-------------------
                                      POLICE NET
              A network serving the Law Enforcement community world-wide
                                  -------------------
       


       

                                          By
                                    Joseph Gaspard


                                   With additions by
                                     Brian Roberts















                             Copyright 1991 by POLICE NET




                                   TABLE OF CONTENTS





                    File List.........................................2


             I.     Introduction......................................2



             II.    What is a Network.................................4
                            General Membership Requirements...........4
             III.   Software Requirements.............................5
                            Archiving.................................5
                            Mailers...................................5
                            Node lists and compilers..................6
                            Tossing Utilities.........................7
                            Disk Maintenance..........................8
             IV.    General Setup.....................................9
                            Modem.....................................9
                            DOS......................................10
                            Nodelist Compilers.......................11
                            Fossil Drivers...........................13
                            Batch File...............................14
                            Front Door...............................17
                            Mail Tossers.............................23

             V.     Getting Help.....................................24

             VI.    Applying For a Node Number.......................25

             VII.   Rules and Regulations............................26
                            Standards................................26
                            Echo Mail................................26
                            Security.................................27
                            Violations/Appeals.......................28


                    Epilogue.........................................29








                                         - 1 -




                                    FILES INCLUDED 

             POLICE.DOC    Software setup, Policies and operations  guide. 
             AREAS.COP     Echoes currently available on POLICE NET.
             NODELIST.XXX  The current Nodelist.
             README.1ST    Any changes since this was written.
             -------------------------------------------------------------

             To print a copy of this documentation, enter COPY  POLICE.DOC 
             PRN at the DOS prompt. This file may be distributed freely to 
             anyone  interested  in joining the network, but  may  not  be 
             altered  in  any way.  For the most current  version  of  the 
             documentation and support files, please call ROBOCOP BBS, San 
             Diego, CA. (619) 299-0351 ( Node 1:202/1, POLICE NET ).


                                     INTRODUCTION


                 Welcome to POLICE NET!  Brian and I have put this package 
             together in order to give you some answers to the most common 
             questions,  and  to give you a better understanding  of  what 
             will  be required for you, the Law Enforcement BBS Sysop,  to 
             join this exciting new service.  Once a member,you will be  a 
             part  of  a growing system of BBSs dedicated  to  Police  and 
             emergency  personnel, all linked by a series  of  conferences 
             "echoed" throughout the Network.  Your users will be able  to 
             share  ideas and information with other officers from  across 
             the Country, and eventually, around the World.
                 Membership  in POLICE NET is free.  You will  incur  some 
             expense  when registering some of the required software  and, 
             depending  on  your location, when tossing  mail  packets  by 
             telephone.   Please review the RULES section  for  additional 
             details.
                       POLICE  NET Started as a mail-toss project  between 
             ROBOCOP BBS, the founder , and L-E BBS ONLINE (Obviously  the 
             co-founder!).  We discovered each other quite by accident.  I 
             had  been actively seeking other Law Enforcement BBSs to  get 
             ideas  from, but very few of them advertised.  When  I  first 
             started  to  Log onto L-E BBS as a user, I told Brian  of  my 
             idea  to  network Police BBSs in the same way that  Fido  Net 
             does with civilian boards.  We became partners in the project 
             almost immediately, and began the task of learning everything 
             we  could  about  forming  a  network,  and  setting  up  the 
             software.   On April 15, 1991, POLICE NET became  a  reality, 
             linking  the  two primary Law Enforcement BBSs in  San  Diego 
             County together for the first time.



                                         - 2 -




                 It  has  been  a learning  experience,  believe  me!   We 
             suffered  many set backs in trying to get the software to  do 
             the  impossible, before we saw any progress.  To top  it  all 
             off, we both use completely different types of BBS  software. 
             ROBOCOP  is  a Quickbbs system, while Brian's  L-E  BBS  uses 
             Wildcat.   It  was  difficult to teach  each  other  anything 
             useful that could apply to both systems, but we managed,  and 
             here we are!  Now it's your turn.
                  
             This  documentation is meant to provide a simple overview  of 
             the  software  that will be required to handle  mail  tossing 
             automatically,  a  basic guideline for setup, and  the  rules 
             governing  membership  in POLICE NET.  In my travels  with  a 
             modem, I have discovered an unlimited amount of BBS software, 
             so I won't address too many specifics there, but I will point 
             out   some  important  things  to  look  for  in   your   own 
             documentation.   Most of the recommended software  listed  in 
             chapter  IV comes with documentation of  varying  simplicity, 
             and  with  a  few tricks, you should be  able  to  get  those 
             programs  going  fairly quickly.  We'll try  to  address  the 
             problem areas the best we can.
                  
             In  order that we keep this manual current, we would like  to 
             ask  you to note any problems not addressed here in an  ASCII 
             text file, and forward it to us.  We will try to keep up with 
             as many major software releases and problems associated  with 
             them,  so  that  new  members can benefit  from  all  of  our 
             collective  hair-pulling!  Most, if not all of  the  software 
             mentioned here is available on both founding boards,  however 
             long distance callers may want to search their area first, as 
             many  of the files are quite large, and would cost a  bit  to 
             download.

              
             Good luck getting started!  

             -Joseph Gaspard













                                         - 3 -




                                  WHAT IS A NETWORK?


             A  network  is a group of independent systems  that  share  a 
             message  base or group of message bases in addition to  their 
             existing "local" ones.  Thus, a member of one system can dial 
             his  local board, and read or write messages to other  people 
             in  other  systems,  regardless of  their  location,  without 
             having  to make multiple or long distance phone  calls.   The 
             user  enters the message in the network section of your  bbs, 
             and  logs off.  At a specific time (Zone Mail Hour, or  ZMH), 
             your  system automatically packs all the new messages in  the 
             network areas using a file compression archive such as PKZIP, 
             dials a hub system, sends the packet and picks up any waiting 
             mail.   If everything is setup properly, your  computer  will 
             automatically unpack the new messages, and place them in  the 
             proper message base.  Once all the software is in place,  the 
             Sysop need do nothing to make all of this happen.

                  The  message bases that are "tossed" in this manner  are 
             called   "ECHOES".   They  are   basically   subject-specific 
             conferences  that are monitored by a moderator, in  order  to 
             keep  them  on-track and on the subject.   Any  participating 
             system  can create an echo, but must also be responsible  for 
             the  moderator as well (see the Rules section for  details!).  
             By  nature, echo mail is "public" mail.  That is, you  cannot 
             enter  a private note to someone in the network.  The  reason 
             is  simple:   Why should us poor Sysops pay to  toss  private 
             mail (grin)?
                  There are two basic groups of echoes available in POLICE 
             NET.  Group  S  echoes  are  restricted  to  Law  Enforcement 
             personnel,  while group G echoes can be open to civilians  as 
             well.  Members can choose not to carry an echo or a group  of 
             echoes, and are only required to carry the echo "Sysop NET".

                  POLICE NET has a few requirements of systems wanting  to 
             become part of the network:
                       1.  You  must be a Law Enforcement or EMT  BBS,  or 
             offer  secure  message areas for Law  Enforcement.   You  may 
             allow  civilians  on  your  system, but  MUST  abide  by  the 
             security arrangements provided for the network.
                       2.  You must be able to toss mail at baud rates  at 
             or  above 2400 baud.  The network standard is currently  true 
             9600 V.32/V.42, but we will also support 9600 HST by the  end 
             of May, 1991.
                       3.  You must apply for a node number following  the 
             procedures outlined in chapter VII.



                                         - 4 -




                                 SOFTWARE REQUIREMENTS

             We  assume that you already have your BBS in place on  a  IBM 
             based  system, and running from a batch file.  Hopefully  you 
             have  some  knowledge  of errorlevel calls  and  other  batch 
             conventions, and are using MS DOS version 3.3 or higher.
                  There  are  several programs you will need in  order  to 
             send  and  receive  mail packets, pack and  unpack  mail  and 
             maintain  your message bases.  We will try to break down  all 
             of  these  programs in some sort of logical order,  but  read 
             through  the  setup chapter before you log on to  your  local 
             guru board and perform file rape! 

             ARCHIVE PROGRAMS:

                  We  urge you in the STRONGEST possible terms to  collect 
             every  compression  program  that  exists!   Most  front  end 
             mailers  will  detect  a type  of  compression  program,  and 
             attempt  to  unpack your mail using that  software.   If  you 
             don't have that program, you'll get a nasty surprise the next 
             morning!   Dump all of the archivers into one directory,  and 
             make sure the path statement in your AUTOEXEC.BAT lists  that 
             directory.   The  following  is a list  of  the  most  common 
             programs, by their extension names:

                          .ZIP    .ZOO    .LHA    .LZH   .ARC

                   POLICE  NET uses the convention PKZIP by default.   You 
             should  use this to make outbound packets.  You  may  request 
             that  all packets sent to you be done in another format  when 
             you  apply for a node number, but all outbound mail  must  be 
             "Zipped".

             THE FRONT END MAILER:

                  The  front  end mailer manages your entire  system.   It 
             controls  all internal and external events,  detects  inbound 
             and outbound mail, dials and sends packets and files, detects 
             "human" callers and passes them off to your BBS program,  and 
             is  always "up".  It is completely automated and so the  most 
             complicated program in your system.  More than one Sysop  has 
             commented to me that it was easier to set up their BBS than a 
             mailer!
                  
                   In spite of the claims you'll find in the documentation 
             of   the  majority  of  the  available  mailers,   most   are 
             notoriously buggy.  Many, such as Binkley Term, use  outdated 
             control files with documentation that leave a lot of the  set 
             up  to your imagination.  That is why we recommend  only  one 
             type of front end mail program:  

                                   FRONT DOOR 1.99c.



                                         - 5 -




                  Front Door uses a setup program with pull down menus  to 
             walk you through the process.  It has a full featured editor, 
             a  simple communications terminal, and I have not  found  any 
             significant  bugs in the software.  The documentation gets  a 
             bit  confusing in some places, but we will try to cover  many 
             of those in the Setup chapter.  Front Door is offered free of 
             charge by the program's author.

             NODELIST MAINTENANCE:

                  A  nodelist is a simple file that  contains  information 
             about each member system in the network.  In it's raw form it 
             is merely an ASCII text file.  In order for the mailer to use 
             the information in the file it must be processed into a  data 
             base  format.   Front  Door uses the  processed  nodelist  to 
             determine who to send mail to, what phone number to dial, and 
             who  the Sysop of that system is.  Thus, it is  important  to 
             keep your nodelist up to date.  Front Door will not even  run 
             without  a processed nodelist on file!  We have included  the 
             most recent nodelist in this package, but remember to use the 
             new list available AFTER you have been accepted into the net, 
             as it will have your system listed.
                  There  are two programs we use to process the  nodelist.  
             They must be run in order:

             PARSELST            Run this one first.
             FDNC                Run this one after Parselst.

             When you get a new nodelist, you can run a simple batch  file 
             from  your  nodelist directory (see Front Door in  the  Setup 
             chapter) to process it into usable form:

                                 ECHO OFF
                                 CLS
                                 cd \FD\NODELIST
                                 del *.fd* *.idx *.dat *.bak
                                 PARSELST
                                 FDNC /f
                                 copy nodelist.bbs f:\quickbbs
                                 del nodelist.bbs


             Both  programs have to be configured using a  simple  control 
             file.  More on that in the Setup chapter.






                                         - 6 -




                                     MAIL TOSSING:
                  
             A front end mailer doesn't actually touch your message  base.  
             It relies on support programs called "tossers" to pack/unpack 
             mail,  delete  duplicate messages, reorganize the  last  read 
             pointers,  and  place the new messages in  the  right  place.  
             When  set up correctly, all this will  happen  automatically, 
             and all you will have to do from now on is read the mail!
                  
             Unfortunately  for some of you, our experience is limited  to 
             Quickbbs  message  base  systems.   Brian's  Wildcat  uses  a 
             support  program to convert selected folders in  the  Wildcat 
             message base to Quickbbs format to be tossed by the  programs 
             listed  below.  I, of course run a Quickbbs system.   If  you 
             don't run either types of BBS software, our best advice is to 
             find  a local Fido Net system that operates the same type  of 
             software  as you do, and pick their brains.  We'll  help  you 
             figure  it all out and include it in this manual in the  next 
             release.                                             
                  
             There  are two programs that we have found to toss to/from  a 
             Quickbbs message base system:

             TOSSCAN      The fastest and easiest.
             QNET_265     A little more complex to set up, but also good.

             Both  programs come with various utilities for  cleaning  and 
             packing  your  message base, deleting old messages,  etc.   I 
             highly recommend using these utilities after ZMH, and  before 
             any disk maintenance.

             ------------------------------------------------------------
                                       -WARNING-

             It is highly recommended that you make back up copies of your 
             current message base and put them in a safe place BEFORE  you 
             start  experimenting with any "kill" switches found in  these 
             utilities, or you may end up with an empty message base!
             ------------------------------------------------------------

             The  program that Brian uses to convert Wildcat  messages  to 
             Quickbbs data base files is called:

                                        Q2W_W2Q
             FOSSIL DRIVERS:

                  Most BBS programs require some sort of fossil driver  to 
             keep track of the carrier signal.  We suggest the following:

                                     BNU or X00124




                                         - 7 -




                                   DISK MAINTENANCE:

             While  this  subject doesn't deal directly with  operating  a 
             network  system,  it  is  an important  part  of  your  daily 
             maintenance  routine.  Disk fragmentation becomes a  critical 
             cause  of  system  failers, or crashes,  as  you  place  more 
             demands on your storage area.  Since you will be reading  and 
             writing  to disk more often, deleting and adding messages  in 
             different locations on the disk, and accessing various  files 
             more  often, it becomes very important that you "plug up  the 
             holes",  so  to  speak, by  running  a  disk  defragmentation 
             program.   If  you haven't been doing so, you  will  probably 
             notice a significant decrease in access time to the disk, and 
             an  increase in available disk space the first time  you  run 
             the program.
                  There  are  a  couple  of dozen  such  programs  on  the 
             commercial  market.   We recommend two  of  those  commercial 
             programs, as being the fastest and most trouble free.  I have 
             yet  to  find  a  Shareware  program  that  compares  to  the 
             following software:

             NORTON SPEED DISK    Available in the Norton Integrator.

             PCTOOLS COMPRESS     Available in Pctools.

             Both are excellent investments, and are found in almost every 
             software  store.  We advise running either program from  your 
             nightly  maintenance batch file, using the  "auto"  switches.  
             This should be the LAST ITEM OF MAINTENANCE PERFORMED.



             ------------------------------------------------------------

                                       -WARNING-
             There  has been an increasing amount of reports  from  Sysops 
             around   the  country  of  Norton  Speed  Disk  version   5.0 
             corrupting  some files and destroying others.  So  far  Peter 
             Norton has not come out publicly with any acknowledgement  of 
             this  problem,  even  though it has  occurred  among  a  wide 
             variety  of systems and software.  We advise using  an  older 
             version  of Norton's otherwise excellent Speed  Disk  program 
             until this problem is corrected.

             ------------------------------------------------------------




                                         - 8 -




                                     GENERAL SETUP

             The  following chapter deals with setting up  the  individual 
             programs  mentioned  in the previous chapter.   This  is  not 
             meant to replace the documents that come with those programs, 
             but as an overview of setting up your system as a whole.   We 
             have  structured  this document in the basic order  that  you 
             should  use  when  starting  the task  of  making  all  these 
             separate   programs  work  as  one  system.   We  have   also 
             identified  a  few  problem  and/or  unclear  areas  in  some 
             programs, and hopefully put them into the proper perspective.
                  
             We  suggest keeping a printed copy of this guide  handy,  and 
             using  this chapter in order.  It will greatly  decrease  the 
             amount of time it takes you to set up your system.

             GETTING STARTED:

                  1.  If you haven't already done so, make a printed  copy 
             of your BBS software documentation.  You will be referring to 
             it often, so keep it handy.
                  2.  Print  a copy of the Front  Door  documentation.   I 
             suggest  getting  a  3" three ring binder  and  putting  both 
             documents in there.
                  3.  Print a copy of your fossil driver documentation.

             Unless  you multi-task, you will need to set aside a time  to 
             take down your BBS in order to start setting up your mailer.
             If  your BBS does not take the phone off the hook, call up  a 
             comm program such as TELIX, and in the terminal screen type:
             
                                        ATM0H1
             This  will  silence the modem's speaker (M0),  and  take  the 
             phone  off the hook (H1).  If you wish the modem back on  the 
             hook, just type:

                                        ATH0

             Once you've got the phone line set the way you want, go  back 
             to  DOS and change directories to the root directory  on  the 
             boot  drive. Now you're ready to reconfigure your system  for 
             POLICE NET!







                                         - 9 -




                                    SETTING UP DOS:
             
             We  assume  you  have MS DOS version 3.3  or  higher.   If  a 
             suggested command does not work on your system, refer to your 
             DO manual. 
                  The   first   thing  you  should  do  is   modify   your 
             AUTOEXEC.BAT and CONFIG.SYS files, using a simple ASCII  text 
             editor.  The following are the only changes you will need  to 
             make in these files:
                  1.  Add FD to your path statement in your AUTOEXEC file.  
             Example:    PATH=C:\dos;C:\comm;C:\FD
                  2.  Add the  directory where you  keep all your  archive 
             programs to the path as well.
                  3.  If  you are not now using a fossil driver, you  will 
             need one to run Front Door.  You may need to add a  statement 
             in  either AUTOEXEC or CONFIG, depending on which driver  you 
             use.
                  4.  Add the statement: SET FD=<your path>to AUTOEXEC.BAT


             The following examples were taken directly from ROBOCOP BBS:

             AUTOEXEC.BAT:
             ------------
             ECHO OFF
             c:\qemm\loadhi /r:4 c:\qemm\files=40+
             c:\qemm\lastdrive=G:
             PATH C:\;c:\dos;c:\4dos;c:\Norton;c:\pctools;c:\zip;f:\fd;
             cd\
             chjoy3
             cd \mouse
             c:\qemm\loadhi /r:3 mouse
             set DOORPCH=pcb
             set QBBS=F:\QUICKBBS
             set LIB=F:\QUICKBBS\LIB
             set FD=F:\FD
             set DSZLOG=F:\QUICKBBS\DSZ.LOG
             set DSZ.COM=F:\QUICKBBS
             cls
             cd\
             desk

             CONFIG.SYS:
             ----------
             device=C:\QEMM\qemm386.sys ext=960 RAM ROM EXCLUDE=C800-C9FF
             files=8
             BUFFERS=1
             stacks=0,0
             install=c:\qemm\loadhi.com /tsr /r:1 c:\dos\share.exe



                                        - 10 -




             device=c:\qemm\loadhi.sys /r:2 c:\dos\ansi.sys
             device=c:\qemm\loadhi.sys /r:2 C:smartdrv.sys 320 /a
             device=c:\qemm\loadhi.sys /r:3 C:\hc2\atdoshc2.sys
             device=c:\qemm\loadhi.sys /r:1 C:\ramdrive.sys 640 /e
             device=f:\quickbbs\X00.sys e b,0,19200 R=2048 T=2048
             shell=c:\4dos.com /s:x /u /p /h

             Do not go with the FILES and BUFFER statements listed  above. 
             These are specific to a multi-tasking environment under  QEMM 
             and Desqview.  Make sure you have at least the following  for 
             non-multi-tasking systems:

             FILES=40
             BUFFERS=40 (unless you use a disk cache program)

                 The   next  thing  you  should  do  is  to  make  a   few 
             directories.  The easiest way is to use the DOS "MD" command, 
             as in:
                                       
                                         MD FD

             The following is a list of the directories and subdirectories 
             you will need to have before you unpack your software:

                                          |--DUPES
                                          |--NODELIST
                         C:\  FD ---------|--MAIL
                                          |--PACKETS
                                          |--FILE

             UNPACKING YOUR SOFTWARE:

                  Move the nodelist, and unzip PARSELST and FDNC into  the 
             directory FD\NODELIST.  Unpack Front Door into the  directory 
             FD. Don't unpack the mail tossing utilities yet.  Now you are 
             ready to begin to set up your system.

             PARSELST AND FDNC:

                  As  we  stated earlier, this manual is not  intended  to 
             cover every aspect of the setup of each program, but to  help 
             you  get started and  ease you over some of the rough  spots.  
             As  such,  we  won't get into all the things you  can  do  in 
             either of these programs, as that would take a small book  in 
             itself!   Brian and I are still learning all the things  that 
             you can force Front Door to do with these little gems!

                  Both  Parselst and FDNC  are similar, in that  they  use 
             simple ASCII control files to get their instructions.   These 
             are named PARSELST.CFG and FDNODE.CTL respectively.  Use your 
             favorite text editor to open up the files and follow 



                                        - 11 -




             the  instructions  listed  as  "remarks".   Here  are  a  few 
             examples  highlighting  some of the confusing parts  to  each 
             file:

             PARSELST.CFG:

             Node 1:202/1                 ; My network address
             Country 1                    ; My country code
             MaxBaud 9600                 ; My highest baud rate
             ;MyList ROBOCOP.LST          ; My private nodelist
             Complete                     ; Give entire nodelist
             UseZone                      ; Don't change Zone to Region
             NoComments               ; Don't output comment lines
             NoRoute                  ; Don't generate Nodelist.Fon file
             ;NoNodeList              ; Don't generate Nodelist.Bbs file
             Version6
             NoFidoList            ; Don't generate human readable files
             NoUserList            ; Don't generate FidoUser.Lst file
             Dial
                1-619-
             End

             Cost 85 500
                1-619-          0
                1-714-         25
             End
             ---------------------------

             The above list is the easiest of the two to set up.  Remember 
             that  everything preceded with a ";" will be ignored  by  the 
             program,  so  you can make comments to  yourself  for  future 
             reference.   ROBOCOP  BBS  is located in area  code  619,  so 
             you'll  want  to change that to YOUR area code.  For  set  up 
             purposes,  you  are allowed to use the  node  number  1:<your 
             region>/999.  Check the chapter on applying for a node number 
             for further details.

             FDNODE.CTL: (Read the Front Door Documentation!)

                  This is a long file, and largely self explanatory.   The 
             part  that  was confusing to me the first time  was  all  the 
             phone numbers!  Here are some highlights:

             COST 25 150                       ; Default
                                               ; Default
             ;
             ; Local (to me) numbers
             ;
             1-619-299-      0


                                         -12-




             Change  the Local (to me) number(s) and prefix  locations  to 
             your area numbers.

             ; Domestic (to me) but not local numbers
             ;
             1-204-         50                 ; Manitoba Canada
             1-306-         50                 ; Saskatchewan
             1-403-         50                 ; Northwest Territories
             1-416-         50                 ; Ontario
             1-418-         50                 ; Quebec
             1-506-         50                 ; New Brunswick
             1-514-         50                 ; Quebec

             Obviously, these will have to be modified to suit your  area.  
             For  now, you need do nothing but place your number  anywhere 
             that you see "local".  That will be enough to get you  going. 
             Once your system is up and tossing mail, you can go back  and 
             fine-tune these files.  
                  If you haven't placed the compilers and the nodelist  in 
             the  nodelist  directory, do so now. Run your batch  file  or 
             type the command lines for the compilers.  Your node list  is 
             now ready for Front Door and POLICE NET!

             FOSSIL DRIVERS:

                  If  you already are using a high speed modem,  then  you 
             should be familiar with fossil drivers.  These  communication 
             programs  have  only one purpose in life:  To  supervise  the 
             comm  port(s).  Front Door requires one to run.   Both  Brian 
             And I use different drivers, and oddly enough, we use them in 
             the two ways they can be used:  As a device driver, and as  a 
             executable  program.  I use X00124 as a device driver  called 
             at  boot up by my config.sys. There are a number  of  reasons 
             for  this, but the main one is I load it in high memory  with 
             my  memory  manager, and it uses less  "headroom"  that  way.  
             Brian  doesn't have that capability, and so prefers  to  call 
             BNU  as a program from his BBS' batch file to save on  device 
             driver  space.  Both ways work fine.  BNU is pretty  straight 
             forward, but X00 does have a few switches to deal with.   The 
             following  is my command string in CONFIG.SYS for X00.   Keep 
             in mind that I'm using a locked comm port at a very high rate 
             of speed:

             Device=f:\quickbbs\X00.sys e b,0,19200 R=2048 T=2048

             For a 2400 BPS modem, use:       X00.sys e



                                        - 13 -




                                    THE BATCH FILE:
                  
             Now we get to the fun stuff! The first thing you are going to 
             have to do is to start writing a new batch file.  It would be 
             a good idea to make a printout of your existing batch file to 
             use as a reference.  Currently, you are allowing your BBS  to 
             determine  the  baud  rate  of the  caller,  and  manage  the 
             progress  of the call.  That is one of the first  things  you 
             will  have  to  change.   Front Door  will  manage  the  call 
             progress,  and  pass  off "human" callers to  the  BBS  using 
             different errorlevels for each baud rate.  This is an example 
             of the beginning section of a typical batch file:

             @echo off
             :START
                F:
                cd \fd
                FD
                if errorlevel 255 goto START
                if errorlevel 231 goto DISK_MAINT
                if errorlevel 230 goto MAINT
                if errorlevel 155 goto 19200
                if errorlevel 150 goto 9600
                if errorlevel 140 goto 4800
                if errorlevel 130 goto 2400
                if errorlevel 120 goto 1200
                if errorlevel 115 goto 300
                if errorlevel 57 goto UNPACK_MAIL
                if errorlevel 56 goto PACK_MAIL
                if errorlevel 33 goto RESTART
                if errorlevel 10 goto QUIT
                if errorlevel 1 goto MAJOR_ERROR
             :19200
                cls
                cd \quickbbs
                quickbbs -b19200 -e0 -s
                goto AFTER_BBS
             :9600
                cls
                cd \quickbbs
                quickbbs -b9600 -e0 -s
                goto AFTER_BBS
             :4800
                cls
                cd \quickbbs
                quickbbs -b4800 -e0 -s
                goto AFTER_BBS


                                        - 14 -




             :2400
                cls
                cd \quickbbs
                quickbbs -b2400 -e0 -s
                goto AFTER_BBS
             :1200
                cls
                cd \quickbbs
                quickbbs -b1200 -e0 -s
                goto AFTER_BBS
             :300
                cls
                cd \quickbbs
                quickbbs -b300 -e0 -s
                goto AFTER_BBS

             Note  the  errorlevels 10, 33, 56 and 57.   These  should  be 
             exactly as you see them here.  Front Door always exits on  an 
             errorlevel  of  10, so you must have this free.   When  Front 
             Door determines that a call is coming in at 2400, it exits at 
             the  errorlevel you place in the setup program.  If you  have 
             written  the batch correctly, that errorlevel will  take  the 
             call  to  the ":2400" label, and execute the  commands  found 
             there.   Note the statement " -b2400" after Quickbbs  in  the 
             :2400  label.  This is the command line that starts  Quickbbs 
             at 2400 baud.  Almost all the BBS software I've seen has some 
             sort of command line switches that you can use to specify the 
             baud  rate  with,  so yours may be  similar.   Lets  continue 
             looking at the batch file:

             :AFTER_BBS
                if errorlevel 230 goto MAINT
                if errorlevel 100 goto QUIT
                if errorlevel 33 goto RESTART
                if errorlevel 17 goto POKER
                if errorlevel 14 goto BAGM
                if errorlevel 13 goto BANK
                if errorlevel 12 goto BACK
                if errorlevel 9 goto QDOG
                if errorlevel 5 goto NET&ECHO
                if errorlevel 4 goto ECHO_ONLY
                if errorlevel 3 goto NET_ONLY
                if errorlevel 1 goto MAJOR_ERROR
                goto LAST_CALLER





                                        - 15 -




             :RESTART
                cls
                cd \quickbbs
                quickbbs -r -e0 -s
                goto AFTER_BBS
             :UNPACK_MAIL
                cd \quickbbs
                modem 1 OFF
                Tosscan toss
                goto START
             :PACK_MAIL
                cd \quickbbs
                modem 1 OFF
                Tosscan scan
                goto START
             :ECHO_ONLY
                cd \quickbbs
                modem 1 OFF
                Tosscan scan
                goto START
             :NET_ONLY
                cd \quickbbs
                Tsutil export
                goto START
             :NET&ECHO
                cd \quickbbs
                Tosscan scan
                Tsutil export
                goto START
             :QUIT
                cd \quickbbs
                modem 1 OFF
                cls
                nocurs
                be rowcol 10,20 "Exiting Front Door and ROBOCOP BBS" 
                normal
                cls
                cd\
                exit

             We're not going to go into every detail of a batch file  with 
             you here, but this should give you an example to refer to  if 
             you  get  stuck  along the way.  Most Sysops  are  more  than 
             willing to give you a copy of their Batch file, and it  would 
             be a good idea to look at more than one.




                                        - 16 -




                                      FRONT DOOR:
                  
             To access the setup program, go to your Front Door  directory 
             (FD, if you followed our advice), and type:

                                         SETUP

             From  here on it's just a matter of going into each  "field", 
             and customizing it for your system.  The following is a  list 
             of a few of them, and our recommended settings:

             Under Global/Address:
             --------------------
             System   F:\FD\
             Netmail  F:\FD\MAIL\
             Files    F:\QUICKBBS\FILES\UP\
             Packets  F:\FD\PACKETS\
             Log file F:\FD\FD.LOG
             Banner   F:\QUICKBBS\TEXT\BANNER.TXT   (You make this file) 
             Nodelist F:\FD\NODELIST\
             In-event F:\QUICKBBS\TEXT\IN-EVENT.TXT (You make this file)
             QuickBBS F:\QUICKBBS\
             Swapping G:\

             Under Mailer/Miscellaneous:
             --------------------------
             Mail from unlisted systems           No
             Mail from "unprotected" systems      Yes
             Mail from unlisted points            No
             Kill empty received messages         Yes
             Terminal-only (no mail)              No
             Mail-only (no BBS)                   No
             Match remote's zone                  No
             Present all AKAs to remote system    No
             Trigger exit upon receipt of netmail Yes  (Very Important!)
             +- Upon receipt of ANY file           No
             Print received messages              No
             Busy retries                         30   (Just in case.)
             Resend retries                       30
             Retry delay                          15
             Delay before first call              No
             Days to keep mail history            7
             BBS software name                    ROBOCOP !!
             Seconds before passing to BBS        11
             Minimum undialable cost              1




                                        - 17 -
    



             Under Mailer/File Requests:
             --------------------------
             Mode      Systems in nodelist can request
             List      F:\QUICKBBS\TEXT\FILES.TXT  (See below)
             Alias
             Message
             Max match 0
             Max time  0
             Max size  0
             Min speed 2400
             Limited   No
             Start     01:00
             End       01:50
             Days      -------A

             The file listed above is a simple ASCII text file that  looks 
             like this:

             F:\QUICKBBS\FILES\UTIL\
             F:\QUICKBBS\FILES\GAMES\
             F:\QUICKBBS\FILES\BBS\
             F:\QUICKBBS\FILES\OTHER\
             F:\QUICKBBS\FILES\COPS\

             Front Door uses this file to determine where a file might  be 
             located when a file request is received.

             Under mailer/errorlevels:
             ------------------------
             300             115
             1200            120
             1275            0
             2400            130
             4800            140
             9600            150
             19200           155
             38400           0
             Received mail   57
             Create BAT.file No

             Note that the above errorlevel calls match the example  batch 
             file!   Make  sure yours do the same.  Anything with  an  "0" 
             will pass to the next command in the batch.

             Under Editor/Origin lines:
             -------------------------
             (Please use the conventions outlined in the Rules chapter)




                                        - 18 -




             Under Manager/Events:
             --------------------
                  Ok,  now  comes the tricky part.  The  following  is  an 
             example of the first screen:

               #   T  Days      M  Start   Length  Min/Lev  Max   Address
               ----------------------------------------------------------
               0   @  -------A  +  00:00   00:01        0     -1  1:202/1
               1   X  -------A  +  01:30   00:01      230     -1  1:202/1
               2   Z  -------A  *  02:00   01:00        0     -1  1:202/1
               3   C  -------A  +  03:00   21:00        0     -1  1:202/1
               4   X  -------A  +  03:00   00:01      231     -1  1:202/1

             Event #0 is mandatory!  Put it in first.  The "T" at the  top 
             is  the event TAG.  An "X" tag signifies an  external  event, 
             and must have an errorlevel listed.  You can have as many  of 
             these  events  as you want.  I run a maintenance  event  just 
             before  ZMH, and run one that packs my message bases and  de-
             fragments  my disk afterwards.  The "Z" tag stands  for  Zone 
             Mail Hour.  Here is the two screens you'll modify:

             Tag         Z
             Days        -------A
             Modifier    Ignore eventbase (*)
             Start time  02:00
             Length      01:00
             Min.cost    0
             Max.cost    -1
             Behavior
             Use alias   1:202/1
             Retry delay 0

             And under behavior:

             Allow users during event              No
             Exit when mail is received            Yes
             High priority (crash) mail only       No
             Allow file requests                   Yes
             Pickup file requests                  No
             Hold (don't send) file requests       No
             Attempt to pickup waiting mail        Yes
             Allow nodes to pickup waiting mail    Yes
             Send-only                             No
             Receive-only                          No
             End event when no more mail to send   No
             Send to CM systems only               No
             Send to non-CM systems only           No
             Only execute event once               No
             Inactive                              No



                                        - 19 -




             The  "C" tag is for Continuous Mail, and is used to send  and 
             receive  mail during normal hours.  This is important if  you 
             wish to "poll" another system for waiting mail, and want your 
             system to unpack the mail automatically.  Here is the two set 
             up screens for this event:

             Tag         C
             Days        -------A
             Modifier    Add eventbase (+)
             Start time  03:00
             Length      21:00
             Min.cost    0
             Max.cost    -1
             Behavior
             Use alias   1:202/1
             Retry delay 0

             And under Behavior:

             Allow users during event              Yes
             Exit when mail is received            Yes
             High priority (crash) mail only       No
             Allow file requests                   Yes
             Pickup file requests                  Yes
             Hold (don't send) file requests       No
             Attempt to pickup waiting mail        Yes
             Allow nodes to pickup waiting mail    Yes
             Send-only                             No
             Receive-only                          No
             End event when no more mail to send   No
             Send to CM systems only               No
             Send to non-CM systems only           No
             Only execute event once               No
             Inactive                              No


             The  tricky  part is that each event "tag", other  than  "X", 
             must match a tag found in a file you must now create,  called 
             ROUTE.FD.   The documentation makes creating this  file  very 
             confusing, so I have included two examples of a Route.fd file 
             using  the  tags  found above.  The first example  is  for  a 
             system  hub.   A  hub would dial out to get  mail  from  each 
             system,  and download any packets that the  receiving  system 
             does not have.  The second example is typical of most systems 
             in POLICE NET, in that it waits for the mail call instead  of 
             dialing out:



                                        - 20 -




             Route.Fd example #1:
             -------------------

             No-Route All

             SCHEDULE C MYNET/ALL
             No-Route 202/ALL
             No-Route 1:ALL
             Send-To 202/2

             SCHEDULE Z MYNET/ALL
             No-Route 202/ALL
             No-Route ALL
             Send-to ALL
             Poll 202/2
             Poll 202/3
             Poll 202/4
             Poll 202/5

             Route.Fd example #2:
             -------------------

             No-Route All

             SCHEDULE C MYNET/ALL
             No-Route 202/ALL
             No-Route 1:ALL
             Send-To 202/2

             SCHEDULE Z MYNET/ALL
             No-Route 202/ALL
             No-Route ALL
             Send-to ALL

             As you can see, there is not much to this file.  Place it  in 
             the Front Door directory, and go back to SETUP.

             Under Manager/Folders:
             ---------------------

                  This is where you tell Front Door where the mail is, and 
             what it is (Local, Echo, Netmail, Etc.).  Here is an  example 
             of the screens, and what they should look like:

               #   Status    Users      Password  Title
               --------------------------------------------------
               1   EXI--Q--  *             No     POLICE ECHO
               2   EXI--Q--  *             No     Firearms Echo




                                        - 21 -




             The edit screen for folder #1, POLICE ECHO, looks like this:

             Status
             Origin   ROBOCOP BBS  San Diego, CA (619)299-0351
             Title    POLICE ECHO
             Board    8
             Users    1
             Password No
             Use AKA  1:202/1
              
             The "Board" number is for a Quickbbs system. Under  "Status", 
             you'll see another screen:

             Restricted
             Echo info  *
             Export Ok  *
             Echomail   *
             Local
             Translate
             QuickBBS   *
             Private
             Read-only

             If  you change to a non-Quickbbs board, the  previous  screen 
             will change as well:

             Status
             Origin   ROBOCOP BBS  San Diego, CA (619)299-0351
             Title    POLICE ECHO
             Path
             Users    1
             Password No
             Use AKA  1:202/1


                  Now  go back and double check each field, and make  sure 
             you  haven't  left anything out.  A  brief  explanation  will 
             appear  at the bottom of the screen for many of  the  fields.  
             Once you are sure you have everything in place, you can  test 
             the  system by calling up your fossil driver and typing  "FD" 
             from the proper directory.  You will get an error message  if 
             you  have done anything wrong.  To exit, type ALT Q.  To  use 
             the  on-line  features, type ALT P, and a pop  up  menu  will 
             appear.  You can reconfigure the set up program from there.





                                        - 22 -




                                     MAIL TOSSERS

                  
             If  you are not operating from a Quickbbs message base,  then 
             this  section  is not going to be a lot of help to  you.   No 
             doubt there are mail toss utilities for a wide variety of BBS 
             systems,  and  a quick check with your local Fido  Net  Sysop 
             that  is operating your software will probably point  you  in 
             the  right  direction very quickly.  If you have  a  Quickbbs 
             system, unpack your tosser into the BBS directory now.

                  For a quick BBS system, the act of tossing mail into and 
             out of your message base is ridiculously simple:

             TOSSCAN:

                  To toss new mail INTO your message base use the  command 
             line:                       
                                     TOSSCAN TOSS.

             To  scan your message base for, and pack new  OUTGOING  mail, 
             use the command line:

                                     TOSSCAN SCAN

             QECHO (from the file Qnet):

                  See  the  documentation for the available  command  line 
             switches to customize the program for your system.

                  Both  of  these programs should be  operated  from  your 
             batch  file to exit and pack/unpack mail automatically.   For 
             examples, see the BBS batch file example on pages 14 and 15.
             Make  sure  your errorlevel calls match those  configured  in 
             Front Door, and your BBS software.
                  I  am  keenly  interested  in  any  and  all  mail  toss 
             utilities available for other BBS software.  If you  discover 
             any, please let me know, and forward me a copy.











                                        - 23 -




                                     GETTING HELP

             If you are having trouble getting the programs listed in this 
             documentation to work properly on your system, try  rereading 
             the  individual  program's  documentation.   (When  all  ELSE 
             fails,  read the docs!)  Double check all your settings,  and 
             document  what  is going on.  If all that fails  to  set  the 
             light bulb off, follow these steps to get outside assistance:

             1.   Get  out  the old modem, and start  calling  your  local 
             boards.  Many Law Enforcement Sysops forget that the civilian 
             BBS  market is quite a bit larger and more  experienced  than 
             us!  Most Sysops are more than willing to go out of their way 
             to help out.  POLICE NET uses Fido Net conventions, so almost 
             any  Fido Sysop with the same software as you can be a  great 
             resource!

             2.   Failing that, and willing to spring for the phone  call, 
             you  can  call us at the numbers below.  These  are  the  BBS 
             numbers,  and  require initial registration, so  be  patient.  
             Both  boards  accept direct ASCII uploads  into  the  message 
             bases, so for you long distance callers it would be advisable 
             to write your message before you log on.  This will also help 
             you organize your thoughts, so that you give us a clear  idea 
             of the problem, and what you have done so far to try to solve 
             it.  In most cases, if you leave a voice number, we will  try 
             to return your call and "Talk you down."

             3.   You can also mail us the message through another  POLICE 
             NET  node.  Address it to the appropriate node listed  below.  
             For  the number of the nearest PN network system,  check  the 
             enclosed Nodelist.

             Joseph Gaspard,
             Founder, Managing Director
             ROBOCOP BBS San Diego, CA (619)299-0351  (1:202/1)
             Quickbbs system running under Desqview.

             Brian Roberts,
             Co-founder, Regional manager
             L-E BBS ONLINE! San Diego, CA (619)596-0870 (1:202/2)
             Wildcat system on an IBM AT, Quickbbs echo message base.








                                        - 24 -




                              APPLYING FOR A NODE NUMBER

             In  order  to become a member of POLICE NET you must  have  a 
             valid node number issued by the Managing Director.  There are 
             a few simple steps you must take to be granted access to  the 
             network:

             1.  You must have your system ready to send and receive  mail 
             during  the designated ZMH at the time of  application.   All 
             software  must  be running and free of  glitches  BEFORE  you 
             submit your application.
                       
             2.  You must have read and agree to comply with the rules and 
             regulations currently in effect.  By applying to the director 
             for  a  node  number, it is assumed that  you  agree  to  all 
             policies of the net.

             3.   The application shall be in the form of a  message  sent 
             over the net into the SYSOP NET echo message base.  It  shall 
             be  addressed  to  the  Managing  director  of  the   network 
             (Currently Joseph Gaspard  1:202/1 ) and specifically request 
             access to the net.  The message must detail your system, it's 
             Law  Enforcement/ EMT affiliation, and a mailing  address  to 
             send  you  your node number.  It is important that  you  send 
             enough  information  about your system that we can  make  the 
             correct determination as to your suitability for  membership.  

             4.    Please  include the Echoes you wish to pick up  in  the 
             application.

             5.   Applicants are to use the Node 1:<your area>/999,  until 
             their permanent number is issued.  Areas are defined by  Fido 
             Net convention.

             6.    There  is  no fee for membership in  POLICE  NET.   For 
             information on charging your system users, see RULES. 

             7.    Please  make sure that your TEAR LINE conforms  to  the 
             standards set forth in the RULES chapter.

             Both  Brian  and I are more than willing to help you  get  to 
             this  point,  so don't hesitate to call us with  any  problem 
             that has or hasn't been addressed in this manual.

             If you've come this far, WELCOME ABOARD!!

                                   


                                        - 25 -




                                      POLICE NET

                                RULES AND  REGULATIONS

                                 As of April 15, 1991

             1. STANDARDS
                       1.1    All hardware and software standards shall be 
             set by the founding systems.  Deviation from those  standards 
             may be made by the individual participating systems, as  long 
             as the Managing Director is informed and the proposed changes 
             do not adversely affect the network as a whole.
                       1.2    All  mailers  must be  Fido Net  compatible. 
             Zone Mail Hour must be automated.
                       1.3    Zone  Mail Hour is set  at  0200-0300  hours 
             Pacific  Standard  Time Daily.  No human callers  are  to  be 
             allowed  on during this time.  All systems MUST be  available 
             for mail only during this time.
                       1.4    Point systems, or other non-members are  not 
             allowed to post POLICE NET echoes.  No member system may send 
             packets containing all or part of the POLICE NET echo base to 
             any  non-member system without permission from  the  Managing 
             Director. Exceptions may be made on a case by case basis.
                       1.5    POLICE   NET  is   a   private,   non-profit 
             organization.  Member systems operators may not charge  their 
             users  for  this service, other than to  recover  any  ACTUAL 
             costs of providing this service to their system's users as  a 
             whole.
                       1.6    POLICE  NET  does not  discriminate  on  the 
             basis of race, creed, sex, or Country of origin, nor does  it 
             tolerate such discrimination among it's member systems. 

             2. ECHOES
                       2.1    Any member system may request to  create  an 
             echo subject to all of the following rules.
                       2.2    Any  new   echo  must  be  approved  by  the 
             Managing Director, via the Sysop Net conference.
                       2.3    Any  proposal  should  have  all   necessary 
             details  posted,  such as the subject  matter,  and  security 
             group.  The start date(s) will be set by the Directors.
                       2.4    The  system proposing the echo shall  be  in 
             charge of moderating the conference.  He/she may ask  someone 
             else to take this responsibility voluntarily. 
                       2.5    The  Directors  have   authority  over   all 
             echoes,  their  content  and  the  monitoring  thereof.   The 
             Managing  director  may remove an echo or it's  moderator  at 
             anytime  for  reasonable cause, subject to all  the  enclosed 
             rules herein, and subject to the enclosed appeals process.
                                 

                                         -26-




                        2.6   All  moderators of  any conference must be a 
             member  system  operator,  co-operater,  or  other   approved 
             person.  All moderators must be approved by the Directors.
                        2.7   The  individual  system  operator  is  fully 
             responsible  for the actions of any user with access  to  the 
             network message bases through that system.  This includes any 
             point system channeled through that system.

             3.  TEAR LINES
                       3.1    All tear lines throughout the network  shall 
             be consistent with the following example:
              <System Title>_<City>,_<2 Letter State code>._(XXX)XXX-XXXX
                       3.2    No deviation from the tear line in rule  3.1 
             will be allowed.  All information shall be mandatory.
                       3.3    No member system shall use  another  systems 
             tear line, node number, or any part thereof.
                       3.4    Aliases shall not be allowed in the network.

             4.  SECURITY
                       4.1    All significant breaches of network security 
             shall  be  reported to the Managing Director  promptly.   Any 
             general  warnings shall be issued by the  Managing  Director, 
             and NOT the reporting system.
                       4.2    All  member and prospective  member  systems 
             shall  endeavor to prevent the unauthorized entry of  non-law 
             enforcement  personnel  into any "S" group message  base,  or 
             other message base designed for Law Enforcement only.
                       4.3    For the purposes of this network,  the  term 
             "Law Enforcement Personnel" describes the following persons:
                  A.   Any Peace Officer, Deputy, Constable,  Marshall  or 
             other sworn Law Enforcement official, active or retired.
                  B.   Any member of the above's immediate family.
                  C.   Any member of a recognized investigating agency, DA, 
             FBI, NIJ et al.
                  D.   Any  member  of  Transit  Police,  or  Metropolitan 
             Transit Security agency.
                  E.   Any Emergency Medical Technician.
                       4.4    No privileged or confidential information is 
             to be exchanged within the network.  No unethical or  illegal 
             acts, materials or files shall be allowed within the network.  
             The  exchange of copyrighted software is  strictly  forbidden 
             among  members  of  POLICE  NET.   This  DOES  NOT  apply  to 
             freeware, shareware or public domain software.
                       4.5    Civilian users  are  allowed to  participate 
             in any "G" group message base.
             



                                        - 27 -




                       4.6    The  SYSOP NET  echo shall be restricted  to 
             the   systems  operators  and  co-operators  of  member   and 
             prospective  member systems only.  "Read only" access to  Law  
             Enforcement  users  may be granted at the  individual  system 
             operator's discretion.

             5.  VIOLATIONS/APPEAL
                       5.1    Any willful or continuing violations of  any 
             of the operating rules or standards of the network may result 
             in  the  offending  system being  removed  from  the  network 
             without notice. 
                       5.2    The systems operator of a system removed  in 
             rule 5.1 may file a written statement appealing the  removal.  
             The statement shall be addressed to the Managing Director via 
             a neutral system, and routed through the SYSOP NET echo.   It 
             should address all points of appeal clearly.
                       5.3    The Managing Director of POLICE NET shall be 
             the  sole  judge of the merits involved in any  appeal  to  a 
             membership  rejection.   He may, at his discretion,  put  the 
             matter to a vote of the general membership.  The judgment  of 
             the Managing Director shall be final.
                       5.4    The  statement of appeal must be  dated  and 
             sent  no later that 30 days after the date of  being  removed 
             from the network.  This appeal is NOT a right of membership.
                       5.5    The   Managing   Director   shall   make   a 
             reasonable  effort to resolve the conflict without  resorting 
             to removal of the offending system.

             6.   DISCLAIMERS
                       6.1    The contents of this document are subject to 
             change  without prior written notice.  The current rules  can 
             be found on Nodes 1:202/1 and 202/2.
                       6.2    Should any of the rules be found contrary to 
             law, the other rules shall remain in effect.















                                        - 28 -




                                   
















             POLICE  NET  is  a  private,  non-profit   telecommunications 
             service    dedicated  to  the  men  and  women  of  the   Law 
             Enforcement  communities world-wide.  It is the goal  of  the 
             Directors  of this network to foster increased  communication 
             between  Police  officers of a wide variety  of  departments, 
             counties, states and countries in order that we may all learn  
             the tools to better serve ourselves and our communities in  a 
             safe and effective manner.

             It  is also the goal of this network to provide a place  that 
             Law  Enforcement professionals can feel safe and  comfortable 
             not  only  for entertainment, but to broaden  their  personal 
             view of the world around them.




















                                        - 29 -