Why Anonymous Phone Cards Aren't

Here is extracted testimony of the FBI, relating to the tracing of a telephone debit card found in the possession of Timothy James McVeigh.

The card had been purchased in the name of Darryl Bridges, an apparently fictitious person, from a right-wing newspaper called The Spotlight.

It was the government's contention that the card was used to call for bomb making materials and transportation in the months prior to the bombing of the Oklahoma City Federal Building on April 19, 1995.

May 7th, 1997 
in the UNITED STATES DISTRICT COURT 
FOR THE DISTRICT OF COLORADO
Criminal Action No. 96-CR-68 

(...) 

THE WITNESS: My full name is Frederick Raymond Dexter, D-E-X-T-E-R. 

(..) 

DIRECT EXAMINATION BY MR. MACKEY: 

(...) 

Q. For whom do you work? 

A. I'm employed by the FBI. 

Q. And how long have you worked for the FBI? 

A. A little over 23 years. 

Q. Has that 23 years of experience been largely dedicated to a single area of specialty? 

A. Yes. The majority of my work has been working with - stationed in Washington, D.C., but working with field 
   offices on major cases doing all kinds of automation work, always in the data-processing area. 

(...) 

Q. Are you a special agent? 

A. No, I am not

(...) 

Q. What is your current position? 

A. I'm the unit chief of the Investigative Intelligence Support Unit. 

Q. And in that position, do you supervise or oversee other computer specialists? 

A. Yes, I have 23 - approximately 23, maybe 24, computer specialists that work for me. 

Q. Tell the Court and the jury a little bit about your present-day duties. 

A. The unit supports automation efforts for the FBI in many program areas. One of our tasks is to support major 
   case investigations throughout the United States. When records are subpoenaed or whatever, we automate those 
   records to support the analysis for agents in the field. That's one of the tasks. 

(...) 

Q. What sort of positions have you held in that field or in that unit over your 23 years? 

A. When I came to the FBI, I was a programmer, wrote software for all kinds of investigations, white-collar 
   crime, investigations in the early 70's through the mid 70's. And I became a computer systems analyst, which 
   I was in charge or the team leader over some computer programmers. Then I became a project manager over that 
   continued group and advanced through the same unit until where I am today to be the unit chief. 

Q. In the course of those years prior - prior years, have you had the task of organizing, managing, and 
   understanding large volumes of telephone records? 

A. Yes, I have. In some cases, numerous cases, UNABOM investigation, the Judge Vance murder investigation in 
   Alabama, World Trade Center investigation, numerous other investigations. I managed, analyzed, and helped 
   write software to the tune of millions of records in - in numerous cases.

Q. And did such a task, although on a smaller scale, fall to you in this particular investigation? 

A. Yes, it did. 

Q. Tell the Court exactly what your assignment was as it relates to the present case. 

A. My task which I was assigned around June I was to obtain records from WCT in California and take those 
   records - all of the records that were needed and produce what would be an intelligible, easy-to-read summary
   of calls that were made against the debit card. 

(...) 

Q. I want to spend a little time now, Mr. Dexter, acquainting the court and the jury with the steps that you 
   took in order to (...) produc(e) that summary. (...) 

A. When I visited with the people from WCT initially, I found out that there were three sets of records from 
   them. (...) I took those records and put them together. In addition, there was other information that was 
   needed. There was a particular area of the country that did not pass the "from number" to the WCT place, so 
   those records had to be subpoenaed and merged in with them. Once the telephone numbers were identified that 
   were either originating numbers or terminating numbers, then the subscriber data had to be subpoenaed and then
   merged in with those records or matched to those so that we know who the subscriber was of that telephone at 
   the time that the phone calls were made. 

Q. Let's turn your attention to a series of computer disks that should be before you marked as 509, 513, and 511.

(...) 

A. (...) (l)et's talk about 509 first. 509 is the incoming information into the WCT switch that is referred to a
   lot of times.You may have heard 3911. That is the information as it comes into the switch. The last set of 
   disks that we obtained from them is the 3910 records, the file that they refer to as 3910, and that is the 
   information of calls that are answered. If a call is not answered, then it would not be on these disks.

(...) 

A. When a phone call is made in the left-hand comer there, you will see that the - the information - or when you
   dial the number, it goes to your local phone company. If you dial an 800 number and the other seven digits, 
   that phone call will then go to NASC, the Number Administration and Service Center, for routing. And at the 
   NASC, every time a call comes in there - there's one of those that's located somewhere in the United States. 
   Every time a local phone company gets an 800 call, they send it to that place. It does a query for that local
   phone company, and it determines the routing for how it goes to the destination that it needs to go to. 

Q. Let me interrupt and ask you, are you familiar with who man-aged the 800 number for the Spotlight debit 
   calling card system? What company? 

A. WCT (...) (m)anaged the - the information for them. 

Q. All right. Thanks. 

A. The - the routing on this particular chart that we have up here shows that the NASC routed it directly to the
   switch at - the Los Angeles switch, as the title says. So it would go then to WCT. Within the red box is a 
   switch that is at Los Angeles, WCT's location. The information would come in on the left side into (...) the 
   3911, the incoming call group. (A)t that point, certain information is captured. (...) It logs, as it comes 
   in, the date, the time, the number of the telephone that sent (...) the call to it. And at that point, it is 
   assigned a particular number to follow its way through here. (...) (I)t then passes the information to OPUS. 
   (...) There's a message that goes back to the caller and says, "Thank you for calling Spotlight," if that's 
   who it is, or whatever debit card they handle. WCT handles many debit-card systems or debit-card customers, 
   and it welcomes them and it says, "Now would you put in your PIN number and also put in the 'to number.'" If 
   you put in the "to number" right away, it doesn't come back and tell you how much is on your balance. 

(...) 

A. In fact, (...) when you make the call to the local phone company, they create a record right there of the 
   date and time of that call, and much information is done there. Then as it passes through the 3911, it 
   captures the information there. A computer captures that Once a person puts in a PIN number and their "to 
   number," it would be then passed down (...) to make sure there's some money in the account that you can make 
   a call..(...) It goes to one of the four computers down on the bottom from the servers in the middle and one 
   of the four computers or processors. The 3911 is hardwired. A lot of wires go down and wires go to each one 
   of those four (computers). And we'll refer to those as Processor 1, 2, 3, and 4 later on. Once the OPUS has 
   those records, it then sends the information up - back to (...) the WCT switch, to the 3910 and the number is 
   dialed to go out to wherever you're calling. And when you do that, the information again is collected at the 
   3910 (...) Then the information goes to a local phone company and your phone rings. If you pick up the phone 
   and answer it, (...) when you hang up, then a record is completed at the 3910. If you didn't answer the 
   phone, no record is actually written at the 3910. When you hang up the phone, records are written (...) at 
   each one of those locations. 

Q. All right. As I understand your testimony, information is gathered in each of those three boxes, 3911, OPUS, 
   and 3910. Is that information always the same? 

A. There are certain pieces of information in each one of those files that are collected. The date is collected 
   in each one of those files. There is a time that is collected in each one of those files. That time obviously
   isn't the same in each one of those files because it's a progression thing. When you dial the 800 number, the
   3911 captures that. It's a little bit later when you put in the PIN number and the "to number," at the time 
   you captured down in the (...) OPUS record, and then it's a little bit later, like a second later, that it 
   would get captured in the 3910.

(Testimony presented out of sequence, for clarity)

Q. Incidentally, Mr. Dexter, in this diagram, there are names associated with the subscriber number. When you 
   were working with the data, did you have any subscriber information? 

A. When - when we worked with these three files, I had no subscriber information. And it was not until we had 
   totally completed the process and handed it to the people to do the subpoenas for the particular numbers, 
   which then they came back, that any of these numbers were identified or known to me. I did not know any of 
   those numbers during the matching process. 

Q. So as you were identifying choices for matches, you had no idea whether one of those choices was a name 
   associated with the investigation or not? 

A. I did not. 

Q. You had numbers only? 

A. Numbers. Dealt strictly with numbers. 

(Second piece of testimony presented out of sequence)

Q. Mr. Dexter, can you tell the jury what tic time is?

A. Two of the files, the 3911 and the 3910, kept track of the time of day in what they call tics. And what that 
   is is every 3 seconds as the clock goes by, starting at midnight, it adds one to a counter on the switch. So 
   after - if you happen to look at a record that had the beginning tic time of 20 in it, you would multiply 
   each one of those tics by three and you would know that it's actually 60 seconds or one minute past midnight.
   If you were to took at a record that had 1,200 tics in it as the starting time, then you would multiply 1,200
   by 3 and have 3,600 seconds past midnight. In the computer, we put in an algorithm to figure out - to convert
   that to clock time so everybody could understand it, because looking at tics doesn't mean anything to anybody.
   It's a very simple algorithm in that once you've multiplied by the 3 seconds and know how many seconds it is 
   past midnight - there's 3,600 seconds in an hour, so you just take that number that you have, divide it by 
   3,600, and you have how many hours you are past midnight. Whatever the remainder is, you have that many 
   seconds left You divide that by 60, and you have that's how many minutes you are - that many hours and 
   minutes past midnight And then whatever the remainder is, that's how many seconds there are. And the clocks in
   3911 and 18 kept the beginning and ending time in tics for each one of those. So every record there, when you
   look at it, you automatically had - you could never get finer than 3 seconds because they didn't capture 
   anything other than 3-second intervals. 

Q. And did you use this unit of measure, the tic time, in your preparation of the summary? 

A. Yes, we -

Q. Why did you do that? Why did you rely on tic time? 

A. We were - we were in - in meetings with WCT while they were explaining their records, they explained that 
   there was a field in their records. You've seen the file layout for the 3910, 3911. There's a field called 
   "Time," but that is not the actual time of the call. That was actually time of the customer, where they 
   wanted to be billed. These computers were on the West Coast, but if you were a company that was in Mountain 
   Time, then you would ask for your billing records to be offset one hour so the time in the record that they 
   have under the field called "Time" was not really the time. It was always an offset The tic time was always 
   absolutely the time when a call started and ended according to Pacific either Daylight or Standard Time. 

(End of testimony out of sequence)

(..) 

Q. Now many total records of telephone calls did you have to look at among or from those three disks or three 
   sources? 

A. Without looking at the exact numbers, there was over 100,000 in each one of the files. Approximately - I'm 
   sure we have an exhibit that gives us the exact numbers. 

(...) 

Q. Lets spend a little time, Mr. Dexter, talking about the timing of events. You described three different sets 
   of records, timing of events somewhat dose but maybe never always the same moment Did you find there were 
   different times among the records you were looking at? 

A. Yes, we did. And going back to the chart, the one thing that is common is that every - every call that comes 
   in has to go through 3911. If - if every clock was synchronized on every one of these computers, the computer 
   at the local phone company at the top, that would be the earliest time if they were all in synch. The time 
   that is in the 3911 when it starts would be the next time if they were all in synch. When you get down to 
   OPUS, if all four of those computers had the exact same time on it, then whichever one it went to, that would
   be a little bit later. (...) We're talking milliseconds or a second or two seconds this happens, very quickly
   after a person puts their PIN number and "to number" in. But there can be or usually is a minute or so from 
   the time you put the 800 number in until you get down to the OPUS record, because a person has to put in the 
   PIN number, the "to number," and the processing, etc. It takes that much time. 

Q. And that all assumes that every computer that processes that call has a synchronized clock? 

A. That's correct 

Q. And do they? 

A. There were none of them that were synchronized. 

Q. What did you - what did you do to address that problem of identifying an accurate time of telephone calls? 

A. Well, since - since every call had to go through the WCT switch, no matter where it originated or where it 
   went out, we used that as our constant clock. And then everything we worked with was a difference or a 
   deviation from that particular WCT switch. The clock, by the way, in the 3911 and the 3910 is the same clock 
   because it's in the same computer, the same switch. 

Q. So the first step was to use the same measure of time in pulling together the various items of telephone 
   calls?

A. You use a constant clock, yes.

Q. In this case, you use the clock on the L.A. switch? 

A. Yes. 

Q. Faced with some - more than 300,000 records, what was the first step you took to reconstruct the activity on 
   one account in the name of Daryl Bridges? 

A. The first thing that we did since we knew that the account number is logged into only one of these files, and
   that is the file at the bottom called OPUS or where the debit card records are, we ran a program to go in 
   there and pull off all of the records that were - had been stored in the database using that particular 
   account number. 

(...) 

A. The OPUS file told us how many records there were in the OPUS file by all of the Spotlight customers. This 
   particular exhibit shows us exactly the number of records that were stored in the OPUS file that had the 
   Daryl Bridges account number in each of those records. 

Q. So you could design a computer program to say from the 155,000 plus records, find just those with the Daryl 
   Bridges account number? 

A. That's correct. 

Q. And what you started with then was down to 681 such records? 

A. Correct. 

(..)

METHOD 1

Q. Now, having focused on the Bridges records and the OPUS file, what was your next step in producing the 
   summary? 

A. The next step was to take each one of those records; and by looking at those records, we knew certain 
   information. We knew a lot of information by looking at the OPUS record. We knew the date of the call. We 
   knew the time of the call. We knew the terminating number of the call. We had the account number because we 
   only pulled one account number. And we had a duration that came with the OPUS records. So we had all of those.
   The thing that we needed to match it was - was to find the "from number." The only file that carried the 
   "from number" was, in fact, the 3911. So the first step would be to go in and match each one of those OPUS 
   records, each one of those 8 - 681 records with a corresponding 3911, how it came into the LA. switch. 

(...) 

A. We started with (...) the OPUS file - and the key to matching that up to the 391 I was the port (...) This 
   port has a corresponding port number. And then the date, of course, would have to match the date down here. 
   And the beginning time would match the beginning time here. To match a 3911 record, that was the key fields 
   that you used to match. 

Q. You made reference to associations between ports. What exactly was that relationship? 

A. There is a - I call it a matrix, but it was a process that was developed by WCT and their contractor. If you 
   would envision like 132 electric outlets. And each one of those outlets, you would plug a wire into it. And 
   some of those wires in 3911 would go down to Processor 1, some of those wires would go to Processor 2, and 
   some of those would go to 3 and some would go to 4. On the back of each one of those, it looks like 
   electrical outlets, also. So from the 3911, there is a hard wire that goes from the 3911 down to - and I'll 
   just use Processor 1. On the back of there, there's actually a number. Each one of those electric outlets, 
   ports, have a number associated with it. And when you go down to the processor at OPUS, that has a number 
   associated with it, also. So when a call comes in to the 3911, (...) it goes out of a particular port onto 
   that wire and goes into a port into the OPUS processor; and each one of those are numbered so that it follows
   that constant path, depending on which one of the ports it selected when it came into the 3911. 

(...) 

A. We would start here with an OPUS record. And in that record, we would look at a date, a begin time, and a 
   port. And we would be trying to match that with a 3911 record that has a corresponding port over here. The 
   date would have to match exactly. And since the clocks were not synchronized, we would look for a record in 
   the 3911 that is within 2 minutes of the - of the time in the OPUS record. Then we would take that pair down 
   here, once we find that record, and we - we'd try to find if, in fact, that call was answered. If the call 
   was answered, a record is created in the 3910 file. (...) The other thing is - is the end time in the 3910 
   and the 3911 are the same. They are to within one tic because when they hang up the phone, the WCT switch 
   writes the record out, and it writes it at the same time or within 1 second of each other. So when you find a
   record in the 3910 that the end time matches exactly, you have absolutely locked in on the record. 

Q. Mr. Dexter, how many phone calls did you find took place on the Daryl Bridges account after September 14, 
   1994, and April 19, 1995? 

A. There were 604 calls. 

Q. And how many of those calls were matched in the process you've just described? 

A. Using the LA. switch as this process? 

Q. Yes. 

A. There were - of the 604, there was around 500 of them that were matched in that process. 

(...) 

Q. So of the five fields of information, you relied on the 3911 for start time and called from and for the other
   three, the OPUS source? 

A. That is correct with one exception. The length in the OPUS file, there was always a length of a call. If, in 
   fact, the call was answered, then it was the talk time of the call. If, in fact, the call was not answered, 
   then the duration in the 3910 record was the ring time of the call. So in our summary, if a call was not 
   answered, we wanted to demonstrate that the call was not answered. So therefore, zero was put into the 
   summary. 

Q. Now, the method that you have described and illustrated thus far, did that allow you to match all of the data
   that you have before you? 

A. No. That was the first of three different ways that the information had - had to be matched. 

Q. And what was the second method?

METHOD 2 
(The only difference in the entire process is that original port number is not available in the 3911.) 

A. The second method was if - dealt with information that did not come directly into the Los Angeles switch. 
   When the local call was made and it went to the NASC, the NASC routed that call to a switch other than LA f
   first. And then it would be routed to L.A. so that was the second set of calls that had to be matched. 

Q. And why did the fact that a call might start in the Chicago switch cause any special problems for you in your
   matching? 

A. The - the problem there was - is that in the 3911 record, the information that was captured in each one of 
   the records for a non-L.A. switch carried with it the time that it was and the switch where it came from. So 
   if it was Atlanta, it carried East Coast time. That was stored in the record. Although those 3911 records 
   that came through LA., the time was always Pacific Time. If a switch was not LA., then it - the record carried
   the time of the time zone where that switch was located. 

(...) 

A. (...) WCT had, I believe, six of those switches around the country to help offload. You can't send everything
   to one switch. So they had information there that processed the information and then would send it on to Los 
   Angeles. When the record left the non-LA. switch and came to LA., it would go to the 3911 side and it would 
   go into a port there and the call would be handled within the record, although those records would be created,
   the 3911, the OPUS, the 3910, exactly the same way as the other one except that in the 3911 record, it 
   captured information from the non-LA. switch because they needed it for carrier billing and it didn't capture
   certain information that was available in the LA. switch at that time. So the port that was used in the LA. 
   switch, in fact, was not captured in the 3911 record. (...) In each one of the records, there is a field that
   is called switch, and there's a number in it. If the number is a 10, then we know that record originated in 
   the L.A. switch. If it was - I'll give two other examples. If it was a 2, it was - it told us it was - 
   originated in the Chicago switch. If it was a 4, it originated in the Dallas switch. There was also switches 
   in Philadelphia, Atlanta, San Francisco, and Seattle - I believe that was the other four places. 

Q. So once you knew where that call had started, you knew how many hours to adjust in your calculations? 

A. That's correct. (...) Okay. We would - we would in this case - first, you would have looked for - when you 
   have an OPUS record, you would have looked to see if, in fact, the ports matched over to the 3911. In fact, 
   if it did not, then what you did is you looked for a 3911 record with a - the same date and the same time; 
   but the 3911 had to be adjusted for the number of hours, wherever that switch was. So you would be looking 
   for a record that would be either I - there were no switches in Mountain Time so you'd be looking for a 
   switch - a record that was two hours difference, if it was Central, or three hours difference if it was East 
   Coast Time to do the match there. (...) Once you have matched an OPUS with a 3911 record to match a 3910 
   record, the ports now are available again. So that match guarantees when you go across, you have the OPUS 
   record as it's hard wired up to the 3910. You have that port sequence that follows through. You have the 
   ending tic time, and the 3910 matches the ending time in the 3911. And the "to number" in the OPUS record 
   matches the "to number" in the 3910. So the only difference in the entire process is that original port 
   number is not available in the 3911.

METHOD 3

A. This - this debit card for Spotlight has a process a lot like a lot of debit cards or calling cards that you 
   can make or call a second number without redialing the 800 number again or without putting your PIN number in
   again. And how that works is on the original call, you dial the 800 number. Spotlight answers it and says put
   in your PIN number, put in your "to number." You do all that. The money is available. You connect with that 
   call, talk to the person, or whatever. When they hang up, instead of you hanging up the phone, you can hit 
   the pound sign. And when you hit the pound sign, that then you can dial another "to number," instead of 
   having to go through the whole process of getting into the system again. And you continue to repeat this as 
   many calls as you want as long as you have money in your account that will continue to be subtracted when 
   you're making - calling that particular number. 

Q. What's that feature known as? 

A. We refer to that as the reorigination feature within the calling card.

(...) 

Q. What was the consequence in terms of the records that you had available to match if that person had done a 
   series of reorigination calls? 

A. Well, the - the thing we want to remember is when the 800 number is called, a 3911 is created. (...) An OPUS 
   record is created every time that a "to number" is put in, and a 3910 is created every time a call is
   answered. So if you use the reorigination feature, you end up with one 3911 record created in the file... 
   you will end up with many OPUS records... and you will get a... corresponding 3910 record for each one of 
   those that is, in fact, answered. 

Q. So the answer in 3911 will encompass more than one call? 

A. Yes, it will. 

Q. And then it fell to you to figure out how many steps or how many parts there were to that total sequence? 

A. Yes. 

Q. Did you develop a methodology for doing that? 

A. Yes. And it - it actually worked in reverse. We didn't go in with known 3911's. We had (681) OPUS records. 
   And we matched up all the ones that would match up through the L.A. switch, because you had a 3911. (...) 
   Then what you had is you had a certain number of records that did not match to a 3911. (...) It was very 
   obvious on reorigination records, because once you were into the 3911 record, that port was selected for all 
   of your calls that you made during that reorigination. So every call that you made used the same port in OPUS
   and if it was answered, used the port in the 3910, because you had that electrical connection that it just 
   continued to use that same one path through there all the time. 

(...)

Q. What steps did you take then to calculate the time of calls that took place in the series of reorigination 
   calls? 

A. (...) You always knew the start time of the call because it's (in) the 3911 when it came in. You always knew 
   the ending time of the last call because you have the duration from the OPUS record, whether it's 5 seconds, 
   it's a minute; and you know the ending time of the 3911. So all you have to do is subtract the duration from 
   the end of it. So the last call in the series, you always know what (...) time it was. The one situation 
   where you do not know the start time of the call is if it's in the middle of a series of more than two calls 
   and, in fact, that call was answered. Then you had to come up with and we did come up with a standardized 
   formula to calculate that time, so that it was the same across every reorigination call.

THE COURT. 

(..) What we have to do is caution the jury that these exhibits are not going to tell us who made the
call or who received the call or what was said in the call and that with respect to the subscriber information, 
again, it's simply based on what these phone companies have in their records with respect to who they sent the 
bills to.

Commentary on the Extracted Testimony of Frederick Dexter

The first thing which becomes apparent in the FBI's testimony is that the suspect's use of the card was a misinformed attempt at subterfuge.  The card was purchased with postal money orders in a fictitious name, and was "refilled" by money order twice.  This indicated that the user was attempting to leave no trace of their identity when they used the card to make telephone calls from various locations around the country.

The major failing of this strategy was the continued use of the card for several months and the retention of the card beyond its operational utility.  McVeigh apparently used the card too long, and left the card in the possession of a friend to whom he was easily traced.  The FBI found the card, and thus was able to reconstruct several months of activity on it with only a single breach in operational security.

A more successful strategy would have involved the use and disposal of several prepaid phone cards purchased anonymously at gas stations.  These cards would be used for a few calls each, short of their $10-20 face values, and discarded with the remaining credit intact so that they might be adopted by unsuspecting people.  This would be an impediment to successful tracing even if an account number was obtained by a surveillance agency.  Anyone following the electronic trail would be led astray as the person who found the card went her separate way.

The second lesson which this teaches us is the relative difficulty the FBI has in tracing these cards for ordinary cases or casual surveillance.  The search which produced the card in question and allowed its tracing was conducted by almost 50 agents.  The information used in reconstructing the call activity involved the subpoena of several bodies of evidence, including subscriber records, from each local phone company which handled the calls, as well as from the company which handled the 800 number and debit billing.  Clearly this is not a real-time capability for the FBI, unless the account number is known in advance and the subject is essentially under close surveillance.  From past experience this would only apply to espionage or terrorism cases involving suspects subject to infiltration or agents provocateur.

The third thing which this teaches us is that the records do not actually prove anything.  As the court said in this case, these records cannot show who actually used the card, or what was said, or who was spoken to at the terminating end.  They are primarily of use in inferring guilt, and are thus less useful the less any single card is used.

Return to $2600 Index