text
stringlengths
0
1.99k
with the ISDN.
This quote out of the AT&T ISDN Technical reference should give you a good
idea of the impact ISDN will have on hacking and phreaking :
'One example of an enhanced service which has already been included in the
ISDN signaling protocol and will have a fundamental impact on day to day
telecommunications is the provisions of calling party identification.
Calling party ID will help us decide whether or not to answer incoming calls
and will minimize instances of nuisance calls and COMPUTER FRAUD via
telephone.'
Mr. R, our AT&T Supervisor has been attending ISDN Conferences that include
representatives from all the major LD Companies (AT&T, MCI, GTE, LDS, etc..),
the Regional Bells, and other concerned parties. He said quote 'One of the
controlling factors behind The Integrated Services Digital Network is the
simple fact that AT&T, MCI, and other long distance companies are losing
MILLIONS to Phone Phraud.' Once ISDN is realized, so will network wide Calling
Party Identification.
Again, our friend Mr. R will enlighten us on the subject of ISDN Calling
Party ID and a simple explanation of how it will work :
'Right now, when you pick up the phone in your home, Port Isabel South
Western Bell knows that you did. Then, when you dial a number, they know
what number you dialed. So they send that information along to us (the AT&T
Toll Switch). We then send that along through the network to the person you
are calling.'
Of course, there is one transaction between AT&T and a Bell Office at the end
that he left off, but if the person or computer you are calling has ISDN
Calling Party ID service, your originating # will be sent along the DS-1 Line
Interface from Bell to his equipment and show up on his screen after traveling
through the network like Mr. R described.
This is rather simple when you think about it and is one example of how a once
shattered network is working together.
Some Sample CP ID Uses
----------------------
This can be used by large telephone ordering companies to instantly display a
record of that persons credit, previous orders, etc... before the call is even
answered on the attendant's terminal.
When someone logs onto a computer, the originating # is listed on the user log
along with the account name, etc... so that if there is an unauthorized login,
they can contact the authorities to do whatever or monitor that number until
they get enough evidence to prosecute. The same thing holds true with LD
Dialups. They will record the originating number along with the code and bill
making MCI use rather dangerous.
SWB ISDN News
=============
The following article was extracted from The Southwestern Bell Texas
Publication of Telephone Times and is entitled 'User Forum simplifies ISDN' :
" Houston---Houston Marketing employees played show and tell with two customers
and all three groups are better off for it.
Marketing Representatives, with support from Bell Comm. Research, Illinois
Bell, AT&T, and McDonald's Corp. met with Shell and Tenneco to discuss ISDN.
'ISDN is an evolving technology' said Bob Campbell, division manager
marketing business sales. 'It's still in the developmental stage. These User
Forums will give customers input on how it's deployed and what it will look
like.'
ISDN is an all digital network that transmits voice and data messages
simultaneously over a single telephone line.
'The User Forums allow customers to share information on specific problems
concerning implementation, training, customer premise equipment and
applications,' Campbell said.
Linda Hobson, manager marketing administrative and coordinator of the event,
said not only will User Forums be standard practice in Houston, but probably
will become the national standard.
'We're doing it quarterly here, but as more people become interested, we may
meet more often,' Hobson said.
Shell and Tenneco, who have signed letters of intent to purchase ISDN, were
specifically interested in such topics as trial status (SWBT's ISDN trials will
begin soon in St. Louis and Texas), available features, power requirements, and
future enhancements.
'In the past, we bought the available enhancements, then sold them to the
customer,' said Hobson. 'That's changing. We have to find out what the
customer wants, then deliver the service that meets the specific needs'"
That concludes the nice little article which by the way, contained some
interesting little tidbits of information.
Conclusion
==========
ISDN is a VERY complicated plan that will drastically change the
telecommunications scene in this country and abroad. Although AT&T has boasted
in it's Technical Journals of being able to have its ISDN Capable Network
completed by Early 1987, this date seems to keep getting postponed back
according to our friend Mr. R (The AT&T Supervisor) and he is shooting for
large scale ISDN no earlier that late 1988 or 1989. Whenever ISDN does become
reality, people will probably just put out files with lists of computers that
subscribe to ISDN Calling Party Identification, and tell people not to call
them from their home.
I hope you have enjoyed reading this phile on ISDN, I will be on the outlook