus."
A spokesperson for the Iraqi Embassy in Ottawa wouldn't comment on the story
and said questions should be addressed to the ambassador by fax.  The
ambassador did not respond to a faxed request for a comment.


              AT&T Provides Debit-Card Service To Visitors In U.S.
              ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                [ Courtesy of Wall Street Journal May 12, 1992 ]

    American Telephone & Telegraph Co.  and other U.S.  long-distance carriers
are offering services that let foreign visitors to the U.S.  prepay their
long-distance phone calls here, The Wall Street Journal reported.

    AT&T, the nation's largest long-distance phone carrier, said it plans to
announce its AT&T TeleTicket service today.  It said the debit-card service
will assist the caller in one of nine languages and that it has started taking
orders for the debit cards which customers use to make the calls.

    About 42 million travelers visited the U.S.  last year, according to the
U.S.  Travel & Tourism Administration, a Department of Commerce agency.  AT&T
said its studies showed each visitor made an average of four phone calls per
visit last year.

    "There's a different calling system here and it can be very confusing" to
an outsider, said Margaret Barrett, director of Global Consumer Services at
AT&T.

    Unlike the foreign debit cards, AT&T customers won't have to search for a
special phone that takes its debit card, according to Barrett.

    TeleTicket customers will dial a special "800" number to make their calls,
then punch in an identification number that also tells the AT&T system the
customer's regular language.  A recorded message tells the customer how to
select each service, including phone calling.  Once the call is completed, the
cost of the call is deducted from the customer's prepaid card account.

    In addition, TeleTicket users can also dial the number to gain access to
U.S.  weather reports, currency exchange information and interpretation
services in their own language.  AT&T is offering the service initially in nine
languages: Dutch, English, French, German, Italian, Japanese, Korean,
Portuguese and Spanish.

    TeleTicket calls will cost more than regular direct dial calls.  Under the
AT&T plan, a three-minute call to the Netherlands costing $5.10 at regular
rates will cost $7.20 using a TeleTicket card.

    Barrett said AT&T hopes to distribute the debit cards through numerous
channels overseas, including travel agents, airlines and tourist bureaus.

    Other carriers are tapping into this international traveler market.  In
early April, Sprint Corp.  announced a debit card program that lets Japanese
and Mexican travelers buy phone call credits in $10, $20 and $50 increments and
get language assistance.  MCI Communications Corp.  said it will unveil its own
debit card program for travelers in a few weeks.  The regional Bell companies
are said to be readying their own debit card programs and some carriers in
other countries are beginning to offer prepaid debit cards to travelers.


          Authorities Uncover Network of Hackers In Credit Card Fraud
          ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
               [ Courtesy of Wall Street Journal April 20, 1992 ]

    SAN DIEGO (AP) -- Police said they have cracked a network of young computer
hackers who were able to make millions of dollars in fraudulent credit card
purchases and break into confidential credit- rating files.

    As many as 1,000 hackers, ranging in age from 14 to 25, have shared such
information nationwide for at least four years, Detective Dennis Sadler said.

    He said officers stumbled upon the network while investigating a local case
of credit card fraud.

    An alleged hacker picked up in late March agreed to cooperate and has
provided information to police and the FBI, Mr.  Sadler said.  Authorities
refused to identify the person.

    The probe has led to the arrest of two teens in Ohio and seizures of
computers and related items in New York City, the Philadelphia area and
Seattle.

    Police say the hackers can gain access to the computers of national credit
card agencies and credit reporting agencies through such major computer
networks as Telenet, Signet and Sprintnet.

    Hackers obtained some information from computers at Equifax Credit
Information Services, an Atlanta-based credit reporting agency.

    "We're still in the process of investigating, and we're working very
closely with San Diego police," said company spokeswoman Tina Black.

    Equifax, one of the nation's three largest credit bureaus, has a database
that includes about 170 million credit files.  Ms.  Black said fewer than 25
files were compromised.


                Bell Atlantic Picks N.J. Town To Test Technology
                ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                [ Courtesy of Wall Street Journal May 1, 1992 ]

    PHILADELPHIA -- Bell Atlantic Corp.  said it picked Union City, N.J., for
a joint test with American Telephone & Telegraph Co.  of technology to bring
information services to the classroom.

    The companies announced last October that they planned to test a technology
that allows the transmission of interactive voice and data as well as
full-motion video over existing copper wires in the telephone network.

    The technology is called "asymmetrical digital subscriber line," and allows
compressed video signals to be carried only one way over regular copper phone
wires.  It also allows the same line to transmit voice, data and video signals
simultaneously.


 ------------------------------------------------------------------------------


                -=- United Phreaker's Incorporated Magazine -=-

                      Volume Two, Issue Six, File 10 of 11

                         Member & Site Application Form


    UPI has once more returned and it is no longer the shit group it used to
be.  We are looking for quality members that are willing to contribute to the
group.  We are especially looking for people who are experienced in electronics
and chemistry, and any other P/H/C/A topic.  If you would like to join UPi
please fill out the application below then rename the application form to your
alais and zip it up and upload it privately to The Cathedral or you can send it
to us in ascii form via our internet e-mail address (which is listed in the
main introduction).

What is your handle?
:
What is your first And last name?
:
What is your voice phone number?
:
What is your data phone number?
:
What city do you live in?
:
What province/state do you live in?
:
What country do you live in?
:
How old are you?
:
How many years of experience do you have in the underground?
:
What are you specialities in the underground?
:
:
:
:
:
What do you have to offer UPi?
:
:
:
:
:
Are you/or have been a member of any other groups?
:
List anything else below that you want to say about yourself that would
convince us to let you become a member?
:
:
:
:
     If you run a board and would like you board to become a site for UPi please
fill out the following information.

What is the name of board?
:
What is the phone number?
:
How many megs does the board have?
:
What baud rate is supported?
:
What bbs program do you run?
:
How does you board support the underground?
:
Is the anything special about your board?
:
:
:
:
:
List anything else below that you want to say about your board that will
convince us to let you become a site?
:
:
:
:
:


 ------------------------------------------------------------------------------

                -=- United Phreaker's Incorporated Magazine -=-

                      Volume Two, Issue Six, File 11 of 11


 [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]
 !!                                                                          !!
 !!   U P i - U N I T E D   P H R E A K E R ' S   I N C O R P O R A T E D    !!
 !!                                                                          !!
 [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]

 Founder And President: The Lost Avenger - Editorial Staff

 Vice President: Arch Bishop - Editorial Staff

 Writers: Truth Assasin
          Black Flag
          Hardwire
          Master Of Gold
          Silcon Phreaker
          VC Hacker

 Site Listing:
 ------------------------------------------------------------------------------
 Node     BBS Name                 Area Baud Megs BBS        Sysop
 Number                            Code Rate      Program
 ------------------------------------------------------------------------------
 WHQ      The Cathedral             416 14.4   85 Telegard   Arch Bishop
 Node #1  Pango                    +972 2400  200 SuperBBS   Basil Chesyr
 ------------------------------------------------------------------------------

    Freelance writers are always welcome to write articles for future UPi
Issues.  If you would like to submit an article please send then to The Lost
Avenger or Arch Bishop via The Cathedral or send them to The Lost Avenger via
Internet E-mail.  If the article is not accepted you will be notified and let
known the reason why or why not, your article was not acceptable.  But don't be
discouraged if your article wasn't acceptable, you may submit more articles
even though one of your other submissions were not accepted.

    New members from anywhere in the world will always be welcome.  If you wish
to join the group, you must logon to The Cathedral and acquire an account.
Once that's done, you need to ask TLA or AB for the UPi questionnaire to be
used to evaluate you.  Once you pass, an email of congratulations will be sent
to you and you will be able to participate fully in the group in addition to
getting your name on this elegant introduction screen.

    Impress chicks with how you're a member of a premier international
organization of freelance anarchists with the capability to reach out and touch
a globe.

 [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]
 !!                                                                          !!
 !!   U P i - U N I T E D   P H R E A K E R ' S   I N C O R P O R A T E D    !!
 !!                                                                          !!
 [$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]==[$]