 
27. What is Caller-ID?
This FAQ answer is stolen from Rockewell:
Calling Number Delivery (CND), better known as Caller ID, is a telephone
service intended for residential and small business customers. It allows
the called Customer Premises Equipment (CPE) to receive a calling party's
directory number and the date and time of the call during the first 4
second silent interval in the ringing cycle.
Parameters
~~~~~~~~~~
The data signalling interface has the following characteristics:
           Link Type:                              2-wire, simplex
        Transmission Scheme:          Analog, phase-coherent FSK
        Logical 1 (mark)              1200 +/- 12 Hz
        Logical 0 (space)             2200 +/- 22 Hz
        Transmission Rate:            1200 bps
        Transmission Level:           13.5 +/- dBm into 900 ohm load
Protocol
~~~~~~~~
The protocol uses 8-bit data words (bytes), each bounded by a start bit and
a stop bit. The CND message uses the Single Data Message format shown
below.
| Channel  |  Carrier  |  Message  |  Message  |  Data       | Checksum |
| Seizure  |  Signal   |  Type     |  Length   |  Word(s)    | Word     |
| Signal   |           |  Word     |  Word     |             |          |
Channel Siezure Signal
~~~~~~~~~~~~~~~~~~~~~~
The channel seizure is 30 continuous bytes of 55h (01010101) providing a
detectable alternating function to the CPE (i.e. the modem data pump).
Carrier Signal
~~~~~~~~~~~~~~
The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to condition
the receiver for data.
Message Type Word
~~~~~~~~~~~~~~~~~
The message type word indicates the service and capability associated with
the data message. The message type word for CND is 04h (00000100).
Message Length Word
~~~~~~~~~~~~~~~~~~~
The message length word specifies the total number of data words to follow.
Data Words
~~~~~~~~~~
The data words are encoded in ASCII and represent the following
information:
   * o The first two words represent the month
   * o The next two words represent the day of the month
   * o The next two words represent the hour in local military time
   * o The next two words represent the minute after the hour
   * o The calling party's directory number is represented by the remaining
     words in the data word field
If the calling party's directory number is not available to the terminating
central office, the data word field contains an ASCII "O". If the calling
party invokes the privacy capability, the data word field contains an ASCII
"P".
Checksum Word
~~~~~~~~~~~~~
The Checksum Word contains the twos complement of the modulo 256 sum of the
other words in the data message (i.e., message type, message length, and
data words). The receiving equipment may calculate the modulo 256 sum of
the received words and add this sum to the reveived checksum word. A result
of zero generally indicates that the message was correctly received.
Message retransmission is not supported.
Example CNS Single Data Message
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
An example of a received CND message, beginning with the message type word,
follows:
04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51
04h=  Calling number delivery information code (message type word)
12h=  18 decimal; Number of data words (date,time, and directory
         number words)
ASCII 30,39= 09; September
ASCII 33,30= 30; 30th day
ASCII 31,32= 12; 12:00 PM
ASCII 32,34= 24; 24 minutes (i.e., 12:24 PM)
ASCII 36,30,39,35,35,35,31,32,31,32= (609) 555-1212; calling
         party's directory number
51h=  Checksum Word
Data Access Arrangement (DAA) Requirements
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To receive CND information, the modem monitors the phone line between the
first and second ring bursts without causing the DAA to go off hook in the
conventional sense, which would inhibit the transmission of CND by the
local central office. A simple modification to an existing DAA circuit
easily accomplishes the task.
Modem Requirements
~~~~~~~~~~~~~~~~~~
Although the data signalling interface parameters match those of a Bell 202
modem, the receiving CPE need not be a Bell 202 modem. A V.23 1200 bps
modem receiver may be used to demodulate the Bell 202 signal. The ring
indicate bit (RI) may be used on a modem to indicate when to monitor the
phone line for CND information. After the RI bit sets, indicating the first
ring burst, the host waits for the RI bit to reset. The host then
configures the modem to monitor the phone line for CND information.
Signalling
~~~~~~~~~~
According to Bellcore specifications, CND signalling starts as early as 300
mS after the first ring burst and ends at least 475 mS before the second
ring burst
Applications
~~~~~~~~~~~~
Once CND information is received the user may process the information in a
number of ways.
  1. 1. The date, time, and calling party's directory number can be
     displayed.
  2. 2. Using a look-up table, the calling party's directory number can be
     correlated with his or her name and the name displayed.
  3. 3. CND information can also be used in additional ways such as for:
          a. Bulletin board applications
          b. Black-listing applications
          c. Keeping logs of system user calls, or
          d. Implementing a telemarketing data base
References
~~~~~~~~~~
For more information on Calling Number Delivery (CND), refer to Bellcore
publications TR-TSY-000030 and TR-TSY-000031.
To obtain Bellcore documents contact:
        Bellcore Customer Service
        60 New England Avenue, Room 1B252
        Piscataway, NJ   08834-4196
        (908) 699-5800
This page was created Wed Aug 11 23:11:21 EDT 1999
Using Linux
 version 2.0.32
 on an i586
	Main Page @ Matarese.com
The Myth of the 2600Hz Detector @ Matarese.com      
Acquiring Account Information @ Matarese.com      
 
Act2! by Symantec @ Matarese.com      
All hacks / Annoyance @ Matarese.com      
 
Alt 2600 Group FAQ @ Matarese.com      
Hacking Angelfire @ Matarese.com      
 
Anonymous E-Mail @ Matarese.com      
Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com      
 
Maintaining Access - Implementing Backdoors @ Matarese.com      
How to Receive Banned Newsgroups FAQ @ Matarese.com      
 
Hacking BBS's @ Matarese.com      
phreaking tutorial @ Matarese.com      
 
The Bluebox @ Matarese.com      
List of Common Bugs @ Matarese.com      
 
Things that go Bump on the Internet @ Matarese.com      
Hacking Calling Cards @ Matarese.com      
 
Expanding the capacity of Caller ID Boxes @ Matarese.com      
      
 
The Matarese Circle @ Matarese.com      
Cops and Robbers | UNIX Security @ Matarese.com      
 
Credit Carding Part I @ Matarese.com      
Exploits FAQ @ Matarese.com      
 
Making Free Calls @ Matarese.com      
FTP Bouncing @ Matarese.com      
 
Hackers Encyclopedia @ Matarese.com      
Hacking from Windows9x FTP @ Matarese.com      
 
Hacking Tripod @ Matarese.com      
Hacking Web Pages @ Matarese.com      
 
How to crack a UNIX password file. @ Matarese.com      
Hacking Servers : A Begginners Guide @ Matarese.com      
 
Hacking Tutorial @ Matarese.com      
Hacking UNIX @ Matarese.com      
 
How to Hack the WWWboard Message Board 2.0 @ Matarese.com      
Hackers Handbook @ Matarese.com      
 
Guide to Harmless-Hacking @ Matarese.com      
All about security holes @ Matarese.com      
 
Hacking Hotmail @ Matarese.com      
]How to Hack from from Harlequin and Archangel @ Matarese.com      
 
Improve security by breaking into your site @ Matarese.com      
Ch1can0 BEOWULF @ Matarese.com      
 
Internet Security @ Matarese.com      
IRC Hacking FAQ by Lord Somer @ Matarese.com      
 
Lan Technology Scorecard @ Matarese.com      
Harmless Hacking - Linux @ Matarese.com      
 
INDEX @ Matarese.com      
Mail Spoofing Explained @ Matarese.com      
 
Microsoft IIS Vulnerability @ Matarese.com      
Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com      
 
Intresting Microsoft Access 7.0 Trick @ Matarese.com      
MS Money 2.0 Back Door @ Matarese.com      
 
Mind Your Own Business (MYOB) @ Matarese.com      
This Hack is for the OptiChat Original Chat Room @ Matarese.com      
 
Internet Outdials @ Matarese.com      
Introduction to the Internet Protocols @ Matarese.com      
 
Analysis of QueSO Performance @ Matarese.com      
Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com      
 
L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com      
Sniffer FAQ V 1.7 @ Matarese.com      
 
SSPING/JOLT patches @ Matarese.com      
WORKING OUT-TELNETS @ Matarese.com      
 
How do I post to a moderated newsgroup? @ Matarese.com      
What You Should Know About Computer Viruses @ Matarese.com      
 
How can I protect myself from viruses and such? @ Matarese.com      
What is a trojan/worm/virus/logic bomb? @ Matarese.com      
 
VMS Info (Password Cracking) @ Matarese.com      
HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com      
 
Using web proxies to disguise your IP address @ Matarese.com      
Dig up hidden CD Keys @ Matarese.com      
 
X-Windows Security @ Matarese.com      
  Copyright (C) 1999 - Matarese.com