The LOD Technical Journal: File #1 of 12
Volume 1, Issue 5  Released:  June 18, 1993.



                           LOD TECHNICAL JOURNAL
                           ---------------------


          
           The Legion of Doom will long be remembered in the computer       
           underground as an innovative and pioneering force, that 
           consistently raised the collective level of knowledge and
           provided many answers to questions ranging from the workings     
           of the telephone system to the structure of computer operating   
           systems. 
            

     5. At all times relevant herein, the Legion of Doom (LOD) was a closely 
     knit group of computer hackers involved in:

          a.   Disrupting telecommunications by entering
               computerized telephone switches and changing the
               routing on the circuits of the computerized
               switches.
          b.   Stealing proprietary computer source code and
               information from companies and individuals that
               owned the code and information.
          c.   Stealing and modifying credit information on
               individuals maintained in credit bureau computers.
          d.   Fraudulently obtaining money and property from
               companies by altering the computerized information
               used by the companies.
          e.   Disseminating information with respect to their
               methods of attacking computers to other computer
               hackers in an effort to avoid the focus of law
               enforcement agencies and telecommunication security
               experts.
          - Indictment laid down by a US District Court     

            
            It wasn't the crimes they were committing, but the danger, 
            the potential hazard, the sheer technical power LoD had         
            accumulated, that had made the situation untenable.
          - Bruce Sterling in The Hacker Crackdown
                
         
Its been over THREE whole years since we last put out a TJ! May, 20th 1990 to 
be exact.  

The LOD TJ, will publish any acceptable and original articles, technical
explanations, schematics or other files that deal with computer
security/insecurity, telecommunications, data networks, physical security,
credit, law enforcement, privacy, cryptology, restricted information,
editorial commentary and other topics. To submit an article for publication
simply send it to us. Freelance writers are always sought after to provide
original articles for the TJ. Bigger is better as far as this Journal goes.
The more information, the more instruction and the more people can benefit
from it. 

The LOD also seeks qualified members to fill its ranks. You must possess a
strong desire to both learn and teach. Those with an eleeet attitude need not
apply. LOD's former membership was a list of some of the brightest and most
capable individuals in the underground - names like Mark Tabas, The Mentor,
The Prophet and others. Take advantage of your opportunity to join the ranks
of the world's greatest underground group. Apply today. 

What is particularly needed right now is someone in the publishing business
to publish all the TJ's on hard copy and make them available for mass sale. 
Not just another "hacker book company" mind you, but one that will be able to
place the TJ in your common book store. As this will both give us legitimacy
and make it available to the average person and not just those with modems or
net.access. We expect to receive no profit from this so there is an added
bonus to any potential publishers. If you are a publisher or can get us in
contact with one that can undertake this, by all means contact us.

Reach us at:

Internet Email: tdc@zooid.guild.org

Mail: 
LOD
P.O. Box 104
4700 Keele St.
North York, ON
M3J-1P3

Voice: +1-416-609-7017

The Legion of Doom is back to... 

o  Provide free education for the public in data and telecom networks,      
   operating systems and other aspects of technology. Through both our      
   Technical Journal and our new Legion of Doom Technical School.
o  Turn hacking back into its former glory of technical understanding away  
   from its c0de abusing state today. 
o  Publish a high-quality Technical Journal available to all who are        
   interested completely free of charge. 
o  Give fellow hackers an organized group of similar minded individuals to  
   communicate and learn with.   

Please be advised that we are still getting "back on our feet". So look for
much better journals and other things to come from us in the future. It will
take at least a couple years to get the Legion back to its former glory so
don't expect things to happen instantly. Hopefully these journals can come
out every couple of months, instead of our previous year odd gaps between
releases. But as finding and writing suitable articles is very difficult it
may be sometime before the next issue comes out. If this does happen, don't
assume we're dead. More journals will come out, it is only a question of
when.

For one reason or another the LOD has always been surrounded by an atmosphere
of mis-information, confusion and downright lies. Everyone has heard the
expression "don't believe everything you hear". This is especially true with
anything concerning the LOD. As a general rule if you didn't hear it in this
TJ, chances are its untrue or incorrect.     

This TJ may be freely distributed on either hard or soft copy forms as long
as it has not been altered.

-----------------------------------------------------------------------------
                  
                       TABLE OF CONTENTS:

Name of article or file                                Author            Size
-----------------------------------------------------------------------------
01 Introduction to the LOD Technical Journal           Staff             03K 
   and Table Of Contents for Volume 1, Issue 5

02 The Legion of Doom Technical School:                Staff             08K 
   1993-1994 Program Calendar
   
03 Index to the LOD Technical Journals:                Staff             06K
   Issues 1-5

04 Communications Technology                           Unequal Access    24K

05 DMS-100 Maintenance                                 Unequal Access    14K 
             
06 Operator Service Position System (OSPS)             The Enforcer      12K

07 Testing Operations Provisioning Administration      Mystik Freak      09K
   System (TOPAS)

08 International Switching Systems                     Mystik Freak      30K

09 Hacking GANDALF XMUXs                               Deicide           12K

10 TEMPEST Technology                                  Grady Ward        13K

11 Presidential Security                               Argon             14K

12 Network News & Notes                                Staff             63K
       
Total: 12 files  208K

-----------------------------------------------------------------------------
Hope you find this Journal to be of some use to you it took a good deal of
time to put together.  Remember that the mind is like a parachute.  It only
works when open.  Stand back, open your mind and get ready for an influx! 
(>-------------------------------------------------------------------------<)

The LOD Technical Journal: File #2 of 12

             
                    1993-1994 PROGRAM CALENDAR
                     
       L
       e
       g
       i
       o
       n

       of
       
       D
       o
       o
       m                  
                        TECHNICAL SCHOOL


Rather than just educating everyone informally in the ways of computer and
telephone security and understanding, the LOD has decided to go all the way
with it. No longer are we just a hacking group. The LOD is now offering
formal courses the way any other accredited Technical School, College of
Applied Arts or University does.

Several Reasons lay behind this bold new decision...

o  Educate people in skills that can be applied to today's job market.
o  Give a general understanding in computers/telecom.
o  Offer unique courses that other institutions don't offer. 
o  Instead of people wrongly claiming to be a "hacker" they can now become  
   one. 
o  Offer all those interested a chance to enrol.
o  And to provide them free of charge. 

Due to limited resources only the three courses we felt to be the most
important are being offered. They will be conducted on a "correspondence"
basis. It operates as follows. If you are seriously interested in enroling in
these courses, send us Email or snail mail with the completed application
form at the end of this calendar. That includes your name, address, phone
number, Internet address if applicable and a brief outline of your
educational and occupational background. Don't worry though all applicants
are accepted. We would however advise everyone that previous experience with
a computer is recommended. If sending snail mail be sure to provide a 8X11
size SASE for us to reply to you in. A course outline including a list of
required readings and assignment due dates will be mailed back to you. In the
outline will be full bibliographic information on the books and soft copy
materials you'll need for the course. It will work just like any other course
does just without the exams and tests as it would be impossible to adjudicate
them. However, because of this and to maintain the integrity of the LOD
Technical School papers will be marked sternly at post-secondary standards.
After you submit your paper to us an LOD member will mark it and return it to
you via snail or email with comments and a grade attached. 

Now for the best part... You can take these LOD courses as "Courses at
another institution". Meaning that yes, in addition to getting your degree,
included in it can be LOD courses! ALL educational institutions have
provisions for courses to be taken at other institutions. Its a fairly simple
procedure.  You go to your Office of Student Programmes/department/guidance
centre etc. and obtain a form for "taking a course at another institution". 
Attach the course descriptions from this file and gain permission from the
director of your faculty/department/program/etc. and then you are set.
Providing you pass our courses with a high enough grade your institution will
accept the courses as part of your degree requirements. If your institution
has no equivalent courses, they can become "electives". Since you are usually
required to take up to 3 elective courses to obtain a degree why not do
something you enjoy? After all its more exciting than taking Early Italian
Literature as your elective. There is no need to worry about our "legitimacy"
as long as you obtain permission to take the course through the proper
procedure. An institution does not need any kind of formal designation though
the Department/Ministry of Education to provide a course. We are just another
one of the millions of institutions throughout the world that offer training
or formal courses. These courses can also be used to place you in "Advanced
Standing" if you aren't at school now but decide to in the future. Or just
for the sake of expanding your horizons/mind/abilities etc.

Because we have no set semester schedule, courses start at the first of every
month and run for five months. Starting 1 November 1993. Take them at your
own convenience. A maximum of one course may be taken at a time. 

Here are the descriptions to the first 3 LOD Technical School Courses: (Full
outlines will accompany your enrolment starting 1 November 1993)


------------CUT HERE---------------------------------------------------------

TEL3440 0.5 Credits  Telephony
With the rise of sophisticated technology telephony is becoming much more
complex. The entire telephone network from customer premises equipment to
switching systems will be covered. Recent trends such as ISDN, BISDN, fiber
optics and data networking will also be studied. 

CSC3450 0.5 Credits  Computer Security
With the rise of computers, securing them against criminal or malicious use
has become vital. Surprisingly little attention has been devoted to it
leaving many systems wide open to abuse. Covered in this course will be the
security of LANs, networks and various operating systems. Cryptology will be
examined as well. 

HCK4100 0.5 Credits  Intro to Hacking
Despite all the attention hackers have received, there is only a small core
of no more than a few hundred people in the world that have the skills to
actually hack. Starting with the basics of hacking it will guide you into
more advanced intrusion techniques with the more popular operating systems.
This course may be taken based on your own abilities, so master hacker or
just plain novice it will fit you. PSNs, Internets, basic hacking on popular
operating systems such as unix and vax will be covered along with other
operating systems and nets depending on your time/prior abilities. 

------------CUT HERE---------------------------------------------------------

Career Opportunities

After passing our courses you will be able to supplement your job skills for
finding employment in any sector of the economy - Business, Industry or
Government that deals with computers/telecom.

Remember these are FREE courses. They have a retail value of around US $1,250
each if taken at a high-quality University in the US. Take advantage of this
opportunity to learn something you enjoy doing for FREE. The Legion of Doom
believes in disseminating knowledge so is offering these courses as a public
service to the world. Finally they are well worth your time. They are done in
highly organized with carefully selected readings and assignments. It would
take years of self-study to achieve what you can with these courses in just
a few months. And because we don't spout out loads of useless and academic
theory, math and equations like most institutions you'll learn far more here.

Since these are "correspondence" courses you must have a high degree of self-
discipline and motivation. If you lack these qualities don't waste your time
or ours by attempting them. They will take at least several hours of week on
your part, so if you can't put aside such time don't bother with them. 

If you would like to take these courses send the enclosed application form
(either in email or snail mail) to the Legion of Doom Technical School at:

Internet: tdc@zooid.guild.org
          
Mail: LOD 
      P.O. Box 104
      4700 Keele St.
      M3J-1P3
      

-------------CUT HERE--------------------------------------------------------

LOD Technical School Application Form
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Note: The start date for these courses is 1 November, 1993. They are 5 months
in duration. Right now applications are only being taken for the 1 November
start date. You may take a maximum of one course at a time.

PERSONAL DATA 
(If any of this is left blank, your application will be rejected)

Course you wish to sign up for:
Surname:
Given Name:
Daytime Phone Number (include NPA):
Office Phone Number w/Ext.:
Internet Email address (leave blank if none):

Address:
Apartment #:
City/Town:
State/Province:
Postal/Zip Code:
Country:

SUPPLEMENTARY DATA

Describe your computer related skills and experience:
-
-

What operating systems are you fluent in?
-

Briefly describe your educational background:
-
-
-
-
-

Your occupational background:
-
-
-
-
-

Do you have the self-discipline, dedication and time to apply yourself here?
-
-

Please include any other information that you feel we should be aware of, or
any questions you may have:
-
-
-
-
-
-
-
-

-------------CUT HERE--------------------------------------------------------

Send the completed form to us at one of the above addresses.
-----------------------------------------------------------------------------

The LOD Technical Journal: File #3 of 12

                       %%%%%%%%%%%%%%
                       Legion of Doom
                   Technical Journal Index
                         Issues 1-5
                         %%%%%%%%%% 


Name of article or file                                 Author          Size 
----------------------------------------------------------------------------
Issue: 1 Released: Jan. 1, 1987
01 Introduction to the LOD/H Technical Journal          Staff            04K 
   and Table Of Contents for Volume 1, Issue 1
02 Custom Local Area Signalling Services (CLASS)        The Videosmith   17K
03 Identifying and Defeating Physical Security and      Lex Luthor       23K 
   Intrusion Detection Systems Part I: The Perimeter
04 The Traffic Service Position System (TSPS)           The Marauder     23K
05 Hacking DEC's TOPS-20:  Intro                        Blue Archer      19K
06 Building your own Blue Box (Includes Schematic)      Jester Sluggo    16K
07 Intelligence and Interrogation Processes             Master Of Impact 18K
08 The Outside Loop Distribution Plant:  Part A         Phucked Agent 04 25K
09 The Outside Loop Distribution Plant:  Part B         Phucked Agent 04 23K
10 LOH Telenet Directory: Update #4 (1-1-87) Part A     LOH              25K
11 LOH Telenet Directory: Update #4 (1-1-87) Part B     LOH              18K
12 Network News & Notes                                 Staff            10K

Total: 12 files    223 K

Issue: 2 Released: Aug. 10, 1987
01 Introduction to the LOD/H Technical Journal                            04K
   and Table of Contents for Volume 1, Issue 2
02 The Networked Unix                                   Solid State       17K
03 Step By Step (SXS) Switching System Notes            Phantom Phreaker  12K
04 A Guide to the PRIMOS Operating System               Carrier Culprit   25K
05 Identifying and Defeating Physical Security and      Lex Luthor        30K 
   Intrusion Detection Systems Part II: The Exterior
06 A Discrete Unix Password Hacker                      Shooting Shark    09K
07 Hacking DEC's TOPS-20:  Part II                      Blue Archer       25K
08 Hacking IBM's VM/CMS Operating System, Part A.       Lex Luthor        26K
09 Hacking IBM's VM/CMS Operating System, Part B.       Lex Luthor        25K
10 Network News & Notes                                 Staff             07K

Total: 7 articles, 10 files  180 K

Issue: 3 Released: October 21, 1988
01 Introduction to the LOD/H Technical Journal          Staff             02K 
   and Table Of Contents for Volume 1, Issue 3
02 Understanding Automatic Message Accounting Part A    Phantom Phreaker  22K
03 Understanding Auotmatic Message Accounting Part B    Phantom Phreaker  25K
04 Update file: Shooting Shark's UNIX password hacker   Shooting Shark    03K
05 An Introduction to Teradyne's 4TEL System            Doom Prophet      12K
06 A Cellular Automaton Encryption System               The Mentor        29K
07 Hacking the IRIS Operating System                    The Leftist       13K
08 A Guide to Coin Control Systems                      Phase Jitter      08K
09 A UNIX password hacker from USENET                   -------------     16K
10 Reprint News Article: 'LOD BUST MYTH'                --------------    13K
11 Network News & Notes                                 The Mentor        30K

Total: 6 articles, 11 files   173 K

Issue: 4 Released: May 20, 1990
01 Introduction to the LOD/H Technical Journal          Staff             04K 
   and Table Of Contents for Issue #4
02 The AT&T BILLDATS Collector System                   Rogue Fed         14K
03 The RADAR Guidebook                                  Professor Falken  17K
04 Central Office Operations                            Agent Steal       32K
05 A Hackers Guide to UUCP                              The Mentor        27K
06 The History Of LOD/H                                 Lex Luthor        12K
07 The Trasher's Handbook to BMOSS                   Spherical Abberation 11K
08 The LOD/H Telenet Directory Update #4  Part A        Erik Bloodaxe     65K
09 The LOD/H Telenet Directory Update #4  Part B        Erik Bloodaxe     43K
10 Network News and Notes                               Staff             38K

Total:  7 Articles  10 Files  263K

Issue: 5 Released: June 18, 1993
01 Introduction to the LOD Technical Journal           Staff             03K
   and Table of Contents for Volume 1, Issue #5 
02 The Legion of Doom Technical School:                Staff             08K
   1993-1994 Program Calendar
03 Index to the LOD Technical Journals:                Staff             06K
04 Communications Technology                           Unequal Access    24K
05 DMS-100 Maintenance                                 Unequal Access    14K
06 Operator Service Position System (OSPS)             The Enforcer      12K
07 Testing Operations Provisioning Administration      Mystik Freak      09K
   System (TOPAS)
08 International Switching Systems                     Mystik Freak      30K
09 Hacking GANDALF XMUXs                               Deicide           12K
10 TEMPEST Technology                                  Grady Ward        13K
11 Presidential Security                               Argon             14K
12 Network News & Notes                                Staff             63K

Total:  8 Articles   12 files  208K

These journals may be found at ftp.eff.org in the pub/cud/lod directory and
on many other sites. Look for a full list in the next TJ. If your board or
site would like to carry these TJs to aid in distribution let us know. 

----------------------------------------------------------------------------
 
The LOD Technical Journal: File #4 of 12

                    =--=--=--=--=--=--=--=--=
                    Communications Technology
                        (tm) Unequal Access 
                              LOD
                          
                          June   1993


The title of this article is that of communications technology. Not data
communications or telephony but communications. The two have for all
practical purposes become one in the same. Voice communications, wireless
communication services etc. are now being transmitted by digital means. What
was once a simple matter of drawing a line between the two is no more the
case. 

This convergence together with new technologies radically changes the picture
of communications. Many former concepts and systems will be obsolete in a few
years. 

To examine the future of communications i'll cover:

- ISDN and BISDN
- ATM
- SONET
- Service Net-2000 
- Other developments 

ISDN
=--=

A comprehensive description of ISDN would be to big to cram in here so a
brief definition and update on the status of ISDN will be given. 

ISDN Defined
------------
ISDN is defined by the CCITT as:

...a network in general evolving from a telephony Integrated Digital Network
(IDN), that provides end-to-end digital connectivity to support a wide range
of services including voice and non-voice services, to which users have
access by a limited set of standard multi-purpose user network interfaces...

Basically ISDN is a network that carries voice and data over the same lines.
All services exist in digital form and can be switched by one network. Much
has been forecasted about how ISDN will change the world with interactive
television, home banking, employees conducting business at home, new services
etc. with AI systems controlling central databases. 

Technically defined it provides a digital interface, usually with 2 channel
types - B channels for voice and data and D channels for signalling and
control. This gives a dedicated channel for the subscribers information and
one for control of the interface. 

The fundamental building block of ISDN is its 64 kbps digital channels. With
two main interfaces - Basic Rate Interface (BRI) and Primary Rate Interface
(PRI). BRI handles small scale services such as subscriber lines and PRI
handles large scale services such as central databases. Each has both a D
channel and X number of B channels. BRI has 2B + D channels and PRI has 23B
+ D channels. Each B channel is 64 kbps and the D channel is 64 kbps for the 
PRI and 16 kbps for the BRI. To plan for future increases 384 kbps has been
allotted to the H0 channel, 1336 kbps to the H11 channel and 1920 kbps to the
H12 channel.

Integration
-----------
ISDN will have one format, so various devices won't need their own dedicated
lines. One common interface will accommodate all applications. By having one
set of wires and protocols users won't need to bother with coaxial cables for
television, X.25 protocols for packet switched networks (PSNs), telex lines,
various leased lines etc. 

Misconceptions
--------------
ISDN itself isn't going to provide anything. It is just the standard for
network interface. Anything new will depend upon the services offered on it.
The concept of digital switching is not a new one to begin with. Its been in
use since the mid 60's. The real "upheaval" with ISDN is that Ma Bell is no
longer going to provide just telephone calls but a whole range of services.
This list of services along with speed requirements and channel type was
taken from the IEEE.

Service                   Speed Required      Channel
-------                   --------------      -------
Voice                     8,16,32,64 kbps     B
Alarms                    10-100 bps          D
 Smoke
 Fire
 Police
 Medical 
Utility metering          0.1-1 kbps          D
Energy Management         0.1-1 kbps          D
Interactive information   4.8-64 kbps         B
 Electronic banking  
 Electronic yellow pages
 Opinion polling
High quality audio        ~300-700 kbps    
Slow scan TV              56-64 kbps          B
Compressed video          ~30 Mbps
Compressed video conf.    ~1.5 Mbps
Broadcast video           ~100 Mbps
Switched video            ~100 Mbps
Interactive video         ~100 Mbps
Facsimile graphics        4.8-64 kbps         B
 
CCS
---
Another vital part of ISDN is Common Channel Signalling (CCS). Which
separates signalling information from user data. Rather than being an older
form of in-band signalling where signals and data are on the same channel it
is out of band, where signals travel on different channels. This allows more
services and reduces circuit connection times. ISDN uses SS no.7 (SS7). The
initial version SS6 used analog trunks of 2400 bps, SS7 uses digital trunks
of 56/64 kbps.
Well, you've most likely asking yourself what this all means for our
underground activities. It will create a bonanza of new services and
opportunities all unified in one network. Just as data and voice
communications are merging so to will hacking, phreaking, cable fraud etc.
Because ISDN has yet to be implemented on a mass scale in North America its
not possible to say specifically how it may be abused. You should still be
prepared for its arrival by understanding its design and purpose though. 

Many supplementary services have been approved for ISDN by the CCITT and more
are being approved right now: 

Number Identification Services:
- Direct Dialing In (DDI)
- Multiple Subscriber Number (MSN) - Allows different numbers to ring at one 
  number.
- Calling Line Identification Presentation (CLIP) - (ANI)
- Calling Line Identification Restriction (CLIR) - blocks out an incoming   
  ISDN number. 
- Connected Line Identification Presentation (CLOP)
- Connected Line Identification Restriction (COLR)
- Malicious Call Identification and Sub-Addressing (not yet defined by the  
  CCITT).

Call Offering Services:
- Call Transfer - Lets a call be transferred to a third party.
- Call Forwarding Busy (CFB)
- Call Forwarding No Reply (CFNR)
- Call Forwarding Unconditional (CFU)
- Call Deflection

Misc. Services:
- Private Numbering Plan
- Advice of Charge - Allows the caller to find out the cost of a call before, 
  during or after.
- Credit Card Calling and Reverse Charging
- User-to-User Signalling (UUS) 

These supplementary services take advantage of SS7's full range of
capabilites. 

ISDN Trials
-----------
Since ISDN provides the "digital pipe" and the subscriber selects services;
the network, circuits, trunks and customer premises equipment (CPE) are all
being tested. Most of the early ISDN trials were quite basic and were
intended only to prove the validity of ISDN concepts. The current status of
ISDN is with more complex testing and actual implementations. A brief summary
follows.

Location      Organization        Date  Details
--------      ------------        ----  -------
Sweden        Televerket/Ericsson 1981  Local network transmission
Wisconsin     Wisconsin Bell/     1985  Customer acceptance trials, mobile
              Siemens                   unit
Munich/Berlin DBP/Various         1984  BIGFON, local wideband ISDN dist.
Tokyo         NTT                 1984  INS trial; 64/16/4/4, B/B/D/D access
Venice        SIP/Ericsson        1984  I.412 access
London        BT/Various          1985  IDA trial, commercial 64/8/8, B/B/D
                                        access
Chicago       Illinois Bell/AT&T  1986  I.412 access, fairly basic
Phoenix       Mountain Bell/NT    1986  I.412, DMS-100, 3 customers
Phoenix       Mountain Bell/GTE   1986  GTD5 EAX
Phoenix       Mountain Bell/NEC   1986  Digital adjunct to 1A ESS
Portland      PacBell/NT          1987  DMS-100, 32 kbps voice channels
Atlanta       Southern Bell/AT&T  1987  5ESS
Boca Raton    Southern Bell/      1987  EWSD
              Siemens
Ottawa        Bell Canada/NT      1986  DMS-100, SS7 trials
Ottawa        Bell Canada/NT      1987  DMS-100, basic and primary access
Belgium       RTT/BTMC            ?     System 12, details unknown
Germany       DBP/Siemens/SEL     1986  EWSD System 12, comprehensive 
                                        phased trials
France        CNET                1987  E 10, MT25, "Renan" project
Florida       Southern Bell/NT    1988  Fiber to home, POTS, ISDN, CATV 
                                        transport
US            SWBT                1988  Internetwork 5ESS, DMS-100 and EWSD
US            MCI                 1989  Test with Meridian SL-1 and SL-100s
US            Sprint              1990  All network switches support ISDN
US            AT&T                1990  Complete conversion to SS7
US            MCI                 1990  Complete conversion to SS7
Australia     Telecom Australia   1990  ISDN commercially available
Japan         NTT                 1990  ISDN in 200 cities
US            SWBT                1991  Internetworking of SWBT and IECs,
                                        ISDN and SS7
Brazil        Telbras             1993  ISDN commercially available
UK            BT                  1993  PRI in place
Germany       Deutsche Bundepost  1993  Nation wide ISDN, 3 million users
              Telekom 

Broadband ISDN (BISDN)
----------------------
Is designed to exploit ISDN's full broadband capabilities. With BISDN
everything from alarm monitoring to live action video broadcasts can be
handled. BISDN is designed to use optical transmissions and compress its data
up to 15 times by using more sophisticated terminal equipment. Thus BISDN can
handle video images which require refreshing 30 times a second and would
require transfer rates of 100 Mbps with no compression. Because of its
complexity BISDN will likely end up in commercial applications in the near
future.

Transfer Modes
--------------
In the design of BISDN standards either the synchronous transfer mode (STM)
or the asynchronous transfer mode (ATM) can be used. STM is the POTS way
using time division multiplexing. Synchronous multiplexing uses a clock to
assign windows for information to be transmitted, regardless of wether
transmission takes place at all. Asynchronous multiplexing does without a
clock to keep transmissions in place. ATM is virtually the same as this, with
faster routines. In ATM windows for transmission are opened when needed and
are not arbitrarily assigned. Information indicating the source is in each
header. ATM is the more common method being CCITT approved. STM is still
being debated as the use of highly accurate atomic clocks will ease
multiplexing digital bit streams coming from multiple locations. 

ATM
=--

Is a method of cell oriented switching and multiplexing giving high-speed,
low error transmissions. Which combines the efficiency of packet technology
with the reliability of circuit switching. It is made up of fixed, 53
character cells. Every cell has 48 characters and a 5 character header to
keep track of its source. Incoming data is broken up into smaller uniform
cells by ATM equipment, transmitted and reassembled upon reception. 

Since processing fixed sized cells is such a basic task, ATM is much faster
at packet switching than say X.25 is. Giving ATM the ability to deal with
such demanding applications as real-time video. ATM switches and transmits
all forms of communications - voice, data, narrow and broadband, continuous
and two-way dialogue traffic, in this uniform fashion. ATM transmits its data
over a "virtual channel" when in connectionless mode. A virtual channel is
the channel that connects points on the ATM network. A virtual connection
moves a set of virtual channels with the same path identifier over the
network. It has a cell header that consists of a virtual path and virtual
channel identifier. To allow private networks, crossconnects or virtual path
switches create a permanent link or virtual path between both ends of the
network. Virtual path switches don't need signalling as ATM switches do. 

The adoption of a global ATM network will be at the earliest in 1995. Trials
with ATM are already underway. The move toward BISDN will require the
development of both this ATM network and crossconnects. 

SONET
=--=- 

The Synchronous Optical Network (SONET) is the ANSI standard for the
transmission of ATM frames on optical fiber networks. SONET vastly increases
potential transmission rates. It far surpasses today's DS3 speed and has an
OC-1 bandwith of 51.84 Mb/s. OC-48 is 2.5 Gb/s, the commercial version will
be much slower at OC-3 or 155 Mb/s. 

In addition to providing greater data transfer rates it is a far more
intelligent network, transmitting control directives in its synchronous
stream. The subscriber's data is contained in the payload and the control
directives in the overhead. Overhead is made up of its section, line and path
components. Users can manipulate the network with messages placed in
overhead. The section overhead covers frame and error monitoring and controls
key equipment on the transmission line such as optical regenerators. Line
overhead monitors performance. Path overhead monitors errors and controls the
signalling between different points on the SONET network. SONET's synchronous
bit streams give very reliable transmissions and multiplexing. 

SONET more or less integrates the functions of OA&M and as a result fewer
systems will be needed to perform them. What this means is fewer access ports
will be available to dial into. 

SONET (and for that matter ISDN, BISDN, SS7 and ATM) are more complicated and
have a lot more to them than what's been presented here. Look for specialized
files on them and what they can do for you in upcoming journals. 

Service Net-2000
=--=--=--=--=--=

Service Net-2000 is designed to use the capabilites of the 5ESS Switch to
provide a better public switched telephone network (PSTN). Improvements that
are required by the advent of more technically demanding services such as
HDTV, high speed data transmissions, speech recognition etc. These services
require faster and faster communications and higher bandwiths. Service
Net-2000, is designed to provide higher capacity switching and data networks
using SONET technology. The goal being to provide an effective universal
information service (UIS). In this Service Net-2000 is a kind of "follow up"
to ISDN.

Architecture
------------
SS7 is at the heard of this intelligent network. It provides 64 kb/s voice
transmissions and 1.54 mb/s (T1) data transmissions, when over fiber optic or
other high bandwith lines.

The need for Service Net-2000 is high, once you consider the oncoming rush of
optical transmissions measured in rates of gigabits/second. Nodes in Service
Net-2000 are also "intelligent" being "self-aware", adapting to net changes,
making corrections and self improving.  

The main goal to Service Net-2000 architecture is to provide unification. It
combines basic functions such as switching, routing etc. with data
transmissions just as ISDN does. The end result being a decentralized CO
throughout the system. As individual functions disappear and are replaced by
this integrated system.

Service Node
------------
This integration is performed by the service node. Based on the 5ESS-2000
system (note that 5ESS is now 5ESS-2000 when used with Service Net-2000 and
broadband network services-2000 (BNS2000))

The "2000" group that forms this is based on SONET. Using flexible mapping
and frame switching rates at multiples of 51.84 mb/s are supported. The
"2000" group consists of the:

- Digital data multiplexer (DDM-2000)
- Digital access and cross-connect systems IV-2000 (DACS IV-2000)
- DACS III-2000 cross connect system
- DACScan-2000 controllers
- DACScan-2000 workstation
- FT-2000 lightware

The DACS IV-2000 is able to carry higher speed virtual tributary (VT)
channels and not just today's, slower asynchronous ones. Both DACS IV-2000
and DACS III-2000 can support non-SONET hookups too, making them quite
versatile. The DACS III-2000 differs from the IV-2000 in offering the
DS3/Synchronous Transmission Signal-1 (STS-1)

5ESS-2000
---------
As I mentioned before 5ESS-2000 combines BNS-2000 with the other members of
the "2000" group. This boosts the capacity of a 5ESS-2000 Switch to 250,000
lines on 64,000 trunks. Key to this is the improved switching module, the
SM-2000. It handles everything associated with a call and can even be used as
a stand alone remote office, in which case it's called a EXM-2000.

To enable high-speed interfaces, 5ESS-2000 uses digital networking units
(DNUs). All a DNU is, is a combination of a 5ESS Switch with say a DACS
switch. The DNU-IV is a derivative of the DACS IV-2000 and gives additional
high speed possibilities. Due to its high operating speed it can greatly
speed up CO operations that are slowed down by older copper wirings.

With the DNS-2000 cell switch, the broadband integrated services digital
network (BISDN) will be created. Point-to-point packet frame relays can be
provided even to those lacking T-1s. As well as offering switched
multimegabit data services (SMDS) with up to T3 capabilities. The cell switch
is made up of low speed port carriers running at 8 mb/s and high-speed
switching systems running in excess of 200 mb/s. BNS-2000 handles both frame
relays that require connections and SMDSs which don't. 

Service Net-2000 has the ability to redirect calls between different areas
effortlessly. The service control point (SCP) provides the information for
the service circuit node based on call screening options, the date/time etc.
Allowing the 5ESS-2000 switch to offer a whole range of options such as call
waiting, forwarding, blocking etc. 

Basically the idea behind Service Net-2000 is to add intelligence to the 5ESS
switching system and to drastically improve its speed and call handling
abilities. With the purpose of creating a more powerful UIS.

Other Developments
=--=--=--=--=--=--

Intelligent Network (IN)
------------------------
IN is just distributing AI throughout the network. A trend which pops up
numerous times throughout this issue of the journal with Expert Systems,
Service-Net 2000 etc. The idea behind IN is to have large and fast central
databases connected with the rest of the network with protocols such as X.25,
SS7 etc. IN allows global service to be introduced easier with good
flexibility. 

IN is comprised of service switching points (SSPs) and service control points
(SCPs). SSP takes calls and sends them to an SCP. SCPs contain the databases
themselves such as calling card verification data. 

Telecommunication Management Network (TMN)
------------------------------------------
TMN as the name implies manages the network. TMN performs OA&M on a CCITT
standardized structure. 

Gigabit Testbeds
----------------
Are now being implemented for experimental purposes by DARPA, NSF and others.
Several are being conducted by the Corporation for National Research
Initiatives (NRI). They involve telcos, academic, commercial and government
researchers for the future National Research and Education Network (NREN)
Internet. NREN promises a good deal of services, such as real-time
transmission of high-speed data streams, huge automated electronic libraries
and Gb/s transmission rates taking us away from ascii into full motion video.

One experimental net is Vistanet with ATM and SONET capabilities and 622 Mb/s
speed. Another one is Aurora. Bellcore is providing an experimental Sunshine
switch and IBM a Planet Packet Transfer Mode (PTM). Unlike ATM, PTM packets
have no fixed size being as large as 2k. PTM is not a recognized standard but
may end up in commercial use, with ATM serving the network itself from the
CO. 

NT is providing a SONET Digital Multiplex System (S/DMS) that takes up to 16
SONET inputs of 155 Mb/s and multiplexes them to 2.4 Gb/s for Casa a co-
operative venture of several organizations in California. The main component
of Casa is a high-performance parallel interface (Hippi) gateway for SONET. 

A European group called RACE (R&D in advanced communications technologies in
Europe) is designing Integrated Broadband Communications (IBC) within a
BISDN. RACE is also working on Code-Division Multiple Access (CDMA), optical
networks, teleshopping, electronic funds transfer over a ATM BISDN, mobile
network architecture and the universal mobile telecommunications system
(UMTS).

The Future
----------
Compared to the last century of relatively stagnant copper wiring the impact
of higher bandwiths and optical technologies will - eventually - be
monumental. All of this does however depend on the introduction of optical
fibers. Because of the narrow-band copper wires that are the last link to the
subscriber, evolution to better technology is stunted (in the US at least).
The cost of overhauling these copper wires in the US with fiber ones is on
the order of 200 billion US. In other nations however, the use of fibers
linking residential homes is more than 50%. Fiber technology is however,
constantly growing and its price dropping. 

As an aside to all this, look at what's been done in the last 10 years of
communications compared to the last 100 years. We are constantly lessening
the doubling time of communications technology. In the next 3 years we will
equal the last 10 years of progress. Soon it will drop down to a year and
then to a matter of months. Since International standards take 15 + years to
work out bureaucracy may become an impediment.

---------------------------------------------------------------------------
Sources
IEEE 0018-9235/93
Telecommunications Journal April 1993
Various books and articles on ISDN
---------------------------------------------------------------------------

The LOD Technical Journal: File #5 of 12

                       =/=/=/=/=/=/=/=/=/=/=/=/=/=/=
                                Maintenance
                                for DMS-100
                                Written by -
                          -/- Unequal Access -/-
                           
.Introduction

In order to maintain Northern Telecom's (NT) DMS-100 Digital Switch an 
advanced menu driven man-machine interface (MMI) is used. It is comprised of
a Visual Display Unit (VDU) which is part of the Maintenance and 
Administrative Position (MAP) interface. I'm going to outline how it deals
with maintenance, alarms, and administration. A quick example of how it
handles line and trunk trouble reports and the addition of a new subscriber
will be given.  

.Maintenance and Administrative Position (MAP)

Hardware
The MAP is the primary interface between the technician and the DMS-100
family of switches. The main hardware components of the MAP are:

1. Visual Display Unit (VDU) - the MAP terminal
2. Alarm Panel - sends an alarm to the VDU.
3. Communications Module - (telephone) to speak with the subscriber voice 
4. Test jacks 

.Remote MAP
Since all line and trunk test equipment is an integral part of the DMS-100,
no loss in accuracy results when the MAP is remote. Every switch has its own
dialup as well. Meaning this is not a theoretical file, you will be able to
dial up DMS-100 and perform switch maintenance!

Maintenance
A sophisticated MMI through the MAP terminal is used, to allow a technician
to maintain the switch and keep informed of switch operations. Maintenance of
a DMS-100 digital switch is made up of: 
1. Manually requested maintenance
2. Scheduled maintenance
3. Automatic maintenance after the detection of faults

Alarms
The system maintains alarms for the more critical areas of the switch, ie. 
the central controller. A real-time display of the alarms gives the
technician constant status reports.  

Administration
A Table Editor allows the technician to add new lines or trunks.  A Service
Order facility allows features such as hunt groups and Multiple Address
Directory Numbers (MADN) to be added. 

.Maintenance
A common use of line maintenance is in resolving a customer type trouble
report. The technician selects the Line Test Position (LTP) option and the
selected line is flagged for action by an identifier (ie.  directory number,
physical location number). The line status information, ie. line state and
terminating director number is constantly sent to the MAP terminal by
DMS-100.

A functional test of the subscriber's dedicated line card is invoked by
DIAGNose. Test equipment measures performance of the line card and reports
deviations from defined levels. Here is what a LTP with line diagnostic
results appears as on the terminal:

   CC      CMC      IOD      Net      PM      CCS       LNS      Trks   Ext 
                                                       FDIAG     10 GC
                                                         M        "C"      
                                                                   
LTP           POST          DELQ             BUSYQ            PREFIX 
0 Quit-
2 Post-
3               LCC PPTY RNG ... LEN ...          DN STAFS LTA TE  RESULT 
4 LTPMAN         IBN PSET       HOST 02 1 12 30     772 5016 IDL
5 Busy-
6 RTS-
7 Diagn-                                      HOLD1 722 7861 IDL           
8 TstRing                                     HOLD2 722 7862 CPB7227782 
9 Almstat-                                    HOLD3 722 7861 IDL D 
10 CktLoc         Diagn
11 Hold
12 NextH-            LEN HOST 01 1 12 30  DN 7225016
13 NextP-            DIAGNOSTIC RESULT Card diagnostic OK
14 IBNCON            ACTION REQUIRED:None
15 CSDDS             CARD TYPE 6X21AA
16 LTPLTA
17 LCO-
18 Prefix-
  F
Time   XX:XX

Legend: The first line CC CMC...  represents the various maintenance        
        subsystem headers.
        The second line FDIAG 10GC represents a minor alarm condition for   
        line facility diagnostics and a critical alarm condition for 10 trunk 
        groups.
        Alarm status is given in the third line.

Scheduled Line Testing
Full testing of a subscriber loop may be performed using MAP's Line Test
Position Line Test Access (LTPLTA). Internal line test equipment (LTU) in DMS
will be physically connected to a subscriber loop with the Metallic Test
Access Bus (MTA).  Here's what the results of a manually requested line
insulation test appear as:

   CC      CMC      IOD      Net      PM      CCS       LNS      Trks   Ext 
          Clk #0                    1 LGC                        2 GC  2Crit
             M                         M                CR C     "C"    "C"

LTPLTA         POST          DELQ             BUSYQ            PREFIX 
0 Quit-
2 Post-      LCC PPTY RNG ... LEN ...                 DN  STAFS LTA TE RESULT
3 MonLTA-
4 TalkLTA-   1FR            HOST 00 27        621 1234 IDL
5 Orig-
6 Lnst-
7 Vdc-                                            
8 Vac-                                            
9 Res-                                            
10 Cap-            LnTST  
11 Hold             TEST OK                             
12 NextH-                                 RES       CAP     VAC     VDC
13 NextP-           
14 LTA                       TIP          999..K   0.05OUF  0       0 
15 BalNet                                           
16 Coin-                     RING         999..K   0.05OUF  0       
17 Ring-
18 DgtTst                    TIP TO RING  999..K   0.57OUF
  GAT2
Time XX:XX

Using this command the source of a fault and whether its on the subscriber
end or not can be determined. This test is usually run during off-peak hours,
using MAP's Automatic Line Test (ALT) and the Automatic Line Insulation Test
(ALIT). 

System Line Initiated Line Testing
When call processing detects faulty lines they are automatically scheduled to
be diagnosed in queue. The outcome is given to MAP, and a record is printed
in an office log.

Trunk Maintenance
Executes checking, testing, monitoring, status monitoring and verifying
functions to make sure trunks are working right. It also provides a means of
quick troubleshooting when a trunk problem occurs, using the telescoping
process to pinpoint the problem location. An example of a Centralized
Automatic Message Accounting 2-Way (CAMA2W) Trunk is given here: 

   CC      CMC      IOD      Net      PM      CCS       LNS      Trks   Ext 
                                                                 10 GC  
                                                                 "C"       
                                                                           
       TTP           
0 Quit-      POST          DELQ             BUSYQ            DIG
2 Post-      TTP 5
3 Seize-     CKT TYPE       PM NO.         COM LANG       STASR DOT TE RESULT
4            2WY DP MF TMB        424  CAMA2W           1 IDL
5 Bsy-
6 RST-
7 Tst-                                            
8                                            
9                                            
10 CktLoc    Tst  
11 Hold       TEST OK                              
12 Next-       + TRK107 DEC02 14:41:31 8700 PASS CKT               CAMA2W 1 
13 Rls              
14 Ckt-                         
15 Tms1Vf-                                               
16 StkSdr-                 
17 Pads-
18 Level-                  
  C
Time  XX:XX

A technician can choose to conduct trunk testing manually from the Trunk Test
Position (TTP) or automatically from the Automatic Trunk Testing (ATT) level
of the MAP.

.Alarms
Are reported at three levels according to their degree of urgency. In order
of urgency they are Critical, Major and Minor. Alarm thresholds are defined
by an administrator. ie. the percentage of a trunk group that is out of
service before a minor alarm is sent. Audible and visible indicators can be
used locally, in another part of the building or in a remote monitoring
center.  

.Administration

The Table Editor
Consists of a set of commands that will create or change data. The tables and
Table editor is part of the DMS-100's database software. Control is done at
the MAP.

An example of a new trunk addition to an existing trunk group would be:

>table trkmem                      /* TABLE Trunk Member
TABLE TRKMEM:                      
>add otdp1 1                       /*Outgoing Trunk Digit Pulse
                                   /*Element 1
SGRP:
>0                                 /*Subgroup Number
PMTYPE                             /*Peripheral Module Type
>tm 8                              /*Trunk Module Type 8
TMNO:                              /*Trunk Module Number
>0 
TMCKTNO:                           /*Trunk Module Circuit Number
>8
TUPLE TO BE ADDED:
   OTDP    1   0   TM8   0   8
ENTER Y TO CONFIRM, N TO REJECT OR E TO EDIT
>y
TUPLE ADDED
(input MUST be in lower case)

RANGE will give you a list of legal and advised inputs:

>range
1 CLLI                             COMMON_LANGUAGE_NAME
2 EXTRKNUM                         EXTERNAL_TRUNK_NAME
3 SGRP                             TRUNK_SUBGROUP_NUMBER
4 MEMVAR                           MEM_VAR_AREA

LOGICAL TUPLE TYPE:                L_TRUNK_MEMBER

>range 3
3 SGRP                             TRUNK_SUBGROUP_NUMBER
TYPE TRUNK_SUBGROUP_NUMBER {0 TO 1}

Service Orders
Are used to:
- add/remove subscriber service from lines
- add/remove services such as touchtone
- change Line Equipment Numbers (LEN) or the Directory Numbers (DN) of lines

Here's an example of how you can setup a New Single Party Flat Rate (1FR)
with options. In this case the new line will be POTS with touchtone (referred
to as dgt). The new line is part of line treatment group 1. The phone number
or directory number is 555-1212. The line equipment number is 10 1 12 26
(frame 10, unit 1, drawer 14, card 26) 

Input in prompt mode:

>SERVORD
SO:
>new
SONUMBER: NOW 85 12 02 AM
>                   /* Directory Number
>5551212
LCC:                /* Line Class Code
1fr                 /* Single Party Flat Rate
LTG:                /* Line Treatment Group
>1
LEN:                /* Line Equipment Number
>10 1 14 26         /* Frame 10, unit 1, drawer 14, card 26
OPTION:             /* Subscriber Option
>dgt                /* Digitone Dialing
OPTION:
>$
COMMAND AS ENTERED
NEW NOW 85 12 02 AM 5551212 1FR 1 10 1 14 26 DGT $ ENTER Y TO CONFIRM, N TO
REJECT OR E TO EDIT
>y

Input in no-prompt mode:
>new $ 5551212 1fr 1 10 1 14 26 dgt $
COMMAND AS ENTERED
NEW NOW 85... etc.
>y

Here is another example of how to install a new Electronic Business Set (EBS)
with DN 800-555-1212 and LEN 2 0 1. The option Special Billing (SPB) is used
with special billing DN 555-0000. 
 
Input in prompt mode: 

>SO:
>new
SONUMBER: NOW 85 12 02 AM
>
DN_OR_LEN:          /* DN or LEN
>5551212
LCC:                /* Line Class Code
>pset               /* Proprietary Set (EBS)
GROUP               /* Customer Group
>custname
SUBGRP:             /* Sub Group
>4
NCOS:               /* Network Class of Service
>10
SNPA:               /* Subscriber Numbering Plan Area
>800
KEY:                /* Key Number of EBS
>1
RINGING:            /* Audible ringing?
>y
LEN:
> 2 0 1
OPTKEY:             /* Option on key
>1                  /* EBS key number
OPTION:
>spb                /* Special Billing
SPBDN:              /* Special Billing Directory Number
>5550000
OPTKEY:
>$

That is the maintenance interface of DMS-100. If you are under the system, or
any other DMSs for that matter go searching for its dialup number. As you can
tell, there is no end to the things you can configure with it. Such as giving
yourself "special billing" or no billing whatsoever. You can also edit
numbers in different NPAs so a dialup in another NPA would suffice. 
----------------------------------------------------------------------------

The LOD Technical Journal: File #6 of 12

                Operator Service Position System
                            (OSPS)
                        By The Enforcer
                 
Introduction
-*-*-*-*-*-*

OSPS is a replacement for the Traffic Service Position System (TSPS). For a
description of the TSPS console see The Marauder's article in the LOD
Technical Journal Number One, File Four. The main difference between the two
is that OSPS can be integrated with the 5ESS Switch itself whereas TSPS was
only stand alone. OSPS uses the full capabilites of 5ESS and ISDN to provide
more services. OSPS also allows for a high degree of automation and by using
standard 5ESS configurations, maint. is simplified. 

Remote Capabilites
-*-*-*-*-*-*-*-*-*

By using 5ESS, OSPS takes advantage of its remote capabilites. OSPS can be
used to perform any traditional operator functions and just 1 OSPS switch can
handle up to 128 operator teams. This enables operators to be located at one
centralized location where thousands of operators work. (To picture this,
remember that MCI commercial with all the operators in that giant room) Huge
operator centres can be located at great distances from their host areas.
Conceivably, one huge OSPS centre could serve the entire nation. OSPS can
either be made a component of a 5ESS Switch and handle various services or a
single switch dealing with only toll or local calls. Control can be
transferred from one OSPS to another. If there is low demand, a system crash
or other emergency control can be passed on to another secure OSPS. This
process is called interflow. One usage is during off-peak hours, when usage
goes down for an OSPS centre to close down, and switch everything to another
center. OSPS can use any number of signalling systems, with different
languages or country specific requirements.

Architecture
-*-*-*-*-*-*

Operator terminals communicate with switches using ISDN paths. This is done
by connecting to positioning switch modules (PSMs). PSMs are simply the
switching modules (SMs) found on 5ESS. There are numerous other SMs that use
analog and digital trunks to perform a variety of services. SMs can be
installed remotely in which case they are remote switching modules (RSMs) or
optically remote switching modules (ORMs). 

Operator terminals allow operators to regulate calls and transfer data on a
ISDN. Basic rate interface (BRI) is an integrated services line unit (ISLU)
that connects up to the PSM. 

There are four main operator terminals - video display terminal (VDT) for
toll assistance, basic services terminal (BST) for listing services, combined
services terminal (CST) for both of these functions and intelligent
communication workstation (ICW) for International traffic assistance. Knowing
these terminals can come in handy when you are dealing with an operator, if
you can't get an answer ask to know which terminal they are looking at. 

OSPS is automated as much as possible. Digital service units (DSUs) on the
SMs provide digital automations when required such as requesting you to
insert more red box tones (uh, coins) to continue your call. 

The architecture behind OSPS is based on the call processing architecture of
5ESS, and simply copies many of its functions. To originate and terminate
OSPS the originating terminal process (OTP) and terminating terminal process
(TTP) are used. The OTP is started when a trunk is seized, usually in the
initiation of a toll call, and decides where to place the calls such as to
automated billing etc. OTP also monitors the calls as its in progress and
conducts billing. Should OTP move the call to an operator, it will label it
as one of 128 possible conditions based on the dialled number and trunk
group. TTP is started when the call goes out from the switch on outgoing
trunks to enable signalling.

Automatic Call Distribution (ACD)
-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-

ACD controls incoming calls to operator teams, placing them in queues if
needed and directs the call depending on its condition to the right operator.
At the OSPS centre, there are 128 teams, 1 for each condition. If there are
no available operators ACD will place the call in one for four queue
conditions. The first is ringing, the next two are announcements and the
fourth is an announcement followed by a hanging-up of the caller. The ACD
constantly has the status for every operator. The three conditions are made
busy, busy and available. Made busy is an otherwise available operator that
isn't ready to receive calls. If an operator team services more than one call
type, and if one call type is queued the call with the highest "delay ratio"
(the expected wait time) will get the next available operator. Supporting
teams, up to 8 of which back up the principle teams act as a "reserve" if the
principle ones are busy. Subject to the condition that a queue is backed up
higher than the "outflow threshold" and the supporting team doesn't have a
queue past the threshold either. The position terminal process (PTP) logs
operator status by looking at operator inputs, calls, etc. PTP will then
route the call to the operator, place it in a queue or route it to another
operator. 

PTP 
-*-

PTP has four models:

virtual terminal (VT) - Takes keystroke inputs, checks them to see if they
are legal commands and passes them on.

feature model (FM) - Handles the status of the operator, if an operator logs
in, it will indicate that the operator is now available. 

near model (NM) - Processes the operator inputs.

call coordination model (CC) - Handles coordination between PTP and other
operations. For example signalling between PTP and OTP/TTP. 

Here is how AT&T describes a typical event:

. A seizure is detected on an incoming trunk, and an OTP is created.
. Signalling information, such as dialled digits and the back number, is
collected and analyzed; the need for an operator is recognized.
. Call type is determined from the dialled digits and incoming trunk group to
classify this as an OSPS call of type 1. The ACD administrator has assigned
type 1 calls with serving team A as the principal team and serving team B as
the supporting team. 
. The OTP sends a message to the ACD requesting an operator. This message
identified the call as type 1 and obtains other call information.
. The ACD determines that calls of type 1 are being queued.
. The call is queued, and the expected delay is calculated. By comparing the
expected delay with administratively specified delay thresholds, the ACD
determines whether a delay announcement should be provided to the caller. .
A message is sent to the OTP with this information.
. The OTP first connects the delay announcement, then provides audible ring
to the caller. 
. At this point, an operator from serving team B becomes available, and the
call of interest has migrated to the head of call type 1 queue. The ACD
determines that no calls are waiting in any of the principal queues for team
B, and further determines that the next call in the call type 1 queue is
eligible to be intraflowed to team B. The ACD informs the OTP to send the
call to the available operator from team B by sending a message to the PTP in
the PSM. It then marks that position as busy with a call. 
. The PTP, via the CC model, establishes the voice path between the caller
and the operator and sends appropriate display messages to the operator
terminal, via the VT model, to provide the initial call seizure information. 
. The customer requests a collect call from the operator who depresses the
collect key and enters the number to be called. Messages are sent from the
operator terminal to the PTP to relay the information. The VT model processes
each incoming message and forwards the message to the near model. The near
model marks the call as collect and initiates the connection to the forward
party via a new CC model. This results in creation of a TTP and appropriate
interswitch signalling to ring the forward party.
. After the forward party answers, the operator secures agreement for the
collect billing and releases the call from the position via the position
release key. This keystroke is first processed by VT and passed on to the
near model. The PTP notifies the OTP of the collect billing arrangements. The
talking paths are reconfigured to eliminate the operator position. The two
parties on the call are now speaking directly without an operator on the
call. 
. The operator terminal screen is cleared by VT. The FM reports its status
back to the ACD as available to handle another call.
. At the conclusion of the call, a billing record is made by the OTP.

Automation and Efficiency
-*-*-*-*-*-*-*-*-*-*-*-*-

OSPS is designed to be as automated as is possible. It is supposed to make as
little use of human operators as can be gotten away with. When you think
about it that's the result of OSPS - human operators are becoming less and
less needed. If it wouldn't be for all the potential uproar, they'd get rid
of all human operators entirely. They are regarded as a horribly expensive
way to handle calls. OSPS allows operators comfy little terminals and pulls
them out of situations where they are needed as soon as they aren't required.
For example after obtaining a number for collect billing, the rest of the
process - voice acceptance can be automated. 

Many services in the past that were separate are now combined under OSPS. For
example toll and directory assistance operators had to be kept available in
large numbers to handle call surges. Meaning toll assistance can be queued
up, while directory assistance has available operators. Now with CST, an
operator can handle both services. 


Data Communications
-*-*-*-*-*-*-*-*-*-

ISDN is used to transfer data in OSPS. External systems can also be reached
for such purposes as directory assistance information. Three layers are
involved in OSPS operator-switch exchanges:

layer 1 - the physical layer - Gives synchronous data transmission from the
terminal to the ISLU.

layer 2 - the link layer - Provides point-to-point exchanges between the
terminal and PSM. 

layer 3 - the packet layer - Is the layer 3 protocol of X.25. It's a resident
virtual circuit for exchanges between the terminals and the SM's processor.
Which can be used in switch virtual circuit connections to external
databases.

Databases
-*-*-*-*-

OSPS uses databases during most calls. To do such functions as check the
validity of calling card accounts to prevent cancelled cards from being used.
Millions of database queries take place every 24 hours. Because of the
immense size of these databases, they can't all fit in 5ESS. So external
databases are used. 

Common channel interoffice signalling (CCIS) links OSPS with external data.
To link with external computers CC7 is used. Data is returned to OSPS from
nodes on CCS such as the line info database (LIDB) or billing validation
application (BVA). These two nodes handles your Bell's validation of all
collect, third number and calling cards. 

The X.25 protocol is also used to connect OSPS with other databases. Each
database has an ISDN directory number. So one can scan out the addresses and
access them on the public PSNs. Since your RBOC doesn't want people messing
around with their BILLING databases, they are put in a closed user group
(CUG). 
---------------------------------------------------------------------------

The LOD Technical Journal: File #7 of 12

         (*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)
         Testing Operations Provisioning Administration System
                               (TOPAS)
                       LOD - Mystik Freak - LOD
         (*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)


In order to perform Operations, Administration and Maintenance (OA&M) on
switched circuit and facility networks the TOPAS operating system (OS) has
been developed.  From the "core" of TOPAS the Transport Maintenance
Administration System (TMAS) was designed to assist in running the Facility
Maintenance and Administration Center (FMAC).

As the telephone network became more and more advanced the conduction of OA&M
became increasingly difficult. What's brought about this sophistication has
been the later versions of electromechanical switching systems, ISDN etc. In
order to keep up Artificial Intelligence (AI) ideas are being used as a basis
for TOPAS-ES. TOPAS-ES is designed as an Expert System (ES) replacement for
TOPAS to handle switch circuit operations. TOPAS-ES performs this circuit
maintenance using its AI to find and report on network difficulties. 

Network Maintenance
In the current 5ESS Switch maintenance is performed by TOPAS and the remote
measurement system (RMS-D3). Under 4ESS circuit maintenance system 1 (CMS-1)
is used. The purpose of RMS-DX is to allow testing on circuits terminating on
switches. The network is monitored as the transmission passes through the
XESS Switch, the multiplexer (MUX) and the line terminating equipment (LTE).

TOPAS and CMS-2 continually monitor the network's status and look for
deviations from normal operations and then print up trouble reports. Because
so many reported problems are transient or falsely reported as a problem,
further testing is done to determine real or "hard" problems. Through such
procedures as performing tests on one of more than a million scan points or
attempting to receive from one or two ends of the circuit. 

TOPAS uses two different machines with their own databases when processing:
Equipment Interface Tier (EIT) and the Network Support Tier (NST). 

EIT - An EIT contains a database that has physical information about a
Network Element (NE) machines.

NST - NST's databases are not interested in NE machines or in physical
properties and instead uses mathematical models. Even radical network changes
will have only minimal effects. Thus the combination of say fiber and copper
wiring on the same circuit or the merging of voice and data communications
has no great effect. NST can handle everything from basic trunking to complex
multipoint circuits. 

Both EIT and NST use Common Languages to communicate with each other. NST
will for example query NST about specific equipment, while EIT would query
NST about network changes. Since EIT and NST are both in the TOPAS core
interactions are quite simple. 

TMAS
TMAS followed TOPAS and in its design, developers reused almost half of
TOPAS's core. Since TOPAS and TMAS speak a common language cooperation
between the two is possible. Many report procedures are identical such as the
DS-1 facility alarms.

FMAC
TMAS is designed to run with the FMAC. By providing updated route databases,
alarm monitoring, detection of network faults etc. TMAS also helps
administrate by issuing trouble tickets, switch logs and sending out this
data to other personnel from the FMAC.    
 
Expert Systems (ES)
An ES is a system where the program and the knowledge used in decision making
are kept apart. The program contains a set of rules, containing what action
should be undertook depending on the situation. This is often referred to as
a "shell" that controls the activities of its host system (think of the UNIX
shell). 

ESs in Networks
The maintenance of complex networks is an ideal application for an ES. By
having the equivalent of the most capable repair mind on each switch. As all
the ESs are using a common knowledge base that has everything known about the
problem and the most effective way to solve it. Several other ESs have
predated TOPAS-ES such as ACE, NEMESYS and GTE's COMPASS. As any technical
worker will attest to, network operations are particularly troublesome as the
call carrying capacity must be maximized while trying to minimize the
congestion that results when traffic exceeds the call capacity of the
switching and transmission system.

TOPAS-ES
TOPAS-ES, is as the name indicates, is an ES version of TOPAS. It works with
both TOPAS and CMS-1 in the 4ESS and 5ESS environment. TOPAS-ES has a UNIX
routine for each of its three subsystems - knowledge base and inference
engine, communication and systems interface and user interface. The inference
engine used in TOPAS-ES is "forward chaining" or data driven as it is guided 
available data to fit prestated conditions to obtain an answer. If it used
backward chaining, it would search for data to obtain an answer. Forward
chaining is a more effective route to take when data is available and answers
to a question (using backward chaining) are unneeded or to slow. Generally,
forward chaining in network maintenance is preferred. For example, data
indicating that Joe Phreaker is blowing 2600 tones is of more use than
attempting to answer a question of "Where are all the foreign tones on the
circuit originating from?" To keep up with its immense chores of network
monitoring, testing and issuing trouble reports, gathering data and figuring
out answers TOPAS-ES runs each of its subsystems at the same time, working in
"real time" with the network.  

Distributed AI (DAI)
DAI is where multiple processes which normally act independently, co-operate
which one another. TOPAS-ES uses DAI to station one TOPAS-ES at one end of
the circuit and another on the other end or at the CO. This enables more
computing power to be levied at pinpointing the problem and makes for a
faster, more reliable system. TOPAS-ES can assume either a director or
responder mode. If TOPAS-ES is analyzing a faulty circuit it can request or
enlist another TOPAS-ES and place it in the responder mode to assist it. 

Expert System Trouble Analyzer (ESTA) 
This is one of TOPAS-ES's subsystems and performs the main operations of:
trouble ticket analysis and chronic history analysis (CHA). 

Trouble ticket analysis: Since few problems reported by TOPAS-ES are genuine
ones that require attention, ESTA narrows down the hard from the transient
problems. ESTA determines this mostly by ordering TOPAS-ES to wait and
perform further monitoring.

CHA: This exposes faults after repeated transient trouble indications. If the
problem persists for longer than X amount of time, with over Y indications of
trouble it will be labelled chronic. CHA is designed to pick up on problems
that have been passed off as transients and ignored. For example a problem
may exist during peak hours but will be passed off as a transient when
monitored during off-peak hours.

Expert System Trouble Sectionalizer (ESTS)
Once ESTA has determined a trouble to be hard it will pass along a "trouble
ticket" indicating such information as its duration, current condition and
whether its chronic or not. 

When ESTS has been handed a hard trouble it will "sectionalize" the indicated
area on the circuit. This is done by having technicians at each end examine
points on the circuit and performing other tests. ESTS is based on the best
sectionalization techniques, being an ES. An ESTS sectionalization strategy
would work like this: 2600 tones are being heard on the network, circuits are
all in normal condition, 2600s are not in internal use and have been labelled
as unauthorized, foreign sounds so ESTS would deduce that someone is trying
to bluebox. 

ESTS has a wide list of strategies to try depending on the situation. The
most likely to succeed strategies will be attempted first and if this fails
all of its strategies will be tried in order of success probability. Once the
fault has been pinpointed the relevant repair crew/station will be notified
along with a description of the fault.

---------------------------------------------------------------------------

The LOD Technical Journal: File #8 of 12

               International Switching Systems
                      by Mystik Freak 
                         LOD - LOD


One of the goals behind phreaking has always been to delve into the deepest
fathoms of the phone system. Since the barriers of expensive international
calling are meaningless to the phreak, the exploration of various telephone
systems is possible.

This file will investigate some of the switching systems you are likely to
encounter around the world. In other words non-ESS/DMS using nations outside
the United States. Nothing has ever been said about these systems in "the
underground" and what little information that exists publicly is skimpy, hard
to find, badly translated or not translated at all and very outdated. 

The foundation of any telephone network is in its switching system so a whole
new universe of different switching systems is out there waiting for you. ESS
does get boring after a while and there is nothing really novel about if,
after all nearly everyone lives under it and there isn't that much to
discover about it. So branch out internationally to seek new telephone
networks and boldly go where no phreak has gone before!

I won't spoil the thrill of hearing new tones and discovering new things by
giving out all the juicy things you're liable to find, instead this is going
to be a broad based overview of 7 switching systems:

Sweden - AXE 10
France - E 12
United Kingdom - DSS
Netherlands - PRX-D
Germany - EWS-D
Italy - PROETEO
Japan - NEAX 61
 
There are far more than just these systems out there as shown by this chart
of systems indicates:

System            Country                Type
~~~~~~            ~~~~~~~                ~~~~
AFDT1             Italy                  local/tandem
AXE 10            Sweden                 local/toll
D 1210            US                     local
DCO               US                     local/toll
DMS 10            Canada/US              local
DMS 100           Canada/US              local/toll
DMS 200           Canada/US              toll
DMS 250           US                     tandem
DMS 300           Canada                 tandem
DS 1              Japan                  tandem
DSC               US                     local
DSS 1210          US                     local/toll/operator
DTN 1             Italy (Sudan)          tandem
DTS               US                     tandem
DTS 1             Japan                  toll
DTS 2             Japan                  local
DTS 500           Netherlands            tandem
DX 100            Finland                local/tandem
DX 200            Finland                local
EWS-D             Germany                local/toll
E10               France                 local/tandem
E10 B             France                 local
E10 S             France                 local
E12               France                 toll
FETEX 150         Japan                  local
FOCUS 5           US                     local
GTD 5 EAX         US                     local/toll
HDX 10            Japan                  local
IFS               Switzerland            local
ITS 4/IMA2        US                     toll
ITS 4/5           US                     local/toll
ITS 5A            US                     local
I2000             Yugoslavia             local
LCS 4/5           US                     local
MSU               US                     local
MT 20/25/35       France                 local/toll
NEAX 61           Japan/US               local/toll/operator
No. 3 EAX         US                     toll
No. 4 ESS         US                     toll
No. 5 ESS         US                     local
PROTEO            Italy                  local/toll
PRX-D             Netherlands            local/toll
SPC 2             India                  local
SX8               France                 local
SX 2000           Canada                 local
SYSTEM 12 (1210)  US                     local/toll/operator
SYSTEM 12 (1240)  Belgium/UK/Germany     local
TDDSS 1/2         China                  tandem
TN 5              Italy                  tandem
TROPICO           Brazil                 local
TSS 5             US                     local
UT 10/3           Italy                  local
UXD 5             UK                     local
1220/PCM-5        Belgium/France         tandem


Sweden - AXE-10 (+46)
~~~~~~~~~~~~~~~~

The Swedish AXE 10, was developed by Ericsson and in addition to being found
in Sweden itself is also being used by over 30 countries. 

AXE 10 performs most of the basic functions of international switching, local
tandems and offices, national transit etc. It covers everywhere from isolated
rural areas with only a few hundred subscribers all the way up to huge
transit exchanges of a million subscribers.

AXE 10 has 3 main susbsystems:
SSS - Subscriber and group (GSS) switching
TSS - Trunk signalling and (TCS) traffic control
CHS - Charging, OMS and Maintenance

Other optional subsystems are:
SUS - Subscriber faciltites (OPS) operator functions
MTS - Mobile subscriber functions

Functions that share the same purpose are allotted to one subsystem. A
function block is a group of similar functions within the subsystem. For
example the subsystem SSS has a function block called the time switch (TS). 

Hardware

AXE 10 is a digital switching system. Interconnections between subsystems are
called "internal digital trunks". To give an example of AXE 10's hardware
consider the SSS subsystem.

SSS is divided up into lots containing up to 2048 subscribers, up to 128 of
these subscribers will then form a line switch module (LSM). Each subscriber
has an individual line circuit (LIC) connecting them to the LSM. The LSMs
themselves are interconnected by a TS bus (TSB). Each module has a TS that
performs switching for the subscriber the TSB and a junctor terminal circuit
(JTC).

Traffic within subsystems is handled by internal diagnostic links. If the LSM
lacks an internal digital link the call is carried by a TSB to another
module. Because SSS uses TSS and TSBs the network runs smoothly as a balance
is kept between the subscriber nodes and the internal digital links in use. 

Subscriber information can be kept either centrally or remotely. TS 16 in a
PCM is used to control a remote exchange. If the SSS is remotely located an
exchange terminal circuit (ETC) is used. The PCM will then signal between the
remote SSS and the ETC. The signalling is controlled by a signalling terminal
(ST) on the SSS and ETC ends of the circuit. 

The trunk signalling system (TSS) interfaces external signals into the AXE 10
signalling scheme.

One of the benefits to AXE is that any signalling scheme can be interfaced
without impacting on other subsystems. Thus AXE is highly adaptable to
network conditions.

In cases where analogue lines are connected by either incoming trunk (IT) and
outgoing trunk (OT) circuits conversion to digital takes place. Tone
signalling is conducted by code receivers (CRD) or code senders (CSD). 

France - E 12 (+47)
~~~~~~~~~~~~~

CIT-Alcatel and Telic (CIT-ALCATEL) developed the E 12 system bases on the
earlier E 10 system to handle the functions of:

- international gateway
- inter-city transit
- medium to large urban area transit
- subscriber line switching

Capacity

The capacity of E 12 depends on call duration, signalling etc. The maximum
capacity is currently 1536 digital PCM systems of the 30 + 2 type equalling
over 40,000 circuits. Processing up to 110 calls a second. 

Architecture
E 12 is based on the architecture of its predecessor - E 10B. The three main
components are:

- subscriber and circuit connection units
- the central switching system and common control 
- computerized supervisory and maintenance centre (CTI) 

The CTI is the second control level supervises several exchanges and handles:

- line circuit management
- traffic load data logging
- maintenance and alarms
- billing

Three subassemblies allow speech transmission. The TST switching network, the
subscriber connection units (URA) and the circuit connection units (URM).

System Control
Is made up of three levels:

- a processing level in the line and circuit connection units, where
subscriber circuits are controlled
- central common switching control
- CTI

First Level Control
Is conducted by:

- 2 markers (MQ)
- 2 translators (TR)
- 2 incurred fee metering units (TX)
- 2-6 multiregisters

All of these units are related to a single switch and communicate on a bus
LM.  

MQ - interfaces common control to the central switch and subscriber and
circuit connection units
MR - receives and retransmits information and adjudicates the opening and
closing of connections.
TR - stores subscriber and circuit data
TX - free metering units
OC - control interface unit connects the CTI to other subassemblies.

Subscriber Connection Unit

Because traffic is concentrated on a small number of digital PCM systems, the
subscriber connection unit is needed to provide analog to digital
conversation. It also handles remote subscribers. The unit connects thousands
of lines to a central TS on PCM channels. 

Software

switching programs - perform loop status sensing, condition detection,
connection and disconnection, switch identification. maintenance subscriber
status memories etc.

monitoring programs - monitor the core of CSE, test and fault tracing
routines etc. 

All programs are written in Assembly. 

Functions
E 12 provides:

- CCS7
- traffic observation
- automatic fault tracing
- remote fault tracing
- service grade measurement
- operator assistance position
- automatic call back etc.

Organization
E 12 is organized into three areas:

- the switching network which handles signalling channels and
incoming/outgoing multiplexes
- the signalling units which handle channel allocation, CMF, CCS, DTF etc.
- a main SPC computer

All of which are connected to connection units (see the subscriber connection
unit). 

Programs
The main programs used are:

- program execution system, interfaces with the rest of the systems program
- exchange interface IOP (SEST)
- data interface IOP (SESI)
- signalling processor (SIG)
- common programs (PCO) for data
- call processor (TAP)

Service Management Unit (GES) does man/machine transactions, routing tables
and prefixes, signalling type allocations, traffic observation and logs
traffic data.

Fault Recovery System (DEF) will reconfigure after a detection of a system
failure, providing efficient recovery. 

Tracing and fault isolation (TED) will isolate a fault down to the PCB level
and carry out CRCs for fault prevention.

Digital Switching Subsystem (DSS) - United Kingdom (+44)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DSS was created by the British Post Office (BPO) to serve as the nations
first digital switch. 

Subsystems
DSS uses specific hardware and software functions to interface subsystems.
The main DSS interfaces are located at the following subsystems:

- call processing system (CPS) 
- maintenance control subsystem (MCS)
- analogue line termination system (ALTS)
- network synchronization system (NSS)
- management statistics subsystem (MSS)

The main connecting interface in DSS is a 2048 kbit/s, 32 channel multiplex.
Which is used for example to connect the switchblock and auxiliary units. 

Trunking

DSS is capable of handling international switching centres of up to 20,000
erlangs and over 400 switch requests a second. To meet this the switch must
be multistage. The DSS switchblock has identical originating and terminating
circuits. A four-wire multiplex has a transit and receive pair on both ends
of the circuit. So information on the busy/free state of both is available
from one. 

To achieve spatial routing which is necessary for two channels to be
connected, DSS uses integrated circuit multiplexers (encoders).

DSS's time dividing in trunking allows single switches to carry large amounts
of traffic. The drawback to this is that should a fault occur on this switch,
thousands of calls could be disrupted. To ease this risk, synchronous
duplication of the TST setup with data comparison and parity checking is
done. 

Subsystem Functions

- digital line termination unit (DLT) interfaces the four-wire, 32 time-slot
2048 kbit/s multiplexers with the switchblock

- the TS transfers input time slots to output times slots

- space switch (SS) is an integrated circuit set for devices that connect
links with the trunk

- alarm monitor unit (AMU) - relieves the main cpu's load by handling alarm
data

- primary waveform generator (PWFG) is the clock with DSS is based on. By
sending 8 Khz tone start signals and 2048 Khz bit streams, operations are
directed

- local synchronization utility (LSU) uses incoming PCM links for timing and
maintains the frequency of its oscillators using phase locked loop techniques

- input/output buffer (IOB) stores messages from the software to the CLU

The Time Switch

Buffers the time reception with the time allocated from cross-office
switching with the space switch and the actual time of transmission. It also
does alarm interfacing between monitoring equipment and trunking. The TS is
composed of:

- speech stores (including DLT interfaces and store refining registers)
- control stores
- alarm interface unit (AIU) (including DLT and AMU interfaces)
- TS racks - a complete send and receive switch within DSS. The two TSs are
used in trunking are in 1 rack with 32 DLT units.
- space switch - a set of buffer and crosspoint units. Using the 2048 Khz
clock, the transmission of traffic is done on the TS interface buffer.

Hardware

The processor utility (PU) IOB is interfaced with the CCU by the PSS IOB. The
IOB communicates with the following:

- command field - ordering operations such as measure, trace, opening or the
removing of TSs.
- address fields - set network termination numbers (NTNs) that define TSs,
circuits etc.
- message identity field
- cross office slot field - makes sure that traces don't duplicate their
efforts by setting the points to start from during fault location. 

AMU

AMU handles DSS's specific functions such as the collection and persistence
checking of status info and diagnostic hardware. AMU interfaces to the PU and
thus advises the DSS maintenance software on fault areas. AMU receives time
and fault switchblock indicators from DLT using AIU in the TS. Persistence
checks are done to label the alarm as hard or transient. 

DLT

DLT conducts the line associated functions of monitoring, installation etc.
DLT also performs switch-related operations. Several are for simple backup
duplications of such functions as trunking and switch fault detections. 

DLT Related Functions

The line processor encodes or decodes HDB3 signals and recovers the received
clock. The clock is recovered by using a ringing circuit. The clock
synchronizes the switching centre by providing a network frequency reference.
DLT will identify remote alarm information if the distant alarm bit (usually
bit 3 in channel 0 of odd frames) shows a problem. DSS will, using AMU
instruct MCS to locate the fault. An alarm indications signal (AIS) shows a
transmission equipment failure by tossing out a load of "1s" in the frame. 

Line errors can be detected locally if HDB3 input goes or if synchronization
is off. If this occurs MCS is informed and DSS transmits a distant alarm unit
signal. 

Switch-related DLT functions are usually involved in duplicated trunking,
fault location or switching channel 0 spare-bits.

The most interesting function is fault location. DLT works with maintenance
software to locate and diagnose switchblock faults. By using path checks or
loop backs, results are sent via AIU to DLT.

Paths are tested using check patterns at both ends of a trunk. They can be
sent in and monitored on any channel after switching. Registers are used to
store the check patterns and they are controlled by the "central office". 

Or the DLT will "loop back" its transmit channels to the receive input of
trunking. Loop back is sometimes combined with a path check. By changing the
switch connections a closed loop can be implemented throughout the trunk.
Closed loops are very effective in determining hard faults from transient
ones.

Netherlands - PRX-D (+31)
~~~~~~~~~~~~~~~~~~~

The Processor Controlled Exchange-Digital (PRX-D) builds upon the PRX system
with digital-time division multiplexing (TDM) and with other enhancements.
PRX-D was developed by Philips Telecommunication as an intelligent SPC
system. 

The three main areas of PRXs are:
- the switching network (SWN)
- central control complex (CCC)
- operator services (OPS)

Two different versions of trunk lines are used. An analog version - PRX-A has
six linked stages and reed-relay crosspoints of two or four wires or a
digital version of the TST type. Local or remote usage is possible by sending
traffic to the trunks. 

The CCC has two types of telecom processors (TCP) to deal with different size
exchanges. TCP 18 covers small-medium exchanges and TCP 36 medium-large
exchanges using multiprocessing with synchronized pairs. 

OPS is controlled by a mini-processor called TCP 7. OPS deals with OA&M and
AMA. 

Architecture

PRX-D is made of two layers:
- the main layer with the CCC, TCP XX and the control channel processor
terminals (CPT), connecting this layer to the control channel (CCH)
- another layer of SWN modules and the sub-channel controller (SCC)

The digital switching network (DSWN) passes voice and data traffic on 64
kbit/s, 32 channel PCMs. The PSWN has block terminals (TER) which interface
to other circuits and allow services and signals to be interconnected by a
digital trunk link network (DTN).

DTN

DTN is a one-way only transmission on a 4 wire connection. The highway-to-
group (HGD) and group-to-highway multiplexer (GHM) are 16 inlet ports in 4 X
4 groups. A highway switch (HWS) is a group of up to 128 X 128 highways whose
crosspoints can switch from one highway to the next under the control of a
highway switch address generator (HSA). A highway-to-group demultiplexer
(HGD) does the opposite of the GHM. 

A digital trunk-line block (DTB) carries a single highway and is controlled
by a DTB marker (DTM). DTN utilizes 7 varieties of customized low current-
mode logic (CCL) ICs.

CCL

The central clock (CCL) is made up of the synchronized mode clock generators
(CLG), the clock measuring unit (CMU) and sometimes a clock reference unit
(CRU). The DTN is sent timing information on 4096 Khz sine waves and 8 Khz
alignment pulses. 

Terminals

The 4 main TERs are:
- interfacing analog circuits (ACT)
- subscriber lines
- digital circuits (DLT)
- signalling and services (SST) 

- ACT has a peripheral module controller (AMC), a power supply unit (PSU) and
possibly a DTN interface board (DIB). The DIB performs the transmission of
timing signals and assigns time slots. 

- SST handles 2048 kbit/s groups by using DTN for signalling ie. MFC,
keytones etc. for services such as voice response systems.

Software

The operational program for TCP 18 is made up of: 
- master control program (MCP)
- call processing
- error management
- configuration management

The MCP handles the central control unit (CCU), I/O operations and other
misc. services. 

Communication between the main control unit (MCU) and the PMC is done by
transport handlers such as the digital trunk marker (DTM), analog circuit
terminal (ACT), digital circuit terminal (DCT) and the signalling and service
terminal (SST).

Call Handling

One part of the Telephony Operating System (TOS) is call processing modules.
Which distribute calls to an open CCU depending on network conditions. If a
secondary control unit (SCU) is available it will receive the calls. If
niether is available then the MCU will receive them. 

Error Maintenance

Error detecting hardware does diagnostics such as checking parity, comparing
timeout circuits etc. By using hardware to perform tests, checking is done
every time the hardware runs and processing time needn't be wasted running
testprograms. When the hardware equipment itself needs testing, testprograms
are then used.

Germany - EWS-D (+49)
~~~~~~~~~~~~~~~

Manufactured by Siemens Telecom, EWS-D is a complete digital switching
system, capable of serving from 200 lines to 60,000 trunks. 

Architecture

Subscriber line terminations and interchange trunks are used with trunk/line
groups (LTGs) where digital tone generators and digit receivers are located.
A TS performs connections inside of the LTG. Digital switching connects the
groups to a central processor (CP). Functions carried out by the CP include
overall switching, data storage and remote operation of the system. 

Here's a quick example of how a call would be processed under EWS-D:

- the group processor (GP) sense that the phone is off-hook and gives the
caller a tone generator and a digit receiver on the LTG using the group
switch (GS).
- the GP sends the service requested and the dialled digits to the CP. 
- CP checks the callers COS, locates a path and informs GP of the caller
- the callee's GP finishes the connection with its LTG, sends a ringing and
places the callee off-hook. 

LTG

Signals from an analog subscriber's line are converted into PCM signals on
the line circuit. Up to four interexchange trunk terminations comprise one
module. Four modules make up one highway and up to 128 interexchange trunks
can be on one LTG. A basic subscriber line circuit interfaces with any
signalling system. Notable functions of the subscriber line circuit are the
50/16 kHz call charge meters on the subscriber's premises, access circuitry
for testing and paystation signalling.

The PCM 30 transmission system has its synchronization, signalling channel
and alarm signal on one module. 2.048 Mbit/s highways are connected to the
GS. For a connection to the central network, 4 2.048's become one 8.192
Mbit/s signal. Because the network is duplicated, the identical modules can
easily be used for testing. 

Tones such as MFC frequencies are generated digitally on a LTG and sent to
the GS. One change here can effect the entire network. 
Central Switching Network

By using a central switching network up to 504 trunk groups, equivalent to
100,000 subscriber lines or 604 trunks can be attained. 8.192 Mbit/s
interfaces are used between the network and the LTG. As mentioned before the
entire network is duplicated. In case of a fault, the network will switch
over to its other half. 

Control and Common Signalling Channels

Control channels are grouped into units of 128 for distribution on the 8.192
Mbit/s network. The channels in time lot 0 are switched to the LTG only on
transmission links. Only half - 64 of 128 control channels are used. The
other half are for future uses. 

With SS7 the procedure for switching signalling channels though the LTG is
identical to that of the control channels. 

OA&M

Digital systems such as this have far fewer errors than analog SPC systems do
due to the smaller number of modules. EWS-D is expected to have fewer than 12
hardware faults per 1000 LTGs with less than 2 hours per fault. 

Both hardware and test programs are used to diagnose both subscriber line and
trunk faults. When testing is done on long distance trunks the equipment on
the distant exchange and on the transmission system is done. Measuring
equipment such as ATME2 look at the director and responder operations. Most
local trunks are still copper and EWSD has contacts on the incoming and
outgoing circuits for testing. The monitoring of PCM transmission links is
integrated into EWS-D. 

System status is given by an operating terminal indicating system traffic,
the failure/active status of redundant central units, LTGs and equipment
inside LTGs, the number of removed from active LTGs, subscriber lines and the
number of non-switchable call requests. Remote operations can be done via
this terminal. 

Administration tasks are also performed at the operating terminal. When a
remote operator is needed, communication equipment such as Transdata is used
to connect to the exchanges over the data transmission channel. 

Italy - PROTEO (+39)
~~~~~~~~~~~~~~

PROTEO was designed by Societa Italiana Telecomunicazioni SpA (SITS). 

Architecture

It is a fully integrated, digital switching system with SPC. Signals are
converted from analog to digital and transmitted over a PCM. Capacity is
30,000 subscribers in 32 peripheral exchanges (CTs) hooked up to a transit
network (RT) using 32, 2 channel PCMs. Overall control is by a central
computer (CC). A lone CT can handle 2,304 subscriber lines with 18 PCMs, 270
LF trunks and possess 2 line control units (UCL) on a connecting network
(RC). 

Subscribers and trunks are connected through a time division multiplex (TDM)
and can go directly to PAM without the analog to digital conversion using
voice scanners if need be. 

The CT, can act as a switch if internal subscribers are being switched to
RTs. CT is commonly connected to the RT for interconnections with external
switches. The CT has a codecom unit to convert analog to digital or digital
to analog for PCM bundle generation or insertion into PAM. A TST connection
network is inside the RT and is controlled by the CC using the transit
control unit (UCT). The RC switches 64 kbit/s data channels on 2 Mbit/s PCM
bundles towards UCS when exchange signalling exists and to UCM when remote
signalling comes in on a common channel. If CCS isn't present, then
signalling control units (UCS) are used to process signalling codes. 

Maintenance

CC uses LEONE processors in SPC for maintenance and has a BHCA capacity of
150,000. PROTEO handles rural areas quite well as CTs can be located at great
distances from the RT. If less than 250 subscribers exist, concentrators will
be used to connect them to a CT. 

Flexibility

The modularity of PROTEO is its ability to adapt to different network
conditions. By having functions act independently of others, upgrades and
maintenance is simplified. 

Japan - NEAX 61 (+81)
~~~~~~~~~~~~~~~

The NEAX 61 was designed by Nippon Electric Co. and was first installed in
the US. But due to its origin it is being included as a Japanese system. It
has SPC, PCM TDM and uses a four stage TSST switching network. 

Specifications

circuit capacity:
local switching - 100,000 lines, 13,000 trunks
toll switching - 60,000 trunks
international switching - 30,000 international circuits
network capacity - 22,000 erlangs
call handling capacity - 700,000 BHCA

Architecture

NEAX 61 is comprised of 4 subsystems:

- application subsystem - several service interface modules each having line
and trunk circuits, interface circuits, multiplexers and a controller. This
subsystem gives a standard interface to the other subsystems. It controls the
terminal circuits and interfaces them with the switching subsystem. Service
modules receive information from the processor to establish paths and other
actions. Each service module has a terminal and interface circuit, a
duplicated controller and primary multiplexer (PMUX) and demultiplexer. The
controllers collect terminal circuit scanning data, control the terminal and
interface circuits and communicate with the processor. The modules each have
their own terminal and interface circuits:

- analog trunk interface module - Both the terminal and interface circuits
are codecs. Any analog trunk can be used by the module and each trunk has its
own codec channel. 

- analog line interface module - The terminal circuit is an analog line
circuit that conducts two to four wire conversion, ringing application,
protects against overvoltage and other testing procedures. By using one of
four switch selectable balancing networks an insertion loss less than 0.5 dB
is possible. 

- digital line interface module - Connects PCM analog and digital subscriber
carrier lines. The interface circuit is a digital line switch that
concentrates digital lines by assigning time slots and putting each time slot
on a serial bit stream to the PMUX. 

- operator position interface module - connects the different operator
positions such as toll and directory assistance. Operators converse with
callers over position trunk circuits. The controller has a capacity of up to
64 operator positions and the PMUX can have up to 120 operators on a position
trunk. 

- processor subsystem

- Maintenance and Administration subsystem - Alarm information is shown on
the maintenance frame or at a supervisory test desk. The line test desk
platforms subscriber line testing. NEC has a technical assistance center
where NEC personnel provide support on a subscription basis. 

---------------------------------------------------------------------------
Sources 
Various IEEE Documents
Helpful International Operators
---------------------------------------------------------------------------

The LOD Technical Journal: File #9 of 12

                                  Hacking  
                              GANDALF  XMUX'S   
                          -----------------------
                                Written by:
                                  Deicide
                                on 03/29/93
                        ===========================
*NOTE: While writing this file I assumed that the reader has a working      
 knowledge of PSNs.
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| 
    
      The Gandalf XMUX is made by Gandalf Technologies Incorporated. It is 
one of two popular systems Gandalf makes, the other being the 
Starmaster/PACX. These systems are very closely knit, as you'll see later,
but the focus of this g-file is on the XMUX system. I still don't have a XMUX 
manual, so this file will be a bit incomplete, but it will give you a good
sense of the system; How to Identify it, How to Penetrate it, and How to Use
it. There are a number of security flaws in the XMUX, all of which can be 
circumvented but frequently are not. Occasionally you will find an 
unpassworded console, in that case just move on to the How to Use it section. 
     The Gandalf systems are very frequently found on all the major PSNs, as
Gandalf's themselves often serve as network controllers. Most of the major
companies, such as Xerox & Bell Canada, use XMUXs, so it is a good idea to
become familiar with the system.

How To Find Your XMUX & How To Identify It
------------------------------------------
   First of all, if you find an unpassworded XMUX it will tell you by the 
herald "Gandalf XMUX Primary Console Menu" followed by the menu itself. Skip 
this part for now. 
   But for the rest of you, you probably still need to find your XMUX, and
you need to know how to identify it.
   Before we get further into this, a small amount of knowledge of the whole
scope of the XMUX is needed. Every XMUX is made up of at least 4 parts,  each
present on every single XMUX. These parts are called:
  -      Console
  -      Fox
  -      Logger
  -      Machine
The Console is the actual system, the part that has to be hacked, the part
that contains the information we are attempting to retrieve.
The Fox is a test machine, serving no other purpose except to spout  "THE
QUICK BROWN FOX JUMPS OVER THE LAZY DOG 1234567890 DE" over and over  again.
The Logger is displays a line or two of information such as the time & the
LCN called, for the most part unimportant. But it does contain the node name.
The Machine is basically a system information giver. I have yet to discover
all of it's commands, but S gives some systems stats (including the node
name) and L is an optional command that supplies the user with a system log
(which contains link addresses & UID's).
All of these can be useful in some way.
   The XMUX can be found in a number of ways:
  - On a standard NUA(XXXX XXXX)
  - On a standard NUA + extension(XXXX XXXX,XXXXXXXX)
  - On extensions off of Starmasters & PACXs.(XXXX XXXX,XXXXXXXX)
  - On LCN's (subaddressing) off any other type of system/OS.
??????????????????????????????????????????????????????????????????????????? 
NOTE:"Password >" is the password prompt for the XMUX Console, occasionally
proceeded by an operator definable system message such as "Vancouver XMUX".
To be sure that this is a XMUX prompt, hit <ENTER>. If it returns the message 
      "Invalid Name
        Names must consist of 1 to 8 alphanumeric characters"
Then you are dealing with the XMUX Console.
???????????????????????????????????????????????????????????????????????????
On a standard NUA it will bring you right to the "Password >" prompt, no 
hassles. You can then proceed to the section that deals with hacking the 
console.
On a standard NUA + extention, it is not so easy. When you first hit the NUA,
it will give you the "Remote Directive" error message, telling you that you
"forgot" the extention. Now, the error message could mean you forgot the 
extention for a VAX, also, but we will assume that it is a XMUX on the NUA.
This is true only a fraction of the time, but try this on every Remote 
Directive message, you'll find a good share of XMUX's. First of all, try the
LCN (subaddress) of 1 on the NUA. If you come up with the Fox segment of the
XMUX (explained earlier) then you have an XMUX Console on the NUA, it's just
hiding. If the LCN brings up the Remote Directive message again, then try the
extention of LOGGER on the NUA. If it brings up the XMUX Logger, then  again,
the XMUX Console is there, but with a bit of security added on. If you now
know that you are on an XMUX, try the CONSOLE extention. It should bring you
to the "Password >" prompt, or occasionally right inside without needing a
password.
Starmaster's and PACX's almost always have an XMUX attached on to it. Use the
Starmaster or PACX's NUA + the extention CONSOLE. It will most likely bring
you to the "Password >" prompt. If it doesn't work, try LCN's. If that fails,
try "XMUX" or "XCON" from the Starmaster/PACX service prompt.
The LCN's off all the other system/OS types is a bit more complicated. You 
can either guess, pick the likely ones, or try them all. What this is is an
XMUX in coexistance with another type of system, such as AOS/VS. The most 
common way to find these is by adding an LCN of 1 to the NUA of the system.
If it comes up with the XMUX FOX section, then you can be sure an XMUX is
present. To find the XMUX Console, use LCN's of 4 and above(2 & 3 being
Logger and Machine), up to the LCN of 15(maximum on XMUX). If you still
haven't found the Console, and it's returning the Remote Directive error
message, now's the time to use the CONSOLE extention. In most cases it'll
bring up the  "Password >" prompt, or right into the Console Menu.

HOW TO PENETRATE THE XMUX CONSOLE "PASSWORD >" PROMPT
-----------------------------------------------------
   To start you off, XMUX Console Passwords MUST be within 1 to 8
alphanumeric characters. Any combination within that boundary is an
acceptable password. Now, while it is true that the password could be a
random letter/number combination, such as G2Z7SWJ8, and therefore extremely
impractical to hack, it is almost a given that the password is a relevant
word or abbreviation, with not more than one numeric character, which is
usually not even included. Also, you get 4 attempts at a password before
being logged off, and remember, you don't even need to find a username.
   When you first reach the "Password >" prompt it's a good idea to try the 
defaults(in order of occurance):
        - Gandalf
        - Xmux
        - Console
        - System
Also, Password (no, really), Network, CPU, Switch & Network are also
frequently found.
   Then, if the defaults don't work, it's time for a little calculated brute
forcing. If the system has a herald, such as "BenDover Field Communications"
then try everything you possible can thing of that is relevant to the herald,
such as Bendover, Ben, Dover, BDFC, Field, Telecom, etc. Also, combine these
with the defaults, particularly Xmux. As in BenXMUX, or FieldMux, etc. If
there is no herald, or all the thing you can think of to do with the  herald
fail as passwords, then it is time to get the node name. The node name is
used very frequently as a password, thus a good thing to try. But where to 
get the node name with out getting the password first? It is contained in two
other places other than the Console, with ALWAYS at least one of the
facilities open to you. The Logger (LCN 2, or extention LOGGER) always spurts
out the log name first upon connect. This is always available, I have only  
seen one case in which the Logger information was protected, and that was 
achieved by wiping it out, which very few administrator's do. The other
source is the Machine (LCN 3, or extention MACHINE), a very handy source of
information. You will recognize the Machine by its "#" prompt. At this prompt
type "S" for system stats. The first thing you see in the system stats is the
Node Name. Also, with machines type "L". Occasionally it will be set to show
the log,  which contains the Link Addresses (usually other netted computers,
frequently  Gandalfs) and UID's as well. Try the Node Name by itself as a
password, then in combination with all the above, such as a combo of Default
& Node Name.   If you follow all these above methods, 50% of the time you
will find the password. If you don't get the password, don't worry, there are
many more XMUX's out there with poor security, go for those. But before you
move on, try the LCN's from 4-15, frequently you'll find another system,
often a private PAD or an outdial.

WHAT TO DO WITH THE XMUX CONSOLE ONCE INSIDE
--------------------------------------------
   For those itching to read other people's mail, or retrieve confidential 
files, etc, you will be very disappointed. Although once inside the XMUX 
Console you have virtual Superuser status, the commands are all maintenance
related. But, often you will find other systems, quite often networks, PADs,
& outdials from inside.
   You will first encounter the primary menu, which looks similar to this:
Gandalf                         XMUX                           (date)
Rev(version)            Primary Console Menu                   (time)       
                      Node:(nodename)
Primary Menu:
 1. Define
 2. Display
 3. Maintenance
 4. Supervise
 5. Exit
Primary selection >

   Now, although there are some other useful and interesting features to the 
XMUX console, I will only show you the 3 most useful features, those being
Abbreviated Command, Service & Call Status.
   Abbreviated Command is an option found in the Define sub-menu. Hit 7 once 
inside the Define sub-menu to bring up the Abbreviated Command prompt. Type
a ? to show all the abbreviated commands. If there are none, curse your luck
and move on to the next feature. If there are some, type them in, one at a 
time. Each Abbreviated command is really a macro, and a macro of a NUA plus
the subaddressing and data character extension needed to enter the system.
These can be very useful, not only for the NUA & subaddress, but for the fact
that the extension is included. Most times extensions are hard if not 
impossible to guess, and the macro throws it right in your face. The 
Abbreviated Command is in the format of XXXXXXXXdEXTENSION, in that the X's 
are where the NUA is placed, the EXTENSION is the extension characters, and 
the 'd' is really where the comma goes to separate the two. So if the 
Abbreviated Command was 55500123dabc, the NUA would actually be 
    -  55500123,abc  -
   Service is a menu option also from the Define sub-menu. What it enables 
you to do is view all the services available, plus their function &  LCN.
Type "11" from the define menu, then "?" for a list of the services 
available. Console, Fox, Logger & Machine will always be present. Anything 
else is a bonus, and should be capitalized upon. For example, if you see
"Modem" as one of the services, then enter "Modem" from the Service  sub-sub-
menu to see which LCN the modem is on.  
   Display Call Status is a handy command used from the Display sub-menu 
which gives a log of all the calls the system has handled. In the call log
are the NUA's of the system that called, often a netted system such as
another Gandalf.
---------------------------------------------------------------------------

The LOD Technical Journal: File 10 of 12

                      Tempest in a Teapot
                      -------------------
                          

Do-it-yourself techniques to inhibit electromagnetic eavesdropping 
of personal computers.

Grady Ward   <grady@netcom.com>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.2

mQCOAiumM0QAAAED+JPD8OULO2aXRvU2FDksMjJeGT96kGK5eJK1grkXuIHz+6pe
jiedYOv72kBQoquycun191Ku4wsWVTz6ox/bpReBs5414OTPzQVJgWQzCW1N4BfV
Wr4eEn3qnFsVLXXxk3oYGydIeJcmelSyuPSq/Oq7Q+eHkKgjqxDTjVMu8iEAEQEA
AbABh7QuR3JhZHkgV2FyZCAgPGdyYWR5QG5ldGNvbS5jb20+ICAoNzA3KSA4MjYt
NzcxNbABAw==
=e3rN
-----END PGP PUBLIC KEY BLOCK-----


Version 1.0   22 March 93

TEMPEST is the code name for technology related to limiting unwanted
electromagnetic emissions from data processing and related equipment. Its
goal is to limit an opponent's capability to collect information about the
internal data flow of computer equipment. Most information concerning TEMPEST
specifications is classified by the United States Government and is not
available for use by its citizens.

The reason why TEMPEST technology is particularly important for
computers and other data processing equipment is the kinds of signals
components in a computer use to talk to each other ("square waves") and their
clock speeds (measured in megahertz) produce a particularly rich set of
unintentional signals in a wide portion of the electromagnetic spectrum.
Because the spurious emissions occupy so wide a portion of that spectrum,
technologies used to block one portion of the spectrum (as pulling the shades 
closed on a window to stop the visible light portion) are not necessarily
effective in another portion.

Unintentional emissions from a computer system can be captured and
processed to reveal information about the target systems from simple levels
of activity to even remotely copying keystrokes or capturing
monitor information. It is speculated that poorly protected systems can be
effectively monitored up to the order of one kilometer from the target
equipment.

This note will examine some practical aspects of reducing the
susceptibility of your personal computer equipment to remote monitoring using
easily-installed, widely available after-market components.


   I

One way of looking at TEMPEST from the lay person's point-of-view is that it
is virtually identical to the problem of preventing electromagnetic
interference ("EMI") by your computer system to others' radios, televisions,
or other consumer electronics. That is, preventing the emission of wide-band
radio "hash" from your computers, cabling, and peripherals both prevents
interference to you and your neighbours television set and limits the useful
signal available to a person surreptitiously monitoring.

Viewing the problem in this light, there are quite a few useful documents
available form the government and elsewhere attacking this problem and
providing a wealth of practical solutions and resources. Very useful for the
lay person are:

Radio Frequency Interference: How to Find It and Fix It. Ed Hare, KA1CV and
Robert Schetgen, KU7G, editors
The American Radio Relay League, Newington , CT
ISBN 0-87259-375-4  (c) 1991, second printing 1992

Federal Communications Commission Interference Handbook 
(1991)
FCC Consumers Assistance Branch
Gettysburg, PA  17326
717-337-1212
and
MIL-STD-188-124B in preparation
(includes information on military shielding of tactical 
communications systems)
Superintendent of Documents
US Government Printing Office
Washington, DC  20402
202-783-3238

Information on shielding a particular piece of consumer 
electronic equipment may be available from the:

Electronic Industries Association (EIA)
2001 Pennsylvania Ave NW
Washington, DC  20006


Preventing unintended electromagnetic emissions is a relative term.
It is not feasible to reduce to zero all unintended emissions. My personal
goal, for example, might be to reduce the amount and quality of spurious
emission until the monitoring van a kilometer away would have to be in my
front yard before it could effectively eavesdrop on my computer. Apartment
dwellers with unknown neighbours only inches away (through a wall) might want
to even more carefully adopt as many of the following suggestions as possible
since signal available for detection decreases as approximately the inverse
square of the distance from the monitoring equipment to your computer.


   II
   Start with computer equipment that meets modern standards for emission.

In the United States, the "quietest" standard for computers and peripherals
is known as the "class B" level. (Class A level is a less stringent standard
for computers to be use in a business environment.).

You want to verify that all computers and peripherals you use meet the class
B standard which permits only one-tenth the power of spurious emissions than
the class A standard. If you already own computer equipment with an FCC ID,
you can find out which standard applies. Contact the FCC Consumers Assistance
Branch at 1-717-337-1212 for details in accessing their database.

Once you own good equipment, follow the manufacturer's recommendations for
preserving the shielding integrity of the system. Don't operated the system
with the cover off and keep "slot covers" in the back of the computer in
place.


   III
   Use only shielded cable for all system interconnections.

A shielded cable surrounds the core of control wires with a metal braid or
foil to keep signals confined to that core. In the late seventies it was
common to use unshielded cable such as "ribbon" cable to connect the computer
with,  say, a diskette drive. Unshielded cable acts just like an antenna for
signals generated by your computer and peripherals. Most computer
manufacturer supply shielded cable for use with their computers in order to
meet FCC standards. Cables bought from third-parties are an unknown and
should be avoided (unless you are willing to take one apart to see for
yourself!)         
Try to avoid a "rat's nest" of wire and cabling behind your equipment and by
keeping all cables as short as possible. You want to reduced the length of
unintended antennas and to more easily predict the likely paths of electric
and magnetic coupling from cable to cable so that it can be more effectively
filtered.


   IV
   Block radiation from the power cord(s) into the house wiring.

Most computers have an EMI filter built into their body where the AC line
cord enters the power supply. This filter is generally insufficient to
prevent substantial re-radiation of EMI voltages back into the power wiring
of your house and neighbourhood. To reduce the power retransmitted down the
AC power cords of your equipment, plug them in to special EMI filters that
are in turn plugged into the wall socket. I use a model 475-3
overvoltage and EMI filter manufactured by

Industrial Communication Engineers, Ltd.
P.O. Box 18495
Indianapolis, IN  46218-0495
1-800-ICE-COMM
ask for their package of free information sheets

(AC and other filters mentioned in this note are available from a wide
variety of sources including, for example, Radio Shack. I am enthusiastic
about ICE because of the "over-designed" quality of their equipment. Standard
disclaimers apply.)

This particular filter from ICE is specified to reduce retransmission of EMI
by a factor of at least 1000 in its high-frequency design range. Although
ideally every computer component using an AC line cord ought to be filtered,
it is especially important for the monitor and computer CPU to be filtered in
this manner as the most useful information available to opponents is believed
to come from these sources.


   V
   Block retransmitted information from entering your fax/modem or 
   telephone line.

Telephone line is generally very poorly shielded. EMI  from your computer can
be retransmitted directly into the phone line through your modem or can be
unintentionally picked up by the magnetic portion of the EMI spectrum through
magnetic induction from power supplies or the yoke of your cathode ray tube
"CRT" monitor.

To prevent direct retransmission, EMI filters are specifically designed for
modular telephone jacks to mount at the telephone or modem, and for
mounting directly at the service entrance to the house.

Sources of well-designed telephone-line filter products include ICE
(address above) and

K-COM
Box 82
Randolph, OH  44265
216-325-2110

Your phone company or telephone manufacturer may be able to supply
you with free modular filters, although the design frequencies of these
filters may not be high enough to be effective through much of the EMI 
spectrum of interest. Keep telephone lines away from power supplies of
computers or peripherals and the rear of CRTs:  the magnetic field often
associated with those device can inductively transfer to unshielded lines
just as if the telephone line were directly electrically connected to them. 
Since this kind of coupling decreases rapidly with distance, this kind of
magnetic induction can be virtually eliminated by keeping as much distance
(several feet or more) as possible between the power supply/monitor yoke and
cabling.


   VI
   Use ferrite toroids and split beads to prevent EMI from escaping on    the
surface of your cables.

Ferrites are magnetic materials that,  for certain ranges of EMI
frequencies, attenuate the EMI by causing it to spend itself in heat in the
material rather than continuing down the cable. They can be applied without
cutting the cable by snapping together a "split bead" form over a thick cable
such as a power cord or by threading  thinner cable such as telephone several
times around the donut-shaped ferrite form. Every cable leaving your monitor,
computer, mouse, keyboard, and other computer
peripherals should have at least one ferrite core attentuator. Don't forget
the telephone lines from your fax, modem, telephone or the unshielded DC
power cord to your modem. Ferrites are applied as close to the EMI emitting
device as possible so as to afford the least amount of cable that can act as
an antenna for the EMI.


Good sources for ferrite split beads and toroids include

Amidon Associates, Inc.
P.O. Box 956
Torrance, CA  90508
310-763-5770
(ask for their free information sheet)

Palomar Engineers
P.O. Box 462222
Escondido, CA  92046
619-747-3343
(ask for their free RFI information sheet)

and Radio Shack.


   VII
   Other practical remedies.

Other remedies that are somewhat more difficult to correctly apply
include providing a good EMI "ground" shield for your computer equipment and
other more intrusive filters such as bypass capacitor filters.

You probably ought not to think about adding bypass capacitors unless you are
familiar with electronic circuits and digital design. While quite effective,
added improperly to the motherboard or cabling of a computer they can "smooth
out" the square wave digital waveform -- perhaps to the extent that signals
are interpreted erroneously causing mysterious "crashes" of your system. In
other cases, bypass capacitors can cause unwanted parasitic oscillation on
the transistorized output drivers of certain circuits which could damage or
destroy those circuits in the computer or peripherals. Also, unlike ferrite
toroids, adding capacitors requires actually physically splicing them in or
soldering them into circuits. This opens up the
possibility of electric shock, damage to other electronic components or
voiding the warranty on the computer equipment.

A good EMI ground is difficult to achieve. Unlike an electrical safety
ground, such as the third wire in a three-wire AC power system, the EMI
ground must operate effectively over a much wider part of the EMI spectrum.
This effectiveness is related to a quality known as electrical impedance. You
desire to reduce the impedance to as low a value as possible over the entire
range of EMI frequencies. 
   
Unlike the AC safety ground, important factors in achieving low impedance
include having as short a lead from the equipment to a good EMI earth ground
as possible (must be just a few feet); the gauge of the connecting lead (the
best EMI ground lead is not wire but woven grounding "strap" or wide copper
flashing sheets; and the physical coupling of the EMI into the actual earth
ground. An 8 ft. copper-plated ground may be fine for AC safety ground, but
may present appreciable impedance resistance to an EMI voltage. Much better
would be to connect a network of six to eight copper pipes arranged in a six-
foot diameter circle driven in a foot or two into the ground,
electrically bonded together with heavy ground strap and connected to the
equipment to be grounded via a short (at most, several feet), heavy (at least
3/4-1" wide) ground strap.
        
If you can achieve a good EMI ground, then further shielding possibilities
open up for you such as surrounding your monitor and computer equipment in a
wire-screen Faraday cage. You want to use mesh rather than solid sheet
because you must preserve the free flow of cooling air to your equipment. Buy
aluminum (not nylon) screen netting at your local hardware store. This
netting typically comes in rolls 36" wide by several feet long. Completely
surround your equipment you want to reduce the EMI being careful to make good
electrical bonds between the different panels of netting and your good earth
ground. I use stainless steel nuts, bolts, and lock washers along with
special non-oxidizing electrical paste (available from Electrical
contractors supply houses or from ICE) to secure my ground strapping to my
net "cages".  A good Faraday cage will add several orders of magnitude of EMI
attenuation to your system.


   VIII
   Checking the effectiveness of your work.

It is easy to get a general feeling about the effectiveness of your EMI
shielding work with an ordinary portable AM radio. Bring it very close to the
body of your computer and its cables in turn. Ideally, you should not hear an
increased level of static. If you do hear relatively more at one cable than
at another, apply more ferrite split beads or obtain better shielded cable
for this component. The practice of determining what kind of operating system
code is executing by listening to a nearby AM radio is definitely obsolete
for an well-shielded EMI-proof system!

To get an idea of the power and scope of your magnetic field emissions, an
ordinary compass is quite sensitive in detecting fields. Bring a compass
within a few inches of the back of your monitor and see whether it is
deflected. Notice that the amount of deflection decreases rapidly with
distance. You want to keep cables away from magnetic sources about as far as
required not to see an appreciable deflection on the compass.


   VIIII
   Summary

If you start with good, shielded equipment that has passed the FCC level B
emission standard then you are off to a great start. You may even be able to
do even better with stock OEM equipment by specifying "low-emission" monitors
that have recently come on the market in response to consumer fears of
extremely low frequency ("ELF") and other electromagnetic radiation.
Consistently use shielded cables, apply filtering and ferrite toroids to all
cabling entering or leaving your computer equipment. Finally, consider a good
EMI ground and Faraday cages. Beyond this there are even more effective means
of confining the electrical and magnetic components of your system through
the use of copper foil adhesive tapes, conductive paint sprays, "mu metal"
and other less common components.
---------------------------------------------------------------------------

The LOD Technical Journal: File #11 of 12 

                   OOOOOOOOOOOOOOOOOOOOOOOOOOO
                   OOOO                   OOOO
                    []                     []
                    []Presidential Security[]
                    []                     []
                   OOOO    By Argon/LOD   OOOO
                  OOOOOOOOOOOOOOOOOOOOOOOOOOOOO
                                 

This phile is intended to give a glimpse into what's behind all those stern-
faced, emotionless secret service agents that surround the president and to
give analysis into the security surrounding our executive branch. 

Our current President, or more formally Commander in Chief is as everyone
knows is Bill Clinton. Ever since his inauguration he has been under
supposedly "tight" security. However, even with up to double the normal
security allotment he is still at risk. And the list of would be assassins is
large, everyone from Iraqis, Serbians, Islamic fundamentalist militants and
if you listen to these conspiracy theories you can throw in the military
industrial establishment and heck even the religious right has motive for
assassinating the CINC. 

Which has given rise to millions of dollars worth of hardware and Secret
Service payrolls for his protection. 200 agents, personal security teams and
body-guards watch our CINC 24 hours a day without rest. 

What I intend to analyze is the methods of protection utilized by the SS,
their weaknesses and how they can be rectified. As the most powerful
individual in the world, our president must be safeguarded at all costs, as
he is an extremely high profile target. Nothing could give a terrorist group
more publicity and recognition that assassinating the American president.
Hopefully, the SS can keep this in mind when reading the recommendations
suggested later on when they review this journal for their computer crime
investigations... Perhaps someone will bring this to the CINC's attention, as
for the next 3 odd years the only relevancy of this phile is in ensuring
*his* safety. 

4 US Presidents have been assassinated in our nation's history so with such
a risk of assassination no cost in protection is to high. The huge Whitehouse
budget can easily afford to spend more on security and less on bureaucracy.
 
At first glance, a Presidential assassination seems very simple. After all,
he's in front of the cameras up to 2 hours each day and its's no secret where
to find him, just stroll over to 1600 Pennsylvania Av. The Whitehouse doesn't
appear to be well defended, the windows aren't sandbagged, there is no barbed
wire, electrified fence, guard towers, minefields or even a solid wall. Just
a fragile and cosmetic black gate fence. 

This first impression is entirely incorrect. The Whitehouse is ringed in
other tall buildings, giving SS sharpshooters an excellent position to fire
from. Behind all the stonework they have a superb spot to cover the
Whitehouse with. And the uncluttered Whitehouse lawn gives them a clear field
of fire. Anyone stupid enough to simply scale the fence, or ram through it
would be cut down in a hail of fire before making it halfway across the lawn.
Coming from those perched in the surrounding buildings, and the agents inside
the whitehouse. The sharpshooters posted to presidential security are simply
the best at what they do. They don't "miss".  

Perhaps the most effective route for a terrorist to take would be to attack
the President while he's airborne in either a helicopter or airplane (in this
case Air Force 1). Here the President is certainly at his most vulnerable.
Infrared (IR) guided surface to air missiles (SAMs) such as the Russian SA-7
or newer SA-14, or the US Stinger could be used with deadly effect to shoot
down the aircraft. All aircraft the President travels in are equipped with IR
jammers such as the ALQ-144, which send out hotter heat waves than the
aircraft does in different directions from a small pylon shaped group of
lenses. Presently most missiles are not advanced enough to pick out the
aircraft from all the other false directed heat. Non IR guided systems can be
utilized though. The British Shorts Blowpipe or Javelin however are optically
guided, by means of a joystick and monocular sight. So IR jamming is useless.
The only way to really avoid them is to silence the person guiding it. And
these are not too difficult to obtain, they have already been used by the
Afgan rebels. So obtaining these and other SAMs is relatively easy, as they
are found in many of the world's hotspots for the right price. There is no
effective safeguard in place by the SS to protect the Presidents aircraft
from an optically guided SAM.  

Even if a terrorist has no access to a SAM aerial assassinations are still
possible. A small "Cessna" like aircraft could simply be used in a "Kamikaze"
like role by colliding midair at high-speed with the president's helicopter.
Given the superior speed of a fixed wing aircraft the helicopter pilot would
have to be highly skilled to avoid it. Presidential pilots are trained in
such avoidance techniques but whether they could dodge one in practise is
unclear. 

The Soviets used to have a phobia about helicopters because of their low
speed and high vulnerability to SAM's, ground fire and aircraft. Consequently
Secretary Generals and high ranking officials never flew by helicopter. The
President should likewise cease travel by helicopter as well. Conventional
fixed wing flights are much safer. Only during takeoff and landing is the
President vulnerable, and then only to SAM's. Groundfire is ineffective
against large body aircraft and with greater speed and size the risk from
"Kamikaze" style attacks is reduced. Fighter cover, usually from F-14's is
occasionally provided so any hostile aircraft (such as a Kamikaze Cessna)
wouldn't stand a chance. As Air Force 1 moves at slow speeds during landings
or is slowly accelerating off the ground during takeoff's there is an
*alarming* threat from SAM's. Slow moving giants like Air Force 1, are turkey
shoots for agile, supersonic man-portable SAM's. When taking off or landing
at a public airport an assassin has many places to make a hidden lanching
from. With a range of over 2 Km, Air Force 1 is vulnerable for a *long*
period of time. As it climbs, it has no speed or room to manoeuvre. Even if
it could, commercial airliners are not known for their agility. The only hope
then is through IR jamming, electronic jamming, chaff or flares. Since the
assassin knows the runway position, he knows the direction of where Air Force
1 must takeoff or land from. There would be less than 15 seconds before
launch and impact. The launch-warning beeper aboard Air Force 1 would only
just be recognized before Air Force 1 would be blown from the sky. 

To reduce this risk, the President should takeoff and land from well-secured,
isolated military airfields when travelling domestically and internationally
and stick as much to ground transport as possible. By using secret travel
plans (such as which airport he will arrive at in New York for example) an
assassin won't know which airport to cover. After all the public doesn't need
to know the Presidents air travel itinerary.

Another policy used by the SS is to keep the specific details of the
Presidents movements secret. Everyone knows when the president will be giving
a speech, but the exact times are always classified. Which complicates the
assassins operation, as careful planning in advance is required.  

Whenever the president's exact location has been made known in advance,
security is always *tight*. For example during the State of the Union address
the entire vicinity is sealed off. 

However security during these events and regular operations must be
increased. One threat is from anti tank guided weapons (ATGWs). Optically
guided along a thin wire for in-flight corrections they have a range up to 3
Km. Or from bigger air or ground launched missiles such as the Maverick. An
assassin could fire from the other side of DC, into the stands during the
inauguration ceremony for example. Not only the President would be eliminated
but so to would all the supreme court justices, the former President and
Vice-President, the new Vice-President - the whole government. The same
applies when the President addresses a joint session of congress. Using
guided weapons, an aircraft or even an improvised nuclear device (IND) the
*entire* judicial, legislative and executive branches of the US government
would be eliminated! Such a congregation of VIP's is a flawed idea from the
start. Tradition should give way to reason and smaller events should replace
them. Celebrating democracy is great but to risk the entire US government? 

So far only advanced methods of assassination have been examined. The
possibility of a "lone gunman" using basic methods, with no more than
personal weapons still remains. Take for example, the president giving an
address to university graduates. It would take less than 2 seconds, for an
assassin to remove his hand from an undercoat, clenching a firearm to aim and
fire one round. Against this it takes a minimum of one second for the SS
agents to react to the initial movement of the assassin's hand, one second to
draw their weapons and another two to aim and fire. The president could be
dead before the SS had finished aiming. Of course in some cases audiences are
searched with metal detectors for weapons. It doesn't take a genius to
smuggle in a small handgun into an audience of a few thousand though. 

The only option here is to reduce or eliminate public appearances by the
President. But as the President would no doubt insist on being visible and
open for all the cameras it isn't likely. Better checking of the site
beforehand and on audiences is necessary then. 

A similar situation exists with say, the motorcade on inauguration day, where
the President often leaves the car to walk alongside it. Here the SS is out
in great force with rifles trained and ready. But we are back to our
fundamental disadvantage. The assassin will always have at least a 1-2 second
jump on the SS.

As was mentioned before, by moving towards ground transportation instead of
air the President is much safer. As you might already know the President
travels in a "bullet proof" custom built vehicle. It goes everywhere that he
does. When he goes to Russia, so does the car. The car's armour will stop
small arms fire (ie. handguns, automatic weapons, rifles etc.) However, fire
from a crew served 12.5mm gun will penetrate it. Since a gun of this size is
to large and bulky to be concealed from a hundred odd SS agents it's not a
worry. Remotely fired ATGW's or pre-positioned explosives are. Pre-positioned
explosives won't work as the president's exact route is usually classified.
When it's not secret, like on inauguration day or a parade, the route will
have been carefully combed over a dozen times for explosives. And the manhole
covers welded shut to prevent anyone from placing explosives beneath the
road.

The bullet-proof car however isn't ATGW-proof. Their shaped charges are
designed for penetrating main battle tanks (MBTs) with frontal armour a foot
thick. It would be best for our president to travel in a modified M1A1 Abrams
MBT. Some ATGW's may be able to penetrate its rear or perhaps side armour but
no existing ATGW's will penetrate its frontal armour. As its made of top-
secret "cobham" plating which is several times stronger than an equivalent
amount of traditional steel. 

Most assassinations are not done through the use of violent force. They are
more subtly done using poison for example. Whitehouse security around the
president's food is almost non-existent. Even if the food was "checked", ie.
some bloke eats portions of it first and is watched for sickness, it could
never reduce the risk poised by long term or delayed acting poisons. What
should be done then? The President should appoint an agent to go out and
randomly purchase food from restaurants and keep it under guard. This way no
one will know which food to poison. A simpler method is to infect one's hand
with it (after consuming an antidote), and then shake the president's hand,
transferring the poison to him. Saddam Hussein, has a solution to this - the
hands of visitors are disinfected prior to meeting the dictator. Airborne
bacteria could be let loose near the president to cause infection too.
Perhaps the Whitehouse should have its own sealed environment to guard
against this.

Our president is as stated earlier in much peril. It's only a matter of time
before a group or faction builds up the nerve to attempt an assassination.
When they do, enough loopholes in the security arrangement today exist for
success. By acknowledging and acting upon some of the recommendations made
here, the global disruption that would result from an assassination or
attempt of one can be prevented. At the very least the president must cease
travelling by helicopters, increase security at public appearances and guard
against poisons. To give our president the security that is truly justified
by his important role, the president must keep appearances to a minimum,
reduce the number of officials at major ceremonies and consider travelling by
armoured vehicle to avoid the dangers poised by ATGW's or RPG's.
---------------------------------------------------------------------------

The LOD Technical Journal: File #12 of 12

                   Network News & Notes
                   =------------------=


If some of this seems a little "old", do keep in mind that everything since
'90 has to be covered. As most of the other 'ZiNeZ are narrowly focused on
major publications and miss out on current events in the industry and a lot
of other interesting news. 

---------------------------------------------------------------------------
DCS Comes to Russia (Tellabs, April 1993)

A Tellabs TITAN 532E digital cross-connect system (DCS) and 452 series
transcoders have been installed by Moscow Cellular Company, a joint venture
that includes US West and Moscow public telephone network operators, to boost
capacity in its cellular transmission network. 

The DCS, which is the first to be installed in Russia, increases the capacity
of the Moscow mobile switching centre (MSC) by "grooming and filling"
partially-filled 2 Mbit/s PCM links from radio base stations. The 452 60-
channel transcoders are used to double the capacity of 2 Mbit/s PCM
transmission links between base stations and the MSC.

----------------------------------------------------------------------------
UK Renumbering (BT, April 1993)

A campaign to prepare its customers for changes to national and international
dialing codes was launched by British Telecom (BT) on 1 February 1993. 

The changes announced last year by the Office of Telecommunications (OFTEL),
will take place on 16 April 1995, more than two years hence. BT is starting
its publicity campaign now, however, so that everyone will be ready. 

The changes follow extensive and lengthy consultation by OFTEL with
representatives of telephone users, operators and equipment manufacturers.
The creation involves the additional codes and numbers needed to cater for
the growth of the telecom services well into the next century, provide
capacity for new operators entering the market. 

Area dialing codes will have a "1" inserted after the initial "0". For
example Cardiff's 0222 becomes 01222 and Central London will change from 071
to 0171.

The international dialing code changes from 010 to 00. This is a European
Community requirement based on CCITT Recommendation E. 160.

Five cites will be given completely new codes and their existing six-digit
local number will be increased to seven digits.

Codes which do not denote a geographic area, for example Freefone 0800
numbers, mobile codes such as 0860 and 0850, and information and
entertainment services on a code such as 0891 will not change.

-----------------------------------------------------------------------------
BT checks into the Holiday Inn (BT, April 1993)

The Holiday Inn hotel chain with more than 1700 hotels in 54 countries, has
signed a 2-million pound sterling three-year contract for BT's global network
services. Under the contract, BT will provide Holiday Inn with a tailor-made
data network which will connect the company's hotels in the Asia-Pacific
region with its headquarters in the US. 

One of the main applications of the network will be to run the chain's
Holidex hotel computer reservation system.

Initially, the service will be available in five countries - Hongkong,
Singapore, Japan, Australia and the US. Eventually, the network will be
extended to cover 99 sties in 27 countries in the Asia-Pacific region, the
Middle East, Africa and the US.

-----------------------------------------------------------------------------
Trunk Protection for Telefonica (Telecommunications radioelectriques et
telephoniques (TRT), March, 1993)

Philips Telecommunications the Spanish subsidiary of Philips, has started to
deliver the DCN 212 1+1 switching protection systems to Telefonica. The
equipment will be integrated into the Ibermic network to improve 2-Mbit/s
trunk protection and quality in the national and international links.

The systems ordered by the Dedicated Networks Department will be implemented
in the Iberian Peninsula, in the Balearic and Canary Islands. 

One DCN 212 system can permanently supervise 12 independent 2-Mbit/s links.
Its cyclic redundancy checking (CRC4) device enables it to perform an
automatic switch-over between the main and standby links. This not only
allows service to be maintained in the event of link failure but also
provides and improvement of the link performance. DCN 212 is manufactured in
France by TRT.

-----------------------------------------------------------------------------

Nokia DX200 system for Malaysia (Nokia, March 1993)

Nokia will delivers its DX200 digital switching system to Malaysia. A five-
year frame agreement signed with Jabatan Telekom Malaysia calls for the
installation of some 800,000 subscriber lines. The total value of the
project, which also includes installation, commissioning and training is
estimated at more than 700 million Finnish marks. The project will be
implemented by Sapura-Nokia Telecommunications.

Development of the telecom infrastructure has been designated as one of the
highest priorities in Malaysia. the goal is to provide, by the year 2000, for
universal access to the telecom services and to develop a Malaysian telecom
industrial base. The current agreement is part of a plan that calls for the
installation of some 4 million subscriber lines during the next five years.
As part of the switching project, Sapura is establishing the DX200 subscriber
line cards. 

With the Telekom Malaysia order, Nokia's DX200 system is now installed or on
order in more than 20 countries. 

-----------------------------------------------------------------------------
Polish Mobile Radio (Ericsson, March 1986)

Poland has signed a contract with Ericsson for the delivery and
implementation for a new mobile radio system. The order has, in its initial
phase, a value of 16.5 million US. 

The system, known as EDACS, belongs to the new generation of digital trunked
radiocom systems. It will be shared by the Polish police and fire brigade
operating in the Warsaw police district, providing day-to-day instant
communication between individuals and work groups in the field. the system
includes more than 3000 handheld and mobile radios. 

EDACS, which will be installed in Warsaw during the second half of 1993, has
digital encrypted voice, mobile data transmission capability, emergency call
facility, WAN and fault-tolerant design.

-----------------------------------------------------------------------------
BT's DMS SuperNode 300 (BT, March 1993)

NT has installed what is said to be the world's largest international gateway
in Madley for BT. The digital multiplex system (DMS) SuperNode 300 is the
first of BT's international gateways to have fully integrated ISDN
capability.

The DMS SuperNode 300 has capacity for 45,000 ports. The switch's capacity to
handle an extremely high volume of calls through its SuperNode central
processing complex is further enhanced by its "non-blocking" matrix network
architecture (ENET). This architecture guarantees each individual cell access
to an international route, thereby reducing the incidence of call failures
resulting from congestion in the exchange. 

-----------------------------------------------------------------------------
Taiwan's Fortress Fones (Telecommunication Journal, March 1993)

Taiwan has ordered a further 5000 optical card payphones from Landis & Gyr
Communications, bringing the total to 27,500. Eight million optical coded
phonecards will also be delivered. Landis & Gyr's Communications Division has
now supplied more than 1 million payphones and 350 million phonecards to 65
countries. 

-----------------------------------------------------------------------------
Swedish SDH (Telecommunication Journal, February 1993)

Swedish Telecom is building a complete transport network based on synchronous
digital hierarchy (SDH) and has signed an agreement with Marconi SpA and
Ericsson Telecom AB about the supply of equipment for the new network,
including transmission and cross-connect equipment based on SDH technology.
In addition, Ericsson will deliver a management system serving all equipment
in the network. 

Among the first parts of the network to be equipped is the "triangle"
Stockholm-Goteborg-Malmo. The transmission equipment on these routes will
have a capacity of 30,000 simultaneous telephone calls; the transmission
capacity is 2.5 Gbit/s per fiber pair, which is the highest capacity
available on the market today. 

Over the next few years, the deployment of SDH will mainly meet the needs
imposed by traffic growth. SDH will be introduced in the national long-
distance network, in the regional parts of the network and in the local
network, the ultimate goal being a country-wide SDH network. 

-----------------------------------------------------------------------------
Italian GSM network (Ericsson, Feb. 1993)


Societa italiana per l'Esericzio delle Tleecomunicazioni pa (SIP), the
operator of the Italian mobile phone network, has inaugurated its new GSM
digital cellular network which is now on line in all of Italy's major cities.
It will subsequently be extended throughout the country. 

Italy has grown faster in mobile telephony than any other country in Europe
since SIP launched its analog total access communication system (TACS) in
April 1990. SIP is now one of Europe's three largest telephone systems
operators, with more than 700,000 subscribers.

The Ericsson Fatme-Italtel consortium is the general supplier of both the
TACS network and all exchanges and base stations controllers in the Italian
GSM network. The consortium is also supplying 75% of the GSM radio base
stations. 

-----------------------------------------------------------------------------
NT Introduces CT2 Fone (NT, Feb. 1993)

NT has introduced in Hongkong its Companion wireless communications system,
which uses the widely accepted CT2 common air interface (CT2 CAI) radio
standard.

This is the first phase of a worldwide introduction of the product which in
1993 will include other locations in the Pacific Rim, as well as the US,
Canada, Europe, the Caribbean and Latin America.

The Companion system, uses portable, personal telephones that fit into a
pocket or purse freeing people to move about as the work. It is available as
an enhancement to an existing business telephone system or as a stand-alone
system. More than 1 million US in orders for the product have been received
in the Hongkong area where the system operates in the 864-868 MHz frequency
range. 

-----------------------------------------------------------------------------
Lossless 4 X 4 switch (Ericsson, Feb. 1993)

Ericsson recently developed what it claims to be the first "lossless"
monolithic optical 4 X 4 space switch, ie. a switch that does not attenuate
a switched signal, a major problem with previous monolithic optical switches.

Optical space switches of this type are key components in the future
broadband transport network. The experimental indium phosphide (InP) switch
chip comprises 24 integrated optical amplifiers and can be connected to four
input and four output optical single mode fibres.

-----------------------------------------------------------------------------
BT Launches SuperJANET (BT, Feb. 1993)

SuperJANET, a new high-speed fiber optic network to be provided by BT, will
link computer systems in universities and polytechnics in the UK.

BT has been awarded the contract for the network by the Information Systems
Committee (ISC) of the University Funding Council (UFC). Under the contract,
BT will collaborate with the Science and Engineering Research
Council/Universities Funding Council (SERC/UFC) Joint Network Team to design
and implement the new network, to be called SuperJANET (joint academic
network). It will augment the existing private JANET network created during
the early 80s.

SuperJANET will be able to transmit information up to 100,000 times faster
than the standard telephone network, with the initial phase of the project
linking sites as the Cambridge and Manchester universities, Rutherford
Appleton Laboratory, University College London, Imperial College London and
Edinburgh University. 

The core network will use a mix of PDH and SDH high performance optical fibre
technologies and pilot phase will be established in March 1993.

The new network will cover a range of transmission speeds, initially from 34
through to 140 Mbit/s.

-----------------------------------------------------------------------------
Swiss ISDN (Telecommunication Journal, January 1993)

SwissNet 2, the second phase in Switzerland's ISDN, is now in service. It
offers narrow-band ISDN capable of transmitting at higher speeds and at
reduced tariffs data, images and conversations which until now had to be
routed over separate networks. Up to eight terminals, of which two can be
used simultaneously, can be connected to the basic ISDN line thus allowing
the transmission of images or data at the same time as a telephone
conversation is taking place. Another important advantage is the possibility
of using Group 5 telefax which has a transmission speed of up to ten times
that of Group 3.

In addition to the transmission service, various supplementary services such
as multiple subscriber number, calling-line identification, call waiting,
call forwarding, are available at no extra charge whilst other optional
services such as direct dialing-in, closed user groups and outgoing call
barring can be obtained against payment. 

Monthly charges are 50 Swiss francs (CHF) for a basic connection of two B-
channels at 64 kbit/s and one D-channel at 16 kbit/s and 500 CHF for a
primary connection of 30 B-channels at 64 kbit/s and one D-channel at 64
kbit/s. Installation charges for the two types of connection are respectively
200 and 400 CHF. Communication charges will be made up of three elements
representing the costs of call set-up, call preparation and interruption, and
call duration.

SwissNet 2 conforms to the CCITT Blue Book Recommendations and can therefore
connect to other ISDNs conforming to international standards. 

-----------------------------------------------------------------------------
NT's SDH in Russia (Telecommunication Journal, January 1993)

MACOMNET, a new company set up as a joint venture between the Andrew
Corporation and the Moscow Metro, has awarded a 840,000 US contract to NT for
synchronous digital hierarchy transmission equipment. 

MACOMNET will use the metro infrastructure to permit the rapid establishment
of a fiber-optic network in key areas of Moscow. Operating as a "carrier's
carrier", it will provide a high-quality, highly reliable managed digital
transport service beginning in spring 1993. Initially it will provide E1 (2
Mbit/s) circuits to other operators and private customers in Moscow. 

-----------------------------------------------------------------------------
Cantat-3 direct links to Eastern Europe (Telecommunication Journal, January
1993)


Teleglobe Canada Inc. has formed a consortium with 20 European and United
States carriers to lay a 385 million US high-capacity fibre-optic cable
linking North America with Western and Eastern Europe. 

NT's STC Submarine Systems has been chosen as sole supplier of Cantat-3. When
completed in 1994, this first direct fibre-optic link between Canada and
Europe will provide multi-media communication services of greater speed and
capacity than ever before. The new cable will be the first of its kind to
operate to the new international SDH transmission standards and the first at
a transmission speed of 2.5 Gbit/s, offering an unprecedented 30,000 circuits
per fibre pair. 

Cantat-3 will be the largest direct link from North America to Germany,
Scandinavia and the UK. It will link directly with the Denmark-Russia and
planned Denmark-Poland cables. An overland link though Germany will give
entrance to the heard of Eastern Europe. 

-----------------------------------------------------------------------------
Fibre-optics Under the Pacific (MCI, January 1993)

MCI International, Inc., together with 46 international telecom carriers, has
announced the signing of a construction and maintenance agreement for TPC-5,
the first undersea fibre-optic network in the Pacific. 

The 25,000 km fibre optic system interconnects the US mainland at Oregon and
California, extends out to Hawaii, Guam and Miyazaki and Ninomiya in Japan,
and then stretches back to the US to complete the loop. 

The network segments between California, Hawaii, Guam, and Miyazaki will be
in service by late 1995. The entire TPC-5 network will be completed by late
1996.

The system can transmit up to 5 Gbit/s per fibre par which is equivalent to
60,480 simultaneous conversations. Once completed the 1.3 billion US network
will provide instantaneous restoration by shifting voice, data and video
signals to a spare fibre on the network. In the unlikely event that a break
occurs somewhere along the cable route, the network's loop configuration
ensures instant restoration by re-routing signals. 

-----------------------------------------------------------------------------
NT Announces Contracts (Telecommunication Journal, January 1993)

NT has announced several contracts for its Meridian ISDN network. 

The Greek national airline, Olympic Airways, has purchased a 6000 line
network that will provide specialized business communication services for
employees and customers at its major locations.

Kuwait Oil Company has ordered an 8000 line ISDN valued at over 3 million US
to restore, modernize and expand the company's private communications
network.

The five millionth line of Meridian digital centrex was shipped to the US
market to Centel's network in Florida. 
NT will also be installing a country-wide network for the Security
Directorate of Jordan. The network of 78 Meridian SL-1 PBX systems is the
largest private network in Jordan and links most of the police centres,
providing voice and data communications across the country. 

-----------------------------------------------------------------------------
Croatia Orders AXE (Telecommunication Journal, January 1993)

The Croatian Post and Telecommunication (HPT) has awarded Ericsson a contract
for the delivery of four international telephone exchanges for Croatia. The
AXE exchanges will be installed in the cities of Zagreb, Rijeka, Split and
Osijek. They will be delivered from Sweden and from Nikola Tesla in Zagreb.

-----------------------------------------------------------------------------
911 Enhanced (AT&T Technology, v.7 no.3)

AT&T Network Systems introduced software and equipment that will allow local
telephone companies and other network providers to furnish enhanced 911
emergency calling services to more people nationwide.

Seven new products range from enhancements to AT&T's 5ESS Switch to PC-Based
systems that can pinpoint the location of a person calling to report an
emergency. 

The new software and equipment includes:

+ 5ESS Switch enhancements, allowing it to support standard E911 features
such as call routing, and to work with analog answering point equipment in
public and private networks, ISDN answering point equipment in private
networks.

+ Automatic Location Identification/Database Management System (ALI/DMS)
hardware and software. This matches callers' phone numbers with addresses and
provides this information to attendants as they answer calls. 

+ The Alive Database System. This PC-base system provides detailed
descriptions of the 911 caller's location. Public Safety Answering Point
Equipment receives the incoming calling number and location information from
the local database and displays it to answering point attendants.

+ Intelligent Public Safety Answering Point Display shows the 911 caller's
number and location along with call-transfer information on a single computer
screen.

+ Computer-Aided Dispatch System helps make decisions on which police cars,
ambulances, or fire trucks to send to an emergency, to find where these
vehicles are located at the time of the call, and to determine the fastest
way to get them to the emergency site. 

+ An ISDN Public Safety Answering Point System connects to the telephone
network over ISDN Basic Rate Interface (BRI) channels. The system is
available now to private-network customers such as universities, military
bases, large businesses and airports, and will be available for communities
as ISDN becomes more widely deployed. 
-----------------------------------------------------------------------------
First BNS-2000 Delivered (AT&T Technology v.7, no.3)

PacBell and GTE recently accepted delivery of AT&T Network System's first
BNS-2000 broadband networking switches and began installing them to
facilitate their Switched Multimegabit Data Services (SMDS) offerings
scheduled to begin in September.

These are the first BNS-2000 switches to be installed in the PSTN. The BNS-
2000 Switch is fast-packet cell-relay system which uses ATM (asynchronous
transfer mode) cells designed for broadband ISDN applications.

PacBell will install a BNS-2000 Switch in its Los Angeles service area and is
scheduled to initiate SMDS in Los Angeles, San Francisco, Anaheim, and
Sacramento in September.

Similarly, GTE will install its BNS-2000 in Long Beach, California, and plans
to initially offer SMDS, which the company calls MegaConnect, in the Los
Angeles area, also in September. 

Next year, GTE plans to extend MegaConnect to Seattle and Everett,
Washington; Beaverton and Portland, Oregon; Raleigh-Durham, North Carolina;
Tampa, Florida and Honolulu, Hawaii. 

Up to now, telephone companies had been using early models of the BNS-2000 to
test market SMDS. In one such test, PacBell and GTE interconnected Rockwell
International Corporation's LANs between its Canoga Park office (served by
PacBell) and its Seal Beach Facility (served by GTE).

The differentiator of the BNS-2000 remains its ability t let our customers,
like PacBell and GTE, start SMDS frame relay services now and evolve easily
to additional ATM-based BISDN services.

-----------------------------------------------------------------------------
Russia's Big Steel Buys AT&T PBX (AT&T Technology v.8 no.1)

One of the world's largest steel manufacturing facilities, Magnitogorsk
Metallurgical Works, has signed an agreement to purchase an AT&T DIFINITY
Communications System, replacing its 1930s-vintage telephone system.

The new PBX will provide advanced communications to the more than 60,000
employees in several buildings on the company's campus. The first phase of
the $5 million project-installation of a 4,000 line DEFINITY G3R will be
completed later this year.

AT&T made the sale with NPO Chermetavtomatika, the Russia-based distributor
for AT&T business communications systems. The company, located on the Ural
River, was built with American assistance and technology, and supplied much
of the armament and tanks used during World War II. Today, the multiple-
building campus includes a hospital and a farm, used to grow agricultural
products for the town's residents. 

Magnitogorsk is a major exporter of steel products to companies around the
world. It had been using several key systems, as well as two large step-by-
step systems, similar to those in US telephone company COs during the 1930s.
Maintenance had become increasingly difficult, and it needed an advanced
communications system that would enable it to communicate efficiently
internally and with its customers. 

According to AT&T, Magnitogorsk selected the DEFINITY system based on the
technology and its capacity to handle the huge company's communications
needs, coupled with the distributor's responsiveness and level of knowledge. 

The DEFINITY system's distributed architecture makes it possible for a single
system to handle the communications needs of the entire complex. Campus
buildings will be connected via remote modules, and the cable linking the
modules will run through existing steam tunnels. 

-----------------------------------------------------------------------------
Fast Switch for ATM Service (AT&T Technology v.8, no. 1)

Service providers can now offer their customers end-to-end Asynchronous
Transfer Mode (ATM) Services using AT&T Network Systems new GCNS-2000 data-
networking switch. The GCNS-2000 switch will support 20 gigabits per second
of switching capacity, allowing the high-speed, sophisticated applications of
ATM to be brought to the PSTN. 

The GCNS-2000 also will become the core switching vehicle for AT&T's
InterSpan ATM Services. Using an ATM network (Also called broadband), for
example executives could participate in a multilocation multimedia conference
call, while exchanging documents and images. Medical specialists in different
hospitals could concurrently review a patient's X-ray or CAT scan. And
customers everywhere could select a movie to watch at any time.

The new switch is part of Network Systems' data networking switching product
line, which includes the BNS-2000 fast-packet cell-relay system. This switch
is deployed by various phone companies in the US and other countries in
support of their frame-relay networks and switched multimegabit data service
offerings.

The GCNS-2000 uses a new core ATM technology, developed by AT&T Bell
Laboratories, a key feature of which is the "shared memory fabric". This
allows the equipment to accommodate simultaneously the distinct and different
natures of voice, data and video transmission, so that all types of signals
can be processed at once. The switch will be available on a limited basis at
the end of 1993, and generally available six months later. 

-----------------------------------------------------------------------------
Wireless 5ESS Switch Gets New Capabilities (AT&T Technology v.8, no.1)

The 5ESS Switch for the AUTOPLEX System 1000 will now support AMPS standards
all over the world, and the Global System for Mobile Communications standard.

While the new switch will, at first, provide the same features and services
now available on the AUTOPLEX System 1000 Switch, it will eventually become
a platform for ISDN and advanced intelligent network applications. 

The 5ESS Switch with wireless capability represents a new, cost-effective
growth option for AUTOPLEX System networks. Future versions of the switch for
the AUTOPLEX System will make it possible to have analog and digital AMPS, as
well as POTS on the same switch. Switch availability is scheduled for mid-
1994.
-----------------------------------------------------------------------------
800 Service Recognizes Speech (AT&T Technology v.8, no.1)

AT&T recently announced an innovative 800 Service feature that makes it
easier for all callers, including the 39% of US homes and businesses with
rotary and non-touch-tone telephone to obtain information from businesses by
simply speaking. Called AT&T 800 Speech Recognition, this new capability
enables callers to verbally respond to announcement that allow them to
automatically select the information or assistance they want.

AT&T is the first long-distance company to provide voice-activated call
routing in an 800 service network. Past technology only enabled callers using
touch-tone telephones to direct their calls after responding to menu prompts
with their keypads. Now, these callers can route their own calls quickly and
efficiently by simply speaking their choice. And for the first time, callers
with rotary telephones will be able to enjoy the same benefits as callers
with touchtone phones.

AT&T Speech Recognition is a network-based, advanced 800 Service innovation
that prompts callers to speak a number - from "one" to "nine" - corresponding
to a menu of options that identifies the department or location they wish to
reach within the company they're calling.

Supported by state-of-the-art technology from AT&T Bell Laboratories, AT&T
Speech Recognition is able to recognize the spoken number, process the
information, and route the call through the AT&T network to the appropriate
destination. During field tests, AT&T Speech Recognition correctly identified
the spoken number 97.8 percent of the time. this high completion rate was
achieved even taking into account the many dialects and accents that exist
across the US.

AT&T Speech Recognition represents the latest step in AT&T's drive to provide
its customers with complete automated transaction processing. Eventually, the
capability to recognize more advanced words and entire phrases will make it
possible for AT&T 800 Service customers to process orders, dispatch repair
crews, provide account information, or handle countless other functions in a
fully automated, cost-effective way, if they so desire. 

-----------------------------------------------------------------------------
Amplifier, Vector Attenuator for Wireless Applications (AT&T Technology, v.8,
no.1)

AT&T Microelectronics recently expanded its wireless applications technology
with two high-performance, high reliability thin-film-on-ceramic devices for
cellular base stations.

The components are the GSM Low Noise Amplifier, an unconditionally stable
amplifier designed for Global System for Mobile Communications (GSM) cellular
base station receivers, and the 1098E Complex Vector Attenuator, a surface
mount device that enables designers to build sophisticated signal
cancellation systems into base station transmit amplifiers.

The GSM low-noise amplifier is a balanced amplifier design. It operates in
the 890- to 915- MHz frequency range and exhibits exceptionally low noise
(1.3 dB maximum) and high third order intercept (38 dBm) with a 32 dB small
signal gain, operating on a single 24 volt DC supply. While the device is
tailored for the GSM band, it provides similar performance in the 824- to
849-MHz AMPS band. 

The key benefit to the designer is the device's unconditional stability, a
characteristic important to eliminating oscillation. Due to its thin-film-on-
ceramic implementation, the device also provides, for a given bias condition
lower junction temperatures and therefore longer life and increased system
reliability than a PWB realization. 

The 1098E Complex Vector Attenuator is functionally equivalent to the
combination of an endless phase shifter and an attenuator. It is used to
control the phase and amplitude of a signal without introducing
intermodulation distortion, dispersion, or variation in group delay. In
addition, there's no limitation on phase change, which can increase or
decrease continuously without reaching an endpoint. 

Production quantities of the GSM low-noise amplifier will be available this
fall, while the 1098E Complex Vector Attenuator is currently available in 124
PIN PQFP packaging. Pricing details and product literature are available from
the AT&T Microelectronics Customer Response Center, 1-800-372-2447 Ext. 869
(In Canada, 1-800-553-2448, Ext. 869); fax 215-778-410 or by writing to AT&T
Microelectronics, Dept. AL500404200. 555 Union Boulevard, Allentown, PA.
18103. 

-----------------------------------------------------------------------------
Frame Relay Service (AT&T Technology, v.8, no.1)

AT&T InterSpan Frame Relay Service will now be offered to customers in Canada
(subject to CRTC approval) through Unitel Communications Inc., and in 9
additional European countries through AT&T ISTEL. 

Beginning in July 1993, the service will be offered in controlled
introduction to customers in Canada, Ireland, Austria, Portugal, Switzerland,
Denmark, Italy, Luxembourg, Finland and Norway, with general availability
later in the third quarter of 1993.

AT&T InterSpan Frame Relay Service will provide the same seamless global
interconnectivity and high reliability currently enjoyed by InterSpan Frame
Relay customers in the US, UK, Spain, France, Belgium, The Netherlands,
Germany and Sweden. 

AT&T provides its InterSpan Frame Relay Service over a common worldwide
architecture that enables seamless global service with fast, reliable
connectivity. As a result of this standards-based architecture, InterSpan
Frame Relay Service provides a wise array of global features including
network management and enhanced permanent virtual circuits for extended
bursts. 

InterSpan Frame Relay Service provides a number of value-added features that
are of critical importance to multi-national customers today. For example,
the service provides a single point of contact for installation and
maintenance of InterSpan Frame Relay Service, access and customer premises
routers. Billing for InterSpan Frame Relay Service and associated local
access is combined into a single bill. In one currency of the customer's
choice - US dollars, UK pounds or sterling or Canadian dollars - rendered in
the country of choice. In addition, protocol conversion embedded in the
network will provide interoperability between InterSpsan Frame Relay Service
and emerging InterSpan Asynchronous Transfer Mode (ATM) services to allow
migration to ATM as the customers' business needs dictate. Dedicated
InterSpan Frame Relay Service Network Operations Centres in North American
and Europe monitor and manage the InterSpan Frame Relay Network around the
globe, around the clock.

-----------------------------------------------------------------------------
Modernization Milestone for Ukraine's Telecom (AT&T Technology, v.8, no. 1)

UTEL, Ukraine's telecommunications joint venture responsible for the
modernization of the long-distance telecommunications network, recently
inaugurated its first all-digital long distance telephone switch in L'viv. 

The 5ESS Switch, supplied by AT&T Network Systems International, was
officially put into service with a ceremonial inaugural call between the
Minister of Communications of Ukraine, Oleh Prozhyvalsky, in L'viv and Victor
A. Pelson, AT&T Group Executive, Communications Services in NJ.

With the new 5ESS Switch, most citizens n L'viv can now make direct
international calls to many countries in the world. International connections
are completed via an earth station located in Zolochive, which in turn is
connected to an international switching center in Kiev, Ukraine. Just four
months ago, international calls from Ukraine were possible only via their
services of Moscow's telephone operators; on average, outgoing calls required
24 hour's advance notice.

The 5ESS Switch in L'viv includes 4,000 trunk lines and 1,000 subscriber
lines and is the latest generation of telecom equipment utilizing digital
technology to connect voice, data and image messages. UTEL recently signed an
agreement to purchase six additional 5ESS switching systems for Ukraine.
Final assembly of these switches will take place locally in Ukraine at the
Chernighiv Zavod Radioaparatur (Chezara) production plant in Chernigiv.
Following L'viv, the next switches are scheduled to be installed in
Chernivtsi, Uzhorod, Poltava, Luhansk and Kirovohrad, doubling today's
capacity.
-----------------------------------------------------------------------------
XUNET (AT&T Technology, v.8, no.1)

XUNET: Today's Experiments Define Tomorrow's Reality
The Experimental University Network - XUNET - will soon carry 622-Mb/s
traffic

A high-speed experimental network is giving researchers and graduate students
an opportunity to explore issues important to the future of data
communications. The Experimental University Network (XUNET) now consists of
experimental switches, based on the Asynchronos Transfer Mode (ATM) standard,
linked by 45 megabit-per-second (Mb/s) transmission lines.

Host computers on fiber-distributes data interface LANs communicate over
XUNET via routers between the LAN and the ATM backbone. In a few months,
AT&T, the University of Wisconsin at Madison, and the University of Illinois
at Urbana-Champaign will begin to communicate over experimental links at 622
Mb/s. 

With the higher-speed links and a higher-performance Peripheral Interface
LAN, a user in a remote location will be able to display the output of a
supercomputer simulation on his or here workstation in real time.

While the XUNET testbed is small, the research program seeks to understand
the problems of a large high-speed data networks. With existing wide-area
data networks, most users communicate at speeds of 1.5 Mb/s or less. Research
on XUNET anticipates that users will interface at speeds up to hundreds of
Mb/s. With higher speeds comes the potential for new applications such as
full-motion video, multimedia conferencing, and distributed computing all
over the public network. The XUNET testbed, which is supported by AT&T Data
Communications Services, is also the basis for BLANCA, one of five gigabit
testbed networks sponsored by the Corporation for National Research
Initiatives.

TESTBED EVOLUTION
The program began with XUNET I in 1986 as a collaboration among AT&T, the
University of California at Berkeley, the University of Illinois, and the
University of Wisconsin. The universities were linked with AT&T Bell
Laboratories using DATKIT VCS switches and transmission links used ACCUNET
T1.5 Services at 1.5 Mb/s.

Students at the universities have a change to try ideas out first hand by
using XUNET as a research tool in running controlled network experiments. For
example, students can remotely download different algorithms into the XUNET
switches to study the effect on a heavily loaded network.

XUNET II became operational in January 1992, offering a thirty-fold increase
in speed over XUNET I by using experimental ATM switches and transmission
lines operating at 45 Mb/s. In addition to AT&T and the universities Pacific
Bell and Bell Atlantic are involved in the XUNET II activity. In July 1992,
Sandia National Laboratories and Lawrence Livermore Laboratories were linked
into the XUNET testbed, and in February 1993 Rutgers University joined. In
addition, students from the University of Pennsylvania and Columbia
University participate in the XUNET program, and students from the
universities have been invited to AT&T Bell Laboratories at Murray Hill to
work with researchers there. 

XUNET III, the first portion of which is scheduled for operation this June,
will be more than an order of magnitude faster than XUNET III. A 622 Mb/s
link will connect XUNET switches at an AT&T Chicago CO, the University of
Wisconsin, and the University of Illinois. 

RESEARCH RESULTS
The XUNET collaboration includes research in many of the key areas in wide-
area networking, including switch architectures, LAN interfaces, network
operations, managment tools and techniques, and network applications. One
focus of the program has been on congestion control to determine how the
network can meet the quality of service needs for different types of traffic
even in the presence of heavy load.

For example, voice, video and multimedia traffic may require controlled delay
and variation in delay, whereas file transfer traffic may not. Research into
protocols and the trunk service disciplines used in switching nodes have
identified effective ways of carrying many types of traffic in a network
while avoiding congestion and degradation of the quality of service.

XUNET has already provided valuable insight for AT&T's service realities. And
this will continue to be the case as AT&T moves towards its realization of
ATM services in 1994. 

By A.G. Fraser, Erik K. Grimmelmann, Charles R. Kalmanek and Giopala S.
Subramanian

-----------------------------------------------------------------------------
DACS II Goes TEMPEST (AT&T Technology, v.7, no.4)

The National Security Agency (NSA) of the US Government has endorsed the
TEMPEST version of the AT&T Digital Access and Cross Connect System II (DACS
II). The TEMPEST is encased in a special cabinet which shields its electronic
output from eavesdropping or monitoring by unauthorized personnel.

The NSA endorsement means it will be included on the Endorsed TEMPEST
products list. Communications Systems Technology, Inc. (CSTI), based in
Columbia, MD, engineers the cabinet under an agreement with AT&T Network
Systems, then markets the TEMPEST as a CS-1544 switch. 

The DACS II is a fast and reliable digital cross-connect system developed by
AT&T. Up to 160 standard 1.544 megabits-per-second DSI signals, each
consisting of 24 channels (DSOs) may be terminated on the CS-1544. Each of
the 24 DSOs comprising a DS1 signal may be cross connected to any other DS1.
-----------------------------------------------------------------------------
Swat teams on 24-hour call (IEEE Spectrum, August 1992)

"We all have wonderful war stories to tell about being roused from sleep,"
said Barbara Fraser, one of seven members of the Computer Emergency Response
Team (CERT). Most computer crackers, like common robbers, prefer to break in
during off-hours, she said, and international incidents add to the 24-hour
nature of the job. Mostly, however, CERT's business is conducted between
7:30a.m. and 6 p.m. Pittsburgh time. 

CERT's domain is the Internet, a worldwide supranetwork with perhaps a
million host computers and five to eight million users. Roughly half are in
the US, and membership is expanding fast in Europe, the Pacific Rim, and
South America.

Each day, the CERT team responds to an average of 300 hotline calls and email
messages most in English. Last year, they averaged about one "incident" a
day. Now its up to three. (An incident is an actual of attempted intrusion.)
They have responded to serious attacks from Europe ("This is NOT A PRANK"),
put out a major US hackers alert that counselled "Caution (not panic) is
advisable," and warned against email trojan horses that catch passwords from
gullible users.

When a call or message comes, the CERT member on duty supplies technical
guidance to the site so that they can fix the problem and assess damage.
Unless otherwise agreed to, everything is confidential and may even be
anonymous. CERT members determine whether the host was networked, its level
of security, the system configuration, and whether the system's vulnerability
is familiar or new.

CERT director Ed DeHat stresses that any tip is welcome. Last year, for
instance, a person reported a failed attempt to seize his password file. CERT
went back to the originating site and found intruder(s) "were trying to break
into thousands of system." The originating site alerted managment, cut
connections to the outside temporarily and closed the "holes" in its security
system.

CERT does not investigate intrusions with an eye to criminal prosecution, but
it does recommend whom to contact for investigations by law enforcement
groups such as the local police, the FBI, or the SS. 

Most of CERT's traffic consists of security chatter; experts call to share
information while others ask CERT advisories or request general advice. Less
often, CERT has to tip off organizations about likely penetrations. "Almost
always, an incident is not stand-alone," said Fraser. It may vary from 10
hosts at a single site to "tens of thousands of hosts over the world."

Many people do not wait for a problem by call CERT for a "sanity check" -
reassurance that their site and its systems are safe. Novices are not
discouraged. "We hold their hands," Fraser said. Help is free and is even
encouraged.

CERT was formed only weeks after the paralysing 1988 attack on Internet by
Robert Morris Jr., son of a computer security scientist. It is funded by the
Pentagon's Defense Advanced Research Projects Agency through the Software
Engineering Institute at Carnegie Mellon University in Pittsburgh.

With its expertise in system vulnerabilities, CERT is expanding its efforts
in education and training as well as research and development for network
security. Already, it sends a security checklist to sites as needed and
advises cores of Unix software vendors of security flaws that need patching.
It also keeps a confidential mailing list of vendors regarding
vulnerabilities in their products. "This is not the textbook type of security
problem," DeHart said. "This is based on what people are doing." 

Such companies as Sun Microsystems and NeXT, and more recently IBM, are
mentioned a lot in the CERT advisories, noting fixes to systems flaws. Rather
than being an embarrassment or indictment of their products, this shows that
these companies are committed to security, DeHart said. 

CIAC (for Computer Incident Advisory Capability), a sister group of CERT with
responsibility for Department of Energy computers, is located at the Lawrence
Livermore National Laboratory in Livermore, CA. Known for its software an
analytical capabilities, CIAC keeps 20-30 viruses in isolation "for
dissection and reverse engineering."

Steve Mich, CIAC project leader, said they average perhaps one or two
incidents a week, Like CERT, they always wait until a patch is found before
they announce the vulnerability. The flaw is described over email as vaguely
as possible to thwart would-be-crackers. But sometimes, he said, "it's like
trying to describe a hula hoop without moving your hand."

Other countries are responding too. In 1990 Germany's information security
agency created two national incident response teams: the Virus Test Center at
the University of Hamburg and the MicroBIT Virus Center at the University of
Karlsruhe.

The Hamburg center has five staffers and many students who analyze viruses
and monitor activities of the German hackers known as Chaos Computer Club.
The center receives 20-100 reports of virus cases each week from Germany and
Scandinavia., divided equally between government, industry and academia.
Email links aid coordination with other experts in Australia, Europe, Japan
and the US. A current European Community initiative would create serval more
CERT-like groups in diverse countries.

All told, the US Department of Justice reports there are more than a dozen
CERT teams. Not to be left out, its own FBI recently formed the Computer
Analysis and Response Team (CART), which will take its place beside other FBI
laboratories, like those for analysis of DNA, chemicals and poisons, and shoe
and tieprints. 

Initial plans call for a staff of 12 agents. CART's main task will be the
forensic examination of computer evidence, according to manager Stephan
McFall. They must also guarantee (somehow) to the satisfaction of US courts
that magnetic data has not been altered or deleted since being confiscated.
McFall declined to give more details other than to say that research is being
done and that CART will also help train agents in the field.

There are so many CERT-like groups in government and industry today that in
1990 the Forum of Incident Response and Security Teams (First) was born. The
group meets regularly and organizes workshops on incident handling. Even
organizations without worm-busting squads can join if approved.

- J.A.A.
  
-----------------------------------------------------------------------------
Getting Tougher on Long-Distance-Service Thieves (AT&T Technology, v.7, no.4)

Theft of phone service is escalating. AT&T's NetPROTECT program helps
customers secure their communications systems against remote access,
preventing fraud.

Picture this. It's 2 a.m. on a soft spring night on Wall Street. The
buildings lining the canyons of lower Manhattan are dark and silent; even the
cleaning staffs have gone home for the weekend. 

But inside the offices of Global Conglomerate, Inc. - GlocCon for short -
it's very, very busy. For several hours GlocCon's PBX has been pressed to
keep up with call-processing demand. Thousands of calls to dozens of domestic
and international locations have poured out of the company's offices since
just past normal closing time. The PBX is so active, in fact, that it offers
a constant busy signal to anyone trying to call in. 

For a Saturday morning at 2 a.m., GloCon is doing a land office business. The
problem is that all that business is illegal. GlocCon is being hit by
"callsell" operators - big time. Over the weekend alone, the toll-fraud bill
is going to be substantial, perhaps even outstripping GloCon's normal monthly
phone bill. And, according to the tariffs governing AT&T's services, GlocCon
is responsible for picking up the tab.

Happily, for customers ant AT&T, such an experience may soon be history.
Since August 24, 1992, when tariffs became effective, AT&T has been offering
customers the NetPROTECT family of products and services, an integrated
offering of hardware and software that helps detect, prevent and correct
remote PBX toll fraud. 


Such fraud is expensive. Estimates of the financial damage done by hackers
and long distance thieves range from less than $1 billion to over $4 billion
annually. From AT&T's perspective, the best estimate of industry toll fraud
is $1.2 billion annually, a figure issued by the Washington D.C. based
Communications Fraud Control Association.

But by any estimate, the fraud problem is large and growing. For several
years AT&T has offered security seminars aimed at alerting customers to toll
fraud, and has been telling them how they an protect themselves against it.
AT&T actively works with customers to make certain they understand and use
their business telephone system's security features.

AT&T also cooperates with law enforcement agencies and customers in resolving
ongoing investigations of fraud. And it recently has been the forefront of
developing legislation on the state and federal levels that would treat toll
fraud as the serious crime that it is. AT&T worked with the New York State
legislators to make the theft of long distance service a felony; the law
became effective Nov. 1, 1992.

The NetPROTECT Service offering includes fraud protection for customer
premises-based equipment as well as three levels of network protection. With
NetPROTECT Service active seven days a week, around the clock, AT&T's
NetPROTECT Service Security organization can look continuously at network
calling patterns, especially calls to a changing number of high-fraud
countries.

These countries usually are involved in drug trafficking and the "country-of-
the-month" changes frequently changes frequently. Fraudulent calls also are
made to countries from which there's large legal and illegal emigration to
the U.S. A toll switch in the U.S may suddenly start pumping out a large
number of one of these countries from a particular CO. If the calls are found
to originate from a business, AT& contacts the company, says fraud is
suspected, and works with an employee to stop the fraudulent calling from the
PBX.

NetPROTECT Service is made possible by the Toll Fraud Early Detection System
- TFEDS. (See sidebar, next paragraph) TFEDS, a pattern recognition network
monitoring tool, was developed by Business Customer Services - BCB (Business
Customer Billing) and the Network Services Division. TFEDS enables AT&T's
Corporate Security organization to quickly spot and monitor calling patterns
that indicate fraud - as it occurs. NetPROTECT Services offers different
levels of protection that are tailored to customer needs. 
Toll Fraud Early Detection System
TFEDS provides AT&T's Corporate Security Group with timely and flexible
monitoring tools to detect and report remote-access PBX fraud. TFEDS also has
access to near-real-time billing data for identifying PBX fraud patterns. 
In the past; that is, prior to NetPROTECT Service, the limited amount of call
monitoring that was done used data that was three days to two weeks old. Now,
monitoring reports are generated almost hourly, around the clock, every day.
TFEDS processes data for 800 and international services and, based on
predefined customized parameters, generates reports to later Corporate
Security that a customer's PBX is being hacked, or that there's abnormal
international calling from the PBX. Planned TFEDS enhancements include an
expert system to improve detection accuracy by allowing NetPROTECT Service
Security to maintain generic and customer-specific business rules applicable
to PBX fraud. It also will be possible to maintain customer-specific data for
long-term statistical analysis and trending, and there will be better tools
for fraud case management.

LEVELS OF PROTECTION
Basic Service, the first level of protection, is provided to all AT&T
businesses long distance customers at no charge. With this service, AT&T
monitors its domestic 800 service and international long-distance network
around the clock, seven days a week, in an attempt to spot suspicious
patterns of network usage indicating fraud. Because more than 90 percent of
toll fraud is international traffic to a certain number of high-fraud
countries. Basic Service can catch a significant amount of fraud while its's
in progress.

In early 1992 AT&T received FCC approval to deny hackers access to AT&T's
800-Service network. Using some of its basic monitoring tools, NetPROTECT
Security can monitor repeated 800 call attempts made from a particular phone
number. 

In the fictional Wall Street example. high calling volume from GloCon's
headquarters to high-fraud countries after normal business hours would be
flagged as potential fraud. Under the Basic Service option, AT&T would call
a company representative to warn of suspicious traffic from its office, and
the person would shut down the PBX. If the representative can't be contacted
or takes no action, the customer would continue to bear all liability for
whatever fraud occurred. 

Advanced Service offers a greater degree of protection, requiring AT&T to
implement several safeguards that include:

o preventing access to the PBX from remote-maintenance ports;
o installing security codes on the PBX so people who dial in, using remote
access and other advanced features of the PBX, must dial a multidigit
security code to dial out;
o safeguarding voice-mail systems so callers can't migrate from the system to
outgoing direct-dial trunks; and
o maintaining backup copies of PBX software so if the PBX is hacked, it can
be shut down and brought back up. 

Customers must also provide a list of phone services and a list of phone
numbers they want AT&T to watch, and the names and numbers of three people in
the company who can be called anywhere, anytime if there's a problem. In
exchange the customer's liability is $25,000 per fraud incident, measured
from when the fraud starts until two hours after the customer is notified.
[Eds. The original said "after AT&T is notified" but this makes no sense as
the customer is the one that must shut off the PBX. And the next sentence
deals with AT&T being notified by the customer.] If the customer spots the
fraud first then notifies AT&T, the customer's liability is reduced by 50
percent, to a maximum of $12,500. Once fraud is identified, AT&T works with
the customer to find the source and shut it down. AT&T's liability, however,
stops two hours after the fraud is identified.

Premium Service offers still further protection, requiring customers to
follow more stringent security guidelines. In exchange, Premium Service
customers have no financial liability from the start of fraud to two hours
after notification. As with the Advanced Service option, AT&T will assume
liability for remote toll fraud for only two hours after the fraud is
identified. AT&T also will work with customers to identify and shut down the
sources of fraud. 

NetPROTECT Service guarantees coverage of only remote toll fraud - fraud that
occurs when a customer's telecom system has been penetrated from the outside.
While our monitoring will catch fraud, customers are still responsible for
protecting themselves against unauthorized use of their long-distance service
by their own employees or other inside agents. 

AT&T Global Business Communications Systems also offers the following
products and services, which help secure customer-premises equipment:

o AT&T Hacker Tracker - software that's used with AT&T's PBX Call Accounting
System for continuous monitoring of all incoming and outgoing calls. This
software causes the system to automatically alert security when it detects
abnormal activity such as a PBX getting high volumes of incoming 800-number
calls after hours, or calls to international destinations. 

o Security Audit Service - a consulting service provided by security people
in AT&T's National Technical Service Center in Denver, and Corporate
Security. These people perform individual system audits and recommend
security measures. 

o Fraud Intervention Service - provided by AT&T's National Technical Service
Centre. The service helps customers identify and stop fraud while its in
progress. It would give step-by-step guidance, for example on securing the
PBX and installing the back-up copy of the PBX's software. Also available are
several educational offerings and a security handbook.

ADDED SAFEGUARDS
Since NetPROTECT Service was announced, a number of insurance companies have
indicated interest in providing toll-fraud insurance. The Travellers
Companies actually have introduced toll-fraud insurance policies that cover
business customers, indemnifying them for a loss that has occurred. Further
measures also have been taken., Using some of the basic monitoring tools,
AT&T NetPROTECT Service security personnel now can monitor repeated 800 call
attempts made from a particular telephone number. 

This is particularly useful because a favourite trick of hackers is to
randomly dial 800 numbers to reach a voice-processing system or other
automated attendant. If the owner of the 800 number hasn't properly secured
the system, a hacker can bypass it and make outgoing calls. Once they
penetrate a particular number, hackers often sell it or may post it on
electronic bulletin boards for other hackers to use. People who exceed a
certain threshold level (which changes hourly or daily) of 800-number
attempts in a predetermined time are locked out of AT&T's 800 network.

Toll fraud isn't committed just by hackers. It's a big and growing business,
often perpetrated by organized crime. Because toll-fraud has generally not
been a high priority for law enforcement officials, toll thieves
traditionally have not faced heavy penalties even if caught. With little risk
and high profits, it's no wonder the toll-fraud business is booming. 

NetPROTECT Service is an aggressive program to fight back. Standing squarely
with its customers, AT&T believes it can put an end to the theft of long
distance service. 

By James R. McFarland

-----------------------------------------------------------------------------
Coming Soon in Future LOD Technical Journals:
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

* An Introduction to starting and operating your own pirate radio station.

* An Update of The Mentor's famous Introduction to Hacking. With new        
  defaults, new systems and tricks of the trade! 

* Bit Stream on Carding Today

* And MUCH, MUCH more!

Remember, the more files submitted the quicker these journals can roll out.
If you'd like to offer anything to the LOD, contact us today. 

-----------------------------------------------------------------------------