💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › K1INE › k-1ine_… captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-

k-20-(9)-01

OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
    OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
                             OoO=o=oOO=o=O=>
:    -`-             -`-      OoO=o=oOO=o=O=>
;  _|_--oOO--(_)--OOo--_|_      OoO=oOO==OoO=o=oOO=o=O=>
   |   � K-1ine Zine !   |      OoO=o=oOO=o=O=>
    ! issue 20, volume 9 �      OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
       ---------O^O----        OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
;.              |__|__|       OoO=o=oOK-1ine=o=OIsOoO=o=SooOO=o0LDSKOOL!oO=o=oOO=o=O=>
                  || ||       OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
            ooO Ooo          OoO=o=oOO=o=O= OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
                          OoO=o=oOO=o=O=OoO=o=oOO=o=O=O=o=ooO=o=>
   ;`-.> October 2001 <=o=O=o=O=o=O

   
   'You Make Me [sic]'


                 A diplomat's life consists of three things:
                      protocol, Geritol, and alcohol.
                            -- Adlai Stevenson

_____________________________________________________________________________

� .- Words from the Editor -. �                                              |


____________________________________________________________________________

� .- Documents -. �                                                          |


_____________________________________________________________________________

� .- Conclusion -. �                                                         |


_____________________________________________________________________________ 



  Introduction -

  Wow, this is time to celebrate; K-1ine Issue #20 is out! It's hard to believe
  I've compiled 20 issues since its beautiful birth in Mid 1999. I have to hand
  it to myself for the dedication, and to all the contributors who have helped
  to make K-1ine the largest and most insightful H/P e-zine in Canada!

  I hope you enjoy this issue... see you next month!  

 -->

Contact Information;
=-=-=-=-=-=-==-=-=-=

Comments/Questions/Submissions: theclone@hackcanada.com

On IRC: irc.2600.net - #hackcanada, #cpu (key)

Check out my site: (Nettwerked) http://www.nettwerked.net

-->

=-=-=-=-=-=-==-=-=-=
Affiliate Web-Links:
=-=-=-=-=-=-==-=-=-=

CPU		    http://www.nettwerked.net/cpu *
Damage Incorporated http://www.freeyellow.com/members6/damage-inc/index.html
Grass Hopper Unit   http://www.ghu.ca
Hack Canada         http://www.hackcanada.com
H410G3N-dot-com     http://www.h410g3n.com
Phreak BC           http://www.phreakbc.com
PyroFreak           http://www.multimania.com/pyrozine/index.html



--

                             -- Advertisment --

          +++              WWW.HACKERSALVAGE.COM               +++

           HackerSalvage.com is a non-profit website dedicated to
            keeping old hardware in circulation. Many of us have
           piles of it sitting around but can't just toss it out.
             Here you can post computer items for sale or post a
           want ad for items you are looking for. A perfect place
           to get rid of perfectly good junk.... and get some new
                         stuff to rebuild the pile.
          +++                                                  +++ 

--

Flippersmack AD -

"Flippersmack is a culturemag for a penguin generation. What does this
mean? Articles and reviews from your favorite writers. The low-down on
what's fresh in tech, comics, movies, and music. Wrapped in a style all
its own."

"We will strive to release Flippersmack every week; a taste of insanity to
inspire, inform, and entertain. From the creators of System Failure and
Avalanche, there's a new zine out on the net: FLIPPERSMACK!"

You can read the first fourteen issues at:

http://www.nettwerked.net/flippersmack001.txt
http://www.nettwerked.net/flippersmack002.txt
http://www.nettwerked.net/flippersmack003.txt
http://www.nettwerked.net/flippersmack004.txt
http://www.nettwerked.net/flippersmack005.txt
http://www.nettwerked.net/flippersmack006.txt
http://www.nettwerked.net/flippersmack007.txt
http://www.nettwerked.net/flippersmack008.txt
http://www.nettwerked.net/flippersmack009.txt
http://www.nettwerked.net/flippersmack010.txt
http://www.nettwerked.net/flippersmack011.txt
http://www.nettwerked.net/flippersmack012.txt
http://www.nettwerked.net/flippersmack013.txt
http://www.nettwerked.net/flippersmack014.txt
http://www.nettwerked.net/flippersmack015.txt
http://www.nettwerked.net/flippersmack016.txt
http://www.nettwerked.net/flippersmack017.txt
http://www.nettwerked.net/flippersmack018.txt
http://www.nettwerked.net/flippersmack019.txt
http://www.nettwerked.net/flippersmack020.txt
--

--=[ LINK OF THE MONTH ]=--

 Every month I post one really great "link of the month" on every issue
of K-1ine magazine. The link can be anything in the technology industry,
music scene, rave scene, punk scene, or even a good article you read on a
news site. I'll be taking submissions via e-mail or IRC right away;
so get your links in and maybe you'll see it in the next issue of K-1ine!

For the month of October, the link of the month is:

		  http://www.hypervivid.com
                 Great Information Technology and
           Telecommunications Security Consulting Firm!

[submitted by: The Clone]

--

K-1ine Mirrors:

        http://the.wiretapped.net/security/info/textfiles/k1ine/


"Wiretapped.net is an Australian site offering an archive of open
source software, informational and advisory textfiles and radio/conference
broadcasts covering the areas of network security, network operations,
host integrity, cryptography and privacy. We aim to become the largest
archive of this nature in the Asia/Pacific region through steady growth
of our archives and regular updates to them (most updated nightly).
We are proudly telehoused on a 10Mbit/sec connection by Connect.com.au using
OneGuard hardware donated by eSec Limited. The archive, along with its
sister site on the same machine, The AusMac Archive, generates between 10
and 60 gigabytes of outbound traffic daily. Wiretapped.net is hosted in
                        Sydney, Australia."

--

  Def Con 9 coverage for 'Nettwerked: The Movie' is now online!
            Please download from the following mirrors:

         Disclaimer: If you're under 18, don't watch this video.
 Contains scenes of nudity and drunkin' hackers 'n' phreakers acting silly.

     * Mirror #1: http://lumo.eghetto.ca/~theclone/defcon9.wmv
       (the_p0pe's server, Nova Scotia, Canada, 4Mbps)

     * Mirror #2: http://www.pstis.com/defcon9.wmv (h410g3n's server,
       Edmonton, Canada, 4Mbps)

     * Mirror #3: http://www.h410g3n.com/defcon9.wmv (h410g3n's
       server, Leduc, Canada, 4Mbps)

     * Mirror #4: http://www.plappy.com/defcon.wmv (Plappy's server,
       Edmonton, Canada, 2Mbps)

     * Mirror #5: http://the.wiretapped.net/multimedia/defcon9.wmv
       (Wiretapped.net server, Sydney, Australia, 10Mbps)

     * Mirror #6: http://sniperwolf.powersurfr.com/~theclone/defcon9.wmv
       (son4r's server, Edmonton, Canada, 2Mbps)

     * Mirror #7: http://www.nurotek.net/linux/media/defcon9.wmv
       (Nurotek Networks server, California, USA, via two 45Mbps pipes)


 			   Help mirror my video! 

	32.1MB's, 103 kb's / sec, 43:36 minutes, Windows Media Format;
	MPEG-4. Send all new mirror URLs to: theclone@hackcanada.com

--



    ############## #.txt - Introducing Hash ############## 
########################################################
############################     #######################
##########################  ####  ######################
####################       ######      #################
###                s#################  #################
### H###    ####  ##########    ####### ################
### ####    #### ############    ##### #################
### ####    #### #       ####    ###  ##################
### ####    ####   a##### ###    ##  ###################
### ############  ######## ###      ####################
### ############ ####  #### ###  #######################
### ####    #### ###    ### ### ########################
### ####    #### ##     ### ###  #######################
### ####    #### #      ### ####  ######################
### ####  # #### ########### ####                    ###
##      ### #### ########### ####  ################# ###
## ### ####            ###### ####   ############## ####
### ##  ##  ####### ##   ####   ####   #########    ####
### ###    #######  ####  #### ####### ########  #######
### ############   ######      #######  ######  ########
###  ########   ###################### ####### #########
####  #########      #############     ######  #########
##### #############   ########    #########  ###########
#####  ##############   ####   ###########  ############
######  ######H########  ##  ###########  ##############
#######    ############# ## ##########   ###############
##########   ############  #########   #################
############  #####################  ###################
#############  ###################  ####################
############## ################### #####################
############## #########  ######## #####################
############## ######## ## ####### #####################
############## ####### #### ###### #####################
#############  ######  ####  #####  ####################
############  #####  ########  ####   ##################
##########  ####### ########## ######   ################
########  ######### ########## ########   ##############
#####   ########### ########## ##########  #############
#### #############  ##########  ########## #############
#### ############  ############  ######### #############
####  ########### #############  ########  #############
#####             ##############          ##############
########################################################
########################################################
#phlux                              phlux@fucktelus.com#


:OVERVIEW:
So what the fuck is hash?? Hash can refer to the # (pound) key pertaining to
telecommunications. It can be the slang term for hashish, which refers to the
purified resinous extract of marijuana. Hash is also a unix command and has
roots in C aswell. In this txt i will refer to hash as the phreaking related
database program i will be writing. Right now it is in planning stages
and hopefuly soon i can begin coding, first i need your comments, suggestions,
and ideas.

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!Please, read the functions and consider wether such a program is worth your !
!time, as im sure it will be. For this to become reality all i need is input.!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

-:contact:-
/msg phlux on irc.2600.net irc.dal.net
ICQ 11192969, MSN m_s_n_sucksdank@hotmail.com
E-Mail fraud@verizonmail.com


-:intent:-
The aims of this program will be to provide multiple functions that otherwise
would otherwise be not easily accessible/available

Main objective: make Hash a simple program, easy to use, providing a wealth of
information and uses.


-:requirements:-
Because of the nature and simplicity of my my intents, the program will be
able to function on a 386, idealy, i plan on running Hash constantly, so use
of a dedicated low end computer is essential.

-:note:-
Because i am canadian, Hash will be written with a canadian prespective,
so alot of the functions will be canadian only, or more information will be
provided to canadians, and therefore more useable. However american users will
still find value for Hash

-:FUNCTIONS:-
If your wondering what the big fucking deal is then ill list off the functions
now;

to be incorporated into Hash:


  NPA map(color)


 NXX-XXX-XXXX (N is any digit other then a 1 or 0) this is the proper format
 for a north american telephone number. Much MUCH information can be told
 from a telephone number. For instance;


  that number isn't assigned, and you want to buy it, Hash would tell you
  the 938 exchange in SAC 900 is operated by Federal Transtel, Inc.
  and to contact Ms. Geri Capri at 800-933-6600 extension 6202.

 \Also reversing of telephone number words should be implemented(tell hash the
  words and it will tell you the possible phone number combinations)
  In the meantime check phonespell.org to see exactly what i mean.

-900-NXX-XXXX -is a telephone number where an announced cost to call to
 such a number is billed to the calling party. 900 again is an SAC, so
 therefore it is non geographical. Other non geographical NPAs include:
 456 - Inbound International
 600 - Canadian Services
 710 - US Government



  Stentor Canadian Network Management, and additional information would be
  given, (contact information) in this case you would call Laurie Storm
  at 519-663-7485 .....


   you, 519 NPA is assigned to Ontario, CANADA, that it has been inservice
   since Janruary, 1, 1953, if it is geographic or not(it is), while the 663
   exchange serves London. Much more information can be incorporated, such as
   Time Zone for that area, even conversion and comparison as per your
   timezone.

 \This would be useful if you don't want to be calling your distant phreaking
  buddies for a conf and end up waking up their mom because its 5am there.
  --depending on supply(coding)+demand issues, the relief planning stats for
  the NPA could be displayed, for instance, in 403 (alberta canada) Hash
  would've given the date of the area code split and the next time the NPA(s)
  would be in jeopardy for relief planning.


  represent like digits (so 800 888 877, 866 etc) are all  tollfree numbers.
  800 is not technicaly an area code but rather an SAC(service access code).
  This is an example of an ECR, Easily Recognized Code.

 \The INWATS(Inward Wide Area Telecommunications Service(8XX SACs)) has
  six bands of service areas.
    Band 6 -the best, anywhere in North America can reach a band 6 INWATS
     Band 5 -includes the 48 contiguous states
      Band 1 -includes only the state contiguous to that one
   So therefore a band 6 can be most easily reached(bands are responsible for 
   your american friends being able to dial into that conf, yet if you are
   canadian you will get an annoying intercept msg.)

!NOTE: This information pertaining to INWATS bands is courtesy of one
 Mr. Jolly Roger and is outdated, and therefore will be subject to R&D.

  \Intrastate INWATS (can only be called from one state) always has a
   2 as the last digit in the exchange, so 800-NX2-XXXX. The NXX (exchange)
   on 800 SACs respresents the area where the business is located.
   So 800-431 would terminate at a New York CO.
   (again this information courtey Jolly Roger, subject to further R&D
   obvisouly, in the meantime does anyone know how he figures 800-431
   terminates in NY? I sure as hell don't)

 **Now lets say you do a search for 800-855-XXXX The exchange 855 is used
   to access the PSTN via TTY (TRS/MRS) to and from speech or hearing
   impaired users, among other things, 800-855 #s are designated for such
   disabilitied users only. Because 800 is a ERC SAC, it is non geographic.
   It was implemented on Jan, 1, 1966 Hash will instantly tell you all
   this information pertaining to the phone number you enter, among whatever
   other related information is available.

  **Telco related searchable dictionary(still being considered as this
    function would require words to be submitted from users(credit given))
    Or im sure i could borrow one from somewhere...

  **ANI II code lookup(+definitions)

  **Calculator(calc.exe can lick my baunch)

  **DTMF decoder is a possibility with an added circuit(using serial/parallel)

  **Morse Code encoder/player(pc speaker --why not Mr Bell was an OK guy)

  **Resistor Encoder/Decoder(i always forget what the colored bands represent)

  **International&Caribbean Country Code Lookup(+reverse)

  **Planned NPAs(all of north america) + Old NPA/Overlay Status, inservice
    date and the status of the planned NPAs

  **Vertical Service Codes lookup/definitions (your *67, *69, etc)

  **CIC(carrier identification code) lookup(+company name, assignment date,
    contact information(name, phone #, address)
    \CICs purpose is to enable routing+billing from the local provider to the
     specific inter-exchange and other providers in the NANP network.
     Each CIC is in the format of XXXX, is a service providers identity that
     has bought either FGB/FGD(feature group B or D) access from the local
     access carrier.

     FGB CAC 950-XXXX where the XXXX is the CIC that public can use to access
     a chosen long distance provider.

     FGD CAC local trunk side access to local carrier by another carrier.
     Allows pre-subscription to a long distance carrier. FGD CAC is accessed
     with 101XXXX(XXXX=CIC) the user can then place a long distance call using
     a long distance carrier to which the phone is not pre-subscribed.
     3D(igit) FGD represents 101XXXX   4D(igit) FGD represents 10XXX


  **Personal Communications Services N00 NXX allows "some combination" of
    personal mobility, terminal mobility+service profile management. May be
    reffered to as "follow me" PCS. Relief planning will use ECR 533.
    500-NXX-XXXX prefix indicates service provider, suffix denotes the
    premium service.

  **GOVnet Dial-In Prefixes, see http://www.hackcanada.com/canadian/other/govnet.txt

  **More(tell me)

Beginner Phreakers to elite phreakers should find Hash a very useful program.
Alot of the information Hash will use is available at NANPA.com and
subsidaries involved with number planning, guidelines, and general
telecommunications.

For instance, cyb0rg/asm has on hackcanada.com/telco/edmontonexchanges.html
has posted a listing of exchanges in 780 Edmonton, Alberta that originally
appeared in the phonebook(1998 i believe). The information provided
is more extensive, whereas an exchange will say function+district. One
interesthing note is that 780-530 is reserved for Military use.
Hash could combine this list with an updated list of 780-NXX edmonton
exchanges, so an updated version would be accessible.

Another interesting thing to note if the government exchanges;
780-427-XXXX Provincial Government
780-496-XXXX Edmonton City Government
780-495-XXXX Edmonton Federal Government

Many telephone numbers using these government prefixes can be dialed with
310-0000 which must be an extender the government setup for us. yay.
Phone 310-4455 to give your thanks.(Alberta Connect Gov Comment Hotline :)

So yeah, more OCRing...(id like to know what district a prefix is instead of
just knowing it is in a big big city)

However the lists do include Plant Test Code NPAs (bust out the war dialer,
or perhaps i could incorporate one into Hash? that would be KING#@!)

Coding considerations for a war dialer are not out of my reach, as i plan to
code Hash in Turbo Pascal for DOS.(unix users should have no problems using
dosemu as the Hash is not a very complex program)
What would you guys want in Hash's scanner??
-Carrier Detection(obvisouly)
-SIT detection? should be fun..
-Fax detection..  "     "  "
-Dial tone (PBX) detection(etc etc,busy/reorder/ring counter all the obvisous)
-Direct modem AT access, scripting? The scanner should be able to work along
 side such devices as the PowerKey/Toll restrictors (so a pin cracker)
-you tell me, a scanner would have to be made available after the standard
 functions are implemented...

Should it be GUI or console based?? GUI would mean a little front end, so
extra code, larger program(im curious as to how large just the db files will
take up..though i do have plans to handle this.)

Console would be hardcore, nice and clean:

Hash# get 780. planttest
Parsing........
NPA 780 (Northern Alberta) Results for PLANT TEST CODE search:
+-------------------------------------------------------------------+
: NPA : NXX :   Status   : Rate Center   :       Remarks            :
:-----+-----+------------+---------------+--------------------------:
: 780 : 297 : In Service : N/a for PTEST :    Plant Test Code       :
: 780 : 958 : In Service : N/a for PTEST :    Plant Test Code       :
: 780 : 959 : In Service : N/a for PTEST :    Plant Test Code       :
+-------------------------------------------------------------------+
Ring Back: (403/780 AB) 570-PRE-SUFF Flash hook
 `-DTMF Tone Analyzer: key 1234567890 at dialtone, two 'busy'
  signals will be heard on accurate DTMF. Ring Back ANI: 1234567890

Local ANI: (403/780 AB) 311
 `-N11 Service Code

1000hz Test Tone: (403/780 AB) 310-4649 310-8381
 `-403/780.310-XXXX: 7 digit service, Rate Center: Sherwood Park

Command'get 780. planttest' complete.

Hash# get 780. planttest > C:\780test.txt
....
Command'get 780. planttest > C:\780test.txt' complete.

</sample>

Console Hash would not be comprimised with excessive code, screen filler,
it would be more effecient. Anyone who has ever user DOS/Console unices/MUDs
should not feel uncomfortable with such a system, an extensive help system
would obvisouly be implemented, once commands learned, this would be much
faster then navigating menus with arrow keys.
However all suggestions welcomed.

Now that you have a taste how Hash may be able to help you i will address
other issues:

What liscense will the program be released under:
Seems as im ripping alot of information from nanpa.com, the program will be
free, i would only expect that if you use the program you tell me what you
think of it. I am ashamed of my coding, so source will not be releaed.

Why Turbo Pascal?:
I have not finished "Waite Groups New C Primer Plus" when i do, i will bust
out Borlands Turbo C, so DOS version will run much faster, and will benefit
the unix kiddies. Maybe i could write my own mini zip slack distribution
soley for hash, zip slack rules, Hash would run just find with 100mb parallel
(how many of you guys have zip drives? would be a good project to help me get
 to know linux)

System requirements?:
Hopefully minimal, being 486 8mb ram max, maybe 386 4mb ram.. it would be
slow though... but i think it would be worth it, just keep the box on 24/7
i would use that shit so much... like the program would have a clock+date
forsure...

For tone generation, PC speaker needed, tone generation is to limited single
frequency tones unless.. sound card implementation?

WAV files would take up abit of space.. but then i could include any/all
tones, intercept recordings (good fun when your drunk and harassing telus
TSPS opers)....hmm.. i would have to get like Wolfenstein/DOOM MIDIs too!

Well fuck look at me get all riled up.. might as well go all the way?
If im boxing a call at a payphone(see my payphone/TTY txt :) with my lappie,
hax0ring AGNPAC with the acoustic coupler.. fucking rights i'd want to listen
to DOOM MIDIs... that shit is elite, would be scary as fuck at such a time..

HEHE looking in the phone book theres a nice Postal Code listing in really
small txt, i could OCR that shit, and have an update package cuz it would
be a few MB worth of text!
note from phone book: "This publication contains data under liscense from
Canada Post Corporation's publication entitled Canada's Postal Code Directory.
The postal code data may only be copied for the purposes of preparing mail to
be delivered by Canada Post Corporation or in accordance with a written
licence from Canada Post Corporation"

Translation: In the future when i OCR that shit the command will be;
Hash# preparemail
Preparing Mail to be delivered by Canada Post;
What PO Box/Route/Street Address? (enter postal code for reverse)
T4V 4S1

Address Mail To: ELECTRO TEL  48AVE. #3720 T4V 4S1

..

What else is there?:
Pr0n, yes ofcourse the pr0n...

Because lots of the databased information changes quite frequently(every month
sometimes..) i would have to make little update programs.. but for that
i could use pkzip'ed executables... so i do all the fucking work and you
get to just run a program.

Color coding would be essential, so you could quickly recognize numbers
Government Telephone=GREEN
Toll Free Services=TEAL? (what color is teal?)
Business Exchanges/Suffixes: BLUE
Residential Exchanges/Suffixes: RED (notice a trend?)
Test Numbers: blinking teal?

Important numbers (pertaining to canada(priority)) that are business (telus
business offices, all the important shit..) i should have in another database
(toll free too.. i dont want the list too big) but common numbers like
ResPorg, Telus TTY/dialaround, Telus NOC, RCMAC :P, just stuff phreaks
commonly use, or may be commonly heard would be added to the list...

Many a time have unknown numbers been said on a conf, pasted to irc, etc, so
I hope this program will clear some shit up so you dont have to look like a
fool.

uhm oh yeah fuck colors im going to bed

What are your resources for thsi project:
Public docs from various orginazations;
NANPA(North American Numer Planning Administration), 
INC(Indutry Numbering Comittee),
CNA(Canadian Numbering Administrator),
CSCN(Canadian Steering Committee On Numbering)

so fucking e-mail phluxy and tell him what you want on your pie
fraud@verizonmail.com


--




		==>  'An Insightful Look at the GOVnet Network'  <==



 ==> By: m4chine
 ==> Date: 10/12/01
 ==> E-mail: m4chine@fucktelus.com

 -

 Description


  indeX =>  

   -> Introduction

   -> GOVnet's Purpose

   -> GOVnet's Origin

   -> Dial-In Prefixes

   -> News Article Pertaining to GOVnet

   -> Conclusion


 <=>

 
    Introduction -

 GOVnet is the name given to the network infrastructure which serves government offices in
Montpelier and Waterbury as well as district offices in twelve cities and towns statewide. In
the near future the Whitehouse and the DOD will be adopting this network for nation-wide usage.

The physical backbone consists of fiber optic cable connecting state buildings on the Montpelier
and Waterbury campuses as well as high-bandwidth digital circuits connecting district offices
statewide. The wide-area backbone is divided into OSPF regions with at least one alternative
route for each link. From the backbone nodes, 56 Kbps backfeeds serve other government offices,
schools, and libraries statewide.

In addition there are dial-in sites located in every local calling area of the state facilitating
network access with a local phone call from any school or library in the state that elects to have
dial-in access. SLIP and PPP access, as well as VT100 access, are supported on a dial-in basis.

The network uses the "open" non-proprietary TCP/IP communications protocol which permits connectivity
throughout the state, the nation and the world.

Network services include Internet access, government-wide e-mail, and WWW access to government
information and services. See the State of Vermont home page (http://www.state.vt.us/).

 --

  GOVnet's Purpose -

 GOVnet was implemented to meet the twofold network challenge of improved access with reduced costs.
The network provides for complete inter-agency and inter-departmental information access through a single
system serving all agencies on a cooperative basis. This eliminates the need for each agency or department
to provide redundant networks involving duplicate costs.

 --

 GOVnet's Origin -

 The Vermont Information Strategy Plan (VISP) identified the requirement for information sharing and
networking in two of the critical success factors associated with its objectives. The Information Systems
Advisory Council (ISAC), which was created by VISP (now called IRMAC), was commissioned by the Telecommun-
ication Ten-Year Plan to form a network subcommittee to "develop a plan to integrate network services where
such sharing is valuable for information sharing among government agencies (and) where it is designed and
implemented with the participation and unanimous approval of ISAC."

For a detailed analysis of GOVnet, including a chronology, see the Legislative Joint Fiscal Office's GOVnet
System Evaluation and Network Study (http://www.leg.state.vt.us/reports/govnet/govnet.htm).


 --

 Dial-In Prefixes -

The list below shows the local dial-in site(s) serving each telephone exchange in the State.
For the telephone number of a specific GOVnet dial-in site, wardial the motherfuckin' prefix
or social engineer the technology coordinator of the department.

Dial-In Sites by Telephone Exchange Telephone Exchange Dial-In Site(s):
 
    222 (Bradford) Bradford 
    223 (Montpelier) Montpelier, Morrisville 
    226 (Proctor) Springfield 
    228 (Ludlow) South Londonderry 
    229 (Montpelier) Montpelier, Morrisville 
    234 (Bethel) Randolph, Rutland, Woodstock 
    235 (Middle Town Springs) Rutland, Wells 
    241, 244 (Waterbury) Montpelier 
    247 (Brandon) Middlebury, Rutland 
    253 (Stowe) Montpelier, Morrisville 
    254, 257, 258 (Brattleboro) Brattleboro 
    259 (Mount Holly) Rutland, South Londonderry 
    263 (Perkinsville) Springfield 
    265 (Fair Haven) Rutland 
    266 (Canaan) Canaan 
    273 (Hubbardton) Rutland 
    276 (Brookfield) Montpelier, Randolph 
    277 (Lemington) Canaan 
    285 (Franklin) St. Albans 
    287 (Poultney) Rutland, Wells 
    291 (White River Junction) White River Junction, Woodstock 
    293 (Danby) Rutland, South Londonderry
    295, 296 (White River Junction) White River Junction, Woodstock 
    325 (Pawlet) Rutland, Wells 
    326 (Montgomery) St. Albans 
    328 (Guildhall) Island Pond 
    333 (Fairlee) Bradford 
    334 (Newport) Newport 
    348 (Williamsville) Brattleboro 
    352 (Salisbury) Middlebury
    362 (Manchester) Bennington, South Londonderry 
    365 (Newfane) Brattleboro 
    368 (Jacksonville) Brattleboro 
    371 (Montpelier) Montpelier, Morrisville 
    372 (Grand Isle) Burlington, St. Albans 
    375 (Arlington) Bennington, Londonderry 
    387 (Putney) Brattleboro 
    388 (Middlebury) Middlebury 
    394 (Rupert) Bennington, Wells 
    422 (Sherburne) Rutland, Woodstock 
    423 (Readsboro) Bennington 
    425 (Charlotte) Burlington 
    426 (Marshfield) Montpelier 
    429 (West Newbury) Bradford 
    433 (Williamstown) Montpelier, Randolph 
    434 (Richmond) Burlington 
    436 (Hartland) White River Junction, Woodstock 
    438 (West Rutland) Rutland 
    439 (East Corinth) Bradford 
    442 (Bennington) Bennington 
    446 (Wallingford) Rutland 
    447 (Bennington) Bennington 
    453 (Bristol) Middlebury 
    454 (Plainfield) Montpelier 
    456 (East Calais) Montpelier, Morrisville 
    457 (Woodstock) White River Junction, Woodstock 
    459 (Proctor) Rutland 
    462 (Cornwall) Middlebury 
    463 (Bellows Falls) Bellows Falls, Springfield 
    464 (Wilmington) Bennington, Brattleboro 
    467 (West Burke) Island Pond, St. Johnsbury 
    468 (Castleton) Rutland 
    472 (Hardwick) Montpelier, Morrisville, St. Johnsbury 
    475 (Panton) Middlebury 
    476, 479 (Barre) Montpelier 
    482 (Hinesburg) Burlington 
    483 (Pittsford) Rutland 
    484 (Reading) Woodstock 
    485 (Northfield) Montpelier, Randolph 
    492 (Cuttingsville) Rutland 
    496 (Waitsfield) Middlebury, Montpelier, Randolph 
    524 (St. Albans) St. Albans 
    525 (Barton) Island Pond, Newport 
    527 (St. Albans) St. Albans 
    533 (Greensboro) Morrisville, St. Johnsbury 
    537 (Benson) Rutland 
    545 (Weybridge) Middlebury 
    546 (Weathersfield) Springfield 
    563 (Cabot) Montpelier, St. Johnsbury 
    583 (Waitsfield) Middlebury, Montpelier, Randolph 
    584 (Groton) Bradford 
    586 (Craftsbury) Morrisville 
    586 (Greensboro) Morrisville, St. Johnsbury 
    592 (Peacham) St. Johnsbury 
    623 (Whiting) Middlebury 
    626 (Lyndonville) St. Johnsbury 
    633 (Barnet) St. Johnsbury 
    635 (Johnson) Morrisville 
    644 (Jeffersonville) Morrisville 
    645 (Wells) Wells 
    649 (Norwich) White River Junction, Woodstock 
    651, 654, 655, 656, 657, 658, 660 (Burlington) Burlington 
    672 (Bridgewater) Woodstock 
    674 (Windsor) Springfield, White River Junction, Woodstock 
    676 (Maidstone) Island Pond 
    684 (Danville) St. Johnsbury 
    685 (Chelsea) Randolph 
    694 (Stamford) Bennington 
    695 (Concord) St. Johnsbury 
    722 (Westminster) Bellows Falls 
    723 (Island Pond) Island Pond, Newport 
    728 (Randolph) Randolph 
    744 (Troy) Newport 
    746 (Pittsfield) Rutland 
    747 (Rutland) Rutland 
    748, 751 (St. Johnsbury) St. Johnsbury 
    754 (Orleans) Island Pond, Newport 
    755 (Albany) Morrisville, Newport 
    757 (Wells River) St. Johnsbury 
    758 (Bridport) Middlebury 
    759 (Addison) Middlebury 
    763 (South Royalton) Randolph, White River Junction, Woodstock 
    765 (South Strafford) White River Junction 
    766 (Derby) Newport 
    767 (Rochester) Middlebury, Randolph 
    769 (Essex Junction) Burlington 
    770, 772, 773, 775 (Rutland) Rutland 
    785 (Thetford) White River Junction 
    786 (Rutland) Rutland 
    796 (Alburg) St. Albans 
    822 (Island Pond) Island Pond 
    822 (Norton) Canaan, Island Pond 
    823 (Pownal) Bennington 
    824 (South Londonderry) South Londonderry 
    827 (East Fairfield) St. Albans 
    828 (Montpelier) Montpelier, Morrisville 
    843 (Grafton) Bellows Falls, South Londonderry 
    848 (Richford) St. Albans 
    849 (Fairfax) St. Albans 
    860, 862, 863, 864 (Burlington) Burlington 
    866 (Newbury) Bradford
    867 (Dorset) Bennington 
    868 (Swanton) St. Albans 
    869 (Saxtons River) Bellows Falls, Springfield 
    871, 872 (Essex Junction) Burlington 
    873 (Derby Line) Newport 
    874 (Jamaica) Brattleboro, South Londonderry 
    875 (Chester) Bellows Falls, Springfield, South Londonderry 
    877 (Vergennes) Middlebury 
    878, 879 (Essex Junction) Burlington 
    883 (Barre) Montpelier 
    883 (Washington) Montpelier 
    885, 886 (Springfield) Bellows Falls, Springfield 
    888 (Morrisville) Montpelier, Morrisville 
    889 (Tunbridge) Randolph 
    899 (Underhill) Burlington 
    892 (Lunenburg) Guildhall 
    893 (Milton) Burlington, St. Albans 
    895 (Morgan) Island Pond, Newport 
    896 (Wardsboro) Bennington, Brattleboro, South Londonderry 
    897 (Shoreham) Middlebury 
    928 (Isle La Motte) St. Albans 
    933 (Enosburg Falls) St. Albans 
    948 (Orwell) Middlebury 
    962 (Bloomfield) Island Pond 
    988 (North Troy) Newport 
 
  --

    News Article Pertaining to GOVnet -

[NOTE: This article talks like GOVNET doesn't exist, though it's obvious
its existance and development has been an ongoing process for quite some time] 

  U.S. Seeks to Build Secure Online Network;
Telecom Firms Asked for Help in Constructing Private 'Govnet' System
(http://www.washingtonpost.com/wp-dyn/articles/A40092-2001Oct10.html)

By Krissah Williams
Washington Post Staff Writer

The government's new cyber-security officials yesterday asked telecommunications
companies for help building a government computer network that would have "no risk
of outside penetration" -- a task some computer security consultants say is nearly impossible.

Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure
can be built at an affordable price, officials said. Computer system consultants said they could
not estimate how much the network would cost because of the government's enormous size and security
needs.

Richard Clarke, who was appointed special adviser to the president for cyberspace security this week,
said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is
unused and fairly inexpensive to obtain, he said.

Govnet is part of a plan Clarke announced earlier this week "to secure our cyberspace from a range of
possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use
cyber-war against us in the future." Govnet would be completely independent from the Internet to help
keep out hackers and viruses, according to the government's plan.

The request from the General Services Administration asks that telecommunications companies submit
proposals about how the network could be built, how much it would cost, and how long it would take
to construct.

"Based upon that we will make a decision. We're waiting to hear from industry right now," Clarke said.

This year, the current network has been breached by hackers, computer worms and viruses.
In April, government Web sites were manipulated by Chinese hackers angered by the death of a Chinese
pilot in a collision with an American spy plane. The system was also roughed up by the "Code Red"
computer worm and an attack program called "ILoveYou." The viruses affected thousands of government
computers.

Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses
in the computer network that could allow terrorists or hackers to "severly damage or disrupt national
defense or vital public operations or steal sensitive data."

Clarke said the government's current virtual private network is vulnerable to viruses and denial of
service attacks that Govnet would make more difficult to execute.

George Kurtz, co-author of "Hacking Exposed" and chief executive of security consulting firm Foundstone
Inc., said such a network is feasible but would be costly and difficult to build. It is impossible to
stave off all attacks, he said.

"The gist of this entire effort is to try to segment critical government computer systems from the
rest of the Internet," Kurtz said. "You can't guarantee against these sort of attacks. There is always
going to be a flaw with software, a flaw with hardware or the human element."

Even on Govnet, viruses and attacks could still be spread by floppy disks or connections with trusted
systems, Kurtz said.

An internal network, such as the Govnet proposal, is worth investigating but will probably fall to
sophisticated hackers, said Amit Yoran, chief executive of security-services company Riptech Inc.
and a former information-security program director at the Defense Department.

"It is probably more feasible to implement and strongly enforce global security postures and practices
rather than go out and purchase new assets," Yoran said. "Once someone is able to get in, they will find
a weak link. When you have a network the size of the government's there will be weak links. Someone will
get in."

 --

  Conclusion -

 This is what the US Government gets for publically releasing documentation on the Internet about
their so-called "secret" and "private" network... I know you'll have a few good laughs about that one
(I know I did). Love, Peace, And Afro Grease!

--


 	      'The G.E.T.S. (Government Emergency Telephone System) Paper'


-
 Written by: m4chine
       Date: Tuesday October 02, 2001
-
     E-mail: m4chine@fucktelus.com


 Disclaimer: This paper has been written to educate the public.
	     This paper was not written to make terrorists more
	     creative or make life easier for wannabe phone phreaks.
	     Don't attempt any of the stuff written about in this paper.
	     God bless freedom of information...

 =-

  - Disclaimer -

  - G.E.T.S. ACT -

  - Social Engineering -

  - Dial Up Numbers -

  - Conclusion -

 =-


	Government Emergency Telephone System ACT --


Sec. 0.01.  This Act  shall  be  known  and  may  be  cited  as  the
"Emergency Telephone System Act".
(Source: P.A. 85-978.)

    Sec. 1.  The General Assembly finds and declares that it is  in  the
public  interest  to  shorten the time required for a citizen to request
and receive emergency aid.  There currently exist thousands of different
emergency phone numbers throughout  the  state,  and  present  telephone
exchange  boundaries and central office service areas do not necessarily
correspond to public safety and political boundaries.   Provision  of  a
single,  primary  three-digit  emergency  number through which emergency
services can  be  quickly  and  efficiently  obtained  would  provide  a
significant  contribution  to  law  enforcement and other public service
efforts by making it less difficult  to  quickly  notify  public  safety
personnel.  Such a simplified means of procuring emergency services will
result  in  the  saving  of  life,  a  reduction  in  the destruction of
property, quicker apprehension of criminals, and ultimately  the  saving
of  money.   The  General  Assembly  further finds and declares that the
establishment of a uniform, statewide emergency number is  a  matter  of
statewide  concern  and interest to all inhabitants and citizens of this
State.  It is the purpose of this Act to establish the number "9-1-1" as
the primary emergency telephone number for use  in  this  State  and  to
encourage  units  of  local government and combinations of such units to
develop and improve emergency communication procedures and facilities in
such a manner as to be able to quickly respond to any person calling the
telephone number "9-1-1" seeking  police,  fire,  medical,  rescue,  and
other emergency services.
(Source: P.A. 85-978.)

    Sec. 2.  As  used  in  this  Act,  the  terms  defined  in  Sections
following  this  Section  and  preceding  Section  3  have  the meanings
ascribed to them in those Sections.
(Source: P.A. 88-497.)

    Sec. 2.01.  "Public agency" means the State, and any unit  of  local
government  or  special  purpose  district  located  in whole or in part
within  this  State  which  provides  or  has   authority   to   provide
firefighting, police, ambulance, medical, or other emergency services.
(Source: P.A. 79-1092.)

    Sec. 2.02.  "Public safety agency" means a functional division of  a
public  agency  which  provides  firefighting, police, medical, or other
emergency services.
(Source: P.A. 79-1092.)

    Sec. 2.03.  "Direct  dispatch  method"  means  a  telephone  service
providing for the dispatch of an appropriate emergency service unit upon
receipt  of  a  telephone request for such services and a decision as to
the proper action to be taken.
(Source: P.A. 79-1092.)

    Sec.  2.04.   "Relay  method"  means  a  telephone  service  whereby
pertinent information is noted by the recipient of a  telephone  request
for  emergency  services,  and  is  relayed to appropriate public safety
agencies or other providers of emergency services  for  dispatch  of  an
emergency service unit.
(Source: P.A. 79-1092.)

    Sec. 2.05.   "Transfer  method"  means  a  telephone  service  which
receives   telephone   requests  for  emergency  services  and  directly
transfers such requests to an appropriate public safety agency or  other
provider of emergency services.
(Source: P.A. 79-1092.)

    Sec. 2.06.  "Referral method" means a telephone service which,  upon
the  receipt of a telephone request for emergency services, provides the
requesting party with the telephone number  of  the  appropriate  public
safety agency or other provider of emergency services.
(Source: P.A. 79-1092.)

    Sec. 2.06a.  System.  "System" means  the  communications  equipment
required  to  produce  a  response  by  the appropriate emergency public
safety agency as a result of an emergency call being placed to 9-1-1.
(Source: P.A. 87-1244; 88-604, eff. 9-1-94.)

    Sec.  2.07.   "Basic  system"  means  a  telephone   service   which
automatically   connects  a  person  dialing  the  digits  "911"  to  an
established public  safety  answering  point  through  normal  telephone
service facilities.
(Source: P.A. 79-1092.)

    Sec. 2.08.  "Sophisticated system" means a  basic  system  with  the
additional  capability  of  automatic  identification  of  the  caller's
number,  holding  the  incoming call, reconnection on the same telephone
line, clearing a telephone line, or automatic call routing or any  other
capability   or   features   then  available  or  combinations  of  such
capabilities.
(Source: P.A. 85-978.)

    Sec. 2.09.  "Commission" means the Illinois Commerce Commission.
(Source: P.A. 79-1092.)

    Sec. 2.10.  "Implementation date" means  the  effective  date  of  a
public  act, other than this amendatory Act of 1987, providing all local
public agencies affected by this Act with a specific source  or  sources
of  revenue for payment of the total costs of establishing or upgrading,
operating and maintaining the emergency telephone  systems  required  by
this Act.
(Source: P.A. 85-978.)

    Sec. 2.11.  "Board" means an Emergency Telephone System Board  or  a
Joint Emergency Telephone System Board created pursuant to Section 15.4.
(Source: P.A. 85-978.)

    Sec. 2.12.  (a) For the purposes of this Act, "network  connections"
means the number of voice grade communications channels directly between
a  subscriber and a telecommunications carrier's public switched network
without the  intervention  of  any  other  telecommunications  carrier's
switched  network  which  would  be  required  to carry the subscriber's
inter-premises traffic,  which  connection  either  (1)  is  capable  of
providing  access  through  the  public  switched  network  to  a  9-1-1
Emergency Telephone System if one exists, or, (2) if no system exists at
the  time  a  surcharge  is  imposed  under  Section 15.3 which would be
capable of providing access through the public switched network  to  the
local 9-1-1 Emergency Telephone System if one existed.

(b)  For  the  purposes  of  this Act, no telecommunications carrier
providing facilities-based  local  exchange  telecommunications  service
prior  to  January  1,  1986  shall  be  required  to  offer  or provide
sophisticated 9-1-1 system features such as selective  call  routing  in
any area where that carrier's local switching facility does not have the
capability to do so.

(c)  For  the purposes of this Act, "telecommunication carrier" does
not include a cellular or other mobile communication carrier.
(Source: P.A. 86-101; 87-167.)

    Sec. 2.13.  "Transmitting messages" shall have the meaning  ascribed
to the term in Section 8-11-2 of the Illinois Municipal Code.
(Source: P.A. 85-978.)

    Sec. 2.14. Automatic alarm; automatic alerting  device.   "Automatic
alarm"  and "automatic alerting device" mean any device that will access
the 9-1-1 system for emergency services upon activation.
(Source: P.A. 88-497.)

    Sec. 2.15. Mechanical dialer. "Mechanical dialer" means  any  device
that either manually or remotely triggers a dialing device to access the
9-1-1 system.
(Source: P.A. 88-497.)

    Sec. 2.16.  Private  business  switch  service.   "Private  business
switch  service"  means  a  telecommunications service including centrex
type service and private branch exchange service (PBX), even though  key
telephone  systems  or  equivalent telephone systems registered with the
FCC under 47 C.F.R. Part 68 are directly connected to centrex  type  and
PBX systems providing 9-1-1 services equipped for switched local network
connections  or  9-1-1  system  access  to  business end users through a
private telephone switch. The term  "private  business  switch  service"
does  not  include key telephone systems or equivalent telephone systems
registered with the FCC under  47  C.F.R.  Part  68  when  not  used  in
conjunction  with centrex type and PBX systems. "Private business switch
service" typically includes, but is not limited to, private  businesses,
corporations,  and  industries  where  the telecommunications service is
primarily for conducting business.
(Source: P.A. 88-604, eff. 9-1-94; 89-497, eff. 6-27-96.)

    Sec.   2.17.  Private   residential   switch   service.     "Private
residential switch service" means a telecommunications service including
centrex  type  service  and private branch exchange service  (PBX), even
though  key telephone systems or equivalent telephone systems registered
with the FCC under 47 C.F.R.  Part 68 are directly connected to  centrex
type  and  PBX  systems  providing  9-1-1 services equipped for switched
local network connections or 9-1-1  system  access  to  residential  end
users  through a private telephone switch. The term "private residential
switch service" does not include key  telephone  systems  or  equivalent
telephone  systems registered with the FCC under 47 C.F.R.  Part 68 when
not used in conjunction with centrex type and  PBX  systems. "Private
residential  switch  service"  typically includes, but is not limited to
apartment complexes, condominiums, and campus or university environments
where shared tenant service is provided  and  where  the  usage  of  the
telecommunications service is primarily residential.
(Source: P.A. 88-604, eff. 9-1-94; 89-497, eff. 6-27-96.)

    Sec. 2.18.  System provider.  "System provider" means the contracted
entity providing 9-1-1 network and database services.
(Source: P.A. 88-604, eff. 9-1-94.)

    Sec. 2.19.  9-1-1 system.  "9-1-1 system" means the geographic  area
that  has  been  granted  an order of authority by the Commission to use
"9-1-1" as the primary emergency telephone number.
(Source: P.A. 88-604, eff. 9-1-94.)

    Sec. 3. Every local public agency in a county having 100,000 or more
inhabitants, within its respective  jurisdiction,  shall  establish  and
have  in  operation  within  3 years after the implementation date or by
December 31, 1985, whichever is later, a basic or  sophisticated  system
as  specified  in  this Act.  Other public agencies may establish such a
system, and shall be entitled to participate in any program of grants or
other State funding of such systems.

    The establishment of such systems shall be centralized to the extent
feasible.  Nothing in  this  Act  shall  be  construed  to  prohibit  or
discourage  in  any way the formation of multijurisdictional or regional
systems, and any system established pursuant to this Act may include the
territory of more than one public agency or may include a segment of the
territory of a public agency.
(Source: P.A. 81-1509.)

    Sec. 4.   Every  system  shall  include  police,  firefighting,  and
emergency   medical  and  ambulance  services,  and  may  include  other
emergency services, in the  discretion  of  the  affected  local  public
agency,  such  as  poison control services, suicide prevention services,
and  civil  defense  services.   The  system  may  incorporate   private
ambulance  service.   In  those areas in which a public safety agency of
the state provides such emergency services,  the  system  shall  include
such public safety agencies.
(Source: P.A. 79-1092.)

    Sec. 5.  The digits "9-1-1" shall be the primary emergency telephone
number within the system, but a public agency or  public  safety  agency
shall  maintain a separate secondary seven digit emergency backup number
for at least six months after the "9-1-1" system is established  and  in
operation,  and  shall  maintain  a  separate  number  for  nonemergency
telephone calls.
(Source: P.A. 85-978.)

    Sec. 6.  Capabilities of system; pay telephones.  All systems  shall
be  designed  to  meet  the  specific requirements of each community and
public agency served by the  system.  Every  system,  whether  basic  or
sophisticated,  shall be designed to have the capability of utilizing at
least 1 of the methods specified in  Sections   2.03  through  2.06,  in
response  to  emergency  calls.  The General Assembly finds and declares
that the most critical aspect  of  the  design  of  any  system  is  the
procedure  established  for  handling  a telephone request for emergency
services.

    In addition, to maximize efficiency and utilization of  the  system,
all  pay  telephones  within each system shall, within 3 years after the
implementation date or by December 31, 1985, whichever is later,  enable
a caller to dial "9-1-1" for emergency services without the necessity of
inserting  a  coin.   This  paragraph  does  not apply to pay telephones
located in penal  institutions,  as  defined  in  Section  2-14  of  the
Criminal  Code  of 1961, that have been designated for the exclusive use
of committed persons.
(Source: P.A. 91-518, eff. 8-13-99.)

    Sec. 6.1.  The Commission shall require that every 9-1-1  system  be
readily  accessible  to  hearing-impaired and voice-impaired individuals
through the use of telecommunications  technology  for  hearing-impaired
and speech-impaired individuals.
    As used in this Section:

         "Hearing-impaired  individual"  means a person with a permanent
    hearing  loss  who  can  regularly  and  routinely  communicate   by
    telephone only through the aid of devices which can send and receive
    written messages over the telephone network.

         "Voice-impaired  individual"  means  a  person with a permanent
    speech  disability  which  precludes  oral  communication,  who  can
    regularly and routinely communicate by telephone  only  through  the
    aid  of devices which can send and receive written messages over the
    telephone network.

         "Telecommunications technology" means equipment that  can  send
    and receive written messages over the telephone network.
   (Source: P.A. 87-146.)

    Sec. 7.  The General Assembly finds  that,  because  of  overlapping
jurisdiction  of  public  agencies, public safety agencies and telephone
service areas, the Commission shall establish a general overview or plan
to effectuate the purposes of this Act within the time frame provided in
this Act.  In order to insure that proper preparation and implementation
of emergency telephone systems are accomplished by all  public  agencies
in  a county having 100,000 or more inhabitants within 3 years after the
implementation date or by December 31, 1985,  whichever  is  later,  the
Commission,  with  the  advice  and  assistance of the Attorney General,
shall secure compliance by public agencies as provided in this Act.
(Source: P.A. 81-1122.)

    Sec. 8.  The Commission, with  the  advice  and  assistance  of  the
Attorney   General,  shall  coordinate  the  implementation  of  systems
established under  this  Act.   The  Commission,  with  the  advice  and
assistance  of  the Attorney General, shall assist local public agencies
and  local  public  safety  agencies  in  obtaining  financial  help  to
establish emergency telephone service, and shall aid  such  agencies  in
the  formulation of concepts, methods, and procedures which will improve
the operation of systems required by this Act and  which  will  increase
cooperation between public safety agencies.
(Source: P.A. 79-1092.)

    Sec. 9.  To accomplish the responsibilities specified in  this  Act,
the  Commission  is  directed  to  consult at regular intervals with the
State Fire Marshal, the Department of Public Health, the  Department  of
Transportation,  the  public utilities in this State providing telephone
service, the Department of State  Police,  and  the  State  Division  of
Forestry.   Such  agencies  shall  provide  all necessary assistance and
consultation to the Commission  to  enable  it  to  perform  its  duties
specified in this Act.
(Source: P.A. 84-25.)

    Sec. 10.  Technical and operational standards for the development of
the local agency systems  shall  be  established  and  reviewed  by  the
Commission  on  or before December 31, 1979, after consultation with all
agencies specified in Section 9.
(Source: P.A. 79-1092.)

    Sec. 10.1.  9-1-1 information consisting  of  names,  addresses  and
telephone   numbers  of  telephone  customers  whose  listings  are  not
published in directories or listed in Directory  Assistance  Offices  is
confidential.    Information  shall  be provided on a call-by-call basis
only for the purpose of responding to emergency calls.
    Divulging confidential information in violation of this Section is a
Class A misdemeanor.
(Source: P.A. 87-146.)

    Sec. 10.2.  The Emergency  Telephone  System  Board  in  any  county
passing  a referendum under Section 15.3, and the Chairman of the County
Board in any county implementing a 9-1-1 system shall  ensure  that  all
areas of the county are included in the system.
(Source: P.A. 87-146.)

    Sec. 10.3.  Notice  of  address  change.   The  Emergency  Telephone
System  Board in any county implementing a 9-1-1 system that changes any
person's address (when the person whose  address  has  changed  has  not
moved  to  a new residence)  shall notify the person (i) of the person's
new address and (ii) that the person should contact the  local  election
authority to determine if the person should re-register to vote.
(Source: P.A. 90-664, eff. 7-30-98.)

    Sec. 11. Within one year after the implementation date or by January
31, 1980, whichever is later, all public agencies  in  a  county  having
100,000  or  more  inhabitants  shall  submit  tentative  plans  of  the
establishment  of a system required by this Act to the public utility or
utilities providing  public  telephone  service  within  the  respective
jurisdiction  of  each public agency.  A copy of each such plan shall be
filed with the Commission.

    Within 2 years after the implementation date or by January 31, 1982,
whichever is later, all public agencies in a county  having  100,000  or
more  inhabitants  shall submit final plans for the establishment of the
system  to  such  utilities,  and  shall  make  arrangements  with  such
utilities for the implementation  of  the  planned  emergency  telephone
system  no  later  than  3  years  after  the  implementation date or by
December 31, 1985, whichever is later.  A copy of the plan  required  by
this  subdivision shall be filed with the Commission. In order to secure
compliance  with  the  standards  promulgated  under  Section  10,   the
Commission  shall  have  the  power  to approve or disapprove such plan,
unless such plan was announced before the effective date of this Act.

    If any public agency has implemented  or  is  a  part  of  a  system
required  by  this  Act  on  a  deadline specified in this Section, such
public agency shall submit in lieu of the  tentative  or  final  plan  a
report describing the system and stating its operational date.
    Plans  filed  under  this Section shall conform to minimum standards
established pursuant to Section 10.
(Source: P.A. 81-1122.)

    Sec. 12.  The Attorney General may, in behalf of the  Commission  or
on   his  own  initiative,  commence  judicial  proceedings  to  enforce
compliance by any public agency or public  utility  providing  telephone
service with this Act.
(Source: P.A. 79-1092.)

    Sec. 13.  On or before February 16, 1979, and  again  on  or  before
February  16,  1981, the Commission shall report to the General Assembly
the progress in the implementation of  systems  required  by  this  Act.
Such   reports   shall   contain   his  recommendations  for  additional
legislation.

    In December of 1979 and in December of 1980 the Commission, with the
advice  and  assistance  of   the   Attorney   General,   shall   submit
recommendations  to  the  Bureau  of  the  Budget  and  to  the Governor
specifying amounts necessary to further implement  the  organization  of
telephone  systems  specified  in  this Act during the succeeding fiscal
year.   The  report  specified  in  this  paragraph  shall  contain,  in
addition, an estimate of the fiscal  impact  to  local  public  agencies
which will be caused by implementation of this Act.

    By  March  1  in  1979 and every even-numbered year thereafter, each
telephone company shall file  a  report  with  the  Commission  and  the
General  Assembly  specifying,  in  such detail as the Commission has by
rule or regulation required, the extent to which it  has  implemented  a
planned   emergency   telephone   system   and   its  projected  further
implementation of such a system.

    The requirement for reporting  to  the  General  Assembly  shall  be
satisfied  by filing copies of the report with the Speaker, the Minority
Leader and the Clerk of the House of Representatives and the  President,
the  Minority Leader and the Secretary of the Senate and the Legislative
Research Unit, as required by Section 3.1 of "An Act to revise  the  law
in  relation  to  the  General Assembly", approved February 25, 1874, as
amended, and filing such additional copies  with  the  State  Government
Report Distribution Center for the General Assembly as is required under
paragraph (t) of Section 7 of the State Library Act.
(Source: P.A. 84-1438.)

    Sec. 14.  The General Assembly declares  that  a  major  purpose  in
enacting  this  Act  is  to  eliminate  instances  in which a responding
emergency service refuses to render aid to  the  requester  because  the
requester  is  outside of the jurisdictional boundaries of the emergency
service.  Therefore, in implementing systems under this Act, all  public
agencies in a single system shall enter into a joint powers agreement or
any other form of written cooperative agreement which is applicable when
need  arises  on  a  day-to-day  basis.   Certified  notification of the
continuation of such agreements shall be made among the involved parties
on an annual basis.  In addition, such agreements shall be entered  into
between  public  agencies  and  public safety agencies which are part of
different systems but whose jurisdictional  boundaries  are  contiguous.
The  agreements shall provide that, once an emergency unit is dispatched
in response to a request through the system, such unit shall render  its
services  to  the requesting party without regard to whether the unit is
operating outside its normal jurisdictional boundaries.
(Source: P.A. 86-101.)

    Sec. 15.  Copies of the annual certified notification of  continuing
agreement  required  by  Section  14  shall  be  filed with the Attorney
General and the Commission.  Commencing with the  year  1987,  all  such
agreements  shall  be  so  filed  prior to the 31st day of January.  The
Attorney  General  shall  commence  judicial  proceedings   to   enforce
compliance  with  this  Section and Section 14, where a public agency or
public safety agency has failed to timely enter into such  agreement  or
file copies thereof.
(Source: P.A. 86-101.)

    Sec.  15.1.  Public  body;  exemption  from  civil   liability   for
developing  or  operating emergency telephone system.  No public agency,
public safety agency, emergency telephone system board, or unit of local
government assuming the duties of an emergency telephone  system  board,
nor  any  officer, agent or employee of any public agency, public safety
agency, emergency telephone system board, or unit  of  local  government
assuming  the  duties  of  an emergency telephone system board, shall be
liable for any civil damages as a result of any act or omission,  except
willful  or  wanton misconduct, in connection with developing, adopting,
operating or implementing any plan or system required by this Act.
    Exemption from civil liability  for  emergency  instructions  is  as
provided in the Good Samaritan Act.

    This  Section  may  not  be  offered  as  a  defense in any judicial
proceeding brought by the Attorney General under Section  12  to  compel
compliance with this Act.
(Source: P.A. 89-403, eff. 1-1-96; 89-607, eff. 1-1-97.)

    Sec. 15.2.  Any person calling the number "911" for the  purpose  of
making  a  false  alarm  or complaint and reporting false information is
subject to the provisions of Section 26-1 of the Criminal Code of 1961.
(Source: P.A. 90-456, eff. 1-1-98.)

    Sec. 15.2a.  The  installation  of  or  connection  to  a  telephone
company's  network of any automatic alarm, automatic alerting device, or
mechanical dialer that causes the number 9-1-1 to be dialed in order  to
directly  access  emergency  services  is  prohibited in a 9-1-1 system.
Violation of this  Section  is  a  Class  A  misdemeanor.  A  second  or
subsequent violation of this Section is a Class 4 felony.
(Source: P.A. 87-146; 88-497.)

    Sec. 15.2b.  Emergency telephone number; advertising.  No person  or
private  entity may advertise or otherwise publicize the availability of
services provided by a specific provider and indicate  that  a  consumer
should  obtain access to services provided by a specific provider by use
of the emergency telephone number (9-1-1).
(Source: P.A. 88-497.)

    Sec. 15.3.  (a) The corporate authorities of any municipality or any
county may, subject to the limitations of subsections (c), (d), and (h),
and in addition to any tax levied pursuant  to  Section  8-11-2  of  the
Illinois   Municipal   Code,   impose  a  monthly  surcharge  on  billed
subscribers of network connection provided by telecommunication carriers
engaged in the business of transmitting messages by means of electricity
originating within the corporate limits of the  municipality  or  county
imposing  the  surcharge  at a rate per network connection determined in
accordance with subsection  (c).   A  municipality  may  enter  into  an
intergovernmental  agreement  with  any  county in which it is partially
located, when the county has adopted an ordinance to impose a  surcharge
as   provided  in  subsection  (c),  to  include  that  portion  of  the
municipality  lying  outside  the  county  in  that  county's  surcharge
referendum.  If the  county's  surcharge  referendum  is  approved,  the
portion   of   the  municipality  identified  in  the  intergovernmental
agreement shall automatically be disconnected from the county  in  which
it  lies  and  connected to the county which approved the referendum for
purposes of a surcharge on telecommunications carriers.

(b)  For purposes of computing the surcharge imposed  by  subsection
(a), the network connections to which the surcharge shall apply shall be
those   in-service   network   connections,  other  than  those  network
connections assigned to the municipality or county,  where  the  service
address  for  each  such  network  connection  or connections is located
within the corporate limits of the municipality or  county  levying  the
surcharge.  The "service address" shall mean the location of the primary
use of the network connection or connections. With  respect  to  network
connections provided for use with pay telephone services for which there
is  no  billed  subscriber, the telecommunications carrier providing the
network connection shall be deemed to be its own billed  subscriber  for
purposes of applying the surcharge.

(c)  Upon  the  passage  of an ordinance to impose a surcharge under
this Section the clerk of the municipality or county shall  certify  the
question  of whether the surcharge may be imposed to the proper election
authority who shall submit the public question to the  electors  of  the
municipality  or  county  in  accordance  with the general election law;
provided that such question shall not be  submitted  at  a  consolidated
primary  election.   The  public  question shall be in substantially the
following form:

------------------------------------------------------------------------
    Shall the county (or city, village
or incorporated town) of.....impose          YES
a surcharge of up to...� per month per
network connection, which surcharge will
be added to the monthly bill you receive   -----------------------------
for telephone or telecommunications
charges, for the purpose of installing
(or improving) a 9-1-1 Emergency             NO
Telephone System?
------------------------------------------------------------------------
    If a majority of the votes cast upon  the  public  question  are  in
favor thereof, the surcharge shall be imposed.
    However,  if  a  Joint  Emergency  Telephone  System  Board is to be
created pursuant to an intergovernmental agreement under  Section  15.4,
the  ordinance  to impose the surcharge shall be subject to the approval
of a majority of the total number of votes cast upon the public question
by the electors of all of the municipalities or counties, or combination
thereof, that are parties to the intergovernmental agreement.

    The referendum requirement of this subsection (c) shall not apply to
any municipality with a population over 500,000  or  to  any  county  in
which  a  proposition  as  to  whether  a  sophisticated 9-1-1 Emergency
Telephone System should be installed in the county, at  a  cost  not  to
exceed a specified monthly amount per network connection, has previously
been  approved by a majority of the electors of the county voting on the
proposition at an election conducted before the effective date  of  this
amendatory Act of 1987.

    (d)  A  county  may  not  impose  a surcharge, unless requested by a
municipality, in any incorporated area which has previously  approved  a
surcharge  as  provided  in  subsection  (c) or in any incorporated area
where the corporate authorities  of  the  municipality  have  previously
entered   into   a   binding   contract  or  letter  of  intent  with  a
telecommunications  carrier  to  provide  sophisticated  9-1-1   service
through municipal funds.

    (e)  A  municipality  or  county may at any time by ordinance change
the rate of the surcharge imposed under this Section  if  the  new  rate
does  not  exceed  the rate specified in the referendum held pursuant to
subsection (c).

    (f)  The surcharge authorized by this  Section  shall  be  collected
from  the  subscriber  by  the  telecommunications carrier providing the
subscriber the network connection as a separately  stated  item  on  the
subscriber's bill.

    (g)  The  amount  of  surcharge  collected by the telecommunications
carrier shall be paid to the particular municipality or county or  Joint
Emergency  Telephone  System  Board  not  later  than  30 days after the
surcharge  is  collected,  net  of  any  network  or  other   9-1-1   or
sophisticated   9-1-1   system   charges   then   due   the   particular
telecommunications   carrier,   as  shown  on  an  itemized  bill.   The
telecommunications  carrier  collecting  the  surcharge  shall  also  be
entitled to deduct 3% of the gross  amount  of  surcharge  collected  to
reimburse  the  telecommunications carrier for the expense of accounting
and collecting the surcharge.

    (h)  A municipality with a population over 500,000 may not impose  a
monthly surcharge in excess of $1.25 per network connection.

    (i)  Any  municipality or county or joint emergency telephone system
board that has imposed a surcharge pursuant to this Section prior to the
effective date of this amendatory Act of 1990 shall hereafter impose the
surcharge in accordance with subsection (b) of this Section.

    (j)  The corporate authorities of any  municipality  or  county  may
issue,   in   accordance  with  Illinois  law,  bonds,  notes  or  other
obligations secured in whole or in part by the proceeds of the surcharge
described in this Section.  Notwithstanding any change in law subsequent
to the issuance of any bonds, notes or other obligations secured by  the
surcharge,  every  municipality  or  county issuing such bonds, notes or
other obligations shall be authorized to impose the surcharge as  though
the  laws  relating  to the imposition of the surcharge in effect at the
time of issuance of the bonds, notes or other obligations were  in  full
force and effect until the bonds, notes or other obligations are paid in
full. The State of Illinois pledges and agrees that it will not limit or
alter  the  rights  and  powers vested in municipalities and counties by
this Section to impose the surcharge so as to impair  the  terms  of  or
affect  the  security  for  bonds, notes or other obligations secured in
whole or in part with the proceeds of the surcharge  described  in  this
Section.

    (k)  Any  surcharge  collected by or imposed on a telecommunications
carrier pursuant to this Section shall be held to be a special  fund  in
trust  for  the  municipality, county or Joint Emergency Telephone Board
imposing the  surcharge.   Except  for  the  3%  deduction  provided  in
subsection  (g)  above,  the  special  fund  shall not be subject to the
claims of creditors of the telecommunication carrier.
(Source: P.A. 86-101; 86-1344.)

    Sec. 15.4.  Emergency Telephone System Board; powers.
    (a)  The corporate authorities of any county  or  municipality  that
imposes  a  surcharge  under  Section  15.3 shall establish an Emergency
Telephone System Board.  The corporate authorities shall provide for the
manner of appointment and the number of members of the  Board,  provided
that  the  board  shall consist of not fewer than 5 members, one of whom
may be a public member who is a resident of the local  exchange  service
territory  included in the 9-1-1 coverage area, one of whom (in counties
with a population less than 100,000) may  be  a  member  of  the  county
board,  and  at  least  3  of  whom shall be representative of the 9-1-1
public safety agencies, including but not limited to police departments,
fire departments, emergency medical services  providers,  and  emergency
services  and  disaster  agencies,  and  appointed on the basis of their
ability or experience.  Elected officials are also eligible to serve  on
the  board.   Members  of the board shall serve without compensation but
shall be reimbursed for their actual and necessary expenses.  Any  2  or
more  municipalities,  counties,  or  combination thereof, that impose a
surcharge under Section 15.3 may,  instead  of  establishing  individual
boards,  establish  by  intergovernmental  agreement  a  Joint Emergency
Telephone  System  Board  pursuant  to  this  Section.   The  manner  of
appointment of such a joint board shall be prescribed in the agreement.

    (b)  The powers  and  duties  of  the  board  shall  be  defined  by
ordinance  of  the  municipality  or  county,  or  by  intergovernmental
agreement  in  the  case  of a joint board.  The powers and duties shall
include, but need not be limited to the following:

         (1)  Planning a 9-1-1 system.

         (2)  Coordinating   and   supervising    the    implementation,
    upgrading, or maintenance of the system, including the establishment
    of equipment specifications and coding systems.

         (3)  Receiving  monies from the surcharge imposed under Section
    15.3, and from any other source,  for  deposit  into  the  Emergency
    Telephone System Fund.

         (4)  Authorizing all disbursements from the fund.

         (5)  Hiring  any  staff  necessary  for  the  implementation or
    upgrade of the system.

    (c)  All monies received by a board pursuant to a surcharge  imposed
under  Section  15.3 shall be deposited into a separate interest-bearing
Emergency  Telephone  System  Fund  account.  The   treasurer   of   the
municipality or county that has established the board or, in the case of
a  joint  board,  any  municipal  or  county treasurer designated in the
intergovernmental agreement,  shall  be  custodian  of  the  fund.   All
interest accruing on the fund shall remain in the fund.  No expenditures
may  be  made  from  such fund except upon the direction of the board by
resolution  passed  by  a  majority  of  all  members  of   the   board.
Expenditures  may  be made only to pay for the costs associated with the
following:

         (1)  The design of the Emergency Telephone System.

         (2)  The coding of an initial Master Street Address Guide  data
    base, and update and maintenance thereof.

         (3)  The   repayment   of   any   monies   advanced   for   the
    implementation of the system.

         (4)  The   charges  for  Automatic  Number  Identification  and
    Automatic  Location  Identification  equipment,  a  computer   aided
    dispatch system that records, maintains, and integrates information,
    mobile  data  transmitters equipped with automatic vehicle locators,
    and  maintenance,  replacement  and  update  thereof   to   increase
    operational  efficiency  and  improve  the  provision  of  emergency
    services.

         (5)  The  non-recurring  charges related to installation of the
    Emergency Telephone System and the ongoing network charges.

         (6)  The acquisition and installation, or the reimbursement  of
    costs therefor to other governmental bodies that have incurred those
    costs,   of   road  or  street  signs  that  are  essential  to  the
    implementation of the emergency telephone system and  that  are  not
    duplicative of signs that are the responsibility of the jurisdiction
    charged with maintaining road and street signs.

         (7)  Other    products   and   services   necessary   for   the
    implementation, upgrade, and maintenance of the system and any other
    purpose related to the operation  of  the  system,  including  costs
    attributable  directly  to the construction, leasing, or maintenance
    of any buildings or facilities or costs  of  personnel  attributable
    directly to the operation of the system. Costs attributable directly
    to the operation of an emergency telephone system do not include the
    costs  of  public safety agency personnel who are and equipment that
    is dispatched in response to an emergency call.

    (d)  The board shall complete the data base before implementation of
the 9-1-1 system.  The error ratio of the data base  shall  not  at  any
time exceed 1% of the total data base.
(Source: P.A. 89-568, eff. 1-1-97; 90-698, eff. 8-7-98.)

    Sec. 15.5.  Private residential switch service 9-1-1 service.
 
   (a)  After June 30,  1995,  an  entity  that  provides  or  operates
private  residential  switch  service  and  provides  telecommunications
facilities  or  services to residents shall provide to those residential
end users the same level of 9-1-1 service as the public agency  and  the
telecommunications  carrier are providing to other residential end users
of the local 9-1-1 system.  This  service  shall  include,  but  not  be
limited  to,  the capability to identify the telephone number, extension
number, and the physical location that is the source of the call to  the
number designated as the emergency telephone number.

  (b)  The  private  residential  switch  operator  is responsible for
forwarding end user automatic location identification record information
to the 9-1-1 system provider according to  the  format,  frequency,  and
procedures established by that system provider.

  (c)  This  Act  does  not  apply to any PBX telephone extension that
uses radio transmissions to convey electrical signals  directly  between
the telephone extension and the serving PBX.

  (d)  An  entity  that  violates this Section is guilty of a business
offense and shall be fined not  less  than  $1,000  and  not  more  than
$5,000.
  
  (e)  Nothing  in  this  Section  shall  be construed to preclude the
Attorney General on behalf of the  Commission  or  on  his  or  her  own
initiative,  or  any  other  interested  person,  from  seeking judicial
relief, by mandamus, injunction, or otherwise, to compel compliance with
this Section.
(Source: P.A. 88-604, eff. 9-1-94; 89-222,  eff.  1-1-96;  89-497,  eff.
6-27-96.)

    (Text of Section from P.A. 90-819)
    Sec. 15.6.  Private business switch service 9-1-1 service.

    (a)   After June 30, 1996, an entity that installs or operates a new
private business switch service or replaces an existing private business
switch service and provides telecommunications facilities or services to
businesses shall provide to those business end users the same  level  of
9-1-1  service  as  the public agency and the telecommunications carrier
are providing to other business end users of  the  local  9-1-1  system.
This  service  shall  include,  but not be limited to, the capability to
identify the  telephone  number,  extension  number,  and  the  physical
location  that is the source of the call to the number designated as the
emergency telephone number.  After June 30, 2000, all entities providing
or operating a private business switch service shall  be  in  compliance
with this Section.

    (b)  The   private  business  switch  operator  is  responsible  for
forwarding end user automatic location identification record information
to the 9-1-1 system provider according to  the  format,  frequency,  and
procedures established by that system provider.

    (c)  This  Act  does  not  apply to any PBX telephone extension that
uses radio transmissions to convey electrical signals  directly  between
the telephone extension and the serving PBX.

    (d)  An  entity  that  violates this Section is guilty of a business
offense and shall be fined not  less  than  $1,000  and  not  more  than
$5,000.

    (e)  Nothing  in  this  Section  shall  be construed to preclude the
Attorney General on behalf of the  Commission  or  on  his  or  her  own
initiative,  or  any  other  interested  person,  from  seeking judicial
relief, by mandamus, injunction, or otherwise, to compel compliance with
this Section.
(Source: P.A. 88-604, eff. 9-1-94; 89-222,  eff.  1-1-96;  89-497,  eff.
6-27-96; 90-819, eff. 3-23-99.)

    (Text of Section from P.A. 91-518)
    Sec. 15.6.  Enhanced 9-1-1 service;  business service.

    (a)  After  June  30, 2000, or within 18 months after enhanced 9-1-1
service becomes available,  any  entity  that  installs  or  operates  a
private   business   switch   service  and  provides  telecommunications
facilities or services to businesses shall assure  that  the  system  is
connected to the public switched network in a manner that calls to 9-1-1
result  in  automatic number and location identification.  For buildings
having their own street  address  and  containing  workspace  of  40,000
square   feet   or  less,  location  identification  shall  include  the
building's street address.    For  buildings  having  their  own  street
address  and  containing  workspace  of  more  than  40,000 square feet,
location identification shall include the building's street address  and
one   distinct   location  identification  per  40,000  square  feet  of
workspace. Separate buildings containing workspace of 40,000 square feet
or less having a common public street  address  shall  have  a  distinct
location  identification  for  each  building  in addition to the street
address.

    (b)  Exemptions.  Buildings containing workspace of more than 40,000
square  feet  are  exempt  from  the  multiple  location  identification
requirements of subsection (a) if the building maintains, at all  times,
alternative   and   adequate   means  of  signaling  and  responding  to
emergencies.  Those means shall  include,  but  not  be  limited  to,  a
telephone  system  that  provides  the  physical location of 9-1-1 calls
coming from within the building.  Health care facilities are presumed to
meet the requirements of this paragraph if the  facilities  are  staffed
with medical or nursing personnel 24 hours per day and if an alternative
means  of  providing  information  about the source of an emergency call
exists. Buildings under this exemption must provide 9-1-1  service  that
provides the building's street address.

    Buildings  containing  workspace of more than 40,000 square feet are
exempt from subsection (a) if the  building  maintains,  at  all  times,
alternative   and   adequate   means  of  signaling  and  responding  to
emergencies, including a telephone system that provides the location  of
a  9-1-1  call  coming  from  within  the  building, and the building is
serviced by its own medical, fire  and  security  personnel.   Buildings
under this exemption are subject to emergency phone system certification
by the Illinois Commerce Commission.
    Buildings  in communities not serviced by enhanced 9-1-1 service are
exempt from subsection (a).

    (c)  This Act does not apply to any  PBX  telephone  extension  that
uses  radio  transmissions to convey electrical signals directly between
the telephone extension and the serving PBX.

    (d)  An entity that violates this Section is guilty  of  a  business
offense  and  shall  be  fined  not  less  than $1,000 and not more than
$5,000.

    (e)  Nothing in this Section shall  be  construed  to  preclude  the
Attorney  General  on  behalf  of  the  Commission  or on his or her own
initiative, or  any  other  interested  person,  from  seeking  judicial
relief, by mandamus, injunction, or otherwise, to compel compliance with
this Section.

    (f)  The Commission shall promulgate rules for the administration of
this Section no later than January 1, 2000.
(Source:  P.A.  88-604,  eff.  9-1-94; 89-222, eff. 1-1-96; 89-497, eff.
6-27-96; 91-518, eff. 8-13-99.)

    Sec. 16. This Act takes effect July 1, 1975.
(Source: P.A. 79-1092.)


 --

	Social Engineering:

Government Emergency Telephone Systems biggest flaw is not in its physical or
watts Band 6 network infrastructure, but the fact that all live operators who
administrate the GETS system more often than not allow themselves to be tricked
by unauthorized NON-government employees. Because all calls that route through
the GETS system are thought of as high-priority, operators who are called up won't
usually think twice about giving the person on the other end of the line a high-
priority account.

High-priority accounts allow anyone to call any number in most of Canada / USA for free.
Phone numbers that would normally give you a busy-signal, or an "all circuits busy" recording,
will allow you to do an Emergency Interrupt with a GETS account - thus allowing you to break
into the conversation between the called party and the third person on the line.


 Scenario between unauthorized person and GETS operator;

 Operator: "Operator services, how may I help you?"

 John Bashcoff: "Yes, hello this is John Bashcoff with the Office of the Commissioner for
Federal Judicial   Affairs. I'm in Edmonton right now, and I seem to have misplaced
my GETS pin number. This is an emergency, can you please supply me with a PIN?"

 Operator: "Yes of course Mr.Bashcoff. The pin number is [12 digit number]."

 John Bashcoff: "Thank You."

 Operator: "You're welcome."

 -- CALL ENDS --

Unauthorized caller proceeds to call back the GETS system, and immediately he
enters the 12 digit pin he was supplied with. Tada... outdial access anywhere
he wants for free. His caller identification information shows 'Long Distance,
710-627-4387'. FYI; The area code '710' is a private area code owned by the US
Government. When you dial up the phone number 710-627-4387, you will connect
to another GETS system.

--

 Dial-Up Numbers -

  I recommend you do not call the first phone number on this list,
  and when calling any of these numbers do NOT use them from home or work -
  use a payphone far away from your home if you can.
  

     * 1-710-627-4387
 
     * 1-800-257-8373
 
     * 1-800-900-GETS

     * 1-888-288-GETS


 --

 Conclusion;

  Have fun and don't get caught. Big brother *IS* watching, and he will rip
  your balls off and flush them down the toilet if he catches you using his
  systems.


--

Hiding Messages No One Will Ever See on disc.server.com

The disc.server.com CGI webboard allows users to manually choose what 
message they view by entering it into the URL.  Every message is ordered by 
its article # - starting at 1 when the message board first opened, moving 
upwards.  Now, when you send a message the html form sends the author, etc.. 
  When you reply to a message, it also sends the "parent" variable, which is 
the article number of the message you are replying to.

Now, go view some message on a a disc.server.com board,  Edit the URL to 
point to a higher article number.  If it displays another message, then keep 
increasing the article number until it displays "Wed Dec 31 18:00:00 1969."  
Remember this number.
(note: an easier way to find this number is simply to send a message, lok at 
its article number, and add 1)

Now, reply to a message.. it doesn't matter what.  Edit the HTML so that the 
"parent" variable is one more than the last valid article number.  Now, when 
you create this message, the article number will be equal to the parent 
number.  It doesn't get displayed in the index, but you can manually reach 
it by entering its article number.  Note: you can't reply to this message 
either.  Its just there.

Chances of anyone seeing that message? pretty much zero, unless they do what 
I do.  Instead of looking for updates to the board by searching through the 
index, I just increment the article number by one until the messages do not 
exist.

woah that was cool

diabolik
diabolik@nitric.net

--

How to piss off Telus with your ADSL Modem amongst other things.       09/26/01

Sitting here with nothing better to do, i thought i would write up a little article on what
information i've gathered on the Telus network in good ol' Edmonton. Also, let it be known
according to a tier 1 (yes, the godlike teir 1 guys) tech support guy, claiming he works
for telus (he answered at 310-inet) that telus does NOT, i repeat DOES NOT support the x86
arch (guess i'll just have to back to using my alpha)

Disclamer: This is for educational purposes only, if you happen to have the police knock
on your door at 7 AM to exersize a search warrant to obtain all computer related materials
in your residence because of what you did in this article, then thats too fkn bad, cause
your the dumb shit who let somone else tell him what to do. btw, only done this with a 
3com home connect modem, but logic dictates that those damned cisco's should behave the
same too. Now, down to business.

1) Overview

	The Telus Network is relatively secure, in so far as it doesnt usually spew packets
all over the network like lovely cable modems do. The only thing ive seen actually travel
across their dsl network is half life games (lord knows why, im too fucked up to figure it
out right now). Now for all you little script kiddiots out there that figure they can jack
their 1.5mbit DSL line up to a 4mbit down 640 kbit up line with windows registry tweaks or
patches are out of their fucking mind. your bandwidth is setup at your DSLAM at your
nearest friendly but nicely guarded telus CO.

2) How it works
	K, when you turn your DSL modem on, you will notice the alert light flash a couple
times. that means its posting (ive since sold my DSL modem and cant remember what color
the flases are) it will pause for a few seconds, then start flashing again for about 30sec+
this is it loading the IOS (Intergrated Operating System (or sumphin)) after this, it will
attempt to handshake with the DSLAM at the telus CO. if your line is not configured for DSL
or the line is too noisy, it will turn red, but if fate smiles, it will go green. nuff said.

3) DHCP

	DHCP is an absolutly beautiful thing. it stands for Dynamic Host Configuration
Protocol. Basically, what happens, is your OS (whatever it may be) sends a broadcast
message through your ethernet card, which gets routed to Sodium.bctel.net (Primary DHCP Server)
The server then checks the MAC (Media Access Control) Adress of your ethernet card (remember
registering your computers with telus when you first got DSL? ) now, telus has implemented
somwhat of a security feature here, if your MAC Addy is not registered with their server
you are assigned an ip address on their LAN (always a 10.*.*.* address) but, if you have
registered, you will automagically be assigned a fully routeable IP address (161.184 if your
old school DSL or 142.59.*.* for all us newbies) along with your IP address you are given
the information for your DNS Servers (sodium at it again) and your default Gateway.
This is all done while your computer is booting (or for us linux people, when dhcpcd kicks
in). Now for you windows people, somtimes you will notice that windows will just seem to hang
while its booting, but its just waiting for the DHCP server to respond (more often than not
its offline or bogged to hell *shakes head*). But the great thing with DHCP, is that it means
telus can change your IP and move you around all it pleases, because you have a dynamic IP.
Now if your going to be running a domain, and want to get a static IP (pretty much a pre req)
your going to have to pay telus an extra $59/mnth (or so) just to have the same ip all the time.
sounds pretty fucking silly now doesnt it?

4) Security?

	I have a friend on Shaw Cable, in Millwoods (you know who you are) who would give
his left nut to be able to smurf (yes it still works) from his Cable modem. Shaw has gotten
somewhat smart, and from what ive seen, they have finally read the paper on smurf and how
to fix0r the routers so that you cannot send spoofed ICMP Echo Request packets anymore. This
is why Telus is my personal favourite for a broadband ISP (when its working). Telus doesnt
filter sweet fuck all. but, be careful dont let this fool you into thinking that they're
stupid, because the Telus internet security guy watching your packets go by, and red flagging
your account is far from stupid. Now lets say you happen to smurf somone, and they report the
logs from their firewall/sniffer/packet logging device to abuse@telus.net, and they check it
out they will notice that you've been up to somthing and send you a warning. you will get 3
of these (i got 2 for DDOS'in before i got smart) if you have 3 warning on your account it
will be terminated for a period of 30 days, and i belive they will also still expect you
to pay for the service for those 30 days.

5) Having Fun

	A while ago somone named The Gonz (or somthing similar) wrote an article on
'hard encoding your ip'. Honestly I still laugh to this day when i think about that.
no twit at telus is going to send the police after you for taking an IP. Now my idea works
the same way (this is where linux really shines) After you boot your computer, get your
default Gateway, it will be 142.59.*.1 (i hope =/) now write this down, its important
and for DNS servers use 199.185.220.36 and 199.185.220.52 since their much faster and
alot more reliable. Ok, So you've done that, now what? well, now you can set your IP
to anything you want (well almost) My gateway used to be 142.59.212.1 if memory serves me.
now this doesnt mean i could set my IP addy to 142.59.0.0 or 142.59.245.69 in my experence
you have 2 full class B subnets above your routers IP for you to use ex. 142.59.213.5, 
142.59.214.67 and 142.59.215.30) now, if you choose an IP address, and your net access
doesnt work period, that means that somone else is currently using that IP address
(2 machines on the internet cant share the same one) i find IP address's ending in .255
and .0 are fun to go on IRC from. when I first starting doing this, their were no
reverse DNS record set for the IP, so it wouldnt resolve. after using a certain IP for about
a couple weeks, telus would seem to put a reverse name on it (oh well, dont worry, their not
on to you) But, dont think just taking an IP and not using the one they gave you will let
you escape being caught. If they were to actually look at the packets your sending
they would find a nice little thing, that points them right to you. the MAC Address on
your ethernet card. there are supposed to be no numbers the same but its a lie. now
if you search on freshmeat.net for ethermac (i belive) you will find a beautiful little
utility for linux, what it does, is modify how packets are sent (you must be r00t)
and instead of your real MAC Address being there, its just a random one (put your next door
neighbours MAC Address in there for extra fun.)

6) Ok, when are we going to have fun?

	With my somwhat limited knowledge of exactly how the telus network is setup and
what my packets look like on their end, as near as I can figure, unless they go through
a fuckload of trouble while your sending your packets, it is hard to trace you by just
looking at the dumped TCP/IP Packets their loggers would pick up. Now, what can you do now?
well as far as i know, telus has only 1 DHCP server for Alberta, and maybe BC too. and
also how all the hapless lusers depend on that DHCP server. (after windows reboots,
or your lease expires, you will always have to get a new IP address) Now, lets say
what would happen if that DHCP server wasnt there? if it mysteriously got knocked offline
by a DDOS (namely a smurf attack) because remember, they also do not filter your packets.
Now, besides making the telus networking techs scream like little babys, there are other
things you could be doing. Mass scanning, trying to exploit a box etc. now as long as you
dont say on the same IP too long, and switch your MAC address somtimes, and dont do REALLY
stupid shit, telus shouldnt notice, or catch you. If they do, well who knows what will
happen.

7) Other fun things todo (Under linux of course silly)

	Depending on how you set your Broadcast address, and how your particular router
is setup, it is possible to put your Ethernet card into promiscuous mode and see whats going
on. (ifconfig eth0 promisc) now, as far as sniffers go, tcpdump is a nice one. it is an easy
way to find out whats going on in your network and how many subscribers there are and who is
using their DSL at the moment. their are other sniffing suits you can find kicking around on
various sites, i think there might be some on freshmeat.net, that will automagically sniff
passwords and whatnot for you, and convienently dump them into a text file for you to sort
through after a few hours of sniffing. I found in the ending days of my DSL line, a porn
site started up, and we shared the same router. now i got real lucky, since this poor SOB
had never discovered SSH, and loved to share his plain text passwords with me (sniffers are
beautiful arnt they). Anyway, somtime if your lucky, you might catch a telus tech logging
into your router to make changes and then youve got a new and very fast toy to play with.
Other things to piss off the poor people at tech support is alias your ethernet card
so that it occupies every single IP that your router services (during evening rush of course
=D, remember only 1 computer can use a IP address at the same time, or else they fight!)
you can do other things, like run a shitload of eggies off your box, all on diff IPs. Im
sure you'll find somthing fun todo, just dont make their lifes too difficult.


Anyways, I met The Clone at a party for last night, and we played crazy 8's for like 5
hours straight, and after we talked for a fkn long time, he told me i should write an
article. This is the first time i've ever written one, so if you dont like it, too bad.
Keep safe boys and Girls, and life is nothing but 1's and 0's.

						sheppard
						shep@tr4nce.com
					    	www.amishrakefight.org/gfy

--

Disclamer: For educational purposes only. if you get in trouble for this, its your own damn
fault for doing what some wierdo from the internet wrote in a file. do people no longer
posess any common sense?
Be good Chillins.								09/26/01
w00t

	Heres a little secret ive known for a while, and its fun to play this trick on
shell providers. now, all you need is bash (Bourne Again Shell) (my fav shell btw).
now, this little trick does not give you root, nor does it give you command over anything.
its just somthing todo to be a shit disturber. Now, what you need todo is either telnet in
to your shell provider (maybe go through a wingate first duh!) and make sure your running bash.
now, all you do is type a bunch of gibberish in, but not just any gibberish. you can only
put in alpha-numeric characters (trust me on this) and definatly NO '|'s. after about half
your screen is filled with just plain jibberish, press your enter key. you will see what you
just typed scroll past your screen again, ending with bash: command not found. now, what
you do is type in about 40 !'s. thats right, a whole bunch of !!'s. type in like 10, and use
your mouse to copy and paste them. after you have 40 (or more depending) press enter.
now if you get somthing like 'bash: event not found'. that means you have an odd number of
!'s. you must have an even amount. not 39, not 41, 40 exclamation marks. Now for those of you
who put 40 (or more =D) in will see alot of gibberish fly past your screen. what !! means in
bash is to repeat the last command. and with every additional !!, the amount of text grows
exponentally. now, the fun part, is that all this text has to be read by the computer. now
since youve got all those !! adding on to each other, you can see how a line of maybe 30 
lines of just plain text, can turn into alot of text. now, if you do this correctly, you will
see text scroll by, but it will seem like it's locked. if you get returned to a normal bash
prompt, you need more !!'s. dont worry about putting in 3 pages of !!'s, remember, more is 
better. now, what happens next, is bash loads ALL this text into memory. i like to fire up
another login, in a seperate window, and fire up top on the poor unsuspecting shell box
before i hit enter. ive seen bash take up all the ram on nether.net (768MB system, 1.5GB swap)
and quite easily lag any other box to hell. bash will keep taking more and more ram, while still
using 99% of the CPU (even better if theirs multiple cpu's and you do this multiple times).
now somtimes the box will die, and not even respond to pings, other times, it will just die
and sit there, and you will not be able to ssh/telnet to it. I suppose you could use this
on a box thats hosting a bunch of eggdrops, and maybe you could drop them offline since 
bash is taking up all the available crunching power. now, next time you login, it may take
quite some time. bash has a wonderful file called .bash_history that remembers everything you
do to a certain point (thats why the up key works for recalling commands). now, for you
Admins reading this, and wanting to protect yourselfs, what you need todo is either recompile
bash from the source, and remove one of the options (RTFM), or enable user quotas which are
a good idea anyway. just set them up so that if any user is using massive amounts of ram/cpu
 time for any length of time (1 minute is good), then the pid is killed, and your box is
saved. its as simple as that. Alot of machines Ive been on show no evidence of having the
user quota's enabled. but i suppose you could setup maybe a crontab or some evil fork bomb
using pipes  to just stream random letters into multiple occurences of bash, then shove it a
bunch of !!'s, and you could have yourself a hayday. Anyways ive know about this for a long
time now, and havnt seen any mention of it anywhere else. Also make sure you log back in and
rm -rf .bash_history, because its got everything you typed in there. anyways, this is why
more people should have a basic understanding of bash, and how truly powerful it is.
I bet this might even work on shellyeah, and its not like your compiling any source, your
just using bash, your shell :].



							/bin/bash 0wns me
							and no more /usr/local dammit!
							sheppard
							shep@tr4nce.com

--

"Straight From The Underground"
FORMER MOD MEMBER,
JOHN LEE, IS BACK...


Date: Thurs Oct 4, 2001

By: The Clone

URL: www.nettwerked.net


John Lee was no ordinary gangster punk-ass kid back in the mid-1980's, livin' it up in the
Brooklyn area of New York. He was recognized mainly as the famous b-boy named 'Corrupt',
who had seen it all... or at least he thought so. Spending some time in the penal-system as
a youth who hadn't even seen his 16th birthday, John Lee decided to trade in his guns, knives,
and negative lifestyle for something more mentally profitable and thrilling - computer hacking.

Now the computer hacking John Lee involved himself in doesn't paint a picture in any sort of
typical hacker scenario - no, sir. By the late 1980's, John Lee joined up with what eventually
became the largest organized computer hacker group on the planet. Straight 
outta 212, they were known as the Masters of Deception (M.O.D).

To give you an idea about how big the M.O.D were, high profile groups such as the
Legion of Doom considered the Masters of Deception their biggest online threat.

One night in 1990, five or six hackers in Texas, are hanging out on a telephone
conference bridge. Suddenly a new voice joins the conference in midsentence.
The unknown newcomer doesn't sound like a Texan. "Yo, dis is Dope Fiend from MOD,"
the stranger says in a non-white, non-cow tippin voice. One of the Texans responds:
"Get that nigger off the line!". Everyone falls silent. A moment later the stranger
responds to the hackers with a different accent. "Hi. This is Corrupt." Corrupt's
real name is John Lee. Corrupt lives in Bed-Stuy, New York. Corrupt is well known
and respected as a "hacker" extraordianaire. Corrupt is African-American. Cyber-War
has been declared.

Corrupt targets the slur slinger, a member of the rival Cyber Gang LOD (Legion
of Doom), who later claims he was not on during the incident. Corrupt harasses
his prey via phone...often. He switches his prey's long distance carrier. 
His prey retaliates by translating a text file titled "The History of MOD" 
(Masters of Deception) into street "jive" and places it back on the net. Corrupt's
prey claims to net observers that he isn't a bigot. He says "I have Black friends
at work". The on-line cyber war rages on.

"I started breaking into computer networks when I was 16. I did it because I liked
the thrill of it - you get all tingly. It was euphoric, like a runner's high.
We were MOD, we came out of nowhere. We were badasses who could crush anyone and
break into anything. There was a lot of stuff that, even now, I'm just like, Wow.
I've seen some stuff that could make you shit green.

"These days, most of the guys from MOD work in the tech field - security, mostly.
Yeah, I talk to them still. Why not? We had that life experience together. I'm sure
if some people crashed a plane in the Andes, then the people that survived would
still call each other from time to time. MOD was kind of like that - but we didn't
eat anybody. I think people know we got the raw end of the deal. I don't want to
minimize it, but there are people who stab people and get less time than I did."

MOD were like this creepy void that existed in cyberspace; in the BBS', packet
switching networks, private networks, and on the Internet. MOD were big and powerful
and people, specifically other hackers, knew it. Rumour has it the Masters of
Deception controlled everything - the New York City powergrid, the entire U.S
phone system, and DMV to name a few.

FBI steps in. You see, the members of MOD have been under investigation since 1989.
The indictment against the members of MOD is announced in July of 1992. The FBI
charges Corrupt with "illegal computer intrusion". Corrupt gets six months.

Today John Lee, the twenty-nine year old African-American who sort of resembles
"IceCube", is working on two Internet spinoffs: FellOff.com (coming this fall)
and MediaThreat.com (unknown release date). FellOff.com will be about celebrities
that have fallen off, put to rest with the nail in the coffin in regards to their
careers.

And finally, John Lee is in the process of writing a book, ironically called
"Why I Hate Computers".

John: "It delves into the psyche of a man whose life depends on computers, but
he's grown to despise them at the same time."

"At the end of that I'm not just a hacker. And you'll realize computers suck,
because beneath this veneer there's a deep dark side that no one knows."

Now you ask yourself: "What side of that?"

"Of course," John explains,

"you'll have to read the book to find out why." 

John Lee currently lives in New York City,
where he plans to move to California to better his life and career...

Literature:
Masters of Deception: The Gang That Ruled Cyberspace by Michelle Slatta and Joshua Quittner.
HarperCollins, 10 East 53d Street, New York 10022-5299, 1995, 256 pages, $23.00.

--

  -- Credits

    Without the following contributions this zine issue would be fairly
      delayed or not released, so thank you to the following people:

	    diabolik, m4chine, Phlux, The Clone (dats me!), and sheppard


  -- Shouts:

  Hack Canada (#HackCanada), Canadian Phreakers Union (#cpu), #PhreakBC,
 Blackened @ Damage Inc., The Grasshopper Unit, Flippersmack, Pyrofreak,
 plappy, soap, krys, Kybo_ren, Flopik, and lastly to everyone and anyone
		  who contributes to the Canadian H/P scene.


                             ;.  .;..  ; ;. ;..
                           ;..   .;..; .;.; .;; ;..
                      .;..;. .;..;  .;.;...; ;..;..
                         .;.         A         .;. .;.
                       ;..   N E T T W E R K E D  ;..
                        ;..;.. P R O D U C T   ;..;..
                          .;..;               ;..;..
                     ;  .;..;.;..   .; .  .;. ..;..
                    .;..   . .;  ..;..;..;.. .;
                ;..;.   .;.. . .;.. .;.;.
              ..;. ..;.. .;.   ;.;..;;..;.;
                ;.;;..;..      ;.;.; .; .
                   ;.;..;. .;. ;.;:.;.
                     ,;....;.
               .;.;. .;.;
              .;.;.;
            .;.;
            ;..;.
           .;.;;.; .;. ..; ;. > > > > > > cowabunga dude!