💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › REVIVAL › rvlcissd.003 captured on 2022-06-12 at 14:10:34.

View Raw

More Information

-=-=-=-=-=-=-

----=[ CiSSD ]=----   is    finally    sober    over     Issue   #3    of

                                   __  /\
                                  |__| \ \        :
                 _____ _____ _____ _____> \____ __|__ _
                |  .  |   __|  |  >  |  |  >   |  |
     ---===[    |    /_   __|    /|  |    / _  |  |__      ]===---
              __|__|__|_____|  _/ |__|___/__|__|_____|
                |           | /      |         |     :
                .           \/       .         :     .
                                               .
                                - FROGS -

=========================================================================
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY    MAY (C) 1993/94
-------------------------------------------------------------------------
     Once again, the frog has overestimated our stupidity. Surely we will
not fall for the same trick twice.

     We have learned a few things about frogs. They don't have very much
to do.  They're  rather bored most of the time,  but they impress you by
breathing a lot of hot air out of their lungs, and then they sit quietly
in order to lure you in.  They smell funny, but it's one of those smells
you have to  sniff again to make sure that your  nose didn't decieve you
the first time.

     If you  lick  a toad,  you get high,  but  frogs are  not toads,  so
everyone  sucking up to a  frog finds out shortly that  it's not all it's
cracked up to be, and generally leaves it be.. it's smell was unappealing
in the first place.

     You can  buzz about trying to find  a place to observe the frog,  in
order that you might protect yourself from its self serving, greed driven
actions,  but when the frog  thinks you are  sitting pretty,  he tries to
aggrivate you again.  If you are silly enough to become aggrieved  by his
mischeivous  tactics,  he will  stick out his  tounge,  and  swallow  you
whole.

     For once, a group of flies, known as CiSSD, has outwitted a group of
amphibians,  who for  the most  part,  aren't  frogs,  but all  wish they
were. We learned the only way to get high from a frog is to smoke him.

     But we flies don't need to get high.. I think we can be content with
removing his  lilly pad..  He will  no longer be part  of this  amphibian
community.

     [No one will appreciate  this as much  as those who  are involved in
the war against the evil frog.  Entertainment for your efforts.  Thanks a
lot guys..  Zap the Frog, rejoin the scene when you grow up.  For now you
are only a tadpole.]

                                   ---

     Due to the hustle and bustle of a busy  end of school term,  some of
our regular columns were forced to flee. 'NEWS AND NATTERINGS OF THE DOPE
MAN' will  most definately  be back for  next issue,  and will  more than
probably be joined by 'NEWS BYTES (and usually bites too!)'.

     Despite  these  ommisions,  we hope  sincerely that  you enjoy  this
issue.  After all, some things may come and go in waves, but the computer
underground is here to stay.

 - Essence/TX

                                   ---

                           WARNING, DISCLAIMER


      WARNING:  THE  FOLLOWING TEXT  CONTAINS MATERIAL  WHICH  MAY BE
      CONSIDERED  OFFENSIVE BY  SOME.  CISSD AND  ITS MEMBERS BEAR NO
      LIABILITY ON THE PART OF THE READER. READ AT YOUR OWN RISK.

      DISCLAIMER:  THE INFORMATION PRESENTED IN THE FOLLOWING TEXT IS
      NOT  INTENDED TO  BE USED FOR PURPOSES  CONTRARY TO LAWS IN THE
      COUNTRY WHERE  THE  READER  RESIDES.  DUE  TO AN  INTERNATIONAL
      DISTRIBUTION,  OUR CHOSEN TOPICS  WILL PROVIDE INFORMATION THAT
      COULD POTENTIALLY BE USED  FOR PURPOSES ILLEGITIMATE IN NATURE.
      CISSD,  AND ITS MEMBERS THEREFORE,  BEAR NO  RESPONSIBILITY FOR
      THE ACTIONS OF THE READER, BE THEY A DIRECT, OR INDIRECT RESULT
      OF READING THE FOLLOWING TEXT.

      NOTE:  BY READING BEYOND  THIS POINT,  YOU ARE AGREEING  TO THE
      CONDITIONS IN THE ABOVE WARNING, AND DISCLAIMER.

      ADDITIONAL NOTE:  THE EDITOR OF  THIS MAGAZINE DOES NOT CONDONE
      PLAUGERISM. IF ANY ARTICLES APPEAR TO HAVE  BEEN COPIED WITHOUT
      PROPER CREDIT,  NOTIFICATION WOULD  BE APPRECIATED.  DUE TO THE
      VAST  NUMBER  OF  SUBMISSIONS  WE  RECIEVE  EACH MONTH,  IT  IS
      DIFFICULT  TO  FULLY  DETERMINE  WHAT  IS,  AND  IS NOT ORGINAL
      MATERIAL.

                                   ---

                            TABLE OF CONTENTS


ITEM                                    CONTRIBUTOR(S)               LINE
====                                    ==============               ====

Editorial                               Essence                        17

Warning, Disclaimer                     --                             67

Table of Contents                       --                             95

Getting Revival                         --                            159

Letters to the Editor                   --                            182

Telekom Stupidity Revealed              Lister                        298

Politics and The Hacker                 The Dictator                  343

Emotional Maturity, Fourteen            Essence                       430
Years of Age

CyberPunk!                              The Dictator                  471

Laserprinter Forgery                    Kryten                        604

Caller ID Information and               Lister                        624
Specifications

The Diatribes of Grappling              The Grappler                  813

FEATURE: Privacy, Line Taps and         Lister                        937
The US Government

     | The Clipper Chip: A Technical    Dorothy Denning               944
     | Summary

     | The White House: Statement by    The Press Secretary          1088
     | the Press Secretary

Hinterland Who's Who - 800 Exchanges    Lister                       1346

Poetry Corner                           The Grappler/Essence         1577

Official [CiSSD] Bad-Ass Belcore        Lister                       1657
glossary

Erratum - Corrections from last issue   Essence                      3241

Zen What?                               The ???? ???                 3321

[CiSSD] Membership Information          Essence                      3533

[CiSSD] Contact Addresses               --                           3563

Last Words From the Editor              Essence                      3619

     | Credits                                                       3653

169092 ]-[bytes]-------------------------------------------[lines]-[ 3677

                                   ---

                            GETTING REVIVAL!

     In order to  recieve REVIVAL magazine,  you may transfer  the latest
issue every second month from the following address:

           ftp  141.214.4.135  docs/zines/revival/rvlcissd.xxx

     where 'xxx' is the issue number.  ie: 'rvlcissd.003'.  If you do not
have internet access, the following electronic bulletin board systems are
REVIVAL(!) distribution sites:


           =[North America]==============================[+1]=

           Der Diz - NuKE '93                   (208) 343 5038
       WHQ The Downtown Militarized Zone        (416) 450 7087
       CHQ The Revolutionary Front              (416) 936 6663
           Atomic Nature                        (416) 477 9563
           Screaming Revulsion                  (418) 622 9712


                                   ---

                          LETTERS TO THE EDITOR


      ---=[ ANONYMOUS LETTER re: ABUSE IN THE HOME AND SCHOOL ]=---
                          (Edited for Clarity)

  The look at school system as being a  negative aspect in kids lives was
obviously  a  biased one by  a disgruntled teenager  who doesn't have the
ability to look  at the whole picture.   I'll give you  credit for seeing
the problem as  being the parents.  The whole problem lies  in the homes.
These so  called disceplinary actions at high schools  are those a person
would face in everyday life, so I say GET  USED TO IT! And to answer your
question, it is the  parents jobs! It is not the job  of a highly trained
teaching  professional  to  teach   common  manners  in  a   high  school
enviornment!

     I would like to point out that the  article had many good points and
the point of parental expectations in school, is an excellent one!  I can
not count the  times a  parent  has come  in saying I  should be  doing a
better job!  Like what[?] Go home and make  the damn  student do  his/her
homework! I can't make a student do  his/her work[.] It's motivation[that
is needed!]  I remember  when a  good education  and  having your parents
proud of you was motivation enough. You'll make a good adult TX[.] I hope
you remember the things you know now when you have your own kids.

  P.S

-  Blame  the  government [that] we're  underfunded and  can't afford the
   extra support personel we would all like for the new generation.


                        --- Editors Response ---

     You are perfectly right to refer to me as a disgruntled teenager.  I
think, however, that I do have the ability to look at the whole picture..
I simply chose not to. That was clearly a serious error on my part.

     I feel  that,  maybe  not the whole  problem,  but  at least a large
proportion of the problem lies in the homes.  A good chunk of the problem
would  be  solved  if  parents  made  a concious  effort  to  control the
environmental variables that are in their hands.

     It is not the teachers responsibility to teach discepline at school,
but because it seems so neccesary,  and because children are so neglected
in  their  homes,  I  feel  that  the  school system,  given  appropriate
government  funding,  should take  a different  approach to  training the
large  majority of  students  who have  no motivation,  and little  self-
respect.

     Although I believe I  was reffering to  parents  expectations of the
_students_ in my article,  it is also very true that parents expectations
of _teachers_ are also quite ridiculous in many cases. My own mother used
to always blame my teachers for anything I would do wrong.  I allowed her
to, because I had no reason to want to take the blame myself,  but due to
this long period of time  when I took no responsibility,  I later had(and
am  still having)  trouble disceplining myself  to work effeciently,  and
productively.  At this  stage in  my life,  most of my  school grades are
borderline failing due,  not to any fault of  my teachers,  but to my own
lack of motivation, and my own lack of self discepline.

     I still feel that proud parents,  and achievement in school might be
enough motivation  to continue doing well,  but it's up to the parents to
give their  children a  kick-start at  an early age,  so that  they might
continue to maintain their pride in achievement later on in life.

     I still haven't  ranked myself as  being responsible  enough to have
kids.  Maybe when I'm  significantly older,  or  at least,  more mentally
developed,  and able to meet the challenges that modern society places on
parents,  I will  reconsider.  Too many  parents,  unfortunately,  assume
that bringing up children is easy.

     Finally (as this  is rather a long response),  the government should
indeed be blamed  for underfunding.  The problems that I continually pick
at in the  educational system  would be  solved if  any one  school had a
complete,   full   time  staff..   including  the   neccesary   teachers,
councillors,  and administrators  it takes to help the children who don't
get a fair shake at home.

 - Essence/TX


           ---=[ Split Adrenalyn's LETTER re: REVIVAL #2 ]=---

     Well,  I just finished reading Revival  Issue #002 and I have to say
that  it's the best  "underground" mag I've  EVER read.  The articles are
well written,  discussing topics that we all can relate to,  the articles
pose questions which  I'm sure many of us have all asked  ourselves about
whatever topic.

     It's also not the same old underground mag  (it doesn't have a whole
bunch  of  TEXT  files put  together  into an  "issue"),  but more  of an
information mag, giving you the insight to the PHAC scene.

     Good job on this one guys, when's #003 coming?


                        --- Editors Response ---

     Well, it's here!  Assuming that I'm  sticking to any deadlines,  the
magazine will be released on the last saturday of every other month.  The
deadline for  submissions by non-CiSSD members  to REVIVAL! magazine will
be two weeks before the release date.

     Thanks for  the glowing  compliments.  While I  doubt they're  fully
deserved,  it is  true  that the  magazine is  more than a bunch of  text
files.  I think that  most CiSSD  members  take a  special  pride in  the
magazine,  as it acts as a forum for us to air  our views to  the public,
and the public to air their views to  the rest of the public!  It is very
important that we  have an appeal to everyone,  from some  perspective or
another.. We will continue to be political, and provocative.

 - Essence/TX


                                   ---

                        TELEKOM STUPIDITY REVEALED
                                  Lister

This week's "Research and Technology" section of the German news magazine
{Focus} (Nr. 17/93, pg. 106)  features an *interesting* article about the
German telephone network.

According to the article all you need to tap into another phone line is a
phone line which is hooked up to  a modern digital switch and a simple 16
key touch tone beeper. The article shows the original TELEKOM beeper. For
interested  users, {Focus} included  the TELEKOM  reorder number  and its
approval ID.

By dialing one of the special "A","B","C" or "D" keys (rightmost column),
you get acces to TELEKOMs switch testing facilities. After you are in the
testing system, you have to enter a three-digit switch id. Then enter the
phone  number you wish to  call or listen to.  If the phone line is busy,
then just enter "1" and you will have a *forced* three way call.

With  a  modem or  any other  computer controlled  dialing devices  it is
rather simple to find the available switch ids in several hours.

Since  the testing  facility will  identify itstelf  by sending  a rather
loud test tone,  most persons will  find  out,  that  there is  something
strange  going on,  if they  are tapped  by someone.  But there  are also
others that will never take much care about this situation.

Isn't it STUPID that TELEKOM  apparently  has NOT  learned anything  what
happend around  20++  years within  the USA with the  blue/red/ ... boxes
that gave interested users nice and mostly free features?

This time you even do not need any *illegal* devices, but a rather common
and widely available touch tone beeper give you full control over several
local switches!

As elementary mathematics shows,  any additional key to press would lower
the chance by 1 to 16  to get access to such a  testing system.  It would
have been  so simple  to hide  the access  code to  this system  within a
normal number range.  If that  number would have been  changed regularly,
then nobody would ever get access to it. But these measures require work,
and that seems to be hard for a monopoly company!


                                   ---

                         POLITICS AND THE HACKER
                              The Dictator

   Everyone  reading  this magazine has  a reason  to do  it..  for their
freedom may depend on it.   Why, you ask?  Because you  are dealing  with
the Cyberpunk Realm of fantasy, virtual reality, and revolution.  Fantasy
is  apparant  with  every hacker  or cyberpunk  reading this  article and
imagining the possibilities of  society and technology,  working together
towards perfect harmony--or anarchy, the Virtual Reality of a world where
no one's money  is their own,  where people are not  more than the sum of
their words as they flicker past on your screen,  where personality is no
more than  who  you can  impress with your extended vocabulary  or "K-Rad
K00lness."

   However,  another aspect is not so obvious,  but it is there,  perhaps
more than any other.  We, as hackers, phreakers, cyberpunks etc. have the
want,  the burning desire  to change the world into  a place that we have
all had a glimpse of, The 'New World' of the 90's, so to speak.
   
   The underground is  not a happy  place.  It is  a place where  one can
obtain  seemingly  endless  flows  of  information,  but  where  one must
constantly be  prepared to show  up a counterpart,  and to deal with  the
obligations of group affiliation, the backbone of the Underground.
   
   It's  all  for  status,  for  knowledge,  for  power.  But  the power,
ultimately, is for the change of OUR lives, for the change of our ability
to control what will become of the future. it is SO enticing that we may,
at times,  forget that the methods we  use are  the methods  we have  all 
strived to pull away from:  Commercialism, and Capitalism.  We attempt to
use all means necessary to  amass  power,  power  which  will  ultimately
affect our future for the better.
   
   We do this by squeezing money,  time,  and belongings from the average
citizen, thereby undermining our very goals, for when we have amassed all
the power required,  and are ready to return to normal life,  we  will be
forced to  deal  with  the  same  CyberPunks who  were once  our  allies,
partners,  or even counterparts,  thereby, in the end,  succombing to the
realities of our ways, the same realities as Capatalism: the reality that
there is NO escape.
   
   It does NOT have to be that way,  however!  We have all seen the world
in which we  all work together to  further a common cause,  to accomplish
certain tasks. We all know the power of the underground. we all know that
the power  held by  each  individual,  if  harnessed,  would  produce  an
invaluable machine for change.
   
   We NEED to pull together. CiSSD has created a group whose purpose lies
in the free-flow of  information, and we  consistantly work  towards that
goal.  We all know  what can be,  if we only try.  In Toronto,  Canada in
early may,  the working class held a  march on parliment hill demanding a
reform.  If this was  backed by  the  prowess  of  every  hacker  in  the
underground,  we would have a message that could be heard EVERYWHERE  the
telephone or computer screen reached!
   
                  What we need is ORGANIZED REVOLUTION!

   The Great Dope Man put it best when  he remarked that "Deviency is its
own reward."  Whether or not he realised it at the time,  this phrase had
the potential to  be  the  catalyst  for  the  greatest  revolution  ever
recorded.  Deviency,  the art of going against the norms  of society,  if
proctised by enough people with enough frequency,  WOULD become the norm,
thereby rewarding all who wished it with an altered standard of living.
   
   Now the only way to  ensure that this standard of  living would be for
the  better,  would  be to  have 'organized  deviency'  or  an  ORGANIZED
REVOLUTION.  One in which  the entire underground  drove  for  something,
putting all of our  amassed strength  against those  we hate  in society,
instead of one another. The potential is enormous.  We are not limited by
restrections  on  what  information we  can amass,  nor on  how far  this
information can be destributed.  We are not limited as to what aspects of
this Capatalist  world we live in we can gain control of.  We CAN  make a
difference!  We CAN change  our downward plummet  into extinction.  But a
CAPATALIST world will never be able to make  the changes,  as the changes
would be looked upon as inefficient or irrelevant. 
   

    We have the power in our HANDS! We now need only make use of it.
           For we have the reasons, just look into you paper.
 The time is Upon us, we must act. The WORLD calls for a change. It's our
    responsibility, because WE are the only people who can change it.

    HACKERS, PHREAKERS, CYBERPUNKS OF THE WORLD, UNITE TO BRING ABOUT
                          THE NEW WORLD ORDER!


                                   ---

               EMOTIONAL MATURITY, FOURTEEN YEARS OF AGE!
                               Essence/TX

     Most  of my  articles are  provoked  by a real  life experience that
leads me to think about a topic from a completely  different perspective.
This one is  no different,  but I am quite  shocked and surprised  that I
haven't seen anyone take my perspective before.. and why?.. Maybe because
it's a confusing one.

     I've never been one to base decisions on age. I feel that generally,
age  is  an  unimportant  factor   when  deciding  what  privelidges  are
appropriate for  each individual.  More important than age,  is maturity.
Clearly, when it comes to this, 'The law is an ass'.

     Canadian law bases emotional maturity on  i) age and  ii) chasteness
of  character.  More notably,  the law states that  any female,  fourteen
years  or older,  who  has not  previously been  of chaste character,  is
emotionally  mature  enough  to make the decision  to have sex.  In plain
english,  this means that any girl age fourteen who acts like a whore can
be  taken advantage of.  Any girl  age fourteen who  acts decently is not
mature  enough  to  have sex.  Having sex  with any  girl age  14  to  18
inclusive who has behaved decently and with self respect, is rape.

     Despite  all the complaints  about males having to  worry about rape
charges, whether or not they rape a girl,  I think the laws pertaining to
rape are particularily flacid, and weak. There are clauses that shift the
responsibility of rape onto the victim  females if the  male can show the
female to have 'provoked' the incident. Are we in a day and age where sex
is  so important that  the male partner  can't  even take the  time to be
reasonably  sure  about  the emotional  stability,  and  maturity  of his
partner?

     Any  guy  who  justifies  his  sexual  activities  by  rattling  off
sex-laws,  and how they pertain to his case,  should be  removed from our
society. We don't need the inconsiderate. We don't need the low-lifes.


 - Essence/TX

                                   ---

                               CYBERPUNK!
                              The Dictator

     The following article  was featured in TIME magazine.  I felt it was
an  accurate  portrayal   of  cyberpunks  in   the  computer  underground
community.

 BEGIN _|

   In the 50s it was the beatniks, staging a coffehouse rebellion against
the conformity of  America in the Eisenhower era.  In the 60s the Hippies
arrived,  combining anti-war activism with the energy of Sex,  Drugs, and
Rock'N'Roll.  Now a new  subculture is bubbling  up from the underground,
popping  up  from  computer  screens  around  the world  like a  piece of
hypertext.  
   
   It's  called  CYBERPUNK,  a  late - 20th  centure  term  derived  from
CYBERNETICS,  the  science  of communication  and control,  and PUNK,  an
antisocial rebel or hoodlum. 
   
   Within this odd pairing lurks the essence of CYBERPUNK's international
culture:  a way of looking  at the world  that combines infatuation  with
high-tech tools and disdain for conventional ways of using them.
   
   Origionally applied to a school of hard-boiled science-fiction writers
and then to certain  semi-tough computer hackers,  the word CYBERPUNK now
covers  a broad  range of  music,  art,  psychedelics,  smart  drugs  and
cutting-edge technology,  as well as the computer hacker who  laboriously
tries to put this new  subculture to work.  I have heard CYBERPUNK called
everything from "Technology with an Attitude" (Stewart Brand, Whole Earth
Catalog)  to  "An  unholy  alliance  of  the  technical  world  with  the
underground of  pop culture and  street-level  anarchy"  (Bruce Sterling,
Science-Fiction writer). 
   
   As in any counterculture movement,  some denziens  would deny they are
part of a movement at all.  Although the largest CYBERPUNK journal (PUNK!
Magazine) claims to have a readership  of 70 000,  there are  probably no
more  than  a  few   thousand  computer  hackers,  futurists,  phreakers,
computer-savvy  artists  and  musicians,   and  assorted  science-fiction
'geeks' on the planet who would actually call themselfes CYBERPUNKS.
   
   Nevertheless, this may be the  defining counterculture of the computer
age.   It  embraces,   in  spirit   at  least,   not  just   the  nearest
thirtysomething  hacker hunched  over a terminal,  but  also  nose-ringed
twentysomethings gathered at clandestine RAVES,  teenagers who feel about
the   Amiga  the   way  their   parents  felt  about  records,  and  even
preadolescent  VIDKIDS  fused  to their  SNES and  Genesis games  --  the
training of CYBERPUNK.
   
   Obsessed with technology,  CYBERPUNKS are  future-oriented to a fault.
CYBERPUNKS already have one foot in the 21st century, certain that in the
long run, everyone will be a CYBERPUNK.
   
   The CYBERPUNK look,  a kind of  science-fiction  surrealism tweaked by
computer graphics,  is finding its way into art galleries,  music videos,
and Hollywood  movies.  CYBERPUNK  magazines,  many cheaply  published or
distributed by electronic medium, are multiplying like cable-TV channels.
CYBERPUNK music is hot enough to keep several record companies and scores
of bands cranking out CD's.  CYBERPUNK oriented books  are snatched up as
soon as  they hit  the market.  And  CYBERPUNK  films  like  BLADERUNNER,
ROBOCOP,  VIDEODROME,  TOTAL RECALL,  TERMINATOR 2 and  THE LAWNMOWER MAN
have moved out of the cult market and into the mainstream.
   
   In the US (and therefore Canada), CYBERPUNK culture is likely to get a
boost from of all things, the Clinton Administartion,  due to his intrest
in  the  US's  "Data Highways"  and  what  the  CYBERPUNKS  refer  to  as
CYBERSPACE.  Both  terms  refer  to  the  globe-circling,  interconnected
telephone network  that is the conduit for  billions of voice,  fax,  and
data transmissions. This huge CYBERSPACE, the INTERNET,  stretches across
the atlantic,  touching down in Iceland,  and western Europe,  then on to
Japan, South Korea, Indonesia, Australia and New Zealand. CYBERPUNKS look
at the wires  from the inside;  and talk of  the network as if it were an
actual  place,  a virtual  reality that  can be  entered,  explored,  and
manipulated.
   
   CYBERSPACE  playes  a  major  role in  the CYBERPUNK world  view.  The
literature  is  filled  with  'Console Cowboys' who  prove  themselves by
donning virtual realitry gear and  performing heroic feats in the imagery
'matrix' of CYBERSPACE. "CYBERPUNK",  a 1991 book,  features  profiles of
three canonical CYBERPUNK hackers,  including Robert Morris,  the Cornell
University student whose computer  virus brought the entire INTERNET to a
halt in 1988.
   
   However,  CYBERSPACE is more than a playground.  It's a medium.  Every
night on GEnie, Compuserve, and thousands of smaller BBSes, people by the
hundreds  of  thousands  are  logging  on  to  a great  computer-mediated
talkfest, an interactive debate that allows them to leap over barriers of
time, place nationality, sex, and social status.
   
   Most computer users are content to visit cyberspace now and then,  but
the CYBERPUNK goes there to live, and play, and even DIE. the WELL (Whole
Earth 'lectronic Link), an INTERNET site, was shaken 2 1/2 years ago when
one of  its  most  active participants  ran a  program that  erased every
message  he had ever left - it  involved thousands of posts - an act that
amounted to  virtual suicide.  A few weeks later he committed suicide for
real.
   
   The WELL has been  a magnet for  CYBERPUNK thinkers,  and the question
is,  is there  a CYBERPUNK  movement?  The WELL  launched a  freewheeling
campeign that ran for months and filled more than 300 pages of text.  The
debate  yielded,  among other  things,  a  concise list  of wants  of the
CYBERPUNK movement:

   INFORMATION  WANTS TO  BE FREE.  A  good  piece  of  information  will
eventually get into  the hands of thouse who can make the best use of it,
despite the best efforts  of censors,  copyright lawyers  and the  secret
service.

   ALWAYS YIELD TO THE HANDS-ON IMPERATIVE. CYBERPUNKS maintain that they
can run the world for the better, if they can only get there hands on the
control box.

   PROMOTE  CENTRALIZATION.  Society   is  splintering  into hundreds  of
subcultures and designer cults, which is a no-no.

   'SURF THE EDGES'.  When the world is  changing by the nanosecond,  the
best way to keep your head above the water is to stay at the front end of
the Zeitgeist.


   For CYBERPUNKS,  pondering history  is not  so important as  coming to
terms with the future.  For all the flaws,  they have found  ways to live
with  technology,  to  make it  theirs,  something  the  back-to-the-land
hippies never  accomplished.  CYBERPUNKS use the technology to bridge the
gulf between art  and science,  between  the world of literature  and the
world of industry.  Most of all,  CYBERPUNKS realize  that if  you didn't
control technology, it would eventually control you.  It is a lesson that
will serve CYBERPUNKS  -  and the rest of the world  - well into the next
century.

 |~ END
                                   ---

                          LASERPRINTER FORGERY
                                 Kryten

Most of us remember those pre-historic typewriter things.  If you do then
the  correction key that  some models had  was your best friend,  and can
be your best friend again.  That is the correctable (carbon film) ribbon.
The manual  warned against using  this ribbon for typing  legal documents
because undetectable alterations would be too easy.

Recently I heard a taped interview with Frank Abagnale, a reformed forger
who  now  advises  companies on  fraud  prevention.  It  was a  quite  an
interesting cassette.  This is where I tie in my first paragraph.

Abagnale said that output from most laserprinters and photocopiers can be
removed in  a  similar  manner with  correction  tape  because the  toner
powder,  like carbon film ribbon,  only sits on  the surface of the paper
but does not impregnate the fibers.  I tried it and he's right.

                                   ---

                CALLER ID INFORMATION AND SPECIFICATIONS
                                 Lister

     I know this  information may be  regarded as old hat, and that  it's
not  very   sensitive  in  nature;  but  it  makes  an  interesting  read
nonetheless.  Hopefully, it  will shed a bit of  insight as to  the inner
workings of Caller ID.


                              INTRODUCTION

     Calling Number Delivery (CND), better known as Caller ID, is a
      telephone service intended for residential and small business
      customers.  It allows the called Customer Premises Equipment
    (CPE) to receive a calling party's directory number and the date
    and time of the call during the first 4 second silent interval in
     the ringing cycle.  The customer must contact a Bellcore Client
                    Company to initiate CND service.

     According to Pacific Bell representatives, the following states
     and district currently support CND service:  Delaware, District
    of Columbia, Florida, Georgia, Idaho, Kentucky, Louisiana, Maine,
      Maryland, Nebraska, Nevada, New Jersey, Oklahoma, Tennessee,
                  Vermont, Virginia, and West Virginia.

      The following states are scheduled to support CND service by
     April, 1992:  Alaska, Arizona, California, Colorado, Illinois,
      Indiana, Iowa, Massachusetts, Mississippi, New Hampshire, New
     York, North Carolina, North Dakota, Ohio, Oregon, Rhode Island,
                           and South Carolina.

                               PARAMETERS

     The data signalling interface has the following characteristics:

     Link Type                     2-wire, simplex
     Transmission Scheme           Analog, phase-coherent FSK
     Logical 1 (mark)              1200 +/- 12 Hz
     Logical 0 (space)             2200 +/- 22 Hz
     Transmission Rate             1200 bps
     Transmission Level            13.5 +/- dBm into 900 ohm load

                                PROTOCOL

      The protocol uses 8-bit data words (bytes), each bounded by a
     start bit and a stop bit.  The CND message uses the Single Data
                       Message format shown below.

     Channel   Carrier   Message   Message   Data      Checksum
     Seizure   Signal    Type      Length    Word(s)   Word
     Signal              Word      Word

                         CHANNEL SEIZURE SIGNAL

      The channel seizure is 30 continuous bytes of 55h (01010101)
    providing a detectable alternating function to the CPE (i.e. the
                            modem data pump).

                             CARRIER SIGNAL

    The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to
                    condition the receiver for data.

                            MESSAGE TYPE WORD

       The message type word indicates the service and capability
    associated with the data message.  The message type word for CND
                           is 04h (00000100).

                           MESSAGE LENGTH WORD

    The message length word specifies the total number of data words
                               to follow.

                               DATA WORDS

     The data words are encoded in ASCII and represent the following
                              information:

     o  The first two words represent the month
     o  The next two words represent the day of the month
     o  The next two words represent the hour in local military time
     o  The next two words represent the minute after the hour
     o  The calling party's directory number is represented by the
        remaining  words in the data word field

     If the calling party's directory number is not available to the
    terminating central office, the data word field contains an ASCII
     "O".  If the calling party invokes the privacy capability, the
                 data word field contains an ASCII "P".

                              CHECKSUM WORD

    The Checksum Word contains the twos complement of the modulo 256
     sum of the other words in the data message (i.e., message type,
      message length, and data words).  The receiving equipment may
     calculate the modulo 256 sum of the received words and add this
     sum to the reveived checksum word.  A result of zero generally
       indicates that the message was correctly received.  Message
                    retransmission is not supported.

                     EXAMPLE CND SINGLE DATA MESSAGE

    An example of a received CND message, beginning with the message
                           type word, follows:

     04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51

     04h=      Calling  number  delivery  information code  (message type
               word)

     12h=      18 decimal; Number of data words (date,time, and directory
               number words)

     ASCII 30,39= 09;
          September

     ASCII 33,30= 30;
          30th day

     ASCII 31,32= 12;
          12:00 PM

     ASCII 32,34= 24;
          24 minutes (i.e., 12:24 PM)

     ASCII 36,30,39,35,35,35,31,32,31,32= 6095551212;
          calling party's directory number (609) 555-1212

     51h= Checksum Word

               DATA ACCESS ARRANGEMENT (DAA) REQUIREMENTS

      To receive CND information, the modem monitors the phone line
    between the first and second ring bursts without causing the DAA
    to go off hook in the conventional sense, which would inhibit the
       transmission of CND by the local central office.  A simple
     modification to an existing DAA circuit easily accomplishes the
                                  task.

                           MODEM REQUIREMENTS

    Although the data signalling interface parameters match those of
       a Bell 202 modem, the receiving CPE need not be a Bell 202
    modem.  A V.23 1200 bps modem receiver may be used to demodulate
    the Bell 202 signal.  The ring indicate bit (RI) may be used on a
        modem to indicate when to monitor the phone line for CND
     information.  After the RI bit sets, indicating the first ring
      burst, the host waits for the RI bit to reset.  The host then
         configures the modem to monitor the phone line for CND
                              information.

     According to Bellcore specifications, CND signalling starts as
    early as 300 mS after the first ring burst and ends at least 475
                     mS before the second ring burst

                              APPLICATIONS

    Modem manufacturers will soon be implementing new modem features
         based on CND information as this service becomes widely
                               available.

        Once CND information is received the user may process the
                    information in a number of ways.

     1.   The date, time, and calling party's directory number can be
          displayed.

     2.   Using a look-up table, the calling party's directory number
          can be correlated with his or her name and the name
          displayed.

     3.   CND information can also be used in additional ways such as
          for:

               a.  Bulletin board applications
               b.  Black-listing applications
               c.  Keeping logs of system user calls, or
               d.  Implementing a telemarketing data base

                               REFERENCES

     For more information on Calling Number Delivery (CND), refer to
         Bellcore publications TR-TSY-000030 and TR-TSY-000031.


                                   ---


                       THE DIATRIBES OF GRAPPLING
                              The Grappler

         "My non-existence never bothered me before I was born."

     Grappler Speaks:

     From the electronic wilderness,  As I look  down upon the scene with
dismay a question formulates within the depths of my conscious reasoning:
What the hell is going on?   All I see is the senseless  leeching of text
files,  etc.  So you've got all this info on pbx,  freemasonry,  virus's,
etc.   but what good is it if  it only ends up on some disk,  never to be
read again?   What are we really  trying to  accomplish here?   I mean so
what if you can call long distance for  free via some pbx if you only use
that pbx to call your friends, etc.   Do you think that BELL really cares
if you hack  someone's calling card?   They only benifet from the average
phreaks  activities  and you are just playing  into their game,  and they
only tend  to prosecute when activities  get out of hand and the customer
catches on that  some 15 yr. old  computer devotee just  charged $1000 on
his/her calling card.

     What is the gain in  this situation?  The only winning party is Bell
and no one  besides!  This brings me to my point,  everything you do must
be oriented towards a specific goal by  which you as a person will profit
by.  Now when I say profit,  I am not just referring to the materialistic
sense of the word,  I am also  talking about the  spiritual and emotional
aspects of this as well.

One of the #1 rules of Grappling is:

              "Strive for the Infinite in all that you do."


     It is upon this law that all of  grappling hangs so therefore we can
say that it is a solid foundation upon which to build from. Now what this
means is  that in  order to  get anywhere  in this lifetime,  one must be
prepared  to  always  sacrifice  the  lower  for  the  higher.  One  must
carefully weigh every  move and make sure that  any actions will not be a
regression to any  previous plane of existence.  A classic  demonstration
of this principle is as follows:  (Fantasy)

     You sign a pact with the devil which states that he will provide you
with 1 million dollars in exchange for your soul.  You being an average
person consent, you end up spending all of the money within a years time
and going broke.  With this abrupt end to your material wealth comes the
sudden realization that you have nothing left to sell.

     So as you can see,  as illustrated above  one must always ascend the
planes and never ever move down as you may end up stuck there!

     Now I realize that the illustration above is not a very good example
of how one may apply this theory to  everyday living but I think that you
get the gist of it.  (I hope)

     I believe that our time on earth is far too limited and we must take
advantage of every single second that we are alive. Conformity is for the
weak  and  those  who  fall  into  society 's  trap are  as lambs  to the
slaughter.  By this I am not saying that one must deliberatley go out and
break the law but what I  am saying is that if you  always play according
to  societies rules then you  are just wasting time.  Let's  look  at the
average persons life:

            birth -> school -> marriage/kids -> job -> death.

     Now  this  is not necessarily  in the stated order  and there may be
some deviancy from this projection but not by any significant margin.  So
as  you can see  nothing that the  average  person does is really  of any
importance other than the obvious procreation bit.  Now you may object to
this statement and if you do  then I welcome a debate but if  you look at
this from an unbiased viewpoint and  step out of the confines of everyday
thinking you will come to realize that the only thing that really matters
in the end is death.  This is a  rather morbid statement but if you think
about it:  Death is a fact of life  and therefore something which must be
confronted everyday,  death makes everything that we do irrelevant and in
the end the average joe's life has amounted to a 15 minute eulogy that no
one really cares  about anyway.  So you may  be right now  sitting before
your computer screen with a look of "what the fuck is going on here, this
guy is baked!".  How does this pertain to you  or fit into the context of
this  article?   Well I'll  tell you:  What  I am trying to  do with this
article  is  to  make you  analyze  things very  acutely,  I want  you to
scrutinize  every action you take  from this  point forward,  and realize
that any action that  you do take should be  in conformance with your own
will.  If you commit an  action against your own  personal will then  you
are stepping back into the chaos that is society and well on  your way to
becoming a slave.

                  "Your all a bunch of FUCKING SLAVES!"
                              *Jim Morrison

     So applying  this to computers and  the point of this article,  it's
all  fine and dandy to download thousands  of text files on  HPACV but is
this all that  the scene is about?  Are we  merely content with  this?  I
for  one  am  not  and  actively  utilize  my  HPACV knowledge  to attain
information  that the average  person is not even  aware exists.  Why let
those in  control  reap  the rewards  of the  slavedog morality  which is
society when you can have a  piece of the  pie to?  Computers practically
run the  world or  at least  play a sizeable role  in wordly  affairs and
therefore  it  would be  safe to  assume  that  if you  own one  then you
probably  have access to the  same.  Organization is the key and  that is
why I have recently applied to  CiSSD in the  hopes that  membership will
raise  me up  to bigger  and  better  things as  opposed to  just being a
spectator as most are.

     Now, I have  noticed that there  is alot  of interest  in conspiracy
among  the  members  of the  local boards,  well so  what  if there  is a
conspiracy because what can we really do about it if there is?  Awareness
is only 1/8 of the  big picture,  what I am saying is that why not create
your own conspiracies?


     "I don't know about you but I'm gonna have my kicks before the
                 whole shithouse goes up in flames man!"
                              *Jim Morrison


     I feel that I have rambled on incoherently long enough,  I know this
article  has  jumped around alot  but that is  merely a reflection  of my
frustrated  state of  mind.  I feel very  strongly about all that  I have
said and will accept with open arms any criticisms,  flak,  etc for these
views.  I have chosen to embrace  this life with unbending  determination
to achieve something of significance, have you?  This ends the diatribe.

                                   ---

                 PRIVACY, LINE TAPS AND THE US GOVERNMENT
                                  Lister

Here guys (and gals), this  is a nice  little article by Dorothy Denning,
and it may be of interest  to you.  Quite a frightening prospect if you'd
ask me...

BEGIN __|

 Subject: THE CLIPPER CHIP: A TECHNICAL SUMMARY
 Date: 19 Apr 93 18:23:27 -0400
 Organization: Georgetown University


     The  following document summarizes the Clipper Chip, how it is used,
how  programming of  the  chip  is  coupled  to key  generation  and  the
escrow process, and how law enforcement decrypts communications.

     Since there has been some  speculation on  this news group  about my
own involvement  in this project,  I'd like to add that  I was not in any
way involved.  I found out about  it when the FBI briefed  me on Thursday
evening,  April 15.  Since then I have  spent  considerable time  talking
with the  NSA and FBI to learn  more about this,  and I attended the NIST
briefing  at  the  Department  of  Commerce  on  April 16.  The  document
below is the result of that effort.


     Dorothy Denning

 
                  THE CLIPPER CHIP: A TECHNICAL SUMMARY
                             Dorothy Denning
                             April 19, 1993


INTRODUCTION

On April 16,  the  President announced  a new initiative  that will bring
together the Federal  Government and industry in  a voluntary program  to
provide  secure  communications  while  meeting  the  legitimate needs of
law  enforcement.  At  the  heart of  the  plan  is  a  new  tamper-proof
encryption  chip  called the  "Clipper Chip"  together with  a  split-key
approach to escrowing keys.  Two escrow  agencies are used,  and the  key
parts from both are needed to reconstruct a key.

CHIP STRUCTURE

The  Clipper  Chip   contains  a  classified   64-bit   block  encryption
algorithm called  "Skipjack."  The algorithm uses  80 bit keys  (compared
with 56 for the DES) and has  32 rounds of  scrambling (compared  with 16
for the  DES).  It  supports all  4 DES  modes of  operation.  Throughput
is 16 Mbits a second.

Each chip includes the following components:

   the Skipjack encryption algorithm
   F, an 80-bit family key that is common to all chips
   N, a 30-bit serial number
   U, an 80-bit secret key  that unlocks all messages  encrypted with the
      chip.

ENCRYPTING WITH THE CHIP

To see how the  chip is  used, imagine  that it  is embedded in  the AT&T
telephone  security device  (as it will be).  Suppose  I call someone and
we both  have such a  device.  After pushing a  button to start  a secure
conversation,  my  security device will  negotiate a  session key  K with
the device  at the  other end  (in  general, any  method of  key exchange
can be used).  The key  K and  message stream M  (i.e.,  digitized voice)
are then fed into the Clipper Chip to produce two values:

   E[M; K], the encrypted message stream, and 
   E[E[K; U] + N; F], a law enforcement block.  

The  law enforcement  block  thus contains  the session  key K  encrypted
under  the  unit  key  U  concatenated  with  the  serial number  N,  all
encrypted under the family key F.

CHIP PROGRAMMING AND ESCROW

All  Clipper  Chips  are   programmed  inside  a  SCIF  (secure  computer
information  facility),  which   is   essentially  a   vault.   The  SCIF
contains a  laptop computer  and equipment to  program the  chips.  About
300 chips are programmed during a single  session.  The  SCIF is  located
at Mikotronx.

At the  beginning of a  session,  a trusted  agent from  each  of the two
key escrow agencies enters  the vault.  Agent  1 enters an  80-bit  value
S1 into the laptop and agent 2 enters  an 80-bit value S2.  These  values
serve as seeds to generate keys for a sequence of serial numbers.

To generate the  unit key for a serial  number N,  the 30-bit  value N is
first padded with a fixed 34-bit  block to  produce a  64-bit  block  N1.
S1  and S2  are  then used  as keys  to  triple-encrypt  N1,  producing a
64-bit block R1:

        R1 = E[D[E[N1; S1]; S2]; S1] .

Similarly, N is padded with two other  34-bit  blocks to  produce N2  and
N3, and two additional 64-bit blocks R2 and R3 are computed:

        R2 = E[D[E[N2; S1]; S2]; S1] 
        R3 = E[D[E[N3; S1]; S2]; S1] .

R1, R2,  and R3  are then  concatenated together,  giving 192  bits.  The
first  80 bits  are assigned  to U1 and  the second  80 bits to  U2.  The
rest are discarded.  The  unit key U is  the XOR  of U1  and U2.  U1  and
U2 are the key parts  that are  separately escrowed  with the  two escrow
agencies.

As a  sequence of  values for  U1,  U2,  and  U are  generated,  they are
written  onto three  separate floppy  disks.  The  first disk  contains a
file for  each serial  number that  contains  the corresponding  key part
U1.  The second disk  is similar but  contains the U2  values.  The third
disk contains  the unit  keys U.  Agent  1 takes the first disk and agent
2 takes the second disk.  The third disk is  used to  program the  chips.
After the  chips are programmed,  all information  is discarded  from the
vault   and  the   agents  leave.   The  laptop   may  be  destroyed  for
additional assurance that no information is left behind.
 
The protocol  may be  changed  slightly so that  four people  are in  the
room instead of  two.  The first two would  provide the seeds  S1 and S2,
and the second  two (the  escrow agents)  would  take the  disks back  to
the escrow agencies.

The escrow  agencies have as yet to  be determined, but they will  not be
the NSA, CIA,  FBI,  or any  other law enforcement  agency.  One or  both
may be independent from the government.

LAW ENFORCEMENT USE

When  law  enforcement  has  been  authorized to tap  an encrypted  line,
they will first  take the  warrant to  the service  provider in  order to
get access to  the communications  line.  Let  us assume that  the tap is
in place and that  they have determined that  the line is encrypted  with
Clipper.  They  will  first decrypt  the law  enforcement block  with the
family  key  F.  This  gives them  E[K; U] + N.   They will  then  take a
warrant  identifying the chip serial  number N to each of the  key escrow
agents  and  get  back  U1  and  U2.   U1  and  U2 are  XORed together to
produce the unit key U,  and  E[K; U]  is decrypted  to get  the  session
key  K.  Finally  the  message  stream  is  decrypted.  All this  will be
accomplished through a special black box decoder operated by the FBI.

ACKNOWLEDGMENT  AND DISTRIBUTION  NOTICE.  All  information  is based  on
information  provided   by  NSA,  NIST,  and   the  FBI.   Permission  to
distribute this document is granted.


 |~~ END


BEGIN |__

                             THE WHITE HOUSE
                      Office of the Press Secretary

     For Immediate Release                           April 16, 1993

                    STATEMENT BY THE PRESS SECRETARY

The President today announced a new initiative that will bring the
Federal Government together with industry in a voluntary program to
improve the security and privacy of telephone communications while
meeting the legitimate needs of law enforcement.

The initiative will involve the creation of new products to accelerate
the development and use of advanced and secure telecommunications
networks and wireless communications links.

For too long there has been little or no dialogue between our private
sector and the law enforcement community to resolve the tension
between economic vitality and the real challenges of protecting
Americans.  Rather than use technology to accommodate the sometimes
competing interests of economic growth, privacy and law enforcement,
previous policies have pitted government against industry and the
rights of privacy against law enforcement.

Sophisticated encryption technology has been used for years to protect
electronic funds transfer.  It is now being used to protect electronic
mail and computer files.  While encryption technology can help
Americans protect business secrets and the unauthorized release of
personal information, it also can be used by terrorists, drug dealers,
and other criminals.

A state-of-the-art microcircuit called the "Clipper Chip" has been
developed by government engineers.  The chip represents a new approach
to encryption technology.  It can be used in new, relatively
inexpensive encryption devices that can be attached to an ordinary
telephone.  It scrambles telephone communications using an encryption
algorithm that is more powerful than many in commercial use today.

This new technology will help companies protect proprietary
information, protect the privacy of personal phone conversations and
prevent unauthorized release of data transmitted electronically.  At
the same time this technology preserves the ability of federal, state
and local law enforcement agencies to intercept lawfully the phone
conversations of criminals.

A "key-escrow" system will be established to ensure that the "Clipper
Chip" is used to protect the privacy of law-abiding Americans.  Each
device containing the chip will have two unique "keys," numbers that
will be needed by authorized government agencies to decode messages
encoded by the device.  When the device is manufactured, the two keys
will be deposited separately in two "key-escrow" data bases that will
be established by the Attorney General.  Access to these keys will be
limited to government officials with legal authorization to conduct a
wiretap.

The "Clipper Chip" technology provides law enforcement with no new
authorities to access the content of the private conversations of
Americans.

To demonstrate the effectiveness of this new technology, the Attorney
General will soon purchase several thousand of the new devices.  In
addition, respected experts from outside the government will be
offered access to the confidential details of the algorithm to assess
its capabilities and publicly report their findings.

The chip is an important step in addressing the problem of
encryption's dual-edge sword: encryption helps to protect the privacy
of individuals and industry, but it also can shield criminals and
terrorists.  We need the "Clipper Chip" and other approaches that can
both provide law-abiding citizens with access to the encryption they
need and prevent criminals from using it to hide their illegal
activities.  In order to assess technology trends and explore new
approaches (like the key-escrow system), the President has directed
government agencies to develop a comprehensive policy on encryption
that accommodates:

     --   the privacy of our citizens, including the need to
          employ voice or data encryption for business purposes;

     --   the ability of authorized officials to access telephone
          calls and data, under proper court or other legal
          order, when necessary to protect our citizens;

     --   the effective and timely use of the most modern
          technology to build the National Information
          Infrastructure needed to promote economic growth and
          the competitiveness of American industry in the global
          marketplace; and 

     --   the need of U.S. companies to manufacture and export
          high technology products.

The President has directed early and frequent consultations with
affected industries, the Congress and groups that advocate the privacy
rights of individuals as policy options are developed.

The Administration is committed to working with the private sector to
spur the development of a National Information Infrastructure which
will use new telecommunications and computer technologies to give
Americans unprecedented access to information.  This infrastructure of
high-speed networks ("information superhighways") will transmit video,
images, HDTV programming, and huge data files as easily as today's
telephone system transmits voice.

Since encryption technology will play an increasingly important role
in that infrastructure, the Federal Government must act quickly to
develop consistent, comprehensive policies regarding its use.  The
Administration is committed to policies that protect all Americans'
right to privacy while also protecting them from those who break the
law.

Further information is provided in an accompanying fact sheet.  The
provisions of the President's directive to acquire the new encryption
technology are also available.

For additional details, call Mat Heyman, National Institute of
Standards and Technology, (301) 975-2758.

                ---------------------------------

QUESTIONS AND ANSWERS ABOUT THE CLINTON ADMINISTRATION'S
TELECOMMUNICATIONS INITIATIVE

Q:   Does this approach expand the authority of government
     agencies to listen in on phone conversations?

A:   No.  "Clipper Chip" technology provides law enforcement with
     no new authorities to access the content of the private
     conversations of Americans.

Q:   Suppose a law enforcement agency is conducting a wiretap on
     a drug smuggling ring and intercepts a conversation
     encrypted using the device.  What would they have to do to
     decipher the message?

A:   They would have to obtain legal authorization, normally a
     court order, to do the wiretap in the first place.  They
     would then present documentation of this authorization to
     the two entities responsible for safeguarding the keys and
     obtain the keys for the device being used by the drug
     smugglers.  The key is split into two parts, which are
     stored separately in order to ensure the security of the key
     escrow system.

Q:   Who will run the key-escrow data banks?

A:   The two key-escrow data banks will be run by two independent
     entities.  At this point, the Department of Justice and the
     Administration have yet to determine which agencies will
     oversee the key-escrow data banks.

Q:   How strong is the security in the device?  How can I be sure
     how strong the security is?  

A:   This system is more secure than many other voice encryption
     systems readily available today.  While the algorithm will
     remain classified to protect the security of the key escrow
     system, we are willing to invite an independent panel of
     cryptography experts to evaluate the algorithm to assure all
     potential users that there are no unrecognized
     vulnerabilities.

Q:   Whose decision was it to propose this product?

A:   The National Security Council, the Justice Department, the
     Commerce Department, and other key agencies were involved in
     this decision.  This approach has been endorsed by the
     President, the Vice President, and appropriate Cabinet
     officials.

Q:   Who was consulted?  The Congress?  Industry?

A:   We have on-going discussions with Congress and industry on
     encryption issues, and expect those discussions to intensify
     as we carry out our review of encryption policy.  We have
     briefed members of Congress and industry leaders on the
     decisions related to this initiative.

Q:   Will the government provide the hardware to manufacturers?

A:   The government designed and developed the key access
     encryption microcircuits, but it is not providing the
     microcircuits to product manufacturers.  Product
     manufacturers can acquire the microcircuits from the chip
     manufacturer that produces them.

Q:   Who provides the "Clipper Chip"?

A:   Mykotronx programs it at their facility in Torrance,
     California, and will sell the chip to encryption device
     manufacturers.  The programming function could be licensed
     to other vendors in the future.

Q:   How do I buy one of these encryption devices? 

A:   We expect several manufacturers to consider incorporating
     the "Clipper Chip" into their devices.
     
Q:   If the Administration were unable to find a technological
     solution like the one proposed, would the Administration be
     willing to use legal remedies to restrict access to more
     powerful encryption devices?

A:   This is a fundamental policy question which will be
     considered during the broad policy review.  The key escrow
     mechanism will provide Americans with an encryption product
     that is more secure, more convenient, and less expensive
     than others readily available today, but it is just one
     piece of what must be the comprehensive approach to
     encryption technology, which the Administration is
     developing.

     The Administration is not saying, "since encryption
     threatens the public safety and effective law enforcement,
     we will prohibit it outright" (as some countries have
     effectively done); nor is the U.S. saying that "every
     American, as a matter of right, is entitled to an
     unbreakable commercial encryption product."  There is a
     false "tension" created in the assessment that this issue is
     an "either-or" proposition.  Rather, both concerns can be,
     and in fact are, harmoniously balanced through a reasoned,
     balanced approach such as is proposed with the "Clipper
     Chip" and similar encryption techniques.

Q:   What does this decision indicate about how the Clinton
     Administration's policy toward encryption will differ from
     that of the Bush Administration?  

A:   It indicates that we understand the importance of encryption
     technology in telecommunications and computing and are
     committed to working with industry and public-interest
     groups to find innovative ways to protect Americans'
     privacy, help businesses to compete, and ensure that law
     enforcement agencies have the tools they need to fight crime
     and terrorism.

Q:   Will the devices be exportable?  Will other devices that use
     the government hardware?

A:   Voice encryption devices are subject to export control
     requirements.  Case-by-case review for each export is
     required to ensure appropriate use of these devices.  The
     same is true for other encryption devices.  One of the
     attractions of this technology is the protection it can give
     to U.S. companies operating at home and abroad.  With this
     in mind, we expect export licenses will be granted on a
     case-by-case basis for U.S. companies seeking to use these
     devices to secure their own communications abroad.  We plan
     to review the possibility of permitting wider exportability
     of these products.


 |~~ END

                                   ---

                  HINTERLAND WHO'S WHO - 800 EXCHANGES
                                 Lister

                        Exchanges - 800 Service

      0      1      2      3      4      5      6      7      8      9
  +------+------+------+------+------+------+------+------+------+------+
20| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
21| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
22| ---- | AT&T | AT&T | AT&T | LDL  | AT&T | MIC  | AT&T | AT&T | C&W  |
23| NTK  | AT&T | AT&T | AT&T | MCI  | AT&T | SCH  | AT&T | AT&T |Delta |
24| SIR  | AT&T | AT&T | AT&T | ---- | AT&T | ---- | AT&T | AT&T | ---- |
25| ---- | AT&T | AT&T | AT&T | TTU  | AT&T | LSI  | AT&T | AT&T | ---- |
26| ---- | SCH  | AT&T |CanCO | ICT  |CanSWO| COM  |CanEO |CanTor| FDG  |
27| ---- | ---- | AT&T | ---- | MCI  | ITT  | ONE  | SNT  | ---- | MAL  |
28| ADG  | ---- | AT&T | MCI  | MCI  | ---- | ---- | ---- | MCI  | MCI  |
29| ---- | ---- | AT&T | PRO  | ---- | ---- | ---- | ARE  | ---- | CDC  |
30| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
31| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
32| ---- | AT&T | AT&T | AT&T | HNI  | AT&T |Sprint| AT&T | AT&T | TET  |
33| TET  | AT&T | AT&T | MCI  | AT&T | SCH  | AT&T | FST  | AT&T | ---- |
34| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T |Sprint| AT&T | DCT  |
35| COM  | AT&T | AT&T | ---- | AT&T | ---- | AT&T | ---- | AT&T |Sprint|
36| ---- |CanMtl| AT&T |CanMtl| HNI  | MCI  |Sprint| AT&T | AT&T |Teleco|
37|Teleco| ---- | AT&T |Teleco| ---- |ATCCig| ---- |Telnet| ---- | ---- |
38| ---- | ---- | AT&T |Teleco| FDT  |Hedges| TBQ  |CanTor| MCI  | ---- |
39| ---- | ---- | AT&T | EXF  | ---- | MCI  | ---- |Teleco| ---- |Americ|
40| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
41| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
42| ---- | AT&T | AT&T | AT&T | AT&T | TTH  | AT&T | ---- | AT&T | ---- |
43| ---- | AT&T | AT&T | AT&T | AGN  | AT&T | IDN  | AT&T | AT&T | ---- |
44| TXN  | AT&T | AT&T | AT&T | MCI  | AT&T | AT&T | AT&T | AT&T | ---- |
45| USL  | AT&T | AT&T | AT&T | ALN  | ---- | MCI  | AT&T | AT&T | ---- |
46| ---- |CanNCO| AT&T |CanEQu| ---- |CanNWO| ALN  | ICT  | AT&T | ---- |
47| ---- | ALN  | AT&T |Sprint| ---- |Teleco|Teleco| MCI  |Alascm| ---- |
48| ---- | ---- | AT&T | ---- |Teleco|Teleco| C&W  |Sprint|Sprint| TOM  |
49| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- |
50| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
51| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
52| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T | AT&T |Midco |
53| ---- | AT&T | AT&T | AT&T | ---- | AT&T | ALN  | AT&T | AT&T | ---- |
54| ---- | AT&T | AT&T | AT&T | AT&T | AT&T |Sprint| AT&T | AT&T | ---- |
55| CMA  | AT&T | AT&T | AT&T | AT&T |[Diry]| AT&T | ALN  | AT&T | ---- |
56| ---- |CanNB | AT&T |CanNfl| ---- |CanNSP| ALN  |CanWQu| ---- | ---- |
57| ---- | ---- | AT&T | ---- | AMM  | ---- | ---- |Telnet| ---- | LNS  |
58| WES  | ---- | AT&T |Teleco|Teleco| ---- |Action| LTQ  |Action| LGT  |
59| ---- | ---- | AT&T |Teleco|Teleco| ---- | ---- | ---- | ---- | ---- |
60| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
61| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
62| ---- | AT&T | AT&T | ---- | AT&T | NLD  | AT&T | MCI  | AT&T | ---- |
63| ---- | AT&T | AT&T | AT&T | AT&T | AT&T | CQU  | AT&T | AT&T | BUR  |
64| ---- | AT&T | AT&T | AT&T | CMA  | AT&T | ---- | AT&T | AT&T | ---- |
65| ---- | ---- | AT&T | ---- | AT&T | ---- | ---- |Teleco|Teleco| ---- |
66| ---- |CanAlb| AT&T |CanBC |Sprint|CanMan| MCI  |CanSsk|CanTor|Sprint|
67| ---- | ---- | AT&T |Teleco|Teleco| ---- |Sprint| MCI  | MCI  | ---- |
68| ---- | ---- | AT&T | MTD  | ---- | ---- | LGT  | NTS  | MCI  | ---- |
69| ---- | ---- | AT&T | ---- | ---- | MCI  | ---- | ---- | NYC  | PLG  |
70| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
71| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
72| TGN  | ---- | AT&T | ---- | RCI  | SAN  |Sprint| MCI  |Teleco|Sprint|
73| ---- | ---- | AT&T |Sprint| ---- |Sprint|Sprint| MEC  | MEC  | ---- |
74| ---- | MIC  | AT&T | EDS  | ---- |Sprint| ---- |Teleco|Teleco|Teleco|
75| ---- | ---- | AT&T | MCI  | TSH  | SPR  | ---- | TID  | ---- | MCI  |
76| ---- | ---- | AT&T | ---- |Alascm| MCI  | MCI  |Sprint| SNT  | ---- |
77| GCN  | SNT  | AT&T | CTI  | ---- | ---- |Sprint| MCI  |Sprint|Teleco|
78|Teleco| ---- | AT&T | ALN  |Allnet| SNH  |(Futu)| ---- | ---- | TMU  |
79| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | TID  |Teleco| ---- |
80|Sprint| ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
81| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
82| ---- | AT&T | AT&T | THA  | AT&T | MCI  | AT&T |Sprint| AT&T |Sprint|
83| ---- | AT&T | AT&T | AT&T | ---- | AT&T |Teleco|Teleco| ---- | Star |
84| ---- | AT&T | AT&T | AT&T | LDD  | AT&T | ---- | AT&T | AT&T | ---- |
85| TKC  | AT&T | AT&T | ---- | AT&T | AT&T | ---- | TLS  | AT&T | ---- |
86| ---- | ---- | AT&T | ALN  | TEN  | ---- | MCI  | ---- | SNT  |Sprint|
87| ---- | ---- | AT&T | MCI  | AT&T | ALN  | MCI  |Sprint| ALN  | MCI  |
88| NAS  | NAS  | AT&T | ---- |Sprint| AT&T | ALN  | ETS  | MCI  | ---- |
89| ---- | ---- | AT&T | ---- | ---- | ---- | TXN  | ---- | CGI  | C&W  |
90| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
91| ---- | ---- |(Pagr)| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
92| ---- | ---- | AT&T | ALN  | ---- | ---- | MCI  |Sprint| CIS  | ---- |
93| ---- | ---- | AT&T | MCI  | ---- | ---- |R-Comm| MCI  | ---- | ---- |
94| TSF  | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- |
95| MCI  |PhAmer| AT&T | ---- | ---- | MCI  | ---- | ---- |[T-??]|[T-??]|
96| CNO  | ---- | AT&T | SOC  | ---- | ---- | C&W  | ---- | TED  | C&W  |
97| ---- | ---- | AT&T | ---- | ---- | ---- | ---- | ---- | ---- | ---- |
98| ---- | ---- | AT&T | WUT  | ---- | ---- | WUT  | ---- | WUT  | C&W  |
99| ---- | ---- | AT&T | ---- | ---- | ---- | Valu | ---- | ---- | MCI  |
  +------+------+------+------+------+------+------+------+------+------+
      0      1      2      3      4      5      6      7      8      9

                   Exchanges - 800 Service - Appendix

          Abbreviations of carriers/regions used in the table:

                    Action - Action Telecom Co.
                    ADG    - Advantage Network, Inc.
                    AGN    - AMRIGON
                    Alascm - ALASCOM
                    Allnet - Allnet Communication Services
                    Americ - AmeriCall Corporation (Calif.)
                    AMM    - Access Long Distance
                    ARE    - American Express TRS
                    AT&T   - AT&T
                    ATCCig - ATC Cignal Communications
                    BUR    - Burlington Tel.
                    C&W    - Cable & Wireless Comm.
                    CanAlb - Telecom Canada/Alberta (403)
                    CanBC  - Telecom Canada/British Columbia (604)
                    CanCO  - Telecom Canada/Central Ontario (416)
                    CanEO  - Telecom Canada/Eastern Ontario (613)
                    CanEQu - Telecom Canada/Eastern Quebec (418)
                    CanMan - Telecom Canada/Manitoba (204)
                    CanMtl - Telecom Canada/Montreal Area (514)
                    CanNB  - Telecom Canada/New Brunswick (506)
                    CanNfl - Telecom Canada/Newfoundland (709)
                    CanNCO - Telecom Canada/North Central Ontario (705)
                    CanNSP - Telecom Canada/Nova Scotia, PEI (902)
                    CanNWO - Telecom Canada/NW Ontario (807)
                    CanSsk - Telecom Canada/Saskatchewan (306)
                    CanSWO - Telecom Canada/SW Ontario (519)
                    CanTor - Telecom Canada/Toronto Area (416)
                    CanWQu - Telecom Canada/Western Quebec (819)
                    CDC    - ClayDesta Communications
                    CNO    - COMTEL of New Orleans
                    COM    - COM Systems
                    CQU    - ConQuest Comm. Corp
                    CTI    - Compu-Tel Inc.
                    DCT    - Direct Communications, Inc.
                    Delta  - Delta Communications, Inc.
                    EDS    - Electronic Data Systems Corp.
                    ETS    - Eastern Telephone Systems, Inc.
                    EXF    - Execulines of Florida, Inc.
                    FDG    - First Digital Network
                    FDN    - Florida Digital Network
                    FDT    - Friend Technologies
                    FST    - First Data Resources
                    GCN    - General Communications, Inc.
                    Hedges - Hedges Communications
                    HNI    - Houston Network, Inc.
                    ITT    - United States Transmission System
                    LDD    - LDDS-II, Inc.
                    LDL    - Long Distance for Less
                    LGT    - LITEL
                    LNS    - Lintel Systems
                    LSI    - Long Distance Savers
                    LTQ    - Long Distance for Less
                    MAL    - MIDAMERICAN
                    MCI    - MCI Telecommunications Corp.
                    MDE    - Meade Associates
                    MEC    - Mercury, Inc.
                    MIC    - Microtel, Inc.
                    Midco  - Midco Communications
                    MTD    - Metromedia Long Distance
                    NLD    - National Data Corp.
                    NTK    - Network Telemanagement Svcs.
                    NTS    - NTS Communications
                    ONC    - OMNICALL, Inc.
                    ONE    - One Call Communications, Inc.
                    PhAmer - Phone America
                    PHE    - Phone Mail, Inc.
                    PLG    - Pilgrim Telephone Co.
                    PRO    - PROTO-COL
                    R-Comm - R-Comm
                    RCI    - RCI Corporation
                    SAN    - Satelco
                    SCH    - Schneider Communications
                    SIR    - Southern Interexchange Services
                    SLS    - Southland Systems, Inc.
                    SNH    - Sunshine Telephone Co.
                    SNT    - SouthernNet, Inc.
                    SOC    - State of California
                    Sprint - U.S. Telcom, Inc. (U.S. Sprint)
                    Star   - STAR-LINE
                    TBQ    - Telecable Corp.
                    TED    - TeleDial America
                    Teleco - Teleconnect
                    Telnet - Telenet Comm. Corp.
                    TEN    - Telesphere Network, Inc.
                    TET    - Teltec Savings Communications Co.
                    TGN    - Telemanagement Consult't Corp.
                    THA    - Touch America
                    TID    - TMC South Central Indiana
                    TKC    - TK Communications, Inc.
                    TLS    - TELE-SAV
                    TMU    - Tel-America, Inc.
                    TOM    - TMC of Montgomery
                    TSF    - SOUTH-TEL
                    TSH    - Tel-Share
                    TTH    - Tele Tech, Inc.
                    TTU    - Total-Tel USA
                    TXN    - Tex-Net
                    USL    - U.S. Link Long Distance
                    Valu   - Valu-Line
                    WES    - Westel
                    WUT    - Western Union Telegraph Co.


                           Other abbreviations

                    (Futu)  - for future assignment
                    (Pagr)  - reserved for radio paging
                    [Diry]  - Directory Assistance Exchange
                    [T-??]  - reserved for testing

                              Notes on 800
                              ------------

Where  local  telcos, such  as  Illinois  Bell offer  800  service,  they
purchase blocks of numbers from AT&T on prefixes assigned  to  AT&T. They
are free to purchase blocks of  numbers from any  carrier of their choice
however.

Often, exchanges of the form NN2  are used internally within an area code
or region,  such as 552 or 772 in  Saskatchewan,  or for intra-state use.
Specific  intra-state or  intra-provincial uses are not mentioned in this
document.

The information was updated according to carriers accessible from Canada.
As far as can be  determined,  only the AT&T, MCI and Sprint 800 services
are  accessible from  Canada  at present. However, 337 (assigned to First
Data Resources)  seems to be connected  to MCI. This  could be due to the
purchase  of some companies;  the prefixes  would  then be assumed by the
buyer.

N0X/N1X prefixes for 800 service are starting to appear. The first widely
known one is 800 used by  Sprint (as in 1 800 800 xxxx). This is the only
N(0/1)X prefix for 800 to be accessible from Canada at present.


                                   ---

                              POETRY CORNER
                         The Grappler - Essence


                With the unquenchable thirst of an ocean
                  Death drinks of lifetimes in a flinch
                      I am but a cups worth of this
                   As meaningless as a glass of water
                    To know this is the mortal cross
                            we all must bear.

                          (C)1993 The Grappler





                              My Teddy Bear

                 Without my teddy bear, I cannot sleep.
                    I cannot breathe, or concentrate.
                   I cannot set my mind out straight,
                   but my teddy bear doesn't miss me.

                  Without my teddy bear, I cannot feel.
                     I play a game, I act in haste,
                   romantic thoughts are put to waste,
                   but my teddy bear doesn't miss me.

                  Without my teddy bear, I cannot see.
                  It's all pitch black, and in the day,
                    without a map, i've lost my way,
                   but my teddy bear doesn't miss me.

                 Without my teddy bear, I cannot smell.
                 There's no purfume, no sweet soft skin,
                       No hugs to be supported in,
                   but my teddy bear doesn't miss me.

                 Without my teddy bear, I cannot taste.
                     I cannot taste her loving kiss,
                    the interweaved celestial bliss,
                   but my teddy bear doesn't miss me.

                     My teddy bear, come back to me.
                    It sickens me to think you might,
                 alone and lost, be filled with fright,
                      and maybe, you might miss me.

                             (C)1993 Essence




                                 Victim

            Like ice, her cold heart controls her warm hands.
                        Inticing me to join her,
                        Inviting me to touch her,

               She melts my heart but inside she is cruel.
                      My face her hands carressing,
                       My body, hers is blessing.

            Intense her hatred runs right through her blood.
                       Her passion makes her sexy,
                      Her warm lips make her sexy.

               I enter her, and let my heart breathe fire.
                      My fire, and love exhausted,
                       yet she has just molested,

                             Another Victim.

                             (C)1993 Essence



                                   ---

               OFFICIAL [CiSSD] BAD-ASS BELLCORE GLOSSARY
                                 Lister

      The  following I  picked  up in  my  travels  on  the  Internet.  I
rarely  find a COMPREHENSIVE  glossary  like this  one.  Although  it  is
intended  for   Bellcore  employees,  it  has  obvious  uses  for  social
engineering; or just for reference.  All in all, it makes and interesting
read and I hope you benefit out of it..


          A & B LEADS
               Designation of leads derived from the midpoints of the two
               pairs comprising a 4-wire circuit.

          ABBREVIATED DIALING
               Preprogramming of a caller's phone system or long distance
               company's switch to recognize a 2- to 4-digit number as an
               abbreviation  for a  frequently dialed  phone number,  and
               automatically dial the whole number.
               Synonym:  Speed Dialing.

          ACCESS CHARGE
               Monies collected by local phone companies for use of their
               circuits to originate  and terminate long distance  calls.
               Can be per minute fees  levied on long distance companies,
               Subscriber Line  Charges (SLCs) levied directly on regular
               local lines, fixed monthly fees for special telco circuits
               (ie. WAL, DAL,T-1),  or Special Access Surcharge  (SAS) on
               special access circuits.

          ACCESS LINE
               A telephone circuit which connects a customer  location to
               a network switching center.

          AIRLINE MILEAGE
               Calculated    point-to-point   mileage   between  terminal
               facilities.

          ALL TRUNKS BUSY (ATB)
               A  single  tone  interrupted  at  a 120 ipm  (impulses per
               minute) rate to indicate all lines  or trunks in a routing
               group are busy.

          ALTERNATE ROUTE
               A   secondary   communications  path   used  to   reach  a
               destination if the primary path is unavailable.

          ALTERNATE USE
               The ability  to switch communications  facilities from one
               type to another, i.e., voice to data, etc.

          ALTERNATE VOICE DATA (AVD)
               A  single  transmission  facility  which can  be used  for
               either voice or data.

          ANALOG SIGNAL
               A signal  in the  form of  a continuous  varying  physical
               quantity, e.g., voltage which reflects variations in  some
               quantity, e.g., loudness in the human voice.

          ANNUNCIATOR
               An audible intercept  device that states  the condition or
               restrictions associated with circuits or procedures.

          ANSWER BACK
               An electrical  and/or visual indication  to the calling or
               sending  end that the  called  or received  station  is on
               the line.

          ANSWER SUPERVISION
               An electrical  signal fed back  up the  line by  the local
               telephone company  at the distant  end of a  long distance
               call to indicate positively  the call has been answered by
               the called party.  Tells billing equipment to start timing
               the call.

          AREA CODE
               A three digit number identifying  more than 150 geographic
               areas of the United States and Canada which permits direct
               distance  dialing on  the  telephone  system.   A  similar
               global   numbering   plan   has   been   established   for
               international subscriber dialing.

               Synonym:  Numbering Plan Area (NPA).

          ATTENDANT POSITION
               A telephone switchboard  operator's position.  It provides
               either  automatic  (cordless)  or  manual  (plug and jack)
               operator controls for incoming  and/or outgoing  telephone
               calls.

          ATTENTUATION
               A  general  term used  to denote  the  decrease  in  power
               between  that transmitted  and that  received due  to loss
               through equipment,  lines,  or other transmission devices.
               It is usually expressed as a ratio in dB (decibel).

          AUDIBLE RINGING TONE
               An audible  signal heard  by the calling  party during the
               ringing-interval.

          AUTHORIZATION CODE
               A 5- to 14-digit  number entered using  a touch-tone phone
               to identify the caller as a customer  of the long distance
               service.  Used primarily before  Equal Access as  a way to
               verify the caller as a customer and bill calls.

          AUTO ANSWER
               A machine feature that allows  a transmission control unit
               or  station to  automatically respond  to a  call that  it
               receives.

          AUTOMATIC CALL DISTRIBUTOR (ACD)
               A switching  system designed to queue  and/or distribute a
               large volume of incoming calls to a group of attendants to
               the next available "answering" position.

          AUTOMATIC DIALING UNIT
               A  device  which  is  programmed  with  frequently  called
               numbers.  The caller presses one  to three digits  and the
               preprogrammed  number  is  automatically  dialed  into the
               phone circuit.

          AUTOMATIC IDENTIFICATION OF OUTWARD DIALING (AIOD)
               The ability of some  centrex units to provide  an itemized
               breakdown  of charges  (including  individual  charges for
               toll calls) for calls made by each telephone extension.

          AUTOMATIC NUMBER IDENTIFICATION (ANI)
               On long  distance calls,  the  process by which  the local
               phone company passes a caller's local billing phone number
               to his/her  long distance company when a "1+"  or "10-XXX"
               call is made.   With ANI a  caller's long distance carrier
               knows who (what phone number)  to bill  without  requiring
               the caller to enter any extra digits to be identified.

          AUTOMATIC ROUTE SELECTION (ARS)

               Synonym:  Least Cost Routing

          BAND
               (1) The range of frequencies between two defined limits.

               (2) In  reference  to  WATS,  one  of  the  five  specific
               geographic areas as defined by the carrier.

               Synonym:  Bandwidth.

          BANDWIDTH
               see BAND.

          BASEBAND
               The  total  frequency band  occupied  by the  aggregate of
               all the voice  and data signals  used to modulate  a radio
               carrier.

          BAUD
               A unit of signaling speed. The speed in Baud is the number
               of discrete conditions or  signal elements per second.  If
               each signal event represents only one  bit condition, then
               Baud is the same as bits per second.  Baud does  not equal
               bits per second.

          BLOCKED CALLS
               Attempted  calls that  are not  connected because  (1) all
               lines  to  the central  offices  are  in  use; or  (2) all
               connecting paths through the PBX/switch are in use.

          BREAK
               A  means  of   interrupting  transmission,   a   momentary
               interruption of a circuit.

          BREAKEVEN POINT
               Level of usage at which the total cost of a service with a
               high  fixed  up-front  monthly  fee  but low minute  costs
               becomes  equal to the  total cost of  another service with
               low (or zero) monthly fee  but relatively high  per minute
               cost.  At usage  levels higher than breakeven, the service
               with the high monthly fee is cheaper.

          BROADBAND
               A transmission facility having a bandwidth of greater than
               20 kHz.

          BUS
               A  heavy  conductor,  or group  of  conductors,  to  which
               several  units of  the  same  type  of  equipment  may  be
               connected.

          BUSY
               The condition in which facilities  over which a call is to
               be transmitted are already in use.

          BUSY HOUR
               The time of day when phone lines are most in demand.

          BUSY TONE
               A single tone that is interrupted at 60 ipm  (impulses per
               minute) to indicate that  the terminal point of  a call is
               already in use.

          BYPASS
               The direct connection to customer-premises equipment by an
               IC.  This occurs  when an IC  connects its own  facilities
               (or facilities leased from a  non-BOC entity)  directly to
               an end user's  premises,  circumventing the use of the BOC
               network..

          CARRIER
               A  long  distance  company  which  uses primarily  its own
               transmission  facilities,  as opposed  to resellers  which
               lease  or buy  most or all  transmission  facilities  from
               carriers. Many people refer to any  type of  long distance
               company,  whether it  has its  own network or  not,  as  a
               carrier, so the term is  not as restrictive as  it used to
               be.

          CARRIER ACCESS CODE (CAC)
               The  sequence an  end user  dials to obtain  access to the
               switched services of  a carrier.  Carrier Access Codes for
               Feature Group D  are composed of  five digits, in the form
               10XXX, where XXX is the Carrier Identification Code.

          CARRIER COMMON LINE CHARGE (CCLC)
               A per  minute charge  paid by  long distance  companies to
               local phone companies for the use of local public switched
               networks  at either or  both ends of a long distance call.
               This charge  goes to  pay part of  the  cost of  telephone
               poles, wires, etc.

          CARRIER IDENTIFICATION CODE (CIC)
               The three-digit number that uniquely identifies a carrier.
               The Carrier Identification Code is indicated by XXX in the
               Carrier  Access  Code.   The  same  code   applies  to  an
               individual carrier throughout the area served by the North
               American Numbering Plan.

          CARRIER SYSTEM
               A  system for  providing  several communications  channels
               over a single path.

          CELLULAR MOBILE RADIO
               A  high  capacity land  mobile  radio system  in which  an
               assigned  frequency  spectrum  is  divided  into  discrete
               channels  that  are  assigned  to  a  cellular  geographic
               serving area.

          CENTRAL OFFICE (CO)
               With  local  telephone  companies,   the  nearby  building
               containing  the local  telco switch  which provides  local
               telephone  service.  Also the  physical point  where calls
               enter the long distance network.  Sometimes referred to as
               Class 5 office, end office, or Local Dial Office.

          CENTREX, CO
               PBX Service provided by a  switch located at the telephone
               company central office.

          CENTREX, CU
               A variation on Centrex CO provided  by a telephone company
               maintained  "Central  Office" type  switch located  at the
               customer's premises.

          CHANNEL
               A communications path via a carrier or microwave radio.

          CIRCUIT
               A path for the transmission  of electromagnetic signals to
               include all conditioning and signaling equipment.

               Synonym:  Facility.

          CIRCUIT SWITCHING
               A switching system that completes a dedicated transmission
               path from sender to receiver at the time of transmission.

          CISSD
               An elite group of hackers and phreakers with the skills to
               bring the h/p scene into the  21st century.  Unlike  other
               more conventional  groups,  CiSSD holds  revolutionary and
               new ideas  that bing a  fresh new perspective  the the h/p
               community.

               Synonym:  HeLL Inc.

          CLASS OF SERVICE/CLASS MARK (COS)
               A subgrouping of telephone customers or users for the sake
               of rate distinction or limitation of service.

          COAXIAL CABLE
               A cable with a solid outer shield, a space and then a
               solid inner conductor.  The electromagnetic wave travels
               between the outer shield and the conductor. It can carry a
               much higher band width than a wire pair.

          CODEC
               Coder-Decoder.  Used to convert  analog signals to digital
               form for transmission over a digital median and back again
               to the original analog form.

          COMMON CARRIER
               A government  regulated private company  that provides the
               general  public   with   telecommunications  services  and
               facilities.

          COMMON CHANNEL INTEROFFICE SIGNALING (CCIS)
               A  digital  technology  used  by  AT&T  to  enhance  their
               Integrated  Services Digital  Network.  It uses a separate
               data line to  route interoffice signals to  provide faster
               call set-up and more efficient use of trunks.

          COMMON CONTROL SWITCHING ARRANGEMENT (CCSA)
               The use of carrier  switches under a carrier's  control as
               part  of  a  customer's  private  network.  The  carrier's
               software controls  and switches the  customer's calls over
               private  lines the  customer has rented.  Control  of  the
               switch and  switching functions is done  in common for all
               users using the software and switching system.

          CONDITIONING EQUIPMENT
               Equipment modifications or  adjustments necessary to match
               transmission  levels  and  impedances  and which  equalize
               transmission and  delay  to bring  circuit losses, levels,
               and distortion within established standards.

          CONFIGURATION
               The combination of long-distance services and/or equipment
               that make up a communications system.

          CONTROL UNIT (CU)
               The central processor of a telephone switching device.

          COST COMPONENT
               The price  of each  type of  long distance service  and/or
               equipment that constitutes a configuration.

          CROSS CONNECTION
               The wire connections running  between terminals on the two
               sides of a distribution frame, or between binding posts in
               a terminal.

          CROSS TALK
               The unwanted energy (speech or tone)  transferred from one
               circuit to another circuit.

          CUSTOMER ACCESS LINE CHARGE (CALC)
               The FCC-imposed monthly surcharge added to all local lines
               to  recover  a  portion of  the cost  of telephone  poles,
               wires, etc., from end users.  Before deregulation, a large
               part of these  costs were  financed by long distance users
               in the form of higher charges.

          CUSTOMER OWNED AND MAINTAINED (COAM)
               Customer provided communications  apparatus and associated
               wiring.

          CUSTOMER PREMISE EQUIPMENT (CPE)
               Telephone  equipment,  usually  including  wiring  located
               within the customer's part of a building.

          CUT
               To transfer a service from one facility to another.

          CUT THROUGH
               The establishment of a complete  path for signaling and/or
               audio communications.

          DATA SET
               A  device which  converts data  into signals  suitable for
               transmission over communications lines.

          DATA TERMINAL
               A station in a system capable of  sending and/or receiving
               data signals.

          DECIBEL (dB)
               A unit measurement represented as a ratio of two voltages,
               currents or  powers and  is used  to measure  transmission
               loss or gain.

          DEDICATED ACCESS LINE (DAL)
               An analog special  access line  going from a  caller's own
               equipment directly to a  long distance company's switch or
               POP.  Usually provided by a local  telephone company.  The
               line may go through the  local telco Central  Office,  but
               the local telco does not switch calls on this line.

          DELAY DIAL
               A dialing configuration whereby  local dial equipment will
               wait until it  receives the entire telephone number before
               seizing a circuit to transmit the call.

          DELTA MODULATION (DM)
               A  variant  of  pulse   code  modulation  whereby  a  code
               representing  the  difference between  the amplitude  of a
               sample  and the  amplitude of  the previous  one is  sent.
               Operates  well in  the presence of  noise,  but requires a
               wide frequency band.

          DEMODULATION
               The process of retrieving data from a modulated signal.

          DIAL LEVEL
               The  selection of  stations or services  associated with a
               PBX using a one  to four digit code  (e.g., dialing  9 for
               access to outside dial tone).

          DIAL PULSING
               The   transmitting   of   telephone  address   signals  by
               momentarily  opening  a  DC  circuit  a  number  of  times
               corresponding to the decimal digit which is dialed.

          DIAL REPEATING TIE LINE/DIAL REPEATING TIE TRUNK
               A tie line arrangement which permits direct trunk to trunk
               connections without use of the attendant.

          DIAL SELECTIVE SIGNALING
               A multipoint network in which the called party is selected
               by a prearranged dialing code.

          DIAL TONE
               A tone  indicating that  automatic switching  equipment is
               ready to receive dial signals.

          DIALING PLAN
               A description of the dialing arrangements for customer use
               on a network.

          DIRECT DISTANCE DIALING (DDD)
               A basic toll service that permits  customers to dial their
               own long distance call without the aid of an operator.

          DIRECT INWARD DIALING (DID)
               A PBX or  CENTREX feature that  allows a customer  outside
               the system to directly dial a station within the system.

          DIRECT OUTWARD DIALING
               A PBX or  CENTREX feature  that allows  a station  user to
               gain direct access to an exchange network.

          DROP
               The portion of outside telephone  plant which extends from
               the  telephone  distribution  cable  to  the  subscriber's
               premises.

          DRY CIRCUIT
               A circuit  which transmits  voice signals  and carries  no
               direct current.

          DUAL TONE MULTI-FREQUENCY (DTMF)
               Also known as Touch-Tone.  A type of signaling which emits
               two distinct frequencies for each indicated digit.

          DUPLEX
               Simultaneous two-way independent transmission.

          DUPLEX SIGNALING
               A long-range  bidirectional  signaling method  using paths
               derived from transmission  cable pairs.  It  is based on a
               balanced and symmetrical circuit that is identical at both
               ends.  This circuit  presents  an E&M  lead  interface  to
               connecting circuits.

          ECHO
               A  signal that  has been  reflected or  otherwise returned
               with sufficient magnitude and delay to be perceived by the
               speaker.

          ECHO RETURN LOSS (ERL)
               The loss which must be in the  echo path to reduce echo to
               a tolerable amount.

          ECHO SUPPRESSOR
               A  device  which  detects  speech  signals transmitted  in
               either direction  on a four-wire  circuit,  and introduces
               loss in the direction of transmission.

          EITHER END HOP OFF (EEHO)
               In private networks,  a switch program that  allows a call
               destined for  an off-net  location to  be placed  into the
               public  network  at  either  the  closest  switch  to  the
               origination or to the destination.  The  choice is usually
               by time of day.  Uses either  Head End Hop Off or Tail End
               Hop Off.

          ELECTRONIC KEY TELEPHONE SETS (EKTS)
               A  generic term  indicating key  telephones with  built-in
               microprocessors which allow access to PBX-like features as
               well as access  to multiple CO  lines, using  2 to  4 pair
               wiring.

          ELECTRONIC SWITCH
               Modern   programmable  switch   (often  denoted  ESS,  for
               Electronic Switching System)  used in  most BOC  telephone
               companies,  many independent  telephone companies,  and by
               virtually  all  new  long distance  companies.  Completely
               solid    state   electronics,    as   opposed   to   older
               electro-mechanical switches.

          ELECTRONIC SWITCHING SYSTEM (ESS)
               Used as a station instrument on a PBX.  Also a Bell System
               term for electronic exchange switching equipment.

          ELECTRONIC TANDEM NETWORK (ETN)
               (1)  A  private  network automatically  and electronically
               connecting the calling office to the called office through
               Tandem-Tie Trunks.   The network switches also function as
               PBXs. (2) An AT&T product name. (3) Used as a generic term
               for a PBX base network.

          ENHANCED PRIVATE SWITCHED COMMUNICATIONS SERVICE (EPSCS)
               A  private  network  utilizing   Bell  provided  equipment
               located in the central office and  dedicated to a specific
               customer.

          E&M LEADS
               A  pair  of  leads   which  carry  signals  between  trunk
               equipment and  separate signaling equipment  unit.  The  M
               lead transmits  battery or ground signals to the signaling
               equipment, and the E lead receives  open or ground signals
               from the signaling equipment.

          E&M SIGNALING
               An arrangement  whereby signaling between  a trunk circuit
               and an  associated signaling  unit is  effected  over  two
               leads providing full-time, 2-way, 2-level supervision.

          ENTERPRISE NUMBER
               A unique telephone exchange number that permits the called
               party to be automatically billed for incoming calls.

          EQUAL ACCESS
               Reprogramming of Local Exchange  Company (LEC) switches to
               allow other long distance companies besides AT&T to be the
               "1+"  primary  long  distance  company  for users  of long
               distance (by creating a  new type of Feature  Group access
               circuit,  FGD).  Also   provides  "10-XXX"   dialing   for
               secondary  and  casual  calling,  generates  true hardware
               Answer  Supervision  when  calls are  terminated over  FGD
               circuits,    and    provides    ANI    (Automatic   Number
               Identification) on originating calls.

          EQUALIZATION
               The procedure of  compensating for  fluctuation in circuit
               amplitude, delay, or distortion.

          ERLANG
               A unit of traffic intensity.  One Erlang  is the intensity
               at which one traffic path would be  continuously occupied,
               e.g. one call per hour.

          ERLANG B TABLE
               A widely used  table derived  from a  mathematical formula
               which allows the determination of the traffic capacity of
               a given group of circuits.

          EXCHANGE
               A telephone switching center.

          EXCHANGE NETWORK FACILITIES FOR INTERSTATE ACCESS (ENFIA)
               AT&T's pricing arrangement for local loops offered to OCCs
               for connecting the  OCC's network  to the  local telephone
               company's central office.

          EXTENDED AREA SERVICE (EAS)
               Adding expanded  local calling  areas to a  caller's basic
               local  calling area  for a  (generally)  small  additional
               monthly  fee.   The  EAS  local calls  can be  either free
               (after  a small  additional  monthly fee is paid)  or at a
               cost of reduced per call charges.

          FACILITIES
               Typically  refers to  transmission lines  or circuits,  or
               long  distance  services.  A  caller's facilities  are the
               circuits available to make calls.

          FACSIMILE
               The transmission of pictures,  maps or other documents via
               communications  circuits using  a device  which scans  the
               original document, transforms the image into coded signals
               and reproduces the original document at a distant point.

          FEATURE GROUP A
               Line-side  originating  and  terminating  LATA access  for
               which  an   originating  subscriber   dials  an   assigned
               telephone number that connects  to a specific  IC.  The IC
               returns  a tone  to signal the  caller to input additional
               tone-generated digits of the called number.

          FEATURE GROUP B
               Trunk-side  originating and  terminating  LATA  access for
               which an  originating subscriber  dials a  950-WXXX number
               (where W=0,1 and XXX is the Carrier Access Code), which is
               translated  to  a  specified  XXX  carrier  trunk   group.
               Optional rotary dial service and ANI may be available.

          FEATURE GROUP C
               Trunk-side LATA access  for AT&T,  generally,  on a direct
               basis between each EO and an AT&T switching system.

          FEATURE GROUP D
               Also referred  to as  "Equal Access,"  Feature Group  D is
               trunk-side  LATA access  affording call  supervision to an
               IC, a uniform access code (10XXX),  optional calling-party
               identification,   recording   of   access-charge   billing
               details, and presubscription to a customer-specified IC.

          FEDERAL COMMUNICATIONS COMMISSION (FCC)
               The government  agency established  by the  Communications
               Act of 1934 which regulates  the interstate communications
               industry.

          FIBER OPTICS
               High speed  transmission using  light to  send images  (in
               telecommunications:   voice  or data)  through  a flexible
               bundle of glass fibers.

          FOUR WIRE CIRCUITS
               Circuits which use two separate one-way transmission paths
               of two wires each, as opposed to regular local lines which
               usually only have two wires to carry conversations in both
               directions.  One set of wires  carries conversation in one
               direction, the other in the opposite direction.

          FREQUENCY
               The number of complete cycles per unit of time.

          FREQUENCY DIVISION MULTIPLEXING (FDM)
               The division  of an available  frequency range (bandwidth)
               into various subdivisions, each having enough bandwidth to
               carry one voice or data channel.

          FREQUENCY RESPONSE
               The reaction of frequencies to the circuit components.

          FULL DUPLEX
               A circuit which allows  transmission of a message  in both
               directions at the same time.

               Synonym:  4-wire.

          FULL PERIOD
               Relates to private line service,  which is  rented for the
               exclusive use of a single customer for an entire month.

          FX (FOREIGN EXCHANGE) SERVICE
               A service  which allows a  customer  to appear  to  have a
               local presence in a distant part  of town or,  a different
               town altogether, by connecting his/her phone directly to a
               local business line  in a part  of town  with a  different
               exchange than  his/her  local calling area  over a  leased
               private  line,  or  to  a  local telco  in a  distant town
               through  long  haul private  lines purchased  from a  long
               distance carrier.

          GRADE OF SERVICE
               The probability of a  call being blocked  by busy  trunks,
               expressed as a  decimal fraction,  and usually meaning the
               busy-hour probability.

          GROUP
               12 circuits processed as a unit in a carrier system.

          HALF DUPLEX
               A circuit  for  transmitting or  receiving signals  in one
               direction at a time.

          HARDWIRE
               To wire or cable directly between units of equipment.

          HARMONIC
               The full multiple of a base frequency.

          HARMONIC DISTORTION
               The ratio,  expressed in  decibels,  of  the power  at the
               fundamental frequency,  to the power of a harmonic of that
               fundamental.

          HEAD END HOP OFF (HEHO)
               A  method  of   traffic  engineering   whereby  calls  are
               completed by using  long distance  facilities directly off
               the switch that serves that location.

          HERTZ (Hz)
               International standard unit of frequency. Replaces, and is
               identical to, the order unit "Cycles-per-second."

          HOMING
               Returning  to  the  starting  position,  as  in  a  rotary
               stepping switch.

          HOOKSWITCH
               The device  on which  the telephone  receiver hangs  or on
               which a telephone handset hangs or  rests when not in use.
               The weight of  the receiver  or handset  operates a switch
               which opens the telephone circuit,  leaving only  the bell
               connected to the line.

          HOT-CUT
               Virtually  instantaneous  replacement  of  one  line  with
               another.

          HYBRID
               An electronic circuit which performs the  wire conversions
               necessary for the connection of a  local loop with a long-
               haul facility.

          INTERCEPT
               To stop a telephone call directed to an improper telephone
               number,  and  redirect  that  call  to  an  operator or  a
               recording.

          INTERCONNECT
               (1)   The  arrangement  that  permits  the  connection  of
               customer's    telecommunications     equipment    to     a
               communications common carrier network.  (2)  The  industry
               name for manufacturers, excluding the Bell  system,  which
               provide telephone equipment for the customer premises.

          INTER-EXCHANGE MILEAGE (IXC)
               The airline mileage between two cities.

               Synonym:  Long Haul Mileage.

          INTEREXCHANGE PLANT
               The facilities between the subscriber switching center and
               another switching center.

          INTERFACE
               The  junction or  point  of  interconnection  between  two
               systems or equipment having different characteristics.

          INTERFERENCE
               Any  unwanted  noise  or  crosstalk  on  a  communications
               circuit which acts  to reduce  the intelligibility  of the
               desired signal or speech.

          INTER-MACHINE TRUNK (IMT)
               A circuit which connects two automatic switching centers.

          INTER-OFFICE TRUNK (IOT)
               A direct trunk between local exchange offices.

          INTERNATIONAL RECORD CARRIER (IRC)
               Carriers   providing    international   telecommunications
               services, including voice, telex, and data communications.

          INTERSTATE
               Any connection made between two states.

          INTRASTATE
               Any connection made that remains within the boundaries of
               a single state.

          JITTER
               Short term instability of the  amplitude and/or phase of a
               signal. Commonly called PHASE JITTER.

          KEYSET
               A telephone instrument having an appearance of two or more
               telephone  lines  which can  be accessed  by depressing  a
               button (key) on the face of the set.

          KEY SYSTEM
               The equipment utilized to provide  the features associated
               with key sets,  including  keysets,  multipair cable,  key
               service unit, distribution frames.

          LEASED LINES
               Any circuit or combination of circuits designated to be at
               the exclusive disposal of a given subscriber.

               Synonym:  Private line; Full Period Line.

          LEAST COST ROUTING (LCR)
               A method  of  automatically  selecting  the  least  costly
               facility for transmission of a call.

               Synonym:    Most   Economical   Route   Selection  (MERS);
               Automatic Route Selection; Flexible Route Selection.

          LEVEL
               An expression of the  relative signal strength at  a point
               in a communications circuit compared to a standard.

          LOADING
               A system for adding regularly spaced inductance units to a
               circuit to improve its transmission characteristics.

          LOCAL ACCESS AND TRANSPORT AREA (LATA)
               A geographic area (called "exchange" or "exchange area" in
               the MFJ) within each  BOC's franchised area that  has been
               established by a BOC in accordance  with the provisions of
               the MFJ for the  purpose of defining  the territory within
               which a BOC may offer its telecommunications services.

          LOCAL AREA NETWORK (LAN)
               Intraoffice  communication system usually  used to provide
               data transmission in addition to voice transmission.

          LOCAL EXCHANGE CARRIER (LEC)
               A  local  telephone  company,   either  one  of  the  Bell
               Operating Companies or one of the 1400+ independent  local
               telephone companies.

          LOCAL LOOP
               The local connection between the  end user and the Class 5
               central office.

          LONG HAUL
               Circuits spanning considerable distances.

          LOOP BACK
               A method of performing transmission tests on a circuit not
               requiring the assistance of personnel at the distant end.

          LOOP SIGNALING
               Any of the three signaling methods  which use the metallic
               loop formed  by the trunk  conductors and the  terminating
               equipment bridges.

          MAIN DISTRIBUTION FRAME (MDF)
               The  point where outside  plant cables terminate  and from
               which they  cross connect  to terminal  or central  office
               line equipment.

          MAIN PBX
               A PBX directly connected to a  tandem switch via an access
               trunk group.

          MANUAL TIE LINE
               A tie line which  requires the assistance  of an attendant
               at both ends of the circuit in order to complete a call.

          MASTER GROUP (MG)
               240 circuits processed as a unit in a carrier system.

          MESSAGE TELEPHONE SERVICE (MTS)
               AT&T's tariffed pricing  name for long  distance telephone
               calls.

          MESSAGE UNIT (MU)
               A local toll rate calling plan  which is time and distance
               sensitive.

          MICROWAVE (M/W)
               Radio transmission using very short lengths, corresponding
               to a frequency of 1,000 megahertz or greater.

               Synonym:  Microwave Radio.

          MICROWAVE RADIO

               Synonym:  Microwave.

          MODEM
               A  device  which modulates  and demodulates  signals on  a
               carrier  frequency  and  allows the  interface of  digital
               terminals with analog carrier systems.

          MODIFIED FINAL JUDGEMENT (MFJ)
               The agreement between the  U.S. Department of  Justice and
               AT&T  governing the  breakup of the  pre-Divestiture  Bell
               System into AT&T and 22 Bell Operating Companies and other
               entities.   On August 26, 1982, U.S.  District Court Judge
               Harold   Greene   accepted,    with    modifications,   an
               AT&T/Justice   Department   settlement   terminating   the
               government's  1974  antitrust  suit  against  AT&T.  Judge
               Greene's decree did away with  the provisions of the  1956
               consent decree  that  had  kept  AT&T  out of competitive,
               unregulated ventures.

          MODULATION
               Alterations  in  the  characteristics  of  carrier  waves.
               Usually impressed on the amplitude and/or the frequency.

          MONITORING DEVICE
               Records data on calls placed through a company's telephone
               system:  number called, length of calls, calling location.

          MOST ECONOMICAL ROUTE SELECTION (MERS)

               Synonym:  Least Cost Routing.

          MULTIPLEXING
               The act  of  combining  a  number  of  individual  message
               circuits for transmission over a common path.  Two methods
               are used: (1) frequency division, and (2) time division.

          NETWORK
               A collection  of  switches  connected to  one  another  by
               transmission facilities.

          NETWORK NUMBERING EXCHANGE (NXX)
               The  three digit  location code  representing the  central
               office.  "N" may be any number between "2" and "9" and "X"
               may be any number.

          NETWORK TRUNKS
               Circuits connecting switching centers.

          NNX CODES
               The 3-digit  code  used  historically  for local  Exchange
               Codes. "N" can be any number from 0 to 2,  "X"  can be any
               digit.   The   current  numbering  plan  allows  for  more
               variation  in  assigning  Exchange  Codes,  and  under  it
               Exchange Codes are commonly referred to as "NXXs."

          NODE
               A major switching center of a network.

          NON-BLOCKING
               A switching network  having a  sufficient number  of paths
               such that a subscriber originating a call can always reach
               any other idle subscriber without encountering a busy.

          NUMBERING PLAN AREA (NPA)
               A  geographical  division within  which no  two telephones
               will  have the  same  7 digit  number.   "N" is any number
               between "2" and "9"; "P" is always "1" or "0";  and "A" is
               any number excluding "0".   Commonly referred to as  "area
               code."

          NXX CODES
               The  current  general  configuration  for  Exchange  Codes
               within each Area Code.  See also:  "NNX Codes"

          OFFERED TRAFFIC
               The number  of call attempts  in any  specified period  of
               time.

          OFF HOOK
               The  condition which  results when  a telephone is  lifted
               from its mounting, allowing the hookswitch to operate.

          OFF-NETWORK ACCESS LINE (ONAL)
               A local exchange (Feature Group access), Foreign Exchange,
               or WATS line connecting both incoming and outgoing traffic
               from  a  long  distance  company's network  to the  public
               switched  network.  Generally a circuit  leased by  a long
               distance carrier to be used  by many customers not  hooked
               directly into the long distance carrier's network.

          OFF NETWORK CALLING
               Telephone  calls through  a private  switching system  and
               transmission network which  extend to the public telephone
               system.

          OFF PREMISES EXTENSION (OPX)
               An extension  telephone or  keyset that is  geographically
               separated from its associated PBX.

          ON HOOK
               The  condition which results  when a telephone  handset is
               placed on  its mounting,  which causes the  hook-switch to
               open its contacts.

          ON NETWORK CALLING
               A term  used  to  describe  a  call  that  originates  and
               terminates on a private network.

          OPERATOR ASSISTED CALLS
               Non-DDD calls requiring manual intervention.

          ORIGINATING OFFICE
               The central office that serves the calling party.

          OTHER COMMON CARRIER (OCC)
               A long distance company other than AT&T having many of its
               own long distance circuits,  either owned or leased.  Some
               people  use  OCC  to  refer  to  all  AT&T  long  distance
               competitors,  including   resellers,   but   this  is  not
               technically correct.

          OUT-OF-BAND
               Any frequency outside the band used for voice frequencies.

          OUT-OF-BAND SIGNALING
               Use of narrow band filters to  place the voice signal on a
               carrier  channel below  3,400 CPS,  reserving the  3,400 -
               3,700 CPS band for supervisory signals.

          OVERBUILD
               Adding radio capacity to a telecommunications network.

          OVERFLOW
               Switching equipment  which operates when the  traffic load
               exceeds the capacity of the regular equipment.

          PAD
               A  non-adjustable   resistance  network  used   to  insert
               transmission loss into a circuit.

          PHASE JITTER
               SEE Jitter

          POINT OF PRESENCE (POP)
               A  physical  location   within  a  LATA  at  which  an  IC
               establishes  itself for  the  purpose  of  obtaining  LATA
               access and to which the BOC provides access services.

          POINT-TO-POINT
               A  communications circuit  between two  terminations which
               does not connect with a public telephone system.

          PORT
               Entrance or access point to a computer, multiplexor device
               or network  where signals  may be  supplied,  extracted or
               observed.

          POSTAL TELEPHONE AND TELEPGRAPH (PTT)
               Foreign  government  agencies  responsible for  regulating
               communications.

          PRIMARY AREA
               A customer's local telphone calling area.

          PRIMARY INTEREXCHANGE CARRIER (PIC)
               The IC  designated  by a  customer to  provide  inter-LATA
               service  automatically without  requiring the  customer to
               dial an access code for that carrier.

          PRIMARY ROUTING POINT
               The switch designated as the  control point for a longhaul
               telephone call.

          PRIVATE BRANCH EXCHANGE (PBX)
               A private phone system  (switch) used by  medium and large
               companies  which  is  connected  to  the public  telephone
               network (local telco) and performs  a variety of  in-house
               routing  and switching.   User  usually  dial  "9" to  get
               outside system to the local lines.

          PRIVATE LINE (PL)
               A full-time  leased line  directly connecting  two points,
               used soley by  purchaser.  The most common  form is  a tie
               line connecting two pieces of a user's own phone equipment
               - flat rate billing, not usage sensitive.

          PRIVATE USE NETWORK
               Two or  more private  line  channels contracted  for by  a
               customer and restricted for use by that customer only.

          PUBLIC SWITCHED NETWORK (PSN)
               The pre-Divestiture nationwide  network maintained by AT&T
               and  the  independent  telephone companies  which provides
               nationwide, unrestricted telephone service.

          PUBLIC UTILITY COMMISION (PUC)/PUBLIC SERVICE COMMISSION (PSC)
               The    state    commissions     regulating      intrastate
               communications.

          PULSE CODE MODULATION (PCM)
               The form of modulation  in which  the information  signals
               are sampled at regular intervals and a series of pulses in
               coded form are  transmitted representing the  amplitude of
               the information signal at that time.

          PULSE-LINK REPEATER
               Connects one E&M signaling circuit directly to another.

          PULSE MODULATION
               The modulation  of a  series  of pulses  which  represents
               information - bearing  signals.  Typical  methods  involve
               modifying the amplitude (PAM), width or duration (PWM)  or
               position (PPM).  Pulse Code Modulation  (PCM) is  the most
               common modulation technique involved in telephone work.

          PUSH BUTTON DIALING
               Synonym:  Dual Tone Multi-Frequency.

          QUEUE
               A  temporary delay  in  providing  service caused  by  the
               inability of the system  provided to handle the  number of
               messages or calls attempted.

          RADIO COMMON CARRIER (RCC)
               A communications common carrier that provides radio paging
               and mobile telephone services to the public.

          RATE CENTER
               A specified  geographic  location  used  by  the telephone
               company   to   determine   interchange  mileage  for  rate
               determination purposes.

          REDUNDANCY
               Duplicate  equipment  that  is  provided to  minimize  the
               effect of failures or equipment breakdowns.

          REGENERATION
               The process of receiving distorted  signal pulses and from
               them recreating new pulses at the correct repetition rate,
               pulse amplitude, and pulse width.

          RE-HOMING
               A major  network  change  which involves  moving  customer
               services  from  one   switching   center  to  another  and
               establishing the necessary trunking facilities to do so.

          REMOTE ACCESS
               The ability  of transmission  points to gain  access to  a
               computer which is at a different location.

          REPEATER
               An electronic  device used  to amplify signals  which have
               become too weak.

          REPEATING COIL
               The  telephone  industry's  term   for a  voice-frequency
               transformer.

          RESELLER
               A long distance company that purchases  large  amounts  of
               transmission  capacity or  calls from  other  carriers and
               resells it to smaller users.

          RESTORATION
               The re-establishment of service by rerouting, substitution
               of component parts, or as otherwise determined.

          RETARD COIL
               A coil having  a large  inductance  which  retards  sudden
               changes of the current flowing through its winding.

          RINGBACK TONE
               Synonym:  Audible Ringing Tone.

          RINGDOWN
               A circuit or method of signaling where the incoming signal
               is actuated by alternating current over the circuit.

          ROUTE DIVERSITY
               Two (or more)  private line channels  (circuits) furnished
               partially or entirely over two physically separate routes.
               Serves to prevent total  loss of service if one cable gets
               cut or goes out.

          ROUTE OPTIMIZATION
               Synonym:  Least Cost Routing.

          ROTARY HUNT
               An arrangement  which allows calls  placed to seek  out an
               idle circuit in a prearranged multi-circuit group and find
               the next open line to establish a through circuit.

          SATELLITE RELAY
               An active  or passive  repeater  in  geosynchronous  orbit
               around  the Earth which  amplifies the signal  it receives
               before transmitting it back to earth.

          SELECTIVE CALLING
               The ability of a  transmitting station to  specify by  the
               use of  assigned codes  which of  several stations  is  to
               receive a message.

          SERVICE AND EQUIPMENT RECORD
               A list of equipment billed to customer by type,  quantity,
               monthly charge, location and billing dates.

          SF SIGNALING (SINGLE-FREQUENCY)
               A signaling system which uses a 2,600 Hz in-band signal on
               the voice  path.  The tone  is on  in the idle  condition,
               pulsed for dialing, and off when the circuit is in use.

          SHORT HAUL
               Circuits designed for use over distances of 10-200 miles.

          SIGNALING
               The process of  transferring information between two parts
               of a telephone network  to control  the  establishment  of
               communications  between  long  distance  carrier  terminal
               points,  and customer  equipment required for  voice grade
               dedicated circuits.

          SIGNALING CONVERTER
               A device with  input and  output signals  that contain the
               same information  but employ different  electrical systems
               for transmitting that information.  Used  at  the terminal
               of a trunk to convert  the equipment signals to the system
               used on  the trunk.  Examples  are:  (1) ring down  to SF,
               (2) E&M to SF.

          SIGNALING, IN-BAND
               A type of signaling using an  AC signal (usually 2,600 Hz)
               within   the  normal   voice  band.  This  signal  can  be
               transmitted  from  end  to  end  of  a long  voice circuit
               without an  intermediate signaling  equipment.  Since  the
               signaling  is  audible,  the signaling  equipment  must be
               arranged for "tone on when idle" operation.

          SIGNAL TO NOISE RATIO
               Ratio  of the  signal  power  to  the  noise  power  in  a
               specified bandwidth, usually expressed in db.

          SIMPLEX (SX) SIGNALING
               A signaling path over a dry talking circuit which uses the
               two   sides  of  the  circuit   in  parallel,  derived  by
               connecting the midpoints of repeating coils or retardation
               coils which are across the circuit.

          SINGLE SIDEBAND RADIO (SSB)
               A form of amplitude modulation of  a radio signal in which
               only one of the  two sidebands is transmitted.  Either  of
               the two sidebands may be transmitted,  and the carrier may
               be transmitted, reduced or suppressed.

          SINGING
               A continued whistle  or howl  in  an  amplified  telephone
               circuit.   It occurs when  the sum  of the  repeater gains
               exceeds the sum of the circuit losses.

          SOFTWARE DEFINED NETWORK (SDN)
               A switched long distance service for very large users with
               multiple locations.  Instead of putting together their own
               network, large users can get special usage rates for calls
               made  on  regular  long  distance  company  switched  long
               distance services.

               Synonym:  Virtual Private Network.

          SPECIAL GRADE NETWORK TRUNK
               A trunk specially  conditioned by  providing amplitude and
               delay  equilization  for the  purpose of  handling special
               services such as medium-speed data (600 to 2400 BPS).

          SPECIALIZED COMMON CARRIER (SCC)
               Synonym:  Other Common Carrier.

          SPEED NUMBER
               A one, three,  or four digit number that  replaces a seven
               or  ten  digit  telephone   number.  These   numbers   are
               programmed into the switch in the carrier's office or in a
               PBX.

          STATION
               Any customer location  on a network capable  of sending or
               receiving messages or calls.

          STATION MESSAGE DETAIL RECORDING (SMDR)
               A computer  generated report  showing internal usage  on a
               telephone  system.   Usually  including extension  number,
               trunk number used,  phone  number dialed,  time  of  call,
               duration and operator involvement.

          STORE-AND-FORWARD
               A  technique in  which a  message  is  received  from  the
               originator  and held  in storage  until a  circuit to  the
               addressee becomes available.

          STORED PROGRAM CONTROL (SPC)
               A system whereby the instructions are placed in the memory
               of  a  commoncontrolled  switching  unit and  to  which it
               refers while processing a call  for instructions regarding
               class marks,  code conversions,  routing,  as well  as for
               trouble analysis.

          SUPERGROUP (SG)
               60 circuits processed as a unit in a carrier system.

          SUPERMASTERGROUP (SMG)
               600 circuits processed as a unit in a carrier system.

          SUPERVISION
               Synonym:  Answer Supervision.

          SUPERVISORY SIGNALS
               A signal, such as "on-hook" or "off-hook," which indicates
               whether a circuit or line is in use.

          SWITCH
               Equipment used to interconnect lines and trunks.

          SWITCHED ACCESS
               Connection  between  caller's phone system  and switch  of
               chosen long distance carrier  when a regular long distance
               call  using   regular  local  lines  is  made.   Also  the
               connection  between the switch  of caller's  long distance
               carrier in the distant city and the phone being called.

          SWITCH HOOK
               Synonym:  Hookswitch.

          SWITCHING
               The  operations involved  in  interconnecting circuits  in
               order to establish communications.

          SWITCHING CENTER
               A location  at  which telephone  traffic,  either local or
               toll, is switched or connected from one circuit or line to
               another.

          SWITCHING OFFICE
               A telephone company office which contains a switch.

          T-1
               24 voice channels digitized at 64,000 bps, combined into a
               single 1.544 Mbps  digital stream  (8,000 bps  signaling),
               and carried  over  two pairs  of regular copper  telephone
               wires. Used primarily by telephone  companies until  1983.
               Now  used  for dedicated  local  access to  long  distance
               facilities, long-haul private lines, and for regular local
               service.  Today,  most  any  1.544 Mbps digital  stream is
               called  T-1,   regardless   of  its  makeup  or  what  the
               transmission medium is.

          T-CARRIER
               A time-division, pulse-code modulation, voice carrier used
               on exchange cable to provide short-haul trunks.

          TAIL END HOP OFF (TEHO)
               In a private network,  a call  which is carried  over flat
               rate  facilities  (Intermachine  Trunks  or  IMT)  to  the
               closest switch  node to the destination of  the call,  and
               then connected into the public network as a local call.

          TANDEM
               A switching  arrangement  in  which  the  trunk  from  the
               calling  office  is  connected  to  a trunk  to the called
               office through an intermediate point.

          TANDEM SWITCHING SYSTEM
               Synonym:  Tandem Tie Trunk Network.

          TANDEM TIE TRUNK NETWORK (TTTN)
               A serving arrangement which permits sequential  connection
               of tie trunks between  PBX/CENTREX locations  by utilizing
               tandem operation.

          TANDEM TRUNKING
               Trunks which connect two or more switches together.

          TARIFF
               The  published   rates,   regulations,   and  descriptions
               governing the provisions of communications service.

          TELCO
               Local telephone company.

          TELECOMMUNICATIONS
               The transmission of voice and/or  data through a medium by
               means of electrical impulses  and includes all aspects  of
               transmitting information.

          TELEGRAPH
               A system employing the interruption of, or change in,  the
               polarity  of   DC   current  signaling   to  convey  coded
               information.

          TELEPHONE
               A  device which  converts acoustical  (sound) energy  into
               electrical energy for transmission to a distant point.

          TELETYPEWRITER
               A machine used to  transmit and/or  receive communications
               on printed page and/or tape.

          TERMINAL
               A  point  at  which  information  can  enter  or  leave  a
               communications network.

          TERMINAL EQUIPMENT
               Devices, apparatus and their associated interfaces used to
               forward   information  to  a  local  customer  or  distant
               terminal.

          TERMINATION
               (1) An item that is connected to the terminal of a circuit
               or equipment.  (2) An impedance connected  to the end of a
               circuit being tested. (3)The points on a switching network
               to which a trunk or line may be attached.

          TIE-LINE
               A private leased line linking  two phones or phone systems
               directly.   Can  ring  distant  phone  automatically  when
               telephone  is lifted from  its mounting,  or when  a short
               code is dialed.

          TIME DIVISION MULTIPLEXING (TDM)
               Equipment  which enables the  transmitting of a  number of
               signals over  a single  common path  by transmitting  them
               sequentially at different instants of time.

          TOLL CALL
               Any call to a point outside the local service area.

          TOLL CENTER
               A central office where operators (human or mechanical) are
               present to assist in completing incoming toll calls.

          TOLL OFFICE
               A center for the switching of toll calls.

          TOLL PLANT
               The facilities  that connect  toll offices  throughout the
               country.

          TOLL RESTRICTION
               A restriction  in outgoing  trunks which  counts the first
               three digits dialed and diverts  calls to forbidden  codes
               either to a busy tone,  to the operator,  or to a recorded
               announcement.

          TOUCH-TONE ADAPTOR
               A device that can be connected to  a rotary dial telephone
               to allow for DTMF signaling.

          TRAFFIC
               Calls  being  sent  and  received  over  a  communications
               network.

          TRAFFIC MEASUREMENT AND RECORDING SYSTEMS (TMRS)
               A computer generated  report showing usage  information of
               telephone    systems.    Usually   this   includes   trunk
               utilization,  outages,  queueing time,  and  the need  for
               additional common equipment.

          TRAFFIC SERVICE POSITION SYSTEM (TSPS)
               A toll  switchboard position configured  as a push  button
               console.

          TRANSMISSION
               The electrical transfer of a signal, message or other form
               of data from one location to  another without unacceptable
               loss  of   information   content   due   to   attenuation,
               distortion, or noise.

          TRANSMISSION LEVEL
               The level of power of a signal,  normally 1,000 Hz,  which
               should be measured at a particular reference point.

          TRANSMISSION SPEED
               Number of pulses or bits transmitted in  a given period of
               time, usually expressed  as Bits Per Second (BPS) or Words
               Per Minute (WPM).

          TRUNK
               A telephone circuit or path between two switches, at least
               one of which is usually a telephone company Central Office
               or switching center.  Regular local CO circuits are called
               PBX trunks, because there is a switch  at both ends of the
               circuit.

          TRUNK GROUP
               An  arrangement   of   communications   channels  into  an
               identical group.

          TRUNK TYPE (TT)
               Trunks that use  the same type  of equipment going to  the
               same terminating location.

          TRUNK UTILIZATION REPORT (TUR)
               A computer printout detailing the traffic use of a trunk.

          TWO-WIRE CIRCUIT
               (1) A channel for transmitting data  in one direction at a
               time.   (2)  A  short  distance  channel  using  a  single
               send/receive pathway, usually 2 copper wires, connecting a
               telephone to a switch.

          TELETYPEWRITER EXCHANGE SERVICE (TWX)
               A  service whereby a  customer's leased teletypewriter  is
               connected to a "TWX" switchboard  and from there connected
               over regular toll circuits to a teletypewriter of any U.S.
               customer who subscribes to a similar service.

          UNIFORM CALL DISTRIBUTOR (UCD)
               A  device located  at the  telephone office or  in a  PABX
               which distributes incoming calls evenly among individuals.

          UNIFORM SERVICE ORDER CODE (USOC)
               The information in coded form  for billing purposes by the
               local  telephone  company  pertaining  to  information  on
               service orders and service equipment records.

          VALUE-ADDED NETWORK SERVICE (VANS)
               A  data  transmission    network  which   routes  messages
               according  to available  paths,  assures that  the message
               will  be received  as  it  was  sent,  provides  for  user
               security,  high speed transmission and  conferencing among
               terminals.

          VIA NET LOSS (VNL)
               The lowest loss  in dB at  which a  trunk facility  can be
               operated considering limitations of echo, crosstalk, noise
               and singing.

          VOICE CONNECTING ARRANGEMENT
               An interface arrangement provided by the telephone company
               to  accomodate  the connections  of  non-carrier  provided
               voice terminal equipment to  the public switched telephone
               network.

          VOICE FREQUENCY (VF)
               Any of the frequencies in the band 300-3,400 Hz which must
               be  transmitted  to  reproduce  the voice  with reasonable
               fidelity.

          VOICE GRADE
               An  access  line  suitable  for   voice,  low-speed  data,
               facsimile,  or  telegraph  service.  Generally,  it has  a
               frequency range of about 300-3000 Hz.

          VOICE GRADE FACILITY (VGF)
               A circuit  designed  to  DDD  network  standards which  is
               suitable  for  voice,   low-speed  data,   facsimile,   or
               telegraph service.

          WIDE AREA TELECOMMUNICATIONS SERVICE (WATS)
               WATS  permits  customers  to  make  (OUTWATS)  or  receive
               (INWATS) long-distance calls and  to have them billed on a
               bulk rather than individual  call basis.  The  service  is
               provided within selected service areas, or bands, by means
               of special  private access  lines  connected  to the pubic
               telephone network  via WATS-equipped  central offices.   A
               single access line permits  inward or outward service, but
               not both.

          WIDEBAND
               A term applied to facilities  or circuits where bandwidths
               are greater than that required for one voice channel.

          WIRE CENTER
               The  physical structure that  houses one  or more  central
               office switching systems.

          "0" or "0-"
               Zero  minus dialing.   Allows a  caller to  dial zero  and
               nothing else to get the Operator.

          "0+"
               Zero plus dialing. An operator assisted long distance call
               which is charged to the calling party.

          "00+" or "00-"
               Double  zero  dialing.  Allows a  caller to  get  an  AT&T
               Operator in  areas in which  dialing only  one zero  would
               connect the caller  with the local  Operator because  AT&T
               has given Operators back to the local telephone company.

          "1+" DIALING
               The capability to  dial "1" plus the  long distance number
               for calls withing the North American Numbering Plan  area.
               Intra-LATA  calls  are  carried  by  the  local  telephone
               company.  Inter-LATA  calls  are  carried by  the caller's
               primary carrier,  or by AT&T if equal access has  not come
               to the caller's area yet.

          "10-XXX" DIALING
               The ability  to send  calls over  a carrier  other than  a
               caller's primary carrier by dialing "10-XXX" then "1+" the
               long distance number,  where "XXX" is the 3-digit  Carrier
               Code of the alternative long distance company (also called
               a  secondary  carrier).  Available  only  to  Equal Access
               customers.

          800 SERVICE
               The ability of a caller to dial  a long distance telephone
               number without  incurring a charge for the call,  which is
               paid for by the party offering the 800 number.

               Synonym:  Inward WATS service.

          900 SERVICE
               Allows  callers to  receive information  from the  service
               provider via  a recorded  audio message,  which can  range
               from 60 seconds to a continuous live hookup,  by calling a
               900  number.  This  service  can  also  be used  to enable
               callers to vote or  "make a choice" by  dialing one of two
               900 numbers. 900 calls are  typically billed to the caller
               at $.50 for the first minute of any call and $.35 for each
               additional minute.

          976 NUMBERS
               Service   which  allows  callers  to  listen  to  recorded
               messages  such  as  horoscopes,  'adult'  dialogue,  stock
               market or sports reports  by calling 976-xxxx.  The  local
               telephone company  charges  callers a  fee which  is split
               between  the  local  telephone  company  and  the  service
               provider.


                                   ---


                  ERRATUM - CORRECTIONS FROM LAST ISSUE
                                 Essence

     Last issue got through the mill pretty well..  the errors were small
and  misplaced,   but  a  few  notable   errors  should   be  taken  into
consideration.

                         i. You Didn't Get Duped

     You weren't actually  given an  imitation file if  your filesize was
wrong..  the official  distribution copies  were screwed  around  in  the
quality  control phase,  and there  was a  discrepancy  in  the  official
distribution.  Here are  the reported,  and  actual  file  sizes  in  the
distribution copies.

                     REPORTED SIZE IN BYTES [119895]
                     ACTUAL SIZE IN BYTES   [120034]

     The byte size of the magazine  is reported in every issue(except for
the first)  so that we won't have  multiple distribution errors as we did
with the first issue.  It is a quality control measure.  Of course,  this
will not prevent  imitation files from spreading.  Anyone can fake a file
and  adjust  the file  size.  Zencor Technologies(tm)  has threatened  to
discredit us,  and we feel they may potentially  be a source of imitation
files.  We will  leave it up to  the reader to determine  if the magazine
lives up to the standards you have come to expect from CiSSD, and whether
it is therefore, a fake.

     If you want to  be sure to get  the real  deal every issue,  you can
download the official distribution version from the internet site:

           ftp  141.214.4.135  docs/zines/revival/rvlcissd.xxx

     where 'xxx' is the issue number.  ie: 'rvlcissd.003'.  If you do not
have internet access, then check 'Getting Revival', near the beggining of
this magazine for distribution sites.


                   ii. Voice Mail BBS date was WACkO!

     The projected date for the  Voice Mail BBS was somewhat unrealistic.
Several  CiSSD  members,  including myself,  are undergoing  geographical
repositioning  at  this time,  which  would make  it impossible to  run a
stable voice  mail.  This date  has been  corrected  in  this  issue,  to
September 1st 1993.

     The FAX date,  on the other hand,  accurate to  a week,  and the fax
line is now active.



                                   ---

                             ADVERTISEMENT:

  ____________________________________________________________________
 -                   REVIVAL: New Distribution Sites                  -
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Revival magazine  is looking for  new distribution sites  all over
 the world.  Requirements are not stringent.  Any board with a positive
 image,  a few megs of hard-drive space,  any hacking oriented  message
 base, and a knowledgable Sysop qualifies to be the first in its area.

     Revival issue #4 is on its way,  and we would like to set up sites
 for  distribution  right away.  Preffered  sites  are those  who  have
 access to Internet,  who can request  revival from  our internet  site
 automatically every other month.

     To apply  as a REVIVAL  distribution  site,  write  a  message  to
 annon08ea@nyx.cs.du.edu,  containing the password to an account by the
 name 'REVIVAL'. For a faster response, phone The Downtown Militarized
 Zone (+1 416 450 7087), and comment with your boards name and number,
 as well as the password to the 'REVIVAL' account, or finally, you can
 call voice to +1 416 417 0214, and have the same information handy.
  ____________________________________________________________________
 -                                                                    -
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                                   ---

                                ZEN WHAT?
                          The Dope Man/Essence

     Over the last  few months,  CiSSD has been  having a problem  with a
group  named  Zencor.  We  found it  rather disturbing  when we  recieved
several apologies, for Zencor's misjudging our intent, and specially when
we  stopped  recieving threats  from Zencor  members,  but all  the quiet
seemed  only to be a cover.  Now they've  gone and  thrown the  following
underground newsletter in our path.  Mind you,  they did TELL members not
to give it to  us,  but  unfortunately,  not  all of their members are as
intellegent as their leader Zoth The Frog,  and now we have  a chance for
rebuttle. Oh and, shhhh.. don't tell Zencor!


Z>                                     ZENCOR
Z>                                     ======
Z> 
Z>                   Progenerate Newletter Issue #1 : April 1993
Z>                   ===========================================

     Y'know,  that's  mighty interesting  Zoth.  I  clearly  remember you
lecturing  me on  how our  group was in  it's  infancy,  and  Zencor  was
experienced.  You told me about how Zencor was  King of the  Commodore 64
scene back  in the day and we would  die put up against a group with your
experience and knowledge.  Hrmm.. Issue #1?  Your first newsletter?..  Oh
that's because  you used to teleport  to group members houses right?  Tsk
Tsk.. I'd hate to think you were telling a fib!

Z>                    CiSSD Group Exposed As CanTel Informants!
Z>                    -----------------------------------------
Z>
Z> The Canadian International Society Of Social Deviancy, composed of
Z> Dope Man, Terminator X, and Lister, has been exposed as a group bent
Z> on causing legal troubles for various underground societies, including
Z> ZENCOR.

     Shoot!  How'd you find  out about this one?  BTW: It's  "Society FOR
Social Deviancy", but you don't have times to remember unimportant things
like that, Zoth A Frog.

Z> While Frog was in prison, members of ZENCOR (particularly ShortMan and
Z> Mystic Ruler) became friendly with these so-called hackers, and
Z> disclosed quite a bit of sensitive information to them.

     While  Frog was  in prison?  Oh yeah!  I remember when  you were  in
Juvinile  Hall  having your asshole  reamed*.  BTW,  you're group  wasn't
exactly freindly  with us,  but they  were as  nice as  you could  expect
anyoine to be to their babysitter.  Like you said Zoth A Frog, "They're a
bunch of fucking lamers, and you can babysit them if you want to". Sorry,
we're done babysitting for now.

     Sensitive  information?  Since  when  was your  Ex-Girlfreinds  name
considered  sensitive information?  BTW: She's a wonderful  person..  you
should take her out sometime!

Z> Suspicions on the part of high-level ZENCOR members lead to entry into
Z> the CiSSD VoiceMailBox.

     Suspicions on the part of your high-level Zencor member(s)?  Who are
they?  I mean,  I know there (is one)/(are some),  but who are they,  and
more importantly,  why?  By the way,  you're  the first  person  to  ever
penetrate  our voicemail  box.  I feel so raped.  I'm sure  you know  the
feeling, fluffy.

Z> A number of messages were intercepted and recorded.

     Congratulations.  Which amazing Zencor brand phone did you use to do
it? The 'Super ZencordaPhone II'?  What's the list price on that anyways?
$1580?  Oh. Out of my budget,  but since members pay to be in your group,
they get a 10% discount, right? How do I join?

Z> Amongst these were communications with a CanTel security
Z> officer. Apparantly this pig had apprehended CiSSD members (who were
Z> never overly adept at hacking activities) hacking VoiceMailBoxes for
Z> their own use.

     ... as opposed to for sale to the general public, like yours.

Z> There had been a deal arranged in which CiSSD members
Z> would inform the security officer (known as Bird Of Prey) of other
Z> hacker's activities in exchange for immunity. Frog extrapolates on
Z> this and theorizes, with supportive evidence that the thought-dead
Z> bunch of lamers (YAM) contracted CiSSD to "shut down rival groups".

     Aha!  And what supportive  evidence would  that be?  Really!  Please
write, and let me know.. more than likely this would be based on the same
supportive  evidence  that  showed santa  clause to  deliver presents  by
reindeer rather than via Federal Express.

Z> The following is a transcript of two of the most important messages
Z> intercepted:

     In order to improve readability, I will title them for you.

Message #1:
 
Z> Dope Man, I havn't talked to you in a while, not that I'm sick of you
Z> or anything. I enjoy the conference calling that you guys do. You guys
Z> blend together, did you know that? Here's today's give and take.
Z> Here's my take and I'll give you my give after. I was talking to
Z> someone at Metro 55 division today, fraud, and someone has been
Z> hacking into some additional VMBs, nothing new, but this time leaving
Z> threatening messages to customers. On a tip from Bell Security they
Z> are going to the home of [SHORT MAN]. I don't know if your eyebrows
Z> have lifted or not, but it happens that this guy is also blind. It
Z> happens that this guy is hacking into US networks and has done about
Z> thirty-five thousand in fraud. [SHORT MAN] is going to be in a lot of
Z> shit, the guys in the US want to prosecute. Mabye you want to chat
Z> with him a bit. That's between you and I. I'm gonna give you the VMB
Z> and the password to SATAN and STAR. The conversations you will hear
Z> are the result of me taking back their VMBs, much like I did with you
Z> guys, but these guys aren't as trusting. These guys are on the heavy
Z> metal/drug end from what I can tell.

     Now quickly,  before we go on,  lets take some time  to organize our
minds. What did Bird of Prey say in this message?

     GIVE                               TAKE
     ----                               ----

   - Password to a random Drugee's    - Request for us to talk to
     Voice Mail System.                 Short Man regarding his phone
                                        hacking.

     Shall we go on now then? Good.

Message #2:

Z> Bird Of Prey. Gotta like that. Satan has won the award for the
Z> stupidest non-paying subscriber ever at CanTel. So we've had to rub
Z> him out of the VMB hacking community for good. I was up till 1 last
Z> night, all he did was complain, calling me OPP, Rent-A-Cop, and I
Z> offered many times to do something and he kept saying "What's your
Z> game?". Well, he's toast, so goodbye. The total was about twenty-eight
Z> VMBs.

     Now let's summarize this message.  Bird Of Prey  wipes out the VMB's
belonging  to some hackers  because they wouldn't accept  the new ones he
was trying to give them, and he had to go to bed.

Z> Disgusting, isn't it?

     Oh, I'd say! Gawd forbid he should get some sleep! (?!)

Z> Now then, what is ZENCOR going to do about it?
Z> The following plan has been enacted:
Z> 
Z> 1) The RCMP has been dispatched to shut down all pirate CiSSD BBS
Z>    systems, with ZENCOR-obtained file and user lists, recorded
Z>    conversations and other evidence. All CiSSD computer equipment will
Z>    be confiscated and a number of criminal charges will be laid.

     Oh good!  Call the  police!  That's what  we should  have done,  but
you're the smarter hacking group..  only you would think of bringing  the
Canadian equivelant of the FBI into it!

     Only shutting down  the CiSSD pirate systems?  Oh!  BTW,  which ones
were those again?  If you could  let me know,  we'll  shut them down  for
you.

     Also, seing as you're so adept to taking down Pirate BBS's, I'm sure
that  you'll  have a great time getting access  to any in the next little
while.

Z> 2) CanTel management has been informed of their "double-agent". Bird
Z>    Of Prey will lose his fucking job.

     Well,  actually,  it's not a fucking job,  but coincidentally,  it's
rather close to yonge street.  Either way,  the fucking jobs are best out
on jarvis.. oh.. and watch me shiver as I take you seriously. Unlike you,
Bird of Prey still has a job.

Z> 3) Other groups have been informed of CiSSD's plans to harm them.

     Which would explain why they've been  posting in our network so much
recently.  I await  their  revenge.  BTW:  Are  these  the  plans  you've
SPECULATED we have to harm other groups?  Or  are these  the ones  I keep
hidden in  the cookie  jar,  underneath  the  section  carefully  labeled
'DOUBLE FUDGE' in red ink?

Z> 4) Everyone involved in or connected with CiSSD has been successfully
Z>    CN/Aed and all their personal information is on file.

     Successfully?  Wow!  I'm  impressed.  I was beggining  to think  you
didn't know how to speak to an operator in english.

Z> 5) All ZENCOR systems to which CiSSD has any knowledge has been shut
Z>    down completely.

     Actually, no. Would you like a list?

Z> Furthermore, there will be NO FURTHER fraternization with CiSSD. Frog
Z> warned everyone about this sort of thing!

     Frog  this,   frog  that.   Apparently,  frog  is  a  schizophrenic,
constantly  reffering  to  himself  in  the  third  person,  but  I won't
complain..  as long as  _Zoth A Frog_  doesn't  fraternize with  me,  I'm
happy. Oh wait, did you want the last word? Here you go:

Z> Furthermore, there will be NO FURTHER fraternization with CiSSD. Frog
Z> warned everyone about this sort of thing!

 _Notes:_

 (+) Texts based on  pre-release version of newsletter.  Release  version
     was not avaliable at time of editing.

 (*) See USENet Sex FAQ

                                   ---


                      CiSSD MEMBERSHIP INFORMATION

     With a  large resurganse in  CiSSD activities,  we  have  decided to
begin accepting some members through an application process.  Our commune
is not yet large enough to  accept the masses  without rebellion,  but is
open  enough  to accept  those with  ideas similar to  our own,  and open
minded enough to publish comment from those who are opposed to us. Please
write to annon08ea@nyx.cs.du.edu,  and I will publish your comments,  and
respond to 'letters to the editor.'

     If you are seriously interested in becoming a CiSSD member,  you can
download the  CiSSD  application from  any CiSSD  Headquarters  BBS,  and
upload the completed form,  FAX(NEW!) the form to the CiSSD fax line,  or
send the completed form E-Mail to annon08ea@nyx.cs.du.edu.

     In  addition  to members,  CiSSD will honour  those who have special
achievements,  members,  or non  members alike.  If you know  someone you
believe  to  deserve   CiSSD  recognition,   please  write  to  the  same
address(annon08ea@nyx.cs.du.edu),  leave a message on our voice mail,  or
fax us information on why this person deserves special recognition.

     NOTICE: richfair@eastern.com, mentioned in last issue, has ceased to
exist.  The problem may be temporary,  but the site is not reliable.  Any
letters,  or work that was  sent to  richfair@eastern.com last  month was
lost.     Many     Apologies.     Please     use     Lister's     address
(annon08ea@nyx.cs.du.edu) until our mail problems are rectified.


                                   ---

                        [CiSSD] CONTACT ADDRESSES


                    The Downtown Militarized Zone BBS
                  (416) 450 7087  Sysop - The Dope Man
                        Revival Distribution Site
                            [CiSSD] WHQ/HeLL

                       The Revolutionary Front BBS
                     (416) 936 6663  Sysop - Lister
                        Revival Distribution Site
                            [CiSSD]/HeLL/cDc

                         CiSSD Voice Mail Canada
         (416) 417 0214  Users - Essence - The Dope Man - Lister

                 NEW! -  CiSSD Fax Line - (416) 250 5264
                            c/o The Dictator

   CiSSD Voice Mail BBS - Projected for September 1 1993 (Canada Day)
        (Projected date changed due to geograhical difficulties)

                    Lister - annon08ea@nyx.cs.du.edu

                                   ---

                              ADVERTISMENT:

      ______/\___/\X__  /\______   ___________   _______/\  /\____/\
      \  ____/  __/  /_/ /     /  /     /    _\ /__    _//_/ / ____/
      / _   /  / /  //  / /\  /  / /\  /  __/     /  _/ //  / _   /
     /   \_/  /__  _   /  |/ /  /  |/ /  _/      /  /  _   /   \_/
     \____/_____X_//  /_____/  /_____/ _/       / _/__//  /\____/
                    \/               \/         \/      \/
  ____________________________________________________________________
 -        D         A         M         N         E         D         -
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      Echo of  the  Damned  is currently  looking  for  Nodes in  North
 America [1:2773/NPA.0], and internationally where english is spoken on
 Bulletin Board Systems [CoutryCode:2773/Node.0].

      Echo of  the  Damned  is  dedicated  towards  the  free  flow  of
 information, and productivity in the h/p scene.

      To apply as an  Echo of the  Damned  node,  please leave  a voice
 message, containing your bulletin boards name and telephone number, as
 well   as  the   password   to   an  account  named  'EOTD STAFF',  at
 +1 416 417 0214.
  ____________________________________________________________________
 -                                                                    -
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



                                   ---

                       LAST WORDS FROM THE EDITOR
                               Essence/TX

     I pushed  my luck long  enough.  It was  only a  few weeks,  but  my
parents got sick and tired.  When  sleeping at  home becomes  an optional
extra,  you definately have  family  problems.  Interestingly  enough,  I
enjoyed being  out on my own.  I relied on my parents  for food every few
days when I  needed it;  and if I was  exhausted from  overactivity,  and
unable to sleep in -5c degree weather,  I still had a bed at home where I
could sleep but I  rathered not to.  I was sick of  being at home.  I was
sick of my two parent, boy and girl child,  middle class family.  I hated
the american dream.

     The  dream was  never quite what  the stories tell  you.  Whenever I
showed my love for someone else, they were unresponsive. I gather,  I too
was unresponsive when someone loved me. Whenever there was an argument, I
was  reason and my mother,  or my sister was emotion.  My dad and I never
fight.  He too is reasonable.  He too argues with my mother.  They should
never  have stayed together,  as respectively they are  'bad logic',  and
'bad love'.

     Had they only loosened the noose a little, and let me be me, instead
of  someone  they were  moulding me into,  I might still want  to be with
them; I might still care. But they didn't and I don't. They reach for me,
and I break their hearts.  I don't have time for them,  I need to get out
and be with my freinds.

     Had they only  seen what I  was feeling,  heard what  I was  saying,
known what I knew,  we could still be the american dream.  Sometimes,  to
really love  someone,  you have to let them go.  I guess,  they were only
dreaming. Maybe next time round, they'll listen closer.



                                 CREDITS

The Dope Man        Repeat contributor,  and CiSSD President.  There's no
CiSSD/HeLL          business like .. Show Business.

Lister              Interpersonal  relations and  repeat contributor.  If
CiSSD/HeLL          you like his articles, send him some Vodka.

The Dictator        Repeat offender,  who feels that  political revolt is
CiSSD               payment enough for his writings.

The Grappler        Spreading diatribes to and fro, he's progressing from
CiSSD               the imaginary world of C=64, that so many of us hated
                    to leave behind when we grew up.

Kryten              Contributor who  attends many CiSSD meetings  for the
Independant         free pizza. Gusto's *SUCKS* when it's cold.

City-TV             Thanks for making our release weekend enjoyable. Drop
Chum                by anytime!

Essence/TX          Editor. See you next issue.
CiSSD
-------------------------------------------------------------------------
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY        (C) 1993/94
-------------------------------------------------------------------------