| KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL | |
| K N I G H T L I N E | |
| Issue 01/Part II of III | |
| 17th of November, 1990 | |
| Written, compiled, | |
| and edited by Doc Holiday | |
| KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL | |
| --- | |
| F R O M T H E W I R E | |
| _______________________________________________________________________________ | |
| HEADLINE ADAPTING DIGITAL SWITCH -- Fujitsu To Expand In U.S. | |
| Byline: ROBERT POE | |
| DATE 11/15/90 | |
| SOURCE COMMUNICATIONSWEEK (CWK) | |
| Issue: 322 | |
| Section: PUBLIC NETWORKING | |
| Page: 33 | |
| (Copyright 1990 CMP Publications, Inc. All rights reserved.) | |
| RALEIGH, N.C.-Fujitsu Ltd. is boosting efforts to adapt its digital exchange | |
| to the U.S. network, in anticipation of the $40 billion public switch | |
| changeout expected in the United States over the next 10 to 15 years. | |
| Fujitsu plans to increase the number of U.S. staff members in charge of | |
| selling and engineering the Fetex-150 switch to 600 by 1994 from the current | |
| 100, officials at the Tokyo-based company said. | |
| The increase will shift development of sophisticated switch features from Japan | |
| to the United States, said one observer familiar with Fujitsu Network Switching | |
| of America Inc., based here. | |
| FILLING U.S. NEEDS | |
| Most of the current staff there is working on testing the performance and | |
| network conformance of software developed in Japan, the observer said. With | |
| the expansion, the subsidiary will be responsible for developing functions and | |
| capabilities required by U.S. customers. | |
| The Fetex-150 is Fujitsu's export-model exchange switch, with more than 8.8 | |
| million lines installed or on order in 17 countries. None have been sold in | |
| the United States, but the recently announced plans confirm longstanding | |
| speculation that the Japanese manufacturer is planning a major push into the | |
| U.S. | |
| When Fujitsu won a major switch tender in Singapore last autumn, competitors | |
| complained it was selling the equipment at cost to win a prestigious contract | |
| that would serve as a stepping-stone to the United States. | |
| WOOING THE BELLS | |
| Fujitsu said its switch has passed Phase 1 and Phase 2 evaluations by Bell | |
| Communications Research Inc., Livingston, N.J., the research arm of the seven | |
| U.S. regional Bell companies. Although the Bellcore certification is | |
| considered essential to selling to the Bells-which account for about 75 percent | |
| of U.S. telephone lines-it may not be enough for the company to break into a | |
| market dominated by AT&T and Nashville, Tenn.-based Northern Telecom Inc. | |
| Those two manufacturers have more than 90 percent of the U.S. market. A share | |
| like that, coupled with Bell company inertia in changing to new suppliers, | |
| leaves foreign public switch manufacturers largely out in the cold, analysts | |
| said. | |
| The U.S. subsidiaries of Siemens AG, L.M. Ericsson Telephone Co., NEC Corp. | |
| and GEC Plessey Telecommunications Ltd. have found the U.S. market tough to | |
| crack, though each has had limited success and is further along than Fujitsu. | |
| `INHERENT CONSERVATISM' | |
| "There's an inherent conservatism on the part of their {U.S.} customer base," | |
| said Robert Rosenberg, director of analytical services at The Eastern | |
| Management Group, Parsippany, N.J. "These are huge companies with billions of | |
| dollars invested in their current equipment. | |
| "Even if Fujitsu comes up with a switch that has all the bells and whistles | |
| that an engineer could ever want, if all the support systems have to be rebuilt | |
| in order to fit that switch into the network, his manager won't let him install | |
| it," Rosenberg said. | |
| _______________________________________________________________________________ | |
| Telephone Services: A Growing Form Of "Foreign Aid" | |
| Keith Bradsher, {The New York Times}, Sunday, October 21, 1990 | |
| (Business section, page 5) | |
| Americans who make international telephone calls are paying extra to | |
| subsidize foreign countries' postal rates, local phone service, even | |
| schools and armies. | |
| These subsidies are included in quarterly payments that American | |
| telephone companies must make to their counterparts overseas, most of | |
| these are state-owned monopolies. The net payments, totaling $2.4 | |
| billion last year, form one of the fastest-growing pieces of the | |
| American trade deficit, and prompted the Federal communications | |
| Commission this summer to begin an effort that could push down the | |
| price that consumers pay for an international phone call by up to 50 | |
| percent within three years. | |
| The imbalance is a largely unforeseen side effect of the growth of | |
| competition in the American long-distance industry during the 1980's. | |
| The competition drove down outbound rates from the United States, | |
| while overseas monopolies kept their rates high. | |
| The result is that business and families spread among countries try | |
| to make sure that calls originate in the United States. Outbound | |
| calls from the United States now outnumber inbound calls by 1.7-to-1, | |
| in minutes -- meaning American phone companies have to pay fees for | |
| the surplus calls. The F.C.C. is concerned that foreign companies are | |
| demanding much more money than is justified, given the steeply falling | |
| costs of providing service, and proposes to limit unilaterally the | |
| payments American carriers make. | |
| Central and South American countries filed formal protests against | |
| the F.C.C.'s plan on October 12. Although developed countries like | |
| Britain and Japan account for more than half of United States | |
| international telephone traffic, some of the largest imbalances in | |
| traffic are with developing countries, which spend the foreign | |
| exchange on everything from school systems to weapons. The deficit | |
| with Columbia, for example, soared to $71 million last year. | |
| International charges are based on formulas assigning per-minute | |
| costs of receiving and overseas call and routing it within the home | |
| country. But while actual costs have dropped in recent years, the | |
| formulas have been very slow to adjust, if they are adjusted at all. | |
| For example, while few international calls require operators, the | |
| formulas are still based on such expenses. | |
| Furthermore, the investment required for each telephone line in an | |
| undersea cable or aboard a satellite has plummeted with technological | |
| advances. A trans-Pacific cable with 600,000 lines, announced last | |
| Wednesday and scheduled to go into service in 1996, could cost less | |
| than $1,000 per line. | |
| Yet the phone company formulas keep charges high. Germany's Deutsche | |
| Bundespost, for example, currently collects 87 cents a minute from | |
| American carriers, which actually lose money on some of the off-peak | |
| rates they offer American consumers. | |
| MORE CALLS FROM THE U.S. ARE GENERATING A GROWING TRADE DEFICIT | |
| U.S. telephone companies charge less for 1980 0.3 (billions of | |
| overseas calls than foreign companies 1981 0.5 U.S. dollars) | |
| charge for calls the United States. So 1982 0.7 | |
| more international calls originate in the 1983 1.0 | |
| United States. But the U.S. companies pay 1984 1.2 | |
| high fees to their foreign counterparts for 1985 1.1 | |
| handling those extra calls, and the deficit 1986 1.4 | |
| has ballooned in the last decade. 1987 1.7 | |
| 1988 2.0 | |
| 1989 2.4 (estimate) | |
| (Source: F.C.C.) | |
| THE LONG DISTANCE USAGE IMBALANCE | |
| Outgoing and incoming U.S. telephone traffic, in 1988, the latest year | |
| for which figures are available, in percent. | |
| Whom are we calling? Who's calling us? | |
| Total outgoing traffic: Total incoming traffic: | |
| 5,325 million minutes 3,155 million minutes | |
| Other: 47.9% Other: 32.9% | |
| Canada: 20.2% Canada: 35.2% | |
| Britain: 9.1% Britain: 12.6% | |
| Mexico: 8.8% Mexico: 6.2% | |
| W. Germany: 6.9% W. Germany: 5.4% | |
| Japan: 4.4% Japan: 4.3% | |
| France: 2.7% France: 3.4% | |
| (Source: International Institute of Communications) | |
| COMPARING COSTS: Price range of five-minute international calls between | |
| the U.S. and other nations. Figures do not include volume discounts. | |
| Country From U.S.* To U.S. | |
| Britain $2.95 to $5.20 $4.63 to $6.58 | |
| Canada (NYC to $0.90 to $2.25 $1.35 to $2.26 | |
| Montreal) | |
| France $3.10 to $5.95 $4.72 to $7.73 | |
| Japan $4.00 to $8.01 $4.67 to $8.34 | |
| Mexico (NYC to $4.50 to $7.41 $4.24 to $6.36 | |
| Mexico City) | |
| West Germany $3.10 to $6.13 $10.22 | |
| * For lowest rates, callers pay a monthly $3 fee. | |
| (Source: A.T.&T.) | |
| WHERE THE DEFICIT FALLS: Leading nations with which the United States | |
| has a trade deficit in telephone services, in 1989, in millions of | |
| dollars. | |
| Mexico: $534 | |
| W. Germany: 167 | |
| Philippines: 115 | |
| South Korea: 112 | |
| Japan: 79 | |
| Dominican Republic: 75 | |
| Columbia: 71 | |
| Italy: 70 (Source: F.C.C.) | |
| Israel: 57 | |
| Britain: 46 | |
| THE RUSH TOWARD LOWER COSTS: The cost per telephone line for laying | |
| each of the eight telephone cables that now span the Atlantic Ocean, | |
| from the one in 1956, which held 48 lines, to the planned 1992 cable | |
| which is expected to carry 80,000 lines. In current dollars. | |
| 1956 $557,000 | |
| 1959 436,000 | |
| 1963 289,000 | |
| 1965 365,000 | |
| 1970 49,000 | |
| 1976 25,000 | |
| 1983 23,000 (Source, F.C.C.) | |
| 1988 9,000 | |
| 1992 5,400 (estimate) | |
| _______________________________________________________________________________ | |
| A few notes from Jim Warren in regards to the CFP conference: | |
| Greetings, | |
| Some key issues are now settled, with some minor remain for resolution. | |
| CONFERENCE DATES, LOCATION & MAXIMUM SIZE | |
| We have finally completed site selection and contracted for the Conference | |
| facility. Please mark your calendars and spread the word: | |
| First Conference on Computers, Freedom & Privacy | |
| March 25-28,1991, Monday-Thursday | |
| SFO Marriott, Burlingame, California | |
| (just south of San Francisco International Airport; | |
| on the San Francisco Peninsula, about 20 minutes from "The City") | |
| maximum attendance: 600 | |
| PLEASE NOTE NAME CHANGE | |
| We have found *ample* issues for a very robust Conference, limited only to | |
| computer-related issues of responsible freedom and privacy. After questions | |
| regarding satellite surveillance, genetic engineering, photo traffic radar, | |
| wireless phone bugs, etc., we decided to modify the Conference title for | |
| greater accuracy. We have changed it from "Technology, Freedom & Privacy" to | |
| "Computers, Freedom & Privacy." | |
| ONE MORE NIT TO PICK | |
| Until recently, our draft title has included, "First International Conference". | |
| We most definitely are planning for international participation, especially | |
| expecting presentations from EEC and Canadian privacy and access agencies. | |
| These will soon have significant impacts on trans-border dataflow and inter- | |
| national business communications. | |
| However, we were just told that some agencies require multi-month clearance | |
| procedures for staff attending any event with "International" in its title. | |
| **Your input on this and the minor issue of whether to include "International" | |
| in our Conference title would be appreciated.** | |
| ATTRIBUTION (BLAME) | |
| We are building the first bridge connecting the major, highly diverse villages | |
| of our new electronic frontier. Such construction involves some degree of | |
| exploration and learning. | |
| These title-changes are a result of that learning process. Please attribute | |
| all responsibility for the fluctuating Conference title to me, personally. I | |
| am the one who proposed the first title; I am the one who has changed it to | |
| enhance accuracy and avoid conflict. | |
| Of course, the title will be settled and finalized (with your kind assistance) | |
| before the Conference is formally announced and publicity statements issued -- | |
| soon! | |
| Thanking you for your interest and continued assistance, I remain, Sincerely, | |
| --Jim Warren, CFP Conf Chair | |
| jwarren@well.ca.sf.us | |
| _______________________________________________________________________________ | |
| [Reprented from TELECOM digest. --DH] | |
| FROM: Patrick Townson <telecom@eecs.nwu.edu> | |
| SUBJECT: Illinois Bell Shows Real CLASS | |
| For several months now, Illinois Bell has been hawking CLASS. Brochures | |
| in the mail with our bills and newspaper advertisements have told us about the | |
| wonderful new services soon to be offered. | |
| It was just a question, they said, of waiting until your central office had | |
| been converted. The new features being offered are: | |
| *66 Auto Call Back: Call back the last number which called you. No | |
| need to know the number. | |
| *69 Repeat Dial: If the number you dialed was busy, punching | |
| this will keep trying the number for up to | |
| 30 minutes, and advise you when it can connect. | |
| *60 Call Screening Enter: | |
| # plus number to be screened out plus # | |
| * plus number to be re-admitted plus * | |
| # plus 01 plus # to add the number of the | |
| last call you received, whether or not | |
| you know the number. | |
| 1 To play a list of the numbers being screened. | |
| 0 For a helpful recording of options, etc. | |
| Distinctive Ringing Up to ten numbers can be programmed in. When a | |
| call is received from one of these numbers, your | |
| phone will give a special ring to advise you. | |
| Multi-Ring Service Two additional numbers can be associated with | |
| your number. When someone dials one of these | |
| two numbers, your phone will give a special ring. | |
| With both Distinctive Ringing and Multi-Ring Service, if you have Call Waiting, | |
| the Call Waiting tones will be different from the norm also, so that you can | |
| tell what is happening. With Multi-Ring Service, you can have it programmed so | |
| the supplementary numbers associated with your main number are forwarded when | |
| it is forwarded, or do not observe forwarding, and 'ring through' despite what | |
| the main number is doing. | |
| Alternate Answer Can be programmed so that after 3-7 rings, | |
| the unanswered call will be automatically sent | |
| to another line *WITHIN YOUR CENTRAL OFFICE*. | |
| If the number assigned as an alternate is | |
| itself busy or forwarded OUTSIDE YOUR OFFICE | |
| then Alternate Answer will not forward the | |
| call and continue to ring unanswered. | |
| Transfer on Busy/ This is just another name for 'hunt'. The | |
| No Answer difference is that hunt is free; Transfer on | |
| Busy/NA costs a couple bucks per month. Like | |
| Alternate Answer, it must forward only to a | |
| number on the same switch. Unlike hunt, it | |
| will work on NA as well. Unlike Alternate | |
| Answer, it works on busy as well. | |
| Caller*ID will be available 'eventually' they say. | |
| Now my story begins: | |
| From early this summer to the present, I've waited patiently for CLASS to | |
| be available in Chicago-Rogers Park. Finally a date was announced: October 15 | |
| the above features would be available. In mid-September, I spoke with a rep in | |
| the Irving-Kildare Business Office. She assured me *all* the above features | |
| would be available on October 15. My bill is cut on the 13th of each month, | |
| and knowing the nightmare of reading a bill which has had changes made in | |
| mid-month (page after page of pro-rata entries for credits on the old service, | |
| item by item; pro-rata entries for the new service going in, etc) it made sense | |
| to implement changes on the billing date, to keep the statement simple. | |
| She couldn't write the order for the service to start October 13, since | |
| CLASS was not officially available until the fifteenth. Well, okay, so its | |
| either wait until November 13 or go ahead and start in mid-month, worrying | |
| about reading the bill once it actually arrives. | |
| I've been ambivilent about CLASS since it is not compatible with my | |
| present service 'Starline', but after much thought -- and since all | |
| installation and order-writing on Custom Calling features is free now through | |
| December 31! -- I decided to try out the new stuff. | |
| She took the order Wednesday afternoon and quoted 'sometime Thursday' for | |
| the work to be done. In fact it was done -- or mostly done -- by mid-afternoon | |
| Thursday. But I should have known better. I should have remembered my | |
| experience with Starline three years ago, when it took a technician in the | |
| central office *one week* to get it all in and working correctly. Still, I | |
| took IBT's word for it. | |
| I got home about 5:30 PM Thursday. *You know* I sat down right away at | |
| the phone to begin testing the new features! :) The lines were to be equipped | |
| as follows: | |
| Line 1: Call Waiting Line 2: Call Forwarding | |
| Three Way Calling Speed Dial 8 | |
| Call Forwarding Busy Repeat Dialing *69 | |
| Speed Dial 8 | |
| Auto Call Back *66 (second line used mostly by modem; | |
| Busy Repeat Dialing *69 so Call Waiting undesirable) | |
| Call Screening *60 | |
| Alternate Answer (supposed to be programmed to Voice Mail; | |
| another CO; another area code U708e; | |
| even another telco UCentele). | |
| Busy Repeat Dialing did not work on the second line (not installed) and | |
| Alternate Answer worked (but not as I understood it would) on the first line. | |
| Plus, I had forgotten how to add 'last call received' to the screening feature. | |
| It is 5:45 ... business office open another fifteen minutes ... good! I | |
| call 1-800-244-4444 which is IBT's idea of a new way to handle calls to the | |
| business office. Everyone in the state of Illinois calls it, and the calls go | |
| wherever someone is free. Before, we could call the business office in our | |
| neighborhood direct ... no longer. | |
| I call; I go on hold; I wait on hold five minutes. Finally a rep comes on | |
| the line, a young fellow who probably Meant Well ... | |
| After getting the preliminary information to look up my account, we begin | |
| our conversation: | |
| Me: You see from the order the new features put on today? | |
| Him: Yes, which ones are you asking about? | |
| Me: A couple questions. Explain how to add the last call received to | |
| your call screening. | |
| Him: Call screening? Well, that's not available in your area yet. You | |
| see, it will be a few months before we offer it. | |
| Me: Wait a minute! It was quoted to me two days ago, and it is on | |
| the order you are reading now is it not? | |
| UI read him the order number to confirm we had the same one.e | |
| Him: Yes, it is on here, but it won't work. No matter what was written | |
| up. Really, I have to apologize for whoever would have taken your | |
| order and written it there. | |
| Me: Hold on, hold on! It *is* installed, and it *is* working! I want | |
| to know how to work it. | |
| Him: No it is not installed. The only features we can offer you at | |
| at this time are Busy Redial and Auto Callback. Would you like me | |
| to put in an order for those? | |
| Me: Let's talk to the supervisor instead. | |
| Him: (in a huff) Gladly sir. | |
| Supervisor comes on line and repeats what was said by the rep: Call | |
| Screening is not available at this time in Chicago-Rogers Park. | |
| At this point I am furious ... | |
| Me: Let me speak to the rep who took this order (I quoted her by | |
| name.) | |
| Supervisor: I never heard of her. She might be in some other office. | |
| Me: (suspicious) Say, is this Irving-Kildare? | |
| Supervisor: No! Of course not! I am in Springfield, IL. | |
| Me: Suppose you give me the name of the manager at Irving-Kildare | |
| then, and I will call there tomorrow. (By now it was 6 PM; the | |
| supervisor was getting figity and nervous wanting to go home.) | |
| Supervisor: Here! Call this number tomorrow and ask for the manager of | |
| that office, 1-800-244-4444. | |
| Me: Baloney! Give me the manager's direct number! | |
| Supervisor: Well okay, 312-xxx-xxxx, and ask for Ms. XXXX. | |
| Me: (suspicious again) She is the manager there? | |
| Supervisor: Yes, she will get you straightened out. Goodbye! | |
| Comes Friday morning, I am on the phone a few minutes before 9 AM, at the | |
| suggested direct number. Ms. XXXX reviewed the entire order and got the Busy | |
| Repeat Dial feature added to line two ... but she insisted the original rep | |
| was 'wrong for telling you call screening was available ..' and the obligatory | |
| apology for 'one of my people who mislead you'. I patiently explained to her | |
| also that in fact call screening was installed and was working. | |
| Manager: Oh really? Are you sure? | |
| Me: I am positive. Would you do me a favor? Call the foreman and have | |
| him call me back. | |
| Manager: Well, someone will call you later. | |
| Later that day, a rep called to say that yes indeed, I was correct. It | |
| seems they had not been told call screening was now available in my office. I | |
| told her that was odd, considering the rep who first took the order knew all | |
| about it. | |
| I asked when the Alternate Answer 'would be fixed' (bear in mind I thought | |
| it would work outside the CO, which it would not, which is why it kept ringing | |
| through to me instead of forwarding.) | |
| She thought maybe the foreman could figure that out. | |
| Maybe an hour later, a techician did call me to say he was rather | |
| surprised that call screening was working on my line. He gave a complete and | |
| concise explanation of how Alternate Answer and Transfer on Busy/No Answer was | |
| to work. He offered to have it removed from my line since it would be of no | |
| value to me as configured. | |
| One question he could not answer: How do you add the last call received | |
| to call screening? He could find the answer nowhere, but said he would see to | |
| it I got 'the instruction booklet' in the mail soon, so maybe I could figure it | |
| out myself. | |
| I got busy with other things, and put the question aside ... until early | |
| Saturday morning when I got one of my periodic crank calls from the same number | |
| which has plagued me for a couple months now with ring, then hangup calls on an | |
| irregular basis. | |
| For the fun of it, I punched *69, and told the sassy little girl who | |
| answered the phone to quit fooling around. She was, to say the least, | |
| surprised and startled by my call back. I don't think I will hear from her | |
| again. :) | |
| But I decided to ask again how to add such a number to call screening, | |
| so I called Repair Service. | |
| The Repair Service clerk pulled me up on the tube *including the work | |
| order from two days earlier* and like everyone else said: | |
| Repair: You don't have Call Screening on your line. That is not | |
| available yet in your area. We are adding new offices daily, | |
| blah, blah. | |
| I *couldn't believe* what I was hearing ... I told her I did, and she | |
| insisted I did not ... despite the order, despite what the computer said. | |
| Finally it was on to her supervisor, but as it turned out, her supervisor was | |
| the foreman on duty for the weekend. Like the others, he began with apologies | |
| for how I 'had been misinformed' ... no call screening was available. | |
| Me: Tell ya what. You say no, and I say yes. You're on the test | |
| board, no? I'll hang up. You go on my line, dial *60, listen to | |
| the recording you hear, then call me back. I will wait here. Take | |
| your time. When you call back, you can apologize. | |
| Foreman: Well, I'm not on the test board, I'm in my office on my own | |
| phone. | |
| Me: So go to the test board, or pick me up in there wherever it is | |
| handy and use my line. Make a few calls. Add some numbers to the | |
| call screening; then call me back with egg on your face, okay? | |
| Foreman: Are you saying call screening is on your line and you have | |
| used it? | |
| Me: I have used it. Today. A few minutes ago I played with it. | |
| Foreman: I'll call you back. | |
| (Fifteen minutes later) ... | |
| Foreman: Mr. Townson! Umm ... I have been with this company for 23 | |
| years. I'll get to the point: I have egg on my face. Not mine | |
| really, but the company has the egg on the face. You are correct; | |
| your line has call screening. | |
| Me: 23 years you say? Are you a member of the Pioneers? | |
| Foreman: (surprised) Why, uh, yes I am. | |
| Me: Fine organization isn't it ... | |
| Foreman: Yes, it certainly is. You know of them? | |
| Me: I've heard a few things. | |
| Foreman: Look, let me tell you something. I did not know -- nor *did | |
| anyone in this office know* that call screening was now available. We | |
| were told it was coming, that's all. | |
| Me: You mean no one knew it was already in place? | |
| Foreman: No, apparently not ... I think you are the only customer in | |
| the Rogers Park office who has it at this time. Because the | |
| assumption was it was not yet installed, the reps were told not to | |
| take orders for it ... I do not know how your order slipped through. | |
| Me: Will you be telling others? | |
| Foreman: I have already made some calls, and yes, others will be told | |
| about this on Monday. | |
| Me: Well, you know the *81 feature to turn call screening on and off | |
| is still not working. | |
| Foreman: I'm not surprised. After all, none of it is supposed to be | |
| working right now. You seem to know something about this business, | |
| Mr. Townson. | |
| Me: I guess I've picked up a few things along the way. | |
| We then chatted about the Transfer on Busy/No Answer feature. I asked | |
| why, if my cell phone on 312-415-xxxx had the ability to transfer calls out of | |
| the CO and be programmed/turned on and off from the phone itself, my wire line | |
| could not. 312-415 is out of Chicago-Congress ... he thought it might have to | |
| do with that office having some different generics than Rogers Park ... but he | |
| could not give a satisfactory answer. | |
| Patrick Townson | |
| _______________________________________________________________________________ | |
| The following article appeared in the U-M Computing Center News | |
| (October 25, 1990, V 5, No 18, Pg 10) | |
| [This article was also reprinted in TELECOM digest -DH] | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| NSFNET DEMONSTRATES INTERCONTINENTAL ISO TRANSMISSION | |
| [Editor's note: The following article is reprinted, with modifications, | |
| from the September 1990 issue of the Link Letter (Vol 3, No 4), | |
| published by the Merit/NSFNET backbone project] | |
| At the end of September, partners in the National Science Foundation Network | |
| (NSFNET) announced a succesful demonstration of intercontinental data | |
| transmission using the International Standards Organization Conectionless | |
| Network Protocol (ISO CLNP). The international exchange of ISO CLNP packets | |
| was demonstrated betweeen end systems at the NSFNET Network Operations Center | |
| in Ann Arbor and in Bonn, West Germany, using the NSFNET backbone | |
| infrastructure and the European Academic Supercomputer Initiative (EASInet) | |
| backbone. | |
| The prototype OSI implementation is intended to provide wide area connectivity | |
| between OSI networks, including networks using the DECNet Phase V protocols. | |
| The new software was integrated into the NSFNET's "packet switching" (data | |
| transmission) nodes by David Katz and Susan Hares of the Merit Computer | |
| Network, with support from IBM's software developement departments in Milford, | |
| CT and Yorktown Heights, NY. | |
| NSFNET is the first federally supported computer network to acheive | |
| international ISO CLNP transmission on an operating network, according to | |
| Merit's Hans-Werner Braun, Principle Investigator for the NSFNET Project. | |
| The Prototype ISO implementation is being designed to coexist with NSFNET's | |
| operational Internet Protocol (IP) network, and is a significant step towards | |
| offering ISO services on the NSFNET backbone. Eric Aupperle, President of | |
| Merit and acting director of ITD Network Systems, says that "the demonstration | |
| shows that we're capable of transporting ISO traffic. Now we're working to | |
| deploy this experimental service as fast as possible." | |
| An implementation of CLNP was first demonstrated by Merit/NSFNET staff at the | |
| InterOp '89 conference. That implementation of CLNP was originally developed | |
| as part of the ARGO project at the University of Wisconsin, Madision, with the | |
| support of the IBM Corporation. | |
| by Ken Horning | |
| DTD Network Systems. | |
| _______________________________________________________________________________ | |
| {Middlesex News}, Framingham, Mass., 11/2/90 | |
| Prodigy Pulls Plug on Electronic Mail Service For Some | |
| By Adam Gaffin | |
| NEWS STAFF WRITER | |
| Users of a national computer network vow to continue a protest against | |
| censorship and a new charge for electronic mail even though the company kicked | |
| them off-line this week. | |
| Brian Ek, spokesman for the network, Prodigy, said the "handful" of users had | |
| begun harassing other users and advertisers on the service and that some had | |
| even created programs "to flood members' 'mailboxes' with (thousands of) | |
| repeated and increasingly strident harangues," he said. | |
| But leaders of the protest say they sent only polite letters -- approved by the | |
| company's legal department -- using techniques taught by the company itself. | |
| Up to nine of them had their accounts pulled hips week. | |
| Protests began in September when the company said it would cut unlimited | |
| electronic mail from its monthly fee -- which includes such services as on-line | |
| airline reservations, weather and games -- and would charge 25 cents for every | |
| message above a monthly quota of 30. Ek says the design of the Prodigy network | |
| makes "e-mail" very expensive and that few users send more than 30 messages a | |
| month. | |
| But Penny Hay, the only organizer of the "Cooperative Defense Committee" whose | |
| account was not shut this week, said she and others are upset with Prodigy's | |
| "bait and switch" tactics: The company continues to promote "free" electronic | |
| mail as a major feature. She said Prodigy itself had spurred use of e-mail by | |
| encouraging subscribers to set up private e-mail ``lists'' rather than use | |
| public forums and that the charges will especially hurt families, because the | |
| quota is per household, not person. | |
| Ek said relatively few members protested the rate chqange. Gary Arlen, who | |
| publishes a newsletter about on-line services, called the controversy "a | |
| tempest in a teapot." | |
| Hay, however, said the group now has the backing of nearly 19,000 Prodigy users | |
| -- the ones advertisers would want to see on-line because they are the most | |
| active ones on the system and so more likely to see their ads. | |
| The group is also upset with the way the company screens messages meant for | |
| public conferences. Other services allow users to see "postings" | |
| immediately. | |
| "They are infamous for this unpredicible and unfathomable censorship," Hay | |
| said. | |
| "We feel what we are doing is not censoring because what we are essentially | |
| doing is electronic publishing," Ek said, comparing the public messages to | |
| letters to the editor of a family newspaper. | |
| Neil Harris, marketing director at the competing GEnie service, said many | |
| people would feel intimidated knowing that what they write is being screened. | |
| He said GEnie only rarely has to deleted messages. And he said GEnie has | |
| picked up several thousand new customers from among disgruntled Prodigy users. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| "Conversations with Fred," {Middlesex News}, Framingham, 11/6/90. | |
| The story is bizarre but true, swears Herb Rothman. Seems Prodigy, the network | |
| run as a joint venture by Sears and IBM, wouldn't let somebody post a message | |
| in a coin-collecting forum that he was looking for a particular Roosevelt dime | |
| for his collection. Upset, the man called "member services." The | |
| representative told him the message violated a Prodigy rule against mentioning | |
| another user in a public message. "What user?" the man asked. "Roosevelt | |
| Dime," the rep replied. "That's not a person!" the man said. "Yes he is, | |
| he's a halfback for the Chicago Bears," the rep shot back. | |
| Rothman is one of those alleged compu-terrorists Prodigy claims is harassing | |
| other users and companies that advertise on the service by sending out | |
| thousands upon thousands of increasingly hostile messages in protest of a | |
| Prodigy plan to begin charging users who send more than 30 e-mail messages a | |
| month. Rothman and the others say they sent very polite messages to people | |
| (Penny Hay of Los Angeles says her messages were even approved by the Prodigy | |
| legal department) telling them about the new fees and urging them to protest. | |
| What's really happening is that Prodigy is proving its complete arrogance and | |
| total lack of understanding of the dynamics of on-line communication. They | |
| just don't get it. People are NOT going to spend nearly $130 a year just to | |
| see the weather in Oregon or order trips to Hawaii. | |
| Even the computerphobes Prodigy wants to attract quickly learn the real value | |
| of the service is in finding new friends and holding intelligent "discussions" | |
| with others across the country. | |
| But Prodigy blithely goes on censoring everything meant for public consumption, | |
| unlike other nationwide services (or even bulletin-board systems run out of | |
| some teenager's bedroom). Rothman's story is not the only one about capricious | |
| or just plain stupid censoring. Dog fanciers can't use the word ``bitch'' when | |
| talking about their pets, yet the service recently ran an advice column all | |
| about oral sex. One user who complained when a message commenting on the use | |
| of the term "queen bitch" on "L.A. Law" was not allowed on was told that | |
| "queen b***h" would be acceptable, because adults would know what it meant | |
| but the kiddies would be saved. | |
| So when the supposed technology illiterates Prodigy thinks make up its user | |
| base managed to get around this through the creation of private mail "lists" | |
| (and, in fact, many did so at the urging of Prodigy itself!), Prodigy started | |
| complaining of "e-mail hogs," quietly announced plans to levy charges for more | |
| than a minute number of e-mail messages each month and finally, simply canceled | |
| the accounts of those who protested the loudest! | |
| And now we are watching history in the making, with the nation's first | |
| nationwide protest movement organized almost entirely by electronic mail (now | |
| don't tell Prodigy this, but all those people they kicked off quickly got back | |
| onto the system -- Prodogy allows up to six users per household account, and | |
| friends simply loaned their empty slots to the protest leaders). | |
| It's truly amazing how little faith Prodigy has in the ability of users to | |
| behave themselves. Other systems have "sysops" to keep things in line, but | |
| rarely do they have to pull messages. Plus, Prodigy is just being plain dumb. | |
| Rothman now has a mailing list of about 1,500. That means every time he sends | |
| out one of his newsletters on collectibles, he sends 1,500 e-mail messages, | |
| which, yes, costs more for Prodigy to send over long-distance lines and store | |
| in its central computers. But if they realized their users are generally | |
| mature, rather than treating them as 4-year-olds, Rothman could post just one | |
| message in a public area, that everybody could see. | |
| Is this any way to run an on-line system? Does Prodigy really want to drive | |
| away the people most inclined to use the service -- and see all those ads that | |
| pop up at the bottom of the screen? Prodigy may soon have to do some | |
| accounting to the folks at IBM and Sears, who by most accounts have already | |
| poured at least $750 million into "this thing." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - | |
| With your computer and modem, you can reach Fred the Middlesex News | |
| Computer anytime, day or night, at (508) 872-8461. Set your parameters | |
| to 8-1-N and up to 2400 baud. | |
| _______________________________________________________________________________ | |
| HEADLINE Cops Say Hacker, 17, `Stole' Phone Service | |
| Byline: By Joshua Quittner | |
| DATE 10/31/90 | |
| SOURCE Newsday (NDAY) | |
| Edition: NASSAU AND SUFFOLK | |
| Section: NEWS | |
| Page: 02 | |
| (Copyright Newsday Inc., 1990) | |
| State Police arrested a 17-year-old computer hacker at his terminal yesterday | |
| afternoon, and charged the Bethpage High School student with using his computer | |
| to run up more than $1 million worth of long-distance telephone calls on credit | |
| card numbers he deciphered. | |
| State Police Senior Investigator Donald Delaney, who supervised the | |
| investigation and arrest of John Farrell, of 83 S. Third St., said that the | |
| case was among the first to rely on new technology developed by | |
| telecommunications engineers to track long-distance telephone-service abusers. | |
| Investigators believe that as early as December, 1989, Farrell was using his | |
| computer and a homemade electronic device, known as a black box, to | |
| sequentially dial telephone numbers, which double as credit card numbers. By | |
| automatically calling the numbers in sequence, Farrell hoped to trigger a | |
| signal indicating a valid credit card number. | |
| However, AT&T, which recently developed software to detect such sequential | |
| dialing, alerted Delaney's office in September of Farrell's alleged attempts. | |
| In July, investigators surreptitiously placed a "pen register" - a device that | |
| records all numbers dialed from a particular phone line - on Farrell's | |
| telephone, Delaney said. | |
| State Police and U.S. Secret Service agents - the federal agency has been | |
| taking an active part in computer crimes and investigates credit card fraud - | |
| staked out Farrell's house yesterday afternoon. Shortly after 3 p.m., when the | |
| youth arrived home from school, technicians monitoring his telephone line | |
| signaled the police that he had already turned on his computer and was using an | |
| illegal credit card number to access an electronic bulletin board in Illinois, | |
| police said. Officers, armed with a search warrant, then entered the house and | |
| arrested Farrell. | |
| Delaney said Farrell found over 100 long-distance credit card numbers, from | |
| four long-distance carriers, and posted them on rogue electronic bulletins | |
| boards in Virginia, Chicago, Denmark and France. Although he allegedly made | |
| most of the illegal calls, other hackers also used the numbers. The majority | |
| of the calls - more than $600,000 worth - were billed to four corporate card | |
| numbers, said Delaney, who added that the phone company is responsible for such | |
| losses. Farrell was arrested and charged with six felonies, including grand | |
| larceny, computer trespass and criminal possession of stolen property. The | |
| charges carry a maximum penalty of four years in prison. He was released into | |
| the custody of his parents last night. Neither Farrell nor his parents could | |
| be reached for comment yesterday. Farrell was associated with a group of | |
| hackers who called themselves Paradox, Delaney said. | |
| _______________________________________________________________________________ | |
| HEADLINE Menacing calls started out as prank, says participant | |
| Byline: Katharine Webster and Graciella Sevilla | |
| Credit: Staff Writer | |
| Notes: Editions vary : Head varies | |
| DATE 10/28/90 | |
| SOURCE The San Diego Union and Tribune (SDU) | |
| Pub: UNION | |
| Edition: 1,2,3,4,5,6 | |
| Section: LOCAL | |
| Page: B-1 | |
| (Copyright 1990) | |
| A three-year campaign of telephoned threats and ethnic slurs directed against | |
| the Jewish owner of a National City pawn shop started out as a "stupid prank" | |
| that grew to include more than 100 people, according to one of the young men | |
| who participated in the harassment. "Little did I know when I started this | |
| three years ago, that it would escalate into my brother calling (David Vogel) | |
| 10 times a day," said Gary Richard Danko, 21, of Chula Vista, who cooperated | |
| with the FBI investigation that resulted in the indictment Wednesday of his | |
| older brother and two other men on civil rights charges. | |
| Michael Dennis Danko, 23, and Brett Alan Pankauski, 22, both of Chula Vista, | |
| and Jeffrey Alan Myrick, 21, of Paradise Hills in San Diego, pleaded not guilty | |
| in U.S. District Court yesterday to a six-count indictment charging them with | |
| wire fraud and felony conspiracy to violate the civil rights of David Vogel, a | |
| 66-year-old Jewish immigrant who escaped the Holocaust. | |
| Pankauski was released on $10,000 bail and admonished to avoid all contact with | |
| Vogel. But Danko and Myrick were held without bail pending an Oct. 4 | |
| detention hearing after federal prosecutor Michael McAuliffe convinced | |
| Magistrate Irma Gonzalez that they posed substantial flight risks. | |
| On Wednesday, Gary Danko and a friend, Robert John Byrd, 21, also of Chula | |
| Vista, pleaded guilty to one misdemeanor count of conspiring to violate Vogel's | |
| civil rights, according to a spokesman for the U.S. attorney's office. The | |
| two friends, who met while working at a 7-Eleven, were released and agreed to | |
| testify at the trial of the remaining three defendants. | |
| Though the arrests climaxed a five-month investigation involving the FBI, U.S. | |
| attorney's office and the Department of Justice, Gary Danko said yesterday that | |
| the menacing phone calls to numbers picked "at random" from the telephone book | |
| began years ago. | |
| The group of friends, most of whom have known each other since elementary | |
| school, all used to make crank phone calls, Danko said, even to each other. | |
| They also experimented with breaking codes for answering machines and changing | |
| the outgoing message to something profane. | |
| While he said he stopped making the calls to Vogel a couple of years ago, his | |
| brother and others "took it out to a degree to torment the guy." | |
| "I feel bad that it turned out this way," Danko said. "I wish there was some | |
| way I could make it up to David (Vogel)." | |
| "I know how he feels," Danko added. "Ever since I've had my own phone line | |
| I've had harassing phone calls between 2 and 6 in the morning to the point | |
| where I've changed my phone number three times." Danko denied that he, his | |
| brother, or any of the other defendants in the case were racists or that they | |
| had targeted Vogel for any particular reason. He said that the defendants made | |
| crank calls to many people, and that the anti-Jewish nature of the calls to | |
| Vogel was probably based on a "lucky guess" that he was Jewish. | |
| According to the indictment, Michael Danko, Myrick, and Pankauski made phone | |
| calls in which they referred to Nazi concentration camps and Hitler, while | |
| threatening to harm Vogel and his pawn-shop business. | |
| Vogel said he began receiving the phone calls -- which included racial slurs | |
| and taunts about his wife -- in 1987. Sometimes he received up to 12 calls a | |
| day, creating a "personal hell." Earlier this year, he finally hired a private | |
| investigator, who then turned the case over to the FBI. | |
| "It caused suffering for us like the concentration camps did for my family," | |
| Vogel said. "It was horrible." | |
| Another relative of Gary and Michael Danko, who asked not to be identified, | |
| said he thought the calls to Vogel continued only "because they got a reaction | |
| out of him -- he screamed and yelled at them." But he said Vogel was probably | |
| not the only Jew targeted in the phone calls. | |
| The relative agreed with FBI agents, who described these incidents as isolated | |
| and not connected with organized racist groups such as the Skinheads. | |
| Instead, he said, the brothers thought they were doing "something funny." He | |
| said he thought they still didn't realize they were doing something wrong, even | |
| though he had "yelled and screamed at them" to stop. | |
| Gary Danko is a computer "hacker" who works at a computer store, he said. | |
| Michael Danko was unemployed. | |
| FBI agents began investigating the calls in May, when they placed a tape | |
| recorder on Vogel's phone. It only took a few moments before the first hate | |
| call came in. | |
| Agents traced the calls to a number of phone booths and then began putting | |
| together the wire-fraud case. | |
| In addition to the civil rights violations, the indictment alleges that the | |
| three defendants conspired to obtain unauthorized AT&T long-distance access | |
| codes to make long-distance phone calls without paying for them. | |
| If convicted of the civil rights and wire-fraud charges, the defendants could | |
| face up to 15 years in prison and $500,000 in fines. In addition, they face | |
| various additional charges of illegally obtaining and using the restricted | |
| long-distance access codes. | |
| Yesterday, Vogel angrily rejected the notion that these callers were less than | |
| serious in their intentions. | |
| "They're full of baloney. They don't know what they are talking about," he | |
| said. | |
| _______________________________________________________________________________ | |
| HEADLINE SHORT-CIRCUITING DATA CRIMINALS | |
| STEPS CAN BE TAKEN TO DETECT AND PREVENT COMPUTER SECURITY BREACHES, | |
| BUT BUSINESSES HESITATE TO PROSECUTE | |
| Byline: Mary J. Pitzer Daily News Staff Writer | |
| Notes: MONDAY BUSINESS: COVER STORY THE PRICE OF COMPUTER | |
| CRIME. Second of two parts | |
| DATE 10/22/90 | |
| SOURCE LOS ANGELES DAILY NEWS (LAD) | |
| Edition: Valley | |
| Section: BUSINESS | |
| Page: B1 | |
| (Copyright 1990) | |
| Along with other telecommunications companies, Pacific Bell is a favorite | |
| target for computer crime. | |
| "We're a victim," said Darrell Santos, senior investigator at Pacific Bell. | |
| "We have people hacking us and trying to get into our billables. It seems like | |
| a whole lot of people are trying to get into the telecommunications network." | |
| But the company is fighting back. About seven employees in its investigative | |
| unit work with different law enforcement agencies to track down criminals, many | |
| of whom use the phone lines to commit computer crimes. | |
| In cooperation with authorities Pacific Bell investigators collect evidence, | |
| trace calls, interview suspects and testify in court. They even do their own | |
| hacking to figure out what some of their chief adversaries are up to. | |
| "We take a (telephone) prefix and hack the daylights out of it. We hack our | |
| own numbers," Santos said. "Hey, if we can do it, think of what those brain | |
| childs are doing." | |
| Few companies are nearly so aggressive. For the most part computer crime is a | |
| growing business that remains relatively unchecked. State and federal laws | |
| against computer crime are in place, but few cases are prosecuted. Most | |
| incidents go unreported, consultants say. | |
| "We advise our clients not to talk about losses and security because just | |
| talking about them in public is a breach," said Donn Parker, a senior managment | |
| consultant at SRI International in Palo Alto. "Mostly companies handle | |
| incidents privately or swallow the loss." | |
| Most problematic is that few companies have tight enough security to protect | |
| themselves. | |
| "On a scale of one to 10, the majority of companies are at about a two," said | |
| Jim Harrigan, senior security consultant at LeeMah Datacom Security Corp., | |
| which sells computer security products. | |
| Current laws are strong enough to convict computer criminals, security experts | |
| say. But they have been little used and sentences are rarely stiff, especially | |
| because so many violators are juveniles. | |
| Fewer than 250 computer crime cases have been prosecuted nationally, according | |
| to Kenneth Rosenblatt, head of the Santa Clara County district attorney's high | |
| technology unit. Rosenblatt co-authored California's recent computer crime | |
| law, which creates new penalties such as confiscation of computer equipment. | |
| Under a strengthened federal Computer Fraud and Abuse Act, Cornell University | |
| graduate student Robert T. Morris Jr. was convicted of unleashing a computer | |
| virus in Internet, a large computer network tying universities and government | |
| facilities. Though the virus was not intended to destroy programs, it infected | |
| thousands of computers and cost between $100,000 and $10 million to combat, | |
| according to author and hacking expert Cliff Stoll. | |
| Morris was sentenced to three years probation and a $10,000 fine. | |
| A major problem in policing computer crime is that investigators are | |
| understaffed and undertrained, Rosenblatt said. While Los Angeles and other | |
| police departments have computer crime units, most are not geared for it, he | |
| said. And violent crimes take precedence. | |
| Rosenblatt would like to see greater regional cooperation and coordination | |
| among local law enforcement agencies. | |
| Because investigators are understaffed, they must depend on their victims to | |
| gather enough evidence to convict the culprits. And that can be fraught with | |
| difficulties, Kenneth Weaver, criminal investigator in the San Diego district | |
| attorney's office, said at a recent security conference in Newport Beach. | |
| In one case a company's computer system crashed and its programs were erased 30 | |
| days after an employee left the firm. With six months of backup tapes, the | |
| company was able to document what had happened. The District Attorney's office | |
| asked to estimate how much money had been lost. | |
| The total came to $3,850, well below the $5,000 in damages needed for a felony | |
| case, Weaver said. And then the information was delayed 14 months. It needed | |
| to be reported in 12 months for the D.A. to go forward with the case. | |
| "We were prevented from prosecuting," Weaver said. In California, 71 percent | |
| of the cases result in convictions once arrests are made, according to the | |
| National Center for Computer Crime Data. | |
| But when prosecutors do make a case, there can be more trouble. Some prominent | |
| people in the computer industry have complained that a 2-year investigation by | |
| the U.S. Secret Service infringed on civil rights. | |
| The investigation, code-named Operation Sun Devil, was started to snare members | |
| of the Legion of Doom, an elite hacker group. The Secret Service suspected | |
| that they had broken into BellSouth Corp.'s telephone network and planted | |
| destructive programs that could have knocked out emergency and customer phone | |
| service across several states. Last spring, hacker dens in 13 cities were | |
| raided. Two suspects have been charged with computer crimes, and more arrests | |
| are expected. | |
| But a group called EFF, formed in July by Lotus Development Corp. founder | |
| Mitchell D. Kapor and Apple Computer Inc. co-founder Stephen Wozniak, has | |
| objected to the crackdown as overzealous. | |
| "The excesses of Operation Sun Devil are only the beginning of what threatens | |
| to become a long, difficult, and philosophically obscure struggle between | |
| institutional control and individual liberty," Kapor wrote in a paper with | |
| computer expert and Grateful Dead lyricist John Perry Barlow. | |
| So far, the foundation has granted $275,000 to Computer Professionals for | |
| Social Responsibility to expand its ongoing work on civil liberties protections | |
| for computer users. | |
| The foundation also is offering legal assistance to computer users who may have | |
| had their rights infringed. For example, it provided legal support to Craig | |
| Neidorf, publisher of an online hacking "magazine." Neidorf had been charged | |
| with felony wire fraud and interstate transportation of stolen property for | |
| publishing BellSouth network information. | |
| Neidorf said he was not aware the information was stolen. EFF claimed that | |
| Neidorf's right to free speech had been violated. The government dropped its | |
| case after EFF representatives found that the apparently stolen information was | |
| publicly available. | |
| Companies that want to prosecute computer crime face other dilemmas. | |
| "The decision to bring in public authorities is not always the best," said | |
| Susan Nycum, an attorney at Baker & McKenzie in Palo Alto. | |
| In a criminal case, the company loses control over what information is made | |
| public in the trial. But companies can pursue civil remedies that enable them | |
| to keep a lower profile. Suing for theft of trade secret, for example, would | |
| be one avenue, Weaver said. | |
| Many companies are reluctant to beef up security even if they know the risks | |
| from computer crime. First, they worry that making access to computers more | |
| difficult would lower productivity. There also is concern that their technical | |
| people, who are in high demand, might leave for other jobs if security becomes | |
| too cumbersome. | |
| Expense is another factor. Serious security measures at a large installation | |
| can cost an average of $100,000, though a smaller company can be helped for | |
| about $10,000, said Trevor Gee, partner at consulting company Deloitte and | |
| Touche. | |
| "They hear all the rumors, but unless you illustrate very specific savings, | |
| they are reluctant," Gee said. | |
| Proving cost savings is difficult unless the company already has been hit by | |
| computer crime. But those victims, some of whom have suffered losses in the | |
| millions, are usually security experts' best customers, consultants say. | |
| Much of the vulnerability to computer crime comes simply from lax security. | |
| Access is not restricted. Doors are not locked. Passwords are easily guessed, | |
| seldom changed and shared with several workers. And even these basic security | |
| measures are easy to put off. | |
| "You hear a lot of, `We haven't gotten around to changing the password because. | |
| . .," Roy Alzua, telecommunications security program manager at Rockwell | |
| International, told the security conference. | |
| So what should companies do to plug the gaping security holes in their | |
| organizations? | |
| Consultants say that top management first has to make a commitment that | |
| everyone in the operation takes seriously. | |
| "I've seen companies waste several hundreds, if not thousands, of dollars | |
| because management was not behind the program," Deloitte & Touche's Gee said. | |
| "As a result, MIS (management information systems) professionals have a tough | |
| time" pressing for more security. | |
| Once top executives are convinced that there is a need for tighter security, | |
| they must establish policies and procedures, consultants say. Gee suggests | |
| that in addition to training programs, reminders should be posted. Such issues | |
| as whether employees are allowed to use computers for personal projects should | |
| be tackled. | |
| Management also should decide what systems and information need to be secured. | |
| "They need to zero in on the information they are really concerned about," said | |
| Gregory Therkalsen, national director of information security services for | |
| consultants Ernst & Young. "About 95 percent of the information in the average | |
| company nobody cares about." | |
| Before tackling complicated security systems, companies should pay attention to | |
| the basics. | |
| "Lock a door. It's as easy as that," Alzua said. | |
| Companies should make sure that the passwords that come with their computers | |
| are changed. And then employees should not use common words or names that are | |
| easy to guess. Using a combination of numbers and letters, although difficult | |
| to remember, is more secure. | |
| Another basic measure is to have a system that automatically checks the | |
| authorization of someone who dials into the company's computers from the | |
| outside. | |
| Then, companies should develop an electronic audit trail so that they know who | |
| is using the system and when. And companies should always take the time to | |
| make backups of their computer files and store them in a place safe from fire | |
| and flood. | |
| A wide variety of software is available to help companies protect themselves. | |
| Some automatically encode information entered into the system. Others detect | |
| viruses. | |
| For a more sophisticated approach, LeeMah Datacom has a system that blocks a | |
| computer tone from the telephone line until the correct access code is entered. | |
| The company has held contests challenging hackers to break into its system. No | |
| one has, the company said. | |
| SRI is developing a system that would monitor computer activity around the | |
| clock with the supervision of a security guard. SRI is implementing the system | |
| for the FBI and plans to make it a commercial product. | |
| No company would want to have a perfectly secure system, consultants say. That | |
| would mean shutting out most employees and staying off networks that can make | |
| operations more efficient. | |
| While still balancing the need for openess, however, there is much that can be | |
| done to prevent computer crime. And although there is no perfect solution, | |
| companies don't need to stand by waiting to become the next victim. | |
| _______________________________________________________________________________ | |
| HEADLINE BELL CANADA'S NEW LOOK TELEPHONE NUMBERS PUZZLE SOME CUSTOMERS | |
| DATE 09/26/90 | |
| SOURCE CANADA NEWS-WIRE (CNW) | |
| Contact: For further information, contact: Irene Colella (416) | |
| 581-4266; Geoff Matthews, Bell Canada (416) 581-4205. CO: Bell Canada | |
| SS: IN: TLS | |
| Origin: TORONTO | |
| Language: ENGLISH; E | |
| Day of Week: Wed | |
| Time: 09:56 (Eastern Time) | |
| (Copyright Canada News-Wire) | |
| RE CN | |
| --- BELL CANADA'S NEW LOOK TELEPHONE NUMBERS PUZZLE SOME | |
| CUSTOMERS --- | |
| TORONTO - Bell Canada's new look telephone numbers in Southern Ontario are | |
| causing puzzlement among some customers in the 416 area code. | |
| In late 1988 Bell found itself running short of telephone numbers in the Golden | |
| Horseshoe because of rapid business and residential growth as well as the | |
| increasing popularity of cellular telephones, fax machines and new services | |
| like Ident-A-Call. | |
| To accommodate continuing growth, the company had to come up with a means of | |
| creating new number combinations. The solution was found by assigning local | |
| exchanges made up of combinations which had previously been reserved as area | |
| codes elsewhere in North America. | |
| Until March of this year the three numbers (known as a central office code) | |
| which begin a telephone number never had a zero or a one as the second digit. | |
| Anything from two through nine could appear in that position, but combinations | |
| with zero or one were used only as area codes. But with more than four million | |
| telephone numbers in use throughout the Golden Horseshoe Bell was simply | |
| running out of the traditional central office code combinations. By creating | |
| new central office codes such as 502, 513, 602 and 612, the company has access | |
| to up to one million new telephone numbers. | |
| Some customers, however, have found the new numbers a little confusing. When | |
| the new numbers were introduced last March, Bell mounted an extensive | |
| advertising campaign telling customers throughout the 416 area code to dial 1 | |
| plus 416 or 0 plus 416 for all long distance calls within the area code in | |
| order to ensure calls to these numbers could be completed. | |
| Bell spokesman Geoff Matthews says that while the ad campaign was extremely | |
| effective in changing dialing habits, a number of customers are scratching | |
| their heads when they first see the new telephone numbers. | |
| ``In some cases we are finding that business customers have not programmed | |
| their telephone equipment to permit dialing the new numbers,'' Matthews said, | |
| ``but some people think it is simply a mistake when they see a telephone number | |
| beginning with 612 for example. Most are satisfied once they have received an | |
| explanation.'' | |
| Creating the million new telephone numbers should see Bell Canada through | |
| several years, Matthews said, after which a new area code will be introduced. | |
| The 416 area code is the first in Canada to reach capacity. A number of U.S. | |
| cities have faced a similar situation, Matthews said, and have introduced | |
| similar number plans. | |
| Bell Canada, the largest Canadian telecommunications operating company, markets | |
| a full range of state-of-the-art products and services more than seven million | |
| business and residence customers in Ontario, Quebec and part of the Northwest | |
| Territories. | |
| Bell Canada is a member of Telecom Canada -- an association of Canada's major | |
| telecommunications companies. | |
| For further information, contact: Irene Colella (416) 581-4266; Geoff | |
| Matthews, Bell Canada (416) 581-4205. | |
| _______________________________________________________________________________ | |
| HEADLINE Keeping The PBX Secure | |
| Byline: Bruce Caldwell | |
| DATE 10/15/90 | |
| Issue: 291 | |
| Section: TRENDS | |
| Page: 25 | |
| (Copyright 1990 CMP Publications, Inc. All rights reserved.) | |
| Preventing toll fraud through the corporate PBX can be as simple, albeit | |
| inconvenient, as expanding access codes from four digits to 14. "When we had | |
| nine-digit codes, we got hurt bad," says Bob Fox of US Sprint Communications | |
| Co., referring to the phone company's credit card numbers. "But when we moved | |
| to 14-digit codes and vigorous prosecution, our abuse dropped off the table." | |
| At most companies, the authorization code for remote access, used by employees | |
| to place calls through the corporate PBX while away from the office, is only | |
| four digits. Many companies are "hung up on the four-digit authorization | |
| code," says Fox, mainly because it's easier for the executives to remember. | |
| But all it takes a hacker to crack open a four-digit code is about 20 minutes. | |
| To help their customers cope with PBX abuse, MCI Communications Corp. has | |
| prepared a tip sheet describing preventative measures (see accompanying chart). | |
| PBX fraud may display itself in a particular pattern: The initial stage will | |
| show a dramatic increase in 950-outbound and 800-outbound services, which allow | |
| a surreptitious user to "cover his tracks" by jumping from one carrier to | |
| another-a technique known as "looping." In time, knowledge of the unsecured | |
| system may become widespread, resulting in heavy use of services connected with | |
| normal telecommunications traffic. | |
| Customers are advised to audit systems for unusual usage and to change codes on | |
| a regular basis. Steady tones used as prompts to input access codes should be | |
| avoided, because that is what hacker-programmed computers look for. Instead, | |
| MCI advises use of a voice recording or no prompt at all, and recommends | |
| automatic termination of a call or routing it to a switchboard operator | |
| whenever an invalid code is entered. | |
| An obvious source of help is often overlooked. Explains Jim Snyder, an | |
| attorney in MCI's office of corporate systems integrity, "The first thing we | |
| tell customers is to contact their PBX vendor to find out what kind of | |
| safeguards can be built into the PBX." | |
| _______________________________________________________________________________ | |
| HEADLINE WATCH YOUR PBX | |
| Column: Database | |
| DATE 04/02/90 | |
| SOURCE COMMUNICATIONSWEEK (CWK) | |
| Issue: 294 | |
| Section: PRN | |
| Page: 24 | |
| (Copyright 1990 CMP Publications, Inc. All rights reserved.) | |
| Many managers of voice systems would be "horrified" if they realized the low | |
| levels of security found in their PBXs, according to Gail Thackeray, an | |
| assistant attorney general for the state of Arizona. Thackeray made her | |
| comments to a group of financial users at a computer virus clinic held by the | |
| Data Processing Management Association's Financial Industries chapter. | |
| Thackeray, who investigates computer crimes, said that PBXs often are used by | |
| network criminals to make free long distance phone calls at the expense of the | |
| companies that own the PBXs. "PBX owners are often unaware that if $500,000 | |
| worth of fraud comes from your PBX, the local carrier is not going to absorb | |
| that loss," she said. | |
| The PBX also is often the first source of break-in by computer hackers, who use | |
| the free phone service to get into a user's data system, she said. "PBXs are | |
| the prime method for international toll fraud and hackers attacking and hiding | |
| behind your corporate identity," Thackeray said. | |
| Richard Lefkon, Citicorp's network planner and president of DPMA's financial | |
| industries chapter, said users are more likely to take steps toward protecting | |
| a PBX than a network of microcomputers. "A PBX is expensive, so if you add 15 | |
| to 20 percent to protect it, it's a justifiable expenditure," Lefkon said. "If | |
| you have a PC which costs a couple of thousand dollars, unless you think you're | |
| special, you are going to think twice before investing several hundred dollars | |
| per PC to protect them." | |
| _______________________________________________________________________________ | |