Pat, the Editor

For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal   or  

 

TELECOM Digest     Mon, 22 Aug 2005 15:13:00 EDT    Volume 24 : Issue 380

Inside This Issue:                             Editor: Patrick A. Townson

    RSA Security Sees Hope in Online Fraud (Brian Bergstein)
    Amazon Offers Short Stories for 49 Cents (Reuters Newswire)
    Google Bypasses Browser to Scan Hard Drives (Eric Auchard)
    Hacker Underground Erupts in Virtual Turf Wars (Peter N. Spotts)
    Tables Turn in File-Swapping Business (USTelecom dailyLead)
    Re: Local Exchange Not Local in Sylva, NC (Lisa Hancock)
    Re: Local Exchange Not Local in Sylva, NC (J Kelly)
    Re: Two VOIP Boxes on the Same Port (Fred Atkinson)
    Re: Campaigners Prepare to Battle EU Data Storage Bill (Paul Coxwell)
    Re: Hiroshima Marks 60th Anniversary of Atomic Bomb Attack (L Hancock)
    Re: An Exciting Weekend With a Sneak Thief (J Kelly)
    Last Laugh! Doctors are Now Spamming to Get Business (Steven Lichter)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

From: Brian Bergstein <ap-tech@telecom-digest.org>
Subject: RSA Security Sees Hope in Online Fraud
Date: Mon, 22 Aug 2005 10:08:38 -0500


By BRIAN BERGSTEIN, AP Technology Writer

It was a Friday afternoon for the computer encryption folks at RSA
Security Inc., and summertime greenery filled the countryside view
from Art Coviello's office.

Even so, the RSA chief could have been excused if he didn't seem
relaxed.  RSA had just announced its second straight set of quarterly
results that didn't dazzle Wall Street analysts, and RSA's stock was
flirting with a 52-week low.

But Coviello shrugged it off. Analysts, schmanalysts. More
importantly, he said, lots of factors are about to turn in RSA's
favor, namely the need for more secure, traceable financial
transactions in a world beset by online fraud and identity theft.

"The whole thing's moving a lot more slowly than it ought to,"
Coviello said. "We've got to keep pounding and pounding until we reach
a tipping point, and we will take advantage of it."

The lack of an obsession over quarterly results isn't the only unusual
thing about RSA, which still bears the marks of an academic past
despite being a $300 million company with 1,200 employees and
customers in government, banking and health care.

RSA is named for three Massachusetts Institute of Technology
professors, Ron Rivest, Adi Shamir and Len Adelman. Though they are no
longer involved with the company they founded in 1986, their invention
of a seminal method of cryptography set the tone for the company and
is crucial in online commerce.

Today RSA is perhaps best known for staging a prestigious annual
security conference and for selling 20 million little devices that
display a six-digit code computer users must type to gain access to
computer networks.  The code, which changes every minute as determined
by an RSA-created algorithm, is unique to each "SecureID" token,
making it useless to a snoop.

The requirement that users enter the code in addition to a password is
known as two-factor authentication, an approach that figures to gain
ground over simple passwords as more and more sensitive data move
online.

Indeed, RSA's sales of authentication products jumped 16 percent last
year, as RSA's overall profits more than doubled, to $35
million. E-Trade Financial Corp. and America Online Inc. began
offering SecureID devices to some customers over the past year. The
Associated Press also uses the tokens for network access.

"It is the Kleenex or Q-Tip of two-factor identification," said Gregg
Moskowitz, an analyst with the Susquehanna Financial Group. "SecureID
is the brand name."

But wide deployment in consumer applications has come slowly.

In theory, every institution that does business on a Web site could
increase its security by offering its users RSA tokens.

But practically, it would be a nightmare to have 20 different devices
with their own codes. And banks apparently don't trust one another
enough to accept a competitor's authentication token.

RSA hopes to smash such hang-ups by acting as an intermediary,
launching a new "hosted" service this fall in which its servers will
check whether a consumer entered the proper token code -- even if the
token was made by an RSA rival -- then relay the "yea" or "nay" back to
the bank. RSA already provides such a service for companies' internal
access control, but has yet to offer it for consumer applications.

Investors will be watching closely. Although Coviello is confident
that wider trends in access control -- such as rampant identity theft
and abuse of Social Security numbers -- should play to RSA's
strengths, he acknowledges that RSA needs to do more to push the
market rather than wait for it.

That means RSA has to be much more than the company known for
authentication tokens -- a product that some analysts say is coming
down in price because of competition. RSA also hopes to expand its
sales of software and security consulting services, where heftier
rivals such as VeriSign Inc. and International Business Machines
Corp. also lurk.

"When you consider all the identity theft that is taking place now,
the challenge for RSA is to monetize that," Moskowitz said. "It's
easier said than done."

RSA believes one key differentiator can be its research arm, including
the eight people in "RSA Labs," a group so focused on the advanced
mathematics behind cryptography that it is described as an academic
institution within the company.

RSA researchers are expected to dream up ways to expand the use of
two-factor authentication, though sometimes that puts the company a
bit ahead of the market.

One system being developed would use radio-frequency chips in keyless
office access cards so employees wearing one can automatically access
their secured computers as soon as they near them. Such a system would
use a fingerprint reader on the computer to confirm identity. That
product won't be ready, though, for a year or two.

Then there's an effort, led by labs director Burt Kaliski, to give
users a better way to confirm the legitimacy of Web sites -- and avoid
"phishers" who set up phony sites to lure passwords and account
information from the unsuspecting.

Kaliski envisions a system in which Web browsers or even computer
operating systems act as an intermediary between a user and a
site. Through the principles of encryption, the intermediary software
could tell the Web site that the user entered the proper password
without sending the actual password.

In another realm, RSA has created a "blocker tag" that ensures that
radio-frequency identification chips can be scanned only by designated
readers. It could be an elegant answer to the question of whether RFID
chips, which are designed to streamline corporate inventory systems,
might pose privacy risks for consumers. (The chips also are coming to
U.S.  passports, raising fears that American travelers overseas could
be surreptitiously, remotely tracked.)

But for now this and other RFID solutions sit on the shelf, since the
deployment of such tags has been slower than predicted.

"That is the hardest thing for a technology company to do," Coviello
said.  "You have to anticipate a market, not get too far ahead of
customers, but you want to be there when they come around."

But he quickly added: "We've been around 20 years, and I think the
market opportunity ahead of us is richer than ever before."

On the Net:
RSA's security blog:
http://www.rsasecurity.com/blog/about.asp

Copyright 2005 The Associated Press. 

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily. Additional news at 
http://telecom-digest.org/td-extra/newstoday.html

------------------------------

From: News Wire <newswire@telecom-digest.org> 
Subject: Amazon Offers Short Stories for 49 Cents
Date: Mon, 22 Aug 2005 10:01:40 -0500


On-line book store Amazon.com,, in what could be a literary equivalent
of snacking, is now selling short stories, and even alternate chapters
or single scenes from novels, for 49 cents each.

"Amazon Shorts," on sale from Monday, have no printed editions and are
only delivered digitally.

"Amazon Shorts will help authors find new readers and help readers
find and discover authors they'll love," said Steve Kessel,
Amazon.com's vice president of digital media. "We hope that by making
short-form literature widely and easily available, Amazon.com can help
to fuel a revival of this kind of work."

Publishers have always had a hard time selling and marketing the
single, short-form work -- the novella, or the novelette, or the even
shorter "novelini," he said.

Customers can now find Amazon Shorts from accomplished authors, such
as Danielle Steel or Tama Janowitz, in various genres and formats,
including alternate chapters and scenes to well-known stories,
personal memoirs, one-act plays and classic short stories.

No digital rights management software is needed to download and read
Amazon Shorts.

Customers have three options for reading a piece:

-- View now: Takes customers to a Web page to read or print out the
Amazon Short.

-- Download: Initiates the download of a PDF file.

-- E-mail: Sends the entire Amazon Short in a plain-text message to
the specified e-mail address.


Copyright 2005 Reuters Limited.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

------------------------------

From: Eric Auchard <reuters@telecom-digest.org> 
Subject: Google Bypasses Browser to Search PC Drives
Date: Mon, 22 Aug 2005 10:03:40 -0500


By Eric Auchard

Google Inc. unveils a computer and Web search tool on Monday using
self-updating navigation and personal information software that puts
it in more direct competition with Yahoo, Microsoft and AOL.

The creator of the world's most popular Web search system said it was
branching out beyond pure search to help users manage e-mail, instant
messages, news headlines and music.

Google Desktop 2, as the new search software is known, helps users
locate information stored on their own hard disk, on office network
drives they may use and on the Web. Details can be found at
http://desktop.google.com/features/.

The heart of the system is a tall, rectangular "sidebar" with a set of
panels that provide glimpses into the latest "live" information of
interest to the user. It actively learns from each move a user makes
to personalize what is featured.

"We really want to have people be able to sit back and watch the Web
come to them," Nikhil Bhatla, product manager of the Google Desktop
product, said, adding that: "We have tried to provide a lot of
information in a small amount of space."

Innovative features include a headline syndication system that adds
Really Simple Syndication (RSS) feeds of frequently visited sites,
without any special user intervention. Aside from searching the Web,
Google will trawl Outlook e-mail and PC program data like Word, Excel,
Adobe PDFs and instant messages.

"All this information is available at one glance," Bhatla said. "You
don't have to manually do anything," he said. Still, each feature is
designed to be easily customized when desired.

SUBTLE PRESSURE

Step back from the screen and increasingly desktop applets, instant
messaging windows, mobile phone browsers and interactive TV menus all
look alike. Lines are blurring between different ways of navigating
computers, phones and television.

Google is moving beyond "Coke Classic" -- the basic experience of
searching the Web through the browser for which it is known. In ways
not always apparent to the user, Google is seeking to control more of
a users' computer experience, the way Yahoo, Microsoft and America
Online do.

Increasingly for Google, this means that users of its information
management tools will not need such tools from Microsoft or Yahoo, and
vice versa.

The downside is that Google Desktop's powerful information-vacuuming
capabilities can compete for a computer's resources with these rival
programs.

"There seems to be parallel development going on among all the major
players," said Greg Sterling, a Kelsey Group analyst. The major Web
media players all are creating "invisible walled gardens" that are
less open than they first appear, he said.

Google's strategy remains focused on search and information
management, but in small yet vital ways, users are being nudged to
choose sides.

Just last week America Online introduced a new version of its popular
AOL Instant Messenger (AIM) that emphasizes e-mail, radio, Internet
phone-calling, text messaging with mobile phone users, even Web-based
TV.

AIM targets people keen on all the new-fangled Internet
communications.  Yahoo lures entertainment fans and socializers.
Microsoft attracts office workers. Google draws the Web-based
information worker, but covets the other audiences too.

Yahoo offers its own "sidebar" within a user's browser, which manages
music, photos and instant messenger conversations alongside whatever
Web page Yahoo users are viewing. Yahoo recently acquired
Konfabultator, which first popularized the modular programs it calls
Widgets among Apple Macintosh computer users. Google's sidebar is
similar.

In a challenge to Microsoft's dominance of the computer desktop, users
of the Google Sidebar are encouraged to bypass the Windows desktop and
"start" navigation menu. The Quickfind feature allows one to return to
recently used applications or Web sites without extra mouse clicks.


Copyright 2005 Reuters Limited.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

------------------------------

From: Peter N. Spotts <csm@telecom-digest.org>
Subject: Hacker Underground Erupts in Virtual Turf Wars
Date: Mon, 22 Aug 2005 00:31:17 -0500


http://www.csmonitor.com/2005/0822/p01s01-stct.html

Hacker underground erupts in virtual turf wars
A chain of warring virus attacks last week fits an emerging trend.

By Peter N. Spotts | Staff writer of The Christian Science Monitor

In the early days of computer attacks, when bright teens could
bring down corporate systems, the point was often to trumpet a hacker's
success. No longer.

In today's murky world of digital viruses, worms, and Trojan horses,
the idea is to stay quiet and use hijacked computers to flood the
Internet with spam, spread destructive viruses, or disgorge e-mail to
choke corporate systems. Not only can networks of these compromised
computers be leased or sold, experts say, they are becoming more
valuable as the number of vulnerable computers slowly shrinks.

That's a major reason that turf wars are emerging among hackers.
Besides infiltrating computer systems, the viruses are now also
designed to kill any other competing viruses in those systems. These
skirmishes have gone on -- quietly -- for several years. Last week, for
the second time in a little over a year, they exploded into public
view. A worm dubbed Zotob infected computers at major media outlets,
industrial companies, and San Francisco International Airport.

Three days after a Finnish computer-security firm discovered Zotob on
Aug. 14, seven variations were on the loose. Five of them were
designed to delete the initial worms that may have burrowed through
the vulnerable spot in Windows 2000 first.

"We've been seeing an increase in these kinds of battles, especially
in the last three years," says Tom Liston, an Internet security
consultant with Intelguardians Network Intelligence, in
Washington. "We're likely to see more."

Often the battles involve "proof of concept" hacker software, says
Curtis Franklin Jr., a senior technical editor with Secure Enterprise
Magazine. The programs' writers use it to test new techniques, so the
viruses carry no "payloads" that can harm a computer system.

But they can backfire. Indeed, last week's outbreak may be a case
where the hackers "didn't expect this to be quite as virulent as it
was," says Mr. Liston. "You had this thing taking off inside a
network, and all these machines were pounding on each other trying to
compromise each other."

It's not the first time. In the spring of 2004, it was dueling
viruses Bagel, Netsky, and Mydoom, notes Mikko Hyppnen, director of
antivirus research for F-Secure Corporation in Helsinki.

The trio went through several variations. Later versions included
taunts to writers of the other viruses, adds Peter Reiher, a computer
science professor at the University of Southern California at Los
Angeles.

"Years ago, people just wanted access to a machine or to do something
they could brag about," says Dr. Reiher. This led to one-upmanship
among hackers. Indeed, he says, even last year's virus wars may have
been more about bragging rights than control over infected machines. 
But it's clear now that there is some of the more serious activity 
going on as well."

One of the noteworthy aspects of this latest outbreak was the speed
with which Zotob appeared after Microsoft announced it had developed a
fix for the vulnerability Zotob was written to exploit.  While not the
fastest piece of hacker software -- or "malware" -- to hit the streets,
its six-day gestation period beat the current average. "In the last 24
months, the average has gone from 21 days to eight days, and it's
continuing to trend downward," Mr. Franklin says.

One reason behind the increased speed: Malware writers appear to be
using prewritten program "shells" into which they can stuff code
tailored to the newest vulnerability, experts say. Meanwhile,
corporate network managers sometimes have to negotiate with other
parts of the corporation before they can speed up the process of
plugging software gaps.

The biggest concern is over what security specialists call "zero-day 
exploits," when malware hits the Internet the same day that the fix 
for the vulnerability is announced.

Zotob's rise and fall highlights what many see as an increasing
ethical dimension to keep a clean machine, Franklin adds. The viruses
of yesteryear, "where something would get on your system and blow away
your boot sector just doesn't happen that much anymore." Today, the
various forms of malware "are all converging in what they do. It's
either looking to use your system without your knowledge to do
something against other systems, or it's trying to collect information
on you and combine it with information from other people" for use in
fraud or identify theft schemes.

An unprotected computer running Windows XP experiences an average
"survival" time of 26 minutes on the Internet before hackers identify
it as vulnerable, according to the SANS Institute, a cooperative
Internet security organization.

www.csmonitor.com Copyright 2005 The Christian Science Monitor.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily. To read the Monitor on line each day, go to
http://telecom-digest.org/td-extra/nytimes.html and the upper right
hand column of that page.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, The Christian Science Publishing Society.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

Date: Mon, 22 Aug 2005 13:14:52 EDT
From: USTelecom dailyLead <ustelecom@dailylead.com>
Subject: Tables Turn in File-Swapping Business


USTelecom dailyLead
August 22, 2005
http://www.dailylead.com/latestIssue.jsp?i=24019&l=2017006

		TODAY'S HEADLINES
	
NEWS OF THE DAY
* Tables turn in file-swapping business
BUSINESS & INDUSTRY WATCH
* Qualcomm prepares for future
* Report predicts big growth for residential gateways
* Q-and-A with China Netcom's CEO
USTELECOM SPOTLIGHT 
* Enter the digital age with PBX Systems for IP Telephony
HOT TOPICS
* Telcos forge ahead with IPTV
* VoIP growth: Behind the numbers
* Report: IPTV set-top box market overcrowded
* A nationwide Google Wi-Fi net?
EMERGING TECHNOLOGIES
* Video ads served up to mobile phones
* Viacom celebrates "Star Trek" 40th with phones
REGULATORY & LEGISLATIVE
* Telecoms vie for defense contracts

Follow the link below to read quick summaries of these stories and others.
http://www.dailylead.com/latestIssue.jsp?i=24019&l=2017006

Legal and Privacy information at
http://www.dailylead.com/about/privacy_legal.jsp

SmartBrief, Inc.
1100 H ST NW, Suite 1000
Washington, DC 20005

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Local Exchange Not Local in Sylva, NC
Date: 22 Aug 2005 08:22:00 -0700


Fred Atkinson wrote:

> All he should have to do is call their provider and confirm that it
> is a local exchange.

What difference should it make if the number is "local"?

Some of my co-workers live across the street and walk to work.  Some
live in a different state and have a 90 minute commute.  I think every
workplace is like that.

So, in order to call people at home, in some cases they will have to
use long distance.

Anyway, today corporate long distance is so cheap why is that even a
problem?

Years ago when toll rates were expensive, PBX extensions had a
three-tier option:  1) interal PBX calls only (most common, esp on
phones anyone could use), 2) outside local calls only (low level
supervisors, secretaries), 3) all calls (big bosses).

Frankly, I don't see what's changed.  If a manager needs to call you,
he probably has long distance access already.  It's pretty hard to
conduct business today without long distance.

The other issue raised here is keeping switching equipment up-to-date
with new exchanges.  This has been an ongoing problem for years since
the explosion of area codes and new exchanges.  I believe official
bulletins are issued describing new exchanges and where they're
located.  (In the old days the Bell System handled this automatically
internally).  Any organization with a PBX that has internal tables
must subscribe or contract with someone who subscribes to these
bulletins and keep the internal tables updated.  What happens if a
valued customer gets a new phone number and you can't reach them?

------------------------------

From: J Kelly <jkelly@*newsguy.com>
Subject: Re: Local Exchange Not Local in Sylva, NC
Date: Mon, 22 Aug 2005 12:29:34 -0500
Organization: http://newsguy.com
Reply-To: jkelly@*newsguy.com


On Sat, 20 Aug 2005 22:10:16 -0000, bonomi@host122.r-bonomi.com
(Robert Bonomi) wrote:

> In article <telecom24.377.4@telecom-digest.org>, Fred Atkinson
> <fatkinson@mishmash.com> wrote:

>> I recently moved to Sylva, NC to work in nearby Cullowhee, NC (it's
>> about a fifteen minute drive (tops) between the two places).

>> Our local calling area is between three small cities, Sylva,
>> Cullowhee, and Cashiers.  Anything outside that zone is long distance
>> for us.

>> I acquired Voicepulse VOIP service when I moved here.  They offered
>> Sylva and Cashiers, NC telephone exchanges.  I got a Sylva number on
>> the 534 exchange.  It's been working fine.

>> Today, I tried to dial into my home number from work so I could
>> check my voicemail.  I dialed 9 and then 53 and got no farther.  It
>> retuned a busy signal.  We tried it from several different phones
>> and got the same results.  I called the telecom guys and told them
>> of this dilemma.  Despite the fact that I had explained about it
>> being from a VOIP provider, he asked me several times if it was a
>> Verizon exchange.  I told him no, it wasn't.  It was a special
>> services exchange in the Sylva, NC area.

>> He told me he couldn't get it added to the switch without going
>> through a bunch of hoops (a number of people had to sign off on it).
>> I couldn't believe it.  All he should have to do is call their
>> provider and confirm that it is a local exchange.

> Your place of work has a PBX.  Your home exchange is not known to the
> 'dialing plan' for that switch.

> "Company policy" has a problem, regarding handling exchanges assigned
> to CLECs.

> This is not an issue that _you_ need to fight.  See to it that your
> *boss* has your home phone number, for 'emergency' use.

> Make sure said boss knows that you _cannot_ be reached via a 'company'
> phone due to a 'programming problem' in the company's switch.

>> Meantime, my colleagues cannot call me at home (from work) when a need
>> arises.

> Isn't that a SHAME!  <*grin*>

> You cannot be disturbed on your non-work time, because the company you
> work for won't let other employees call and bother you.

> Some people would _pay_extra_ for that kind of an arrangement!  :)

I know I would!  Sign me up!

------------------------------

From: Fred Atkinson <fatkinson@mishmash.com>
Subject: Re: Two VOIP Boxes on the Same Port
Date: Sun, 21 Aug 2005 17:16:33 -0400


> Details of 'fixing' the situation depend on the gory details of your
> set-up.  Do you have multiple IP addresses available to you?  Or only
> a single address?  Are you using DHCP?  Are you using NAT/PAT?
> Depending on those answers, you _may_ be able to do the necessary
> things entirely in the Cisco 831.  Or, you may have to access the
> configuration stuff for the VoIP devices.

No, I only get a single IP address on my Mediacom cablemodem.

Yes and no.  I have a virtual DHCP server in my Cisco 831.  But all of
the permanent devices on my home network have private/static IP
addresses assigned to and programmed into them.

Yes, I am using NAT/PAT.

Can you suggest a solution?

Regards,

Fred

------------------------------

Date: Sun, 21 Aug 2005 23:05:13 +0100
From: Paul Coxwell <paulcoxwell@tiscali.co.uk>
Subject: Re: Campaigners Prepare to Battle EU Data Storage Bill


> Telecom firms and civil liberty groups are readying themselves to
> influence a battle next month between European Union member states and
> the European Commission over rival plans to log calls and emails to
> combat terror.

> A council of EU justice and interior ministers put forward a
> data-logging plan after the March 2004 Madrid train bombs, saying
> retaining such data would help tackle terror and other crime. The
> attacks in London in July revived the plan.

Yet another reason why we in Britain should pull out of the totally 
corrupt and dictatorial EU.


- Paul

------------------------------

From: hancock4@bbs.cpcn.com
Subject: Re: Hiroshima Marks 60th Anniversary of Atomic Bomb Attack
Date: 22 Aug 2005 07:51:47 -0700


jtaylor wrote:

> No, it was not "sleaziness".

> The Japanese government fully intended to stop the peace negotiations
> before the attack occured, but the diplomatic staff at the Japanese
> emabssy was too slow decoding the message sent from Japan.

Geez, so the break off diplomatic relations five minutes before the
attack?  Somehow that makes it ok?  No, I don't think so.

> And it's a diplomat's job to do whatever his government tells him to,
> regardless of whether or not he knows its intentions in advance.

The point is the Japanese government was lying.  Note that its attack
fleet had to leave Japan a week before (it's a big ocean to cross)
under radio silence.

I suppose we could buy their argument that the Bataan death march was
due to a shortage of transport.  I don't.  I suppose we could believe
that the 1930s bombing and rapes of civilians in China was normal
warfare.  I don't.

The Empire of Japan had a run up a long record of atrocities by 1945.
It does not make sense to suggest to give them the benefit of doubt
regarding their cease fire proposals.

It should also be noted that the Japanese military command had a very
selective view of "honor".  They had no problem teaching their troops
to never surrender and to die for the emperor.  But when it came to
saving their own necks, it was another story.  They refused any
serious attempt at surrender because they knew of their guilt in war
trials.

------------------------------

From: J Kelly <jkelly@*newsguy.com>
Subject: Re: An Exciting Weekend With a Sneak Thief
Date: Mon, 22 Aug 2005 12:25:13 -0500
Organization: http://newsguy.com
Reply-To: jkelly@*newsguy.com


The problem with checks is that all I need is your routing and account
number, and guess what?  Those are printed on every one of your checks
in plain human readable numerals.  I can print up new checks on my
computer with any ID on them I want, and your account number.  I can
start passing them around town same as your sneak thief.  And guess
what?  I can easily get a fake ID to match the ID of the person I put
on the check.  Checks are terribly insecure.

On Fri, 19 Aug 2005 19:10:44 -0500, J Kelly <jkelly@*newsguy.com>
wrote:

> A few months back some dirtbag got ahold of my debit card number. No
> idea how.  They debit $500 to a poker website.  I caught it within 24
> hours and had the bank to a hot card.  I was told that FDIC rules
> require the bank to CLOSE an account in which any of the imformation
> is known to have been compromised.  I'm curious why they didn't close
> your account, especially since physical checks were stolen.

> Of course, if they did, and you opened a new account the info would be
> compromised as soon as you write a new check.

> [TELECOM Digest Editor's Note: The sneak thief got two of my
> _original_  boxes of checks, numbered 101 through 125 and 126 through
> 150. They had never been opened, since it is very rare that I ever
> write a manual check. The guy did not get my debit card or any
> access to my bank account otherwise. The bank manager simply noted
> my account 'no manual checks ever written on this account' and said
> she would watch my account for a few days in case Walmart (or some
> other store of that ilk) had gotten a check. No word on that yet, so
> maybe they did not take a check, since the thief would have not had
> any of my identification anyway, which Walmart (hopefully) would have
> insisted on but local merchants probably would not have required since
> so many of them know me and the missing checks _were_ imprinted with
> my address and phone number (but not my SSN).  PAT]

------------------------------

From: Steven Lichter <shlichter@diespammers.com>
Reply-To: Die@spammers.com
Organization: I Kill Spammers, Inc.  (c) 2005 A Rot in Hell Co.
Subject: Last Laugh! Doctors are Now Spamming to Get Business
Date: Sun, 21 Aug 2005 20:01:29 GMT


Thank you:
You will be contacted by one of our Plastic Surgery Consultants within
45 minutes.

TO SHORTCUT THIS PROCESS CALL
1-800-346-8104
NOW TO RECEIVE YOUR FREE CONSULTATION.

1-800-346-8104
Business Hours, Eastern Time:
8:30 a.m. until 10:00 p.m. Monday through Thursday
8:30 a.m. until 9:00 p.m. Friday
10:00 a.m. until 6:00 p.m. Saturday and Sunday
googleAds.com Inc., All Rights Reserved

The only good spammer is a dead one!!  Have you hunted one down today?
(c) 2005  I Kill Spammers, Inc.  A Rot in Hell Co.



[TELECOM Digest Editor's Note: I am not so sure the doctor was spamming.
Based on that opening phrase "thank you; you will be contacted by one
of our consultants within 45 minutes ..." it looks to me more like an
autoreply or auto-ack thing. It would appear someone either clicked on
a 'contact me' button on an ad, or maybe had send email to some
address given for the doctor and (as assurance he got the message) an
auto ack was sent out. I know the people who write here to the Digest
(even if it is spam that did not fall into the Spam Assassin trap)
also get an autoack based on my assuming they were a real, serious
person. Did you receieve any followup email or phone calls from the
staff?  

I had an instance one day where I apparently sent an auto ack to
someone who had 'written' me (well actually they had not written 
me they had spammed me [well actually 'they' had not spammed me, some-
one else unknown to them had done it in their name]) and that person
decided I needed to have my backporch remodeled as a result, and
they wrote back to me saying it was spam and they were go turn me
in to the authorities. I wrote them back in person that time (although
they had gotten a second auto-ack as a result of their actual letter)
and after enumerating what I feel are the better points in my life,
I said it did me good to get abused now and then, and thanked the
person graciously for taking the time to write me. PAT]

------------------------------


TELECOM Digest is an electronic journal devoted mostly to telecomm-
unications topics. It is circulated anywhere there is email, in
addition to various telecom forums on a variety of networks such as
Compuserve and America On Line, Yahoo Groups, and other forums.  It is
also gatewayed to Usenet where it appears as the moderated newsgroup
'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html
  For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308
    and also http://feeds.feedburner.com/TelecomDigest

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #380
******************************

Return to Archives**Older Issues