| ==Phrack Inc.== |
|
|
| Volume Three, Issue Thirty-five, File 12 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue XXXV / Part Three PWN |
| PWN PWN |
| PWN Compiled by Dispater PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
| Prodigy Stumbles as a Forum...Again |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Mike Godwin (Electronic Frontier Foundation) |
|
|
| On some days, Prodigy representatives tell us they're running "the Disney |
| Channel of online services." On other days the service is touted as a forum |
| for "the free expression of ideas." But management has missed the conflict |
| between these two missions. And it is just this unperceived conflict that has |
| led the B'nai B'rith's Anti-Defamation League to launch a protest against the |
| online service.. |
|
|
| On one level, the controversy stems from Prodigy's decision to censor |
| messages responding to claims that, among other things, the Holocaust never |
| took place. These messages--which included such statements as "Hitler had some |
| valid points" and that "wherever Jews exercise influence and power, misery, |
| warfare and economic exploitation ... follow"--were the sort likely to stir up |
| indignant responses among Jews and non-Jews alike. But some Prodigy members |
| have complained to the ADL that when they tried to respond to both the overt |
| content of these messages and their implicit anti-Semitism, their responses |
| were rejected by Prodigy's staff of censors. |
|
|
| The rationale for the censorship? Prodigy has a policy of barring |
| messages directed at other members, but allows messages that condemn a group. |
| The result of this policy, mechanically applied, is that one member can post a |
| message saying that "pogroms, 'persecutions,' and the mythical holocaust" are |
| things that Jews "so very richly deserve" (this was an actual message). But |
| another member might be barred from posting some like "Member A's comments are |
| viciously anti-Semitic." It is no wonder that the Anti-Defamation League is |
| upset at what looks very much like unequal treatment. |
|
|
| But the problem exposed by this controversy is broader than simply a badly |
| crafted policy. The problem is that Prodigy, while insisting on its Disney |
| Channel metaphor, also gives lip service to the notion of a public forum. |
| Henry Heilbrunn, a senior vice president of Prodigy, refers in the Wall Street |
| Journal to the service's "policy of free expression," while Bruce Thurlby, |
| Prodigy's manager of editorial business and operations, invokes in a letter to |
| ADL "the right of individuals to express opinions that are contrary to personal |
| standards or individual beliefs." |
|
|
| Yet it is impossible for any free-expression policy to explain both the |
| allowing of those anti-Semitic postings and the barring of responses to those |
| postings from outraged and offended members. Historically, this country has |
| embraced the principle that best cure for offensive or disturbing speech is |
| more speech. No regime of censorship--even of the most neutral and well- |
| meaning kind--can avoid the kind of result that appears in this case: some |
| people get to speak while others get no chance to reply. So long as a board of |
| censors is in place, Prodigy is no public forum. |
| |
| Thus, the service is left in a double bind. If Prodigy really means to be |
| taken as a computer-network version of "the Disney Channel"--with all the |
| content control that this metaphor implies--then it's taking responsibility for |
| (and, to some members, even seeming to endorse) the anti-Semitic messages that |
| were posted. On the other hand, if Prodigy really regards itself as a forum |
| for free expression, it has no business refusing to allow members to respond to |
| what they saw as lies, distortions, and hate. A true free-speech forum would |
| allow not only the original messages but also the responses to them. |
|
|
| So, what's the fix for Prodigy? The answer may lie in replacing the |
| service's censors with a system of "conference hosts" of the sort one sees on |
| CompuServe or on the WELL. As WELL manager Cliff Figallo conceives of his |
| service, the management is like an apartment manager who normally allows |
| tenants to do what they want, but who steps in if they do something |
| outrageously disruptive. Hosts on the WELL normally steer discussions rather |
| than censoring them, and merely offensive speech is almost never censored. |
|
|
| But even if Prodigy doesn't adopt a "conference host" system, it |
| ultimately will satisfy its members better if it does allow a true forum for |
| free expression. And the service may be moving in that direction already: |
| Heilbrunn is quoted in the Wall Street Journal as saying that Prodigy has been |
| loosening its content restrictions over the past month. Good news, but not |
| good enough--merely easing some content restrictions is likely to be no more |
| successful at solving Prodigy's problems than Gorbachev's easing market |
| restrictions was at solving the Soviet Union's problems. The best solution is |
| to allow what Oliver Wendell Holmes called "the marketplace of ideas" to |
| flourish--to get out of the censorship business. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Computer Network to Ban 'Repugnant' Comments |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From Washington Post |
|
|
| Prodigy has been charged with allowing "antisemitic slurs" to run on its |
| network. Prodigy officials said they would *not* censor discussion of |
| controversial subjects, such as the one that has been raging over the net for |
| several months -- whether the Holocaust was a hoax. |
|
|
| The controversial message that was labeled "repugnant" included the |
| statements: "Hitler had some valid points...", and "...whenever Jews exercise |
| influence and power, misery, warfare and economic exploitation [are the |
| result]". There were six other messages that the Anti-Defamation League of |
| B'nai B'rith are complaining about. The Hitler message was not available to |
| all subscribers, it was just personal mail between users. The person who |
| received the mail brought it to the ADL's attention. |
|
|
| Civil liberties groups have compared computer networks to telephone |
| companies, which do not censor calls. However, Prodigy officials object to |
| that analogy, saying it is more like a newspaper, and that Prodigy must judge |
| what is acceptable and what is not, much as a newspaper editor must. |
|
|
| Prodigy officials take the position of, and I quote, "we were speaking in |
| broader terms ... we were focused on the broad issue of free expression". |
| _______________________________________________________________________________ |
|
|
| More on Proctor & Gamble August 15, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~ |
| by Randall Rothenberg (New York Times) |
| Further Reading: Phrack Inc., Issue 33 , File.12, "Proctor & Gamble" |
|
|
| Law-enforcement officials in Ohio have searched the records of every |
| telephone user in southwestern Ohio to determine who, if anyone, called a Wall |
| Street Journal reporter to provide information that Proctor & Gamble said was |
| confidential and protected by state law. |
| |
| The investigation goes far beyond examining the telephone records of |
| current and former employees of the giant consumer products company, an inquiry |
| the Hamilton County prosecutor's office confirmed on Monday. The Journal |
| reported the scope of the investigation Thursday. |
|
|
| The prosecutor, Arthur Ney Jr., acting on a complaint by Procter & Gamble, |
| ordered Cincinnati Bell to turn over all the telephone numbers from which |
| people called the home or office of the reporter, Alecia Swasy, from March 1 to |
| June 15. |
|
|
| The situation began sometime before June 17 when Procter & Gamble, which |
| makes Tide detergent, Crest toothpaste and other familiar supermarket products, |
| asked the Cincinnati police to determine whether current or former employees |
| were leaking confidential corporate information to The Wall Street Journal. |
|
|
| On Monday the newspaper reported that the company had been bothered by two |
| news articles published on June 10 and June 11 written by Ms. Swasy, a reporter |
| based in Pittsburgh who covers Procter & Gamble. The articles cited |
| unidentified sources saying that a senior executive was under pressure to |
| resign from the company, and that it might sell some unprofitable divisions. |
|
|
| But a spokeswoman for Procter and Gamble, Sydney McHugh, said Thursday |
| that the company "had been observing a disturbing pattern of leaks" since the |
| beginning of the year. She refused to elaborate, but said the decision to |
| pursue legal action was reviewed at several levels in the company and was made |
| by Jim Jessee, a corporate security officer. |
|
|
| Two Ohio statutes protect the unauthorized disclosure of trade secrets. |
| One makes it a felony to transmit formulas, customer lists or other tangible |
| pieces of information that would be valuable to a company and its competitors. |
| But another, broader law makes it a misdemeanor to disclose "any confidential |
| matter or information" without the company's consent. |
|
|
| The Cincinnati police approached the Hamilton County prosecutor's office, |
| which sought and received from a grand jury a subpoena for telephone records. |
|
|
| A copy of the subpoena, dated June 17, was given to The New York Times by |
| someone involved in the case who insisted on anonymity. The subpoena ordered |
| Cincinnati Bell to "identify all (513) area code numbers that have dialed" Ms. |
| Swasy's home or office telephones in Pittsburgh during an eight-week period |
| that started on March 1. |
|
|
| Cincinnati Bell serves 655,297 telephone numbers in the 513 area code, in |
| an area covering 1,156 square miles, said Cyndy Cantoni, a spokeswoman for the |
| company. In the company's entire jurisdiction, which also covers parts of |
| Kentucky and Pennsylvania, about 13 million toll calls are placed in an average |
| month, she said. |
|
|
| Ms. Cantoni said she could not comment on what Cincinnati Bell turned over |
| to the authorities, but said the company routinely complied with subpoenas. |
| Under normal procedure, the company's computers would have automatically |
| searched its customer list and printed out only the originating numbers, and |
| not the names or addresses, of calls to Ms. Swasy's numbers, Ms. Cantoni said. |
|
|
| The Wall Street Journal, which is published by Dow Jones & Co., reported |
| on Monday that neither Ms. Swasy nor executives at the Journal were informed of |
| the subpoena by the authorities. |
|
|
| Neither Terry Gaines, a first assistant prosecutor, nor Ed Ammann, a |
| police department colonel involved with the investigation, returned repeated |
| calls to their offices. |
|
|
| Alan F. Westin of Columbia University, an authority on technology and |
| privacy issues, said the legality of the Ohio authorities' search for the |
| Procter & Gamble whistleblower may depend on how the investigation was pursued. |
|
|
| If Procter & Gamble turned over the names and phone numbers of present and |
| former employees to the police and the police matched that list against the |
| numbers they were given by the telephone company, the rights of other, |
| uninvolved parties may not have been violated, Westin said. But if the police |
| learned the names of people unaffiliated with Procter & Gamble who called the |
| Journal's reporter, he said, or if they turned over a list of numbers to |
| Procter & Gamble for research, some Ohio residents' Fourth Amendment |
| protections may have been sullied. |
|
|
| "When technology allows you to run millions of calls involving 650,000 |
| telephone subscribers through a computer in order to identify who called a |
| person, potentially to find out whether a crime was committed, you raise the |
| question of whether technological capacity has gone over the line in terms of |
| what is a reasonable search and seizure," Westin said. |
| _______________________________________________________________________________ |
|
|
| Expert Fraud Shares Tricks of His Trade October 7, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Bob Reilly (New York Times) |
|
|
| PHOENIX -- A freelance writer didn't think the $333 that Forbes magazine |
| paid him for a one-page article was enough money so he used his personal |
| computer to duplicate the check in the amount of $30,000. And, the check |
| cleared. |
|
|
| A handyman fixes a bedroom window and gets paid by check. The handyman |
| copies down the homeowner's bank account number, name, address and check number |
| sequences and sends $4.95 to a company that prints fancy colored checks. The |
| handyman masters the homeowner's signature and then proceeds to cash the checks |
| after they arrive. |
|
|
| American Express and Mastercard traveler's checks are duplicated on a |
| colored photostat machine and spent in hotels and restaurants. |
|
|
| A man rents a banquet room in a hotel for $800 and gets the bill in the |
| mail a few days later. The man sends in a check for $400 with the notation |
| "paid in full" written in the lower left-hand corner. The hotel cashes the |
| check and sends a notice to the man saying $400 is still owed. The man refuses |
| to pay the $400 and wins in court because the law says by cashing the check the |
| hotel conceded the debt was paid. |
|
|
| White-collar crime amounts to more than $50 billion a year, said Frank |
| Abagnale, who cited the examples at a business-sponsored seminar in the Phoenix |
| Civic Center. By contrast, bank robbers, who get most of the media attention, |
| abscond with a paltry $450 million, he said. |
|
|
| Abagnale is said to have conducted scams and frauds in 26 nations. Known |
| as "The Imposter," he now advises government and industry. He says he served |
| six years in jail in France, Sweden and the U.S. for his crimes, which included |
| writing bad checks for more than $2.5 million. |
|
|
| "As technology improves, so does the ability to commit fraud," said |
| Abagnale. |
|
|
| He claims that at 16 he impersonated an airline pilot, at 18 was a chief |
| resident pediatrician in a Georgia hospital, at 19 passed the Louisiana state |
| bar exam and served as an assistant attorney general for the state. |
|
|
| Abagnale also claims he never flew an airplane or treated a patient but |
| along the way used false names to get jobs and pass bad checks. He claims he |
| even got a job at age 20 teaching sociology at Brigham Young University, |
| beating out three Ph.D.s for the job. |
|
|
| "I was always just one chapter ahead of the class," he said. Demeanor, |
| style, confidence, clothes and the overt display of wealth also help the con |
| man, Abagnale said. |
| |
| Abagnale claimed he got one teller to cash a napkin because he drove up to |
| the bank in a chauffeur-driven Rolls Royce and entered wearing a $600 suit and |
| all the confidence of a billionaire. The feat was recorded for television by |
| CBS, he said. |
|
|
| Another time he supposedly put the numbers of the bank account he was |
| using on a bunch of deposit slips, placed the deposit slips in a bank for |
| public use, and in one day alone more than $40,000 was deposited into his |
| account by unsuspecting customers who picked up his slips because they had |
| either run out of their own or hadn't yet got their own deposit slips. |
| |
| Abagnale asserted that there are several ways to discourage fraud, |
| including: |
|
|
| -- Use checks that are impossible to duplicate on a home computer. |
| -- Don't cash checks that don't have at least one rough edge. |
| -- Scan travelers checks by looking for impossible to reproduce |
| pictures or symbols that can only be seen at eye level or by |
| wetting the back, left-hand side of an American Express traveler's |
| check, which will smudge if it is authentic. |
|
|
| Abagnale is known as the author of a book called "Catch Me If You Can." |
|
|
| "I always knew I would eventually get caught," he said. "Only a fool |
| believes he won't. The law sometimes sleeps, but it never dies." |
|
|
| Abagnale claimed he started a life of crime when his parents divorced and |
| he was forced to choose between living with his mother or father. He said he |
| couldn't make the choice and ran away. |
| _______________________________________________________________________________ |
| |
| Dumb Jocks Learn First Lesson of Phreaking October 17, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From Associate Press |
|
|
| Four current Ball State University basketball players have admitted to |
| investigators that they charged a total of $820.90 in unauthorized long |
| distance calls. School officials announced the preliminary findings in the |
| first phase of their report the the NCAA. What the investigators found, in |
| regards to the unauthorized calls, was the following information: |
|
|
| Person Yr Calls Cost |
| ~~~~~~~~~~~~~~~~ ~~~ ~~~~~ ~~~~~~~ |
| Jeermal Sylvester Sop 255 $769.93 |
| Chandler Thompson Sen 28 $ 45.14 |
| Michael Spicer Sen 3 $ 4.43 |
| Keith Stalling Sen 1 $ 1.40 |
|
|
| Investigators reported three of the men said former players had provided |
| the long distance credit card numbers or authorization codes on which the calls |
| were made. The fourth player Keith Stalling, could not explain how his call |
| had been charged to the university. Head basketball coach Dick Hunsaker |
| reiterated that neither he nor the coaching staff had made available the |
| numbers that were assigned to the coaches. |
|
|
| "When this problem was first discovered back in August, it came as a shock |
| to me," Hunsaker said. "I'm disappointed with the judgement of the players |
| involved, but I'm glad we're getting to the bottom of it quickly and clearing |
| it up before the season starts." |
|
|
| "Our attention now will focus on former players and other people not |
| connected with the basketball program who might have used the same credit cards |
| and access numbers," said the university's auditor. The investigation that |
| began in August was conducted by the Ball State university's auditor and |
| Department of Public Safety. The investigation started one week after a |
| routine review of telephone records by athletic department officials. At the |
| time, investigators said the total cost of the unauthorized calls was in the |
| thousands of dollars. |
| _______________________________________________________________________________ |
|
|
| Silicon Government in California October 28, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From UPI Sacramento |
|
|
| California unveiled an easy-to-use computer system Wednesday that is |
| designed to tell people about such topics as statewide job openings, where |
| parents can find child care and how to re-register a car. |
|
|
| Officials described the experimental "Info/California" program as an |
| information-dispensing version of an automatic teller machine at a bank. It |
| will operate in Sacramento and San Diego as a pilot project for the next nine |
| months. |
|
|
| Users will obtain free information on a variety of state services as they |
| touch the television-like computer screen to evoke an on-screen narration and |
| color graphics in English, Spanish and potentially other languages. |
|
|
| "It literally puts state government at our fingertips," a computerized |
| image of Gov. Pete Wilson said at a Capitol news conference. |
| |
| Secretary Russell Gould of the Health and Welfare Agency said the system |
| may be especially useful to announce job openings as the economy rebounds from |
| the recession. Job-seekers will need a fourth-grade literacy level to use the |
| machine, which will refer them to Employment Development Department offices for |
| follow-up. |
|
|
| Director Frank Zolin of the Department of Motor Vehicles said the system |
| will benefit 20 million drivers who want vehicle registration renewals, vanity |
| license plate orders and faster service. |
|
|
| John Poland, Central California manager for IBM -- the state's partner in |
| the project -- said that besides telling the public about job opportunities, it |
| will allow Californians to order birth certificates and get information about |
| education, transportation, health and welfare at more than one site. |
|
|
| During the nine-month trial, people will use the system at 15 kiosks in |
| Sacramento and San Diego that will be similar to, and eventually integrated |
| with, local system kiosks such as those in the courts in Los Angeles and Long |
| Beach, and for community services in San Diego and Tulare counties. |
|
|
| Info/California was authorized under 1988 legislation. It is based on an |
| experimental touchscreen network in Hawaii that 30,260 people used over a six- |
| month period. |
|
|
| The state spent about $300,000 on the project, and IBM invested about $3 |
| million to develop the technology. By performing functions now done by humans, |
| the system may ultimately replace some state workers and produce cost savings |
| for taxpayers. |
|
|
| "We're working smart here," Gould said. "This may diminish some of the |
| need for new state workers." |
| _______________________________________________________________________________ |
|
|
| Digital Tapes Deal Endorsed by Music Industry October 30, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From (Congressional Monitor) |
|
|
| Record industry executives joined with retailers and consumer groups in |
| endorsing legislation (S 1623) that would pave the way for widescale |
| introduction of digital audio tapes into the U.S. marketplace. |
|
|
| For the first time, consumers would be allowed to legally make copies of |
| prerecordings for home use. |
|
|
| The agreement would allow artists, songwriters, and record companies to |
| collect royalty fees on the sale of blank tapes and digital audio recorders. |
|
|
| In addition, an electronics chip will be placed in the recorders to |
| prevent anything other than the original recording to be copied. |
|
|
| In testimony before the Senate Judiciary Committee's Subcommittee on |
| Patents, Copyrights, and Trademarks, pop star Debbie Gibson said that many |
| artists had been concerned that digital copying could spell the end of a |
| profitable music industry. |
|
|
| Unlike conventional tapes, digital audio recorders allow consumers to make |
| a perfect copy of a prerecording. The record industry says it already loses $1 |
| billion a year in sales due to illegal copying. And, the industry says, |
| unchecked digital technology would dramatically increase that figure. |
|
|
| Electronics manufacturers and retailers won the assurance that they will |
| not be sued for copyright infringement due to the sale of blank tapes or |
| recorders. |
| _______________________________________________________________________________ |
|
|
| Computer Cryptography: A Cure For The Common Code |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| Anyone can sign a postcard, but how do you sign a piece of electronic |
| mail? Without a "signature" to demonstrate that, say, an electronic transfer |
| of funds really comes from someone authorized to make the transfer, progress |
| towards all-electronic commerce is stymied. Ways of producing such signatures |
| are available, thanks to the technology of public-key cryptography. They will |
| not work to everyone's best advantage, though, until everyone uses the same |
| public- key system. |
|
|
| It is an obvious opportunity for standards-makers -- but in America they |
| have turned up their noses at all the variations on the theme currently in use. |
| The alternative standard for digital signatures now offered by America's |
| National Institute of Standards and Technology (NIST) has brought a long- |
| simmering controversy back to the boil. |
|
|
| Public-key cryptography could become one of the most common technologies |
| of the information age, underpinning all sorts of routine transactions. Not |
| only does it promise to provide the digital equivalent of a signature, it could |
| also give users an electronic envelope to keep private messages from prying |
| eyes. The idea is to create codes that have two related keys. In conventional |
| cryptography the sender and receiver share a single secret key; the sender uses |
| it to encode the message, the receiver to decode it. |
|
|
| In public-key techniques, each person has a pair of keys: a disclosed |
| public key and a secret private key. Messages encoded with the private key can |
| only be decoded with the corresponding public key, and vice versa. The public |
| keys are published like telephone numbers. The private keys are secret. With |
| this technology, digital signatures are simple. Encode your message, or just |
| the name you sign it with, using your private key. If the recipient can decode |
| the message with your public key, he can be confident it came from you. |
| Sending a confidential message -- putting electronic mail in a tamper-proof |
| envelope -- is equally straightforward. |
|
|
| To send a secret to Alice encode it with her public key. Only Alice (or |
| someone else who knows her private key) will be able to decode the message. |
| The heart of any system of public-key cryptography is a mathematical function |
| which takes in a message and a key, and puts out a code. This function must be |
| fairly quick and easy to use, so that putting things into code does not take |
| forever. It must be very hard to undo, so that getting things out of code does |
| take forever, unless the decoder has the decoding key. Obviously, there must |
| be no easy way to deduce the private key from the public key. Finding |
| functions that meet these criteria is "a combination of mathematics and |
| muddle," according to Roger Needham of the Cambridge Computer Laboratory. |
|
|
| The greatest successes to arise from the muddle so far are those using |
| functions called prime factorisation algorithms. They are based on the |
| mathematical insight that, while it is easy to multiply two numbers together, |
| it is very hard to work backwards to find the particular two numbers which were |
| multiplied together to produce some given number. If Alice chooses two large |
| prime numbers as her private key and publishes their 150-digit product as her |
| public key, it would probably take a code-breaker thousands of years to work |
| backwards to calculate her private keys. |
|
|
| A variety of schemes have been worked out which use this insight as the |
| basis for a workable public-key code. Most popular of these is the so-called |
| RSA algorithm, named after the three MIT professors who created it -- Ronald |
| Rivest, Adi Shamir and Len Adleman. It has been patented and is sold by a |
| Silicon Valley company, called RSA, that employs 15 people, most of them ex-MIT |
| graduate students. Faculty firms are to computer start-ups what family firms |
| were to the industrial revolution. RSA has attracted both academic praise and |
| a range of heavyweight commercial customers: Microsoft, Sun Microsystems, |
| Digital Equipment and Lotus Development. But, despite repeated applications, it |
| has never been endorsed by those in government. Rumors abound that the |
| codebreakers in the National Security Agency have discouraged standard-setters |
| from recommending RSA because they do not want to promote the use of codes they |
| cannot break. RSA, for obvious reasons, does not discourage the rumors. |
| Whatever the reason, the standard-setters at the NIST have sidestepped the |
| debate over RSA with their new algorithm, DSA. As set out in the standard, DSA |
| verifies the identity of the sender, but does not encrypt the message. It |
| appends to the message a number calculated from the message and the sender's |
| private key. The recipient can then use this number, the message and the |
| sender's public key to verify that the message is what it seems. |
|
|
| The NIST says that this technique is well suited to "smart cards" and |
| other applications where there is not a lot of computing power available for |
| working out codes. Because it hopes that DSA will be used for verifying the |
| identity of everyone from welfare recipients to military contractors, its |
| flexibility is a boon. Meanwhile, however, more and more companies are |
| choosing a public-key cryptography system for communicating confidentially -- |
| often RSA, sometimes something different. Someday, probably soon, governments |
| will want to choose, too. Watch out for fireworks when they do. |
| _______________________________________________________________________________ |
|
|
| SWBT Sends Off First "Cross-Country" ISDN Call |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From Southwestern Bell Telephone |
|
|
| The nation's first "cross-country" public network ISDN was placed last |
| week, courtesy of SWBT. The historic first call was the result of a two-year |
| joint effort among SWBT, BellSouth Corp., US Sprint and Bellcore. SWBT's |
| Advanced Technology Lab originated the call, which used US Sprint's digital |
| facilities in Burlingame, Calif. The call terminated at a BellSouth switch |
| in Atlanta, Ga. |
|
|
| Using an ISDN video application, SWBT's trial director Ken Goodgold was |
| able to see and talk to BellSouth's David Collins. "With this test, the |
| geographic limits of ISDN-based services were stretched from a few miles to |
| cross-country," Goodgold says. "We began with protocol testing and service |
| verification, two key parts of the process," Goodgold says. "That required an |
| extremely complex series of technical tests. The Advanced Technology Lab staff |
| worked for months performing the tests leading up to the first successful |
| call." |
|
|
| Last week's test call was significant from a marketing perspective as well |
| as a technical one. That's because it demonstrated the economic benifits of |
| using ISDN for video information. "The cost of a long distance call is |
| approximately the same, whether it's a voice transmission using a regular phone |
| line or a video transmission using ISDN," Goodgold says. "That means a big |
| reduction in cost to arrange a videoconference." US Sprint joined the test |
| because ISDN has evolved beyond the local stage, says Terry Kero, the carrier's |
| director of InfoCom Systems Development Labs. "After today, it will be |
| technically possible to make an ISDN call across the country just as it is |
| possible today to make a regular long distance call," Kero says. |
| _______________________________________________________________________________ |
|
|