ll be able to verify that the trouble has cleared by
reviewing a printout from the host.
When the CRSAB receives a subscriber complaint (i.e., cannot dial 911)
the RSA should obtain as much information as possible while the
customer is on the line.
For example, what happened when the subscriber dialed 911? The report
is automatically directed to the IMC for subscriber line testing. When
no line trouble is found, the IMC will refer the trouble condition to
the SSC/MAC. The SSC/MAC will contact Customer Services E911 Group and
verify that the subscriber should be able to call 911 and obtain the
ESN. The SSC/MAC will verify the ESN via 2SCCS. When both
verifications match, the SSC/MAC will refer the report to the SCC
responsible for the 911 tandem office for investigation and resolution.
The MAC is responsible for tracking the trouble and informing the IMC
when it is resolved.
For more information, please refer to E911 Glossary of Terms.
End of Phrack File
_____________________________________
The reader is forgiven if he or she was entirely unable to read this
document. John Perry Barlow had a great deal of fun at its expense, in
"Crime and Puzzlement:" "Bureaucrat-ese of surpassing opacity.... To
read the whole thing straight through without entering coma requires
either a machine or a human who has too much practice thinking like
one. Anyone who can understand it fully and fluidly had altered his
consciousness beyond the ability to ever again read Blake, Whitman, or
Tolstoy.... the document contains little of interest to anyone who is
not a student of advanced organizational sclerosis."
With the Document itself to hand, however, exactly as it was published
(in its six-page edited form) in Phrack, the reader may be able to
verify a few statements of fact about its nature. First, there is no
software, no computer code, in the Document. It is not
computer-programming language like FORTRAN or C++, it is English; all
the sentences have nouns and verbs and punctuation. It does not
explain how to break into the E911 system. It does not suggest ways to
destroy or damage the E911 system.
There are no access codes in the Document. There are no computer
passwords. It does not explain how to steal long distance service. It
does not explain how to break in to telco switching stations. There is
nothing in it about using a personal computer or a modem for any
purpose at all, good or bad.
Cl
|