Copy Link
Add to Bookmark
Report

Private Line 3

eZine's profile picture
Published in 
Private Line
 · 26 Apr 2019

  

----------------------------------------------------

VOLUME 1, NUMBER 3 --
PRIVATE LINE: A JOURNAL OF INQUIRY INTO THE
TELEPHONE SYSTEM

INFORMATION ON PRIVATE LINE
I. EDITORIAL PAGE
II. UPDATES AND CORRECTIONS
III AN INTRODUCTION TO LOCAL SCANNING
IV. DEF CON II REVIEW: FEAR AND HACKING IN LAS VEGAS
V. ROAD TRIP TO VEGAS
IV. A FEW THOUGHTS ON EMS AND 911

----------------------------------------------------

GENERAL INFORMATION ON PRIVATE LINE
ISSN No. 1077-3487

A. private line is published six times a year by Tom Farley. Copyright
(c) 1994 It runs 24 to 28 pages. It's done in black and white.

B. Subscriptions: $24 a year for subscriber's in the U.S. $31 to Canada
or Mexico.
$44 overseas. Mailed first class or equivalent.
1. Make checks or money orders payable in US funds to private line.
2. Back issues are five dollars apiece.
3. A sample is four dollars.
4. The mailing list is not available to anyone but me.

C. Mailing address: 5150 Fair Oaks Blvd. #101-348, Carmichael, CA
95608

D. e-mail address: privateline@delphi.com

E. Phone numbers: (916) 488-4231 Voice (916) 978-0810 FAX

F. Submissions: Go for it! Anything semi-technical is strongly
encouraged. I pay with subscriptions.

G. Ads: Yes, I'm taking electronic related ads. A full page is $75.00, a
half page $37.50 and a quarter $18.75. Subscribers get free classified
ads of 25 words or less.

H. Feel free to post this file at any site or on any BBS you wish. I just
ask that you keep the file together and not sell any hardcopy version of it.
Fair enough?

I. The fourth issue is now on sale. Send me four dollars or ask your
dealer to get it through Fine Print Distributors.

------------------------------------------------------------------

I. EDITORIAL PAGE

Going National; War Footing

Welcome to the third issue of private line. I hope you enjoy it. The look
and feel of this issue is different from the first two. Why? Well, it's an
effort to make the magazine more readable. The first two issues had a
great deal of information. I presented that information, however, in a
dry, humorless form. Without enough pictures and photographs. I think
I can do better, in fact, I know that I must. private line is going national.

I got a letter from Fine Print Distributors of Austin, Texas when I got
back from Def Con. Fine Print distributes FactSheet5 as well as several
hundred other periodicals. They wanted to distribute private line. I was
happy that I had found a way to put the magazine on newsstands. That's
where my readers are. But Fine Print wanted 250 copies to start. As in
starting now. And that's when the problems began.

I had been producing private line cheaply by myself. I'd take the
originals to Kinkos and run off twenty-five or thirty copies at a time. It
was an affordable, part time hobby. Two hundred and fifty copies,
however, is quite a different thing. That would cost at least 300 dollars.
Plus shipping. I would prefer, however, to print 350 copies since I sell
back issues and because I need samples. That's at least four hundred and
fifty dollars. For the first issue. With five more needed for 1995. With
no guarantee that the magazine would sell. I could be down over three
thousand dollars in less than a year. What to do? I needed financing, a
small business plan and some advertisers. A scanner to add pictures. And
time to learn how to produce a more readable
magazine.

So, I punted. I put off the distributor. I explained the problems and they
were very nice about it. They would be ready when I was. I thought that
the first of the year would be a good idea. The first national edition,
therefore, comes out in January of 1995. private line is now on a war
footing. We're behind schedule but world domination will begin soon.
We will never put off a major decision again. Instead, every opportunity
will be exploited immediately. private line's staff has dispersed and gone
to ground. This assures the public that the national issue will not be
stopped. We'll come out swinging for the national edition. Speaking of
which, let me tell you about some new things scheduled for the January
issue.

Chris Hall of Executive Protection Associates has agreed to write a
column. He's their Chief Operating Officer. This company deals with,
among other things, industrial espionage and corporate spying. He
helped give a great talk at Def Con. His first column may be on telephone
bugs.

John Higdon will write a column about telecom from a non-corporate
point of view. John keeps alt.dcom.telecom.tech together. It is the most
technically grounded newsgroup. John is a good writer with common
sense. His posts are always informative and independent.

I will add a small column on telephony and the internet. I'll try to list
which resources feature information on communications. The internet is a
great help to learning. Books and magazines are wonderful but limited.
Try to find, for example, a recent American book on pay phones. There
aren't any. But you may find a coin line expert in a newsgroup who is
willing to talk. Many people in these groups have worked their entire
lives in telecom. They have insights and answers that you will not find
anywhere else.

In the meantime, this issue will concentrate less on technical issues and
more on observation and opinion. There is no other way to comment on
Def Con. The January issue will have more real information. There may
be less, however, than in the first two issues because of the space taken
up by the photographs. Still, the information that is presented will be
more understandable than in the past. I wish you all well and I hope you
contribute.

73's

Tom Farley

II. UPDATES AND CORRECTIONS

1. I made a big mistake in the second issue. It's in the Coin First
Coin Line article. In paragraph 3.31 I wrote that ". . . coin first did
contribute something that it is used to this day by every dial tone first
telco pay phone. It's called ground start." Wrong, wrong, wrong. Pay
phones actually use loop start, just like ordinary phones. Pay phones do
use a ground to produce many signals but they do not depend on it for
making the original connection. A pay phone may use groundstart for
origination as an option. Groundstart is the rare exception and not the
rule. Let's go over my mistake. It says something about making
assumptions, the lack of good reference material and about how useful
the internet is.

2. Ground start first interested me because it is unusual. A telco coin
line is different in many ways than a normal subscriber line. That made it
easy for me to think that a coin phone originated a call in a different way.
Fike and Friend stated that "Ground start lines are used on loops
connecting PBXs to the central office, and in other situations where it is
desireable to detect a line that has been selected for use (seizure of the
line) instantaneously from either side of the line." (emphasis added) (1)

3. What were these other situations? Pay phones. A table in
Engineering and Operations in The Bell System describes the various
kinds of loop signaling. It says that coin stations use "loop start or
ground start origination" and that loop signaling may involve "ground-
start format similar to coin service for PBX-CO trunks. (2) Freeman
reprinted this table without comment in his weighty tome. (3) Seemed
like good enough authority to me. The language in the chart, however,
was conditional. It said may. I thought these three sources proved that
pay phones used ground start. All I proved, however, was that pay
phones might use ground start. I never went back to check my notes once
I made my conclusion.

4. There's more. I didn't know why ground start was used. So I
speculated. I thought it tied up switching equipment for less time than
loop start. After all, time was the chief reason why the Bell System chose
coin first instead of post pay at the turn of the century. I described their
decision in the Post Pay article in the first issue. In the second issue I
quoted Bell System literature that detailed how concerned they were with
this problem when they re-introduced dial tone first in 1968.

5. My speculative argument assumed that ground start is quicker
than loop start. Supporting this assumption was Fike's use of the word
"instantaneously" in the quotation previously mentioned. Instantaneously
seizing a line, however, seems to refer to PBX operation; not the "other
situations" that he also mentioned. Seizing the line instantaneously may
prevent an incoming call from displacing an outgoing call with a PBX. It
does not mean necessarily that ground start is faster. I myself alluded
to this in Telco Payphone Basics, Part II.

6. In paragraph 1.71-2(2) I said that DC signals are quick. That's a
chief reason for their use. Ground start is a DC signal just like loop start.
I pointed out that a DC signal traveling at even 60% of the speed of light
would be moving at near a hundred thousand miles a second. What
difference in time would there be, therefore, between ground start and
loop start? Most pay phones are within three to eight miles of a central
office. All DC signals must act as if they are instantaneous. Any
difference in time between loop start or ground start is probably
minuscule or irrelevant or both.

7. That's not all. I used two other facts to bolster my argument that
pay phones used ground start. This part of the argument was also wrong.
The presence of a coin is detected by the presence of a ground. Dial tone
first, I thought, would then utilize ground start as part of its operating
system. Not so. One does not depend on the other. Loop start can be
used even if a ground is used for other things. Reeve clears up all this
confusion in his excellent chapter on Coin Line Services. He says that
"(M)ost prepay paystations are loop start, but many can be optioned for
ground start."(4)

8. I found out about my mistake from alt.dcom.telecom.tech. I got
involved in a discussion about ground start. People commented on why it
was used in PBX operation. No one, however, mentioned pay phones.
So I did. I asked why COCOTs used it and not telco pay phones. A coin
line expert named Jay replied in great detail that both kinds used loop
start. I was rather defensive at first since it went against what I had
written. His comments, however, forced me to go back to my notes. He
was right. He also gave details about coin phones that I have not found
elsewhere. This is what makes the newsgroups so compelling. A
question, though, remains: why would a pay phone use ground start?
Why would a coin line be optioned for this method? I'm still working on
finding this out.

NOTES:

(1.) Rey, R.F., ed. Engineering and Operations in the Bell System. 2d
ed. Murray Hills, N.J. AT&T Bell Laboratories. 1983

(2.) Fike, John L. and George Friend. Understanding Telephone
Electronics. 2d. ed. Carmel, SAMS 1990 191

(3.) Freeman, Roger L. Reference Manual for Telecommunications
Engineering Wiley Interscience. New York 1985 74

(4.) Reeve, Whitman D. Subscriber Loop Signaling and Transmission
Handbook: Analog. New York: Institute of Electrical and Electronics
Engineers. IEEE Press. 1992 223

III AN INTRODUCTION TO LOCAL SCANNING

9. Editor's Note: I hoped to make this article a complete guide to
local scanning but time ran out on me. I had to turn over the entire project
to a local hacker at the last moment. Biff was incensed that I dumped this
on him. He did agree, though, to write the following introduction.

An Introduction

10. Local scanning is a systematic attempt to find interesting phone
numbers. It is a daunting task in many cases because of the number of
numbers. A prefix contains 10,000 possible numbers. A large city may
contain hundreds of prefixes. Even smaller cities have access to a huge
wealth of possibilities. The village of Fair Oaks, for example, uses only
11 prefixes. A local call, for them, however, goes out to a total of 149
prefixes. That's 160,000 possible numbers to investigate with a local
call. And, of course, that does not include unlisted prefixes, test numbers
or telco numbers. Let's start at the beginning.

Some History

11. The first three digits in a phone number guide the call to the right
central office or exchange. The next four digits direct the call to the right
subscriber in that exchange. Why 10,000 numbers in a prefix? Why not
a thousand? Or 3,425? It's because early switching equipment was
designed that way. Tradition continues it. Step by step equipment was
arranged in banks of one hundred contacts. Each bank or selector had
ten rows of ten contacts. Three banks produced 10,000 numbers.
Smaller communities used two banks. Bigger cities used four. It's easier
to study the old diagram below.

The Big Picture

12. The prefix map on the next page represents a look at one city's
prefixes. It is the logical map to develop if you are interested in your city
as a whole. A better map would be color coded. Cell prefixes would be
printed in one color, pager prefixes another, governmental agencies
would occupy still another. Most prefixes are not dedicated to a single
use but you could note the ones that were.

Getting Started: Some Suggestions

13. This depends on what you want to do. What you're interested in.
If you are in a big city you have hundreds of thousands of possible
numbers to call. Here are some suggestions if you're not sure:

14. a.) The ANAC Angle: Absolutely critical to find. Your first
assignment. ANAC stands for automatic number announcement circuit.
It's a phone number that you call to get the number you are calling from.
Linemen use it to verify the line that they are working on. You can use it
to find the number of a pay phone that no longer has its number
displayed. Among other things. ANAC's are central office specific.
They can vary from one city to another, or even from parts of one city to
another. ANAC lists are scattered about the internet and even on services
like Compuserve. These are lists built on the definitive anac guide article
published in the Autumn 1990 issue of 2600. I did not reproduce it
because it is copyrighted. In any case, these lists do exist and they are
arranged by area codes. You may not find your number. I have not seen,
for example, an ANAC ever listed for 916. So you must search. Many
ANACS revolve around touch tone keys that are close together. There are
a great deal of "2's" and "1's" in the guides. This probably makes it easy
for the lineman to punch in a number quickly.

15. I found the ANAC for my part of town in six tries. It's (916)
211-2222. It was a fantastic piece of luck but I did concentrate on "2's"
and "1's". I had a plan. I may, though, go to Davis and hunt for hours.
If you are really frustrated then get to a 2600 meeting. Post a message to
alt.2600. But try first. And then spread the wealth. I had my local ANAC
up on the net within five minutes of its discovery. There are 800 numbers
that do the same thing. A local ANAC is preferable since it keeps the 800
number from being abused.

16. b.) The Payphone Angle: Telco payphones rely on specific
circuitry at specific central offices. Not all CO's have the hardware to
perform coin line functions. Telco payphones, therefore, have been tied
to certain CO's. Your mission, should you decide to accept it, is to map
out the locations and numbers of each payphone in an area near you. You
can investigate them further once your inventory is completed. Here are
some tips.

17. An old Thomas map book works great for noting the location of
each phone. The particulars ought to be logged in a notebook, with the
kind of information I have in my sample sheet on page 55. Do not ignore
the wiley COCOT. Many started out as telco payphones. Many still have
the same number they did when the telco owned them. They may not be
tied to the same circuitry but they do provide clues with their numbers.
Speaking of numbers, an 800 ANAC is sometimes essential to have if the
number is missing. Although ANAC calls are free with most telco
phones, a private phone may charge for the call if it can be completed.
Their automated coin toll service or ACTS may ask you for a substantial
sum. And then you might just get a long distance call and not the number
reading back to you.

18. c.) The Telco Angle: Scanning for telephone company numbers.
Always fascinating. Try the lower end of the biggest, oldest exchanges.
You'll note in your phone book that certain prefixes are tied together. For
example, 440-449 or 451-457. Start out at the bottom of 440. Numbers
like 440-0031, 0041, 0003 and so on. Try the first 100 numbers for that
exchange. Try the top 100 if nothing is there. You'll find tons of
interesting numbers if you are persistent. The bottom of 440, for
example, is like an announcement store. You get recordings like "Due to
telephone company facility trouble, your call cannot be completed at this
time." Or, "Due to heavy calling, your call cannot be completed at this
time." Even the ominous, "There is no charge for this call. This number
has been disconnected as a result of a recent federal court decision and
Pacific Bell's business policy."

19. You'll also find test tones and telco modem numbers in places
like these. You might also pick up the telco name for each exchange.
Someone picks up the line at the bottom of 440 with just the words
"Main" Calling it that makes sense since it is the largest CO downtown.
But who would know what "Ivanhoe" means in the 481 exchange? Well,
I do. The 481 used to be dialed with IV when letters were used. IVanhoe
8349, for example. To this day, the only human you'll find at the bottom
of 481 still answers "Ivanhoe" when he answers the phone. It's still their
name for that exchange. Telco tradition dies slowly if at all. By the way,
you can find a list of these older names at a well stocked local libary.
Look in old newspapers or any locally produced magazine from before
1955 or so. Ads in the back of old high school year books work well,
too.

20. d.) The Answering Service Angle: I've had good results with
this, although I'm not sure what I have. Older, smaller exchanges often
had answering services tied to a particular range. You can still find this in
most cities. Call numbers near existing services. No need to call a listed
number. You'll get answering machines that are actually voice mail
locations, weird tie lines and merchant credit numbers. It's all quite
strange. Perhaps the telcos grouped the answering services together in
order to deal with heavier loads. Maybe it says something about the
switch.

21. e.) The Governmental Telephone System Angle: Always
intriguing. I find it fascinating the way that certain counties arrange their
communications. You get a taste of this on page 63. Each little
community or district needs to communicate with the county seat. Many
times it is simply with ordinary dial up lines. Other times it is most
complex. Best approach is to poach the relevant county phone book in
order to get started.

Logging Your Calls

22. The most difficult part of scanning is keeping your records
organized. It's just about impossible with paper. It could be done with
the right software, but that is quite a project. Let's look at paper first.
Check out the experimental worksheet on page 55. It's nothing special,
just a table done in Word. The spacing, though, is correct. You need that
much room to make notes. And you need the numbers to be printed out
before you make a call. Don't write down each number as you go. It
doesn't work. Notice how one sheet only covers 100 numbers. One
prefix, however, needs 100 sheets. What's needed is the right equation
for EXCEL. You could then produce the pages needed for a particular
range.

23. An electronic logging program might be the best thing but I'm not
sure it's worth it by itself. If you develop such a beast then you might as
well commit to a war dialer as well. A single program could help place
calls as well as log them. Quite a project. I am uneasy about any program
than scans an entire prefix. You might hassle as many people as a
telemarketer. I think the best scanning happens while disturbing the
fewest people. (As if you are calling to talk to anyone.) I'd like some
comments from anyone interested in local scanning. Hams have a great
deal of logging software that is in the public domain; possibly some of it
could be converted.

Biff

IV DEF CON II REVIEW: FEAR AND HACKING IN LOS VEGAS

24. We were somewhere around Barstow on the edge of the desert
when the cell coverage began to come in . . . The second Def Con was
held at the Sahara Hotel in Las Vegas on the weekend of July 21, 1994.
Three hundred and seventy people attended. At times it was chaotic,
disorganized and anarchistic. I can't wait to go again. Where else can you
hear a discussion of UNIX, cryptography, industrial espionage, and the
Chaos Computer Club in one weekend? For fifteen dollars? There were
some problems. None of them, however, seemed serious enough for me
to be concerned with. Dark Tangent and his people deserve
congratulations for pulling off a great event for the second year in a row.

25. The con got off to a rocky start on Friday night. Mark Ludwig
was to have spoken on UNIX security. But no Ludwig appeared. He
was rumored to be either sick, jet lagged or drunk. No one knew. We did
know, however, that the Def Con people were in trouble. There was no
alternate speaker. One of Dark Tangent's friends tried to stall for time by
telling bad jokes on the stand. There was, however, nothing to stall for.
Audience members themselves arranged a discussion of UNIX after
about a half hour. The con had been hacked. Peter Shipley bravely
volunteered to answer general UNIX questions.

26. You could tell by the audience questions than many in the crowd
knew a great deal about UNIX. Few, though, got up to speak. Peter
did. That deserves credit. Shipley's company is the Little Garden in San
Francisco. It provides internet connections to the greater San Francisco
bay area. His remarks reminded me that I need to learn more about
UNIX. Much of the discussion went right over my head. Still, that is
my fault. English may be the unofficial language of the internet but
UNIX seems to be the official one.

27. Saturday ran more smoothly. Philip Zimmerman introduced
himself by saying in a quiet voice that he had authored Pretty Good
Privacy. The crowd gave him a round of loud applause. Zimmeran talked
about electronic privacy, new developments with PGP and how he was
now the subject of a federal grand jury investigation. It was somewhat
eerie to listen to Zimmerman. An invisible whirlwind of current events
and history surrounds him as he speaks. Hearing him speak was enough
to justify the entire trip to Vegas. At least for me. I won't remember
much of this convention ten years from now. But I will remember that I
saw Zimmerman at Def Con.

28. He talked about designing simpler interfaces to make PGP easier
to use. True point and click routines with graphical interfaces. He also
went to great lengths to explain that the current release of PGP is as
robust as the older version. The new one is slightly different for patent
and legal reasons. He also talked about how close he was to perfecting a
secure voice phone based on PGP routines. You wouldn't need a special
telephone, just your regular computer. Using conventional Sound Blaster
cards and 19,000 baud modems, one could finally talk on a telephone
line in complete privacy. Just so long as the party on the other end has
the same equipment. He also told a story that someone had told him.
AT&T engineers supposedly became depressed upon hearing of his
work. They should be. A cheaper, better system now threatens their
expensive Clipper based phones.

29. Gail Thackeray spoke next. She is now a deputy district attorney
for Maripoca County, Arizona. Her points were poorly delivered and not
well received. Her first stumble came when she seized upon an innocent
example provided by Zimmerman. He said that privacy was simple in the
old days. You just went behind the barn to talk with someone in private.
PGP restored what people had before the days of electricity and
electronics. Thackeray attacked this. She maintained that privacy was
never assured because your comments could always be misinterpreted
and distorted later. What? Zimmerman's point was that privacy used to
be secure during transmission. Thackeray's point dealt with the
conversation after transmission. The two points are not related. Yet she
tried to say that they were.

30. She then trotted out the same tired arguments she related to Bruce
Sterling in The Hacker Crackdown. One is that law enforcement needs
better tracing abilities. A telco once told her that a kidnapper's call
couldn't be traced. This still upsets her. She provided no details about the
incident. I have no idea, therefore, why the company couldn't. I suspect
it may be a problem beyond legislation. Tracing calls from certain
remote places may be difficult or impossible. Arizona and the West in
general have dozens of small phone companies that use simple central
office equipment. These may not pass ANI or automatic number
identification to the toll office. What then? Many CO's support party line
service. How do you know, therefore, if the call is coming from Ranch
A or Ranch B? There are also thousands of miles of open carrier wire and
aerial cable that can be clipped into without detection. Just you, your
lineman's handset and your jeep between, say, Jarbridge, Nevada and
Elko. How does better call tracing help any of this? And why is she
talking about this to us? Talk to a telco, that's what I say. Or give us
some specific information.

31. Thackeray also talked about how encryption works against
discovering the dreaded, mythical nuclear bomber, Her worst fear. The
scenario that she holds us hostage to. The reason that we have to accept
Clipper or some other government imposed encryption standard. Get
real. For better or worse, someone who has a nuclear bomb is already
using encryption, passing notes by hand or delivering plans in a
diplomatic pouch. The issue is moot unless the government makes their
form of encryption the only one that people can use. And only then if
they are prepared to jail people for not going along. Listening to
Thackeray, I am convinced that law enforcement is ready to do that.

32. Her talk really broke down after the first audience question. One
audience member said that he didn't worry about the police reading his e-
mail; the reason that he encrypted was to keep snoopy system
administrators from reading it. A reasonable solution to a common
problem. Thackeray's demeanor changed when she heard this question.
Her voice became strident. She said that she didn't have a problem with
him doing so, for now, but her tone was very condescending. "What"
she seemed to say, "e-mail? I have bigger problems to deal with."

33. Yeah. Sure you do. Until my e-mail interests you and you can't
read it. The audience kept up their questioning. She kept delivering fuzzy
answers. This is the woman who has talked to hackers for years? About
what? What useful information has she given us? Tell me what happens
when I'm arrested. What the process is. The difference between federal
law and state law. What the fines are. The code sections we might be
arrested under. I heard nothing specific. We got philosophy instead.
Great.

34. A central theme to her talk was that we may all have to abide by a
breakable encryption scheme. Why? In order to fulfill a social contract
that she maintains exists between all members of society. The greater
good, that sort of thing. Defined, of course, by her and law enforcement.

35. Well, that's a big subject. One best discussed over many drinks.
In the end, however, I'm not sure that anything useful will be
accomplished, no matter how much philosophizing and talking that you
do. Law enforcement types favor control. Hackers push control away.
No two groups could be farther apart before they start talking. No
amount of talking will bring them together. Communication does not
necessarily lead to acceptance or understanding. Both sides of the
abortion debate, for example, understand each other's position very well.
Neither side, however, will change. Endless arguing may appeal to the
contentiously inclined but I would rather participate in a debate with a fair
chance of winning. Thackeray gamely answered people's questions after
her talk. I got two back issues out of my back pack. "What the hell", I
thought. I'll give her two copies of private line. She did make the effort
to get here. Maybe she'll read my comments on California toll fraud in
those issues. Maybe she'll see that some people are interested in
specifics. As I waited to hand her the issues, though, I heard her say
something to an acquaintance. She said that many in the audience were
very naive and that many had never thought about some of the
issues that she raised. I stepped up and told her that my magazine
contained some naive ramblings about California Penal Code section
502.7 and 502.8. She looked a little lost at hearing Penal Code cites in
this strange setting but she did thank me. The Con raced on after this.
There were some canceled talks but other people stepped in. The
following is a loose collection of notes on some of the more interesting
speakers. In no particular order.

36. Stephen Dunnifer of Free Berkeley Radio gave an interesting,
politically charged talk on micro-broadcasting. He's trying to bring radio
to the community and neighborhood level with low power transmitters.
His radios seem well built and designed. Most current circuits don't drift
enough, anyway, to cause interference. His people are currently fighting
the FCC to loosen restrictions on licensing. Starting a radio station today
means tens of thousands of dollars. And then what do you get? A
monolithic station that doesn't serve an area very well. KFBK in
Sacramento, "the flame-thrower of the Central Valley" seems to cover
Carmichael only when there is a murder. No local news. Dunnifer's
people will go to court to change things. As a ham I feel that the FCC
will never move away from the present system without that court order.
Dunnifer thinks that changing the system through legislation is
impossible. He's probably right.

37. Padgett Peterson talked about viruses and computer security. He
has been involved with computers since the 1950's. He's done quite a bit
of work for the military including all sorts cryptography projects.
Peterson spoke with a quiet authority. He seems to see the Big Picture.
He knows how things work. Most of us are trying to figure out bits and
pieces of the puzzle a little at a time. He has worked full time in computer
related fields for over 30 years. He says, for example, that a DOS
computer gives him everything he needs. Doesn't need UNIX to do
anything. But that's because he knows UNIX already. He can make that
kind of decision because he knows both systems. As a beginner I don't
think that I can put off learning UNIX even though he says it isn't
necessary. I'll probably stick to basic commands, though, and let it go at
that. Peterson also talked about how viruses were changing. He said that
many people say they are developing viruses to learn more. If so, he
said, then viruses should become harder to find yet easy to remove once
discovered. The reverse is true. Today, he said, viruses are just as easy
to discover but they are much more difficult to get rid of.

38. Winn Schwartu gave a fascinating talk on electronic security,
state sponsored corporate theft, HERF guns and EMP/T bombs.
Among other things. I might have thought he was a charlatan but I think
he is the real thing. I overheard him talking about electromagnetic pulse
weapons at lunch to his friends. He was trying to explain the technology
to his friends with the enthusiasm of a little kid. In other words, he really
enjoys his work. He's written a few books but he didn't push them on
anybody. He hardly mentioned them at all. I respect the discipline that
that takes. He also hung around the con for the entire weekend, unlike
some speakers who came in and left quickly. His just wrote Information
Warfare: Chaos on the Electronic Superhighway.

39. Dead Addict offered some home spun philosophy about the
electronic future. I think DA's real contribution to Def Con were his
frequent questions about better interfaces. He seemed to ask every
programmer about how they would develop a program that was easier to
use. I think we all assume that programmers are working on better
GUI's. It's not a bad idea to have someone make sure.

40. Dr. Mark Ludwig talked about viruses, file security and on being
a citizen of the world. He writes a quarterly on viruses. He sponsored a
virus contest just for the convention. Before he gave out the best virus
award he noted a contest rule. He said it prohibited a destructive virus.
"But" he added, "I don't consider the destruction of an anti-virus
program to be a destructive act." I thought that rather clever.

41. He talked about how important it was to encrypt files and to
encrypt them often. He also talked about how we ought to become more
comfortable with travel and distant places. Take cheap flights when you
can to visit different countries. Get used to the idea that you can move
yourself and your work to another place if you need to. I thought this
was a liberating kind of talk. Most of us get used to our surroundings.
He seems comfortable traveling to, say, Nigeria at a moment's notice.
He also mentioned a few books that give information on setting up
overseas bank accounts.

42. Chris Hall of Executive Protection Associates, Inc. helped give
an interesting talk on industrial espionage and corporate security. He's
their Chief Operating Officer. There were a lot of security types at the
con. They talked about bugging and wiretaps and showed some
photographs. They made the important point that you really can't do
much about law enforcement monitoring. If they are using a form of
REMOBS or remote observation, then they listen through the central
office and not in a location that you can access or control. Chris will soon
be writing a column for private line.

43. These were just some of the speakers. It seemed that on Saturday
and Sunday someone was always talking. Some people bailed out and
others filled in. I never did catch any talk on cell phones, despite a few
being listed in the program. Still, White Lightning brought along a
custom test set that he uses with his cell work. He patiently answered
questions and demonstrated how the equipment worked. This demo was
out in the lobby but improntu demonstrations happened here and there by
different people. Most were the result of pure curiosity and enthusiasm
for different kinds of technology.

44. I was surprised how socially connected people were. It dispels
the lone hacker myth. Only 30 to 40 people sat by themselves before each
talk. The conferees were young. Most seemed in their 20's with some
generation Y and a few thirty somethings thrown in. Everyone over
thirty, by the way, was deemed to be a Fed.

45. I was also taken by the enormous creativity of the event.
Americans are a creative, driven lot. We are a nation of tinkers,
inventors, gadgeteers and fix it men. It has always been this way.
Thomas Edison, Samuel Morse, Eli Whitney and Elias Howe were all
represented in some small way by all of the people at the con. We push
toward a common goal: understanding. Figuring out how things work.
Motivated for different reasons, perhaps, but motivated none-the-less.
Infuriated when we don't have the information we want. Delighted when
we get that last piece of the puzzle. Only to find, of course, that there is
another puzzle to figure out. I can't think of a better life.

Def Con Info:

e-mail list: majordomo@fc.net with "subscribe dc-announce" in the
body of the
message to join the announcement list. "subscribe dc-stuff" for the
chat list.

FTP : fc.net in /pub/defcon from cyberspace.com.

DT's e-mail: dtangent@defcon.org

Snail mail: DEF CON
2709 E. Madison #102
Seattle, WA, 98112

(DT says that he has tapes of the whole convention for sale. They
consist of (10) 90 minute tapes, $32.90 for a set. He also has some
shirts left: 20 long sleeve white shirts, about 1/2 old style 1/2 new style.
They are three color front, two color back and $22.90 (that extra 2.90 is
for postage))

V. ROAD TRIP TO VEGAS

46. We took the road less traveled. Most people from Sacramento go
down the Central Valley to Bakersfield and then head east to Vegas. That
route looked fast and boring. We wanted slow and interesting. I just put
out the second issue and I was tired. In no mood to rush. So, we took a
criss crossing, zig-zagging route instead. We went over the Sierra
Nevada, down to Bishop and then over the White mountains to Nevada.
A two day trip. We started out by pointing the Jeep east along Highway
16, the old Jackson Highway. It runs into Highway 49, the only true
north south route of the Sierra Nevada foothills. We headed south until
we caught Highway 88, which then strikes north-east over the Sierra.

47. We struck gold quickly on Highway 88 near the Bear River Lake
Resort. Right off the highway was a Northern Telecom pay phone that
ran on solar power. Cool. It even had a locking cabinet around it. The
number is (209 295-9801. A telco with perhaps the most distinctive name
in America operates this pay phone: The Volcano Telephone Company.
They serve a fairly large area in the central Sierra . Three exchanges. Six
thousand lines or so. Their trucks are white with bold blue lettering if
you are keeping a watch. I resisted the temptation to call Belize and took
photos instead. We kept on 88 until it ran into 395. We then headed
south.

48. The next stop was the slightly funky town of Markleeville. Tye
dye clothing. VW buses. CONTEL country. Continental Telephone
Company of California, that is. Pay phone placards suggested that repair
and admin were out of Stateline at Lake Tahoe. CONTEL operated
dozens of step by step offices as late as 1987. One post to a newsgroup
stated that CONTEL installed 5ESS's in many Southern California cities
instead of the less expensive GTD-5's. Enlightened thinking, indeed. I
don't know, though, what kind of switch now serves Markleevile. It
may be a remote instead of a stand alone switch.

49. I do know, however, that 99XX numbers tie most pay phones
together from here to Bishop. Numbers like 694-9994, 9991, 9995 and
so on. Some run in consecutive order. For example, at the top of
Conway Summit on Highway 395 is a pay phone. Right at the 8,138
foot mark. It's number is (619) 647-9964. The next stop is the Mono
Basin National Scenic Area about a dozen miles away The two pay
phones there are 9962 and 9961. What happened to 9963? Probably back
at the one phone I didn't stop at on the way. Might be pretty easy to find
test numbers in this country Stop at the Visitor Center if you drive by
Mono Lake. It's well done. You can learn about tufa. Rain and lightning
over the Sierra Nevada provided a dramatic background as we visited. A
tropical storm had pushed inland from the Gulf Of Mexico. 100 percent
humidity and 85 degrees. Humidity in Las Vegas the next day would be
less than 10%. Next stop was Bishop. The overnight destination.

50. We stayed at the Frau Haus or the Krautz Haus motel I don't
remember. At four p.m. it was hot and humid. Overweight people filled
the pool. The only way to cheer me up was to find a used bookstore.
Which we did. I found a three year old book on telecom for about seven
dollars. This brings up an important point. Many used bookstores in
bigger cities are picked clean when it comes to telephony. Try book
stores in smaller towns as well as antique stores. You may be surprised

51. I passed out after dinner and then woke up around 10:30 p.m.
Time for a night op. I strolled over to CONTEL's corporation yard
downtown. They maintain a big presence in Bishop. You can't miss their
microwave tower as you drive through the city. My intel says that Bishop
is a toll center. This makes sense because Bishop is the largest city in the
southern Sierra Nevada. CONTEL's building may also house the central
office switch for the city. Their corporation yard was spotless and well
lit. Several company trucks were parked at weird angles near the back
door. The building looked occupied. I understand that most toll centers
are manned around the clock. In any case, the highlight of their yard was
a brand new, bright red Snow Cat on a trailer with the CONTEL logo
emblazoned across the side. Great stuff. Made me wish I had some
private line bumper stickers to paste on it. I bet the linemen fight
over who gets to make service calls with this machine during the winter.

52. We took off the next morning to cross the southern end of the
White Mountains into Nevada. You cross these mountains by using
Highway 168. We gassed up in Big Pine first before heading toward the
summit. Count on all gas being 15 to 20 cents a gallon higher than in the
city. We didn't buy any food or drinks in Big Pine. That was a mistake.
The next supplies turned out to be 97 miles away in Scotty's Junction,
Nevada. I'm taking extra water for the jeep as well. Next time. One
problem with these isolated roads is that having a AAA card doesn't help
much. They pay for the first five miles of towing only. Getting stuck
fifty miles up the road might bankrupt your vacation.

53. The road to the Westgard Pass was long and turning. This is the
way to the Bristlecone Pine grove. Some of these trees are over 4000
years old. We didn't look at them because they are twelve miles off the
road near the top of the grade. But we will see them next year when we
return to Def Con. Just takes more planning. This 80 miles of road had
few houses along it. No services. Some ranch houses had electric power
but I did not see telephone cable running out to them. It's odd to think
of people in 1994 who don't have telephone service available. Still, that
is also the situation in some northern California counties as well.

54. The scenery was beautiful, though, and we enjoyed the drive.
Wide vistas of bare mountains and the occasional soda lake. Five or six
falling down houses marked the town of Lida Junction. No stores. I was
confident, however, that there would be something at the junction of
Nevada Highway 95. There was. A cathouse. I told my friend that I
would check things out in the interest of finding her something to drink.
She told me to keep driving. The drive south to Las Vegas was boring
and uneventful. A fiber optic cable runs alongside it. At 7,000 feet the
temperature in the mountains was pleasant. It was now climbing past 100
degrees as we drove down Highway 95. We stopped in Beatty for lunch.
Beatty heralds itself as "The Gateway to Death Valley." Great. This little
town has a strange affinity for mules. Mule Days. Twenty Mule Team.
Borax mining and all that. Expensive mule related t-shirts, sweaters and
key chains. A casino named for a mule. We had a pleasant lunch and then
got back on the road. It was your basic Death Drive until Las Vegas.

55. We got into Vegas after a total of 563 miles. We traveled through
North Vegas first. Many North Las Vegas residents think their town has
an image problem. I understand. Much of this area looks like Telegraph
Avenue South. Litter and street people and 1050 heat. Lovely. I read
now, though, that they are trying to clean things up. The town got
cleaner but busier as we drove. Traffic is very heavy around all the
hotels. We didn't have a detailed map of Las Vegas so we just motored
toward the hotel signs. I'll have a map next year.

56. Next year we'll set aside an even longer block of time for the road
trip. I think that many people could only set aside a weekend for the Con.
That's unfortunate. It makes everything feel rushed. My suggestion is to
think about taking an entire week off next year. That's what I am doing
since I have so much time to plan ahead. I hope to see you there.

The Sahara Hotel ---

57. Dark Tangent would like the Con to return to the Sahara next
year. They are, however, raising the costs dramatically. Dark Tangent
says that they now want $3,000 for the space he needs next year. Here's
a few random notes on the hotel in case we all wind up back there in
1995.

58. The parking lot is a mess. Ignore all signs, parking attendants
and wrong way arrows and drive into the parking garage first. Not the
temporary lot. Park the car but leave your luggage inside. Scope out
things first. The check in line can vary from a few people to an hour long
wait. Get a beer and relax. Jump into line if the wait is short. The
baggage handlers are union, by the way, so you may want to carry your
own luggage.

59. The Sahara is an old casino. It's kept up well but it's been used
hard. The rooms though, are much cleaner and brighter than the rest of
the motel. We registered early and got a room on a top floor. I didn't
hear anything from adjacent rooms. They do check for hotel cards before
you get on the elevators. I think that's a nice touch. I understand,
though, that they won't issue room cards to people under 18 without an
"adult" present. So don't lose your card if you are under age. I thought
there would be more friction between the casino and those under 21. I
really didn't see any incidents. Maybe security was low key but I did not
see anything overt.

60. Driving and parking are such a hassle that you may find yourself
staying at the hotel the whole weekend. If so, food is going to get
expensive. Still, there is a nice cafe near the pool where you can buy
fruit, pastries, milk and sandwiches. It's actually more pleasant than the
restaurants, especially in the morning when you can take your food
outside. Speaking of the pool, the hotel does not keep it open after
dark. That's a shame since the area is so well lit and because the weather
is so hot.

61. Pay per view movies in the hotel room are an overpriced joke.
Seven to eight dollars. The drink specials, though, are a godsend. The
Sahara had Heinekens for a dollar all weekend. They were the savoir of
many, including me. just got an exciting document with a dull name.

VI. A FEW THOUGHTS ON EMS AND 911

62. I just got an exciting document with a dull name. It's called The
Sacramento Regional Fire/EMS Communications Center: Computer
Aided Dispatch and Records Management System. Request for
Proposals. What is it? It's an invitation to bid. The City and County of
Sacramento want to upgrade the communication system that
handles their fire and emergency medical response. The Warner Group
put together for the County a complete description of the existing system
as well as the requirements for a new one. This booklet gives all bidders
the same information. They use this Request for Proposal to develop
their bid. It gives a lot of fascinating, telecom related details.

63. The smaller cities of Sacramento county use Macintoshes and PC
clones to deal with the regional communication center. The larger districts
use mini-computers. The larger districts have dedicated tie lines to the
EMS center. The smaller ones, though, still use normal dial up phone
lines. Galt has a dedicated line but it is over microwave. Galt, in fact,
wins the hacker seal of approval for having their headquarters and their
three fire stations running Amigas! Where do you go, anyway, for fire
dispatch and EMS software for the Amiga? It poorly details callboxes.
Many still exist in downtown Sacramento. Some still use open wire
strung on poles.

64. Alas, these different setups will probably be made uniform with
the new system. Motorola will probably come stomping in with A
Solution. The public will benefit, of course, but I'll miss the thought of
a life saving message racing through the CPU of an Amiga.

65. Speaking of different setups, the Sacramento area has one of the
most patched together 911 systems you can imagine. Cell calls are the big
problem. The 911 center for the county was at capacity when cell phones
came in around 1986. Most phones were then, of course, in cars. It was
decided, therefore, to route 911 cell calls to the CHP headquarters in
Sacramento. The calls from five counties tumble into their dispatch center
with, at times, perhaps three people to answer them.

66. A dispatcher then has to figure out where the person is, often
with a poor description and a panicked caller. There's no address on a
screen like a land line call. Indeed, the dispatchers don't have screens.
Just a phone with keys. The Sacramento Bee had a long article on all of
this on July 10, 1994. In that piece they described a call that actually
happened: 1) A kid got knocked out at a ball game in Placer County,
2) A spectator called 911, 3) The dispatcher determined after three
minutes that the ballpark was in Placer County, 4) The dispatcher notified
the Department of Forestry since they were the agency to pass an
emergency call to, 5) CDF then called the Newcastle Fire Department, 6)
Newcastle Fire then dispatched their medical emergency response team.

67. Normal land line 911 calls, by comparison, go directly to a main
dispatch center. They verify your address with ANI or automatic number
identification They can also send out the appropriate agency without
having to pass off the call. The coming years will streamline the process.
I will not be nostalgic for the days of CDF handling traffic. Write me if
you have some information about the system in your area.

privateline@delphi.com



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT