Pat, the Editor

For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal   or  

 

TELECOM Digest     Wed, 25 May 2005 17:54:00 EDT    Volume 24 : Issue 232

Inside This Issue:                             Editor: Patrick A. Townson

    Take Your Phone Along (Eric Friedebach)
    Psst: Traditional 911 Doesn't Always Work, Either (Jack Decker)
    Vtech Caller ID Not Working (Harlan Messinger)
    Qwest Ends Pursuit of MCI (Telecom dailyLead From USTA)
    VOIP Provider Search (Fred Atkinson)
    First Place, Web Promotion, Unsolicited Calls? (usenet@outshine.com)
    Re: Packet8 DTMF Tones Sound "Clipped" (Clark W. Griswold, Jr.)
    Re: Packet8 DTMF Tones Sound "Clipped" (Robert Bonomi)
    Re: Packet8 DTMF Tones Sound "Clipped" (David Clayton)
    Re: Very Early Modems (Scott Dorsey)
    Re: Very Early Modems (Lisa Hancock)
    Re: Tangled up Over DSL - Some Cell Phone Users Demand (Steven Lichter)
    Re: Common Sense Moves Could Protect Privacy (founder@dinkumid.com)
    Re: ACLU Pizza (founder@dinkumid.com)
    Re: Foreign Exchange (FX) Lines Still in Use? (The Kaminsky Family)
    Re: Virus Infection Holds Computer Files Hostage (Robert Bonomi)
    Re: Last Laugh! Your House at P.O. Box 4621 (John Hines)
    Re: Last Laugh! Your House at P.O. Box 4621 (Steven Lichter)
    Re: Last Laugh! Your House at P.O. Box 4621 (Lisa Hancock)
    Re: Last Laugh! Your House at P.O. Box 4621 (davidesan@gmail.com)
    Re: Looking for a Model 15 or 19 (Lisa Hancock)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

From: Eric Friedebach <friedebach@yahoo.com>
Subject: Take Your Phone Along
Date: 25 May 2005 10:20:27 -0700


David M. Ewalt, 05.24.05, Forbes.com

NEW YORK - Internet telephone services have been slowly catching on as
consumers get hip to the promise of cheap phone calls and having the
same phone number anywhere you can plug in a computer.

But the services on the market from companies including phone carriers
such as Verizon Communications, cable providers such as Comcast and
Internet voice vendors such as Packet8 and Vonage aren't particularly
portable, often requiring special hardware and making it difficult to
access your phone account on a public terminal.

Most voice-over-Internet Protocol (VoIP) systems install on a home
computer and require a special modem. They can't be easily set up on
multiple machines, and you certainly wouldn't be able to access your
phone account on a public terminal.

Atlanta-based phone company i2 Telecom has changed that with the
VoiceStick, a software-based VoIP phone that is loaded on a
flash-based USB thumb drive, the same bit of hardware that's become
popular for transferring files between PCs.

http://www.forbes.com/personaltech/2005/05/24/cx_de_0524voicestick.html

Eric Friedebach
/And now it's time for: Jaromir Weather/

------------------------------

From: Jack Decker <jack-yahoogroups@withheld_on_request>
Date: Wed, 25 May 2005 13:47:48 -0400
Subject: Psst: Traditional 911 Doesn't Always Work, Either


Quick, somebody let Mike Cox (our Michigan Attorney General) know
about this, so he can threaten a real phone company with a lawsuit
instead of picking on VoIP companies ...

http://www.broadbandreports.com/shownews/63909

Psst: Traditional 911 Doesn't Always Work, Either Some think VoIP
carriers are getting a bad rap.

While the impression is there's been a rash of deaths thanks to bad
VoIP 911 connectivity, the truth is many of the "baby death" cases
(like this one http://www.broadbandreports.com/shownews/63372 ) are
more rhetoric than substance. An interesting discussion in our VoIP
forum http://www.broadbandreports.com/forum/remark,13491142 , on how
traditional 911 systems often fail (see Boston Herald
http://news.bostonherald.com/localRegional/view.bg?articleid=84679
without so much as a peep from the FCC or Congress, who've jumped all
over VoIP.

Article + reader comments at:
http://www.broadbandreports.com/shownews/63909

How to Distribute VoIP Throughout a Home:
http://michigantelephone.mi.org/distribute.html

If you live in Michigan, subscribe to the MI-Telecom group:
http://groups.yahoo.com/group/MI-Telecom/

------------------------------

From: Harlan Messinger <hmessinger.removethis@comcast.net>
Subject: Vtech Caller ID Not Working
Date: Tue, 24 May 2005 21:06:43 -0400


I have a Vtech 20-2481 2.4 GHz Gigaphone two-line base unit with three
handsets. Until a few days ago, I had a two-line cord (RJ-45?) running
into the base unit's Line 1 + Line 2 jack. Last year I got rid of the
phone number that had been coming in on Line 1, but Line 2 continued
to work just fine.

The other day I replaced the phone cord with a one-line cord (RJ-11?)
running into the Line 2 jack. I pushed a splitter into the wall jack
and plugged the other end of the cord into the splitter's Line 2
output.  Everything is fine now *except* that the Caller ID function
has quit.  The caller is no longer identified, and no record is kept
in the call history.

I switched back to the earlier configuration and the Caller ID came
back. Then I returned to the one-line cord, and Caller ID vanished
again. The same is true when I plug the cord into the Line 1 jack on
the base unit instead of the Line 2 jack.

The reason I switched to a one-line cord is that I want to use the
Line 1 input for my new VoIP connection. That doesn't have anything to
do with the problem, though, because it occurs whether or not I have
the VoIP plugged into the base unit.

Any ideas on a solution?


[TELECOM Digest Editor's Note: Try the original (working correctly)
configuration but try disconnecting it at the wall box. You obviously
do not want to blow up the VOIP adapter box, but yet there seems to be
something about the way caller-ID gets delivered. On a one line jack,
usually the two 'middle' pins (pins 3-4 of six pins or pins 2-3 of a
four pin thing) delivers the 'first' line; the 'outer' pins (usually
pins 1 and 4 in a four pin plug or pins 2 and 5 of six pins) bring in
the 'second' line. It may well be that 'line 1' should have been the
one you kept while 'line 2' was disconnected when you took a line
out. Or if you can find a 'dummy' modular head (plastic head with pins
but no wire protruding) try sticking that dummy head in the line one
space. I know Radio Shack sells the little dummy heads, mostly they
are for guys who are building their own wiring setups, but you don't
need the wire, just the little pins to make contact in the
phone. That's jusy my 'try it next' idea.  PAT]

------------------------------

Date: Wed, 25 May 2005 12:49:17 EDT
From: Telecom dailyLead From USTA <usta@dailylead.com>
Subject: Qwest Ends Pursuit of MCI


Telecom dailyLead from USTA
May 25, 2005
http://www.dailylead.com/latestIssue.jsp?i=21869&l=2017006

		TODAY'S HEADLINES
	
NEWS OF THE DAY
* Qwest ends pursuit of MCI
BUSINESS & INDUSTRY WATCH
* Nokia announces Wi-Fi device
* JDS-Acterna deal will boost both companies
* Adelphia to close long-distance service
* Cisco finds software flaw in IP phone
* Cable broadband hot in 2004
USTA SPOTLIGHT 
* USTA Webinar Series: Marketing Strategies for ILECs Begins Thurs.,
  May 26, 1:00 p.m. ET
EMERGING TECHNOLOGIES
* Nextel rolls out mobile e-mail
REGULATORY & LEGISLATIVE
* Skype repositions itself after VoIP 911 ruling

Follow the link below to read quick summaries of these stories and others.
http://www.dailylead.com/latestIssue.jsp?i=21869&l=2017006

Legal and Privacy information at
http://www.dailylead.com/about/privacy_legal.jsp

SmartBrief, Inc.
1100 H ST NW, Suite 1000
Washington, DC 20005

------------------------------

Date: Wed, 25 May 2005 10:08:15 -0700 (PDT)
From: Fred Atkinson <fatkinson@mishmash.com>
Subject: VOIP Provider Search
Reply-To: fatkinson@mishmash.com


I am trying to find a VOIP residential provider that can give me a
local number in a little town called Cullowhee, North Carolina.  It
doesn't have to be in the immediate area as long as anyone in
Cullowhee can call it without having to incur a toll charge.

I am pulling my hair out by the roots looking around for a provider.
I can't yet confirm whether Cullowhee is local to Asheville, NC or
not.  A number in the Cullowhee area is (828) 227-XXXX if that helps
anyone.

Vonage has been no help.  They don't cover Asheville and though they
have three other locations in the 828 area code, I can't get them to
give me enough information to determine if one of those locations is
local to Cullowhee.  They denied they covered three locations and
would only give me one voicemail access number in the 828 area.

Hasn't someone set up a search site yet where you can enter an area
code and prefix to find out which companies offer local residential
VOIP numbers in that area?  If so, can someone give me the URL to it?

Failing that, does anyone know an economical VOIP provider that can
help me with this?

Regards, 

Fred 

------------------------------

From: usenet@outshine.com
Subject: First Place, Web Promotion, Unsolicited Calls?
Date: 25 May 2005 10:54:30 -0700


Has anyone recently received an unsolicited call from someone
representing "First Place?"  They apparently make a Web promotion
product.  Any information at all would be helpful.

Today I received an unsolicited call from them.  The agent asked if I
owned outshine.com and then told me he had a product that would help
my site to make a lot of money.  He asked me to open up a Web browser.
Unfortunately, I didn't give him a chance to give me a URL.

I told him to put me on his do not call list.  He REFUSED.  I asked
for his name.  He refused.  I told him he was violating at least US
law, and he needed to respond.  He simply repeated, "don't you want to
make money with your site?"

The call came in "Unknown ID" so all I have is the moment he called,
his company name, and the very curious fact that he was able to
associate my private cell phone number with my public web site (the
domain name and the number are not publicly listed together, so I
think GoDaddy or Verisign sold my private account info).

If anyone got a call from "First Place," please reply to this post or
email me.  Thanks.

-Tony

------------------------------

From: Clark W. Griswold, Jr. <spamtrap100@comcast.net>
Subject: Re: Packet8 DTMF Tones Sound "Clipped"
Date: Tue, 24 May 2005 18:30:06 -0600
Organization: Posted via Supernews, http://www.supernews.com


Dave Garland <dave.garland@wizinfo.com> wrote:

> That would be 1/50 of a second.  Maybe it was 200ms?

Ah ... See how quickly those Hayes modem setup strings fade from the
memory? :)

I found a reference that said the minimum was 40ms, but I do recall
certain switches could work with a faster timing.

------------------------------

From: bonomi@host122.r-bonomi.com (Robert Bonomi)
Subject: Re: Packet8 DTMF Tones Sound "Clipped"
Date: Wed, 25 May 2005 05:48:43 -0000
Organization: Widgets, Inc.


In article <telecom24.231.6@telecom-digest.org>, Dave Garland
<dave.garland@wizinfo.com> wrote:

> It was a dark and stormy night when Clark W. Griswold, Jr.
> <spamtrap100@comcast.net> wrote:

>> I seem to recall that the old Bell System spec for tone duration was
>> 20ms, or 1/5th of a second.

> That would be 1/50 of a second.  Maybe it was 200ms?

Switch spec called for 35ms.

Original Hayes Smartmodems defaulted to 70ms of tone, with 70ms space
between digits.

Some C.O. equip would detect reliably on bursts as short at 25 ms.
I never ran into a switch that would accept dialing at 20ms.

------------------------------

From: David Clayton <dcstar@myrealbox.com>
Subject: Re: Packet8 DTMF Tones Sound "Clipped"
Date: Wed, 25 May 2005 12:02:13 +1000


On Mon, 23 May 2005 17:58:50 -0600, Clark W. Griswold, Jr. wrote:

> slippymississippi@yahoo.com wrote:

>> I hooked up a line analyzer and listened to the call, and all I'm
>> hearing on my end is a "blip blip blip" as he repeatedly presses the key
>> to save the message.  The DTMF tone basically sounds like it was clipped
>> at just a few milliseconds

> I seem to recall that the old Bell System spec for tone duration was 20ms,
> or 1/5th of a second. Some switches allowed you to go as fast as 10ms,
> which put the speed in speedial. :)

The biggest problem with "short" DTMF tones - along with short gaps
between tones - was determining when two identical digits were in fact
two separate ones and not a single tone burst split by some line
interruption etc.

I once worked on a voice mail system with DTMF in-band signalling to
the PBX for Message Waiting indication, and there were intermittent
complaints from some users that they had messages but were not
always notified.

After many, many months (actually a couple of years) it was finally
determined that the gap between the DTMF tones coming out of the Voice
Mail wasn't long enough for the PBX to reliably detect two identical
digits following one another.

The gap was fine for different digits, but when the combination of
Message Waiting prefix and extension number had a pair of digits
somewhere, and the PBX CPU just happened to be busy at that moment (we
thought), the Message Waiting wasn't received correctly.

So to sum up, fast DTMF can cause issues ...

Regards

David Clayton, e-mail: dcstar@XYZ.myrealbox.com
Melbourne, Victoria, Australia.
(Remove the "XYZ." to reply)

Knowledge is a measure of how many answers you have,
intelligence is a measure of how many questions you have.

------------------------------

From: kludge@panix.com (Scott Dorsey)
Subject: Re: Very Early Modems
Date: 24 May 2005 11:46:07 -0400
Organization: Former users of Netcom shell (1989-2000)


<hancock4@bbs.cpcn.com> wrote:

> In the IBM history series by Pugh et al, they said IBM converted
> punched cards to paper tape for transmission in the 1940s.  My guess
> is that that particular transmission used telegraph TTY lines (not
> voice) of either AT&T or Western Union.  Recall that AT&T maintained
> telegraph long distance lines as part of carrier long distance
> circuits.  Because of the low bandwidth, a telegraph channel could be
> carried on the low end of a carrier channel.  Accordingly, no
> modulation was required and thus no modem needed.

> It was also said IBM limited development in this area to avoid
> annoying AT&T who was IBM's best customer.

This makes sense.  The Western union systems were basically designed to
take baudot paper tape, 5 bits across, with certain headers at the
beginning and ends of messages.  Messages would often be punched on
paper tape at a switching office and batched up for later transmission,
basically the first store-and-forward systems.

> However, in the 1950s, IBM developed card-to-card directly without
> paper tape and "over AT&T lines".  Modems were developed to take good
> advtg of the available bandwidth (about 1200 baud).  Undoubtedly the
> equipment and implementation was developed in close cooperation with
> AT&T.

This was the IBM "Card-to-card" transceiver.  I don't know when they
first came out, but the Army started implementing them in a nationwide
network in September of 1956.

> I was wondering if the modems in that application were supplied by IBM
> (who appears to have developed the technology) or by AT&T.  My
> understanding that AT&T's "Dataset" modem-telephones didn't come out
> until the 1960s.

> Comments by anyone familiar with pre-1960 data communications would be
> greatly appreciated.

I believe they used 4-wire leased lines, with data access arrangement
boxes provided by Ma Bell.  So the signals going into the big grey box
next to the reader/punch were analogue.  I don't recall what the
transmission rate was, but they sent EBCDIC directly without any
translation to a 5-channel code and no added headers.


--scott

"C'est un Nagra.  C'est suisse, et tres, tres precis."

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Very Early Modems
Date: 25 May 2005 11:01:57 -0700
Organization: http://groups.google.com


Jim Haynes wrote:

> The Bell System didn't allow any "foreign" (meaning
> customer-provided equipment) attached to the switched network.  They
> vigorously defended this position until it was overturned by the
> Carterfone case.

Our school system originally used Teletypes rented from Bell with the
built in modem and dial equipment.  IIRC they ran about $100 a month.

Then they bought or leased Teletypes from private vendors.  The modems
were supposed to go through the Bell "DAA" box (the protection* unit)
but often that was forgotten.  Although the phone system was still
mostly hard wired in those days (excepting the 4-prong home jacks), we
got around that by using a special transmitter cup that had a tiny
jack for our modem to connect into.

*Some said the "protection" was really to protect Bell System
revenues, not the network.  However, see the garbage people sometimes
hook up today, despite supposedly being certified, and knowing the
shortcuts we took back then, I'm think having that protection wasn't
such a bad idea after all.  Recall that Bell was responsible for
everything in those days so if an illegal attachment hurt something
Bell was still stuck to fix it.  (Most illegal users knew to hide
their gear before calling Bell in.)

> And since it did not need the entire bandwidth of a voice-grade line
> IBM designed the modem with four different frequency bands so that
> up to four systems could operate simultaneously over a voice-grade
> line.

The IBM book says they used the four frequency bands to get
an effective 1200 baud rate, which seems good for the 1950s.

> The earliest modems were not really called that but were the carrier
> systems installed in telephone and telegraph company offices to
> allow multiple telegraph transmissions over a single voice-grade
> circuit.

The Bell history says that telegraph signals could be carried on the
low end of a voice grade circuit--apparently this was done even in the
1930s with simple electronics.  I believe pre-WW II Bell carrier
systems were pretty limited in deployment and capacity; it wasn't
until postwar microwave and widespread coaxial cable could they get
high volume.  Coax did exist before WW II, but I suspect it was quite
limited.

> Then in the early 1960s the Bell System opened things up by leasing
> modems that allowed the customer to connect business machines to the
> modem and transmit data over the switched network.

The Western Union history describes advanced switching and
communications networks for telegraph traffic, including special
networks for govt and business.  It looked to be state of the art for
its day (1960s).  I'm still hazy on how Western Union missed the boat
on data communication which was after all their specialty.  Some say
WU had a very limited transmission network and depended on Bell for
that "final mile" although in cities WU had quite a broad network.
Or, their Telex wasn't as good as AT&T's TWX.

------------------------------

From: Steven Lichter <shlichter@diespammers.com>
Reply-To: Die@spammers.com
Organization: I Kill Spammers, Inc.  (c) 2005 A Rot in Hell Co.
Subject: Re: Tangled up Over DSL - Some Cell Phone Users Demand to Stand
Date: Tue, 24 May 2005 22:53:21 GMT


Jack Decker wrote:

> http://www.chron.com/cs/CDA/ssistory.mpl/business/3195270

> Some Cell Phone Users Demand to Stand Alone

> By JOHN C. ROPER
> Copyright 2005 Houston Chronicle

> A growing number of U.S. consumers are cutting the cord on traditional
> home telephone service, choosing instead to exclusively use cell
> phones.

> But many of these consumers have found ditching their land-line phone
> service, and its accompanying cost, isn't possible if they want speedy
> DSL, or digital subscriber line, Internet service in their homes.

> Providers such as SBC Communications require customers to buy
> residential phone service to have access to their broadband lines, a
> tactic consumer advocacy groups say is unfair.

> Full story at:
> http://www.chron.com/cs/CDA/ssistory.mpl/business/3195270

> How to Distribute VoIP Throughout a Home:
> http://michigantelephone.mi.org/distribute.html

> If you live in Michigan, subscribe to the MI-Telecom group:
> http://groups.yahoo.com/group/MI-Telecom/

> [TELECOM Digest Editor's Note: I think I read somewhere -- maybe here
> in the Digest -- where SBC was going to bite the bullet also and
> begin offering 'naked DSL'. Fact or fiction?  Personally, I would say
> that _whenever possible_ people just ditch telco and go with cable
> internet.  PAT] 

They have as well as Verizon, the others will follow.  I believe
either the FCC or PUC here in California ordered it.

The only good spammer is a dead one!!  Have you hunted one down today?
(c) 2005  I Kill Spammers, Inc.  A Rot in Hell Co.

------------------------------

From: founder@dinkumid.com
Subject: Re: Common Sense Moves Could Protect Privacy
Date: 25 May 2005 02:16:15 -0700


The subject should read:

Common Sense Moves Could NOT Protect Privacy.

This latest ID Theft incident show that nothing could stop or prevent
ID Theft at this moment in time.

Even the highest level of encryption or multi-level authentication
process could not stop those ID thieves.

We read everyday about ID Thefts and the so-called security solutions
such as credit reprot monitoring, paper shredders, encryption,
biometrics etc and if you examine everyone of those so-called security
solutions -- nothing works in this instance not at ChoicePoint or Lexis
Nexis.

I think all the so-called advice and tips to secure IDs are giving a
false sense of security to the average citizen.

------------------------------

From: founder@dinkumid.com
Subject: Re: ACLU Pizza
Date: 25 May 2005 02:27:58 -0700


So what are we going to do about it? Stop eating pizza? Lobby the
politicians? Fight against big money and big corporations?

When Big Corporations want to achieve their goals they implement
technologies.

When is the collective citizen going to group together to implement
technologies to achieve their goals? Power is in the hands of those
who own the technology!

As a founder of DINKUMID we are initiating something at
http://www.dinkumid.com/ which can totall secure every citizen's ID
and give big governments and big corporations less reasons to be big
brother.

------------------------------

From: The Kaminsky Family <kaminsky@kaminsky.org>
Reply-To: kaminsky@kaminsky.org
Organization: None Whatsoever
Subject: Re: Foreign Exchange (FX) Lines Still in Use?
Date: Wed, 25 May 2005 09:39:13 GMT


Al Gillis wrote:

> Robert Bonomi <bonomi@host122.r-bonomi.com> wrote in message
> news:telecom24.226.5@telecom-digest.org:

>> In article <telecom24.224.13@telecom-digest.org>, TELECOM Digest
>> Editor noted in response to Robert Bonomi:

>>> [TELECOM Digest Editor's Note: As Robert knows, those four additional
>>> touch tone keys were known as A,B,C, and D. I forget the exact
>>> meaning of each, but my question is, did anyone with 'regular'
>>> service but with an Autovon phone ever try pressing those keys in
>>> a regular call?  I did a couple times, and the immediate result was
>>> a 'fast busy' signal; the call would not complete.   PAT]

>> On the PSTN, it somewhat depended on the switch and programming.
>> 'Reorder' was the very-common switch reaction.  There were a few
>> switches that completely 'ignored' those signals.

>> [TELECOM Digest Editor's Note: But did you ever see/hear any that
>> neither ignored nor offered re-order, but instead actually _did
>> something_ ?  I never did.  PAT]

> I've got a Western Electric 3666-1A key set (Autovon dial).  I've
> tried pressing the A, B, C and D keys while connected to both a
> Nortel DMS-200 (CO Switch) and a Nortel Meridian-1 (PBX).  In both
> cases I got reorder while listening to dial tone (that is, no call
> had been established yet) and no effect while an established call
> was in progress.

> The Names of the additional keys are:
> FO (Flash Override) adjacent to the 3 key
> F (Flash) adjacent to the 6 key
> I (Immeadiate) adjacent to the 9 key
> P (Priority) adjacent to the # key  (See note)

> Note: My 3666-1A has a key designated as "A" where the # key is placed
> on a normal dial pad.  I don't know if this is standard for "Autovon"
> dials.  The tone generated by this key (according to a "digit
> grabber") is that of a # key, however.  Another interesting thing is
> that the Star key (left of 0) is not an asterisk but rather it's a
> real star!  That is, a five pointed star, white lines on the gray
> background (or is it a grey background?) with a hollow center.

> Al

It has been at least ten years since I worked on this stuff, so if any
of it matters to you, please do not rely on my memories.

When I was working for a voice messaging vendor, we were part of an
industry initiative to develop a protocol for passing messages between
messaging systems from different vendors.  The relevant specification
was for the AMIS Analog protocol (and I've forgotten what the acronym
AMIS stands for).

Basically, the protocol allowed a user of one voice messaging system
to address a message to a user of another voice messaging system (the
user interface was left unspecified -- that was a matter for the
individual vendors to handle), in such a way that the voice messaging
system could then dial the recipient system, do some handshaking, and
then deliver the message in a way that allowed the recipient system to
deliver the message to the intended voice mailbox.

The protocol relied on use of two fourth-column tones (C and D, as I
recall) to screen out nearly all accidental calls to the incoming AMIS
Analog phone number (I forget if the specification required it, but we
came up with a canned message to play if that phone number received an
incoming call that did not send the correct tone -- just to be polite).

It was quite a change from our usual workday (writing documents or
code, and testing code) when we got to test with other vendors.  We
actually got to talk to engineers working for our competitors, and
send each other messages (mostly we sent protocol errors, actually, to
verify that the error handling on both sides was working properly - it
does not take very many correct messages to verify that things work
properly).  I still remember one of our competitors (who really should
have known better) who had the wrong country code for the US - but
otherwise, there were not many problems getting things to work.

Security was an issue -- once the testing period was over, our
management refused to allow an incoming telephone number - so other
members of the AMIS committee could not send us AMIS Analog messages
(rather frustrating, but out of my control).

I had a four column analog phone on my desk for a few years while I
worked on this system (the fourth column, if I remember correctly, was
to the right of the normal three columns, with the rows 1-2-3-A,
4-5-6-B, 7-8-9-C, and *-0-#-D).  When I was doing it often, I was able
to manually imitate a voice messaging system, computing checksums as
needed in my head (there were not very many of them, and only two were
variable, if memory serves).  The protocol had to be designed to
handle some slow systems, so I could dial fairly slowly when I was
adding the checksums.

Mark

------------------------------

From: bonomi@host122.r-bonomi.com (Robert Bonomi)
Subject: Re: Virus Infection Holds Computer Files Hostage
Date: Wed, 25 May 2005 07:04:46 -0000
Organization: Widgets, Inc.


In article <telecom24.230.2@telecom-digest.org>, Lisa Minter
<lisa_minter2001@yahoo.com> wrote:

> Web Infection Holds Computer Files Hostage
> By TED BRIDIS, AP Technology Writer 11 minutes ago

> Computer users already anxious about viruses and identity theft have
> new reason to worry: Hackers have found a way to lock up the
> electronic documents on your computer and then demand $200 over the
> Internet to get them back.

> Security researchers at San Diego-based Websense Inc. uncovered the
> unusual extortion plot when a corporate customer they would not
> identify fell victim to the infection, which encrypted files that
> included documents, photographs and spreadsheets.

> A ransom note left behind included an e-mail address, and the attacker
> using the address later demanded $200 for the digital keys to unlock
> the files.

> "This is equivalent to someone coming into your home, putting your
> valuables in a safe and not telling you the combination," said Oliver
> Friedrichs, a security manager for Symantec Corp.

> The FBI said the scheme, which appears isolated, was unlike other
> Internet extortion crimes. Leading security and antivirus firms this
> week were updating protective software for companies and consumers to
> guard against this type of attack, which experts dubbed "ransom-ware."

> "This seems fully malicious," said Joe Stewart, a researcher at
> Chicago-based Lurqh Corp. who studied the attack software. Stewart
> managed to unlock the infected computer files without paying the
> extortion, but he worries that improved versions might be more
> difficult to overcome. Internet attacks commonly become more effective
> as they evolve over time as hackers learn to avoid the mistakes of
> earlier infections.

> "You would have to pay the guy, or law enforcement would have to get
> his key to unencrypt the files," Stewart said.

> The latest danger adds to the risks facing beleaguered Internet users,
> who must increasingly deal with categories of threats that include
> spyware, viruses, worms, phishing e-mail fraud and denial of service
> attacks.

> In the recent case, computer users could be infected by viewing a
> vandalized Web site with vulnerable Internet browser software. The
> infection locked up at least 15 types of data files and left behind a
> note with instructions to send e-mail to a particular address to
> purchase unlocking keys. In an e-mail reply, the hacker demanded $200
> be wired to an Internet banking account. "I send programm to your
> email," the hacker wrote.

> There was no reply to e-mails sent to that address Monday by The
> Associated Press.

> FBI spokesman Paul Bresson said more familiar Internet extortion
> schemes involve hackers demanding tens of thousands of dollars and
> threatening to attack commercial Web sites, interfering with sales or
> stealing customer data.

> Experts said there were no widespread reports the new threat was
> spreading, and the Web site was already shut down where the infection
> originally spread. They also said the hacker's demand for payment
> might be his weakness, since bank transactions can be traced easily.

> "The problem is getting away with it - you've got to send the money
> somewhere," Stewart said. "If it involves some sort of monetary
> transaction, it's far easier to trace than an e-mail account."

> Details: http://www.websensesecuritylabs.com/alerts/alert.php?AlertID194

> Copyright 2005 The Associated Press.

> NOTE: For more telecom/internet/networking/computer news from the
> daily media, check out our feature 'Telecom Digest Extra' each day at
> http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
> articles daily.

> [TELECOM Digest Editor's Note: But, as some of our Bright young 
> readers would explain, "on internet there is no consensus on what
> is, and is not malicious."

Oh my,  I see I've been "promoted" to a "bright young reader", by the 
esteemed moderator.  I'm not exactly young, but he gets credit for 
getting things 50% right.  <grin>

I will point out, yet again, that that remark was in regards to a
proposal for a law that banned quote malicious activity unquote on the
Internet. The point being was that that term is too broad and too
vague to be _legally_ _enforceable_.  To get a law that would pass
judicial review, one would have to specify the _particular_kinds_ of
acts that are to be proscribed.

Note: *all* computer viruses, 'zombie' infectors, etc. most 'spyware',
  and virtually all the 'browser hijacker' type stuff are
  *ALREADY*ILLEGAL* in the United States, under 18 USC 1030.
  Available on-line at: http:/www.law.cornell.edu/uscode/18/1030.html

  *But* the enforcement of that law is lax-to-nonexistent.

  A "new law" won't do diddly-squat about the problem without active
  enforcement.

  And, if you _have_ active enforcement, you _don't_need_ any new laws.

Recommended reading: The FTC's "Report to Congress" on the
practicality (or lack thereof) of a national "Do Not E-mail" registry,
similar to the Do Not Call registry.  Available on-line at:
<http://www.ftc.gov/reports/dneregistry/report.pdf>

While I disagree with a number of their conclusions regarding the
viability of a Do Not Email registry -- there _are_ ways to do it that
address the drawbacks they identify -- the really _interesting_ meat
in the report has to do with the difficulty of prosecution of
violators of existing law.  See "C. Obstacles to Enforcement" starting
on Page 23 of the report.

In 2003, Earthlink got over 45 million pieces of spam to the 'honeypot'
addresses they run.  They were able to link about 5% of those messages
to an identifiable source.  Barely 1/3 of the identifications were good 
enough that they could send a cease-and-desist warning letter.

That is what *over* _twelve_thousand_ man-hours of effort 'bought'.
Call it half-a-million dollars worth of effort.

Another ISP reports over ONE THOUSAND man-hours expended in _preparing_
a lawsuit against *one* spammer.

Government prosecutions from the States of WA, and VA show similarly high
costs:

       "A prosecutor in Washington State spent four months and
       sent out 14 pre-suit civil investigative demands (CIDs)
       just to identify the spammer in one lawsuit.  Likewise,
       in another case, it took the Virginia Attorney General,
       over the course of four months, multiple subpoenas to 
       domain registrars, credit card companies, and Internet
       providers, and the execution of a search warrant, before 
       having enough information to file a case against a 
       spammer."

> Or as another reader would explain, "there
> is no such thing as an internet; just a collection of sites, and
> we cannot tell another site how to operate."

What they do on _their_ own private property *IS* their prerogative.

Their 'right' to do so does not extend to coming onto _my_ private
property to do it.

> And the Bright young
> reader concurs, "nor does anyone on the net want things any 
> different".   PAT]

Show the 'bright young reader' that people are demanding that
restrictions be put on _their_own_ activities -- as distinct from
demands that limits be imposed on the actions of 'other people' -- and
he will willingly change that to 'practically anyone'.

The situation is exactly like that with various kinds of 'morals' laws
 -- try to find _anyone_ who supports an anti-prostitution statute on
the basis that "it will discourage _me_ from hiring prostitutes".

In many areas of the country, "pan-handling", and/or other forms of
"spare change?" solicitation, on the streets is disallowed by law.
Should equivalent pleas be allowed on the Internet, or not?

------------------------------

From: John Hines <jbhines@newsguy.com>
Subject: Re: Last Laugh! Your House at P.O. Box 4621
Date: Tue, 24 May 2005 18:44:24 -0500
Organization: www.jhines.org
Reply-To: john@jhines.org


Customer Service <customerservice@mortgagequotenetwork.net> wrote:

> I hope that at least occassionally, some of these spammers who
> sincerely bought their lists, etc thinking there was money to be made
> on the internet grow discouraged, and give up their efforts voluntarily
> and find other uses for their computers. Or is that too much to ask?

I still get snail mail advertisements, addressed to the previous
owners, even though I've lived here for 10 years.

Advertisers don't clean their mailing lists even when they have to
_pay_ real money (printing and postage) for the privilege.

------------------------------

From: Steven Lichter <shlichter@diespammers.com>
Reply-To: Die@spammers.com
Organization: I Kill Spammers, Inc.  (c) 2005 A Rot in Hell Co.
Subject: Re: Last Laugh! Your House at P.O. Box 4621
Date: Tue, 24 May 2005 23:01:44 GMT


Customer Service wrote:

> [TELECOM Digest Editor's Note: Fished (or do you say 'phished') out of
> my ever-full, always overflowing spam bucket this morning, on my way
> to put out this issue of the Digest. As we can see by a cursory glance
> through the binary code below, it is a spam-thingy. PAT]

> MThlIE1vcnRnYWelIFF1b3RlIE5ldHdvcmsNCkEgUGVyc29uYWwgQXBwcm9hY2ggdG8gT25saW
> 5l
> IEJvcnJvd2luZw0KDQpHZXQgYSBGcmVlIE1vcnRnYWdlIFF1b3RlIQ0KaHR0cDovL3d3dy5tb3
> J0 (and several _hundred_ more lines like the above).

> I bashed the rest of it, and altered the above just enough to cause it
> to lose its punch so none of _you_ would possibly 'inherit' it in your
> travels around the net today. That's how I say 'Thank you for visiting
> our web site today'; I spam you and perchance hand you a virus 'souvenier'
> to take home and show or give to your friends. Of course many netters
> would contend it is impossible to define 'offensive' or 'malicious'
> and still others would contend the 'internet does not exist; it is
> only a collection of sites, etc'.

> But my observation is this: Note the original subject line, 'Your
> House at P.O. Box 4621'. I would like you to know (a) 'Box 4621' in
> Skokie, Illinois is a very old snail- mail address I used when I lived
> in Skokie (metro Chicago area) about _ten years ago_; that is the age
> and quality of the mailing lists these spammers often times use. I'll
> bet whoever he bought the mailing list from told him 'a new, fresh
> list with x-gazillion email names and addresses' on it. From what I
> can gather, its another of those 'you have qualified to receive a
> mortgage loan' things. My second observation, (b) is the guy does not
> seem to be very bright. He could not or did not even think it through
> and use an _actual house address_ (such as 'Your House on Niles Center
> Road') or something similar to at least try to make it a message worth
> reading.

> I hope that at least occassionally, some of these spammers who
> sincerely bought their lists, etc thinking there was money to be made
> on the internet grow discouraged, and give up their efforts voluntarily
> and find other uses for their computers. Or is that too much to ask?

> PAT

Some of those offers clearly came from people who don't have any
education at all; spelling of simple words are wrong, and some are not
competent at English speaking as the sentences make very little sense.
I filled out a few of the applications with bogus info and gave phone
numbers of the FBI and Attorney General fraud numbers, if they are
called, it should make and interesting conversation as they hangup
when they hear who they reached.


The only good spammer is a dead one!!  Have you hunted one down today?
(c) 2005  I Kill Spammers, Inc.  A Rot in Hell Co.

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Last Laugh! Your House at P.O. Box 4621
Date: 25 May 2005 07:31:04 -0700


> [TELECOM Digest Editor's Note: Lisa, I am wondering if City of Phila
> Parking Authority are as full of snot as the people who run the
> various 'Authorities' (we used to call them 'Atocities' in Chicago...

Yes, the Parking Authority is very tough and arrogant.

But there are two sides to the story.

Before the Parking Authority got reorganized into becoming a tough
agency, parking was a big problem in the city.  Phila has narrow
streets and illegally parked cars badly foul up downtown traffic.
People who paid $$$ to park legally in lots resented motorists who
parked illegally and got away with it.  Phila is on the border with NJ
and NJ motorists got away with parking violations since they didn't
follow up out of state.

First, they gave the PA computers to check for scofflaws.  If someone
had a long list of unpaid violations, their car was 'booted' and they
had to pay up.  They also agressively began towing illegally parked
cars that blocked traffic and collecting fines from ticketed cars.
People were brought in who owed thousands of dollars of unpaid fines.

All these efforts improved traffic flow and citizen morale.

This recent problem has them going too far.  I have no problem
aggressively collecting fines -- if it's done so promptly after the
ticket is issued and regular notices are ignored.  But to try to make
up for 15 years of neglect using very fuzzy data base matches is
wrong.

More importantly, this use of database matching to search out people
or flag people is frightening.  Is it fair for a completely innocent
person to be denied credit, housing, or a job because some SECRET
computer says he might be a deadbeat?

I still wonder if anyone can defend this sort of thing.  I'm glad ABC
News did an expose of the business, but I think that fell on deaf
ears.

> i.e. the Chicago Transit Atrocity, the Chicago Housing Atrocity,
> etc.)?

The quality of other govt Authorities varies by unit and also over
time.  We had one agency, the Delaware River Port Authority, that was
well run.  They built an excellent rapid transit line,
PATCO-Lindenwold.  That was the first automated trainsit line (before
BART) and was well designed and very reliable.  The designers knew
automation wasn't perfect and put it full manual backup capability* as
well as a strong organization and operation.  Unfortunately, in recent
years some local politicians got involved and turned the DRPA into a
patronage machine.

*FWIW, PATCO was not high-tech or cutting edge.  The designers just
used proven off-the-shelf designs and put them all together.  To save
money, some components were actually second-hand.  For instance, their
internal telephone system was a used SxS.  Every station had a
Call-For-Aid telephone at the fare gates.  If a passenger's ticket was
short, the passenger would put coins directly into the phone -- they
used 2nd hand pay phones as part of their network.  Very cheap but
workable solution still in use today.  The train signal system used an
old railroad 100Hz (that's one-hundred not one-thousand) code, not
some fancy thing that other systems took years to debug.  Pat, you may
remember the auto faregates the Illinois Central commuter railroad
used; PATCO copied those.


[TELECOM Digest Editor's Note: Yes, I do remember the Illinois Central
fare gates; one hassle (nothing major) was that the doors coming in 
to them from the tracks outside were used in common by passengers from
the Illinois Central trains and the Chicago, South Shore and South
Bend Railroad (hereinafter, the "South Shore" trains.) South Shore
trains were also electrified, and run east across northern Indiana 
through Hammond/Gary  on the southern shore of Lake Michigan over to
South Bend, Indiana, splitting off from the Illinois Central 'mainline'
tracks at 115th Street, onto their own tracks. North of that point,
going into downtown Chicago, South Shore was a tenant, renting right
of way on the Illinois Central tracks and at 'stations in common'
which are/were Van Buren Street, Roosevelt Road, 57th Street, 63rd
Street. Once they reached 115th Street they are on their own as their
track cuts off and runs eastward. South Shore does not, or did not, 
use the automated fare collection system. You pay for your little stub
ticket from an agent, board the train, and hand over your little stub
when the conductor comes through the car. 

The hassle with that was Randolph Street where the automatic gates are
located. The gates work both ways, to come out of the train area and
to go into the train area. Illinois Central passengers use their
little ticket slipped into the card reader on the gates. When a South
Shore train pulled in, the clerks at the station level would see the
mob of passengers coming; one of them would say 'on the gate' and by
clicking on a wall switch, all the little turnstyles would go unlocked
and stay unlocked for the three or five minutes required for the
passengers to all be disengorged. Then to show that hands can be
quicker than the eye, when the last passenger got through the gates,
the clerk would hit the switch and cause the gates to go back in
service again. 

Where they had problems however was when two trains -- one a South
Shore, the other an Illinois Central -- both pulled in at _exactly_
the same minute and the disembarking passengers from both trains were
pushing and shoving each other as they marched toward the gates. When
that happened, as it usually did at least once per day in the morning
rush hour, the clerk had to simply open the gates and wound up writing
off the uncollected mag stripe card deductions the railroad was due on
the Illinois Central passengers. But as long as there was at least 45
seconds or a minute between incoming trains from one railroad or the
other, as there usually was, those clerks at the gates were pretty
fast and effecient at opening the gates only as needed for the minute
or so required to let the South Shore people get through. 

At the 'stations in common' the agents sold tickets for both
railroads. There was a period of 2-3 days when the clerks union for
Illinois Central went on strike for some reason, and they all walked
off the job, all that is, except for the clerks on duty at the
stations in common who were told by the union to stay on duty only
to handle South Shore duties. Every other station was devoid of any
workers those days. PAT]

------------------------------

From: davidesan@gmail.com
Subject: Re: Last Laugh! Your House at P.O. Box 4621
Date: 25 May 2005 07:35:50 -0700


I have often filled out forms with a throwaway email address (something
that I delete the entire mailbox once a month) and give a street
address of 1600 Pennsylvania Ave. Washington, DC.  Imagine my amusement
when I started getting emails at the thowaway address telling of the
great rates I could get on the mortgage at my home at 1600 PA Ave.



[TELECOM Digest Editor's Note: That's really ignorant, isn't it?  PAT]

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Looking for a Model 15 or 19
Date: 25 May 2005 08:15:37 -0700


Reggie wrote:

> Yes, the old black boxes.  Had some years ago.  Donated them to a
> museum.  Wished I had one for display and operation with a HAL 6000
> interface.

One of the telephone collector groups, TCI or ATCA, might help you.
There's a big outfit in Wisconsin (I wish I could remember the name --
I think it's "Ron's phones") that has a big inventory of old stuff.
(Maybe someone else could post the correct name?)

I don't know what a HAL 6000 interface is.  But keep in mind the older
machines use Baudot which is not only a different code, but requires
an extra control character to shift between letters and numbers.

Being mechanical and complex, the machines will need servicing.  If
they hadn't been used for a while, they made new repair/adjustment to
work again.  (We had some fans stored in the garage for a number of
years.  When we tried them, they were just dead.  Trying to twirl the
blade didn't help.)  Also, old machines had shellac or fabric
insulation on wires which can rot out.


[TELECOM Digest Editor's Note: Maybe my brain has shellac or fabric
insulation. Lord knows it has been rotted out now for a few years,
ever since the hospital got done with me.  PAT]

------------------------------


TELECOM Digest is an electronic journal devoted mostly but not
exclusively to telecommunications topics. It is circulated anywhere
there is email, in addition to various telecom forums on a variety of
networks such as Compuserve and America On Line, Yahoo Groups, and
other forums.  It is also gatewayed to Usenet where it appears as the
moderated newsgroup 'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html
  For syndication examples see http://www.feedroll.com/syndicate.php?id=308
    and also http://feeds.feedburner.com/telecom

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #232
******************************

Return to Archives**Older Issues