FREE BOOKS

Author's List




PREV.   NEXT  
|<   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253   254  
255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   >>  
ll be able to verify that the trouble has cleared by reviewing a printout from the host. When the CRSAB receives a subscriber complaint (i.e., cannot dial 911) the RSA should obtain as much information as possible while the customer is on the line. For example, what happened when the subscriber dialed 911? The report is automatically directed to the IMC for subscriber line testing. When no line trouble is found, the IMC will refer the trouble condition to the SSC/MAC. The SSC/MAC will contact Customer Services E911 Group and verify that the subscriber should be able to call 911 and obtain the ESN. The SSC/MAC will verify the ESN via 2SCCS. When both verifications match, the SSC/MAC will refer the report to the SCC responsible for the 911 tandem office for investigation and resolution. The MAC is responsible for tracking the trouble and informing the IMC when it is resolved. For more information, please refer to E911 Glossary of Terms. End of Phrack File _____________________________________ The reader is forgiven if he or she was entirely unable to read this document. John Perry Barlow had a great deal of fun at its expense, in "Crime and Puzzlement:" "Bureaucrat-ese of surpassing opacity.... To read the whole thing straight through without entering coma requires either a machine or a human who has too much practice thinking like one. Anyone who can understand it fully and fluidly had altered his consciousness beyond the ability to ever again read Blake, Whitman, or Tolstoy.... the document contains little of interest to anyone who is not a student of advanced organizational sclerosis." With the Document itself to hand, however, exactly as it was published (in its six-page edited form) in Phrack, the reader may be able to verify a few statements of fact about its nature. First, there is no software, no computer code, in the Document. It is not computer-programming language like FORTRAN or C++, it is English; all the sentences have nouns and verbs and punctuation. It does not explain how to break into the E911 system. It does not suggest ways to destroy or damage the E911 system. There are no access codes in the Document. There are no computer passwords. It does not explain how to steal long distance service. It does not explain how to break in to telco switching stations. There is nothing in it about using a personal computer or a modem for any purpose at all, good or bad. Cl
PREV.   NEXT  
|<   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247   248   249   250   251   252   253   254  
255   256   257   258   259   260   261   262   263   264   265   266   267   268   269   270   271   272   >>  



Top keywords:

computer

 

subscriber

 
verify
 

trouble

 

explain

 
Document
 

reader

 

responsible

 

document

 

Phrack


system

 

obtain

 
information
 

report

 
published
 
ability
 
fluidly
 

altered

 

edited

 

consciousness


student

 

sclerosis

 
organizational
 

advanced

 

interest

 

Tolstoy

 
understand
 

Whitman

 

English

 

distance


service

 

passwords

 

damage

 

access

 

switching

 

stations

 

purpose

 
personal
 

destroy

 

software


programming

 

nature

 
statements
 
language
 

FORTRAN

 

punctuation

 

suggest

 
Anyone
 

sentences

 

Customer