For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News


TELECOM Digest     Wed, 16 Mar 2005 16:30:00 EST    Volume 24 : Issue 117

Inside This Issue:                             Editor: Patrick A. Townson

    Spain Leads 12-Nation Crackdown on Internet Child Porn (Lisa Minter)
    E-Mail Paranoia (Lisa Minter)
    Ebbers Convicted of $11 Billion Fraud (Telecom dailyLead from USTA)
    VoIP's Next Step: Hearings On The Hill (Jack Decker)
    Lifespan of a Desktop PC? (Lisa Hancock)
    The Lost Lessons of the 1920s and 1930s (Lisa Hancock)
    FTC Goes After Spyware Firm (Justin Time)
    Hosting Content on Zombie Computer Networks (Gareth Morrissey)
    Re: What Happened To Channel 1 (Michael Quinn)
    Re: 3 Verizon Phones - Throw Away or What? (Justin Time)
    Re: 3 Verizon Phones - Throw Away or What? (Joseph)
    Re: 3 Verizon Phones - Throw Away or What? (John Levine)
    Re: Cell Phone Reception (Dean)
    Re: Cell Phone Reception (John Levine)
    Re: Los Angeles Times: Low-Tech Methods Used in Data Theft (L. Hancock)
    Re: Former WorldCom CEO Guilty on All Counts (Lisa Hancock)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

Date: 16 Mar 2005 07:09:54 -0800
From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Spain Leads 12-Nation Crackdown on Internet Child Porn


MADRID (Reuters) - Spain said Wednesday it was coordinating a
12-nation police operation against Internet child pornography and
around 500 arrests were expected.

Police were making simultaneous searches of homes in Spain, France,
Italy, Sweden, the Netherlands, Chile, Argentina, Panama, Costa Rica,
Mexico, the Dominican Republic and Uruguay, the Interior Ministry said
in a statement.

Nineteen people had been arrested so far throughout Spain and
worldwide arrests were expected to total around 500, the ministry
said.

The operation targets child pornography distributed through a
Spanish-language Internet chat room.

Police had found more than 20,000 items containing child porn,
including videos, photographs and MP3 files and had also seized video
cameras and documents, the ministry said.

The investigation began in January when a Spaniard complained to
authorities about "highly aggressive" photographs of very young
children that were available through an Internet chat room, the
Interior Ministry said.

Spanish police monitored the site to find out who was
putting the material on the Internet and tracked down more than
900 connections from all over the world in two weeks.

Spain then informed Eurojust and IbeRed, organizations that coordinate
judicial cooperation in Europe and Latin America respectively.
Investigating judges from all countries involved took part in planning
meetings before Wednesday's swoop.


NOTE: For more telecom/internet/networking/computer news from the daily
media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra . Hundreds of new articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Reuters, Limited.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml



[TELECOM Digest Editor's Note: Is it just me, or do other readers
think that child porn is getting increasingly common? It seems like
every few weeks now, we read where X-hundred people have been arrested
for it. Then before long, another X-hundred more have been arrested.
Whoever said that child porn was a universally disliked crime?  I
think more people are 'into it' than we realize.   PAT] 

------------------------------

From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: E-Mail Paranoia
Date: Wed, 16 Mar 2005 00:00:00 GMT             
 

I love the Toshiba laptop I bought last year. I keep just about
everything related to work, school, and my finances on it. So when I
received an e-mail from Toshiba warning that my model may have a
data-threatening memory defect, I was anxious to find out whether my
machine was affected. A link in the message took me to a Toshiba Web
page, which promised to download a utility to my PC that would check
for a defective memory module. All I had to do was click one button.

But just as I was about to click that button, a doubt bubbled up from
the depths of my digital credulity. Could the whole thing be a scam?
Was I about to download and install a Trojan horse, backdoor program,
or worm? As it turned out, it wasn't a trick: Toshiba really did send
out an e-mail containing an embedded link leading to an executable
file download located at a long, complex Web address. Trouble is,
phishing exploits, browser hijackers, and other online scams often
hook their victims by using similar-looking e-mail messages.

Fortunately, you can learn to spot these e-mail cons by using a
handful of investigative techniques and a boatload of common
sense. Here are some of the ways to tell a genuine message from a
bogus one.

Don't Take the Bait

If you keep just this one thing in mind, you'll protect yourself from
the majority of e-mail attacks: Assume any message could be
malicious. It matters not who the sender appears to be, or whether the
message's corporate logos, artwork, and embedded links look
authentic. It's a trivial matter for scam artists to create fake
messages that contain return addresses, images, and URLs lifted from
the real company's own Web site.

Next, use your newfound paranoia to examine messages critically. If
you don't have an account with Citibank, for example, the company
won't be sending you any account-related e-mail. But even messages
that appear to come from firms you have an account with may not be
real. Remember, your new motto is "Trust No One."

Before clicking a link or taking any action requested in a message,
determine for certain that the message is genuine. Return addresses,
embedded links, and images can be deceiving. Look for dire warnings
and other classic con techniques, undoubtedly accompanied by a link to
a bogus Web site where you'll be asked to enter personal information.

Legitimate e-mails and scams can look very much alike. Both may be
text-based, reasonably well written, and plausible (although phishing
messages often contain typos and poorly composed sentences with
questionable logic). Both also contain real addresses to each
company's Web site. The only difference is that, for example, a
faux-Citibank message also may have a link to a short-lived phishing
site where the unsuspecting visitor is asked to enter personal
information. Rather than providing a link to a specific page, genuine
messages from companies that are savvy to phishing and other online
fraud will generally instruct you to visit or log in to the company's
main Web site.

Another clue: A phishing message may be delivered to an e-mail address
that you don't use with that company or institution. Note that I've
received phishing messages at a widely publicized (and indexed)
address (nettips@pcworld.com), whereas a genuine PayPal message came
to my personal address, which I had previously verified with
PayPal. If you get a message at an address you never registered with
the company, it's fake.

Intuition and a suspicious nature are a good start, but to separate
real messages from bogus ones, you also need to decipher their Web
addresses. In a couple text-based messages I received, all addresses
were plain text, so what I clicked was what I got. Clicking
"https://www.paypal.com" took me to the real PayPal Web site. But
clicking
"http://218.45.31.164/signin/citifi/scripts/login2/index.html" didn't
exactly lead to a Citibank Web site.

One  clue  is   the  string  of  numbers  following   the  URL  prefix
"http://".  Every Web  site resides  at a  specific  Internet Protocol
address,  so, for  example, you  can get  to the  PCWorld.com  site by
typing  65.220.224.30  in  your   browser's  address  bar  instead  of
www.pcworld.com. However, "218.45.31.164" doesn't lead to the Citibank
Web site, even  though the rest of the address  looks like other links
you may  routinely click. The  only way you  can be sure to  reach the
real   Citibank   site   is   to  type   the   domain-name-based   URL
www.citibank.com  into your  browser's address  window  manually. (And
once you do,  be sure to click the Consumer  Alert link that describes
these  fraudulent e-mail  messages.) If  you're not  sure where  an IP
address leads, don't click it.

Substituting a numeric IP address for a domain name in a URL isn't the
only way a malicious message will try to trick you. The address
"www.citibank.com" is the real deal, but "www.citibank.phishing.com"
could lead anywhere. Every domain name ends with a top-level domain,
such as.com,.org,.edu, or a country-specific TLD such as.cn
(China),.uk (United Kingdom), or.ru (Russia). The word just to the
left of this TLD, together with the TLD portion, spells out the actual
domain name: "citibank.com", for example, is all it takes to get to
Citibank's site. When a phisher modifies a domain name slightly, or
inserts a word to the left of the TLD, the link changes. Phishers hope
that you won't know or notice the difference between "pcworld.com" and
"pcworld-gotcha.com" or "pcworld.phishing.com."

E-mail attacks can also use the HTML formatting to conceal the true
destination of links. If a message is composed using HTML, the
underlined link text may not be the same as the actual embedded
link. This was true of the e-mail I received from Toshiba and was one
reason I became suspicious of its origin. Most e-mail programs display
an embedded link's destination URL in the bottom status bar or in a
pop-up window when you hover the mouse pointer over it.

I needed to find out whether the message from Toshiba was genuine; if
it was, I would have to test my beloved laptop for a faulty memory
module. First I entered a likely Toshiba site URL -- "toshiba.com" --
into my browser's address bar; this move transported me to a global
Toshiba site.</p>

After rummaging around awhile, I finally stumbled upon a Web page
describing the same issues noted in the Toshiba e-mail, and using the
same URLs. Voil?! I had my confirmation -- the Toshiba e-mail was truly
legitimate. But I still never clicked the message's embedded link,
going instead through the link on the company's Web site. You can
never be too careful.</p>

Scott Spanbauer is a contributing editor for PC World He writes the
monthly Internet Tips column.

NOTE: For more telecom/internet/networking/computer news from the daily
media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra . Hundreds of new articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Reuters Tech Tuesday, PC-World.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml



[TELECOM Digest Editor's Note: I wonder if most netizens realize the
serious way in which phishing has proliferated. I must get a dozen or
more of these daily in my account here at massis. Since massis is an
old-fashioned style mail service (uses 'sendmail' with text copy) it
is very easy for me to tell where I would be sent to if I clicked on
something by just reading through the html looking at the links which 
would appear if I had been using html and had clicked. It is really
pretty disgusting, the volume of it. It is literally all over the
place. I get them all the time pertaining to 'errors found in my
PayPal account' or 'fraud discovered in my Citibank account' etc. I
don't even have a Citibank account, and my PayPal account does not 
go through massis.  PAT]

------------------------------

Date: Wed, 16 Mar 2005 12:44:15 EST
From: Telecom dailyLead from USTA <usta@dailylead.com>
Subject: Ebbers Convicted of $11 Billion Fraud


http://www.dailylead.com/latestIssue.jsp?i=20104&l=2017006

TODAY'S HEADLINES

NEWS OF THE DAY
* Ebbers convicted of $11 billion fraud
BUSINESS & INDUSTRY WATCH
* Qwest to raise MCI bid
* RIM settles patent lawsuit
* TiVo shares soar 75% after deal with Comcast
* Differences between Motorola, Apple forced iTunes phone delay
USTA SPOTLIGHT 
* In the Telecom Bookstore: Broadband Facts
EMERGING TECHNOLOGIES
* SureWest jumps into TV game
REGULATORY & LEGISLATIVE
* SEC charges former Qwest CEO and other former executives

Follow the link below to read quick summaries of these stories and others.
http://www.dailylead.com/latestIssue.jsp?i=20104&l=2017006


[TELECOM Digest Editor's Note: Situations like this are the main
reason I could _care less_ if people happen to rip off the 'telephone
company' a little now and then. I hope old man Ebbers never gets out
of jail; considering what MCI has done rather routinely to the
telephone network since back in the late 1960's.    PAT]

------------------------------

From: Jack Decker <jack-yahoogroups@withheld on request>
Date: Wed, 16 Mar 2005 11:39:07 -0500
Subject: VoIP's Next Step: Hearings On The Hill
Reply-To: VoIPnews@yahoogroups.com


http://www.telecomweb.com/news/1110908201.htm

Voice-over-Internet Protocol (VoIP) technology and carriage is
starting to get additional attention in light of potential rewrites of
the 1996 Telecom Act during the 109th session of Congress, with the
House Rural Caucus Telecommunications Task Force feeling out the
business last week and the House Energy and Commerce Subcommittee on
Telecommunications and the Internet scheduling on open hearing on the
subject tomorrow.

The Rural Caucus' broadband-oriented Telecom Task Force, co-chaired
by Rep. Gil Gutknect (R-Minn.) and Bart Stupak (D-Mich.), followed up
last year's briefings on future telecom challenges facing the rural
United States and universal service fund (USF) issues with a March 9
hearing on VoIP during which carriers and lobbying groups outlined
their positions surrounding VoIP in rural America.

BellSouth Chief Technology Officer Bill Smith underscored VoIP's rural
importance to his company by saying "BellSouth provides service to
more rural customers than all of the independent companies
combined," including in three states via the high cost portion of
the USF program and in six states where it receives no such
support. "With continued broadband deployment, there are now
broadband service applications that can provide people who live in
rural America with a competitive alternative to conventional voice
phone service that is comparable in both quality and functionally and
generally lower in price," he said. "Given the changes in
technology and the right economic incentives, providers will target
more and more areas to provide both broadband and VoIP services to
compete for the consumer's business."

Full story at:


http://www.telecomweb.com/news/1110908201.htm

How to Distribute VoIP Throughout a Home:
http://michigantelephone.mi.org/distribute.html

If you live in Michigan, subscribe to the MI-Telecom group:
http://groups.yahoo.com/group/MI-Telecom/

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Lifespan of a Desktop PC?
Date: 16 Mar 2005 08:24:27 -0800
Organization: http://groups.google.com


Would anyone know what is the average/typical physical lifespan of a
desktop PC?  That is, how many years do they run before components
start failing?

When buying a new PC, how do people typically transfer the contents
from the old PC hard drive to the new PC?  At work, people move stuff
out onto the LAN server or move the old drive into the new box; but
others say old drives are not compatible with new technology.  How do
home users without a LAN handle it?


[TELECOM Digest Editor's Note: I have here a Toshiba Satellite 220-CDS
sine 1995. It started life as Win 95, has since been converted to Win-98
(which I am sorry I did, really, it seems to be running a little
slower than it did as a 95). But it _never_ freezes up, _never_ locks
out; just sits there all day long as part of my network doing its
thing, the same as it did as a 95. Is ten years a rather good life
span? PAT]

------------------------------

From: hancock4@bbs.cpcn.com
Subject: The Lost Lessons of the 1920s and 1930s
Date: 16 Mar 2005 10:56:15 -0800
Organization: http://groups.google.com


In the 1920s there was a terrific economic boom.  Underneath there was
some dark clouds, like that much of the boom was based on 'nothing',
that is stocks that had no real value under them bought on margin
without any real coverage.  But everyone was having such a good time
the naysayers were ignored.

The boom burst.  The securities markets collapsed.  Since so much was
based on nothing, underlying loans and margin accounts collapsed as
well, causing a nasty domino effect throughout the financial world.
Nobody could pay any of their debts in a long chain.  Without any
money, the economy of the world ground to a halt.

In the 1930s reformers of the New Deal attempted to save the system.
The industrialists and financiers were terribly upset since until now
they had done as they pleased and answered to no one.  But without
reform they would end up with nothing.

Sadly, today the descendants of those industrialists and financiers
are pulling the same crimes as was done in the 1920s.

But what is worse is that the regulators and laws that were supposed
to prevent this sort of thing have been forgotten.  We need to be more
"competitive" they tell us as an excuse to allow big monopolies and
concentrated power.  "This will create economic development" they tell
us while laying off thousands of employees with no other place to go.

Had the SEC and auditors been doing their job properly Enron, MCI, and
other fisascos would've been stopped early or not started at all.

But they told us "everyone is having such a good time", so we
shouldn't interfere.

Years ago the power utilities were caught in a scandal with lots of
watered stock in the form of layered "holding companies".  We're going
right back to that today.

------------------------------

From: Justin Time <a_user2000@yahoo.com>
Subject: FTC Goes After Spyware Firm
Date: 16 Mar 2005 06:46:23 -0800
Organization: http://groups.google.com


FTC Goes After 'Phony' Spyware Assassin

Elizabeth Millard, www.enterprise-security-today.com

The Federal Trade Commission has asked a U.S. District Court to bar
Spyware Assassin and its affiliates from offering consumers free
spyware detection scans and from selling antispyware software.

The FTC also is seeking a permanent halt to the alleged "marketing
scam," as well as redress for consumers.

"The defendants' free remote scan is phony, and the defendants'
representations that they have detected spyware on the consumer's
computer are deceptive," the FTC charges.

Bogus Claims About Spyware

In papers filed with the court, the FTC alleges that Spyware Assassin
and its affiliates use Web sites, e-mail, banner ads and pop-ups to
draw users to the company's site.

After dire warnings about spyware, users are offered a free scanning
tool, which inevitably finds "dangerous spyware virus infections,"
according to the company's post-scan pop-up message.

The message advises users to pay for and download Spyware Assassin
software, which does not remove all, or substantially all, spyware, the
FTC alleges. This violates the FTC Act, which bars deceptive claims.

Fraudulent E-Mail on the Rise

As the FTC was conducting its investigation, security firms also were
noticing the rise in Spyware Assassin's antispyware e-mail activity.

Reston, Virgina-based iDefense, a threat-intelligence firm, noticed
the fraudulent e-mails increasing over the past couple of months.

"There's been a dramatic increase in the number of messages from
Spyware Assassin," said iDefense director of malicious code research
Ken Dunham. "We checked it out and found they were bogus."

Unlike prescription drug scams, antispyware protection appeals to a
larger group of people, Dunham noted, because many users have heard of
spyware, but most are unaware of how to remove it.

Larger Spyware Issues

Although Spyware Assassin could be shut down permanently, that does
not solve the deeper issue of user naivete, according to Dunham.

"The larger problem that this highlights is that users are far too
trusting [of] junk e-mail and spam," he said. "There is an issue here
much bigger than this one fraudulent site, and that's user education,"
Dunham added.

Without reliable information being disseminated to users about what is
safe and what is fraud, bogus e-mail claims are likely to proliferate,
noted Dunham.

Rodgers Platt


NOTE: For more telecom/internet/networking/computer news from the daily
media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra . Hundreds of new articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Enterprise Security Today.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

From: garethmorrissey@yahoo.com (Gareth Morrissey)
Subject: Hosting Content on Zombie Computer Networks
Date: 16 Mar 2005 10:44:17 -0800
Organization: http://groups.google.com


Would it be possible to host content on zombie computer networks (like
those used to send out spam)?

Is anybody doing this currently?

The next wave of p2p program? Solves the free rider problem??

Just curious.

------------------------------

Subject: Re: What Happened To Channel 1
Date: Wed, 16 Mar 2005 11:25:21 -0500
From: Michael Quinn <quinnm@bah.com>


Along this line, and at the risk of perhaps being slightly OT, if anyone
knows why television uses channels while radio uses frequencies (for the
most part, that is,  the 88 channel) FM Marine Band in the 156 MHz range
being an exception), I would be interested in hearing about it.

Regards,

Mike


[TELECOM Digest Editor's Note: On radio, there are also 'channels', as
you point out for example in the FM Marine Band, also the Citizens
Band has 'channels'. I think the difference is where 'frequencies' 
refers to a general range of spaces in the spectrum for general
categories of service (radio or television), 'channels' further
divides that group of frequencies into into specific allocations. For
example, we say the 'eleven meter band' (of frequencies) is divided
into forty channels. PAT]

------------------------------

From: Justin Time <a_user2000@yahoo.com>
Subject: Re: 3 Verizon Phones - Throw Away or What?
Date: 16 Mar 2005 06:59:21 -0800
Organization: http://groups.google.com


I believe that you will be able to cancel the service contract with
the return of the phones as you are leaving the country.  You need to
go in to your local VZW store - not an "authorized dealer" and explain
the situation.

Rodgers Platt

------------------------------

From: Joseph <JoeOfSeattle@yahoo.com>
Subject: Re: 3 Verizon Phones - Throw Away or What?
Date: Wed, 16 Mar 2005 08:21:29 -0800
Reply-To: JoeOfSeattle@yahoo.com


On Tue, 15 Mar 2005 16:04:03 -0800, Paintblot <sssssssssssff@ef.com>
wrote:

> I'm permanently leaving the USA in a few weeks. I have a Verizon
> account with 3 telephones, 2 of which are almost new. These phones
> have 2 year contracts. When we leave, what should I do? I cannot take
> them back to Verizon, because all they'll want is the big dollar
> contract buyout, which I won't pay (let them attack my credit, who
> cares, I'm not coming back here). Sell the phones? Aren't they banned
> from continuing to work on the Verizon network, and locked into the
> Verizon network?  Just destroy them and throw them away?

If the contract was not fulfilled or you have not paid the account the
ESNs on the phones will be shown to be in default and no one will be
able to use them.  I'm not sure how contract terms will have any
effect on it though.

On Tue, 15 Mar 2005 16:04:03 -0800, Telecom digest editor wrote:

> [TELECOM Digest Editor's Note: My personal advice, for whatever it is
> worth, is sell them for a few dollars each and get what you can out of
> them. If you know anyone you can generally trust, sell them a phone
> (for ten or twenty dollars?) with the understanding that _they_ can
> continue to pay the bill for the remainder of the contract (or until
> they get tired of paying the bill and/or the phone gets turned off, 
> whichever comes first. PAT]

If you mean pay the charges as if he was someone else that would work.
If you meant taking over the account Verizon would likely require a
credit check.

------------------------------

Date: 16 Mar 2005 18:33:08 -0000
From: John Levine <johnl@iecc.com>
Subject: Re: 3 Verizon Phones - Throw Away or What?
Organization: I.E.C.C., Trumansburg NY USA


> I'm permanently leaving the USA in a few weeks. I have a Verizon
> account with 3 telephones, 2 of which are almost new. These phones
> have 2 year contracts. When we leave, what should I do?

You can sell them on ebay, or you may be able to donate them to a
local charity.  They're locked to Verizon's network, but VZ shouldn't
care if someone else wants to use them on a different VZ account.

Ebay has a page with estimates of how much they're worth:

     http://pages.ebay.com/rethink/cpsz/howmuch.html

I gather that womens' shelters and the like can use old phones even
without service since they can still dial 911. See
http://www.wirelessfoundation.org/CalltoProtect/index.cfm

Regards,

John Levine johnl@iecc.com Primary Perpetrator of The Internet for Dummies,
Information Superhighwayman wanna-be, http://www.johnlevine.com, Mayor
"More Wiener schnitzel, please", said Tom, revealingly.

------------------------------

From: Dean <cjmebox-telecomdigest@yahoo.com>
Subject: Re: Cell Phone Reception
Date: 16 Mar 2005 09:36:39 -0800
Organization: http://groups.google.com


> [TELECOM Digest Editor's Note: On my personal cell phone, which is on
> Cingular Wireless, my latest contract is about to run out, and when
> I was downtown Friday, I went in the Cingular Wireless store and
> talked to the lady about getting a new phone in exchange for renewing
> my contract. There were several hangups, IMO: the newer phones are
> a bit smaller and (a) they would not work with my existing Cell Socket
> device; I use a Nokia 5165, which is an older phone, but it works
> quite well (and, it also works quite well when tied into my PBXtra
> through the Cell Socket) ... (b) the picture quality on the newer
> phones, while it has gotten better, _still_ has a way to go before the
> picture quality is as good as an inexpensive digital PC camera, and
> (c) the lady told me unlike Cingular Wireless text messages, to send
> a picture costs more money, around 40 cents per transmission. If there
> was a way to avoid that transmission charge (for example by somehow
> transferring the picture directly to my computer, then using my own
> email to move the picture around, I might be inclined to get a new
> phone and try it. PAT]

Pat,

Getting pics from the cell phone to the PC generally depends on the
device. If you don't take too many pics, I've found the cheapest way to
be to use a cell phone with an infrared port. Then all you need to do
is send the images to the laptop via its infrared port. Costs nothing,
but can only be done one image at a time. There are fancier ways
(bluetooth, special cables and special software etc) but this is the
cheapest I've found. 

Regards,

Dean

------------------------------

Date: 16 Mar 2005 18:22:12 -0000
From: John Levine <johnl@iecc.com>
Subject: Re: Cell Phone Reception
Organization: I.E.C.C., Trumansburg NY USA


>> Go visit the forums over on http://www.howardforums.com/, the
>> phone hackers there ...

> I really don't think those who contribute to Howardforums would
> appreciate you calling them *hackers!* Would you like someone to call
> you a hacker?

Sure.  Among people old enough to understand, it's a term of respect.

Perhaps you're confusing it with "cracker" or "script kiddie".

R's,

John

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Los Angeles Times: Low-Tech Methods Used in Data Theft
Date: 16 Mar 2005 10:44:50 -0800
Organization: http://groups.google.com


Marcus Didius Falco wrote:

> Low-Tech Methods Used in Data Theft
> By David Colker
> Times Staff Writer

> Executives at besieged information broker ChoicePoint Inc. have said
> they had no idea how vulnerable the company was to the identity thieves
> who recently tapped into personal data on 145,000 Americans, igniting a
> national furor over privacy.

The network news showed the congressional hearings.  The CEO appeared
before Congress and came off as a total boob.

These companies were greedy, collecting extremely sensitive and
personal information for corporate use -- use that would seriously hurt
many of us every day people in our jobs and business dealings.
Corporations use the information -- true or not -- to justify price
increases or lower salaries on the grounds the person is a "bad risk".

I was shocked to learn that bad credit history can prevent someone
from getting a job and making them pay more for insurance.  So someone
in bad straits is pushed down by their system even lower -- someone
unemployed can't even get a job and has to pay more for vital
services!

There apparently is virtually no regulation of the collection or
dissemination of the information.  If something is inaccurate, I can't
help but wonder that the private person has a really tough time
demonstrating otherwise, especially when they don't learn about it
until years later.

On top of it all, they are sloppy with their security and let stuff
get stolen.

If it were up to me:

1) Their own credit report would be free to consumers.
2) When any time seriously adverse information is posted
   to a person's file, the credit company would be required
   to notify the person and allow time for a response.  The
   consumer should be able to challenge such adverse information
   and the burden of proof to be on the reporter, without any risk
   or penalty or cost to the individual person.
3) Any time a business requests credit info the consumer is to be
   notified.

("Credit info" to all personal info about a person, not just
financial.)

Obviously these companies would howl in protest.  The news said they
spent millions lobbying against any regulation in the past.  But I
suspect these companies are quite profitable and the costs of
accomplishing the above would be modest.  It would also cause credit
reporters to be more careful and have better internal procedures and
controls (which are sorely lacking today) and they'll protest that as
well.

But it is not up to me since I'm not a yuppie nor have access to
million dollar lobbyists.

Is anyone out there on the side of these info bank companies?

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Former WorldCom CEO Guilty on All Counts
Date: 16 Mar 2005 09:51:35 -0800
Organization: http://groups.google.com


Lisa Minter wrote:

> A federal jury in Manhattan returned guilty verdicts on all nine
> counts, including securities fraud, conspiracy and lying to
> regulators; a decision that could send Ebbers, 63, to prison for the
> rest of his life. Sentencing was set for June 13.

He clearly deserves prison.  As CEO, understanding the overall
finances of his company was a very basic legal responsibility.

I don't know where that guy went to school, but my basic
accounting classes they made it quite clear that falsifying
the books was a serious crime, that managers had a responsibility
to understand their records, and how to understand a financial
statement.

Does anybody out there think he -- or others convicted in stock fraud
 -- got a raw deal?

------------------------------


TELECOM Digest is an electronic journal devoted mostly but not
exclusively to telecommunications topics. It is circulated anywhere
there is email, in addition to various telecom forums on a variety of
networks such as Compuserve and America On Line, Yahoo Groups, and
other forums.  It is also gatewayed to Usenet where it appears as the
moderated newsgroup 'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

Email <==> FTP:  telecom-archives@telecom-digest.org 

      Send a simple, one line note to that automated address for
      a help file on how to use the automatic retrieval system
      for archives files. You can get desired files in email.

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #117
******************************

Return to Archives**Older Issues