| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-five, File 12 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXV / Part Three PWN | |
| PWN PWN | |
| PWN Compiled by Dispater PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Prodigy Stumbles as a Forum...Again | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Mike Godwin (Electronic Frontier Foundation) | |
| On some days, Prodigy representatives tell us they're running "the Disney | |
| Channel of online services." On other days the service is touted as a forum | |
| for "the free expression of ideas." But management has missed the conflict | |
| between these two missions. And it is just this unperceived conflict that has | |
| led the B'nai B'rith's Anti-Defamation League to launch a protest against the | |
| online service.. | |
| On one level, the controversy stems from Prodigy's decision to censor | |
| messages responding to claims that, among other things, the Holocaust never | |
| took place. These messages--which included such statements as "Hitler had some | |
| valid points" and that "wherever Jews exercise influence and power, misery, | |
| warfare and economic exploitation ... follow"--were the sort likely to stir up | |
| indignant responses among Jews and non-Jews alike. But some Prodigy members | |
| have complained to the ADL that when they tried to respond to both the overt | |
| content of these messages and their implicit anti-Semitism, their responses | |
| were rejected by Prodigy's staff of censors. | |
| The rationale for the censorship? Prodigy has a policy of barring | |
| messages directed at other members, but allows messages that condemn a group. | |
| The result of this policy, mechanically applied, is that one member can post a | |
| message saying that "pogroms, 'persecutions,' and the mythical holocaust" are | |
| things that Jews "so very richly deserve" (this was an actual message). But | |
| another member might be barred from posting some like "Member A's comments are | |
| viciously anti-Semitic." It is no wonder that the Anti-Defamation League is | |
| upset at what looks very much like unequal treatment. | |
| But the problem exposed by this controversy is broader than simply a badly | |
| crafted policy. The problem is that Prodigy, while insisting on its Disney | |
| Channel metaphor, also gives lip service to the notion of a public forum. | |
| Henry Heilbrunn, a senior vice president of Prodigy, refers in the Wall Street | |
| Journal to the service's "policy of free expression," while Bruce Thurlby, | |
| Prodigy's manager of editorial business and operations, invokes in a letter to | |
| ADL "the right of individuals to express opinions that are contrary to personal | |
| standards or individual beliefs." | |
| Yet it is impossible for any free-expression policy to explain both the | |
| allowing of those anti-Semitic postings and the barring of responses to those | |
| postings from outraged and offended members. Historically, this country has | |
| embraced the principle that best cure for offensive or disturbing speech is | |
| more speech. No regime of censorship--even of the most neutral and well- | |
| meaning kind--can avoid the kind of result that appears in this case: some | |
| people get to speak while others get no chance to reply. So long as a board of | |
| censors is in place, Prodigy is no public forum. | |
| Thus, the service is left in a double bind. If Prodigy really means to be | |
| taken as a computer-network version of "the Disney Channel"--with all the | |
| content control that this metaphor implies--then it's taking responsibility for | |
| (and, to some members, even seeming to endorse) the anti-Semitic messages that | |
| were posted. On the other hand, if Prodigy really regards itself as a forum | |
| for free expression, it has no business refusing to allow members to respond to | |
| what they saw as lies, distortions, and hate. A true free-speech forum would | |
| allow not only the original messages but also the responses to them. | |
| So, what's the fix for Prodigy? The answer may lie in replacing the | |
| service's censors with a system of "conference hosts" of the sort one sees on | |
| CompuServe or on the WELL. As WELL manager Cliff Figallo conceives of his | |
| service, the management is like an apartment manager who normally allows | |
| tenants to do what they want, but who steps in if they do something | |
| outrageously disruptive. Hosts on the WELL normally steer discussions rather | |
| than censoring them, and merely offensive speech is almost never censored. | |
| But even if Prodigy doesn't adopt a "conference host" system, it | |
| ultimately will satisfy its members better if it does allow a true forum for | |
| free expression. And the service may be moving in that direction already: | |
| Heilbrunn is quoted in the Wall Street Journal as saying that Prodigy has been | |
| loosening its content restrictions over the past month. Good news, but not | |
| good enough--merely easing some content restrictions is likely to be no more | |
| successful at solving Prodigy's problems than Gorbachev's easing market | |
| restrictions was at solving the Soviet Union's problems. The best solution is | |
| to allow what Oliver Wendell Holmes called "the marketplace of ideas" to | |
| flourish--to get out of the censorship business. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Computer Network to Ban 'Repugnant' Comments | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From Washington Post | |
| Prodigy has been charged with allowing "antisemitic slurs" to run on its | |
| network. Prodigy officials said they would *not* censor discussion of | |
| controversial subjects, such as the one that has been raging over the net for | |
| several months -- whether the Holocaust was a hoax. | |
| The controversial message that was labeled "repugnant" included the | |
| statements: "Hitler had some valid points...", and "...whenever Jews exercise | |
| influence and power, misery, warfare and economic exploitation [are the | |
| result]". There were six other messages that the Anti-Defamation League of | |
| B'nai B'rith are complaining about. The Hitler message was not available to | |
| all subscribers, it was just personal mail between users. The person who | |
| received the mail brought it to the ADL's attention. | |
| Civil liberties groups have compared computer networks to telephone | |
| companies, which do not censor calls. However, Prodigy officials object to | |
| that analogy, saying it is more like a newspaper, and that Prodigy must judge | |
| what is acceptable and what is not, much as a newspaper editor must. | |
| Prodigy officials take the position of, and I quote, "we were speaking in | |
| broader terms ... we were focused on the broad issue of free expression". | |
| _______________________________________________________________________________ | |
| More on Proctor & Gamble August 15, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Randall Rothenberg (New York Times) | |
| Further Reading: Phrack Inc., Issue 33 , File.12, "Proctor & Gamble" | |
| Law-enforcement officials in Ohio have searched the records of every | |
| telephone user in southwestern Ohio to determine who, if anyone, called a Wall | |
| Street Journal reporter to provide information that Proctor & Gamble said was | |
| confidential and protected by state law. | |
| The investigation goes far beyond examining the telephone records of | |
| current and former employees of the giant consumer products company, an inquiry | |
| the Hamilton County prosecutor's office confirmed on Monday. The Journal | |
| reported the scope of the investigation Thursday. | |
| The prosecutor, Arthur Ney Jr., acting on a complaint by Procter & Gamble, | |
| ordered Cincinnati Bell to turn over all the telephone numbers from which | |
| people called the home or office of the reporter, Alecia Swasy, from March 1 to | |
| June 15. | |
| The situation began sometime before June 17 when Procter & Gamble, which | |
| makes Tide detergent, Crest toothpaste and other familiar supermarket products, | |
| asked the Cincinnati police to determine whether current or former employees | |
| were leaking confidential corporate information to The Wall Street Journal. | |
| On Monday the newspaper reported that the company had been bothered by two | |
| news articles published on June 10 and June 11 written by Ms. Swasy, a reporter | |
| based in Pittsburgh who covers Procter & Gamble. The articles cited | |
| unidentified sources saying that a senior executive was under pressure to | |
| resign from the company, and that it might sell some unprofitable divisions. | |
| But a spokeswoman for Procter and Gamble, Sydney McHugh, said Thursday | |
| that the company "had been observing a disturbing pattern of leaks" since the | |
| beginning of the year. She refused to elaborate, but said the decision to | |
| pursue legal action was reviewed at several levels in the company and was made | |
| by Jim Jessee, a corporate security officer. | |
| Two Ohio statutes protect the unauthorized disclosure of trade secrets. | |
| One makes it a felony to transmit formulas, customer lists or other tangible | |
| pieces of information that would be valuable to a company and its competitors. | |
| But another, broader law makes it a misdemeanor to disclose "any confidential | |
| matter or information" without the company's consent. | |
| The Cincinnati police approached the Hamilton County prosecutor's office, | |
| which sought and received from a grand jury a subpoena for telephone records. | |
| A copy of the subpoena, dated June 17, was given to The New York Times by | |
| someone involved in the case who insisted on anonymity. The subpoena ordered | |
| Cincinnati Bell to "identify all (513) area code numbers that have dialed" Ms. | |
| Swasy's home or office telephones in Pittsburgh during an eight-week period | |
| that started on March 1. | |
| Cincinnati Bell serves 655,297 telephone numbers in the 513 area code, in | |
| an area covering 1,156 square miles, said Cyndy Cantoni, a spokeswoman for the | |
| company. In the company's entire jurisdiction, which also covers parts of | |
| Kentucky and Pennsylvania, about 13 million toll calls are placed in an average | |
| month, she said. | |
| Ms. Cantoni said she could not comment on what Cincinnati Bell turned over | |
| to the authorities, but said the company routinely complied with subpoenas. | |
| Under normal procedure, the company's computers would have automatically | |
| searched its customer list and printed out only the originating numbers, and | |
| not the names or addresses, of calls to Ms. Swasy's numbers, Ms. Cantoni said. | |
| The Wall Street Journal, which is published by Dow Jones & Co., reported | |
| on Monday that neither Ms. Swasy nor executives at the Journal were informed of | |
| the subpoena by the authorities. | |
| Neither Terry Gaines, a first assistant prosecutor, nor Ed Ammann, a | |
| police department colonel involved with the investigation, returned repeated | |
| calls to their offices. | |
| Alan F. Westin of Columbia University, an authority on technology and | |
| privacy issues, said the legality of the Ohio authorities' search for the | |
| Procter & Gamble whistleblower may depend on how the investigation was pursued. | |
| If Procter & Gamble turned over the names and phone numbers of present and | |
| former employees to the police and the police matched that list against the | |
| numbers they were given by the telephone company, the rights of other, | |
| uninvolved parties may not have been violated, Westin said. But if the police | |
| learned the names of people unaffiliated with Procter & Gamble who called the | |
| Journal's reporter, he said, or if they turned over a list of numbers to | |
| Procter & Gamble for research, some Ohio residents' Fourth Amendment | |
| protections may have been sullied. | |
| "When technology allows you to run millions of calls involving 650,000 | |
| telephone subscribers through a computer in order to identify who called a | |
| person, potentially to find out whether a crime was committed, you raise the | |
| question of whether technological capacity has gone over the line in terms of | |
| what is a reasonable search and seizure," Westin said. | |
| _______________________________________________________________________________ | |
| Expert Fraud Shares Tricks of His Trade October 7, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Bob Reilly (New York Times) | |
| PHOENIX -- A freelance writer didn't think the $333 that Forbes magazine | |
| paid him for a one-page article was enough money so he used his personal | |
| computer to duplicate the check in the amount of $30,000. And, the check | |
| cleared. | |
| A handyman fixes a bedroom window and gets paid by check. The handyman | |
| copies down the homeowner's bank account number, name, address and check number | |
| sequences and sends $4.95 to a company that prints fancy colored checks. The | |
| handyman masters the homeowner's signature and then proceeds to cash the checks | |
| after they arrive. | |
| American Express and Mastercard traveler's checks are duplicated on a | |
| colored photostat machine and spent in hotels and restaurants. | |
| A man rents a banquet room in a hotel for $800 and gets the bill in the | |
| mail a few days later. The man sends in a check for $400 with the notation | |
| "paid in full" written in the lower left-hand corner. The hotel cashes the | |
| check and sends a notice to the man saying $400 is still owed. The man refuses | |
| to pay the $400 and wins in court because the law says by cashing the check the | |
| hotel conceded the debt was paid. | |
| White-collar crime amounts to more than $50 billion a year, said Frank | |
| Abagnale, who cited the examples at a business-sponsored seminar in the Phoenix | |
| Civic Center. By contrast, bank robbers, who get most of the media attention, | |
| abscond with a paltry $450 million, he said. | |
| Abagnale is said to have conducted scams and frauds in 26 nations. Known | |
| as "The Imposter," he now advises government and industry. He says he served | |
| six years in jail in France, Sweden and the U.S. for his crimes, which included | |
| writing bad checks for more than $2.5 million. | |
| "As technology improves, so does the ability to commit fraud," said | |
| Abagnale. | |
| He claims that at 16 he impersonated an airline pilot, at 18 was a chief | |
| resident pediatrician in a Georgia hospital, at 19 passed the Louisiana state | |
| bar exam and served as an assistant attorney general for the state. | |
| Abagnale also claims he never flew an airplane or treated a patient but | |
| along the way used false names to get jobs and pass bad checks. He claims he | |
| even got a job at age 20 teaching sociology at Brigham Young University, | |
| beating out three Ph.D.s for the job. | |
| "I was always just one chapter ahead of the class," he said. Demeanor, | |
| style, confidence, clothes and the overt display of wealth also help the con | |
| man, Abagnale said. | |
| Abagnale claimed he got one teller to cash a napkin because he drove up to | |
| the bank in a chauffeur-driven Rolls Royce and entered wearing a $600 suit and | |
| all the confidence of a billionaire. The feat was recorded for television by | |
| CBS, he said. | |
| Another time he supposedly put the numbers of the bank account he was | |
| using on a bunch of deposit slips, placed the deposit slips in a bank for | |
| public use, and in one day alone more than $40,000 was deposited into his | |
| account by unsuspecting customers who picked up his slips because they had | |
| either run out of their own or hadn't yet got their own deposit slips. | |
| Abagnale asserted that there are several ways to discourage fraud, | |
| including: | |
| -- Use checks that are impossible to duplicate on a home computer. | |
| -- Don't cash checks that don't have at least one rough edge. | |
| -- Scan travelers checks by looking for impossible to reproduce | |
| pictures or symbols that can only be seen at eye level or by | |
| wetting the back, left-hand side of an American Express traveler's | |
| check, which will smudge if it is authentic. | |
| Abagnale is known as the author of a book called "Catch Me If You Can." | |
| "I always knew I would eventually get caught," he said. "Only a fool | |
| believes he won't. The law sometimes sleeps, but it never dies." | |
| Abagnale claimed he started a life of crime when his parents divorced and | |
| he was forced to choose between living with his mother or father. He said he | |
| couldn't make the choice and ran away. | |
| _______________________________________________________________________________ | |
| Dumb Jocks Learn First Lesson of Phreaking October 17, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From Associate Press | |
| Four current Ball State University basketball players have admitted to | |
| investigators that they charged a total of $820.90 in unauthorized long | |
| distance calls. School officials announced the preliminary findings in the | |
| first phase of their report the the NCAA. What the investigators found, in | |
| regards to the unauthorized calls, was the following information: | |
| Person Yr Calls Cost | |
| ~~~~~~~~~~~~~~~~ ~~~ ~~~~~ ~~~~~~~ | |
| Jeermal Sylvester Sop 255 $769.93 | |
| Chandler Thompson Sen 28 $ 45.14 | |
| Michael Spicer Sen 3 $ 4.43 | |
| Keith Stalling Sen 1 $ 1.40 | |
| Investigators reported three of the men said former players had provided | |
| the long distance credit card numbers or authorization codes on which the calls | |
| were made. The fourth player Keith Stalling, could not explain how his call | |
| had been charged to the university. Head basketball coach Dick Hunsaker | |
| reiterated that neither he nor the coaching staff had made available the | |
| numbers that were assigned to the coaches. | |
| "When this problem was first discovered back in August, it came as a shock | |
| to me," Hunsaker said. "I'm disappointed with the judgement of the players | |
| involved, but I'm glad we're getting to the bottom of it quickly and clearing | |
| it up before the season starts." | |
| "Our attention now will focus on former players and other people not | |
| connected with the basketball program who might have used the same credit cards | |
| and access numbers," said the university's auditor. The investigation that | |
| began in August was conducted by the Ball State university's auditor and | |
| Department of Public Safety. The investigation started one week after a | |
| routine review of telephone records by athletic department officials. At the | |
| time, investigators said the total cost of the unauthorized calls was in the | |
| thousands of dollars. | |
| _______________________________________________________________________________ | |
| Silicon Government in California October 28, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From UPI Sacramento | |
| California unveiled an easy-to-use computer system Wednesday that is | |
| designed to tell people about such topics as statewide job openings, where | |
| parents can find child care and how to re-register a car. | |
| Officials described the experimental "Info/California" program as an | |
| information-dispensing version of an automatic teller machine at a bank. It | |
| will operate in Sacramento and San Diego as a pilot project for the next nine | |
| months. | |
| Users will obtain free information on a variety of state services as they | |
| touch the television-like computer screen to evoke an on-screen narration and | |
| color graphics in English, Spanish and potentially other languages. | |
| "It literally puts state government at our fingertips," a computerized | |
| image of Gov. Pete Wilson said at a Capitol news conference. | |
| Secretary Russell Gould of the Health and Welfare Agency said the system | |
| may be especially useful to announce job openings as the economy rebounds from | |
| the recession. Job-seekers will need a fourth-grade literacy level to use the | |
| machine, which will refer them to Employment Development Department offices for | |
| follow-up. | |
| Director Frank Zolin of the Department of Motor Vehicles said the system | |
| will benefit 20 million drivers who want vehicle registration renewals, vanity | |
| license plate orders and faster service. | |
| John Poland, Central California manager for IBM -- the state's partner in | |
| the project -- said that besides telling the public about job opportunities, it | |
| will allow Californians to order birth certificates and get information about | |
| education, transportation, health and welfare at more than one site. | |
| During the nine-month trial, people will use the system at 15 kiosks in | |
| Sacramento and San Diego that will be similar to, and eventually integrated | |
| with, local system kiosks such as those in the courts in Los Angeles and Long | |
| Beach, and for community services in San Diego and Tulare counties. | |
| Info/California was authorized under 1988 legislation. It is based on an | |
| experimental touchscreen network in Hawaii that 30,260 people used over a six- | |
| month period. | |
| The state spent about $300,000 on the project, and IBM invested about $3 | |
| million to develop the technology. By performing functions now done by humans, | |
| the system may ultimately replace some state workers and produce cost savings | |
| for taxpayers. | |
| "We're working smart here," Gould said. "This may diminish some of the | |
| need for new state workers." | |
| _______________________________________________________________________________ | |
| Digital Tapes Deal Endorsed by Music Industry October 30, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From (Congressional Monitor) | |
| Record industry executives joined with retailers and consumer groups in | |
| endorsing legislation (S 1623) that would pave the way for widescale | |
| introduction of digital audio tapes into the U.S. marketplace. | |
| For the first time, consumers would be allowed to legally make copies of | |
| prerecordings for home use. | |
| The agreement would allow artists, songwriters, and record companies to | |
| collect royalty fees on the sale of blank tapes and digital audio recorders. | |
| In addition, an electronics chip will be placed in the recorders to | |
| prevent anything other than the original recording to be copied. | |
| In testimony before the Senate Judiciary Committee's Subcommittee on | |
| Patents, Copyrights, and Trademarks, pop star Debbie Gibson said that many | |
| artists had been concerned that digital copying could spell the end of a | |
| profitable music industry. | |
| Unlike conventional tapes, digital audio recorders allow consumers to make | |
| a perfect copy of a prerecording. The record industry says it already loses $1 | |
| billion a year in sales due to illegal copying. And, the industry says, | |
| unchecked digital technology would dramatically increase that figure. | |
| Electronics manufacturers and retailers won the assurance that they will | |
| not be sued for copyright infringement due to the sale of blank tapes or | |
| recorders. | |
| _______________________________________________________________________________ | |
| Computer Cryptography: A Cure For The Common Code | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Anyone can sign a postcard, but how do you sign a piece of electronic | |
| mail? Without a "signature" to demonstrate that, say, an electronic transfer | |
| of funds really comes from someone authorized to make the transfer, progress | |
| towards all-electronic commerce is stymied. Ways of producing such signatures | |
| are available, thanks to the technology of public-key cryptography. They will | |
| not work to everyone's best advantage, though, until everyone uses the same | |
| public- key system. | |
| It is an obvious opportunity for standards-makers -- but in America they | |
| have turned up their noses at all the variations on the theme currently in use. | |
| The alternative standard for digital signatures now offered by America's | |
| National Institute of Standards and Technology (NIST) has brought a long- | |
| simmering controversy back to the boil. | |
| Public-key cryptography could become one of the most common technologies | |
| of the information age, underpinning all sorts of routine transactions. Not | |
| only does it promise to provide the digital equivalent of a signature, it could | |
| also give users an electronic envelope to keep private messages from prying | |
| eyes. The idea is to create codes that have two related keys. In conventional | |
| cryptography the sender and receiver share a single secret key; the sender uses | |
| it to encode the message, the receiver to decode it. | |
| In public-key techniques, each person has a pair of keys: a disclosed | |
| public key and a secret private key. Messages encoded with the private key can | |
| only be decoded with the corresponding public key, and vice versa. The public | |
| keys are published like telephone numbers. The private keys are secret. With | |
| this technology, digital signatures are simple. Encode your message, or just | |
| the name you sign it with, using your private key. If the recipient can decode | |
| the message with your public key, he can be confident it came from you. | |
| Sending a confidential message -- putting electronic mail in a tamper-proof | |
| envelope -- is equally straightforward. | |
| To send a secret to Alice encode it with her public key. Only Alice (or | |
| someone else who knows her private key) will be able to decode the message. | |
| The heart of any system of public-key cryptography is a mathematical function | |
| which takes in a message and a key, and puts out a code. This function must be | |
| fairly quick and easy to use, so that putting things into code does not take | |
| forever. It must be very hard to undo, so that getting things out of code does | |
| take forever, unless the decoder has the decoding key. Obviously, there must | |
| be no easy way to deduce the private key from the public key. Finding | |
| functions that meet these criteria is "a combination of mathematics and | |
| muddle," according to Roger Needham of the Cambridge Computer Laboratory. | |
| The greatest successes to arise from the muddle so far are those using | |
| functions called prime factorisation algorithms. They are based on the | |
| mathematical insight that, while it is easy to multiply two numbers together, | |
| it is very hard to work backwards to find the particular two numbers which were | |
| multiplied together to produce some given number. If Alice chooses two large | |
| prime numbers as her private key and publishes their 150-digit product as her | |
| public key, it would probably take a code-breaker thousands of years to work | |
| backwards to calculate her private keys. | |
| A variety of schemes have been worked out which use this insight as the | |
| basis for a workable public-key code. Most popular of these is the so-called | |
| RSA algorithm, named after the three MIT professors who created it -- Ronald | |
| Rivest, Adi Shamir and Len Adleman. It has been patented and is sold by a | |
| Silicon Valley company, called RSA, that employs 15 people, most of them ex-MIT | |
| graduate students. Faculty firms are to computer start-ups what family firms | |
| were to the industrial revolution. RSA has attracted both academic praise and | |
| a range of heavyweight commercial customers: Microsoft, Sun Microsystems, | |
| Digital Equipment and Lotus Development. But, despite repeated applications, it | |
| has never been endorsed by those in government. Rumors abound that the | |
| codebreakers in the National Security Agency have discouraged standard-setters | |
| from recommending RSA because they do not want to promote the use of codes they | |
| cannot break. RSA, for obvious reasons, does not discourage the rumors. | |
| Whatever the reason, the standard-setters at the NIST have sidestepped the | |
| debate over RSA with their new algorithm, DSA. As set out in the standard, DSA | |
| verifies the identity of the sender, but does not encrypt the message. It | |
| appends to the message a number calculated from the message and the sender's | |
| private key. The recipient can then use this number, the message and the | |
| sender's public key to verify that the message is what it seems. | |
| The NIST says that this technique is well suited to "smart cards" and | |
| other applications where there is not a lot of computing power available for | |
| working out codes. Because it hopes that DSA will be used for verifying the | |
| identity of everyone from welfare recipients to military contractors, its | |
| flexibility is a boon. Meanwhile, however, more and more companies are | |
| choosing a public-key cryptography system for communicating confidentially -- | |
| often RSA, sometimes something different. Someday, probably soon, governments | |
| will want to choose, too. Watch out for fireworks when they do. | |
| _______________________________________________________________________________ | |
| SWBT Sends Off First "Cross-Country" ISDN Call | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From Southwestern Bell Telephone | |
| The nation's first "cross-country" public network ISDN was placed last | |
| week, courtesy of SWBT. The historic first call was the result of a two-year | |
| joint effort among SWBT, BellSouth Corp., US Sprint and Bellcore. SWBT's | |
| Advanced Technology Lab originated the call, which used US Sprint's digital | |
| facilities in Burlingame, Calif. The call terminated at a BellSouth switch | |
| in Atlanta, Ga. | |
| Using an ISDN video application, SWBT's trial director Ken Goodgold was | |
| able to see and talk to BellSouth's David Collins. "With this test, the | |
| geographic limits of ISDN-based services were stretched from a few miles to | |
| cross-country," Goodgold says. "We began with protocol testing and service | |
| verification, two key parts of the process," Goodgold says. "That required an | |
| extremely complex series of technical tests. The Advanced Technology Lab staff | |
| worked for months performing the tests leading up to the first successful | |
| call." | |
| Last week's test call was significant from a marketing perspective as well | |
| as a technical one. That's because it demonstrated the economic benifits of | |
| using ISDN for video information. "The cost of a long distance call is | |
| approximately the same, whether it's a voice transmission using a regular phone | |
| line or a video transmission using ISDN," Goodgold says. "That means a big | |
| reduction in cost to arrange a videoconference." US Sprint joined the test | |
| because ISDN has evolved beyond the local stage, says Terry Kero, the carrier's | |
| director of InfoCom Systems Development Labs. "After today, it will be | |
| technically possible to make an ISDN call across the country just as it is | |
| possible today to make a regular long distance call," Kero says. | |
| _______________________________________________________________________________ | |