[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: PWN/Part 3 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #35 | Release date : 1991-11-17 | Editor : Dispater
Introduction to Phrack 34Dispater & Crimson Death
Phrack LoopbackPhrack Staff
Phrack Profile of Chris GoggansS. Leonard Spitz
Telenet/Sprintnet's PC Pursuit Outdial DirectoryAmadeus
Sting OperationsSovereign Immunity
Social Security Numbers & PrivacyChris Hibbert
Users Guide to VAX/VMS Part 1 of 3Black Kat
A Beginners Guide to Novell Netware 386The Butler
Auto-Answer ItTwisted Pair
PWN/Part 1Dispater
PWN/Part 2Dispater
PWN/Part 3Dispater
PWN/Part 4Dispater
Title : PWN/Part 3
Author : Dispater
                                ==Phrack Inc.==

                 Volume Three, Issue Thirty-five, File 12 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN           Issue XXXV / Part Three           PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Prodigy Stumbles as a Forum...Again
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Mike Godwin (Electronic Frontier Foundation)

     On some days, Prodigy representatives tell us they're running "the Disney
Channel of online services."  On other days the service is touted as a forum
for "the free expression of ideas."  But management has missed the conflict
between these two missions.  And it is just this unperceived conflict that has
led the B'nai B'rith's Anti-Defamation League to launch a protest against the
online service..

     On one level, the controversy stems from Prodigy's decision to censor
messages responding to claims that, among other things, the Holocaust never
took place.  These messages--which included such statements as "Hitler had some
valid points" and that "wherever Jews exercise influence and power, misery,
warfare and economic exploitation ... follow"--were the sort likely to stir up
indignant responses among Jews and non-Jews alike.  But some Prodigy members
have complained to the ADL that when they tried to respond to both the overt
content of these messages and their implicit anti-Semitism, their responses
were rejected by Prodigy's staff of censors.

     The rationale for the censorship?  Prodigy has a policy of barring
messages directed at other members, but allows messages that condemn a group.
The result of this policy, mechanically applied, is that one member can post a
message saying that "pogroms, 'persecutions,' and the mythical holocaust" are
things that Jews "so very richly deserve" (this was an actual message).  But
another member might be barred from posting some like "Member A's comments are
viciously anti-Semitic."  It is no wonder that the Anti-Defamation League is
upset at what looks very much like unequal treatment.

     But the problem exposed by this controversy is broader than simply a badly
crafted policy.  The problem is that Prodigy, while insisting on its Disney
Channel metaphor, also gives lip service to the notion of a public forum.
Henry Heilbrunn, a senior vice president of Prodigy, refers in the Wall Street
Journal to the service's "policy of free expression," while Bruce Thurlby,
Prodigy's manager of editorial business and operations, invokes in a letter to
ADL "the right of individuals to express opinions that are contrary to personal
standards or individual beliefs."

     Yet it is impossible for any free-expression policy to explain both the
allowing of those anti-Semitic postings and the barring of responses to those
postings from outraged and offended members.  Historically, this country has
embraced the principle that best cure for offensive or disturbing speech is
more speech.  No regime of censorship--even of the most neutral and well-
meaning kind--can avoid the kind of result that appears in this case: some
people get to speak while others get no chance to reply.  So long as a board of
censors is in place, Prodigy is no public forum.
        
     Thus, the service is left in a double bind.  If Prodigy really means to be
taken as a computer-network version of "the Disney Channel"--with all the
content control that this metaphor implies--then it's taking responsibility for
(and, to some members, even seeming to endorse) the anti-Semitic messages that
were posted.  On the other hand, if Prodigy really regards itself as a forum
for free expression, it has no business refusing to allow members to respond to
what they saw as lies, distortions, and hate.  A true free-speech forum would
allow not only the original messages but also the responses to them.

     So, what's the fix for Prodigy?  The answer may lie in replacing the
service's censors with a system of "conference hosts" of the sort one sees on
CompuServe or on the WELL.  As WELL manager Cliff Figallo conceives of his
service, the management is like an apartment manager who normally allows
tenants to do what they want, but who steps in if they do something
outrageously disruptive.  Hosts on the WELL normally steer discussions rather
than censoring them, and merely offensive speech is almost never censored.

     But even if Prodigy doesn't adopt a "conference host" system, it
ultimately will satisfy its members better if it does allow a true forum for
free expression.  And the service may be moving in that direction already:
Heilbrunn is quoted in the Wall Street Journal as saying that Prodigy has been
loosening its content restrictions over the past month.  Good news, but not
good enough--merely easing some content restrictions is likely to be no more
successful at solving Prodigy's problems than Gorbachev's easing market
restrictions was at solving the Soviet Union's problems.  The best solution is
to allow what Oliver Wendell Holmes called "the marketplace of ideas" to
flourish--to get out of the censorship business.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Computer Network to Ban 'Repugnant' Comments
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Washington Post

     Prodigy has been charged with allowing "antisemitic slurs" to run on its
network.  Prodigy officials said they would *not* censor discussion of
controversial subjects, such as the one that has been raging over the net for
several months -- whether the Holocaust was a hoax.

     The controversial message that was labeled "repugnant" included the
statements: "Hitler had some valid points...", and "...whenever Jews exercise
influence and power, misery, warfare and economic exploitation [are the
result]".  There were six other messages that the Anti-Defamation League of
B'nai B'rith are complaining about.  The Hitler message was not available to
all subscribers, it was just personal mail between users.  The person who
received the mail brought it to the ADL's attention.

     Civil liberties groups have compared computer networks to telephone
companies, which do not censor calls.  However, Prodigy officials object to
that analogy, saying it is more like a newspaper, and that Prodigy must judge
what is acceptable and what is not, much as a newspaper editor must.

     Prodigy officials take the position of, and I quote, "we were speaking in
broader terms ... we were focused on the broad issue of free expression".
_______________________________________________________________________________

More on Proctor & Gamble                                        August 15, 1991
~~~~~~~~~~~~~~~~~~~~~~~
by Randall Rothenberg (New York Times)
Further Reading:  Phrack Inc., Issue 33 , File.12, "Proctor & Gamble"

     Law-enforcement officials in Ohio have searched the records of every
telephone user in southwestern Ohio to determine who, if anyone, called a Wall
Street Journal reporter to provide information that Proctor & Gamble said was
confidential and protected by state law.
        
     The investigation goes far beyond examining the telephone records of
current and former employees of the giant consumer products company, an inquiry
the Hamilton County prosecutor's office confirmed on Monday.  The Journal
reported the scope of the investigation Thursday.

     The prosecutor, Arthur Ney Jr., acting on a complaint by Procter & Gamble,
ordered Cincinnati Bell to turn over all the telephone numbers from which
people called the home or office of the reporter, Alecia Swasy, from March 1 to
June 15.

     The situation began sometime before June 17 when Procter & Gamble, which
makes Tide detergent, Crest toothpaste and other familiar supermarket products,
asked the Cincinnati police to determine whether current or former employees
were leaking confidential corporate information to The Wall Street Journal.

     On Monday the newspaper reported that the company had been bothered by two
news articles published on June 10 and June 11 written by Ms. Swasy, a reporter
based in Pittsburgh who covers Procter & Gamble.  The articles cited
unidentified sources saying that a senior executive was under pressure to
resign from the company, and that it might sell some unprofitable divisions.

     But a spokeswoman for Procter and Gamble, Sydney McHugh, said Thursday
that the company "had been observing a disturbing pattern of leaks" since the
beginning of the year.  She refused to elaborate, but said the decision to
pursue legal action was reviewed at several levels in the company and was made
by Jim Jessee, a corporate security officer.

     Two Ohio statutes protect the unauthorized disclosure of trade secrets.
One makes it a felony to transmit formulas, customer lists or other tangible
pieces of information that would be valuable to a company and its competitors.
But another, broader law makes it a misdemeanor to disclose "any confidential
matter or information" without the company's consent.

     The Cincinnati police approached the Hamilton County prosecutor's office,
which sought and received from a grand jury a subpoena for telephone records.

     A copy of the subpoena, dated June 17, was given to The New York Times by
someone involved in the case who insisted on anonymity.  The subpoena ordered
Cincinnati Bell to "identify all (513) area code numbers that have dialed" Ms.
Swasy's home or office telephones in Pittsburgh during an eight-week period
that started on March 1.

     Cincinnati Bell serves 655,297 telephone numbers in the 513 area code, in
an area covering 1,156 square miles, said Cyndy Cantoni, a spokeswoman for the
company.  In the company's entire jurisdiction, which also covers parts of
Kentucky and Pennsylvania, about 13 million toll calls are placed in an average
month, she said.

     Ms. Cantoni said she could not comment on what Cincinnati Bell turned over
to the authorities, but said the company routinely complied with subpoenas.
Under normal procedure, the company's computers would have automatically
searched its customer list and printed out only the originating numbers, and
not the names or addresses, of calls to Ms. Swasy's numbers, Ms. Cantoni said.

     The Wall Street Journal, which is published by Dow Jones & Co., reported
on Monday that neither Ms. Swasy nor executives at the Journal were informed of
the subpoena by the authorities.

     Neither Terry Gaines, a first assistant prosecutor, nor Ed Ammann, a
police department colonel involved with the investigation, returned repeated
calls to their offices.

     Alan F. Westin of Columbia University, an authority on technology and
privacy issues, said the legality of the Ohio authorities' search for the
Procter & Gamble whistleblower may depend on how the investigation was pursued.

     If Procter & Gamble turned over the names and phone numbers of present and
former employees to the police and the police matched that list against the
numbers they were given by the telephone company, the rights of other,
uninvolved parties may not have been violated, Westin said.  But if the police
learned the names of people unaffiliated with Procter & Gamble who called the
Journal's reporter, he said, or if they turned over a list of numbers to
Procter & Gamble for research, some Ohio residents' Fourth Amendment
protections may have been sullied.

     "When technology allows you to run millions of calls involving 650,000
telephone subscribers through a computer in order to identify who called a
person, potentially to find out whether a crime was committed, you raise the
question of whether technological capacity has gone over the line in terms of
what is a reasonable search and seizure," Westin said.
_______________________________________________________________________________

Expert Fraud Shares Tricks of His Trade                         October 7, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Bob Reilly (New York Times)

     PHOENIX -- A freelance writer didn't think the $333 that Forbes magazine
paid him for a one-page article was enough money so he used his personal
computer to duplicate the check in the amount of $30,000.  And, the check
cleared.

     A handyman fixes a bedroom window and gets paid by check.  The handyman
copies down the homeowner's bank account number, name, address and check number
sequences and sends $4.95 to a company that prints fancy colored checks.  The
handyman masters the homeowner's signature and then proceeds to cash the checks
after they arrive.

     American Express and Mastercard traveler's checks are duplicated on a
colored photostat machine and spent in hotels and restaurants.

     A man rents a banquet room in a hotel for $800 and gets the bill in the
mail a few days later.  The man sends in a check for $400 with the notation
"paid in full" written in the lower left-hand corner.  The hotel cashes the
check and sends a notice to the man saying $400 is still owed.  The man refuses
to pay the $400 and wins in court because the law says by cashing the check the
hotel conceded the debt was paid.

     White-collar crime amounts to more than $50 billion a year, said Frank
Abagnale, who cited the examples at a business-sponsored seminar in the Phoenix
Civic Center.  By contrast, bank robbers, who get most of the media attention,
abscond with a paltry $450 million, he said.

     Abagnale is said to have conducted scams and frauds in 26 nations.  Known
as "The Imposter," he now advises government and industry.  He says he served
six years in jail in France, Sweden and the U.S. for his crimes, which included
writing bad checks for more than $2.5 million.

     "As technology improves, so does the ability to commit fraud," said
Abagnale.

     He claims that at 16 he impersonated an airline pilot, at 18 was a chief
resident pediatrician in a Georgia hospital, at 19 passed the Louisiana state
bar exam and served as an assistant attorney general for the state.

     Abagnale also claims he never flew an airplane or treated a patient but
along the way used false names to get jobs and pass bad checks.  He claims he
even got a job at age 20 teaching sociology at Brigham Young University,
beating out three Ph.D.s for the job.

     "I was always just one chapter ahead of the class," he said.  Demeanor,
style, confidence, clothes and the overt display of wealth also help the con
man, Abagnale said.
        
     Abagnale claimed he got one teller to cash a napkin because he drove up to
the bank in a chauffeur-driven Rolls Royce and entered wearing a $600 suit and
all the confidence of a billionaire.  The feat was recorded for television by
CBS, he said.

     Another time he supposedly put the numbers of the bank account he was
using on a bunch of deposit slips, placed the deposit slips in a bank for
public use, and in one day alone more than $40,000 was deposited into his
account by unsuspecting customers who picked up his slips because they had
either run out of their own or hadn't yet got their own deposit slips.
  
     Abagnale asserted that there are several ways to discourage fraud, 
including:

       -- Use checks that are impossible to duplicate on a home computer.
       -- Don't cash checks that don't have at least one rough edge.
       -- Scan travelers checks by looking for impossible to reproduce
          pictures or symbols that can only be seen at eye level or by
          wetting the back, left-hand side of an American Express traveler's
          check, which will smudge if it is authentic.

     Abagnale is known as the author of a book called "Catch Me If You Can."

     "I always knew I would eventually get caught," he said.  "Only a fool
believes he won't.  The law sometimes sleeps, but it never dies."

     Abagnale claimed he started a life of crime when his parents divorced and
he was forced to choose between living with his mother or father.  He said he
couldn't make the choice and ran away.
_______________________________________________________________________________
       
Dumb Jocks Learn First Lesson of Phreaking                     October 17, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Associate Press

     Four current Ball State University basketball players have admitted to
investigators that they charged a total of $820.90 in unauthorized long
distance calls. School officials announced the preliminary findings in the
first phase of their report the the NCAA.  What the investigators found, in
regards to the unauthorized calls, was the following information:

Person             Yr   Calls  Cost
~~~~~~~~~~~~~~~~ ~~~  ~~~~~  ~~~~~~~
Jeermal Sylvester  Sop  255    $769.93
Chandler Thompson  Sen  28     $ 45.14
Michael Spicer     Sen  3      $  4.43
Keith Stalling     Sen  1      $  1.40

     Investigators reported three of the men said former players had provided
the long distance credit card numbers or authorization codes on which the calls
were made.  The fourth player Keith Stalling, could not explain how his call
had been charged to the university.  Head basketball coach Dick Hunsaker
reiterated that neither he nor the coaching staff had made available the
numbers that were assigned to the coaches.

     "When this problem was first discovered back in August, it came as a shock
to me," Hunsaker said.  "I'm disappointed with the judgement of the players
involved, but I'm glad we're getting to the bottom of it quickly and clearing
it up before the season starts."

     "Our attention now will focus on former players and other people not
connected with the basketball program who might have used the same credit cards
and access numbers," said the university's auditor.  The investigation that
began in August was conducted by the Ball State university's auditor and
Department of Public Safety.  The investigation started one week after a
routine review of telephone records by athletic department officials.  At the
time, investigators said the total cost of the unauthorized calls was in the
thousands of dollars.
_______________________________________________________________________________

Silicon Government in California                               October 28, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From UPI Sacramento

     California unveiled an easy-to-use computer system Wednesday that is
designed to tell people about such topics as statewide job openings, where
parents can find child care and how to re-register a car.

     Officials described the experimental "Info/California" program as an
information-dispensing version of an automatic teller machine at a bank.  It
will operate in Sacramento and San Diego as a pilot project for the next nine
months.

     Users will obtain free information on a variety of state services as they
touch the television-like computer screen to evoke an on-screen narration and
color graphics in English, Spanish and potentially other languages.

     "It literally puts state government at our fingertips," a computerized
image of Gov. Pete Wilson said at a Capitol news conference.
    
     Secretary Russell Gould of the Health and Welfare Agency said the system
may be especially useful to announce job openings as the economy rebounds from
the recession. Job-seekers will need a fourth-grade literacy level to use the
machine, which will refer them to Employment Development Department offices for
follow-up.

     Director Frank Zolin of the Department of Motor Vehicles said the system
will benefit 20 million drivers who want vehicle registration renewals, vanity
license plate orders and faster service.

     John Poland, Central California manager for IBM -- the state's partner in
the project -- said that besides telling the public about job opportunities, it
will allow Californians to order birth certificates and get information about
education, transportation, health and welfare at more than one site.

     During the nine-month trial, people will use the system at 15 kiosks in
Sacramento and San Diego that will be similar to, and eventually integrated
with, local system kiosks such as those in the courts in Los Angeles and Long
Beach, and for community services in San Diego and Tulare counties.

     Info/California was authorized under 1988 legislation. It is based on an
experimental touchscreen network in Hawaii that 30,260 people used over a six-
month period.

     The state spent about $300,000 on the project, and IBM invested about $3
million to develop the technology.  By performing functions now done by humans,
the system may ultimately replace some state workers and produce cost savings
for taxpayers.

     "We're working smart here," Gould said.  "This may diminish some of the
need for new state workers."
_______________________________________________________________________________

Digital Tapes Deal Endorsed by Music Industry                  October 30, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From (Congressional Monitor)

     Record industry executives joined with retailers and consumer groups in
endorsing legislation (S 1623) that would pave the way for widescale
introduction of digital audio tapes into the U.S. marketplace.

     For the first time, consumers would be allowed to legally make copies of
prerecordings for home use.

     The agreement would allow artists, songwriters, and record companies to
collect royalty fees on the sale of blank tapes and digital audio recorders.

     In addition, an electronics chip will be placed in the recorders to
prevent anything other than the original recording to be copied.

     In testimony before the Senate Judiciary Committee's Subcommittee on
Patents, Copyrights, and Trademarks, pop star Debbie Gibson said that many
artists had been concerned that digital copying could spell the end of a
profitable music industry.

     Unlike conventional tapes, digital audio recorders allow consumers to make
a perfect copy of a prerecording.  The record industry says it already loses $1
billion a year in sales due to illegal copying.  And, the industry says,
unchecked digital technology would dramatically increase that figure.

     Electronics manufacturers and retailers won the assurance that they will
not be sued for copyright infringement due to the sale of blank tapes or
recorders.
_______________________________________________________________________________

Computer Cryptography:  A Cure For The Common Code
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     Anyone can sign a postcard, but how do you sign a piece of electronic
mail?  Without a "signature" to demonstrate that, say, an electronic transfer
of funds really comes from someone authorized to make the transfer, progress
towards all-electronic commerce is stymied.  Ways of producing such signatures
are available, thanks to the technology of public-key cryptography.  They will
not work to everyone's best advantage, though, until everyone uses the same
public- key system.

     It is an obvious opportunity for standards-makers -- but in America they
have turned up their noses at all the variations on the theme currently in use.
The alternative standard for digital signatures now offered by America's
National Institute of Standards and Technology (NIST) has brought a long-
simmering controversy back to the boil.

     Public-key cryptography could become one of the most common technologies
of the information age, underpinning all sorts of routine transactions.  Not
only does it promise to provide the digital equivalent of a signature, it could
also give users an electronic envelope to keep private messages from prying
eyes.  The idea is to create codes that have two related keys.  In conventional
cryptography the sender and receiver share a single secret key; the sender uses
it to encode the message, the receiver to decode it.

     In public-key techniques, each person has a pair of keys: a disclosed
public key and a secret private key. Messages encoded with the private key can
only be decoded with the corresponding public key, and vice versa.  The public
keys are published like telephone numbers. The private keys are secret.  With
this technology, digital signatures are simple. Encode your message, or just
the name you sign it with, using your private key.  If the recipient can decode
the message with your public key, he can be confident it came from you.
Sending a confidential message -- putting electronic mail in a tamper-proof
envelope -- is equally straightforward.

     To send a secret to Alice encode it with her public key.  Only Alice (or
someone else who knows her private key) will be able to decode the message.
The heart of any system of public-key cryptography is a mathematical function
which takes in a message and a key, and puts out a code.  This function must be
fairly quick and easy to use, so that putting things into code does not take
forever.  It must be very hard to undo, so that getting things out of code does
take forever, unless the decoder has the decoding key.  Obviously, there must
be no easy way to deduce the private key from the public key.  Finding
functions that meet these criteria is "a combination of mathematics and
muddle," according to Roger Needham of the Cambridge Computer Laboratory.

     The greatest successes to arise from the muddle so far are those using
functions called prime factorisation algorithms.  They are based on the
mathematical insight that, while it is easy to multiply two numbers together,
it is very hard to work backwards to find the particular two numbers which were
multiplied together to produce some given number.  If Alice chooses two large
prime numbers as her private key and publishes their 150-digit product as her
public key, it would probably take a code-breaker thousands of years to work
backwards to calculate her private keys.

     A variety of schemes have been worked out which use this insight as the
basis for a workable public-key code.  Most popular of these is the so-called
RSA algorithm, named after the three MIT professors who created it -- Ronald
Rivest, Adi Shamir and Len Adleman.  It has been patented and is sold by a
Silicon Valley company, called RSA, that employs 15 people, most of them ex-MIT
graduate students.  Faculty firms are to computer start-ups what family firms
were to the industrial revolution.  RSA has attracted both academic praise and
a range of heavyweight commercial customers: Microsoft, Sun Microsystems,
Digital Equipment and Lotus Development. But, despite repeated applications, it
has never been endorsed by those in government.  Rumors abound that the
codebreakers in the National Security Agency have discouraged standard-setters
from recommending RSA because they do not want to promote the use of codes they
cannot break.  RSA, for obvious reasons, does not discourage the rumors.
Whatever the reason, the standard-setters at the NIST have sidestepped the
debate over RSA with their new algorithm, DSA.  As set out in the standard, DSA
verifies the identity of the sender, but does not encrypt the message.  It
appends to the message a number calculated from the message and the sender's
private key.  The recipient can then use this number, the message and the
sender's public key to verify that the message is what it seems.

     The NIST says that this technique is well suited to "smart cards" and
other applications where there is not a lot of computing power available for
working out codes.  Because it hopes that DSA will be used for verifying the
identity of everyone from welfare recipients to military contractors, its
flexibility is a boon.  Meanwhile, however, more and more companies are
choosing a public-key cryptography system for communicating confidentially --
often RSA, sometimes something different. Someday, probably soon, governments
will want to choose, too.  Watch out for fireworks when they do.
_______________________________________________________________________________

SWBT Sends Off First "Cross-Country" ISDN Call
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Southwestern Bell Telephone

     The nation's first "cross-country" public network ISDN was placed last
week, courtesy of SWBT.  The historic first call was the result of a two-year
joint effort among SWBT, BellSouth Corp., US Sprint and Bellcore.  SWBT's
Advanced Technology Lab originated the call, which used US Sprint's digital
facilities in Burlingame, Calif.  The call terminated at a BellSouth switch
in Atlanta, Ga.

     Using an ISDN video application, SWBT's trial director Ken Goodgold was
able to see and talk to BellSouth's David Collins.  "With this test, the
geographic limits of ISDN-based services were stretched from a few miles to
cross-country," Goodgold says.  "We began with protocol testing and service
verification, two key parts of the process," Goodgold says. "That required an
extremely complex series of technical tests.  The Advanced Technology Lab staff
worked for months performing the tests leading up to the first successful
call."

     Last week's test call was significant from a marketing perspective as well
as a technical one.  That's because it demonstrated the economic benifits of
using ISDN for video information.  "The cost of a long distance call is
approximately the same, whether it's a voice transmission using a regular phone
line or a video transmission using ISDN," Goodgold says. "That means a big
reduction in cost to arrange a videoconference." US Sprint joined the test
because ISDN has evolved beyond the local stage, says Terry Kero, the carrier's
director of InfoCom Systems Development Labs.  "After today, it will be
technically possible to make an ISDN call across the country just as it is
possible today to make a regular long distance call," Kero says.
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.