For your convenience in reading: Subject lines are printed in RED and
Moderator replies when issued appear in BROWN.
Previous Issue (just one)
Classified Ads
TD Extra News
Add this Digest to your personal
or  
Read Daily Spam News
TELECOM Digest Wed, 28 Dec 2005 18:47:00 EST Volume 24 : Issue 585 Inside This Issue: Editor: Patrick A. Townson Secret Court Modified Bush Wiretap Requests (Stewart Powell) Condi Rice Authorized NSA to Wiretap U.N. Phones, Email (Jason Leopold) Red Cross Hurricane Fraud Theft Substantial; 14 Arrested (Olivia Munoz) Desperate Meth Users Turn to ID Theft via Computers (Greg Risling) Penis Patch Top Spam in 2005 (Reuters News Wire) Businessman in EU Sues in Spam Case and Wins _and Collects_ (BBC NewsWire) Move to Airwaves to $936 Million (Jeremy Pelofsky) Reliable, Easy, and Cost Effective Way to Record Calls? (Phil Earnhardt) Covad, Verizon Settle Their Differences (USTelecom dailyLead) Re: Physically Protecting The Local Loop Network? (Lisa Hancock) Re: Physically Protecting The Local Loop Network? (Rich Greenberg) Re: Payphone Surcharges (was: Unanswered Cellphones) (DevilsPGD) Re: Payphone Surcharges (was: Unanswered Cellphones) (Lisa Hancock) Re: Cell Phone Extenders? (DevilsPGD) Re: Cell Phone Extenders? (Rik) Re: Cell Phone Extenders? (Scott Dorsey) Re: Cell Phone Extenders? (niallgal@yahoo.com) Re: Unanswered Calls to Cell Phones? (Lisa Hancock) Re: What Carriers Does Vonage Use to Terminate Calls? (Tony P.) Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer; other stuff of interest. ---------------------------------------------------------------------- From: Stewart M. Powell <seattlepi@telecom-digest.org> Subject: Secret Court Modified Bush Wiretap Requests Date: Wed, 28 Dec 2005 00:46:40 -0600 http://seattlepi.nwsource.com/national/253334_nsaspying24.html Secret court modified wiretap requests; Intervention may have led Bush to bypass panel. Saturday, December 24, 2005 By STEWART M. POWELL SEATTLE POST-INTELLIGENCER WASHINGTON BUREAU WASHINGTON -- Government records show that the administration was encountering unprecedented second-guessing by the secret federal surveillance court when President Bush decided to bypass the panel and order surveillance of U.S.-based terror suspects without the court's approval. A review of Justice Department reports to Congress shows that the 26-year-old Foreign Intelligence Surveillance Court modified more wiretap requests from the Bush administration than from the four previous presidential administrations combined. The court's repeated intervention in Bush administration wiretap requests may explain why the president decided to bypass the court nearly four years ago to launch secret National Security Agency spying on hundreds and possibly thousands of Americans and foreigners inside the United States, according to James Bamford, an acknowledged authority on the supersecret NSA, which intercepts telephone calls, e-mails, faxes and Internet communications. "They wanted to expand the number of people they were eavesdropping on, and they didn't think they could get the warrants they needed from the court to monitor those people," said Bamford, author of "Body of Secrets: Anatomy of the Ultra-Secret National Security Agency" and "The Puzzle Palace: Inside America's Most Secret Intelligence Organization." "The FISA court has shown its displeasure by tinkering with these applications by the Bush administration." Bamford offered his speculation in an interview last week. The 1978 Foreign Intelligence Surveillance Act, adopted by Congress in the wake of President Nixon's misuse of the NSA and the CIA before his resignation over Watergate, sets a high standard for court-approved wiretaps on Americans and resident aliens inside the United States. To win a court-approved wiretap, the government must show "probable cause" that the target of the surveillance is a member of a foreign terrorist organization or foreign power and is engaged in activities that "may" involve a violation of criminal law. Faced with that standard, Bamford said, the Bush administration had difficulty obtaining FISA court-approved wiretaps on dozens of people within the United States who were communicating with targeted al-Qaida suspects inside the United States. The 11-judge court that authorizes FISA wiretaps has approved at least 18,740 applications for electronic surveillance or physical searches from five presidential administrations since 1979. The judges modified only two search warrant orders out of the 13,102 applications that were approved over the first 22 years of the court's operation. In 20 of the first 21 annual reports on the court's activities up to 1999, the Justice Department told Congress that "no orders were entered (by the FISA court) which modified or denied the requested authority" submitted by the government. But since 2001, the judges have modified 179 of the 5,645 requests for court-ordered surveillance by the Bush administration. A total of 173 of those court-ordered "substantive modifications" took place in 2003 and 2004 -- the most recent years for which public records are available. The judges also rejected or deferred at least six requests for warrants during those two years -- the first outright rejection in the court's history. Attorney General Alberto Gonzales said last week that Bush authorized NSA surveillance of overseas communications by U.S.-based terror suspects because the FISA court's approval process was too cumbersome. The Bush administration, responding to concerns expressed by some judges on the 11-member panel, agreed last week to give them a classified briefing on the domestic spying program. U.S. District Judge Malcolm Howard, a member of the panel, told CNN that the Bush administration agreed to brief the judges after U.S. District Judge James Robertson resigned from the FISA panel, apparently to protest Bush's spying program. Bamford, 59, a Vietnam-era Navy veteran, likens the Bush administra- tion's domestic surveillance without court approval to Nixon-era abuses of intelligence agencies. NSA and previous eavesdropping agencies collected duplicates of all international telegrams to and from the United States for decades during the Cold War under a program code-named "Shamrock" before the program ended in the 1970s. A program known as "Minaret" tracked 75,000 Americans whose activities had drawn government interest between 1952 and 1974, including participation in the anti-war movement during the Vietnam War. "NSA prides itself on learning the lessons of the 1970s and obeying the legal restrictions imposed by FISA," Bamford said. "Now it looks like we're going back to the bad old days again." Copyright 1998-2005 Seattle Post-Intelligencer NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. And, discuss this and other topics in our forum at http://telecom-digest.org/forum (or) http://telecom-digest.org/chat/index.html For more news headlines from the daily media, please go to: http://telecom-digest.org/td-extra/newstoday.html ------------------------------ From: Jason Leopold <seattlePI@telecom-digest.org> Subject: Condi Rice Authorized NSA to Wiretap United Nations Phones and Email Date: Wed, 28 Dec 2005 00:49:26 -0600 Rice authorized National Security Agency to spy on UN Security Council in run-up to war, former officials say Filed by Jason Leopold President Bush and other top officials in his administration used the National Security Agency to secretly wiretap the home and office telephones and monitor private email accounts of members of the United Nations Security Council in early 2003 to determine how foreign delegates would vote on a U.N. resolution that paved the way for the U.S.-led war in Iraq, NSA documents show. Two former NSA officials familiar with the agency's campaign to spy on U.N. members say then-National Security Adviser Condoleezza Rice authorized the plan at the request of President Bush, who wanted to know how delegates were going to vote. Rice did not immediately return a call for comment. The former officials said Defense Secretary Donald Rumsfeld also participated in discussions about the plan, which involved "stepping up" efforts to eavesdrop on diplomats. A spokeswoman at the White House who refused to give her name also would not comment, and pointed to a March 3, 2003 press briefing by former White House press secretary Ari Fleischer when questions about U.N. spying were first raised. "As a matter of long-standing policy, the administration never comments on anything involving any people involved in intelligence," Fleischer said. "So I'm not saying yes and I'm not saying no." Disclosure of the wiretaps and the monitoring of U.N. members' email came on the eve of the Iraq war in the British-based Observer. The leak -- which the paper acquired in the form of an email via a British translator -- came amid a U.S. push urging U.N. members to vote in favor of a resolution that said Iraq was in violation of U.N. resolution 1441, asserting that it had failed to rid the country of weapons of mass destruction. News of the NSA spying on the U.N. received scant coverage in U.S. newspapers at the time. But with the explosive domestic spying report published in the New York Times last week, a closer examination of pre-war spying may shed light on whether the Bush administration has used the NSA for its own political purposes, as opposed to tracking down communications regarding potential terrorist threats against the U.S. The leaked NSA email detailing the agency's spy tactics against the U.N. was written Jan. 31, 2003 by Chief of Staff for Regional Targets Frank Koza. In the email, Koza asked an undisclosed number of NSA and British intelligence officials to "pay attention to existing non-UN Security Council Member UN-related and domestic comms (home and office telephones) for anything useful related to Security Council deliberations." One intelligence source who spoke to RAW STORY said top White House officials and some Republican members of Congress had debated in December 2002 whether to step up the surveillance of U.N. officials to include eavesdropping on home telephone and personal email accounts. Some feared that in the event it was discovered, it would further erode relations between the U.S. and the U.N. The source added that U.S. spying on the U.N. isn't new. "It's part of the job," the intelligence source said. "Everyone knows it's being done." Eavesdropping on U.N. diplomats is authorized under the U.S. Foreign Intelligence Services Act. However, it's still considered a violation of the Vienna Convention on Diplomatic Relations, which says that "The receiving state shall permit and protect free communication on the part of the mission for all official purposes. The official correspondence of the mission shall be inviolable." According to one former official, "The administration pushed the envelope by tapping their home phones." Koza's email, a copy of which is included at the end of this report, says the "Agency is mounting a surge particularly directed at the UN Security Council (UNSC) members (minus US and GBR of course) for insights as to how to membership is reacting to the on-going debate RE: Iraq, plans to vote on any related resolutions, what related policies/ negotiating positions they may be considering, alliances/ dependencies, etc." "The whole gamut of information that could give US policymakers an edge in obtaining results favorable to U.S. goals or to head off surprises. In RT, that means a QRC surge effort to revive/ create efforts against UNSC members Angola, Cameroon, Chile, Bulgaria and Guinea, as well as extra focus on Pakistan UN matters." Koza's email was sent out to NSA and British intelligence officials through a top secret surveillance network set up by the NSA, the British Government Communication Headquarters and similar intelligence agencies based in Australia, New Zealand and Canada known as Echelon. Moreover, the email was distributed just four days after Hans Blix filed his Iraq weapons report with the U.N. It was leaked to a handful of media outlets in the U.S. and U.K. by Katharine Tersea Gun, a former translator for British intelligence. Gun was arrested in November 2003 and charged with violating her country's Official Secrets Act. She said she felt compelled to leak the memo because she believed the U.S. and Britain were about to launch an illegal war. "Any disclosures that may have been made were justified on the following grounds: because they exposed serious illegality and wrongdoing on the part of the U.S. Government who attempted to subvert our own security services and, to prevent wide-scale death and casualties among ordinary Iraqi people and UK forces in the course of an illegal war," she said in a statement at the time. In his book "Plan of Attack," Bob Woodward, deputy managing editor of the Washington Post, said the administration was also spying on Hans Blix, the U.N. weapons inspector sent to Iraq to look for WMDs. "One of the things that's gone unnoticed is national intelligence assets spying on Hans Blix," Woodward told the Council on Foreign Relations on June 9, 2004 "And Bush was getting these reports and felt that there was incongruity between what Blix was saying publicly and what he was actually doing. It makes it very clear we were wiretapping Hans Blix." In an article for Counterpunch, media critic Norman Solomon noted that the U.S. media barely covered the U.N. spying. "Nearly 96 hours after the Observer had reported it, I called Times deputy foreign editor Alison Smale and asked why not," Solomon writes. "'We would normally expect to do our own intelligence reporting,' Smale replied. She added that 'we could get no confirmation or comment.' In other words, U.S. intelligence officials refused to confirm or discuss the memo -- so the Times did not see fit to report on it." The Washington Post printed a 514-word article on a back page with the headline "Spying Report No Shock to U.N," while the Los Angeles Times emphasized from the outset that U.S. spy activities at the United Nations are "long-standing," Solomon wrote. Solomon says his research turned up only one story which took the spying seriously -- a Mar. 4, 2003 piece in the Baltimore Sun. The leaked NSA email which revealed the spying follows. # ======================== To: [Recipients withheld] From: FRANK KOZA, Def Chief of Staff (Regional Targets) CIV/NSA Sent on Jan 31 2003 0:16 Subject: Reflections of Iraq Debate/Votes at UN-RT Actions + Potential for Related Contributions Importance: HIGH Top Secret//COMINT//X1 All, As you've likely heard by now, the Agency is mounting a surge particularly directed at the UN Security Council (UNSC) members (minus US and GBR of course) for insights as to how to membership is reacting to the on-going debate RE: Iraq, plans to vote on any related resolutions, what related policies/ negotiating positions they may be considering, alliances/ dependencies, etc -- the whole gamut of information that could give US policymakers an edge in obtaining results favorable to US goals or to head off surprises. In RT, that means a QRC surge effort to revive/ create efforts against UNSC members Angola, Cameroon, Chile, Bulgaria and Guinea, as well as extra focus on Pakistan UN matters. We've also asked ALL RT topi's to emphasize and make sure they pay attention to existing non-UNSC member UN-related and domestic comms for anything useful related to the UNSC deliberations/ debates/ votes. We have a lot of special UN-related diplomatic coverage (various UN delegations) from countries not sitting on the UNSC right now that could contribute related perspectives/ insights/ whatever. We recognize that we can't afford to ignore this possible source. We'd appreciate your support in getting the word to your analysts who might have similar, more in-direct access to valuable information from accesses in your product lines. I suspect that you'll be hearing more along these lines in formal channels - especially as this effort will probably peak (at least for this specific focus) in the middle of next week, following the SecState's presentation to the UNSC. Thanks for your help. # ================================== (Note: Slight edit made for clarification purposes.) NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. And, discuss this and other topics in our forum at http://telecom-digest.org/forum (or) http://telecom-digest.org/chat/index.html *** FAIR USE NOTICE. This message contains copyrighted material the use of which has not been specifically authorized by the copyright owner. This Internet discussion group is making it available without profit to group members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of literary, educational, political, and economic issues, for non-profit research and educational purposes only. I believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner, in this instance, Seattle Post-Intelligencer. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml ------------------------------ From: Olivia Munoz <ap@telecom-digest.org> Subject: Red Cross Hurricane Fraud Quite Substantial Date: Wed, 28 Dec 2005 10:25:04 -0600 49 Accused of Defrauding Hurricane Fund By OLIVIA MUNOZ, Associated Press Writer 9 minutes ago The number of people indicted in a scheme that bilked thousands of dollars from a Red Cross fund designated for Hurricane Katrina victims has risen to 49, federal authorities said. At least 14 employees worked at a Red Cross call center in Bakersfield and are accused of helping family and friends file false claims for aid money, said Mary Wenger, a spokeswoman for U.S. Attorney McGregor Scott in Sacramento. Six have pleaded guilty to federal wire fraud charges since the first indictments were announced in October, she said Tuesday. The fake claims drained at least $200,000 from the fund, with an average payout of about $1,000, Red Cross spokeswoman Devorah Goldburg said. The total could rise as the investigation continues, she said. The Bakersfield site is the largest of three Red Cross centers set up to handle hurricane calls. Others are in Niagara Falls, N.Y., and Falls Church, Va. Operators provided qualifying victims with a personal identification number they then presented to receive aid funds from Western Union, authorities said. The Red Cross contacted the FBI after it performed an audit of the call center and discovered an unusually high number of claims were being paid out at Western Union outlets in the Bakersfield area. "It was the Red Cross that found this problem," Jack McGuire, the national group's interim president, said Wednesday on NBC's "Today." "We put into effect these call centers to speed up delivery of support to people that needed it. As part of that, we put into place mechanisms to look for fraud up front and to find fraud after the fact." None of the indicted employees worked directly for the Red Cross. Officials of Fort Lauderdale, Fla.-based Spherion, which operates the call center, have said the company didn't have time to run background checks on its 1,200 workers. The indicted employees were providing PIN numbers to their friends and family who would then go to Western Union to collect the funds, Scott said in October. "Sometimes they'd give a victim a PIN number and turn around and call a buddy with the same PIN, and there'd be a race to Western Union," he said. McGuire said $200,000 was a small percentage of the approximately $1.4 billion Red Cross provided to Katrina victims. And he said Red Cross was working to improve its delivery and anti-fraud systems for the future. McGuire, executive vice president of the charity's Biomedical Services, was named to serve as interim leader after President Marsha Evans announced her resignation Dec. 13. Copyright 2005 The Associated Press. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. And, discuss this and other topics in our forum at http://telecom-digest.org/forum (or) http://telecom-digest.org/chat/index.html For more news from Associated Press, please go to: http://telecom-digest.org/td-extra/AP.html ------------------------------ From: Greg Risling <ap@telecom-digest.org> Subject: Desperate Meth Users Turn to ID Theft Date: Wed, 28 Dec 2005 10:26:50 -0600 By GREG RISLING, Associated Press Writer Stealing mail. Digging through trash. Days spent in front of a computer trying to unlock financial information. All to score methamphetamine. Authorities are discovering that more and more desperate users of the drug are turning to identity theft to pay for their habit, creating a criminal nexus costing Americans millions of dollars. The trend is sweeping the West and spreading to other parts of the country, with one hub of activity in the garages and trailer parks of Riverside and San Bernardino counties on the fringe of suburban Los Angeles. The region was the site of a third of California's nearly 500 meth lab busts in 2004 and is home to the second-highest number of identity theft victims in the nation. "It's been said the two crimes go together like rats and garbage," said Jack Lucky, a Riverside County prosecutor who nearly became a victim of ID theft himself before his personal information was found at a meth lab. The connection is posing a major challenge for authorities, who until recently tended to overlook or neglect identity theft evidence at meth labs in favor of pursuing drug charges that are easier to prove and carry stiffer penalties. "We weren't educated or sophisticated enough to spot what they were doing," said Riverside County sheriff's Sgt. Steve Koller, a narcotics task force member. "It's taken us a while to catch up." U.S. Sen. Maria Cantwell (news, bio, voting record), D-Wash., has called on the Department of Justice to study the link further and recommend tougher penalties for those convicted of both crimes. "What we are probably going to find is that there is a stronger connection than we know right now," she said. No figures were available on just how much the link is costing consumers. Separately, however, meth use and identity theft have each taken their toll. Nearly 10 million Americans fell victim last year to identity theft, costing $5 billion. Meanwhile, the popularity of methamphetamine has grown, with an estimated 12 million people trying it at least once. Police said meth users - known as "cranksters" -- are drawn to identity theft because they can stay up for days scanning computer records or go "Dumpster diving" for discarded financial information. A drug dealer recently provided fake identities to a woman in Phoenix who allegedly used them to buy cell phones. She was paid with methamphetamine, and the phones were later used by some of the dealer's associates, authorities said. Last summer, Georgia authorities tracked at least 20 thieves -- known as the "Mailbox Meth Gang" -- who cruised housing subdivisions looking for raised flags on mailboxes that could yield checks and bank statements to exchange for meth. Investigators found 14,000 credit card numbers in a laptop computer seized from the gang, but the most success came from using the internet to steal credit card numbers and other personal information. Police said the thieves typically do not target one spot too long and often divide tasks, with different persons stealing the identity, converting it and then using it. Alameda police Sgt. Anthony Munoz said about 85 percent of the identity theft cases he investigates have a connection to methamphetamine use. In one, a defendant pleaded guilty to 56 counts of identity theft and was sentenced to just one year in county jail, he said. "Those are the type of sentences you get," said Munoz, who backs sentencing enhancements for people convicted of both crimes. Penalties for identity theft vary from state to state. In California, where legislators are trying to strengthen the laws, identity thieves can face up to three years in prison and a fine up to $10,000. "We don't have the significant sentences right now that would deter some of these individuals," Riverside County District Attorney Grover Trask said. "It's easy money." In Arizona, the connection is so prevalent that Attorney General Terry Goddard now sends an investigator with identity theft expertise to meth lab busts. Lucky, the Riverside County prosecutor, didn't realize personal information had been stolen from his mailbox until a caller said there had been fraudulent activity linked to his credit card. He got suspicious when the caller requested his Social Security number. When he asked for a supervisor, he was given a toll-free number that was no longer in service. Identity thieves later applied for credit in his name and the prosecutor didn't discover where his identity ended up until he got a call from a sheriff's deputy. "I guess we weren't really surprised they found it at a meth lab," Lucky said. Copyright 2005 The Associated Press. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. And, discuss this and other topics in our forum at http://telecom-digest.org/forum (or) http://telecom-digest.org/chat/index.html For more Associated Press headlines and stories, please go to: http://telecom-digest.org/td-extra/AP.html ------------------------------ From: Reuters News Wire <reuters@telecom-digest.org> Subject: Penis Patch the Top Spam in 2005 Date: Wed, 28 Dec 2005 10:28:17 -0600 Ads mentioning real estate tycoon Donald Trump and those hawking "Penis Patch" body enhancements were among the top 10 junk e-mails in 2005, according to America Online. Noticeably absent? Porn. "Porn is passe when it comes to spam," Nicholas Graham, an AOL spokesman said, "people find it boring." Sexually suggestive e-mails took another tumble this year after slipping in popularity last year, although web sites devoted to sex increased, about half of the total web sites in 2005 dealt with sex, including pictures, etc. More than a half-trillion junk e-mails, known as spam, were blocked by AOL filters, slightly above 2004 levels, the company said. The number of junk e-mails reported by AOL's 26 million members worldwide has declined about 75 percent since 2003. E-mails using more sophisticated tactics that attempt to deceive recipients by purporting to be from a friend or a legitimate agency or bear subject lines such as "Your Mortgage Application is Ready" are also beginning to replace blatant product promotions, AOL said. Spammers "are (employing) 'back alley' tactics, and they are doing it with a specialized team that's working overtime to hide the source of their spam by employing zombie PC's, bot-nets and using other nefarious tactics," Charles Stiles, AOL's postmaster, said in a statement. In 2005, AOL blocked an average of 1.5 billion spams per day. Approxi- mately 8.5 in 10 e-mails received at its gateway were blocked as junk. AOL is a division of media conglomerate Time Warner Inc. Copyright 2005 Reuters Limited. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. And, discuss this and other topics in our forum at http://telecom-digest.org/forum (or) http://telecom-digest.org/chat/index.html For more news headlines of interest each day, please go to: http://telecom-digest.org/td-extra/internet-news.html ------------------------------ From: BBC News Wire <bbs@telecom-digest.org> Subject: Businessman in EU Wins in Email Spam Case and Collects Date: Wed, 28 Dec 2005 00:42:43 -0600 A businessman has won what is believed to be the first victory of its kind by claiming damages from a company which sent him e-mail spam. Nigel Roberts, who lives in Alderney in the Channel Islands, took action against Media Logistics UK over junk e-mails in his personal account. Under new European laws, companies can be sued for sending unwanted e-mails. An EU spokesperson noted that "European Union is _NOT_ the United States. The amount of spam coming from the United States each day is simply incredible. They (Americans) seem unwilling to do much about it, at least anything effective. We are approaching it from a different direction." The Stirlingshire-based firm has agreed to pay 270 pounds compensation to Mr Roberts, who runs an internet business. 'Tiny victory'. Three years ago the EU passed an anti-spam law, the directive on privacy and telecommunications, which gave individuals the right to fight the growing tide of unwanted e-mail by allowing them to claim damages. Some 'technical specialists' employed by European Union will, on request, investigate the 'true source' of the questionable email and assist the users in filing appropriate, and realistic claims. Mr Roberts received unwanted e-mail adverts for a contract car firm and a fax broadcasting business and decided to take action against the company. The company filed an acknowledgement of the claim at Colchester County Court but did not defend it and a judge ruled in favour of Mr Roberts. In an out-of-court agreement Media Logistics agreed to pay Mr Roberts damages of 270 pounds plus his 30 pound filing fee, and other expenses. Mr Roberts said he had limited his claim to a maximum of 300 pounds in order to qualify to file it as a small claim. He said: "This may be a tiny victory but perhaps now spammers will begin to realise that people don't have to put up with their e-mail inboxes being filled with unwanted junk. " No-one from Media Logistics UK was available for comment. A spokesman for the Information Commissioner's Office, the watchdog who oversees the Data Protection Act, said it was the first case of its kind he had heard of. He said: "What I can say is that I haven't heard of anyone doing so and we haven't taken a case under that legislation, but things are going to be changing here in EU where spam is concerned. " Story from BBC NEWS: http://news.bbc.co.uk/go/pr/fr/-/1/hi/world/europe/jersey/4562726.stm Copyright 2005 BBC MMV NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. And, discuss this and other topics in our forum at http://telecom-digest.org/forum (or) http://telecom-digest.org/chat/index.html For news and stories from Europe, please listen to: http://telecom-digest.org/td-extra/BBC.html (World Service audio stream) or, http://telecom-digest.org/td-extra/BBC-summary.html (Five minute hourly news.) ------------------------------ From: Jeremy Pelofsky <reuters@telecom-digest.org> Subject: Move to New Airwaves to Cost $936 Million Date: Wed, 28 Dec 2005 10:30:02 -0600 By Jeremy Pelofsky Moving U.S. Defense Department and 11 other government agencies' wireless communications to new airwaves will cost almost $936 million, according to a new government estimate released on Wednesday. The 90 Megahertz of airwaves the agencies will give up will be sold at an auction that could be held as early as June 2006. The airwaves are seen as prime real estate for companies to offer wireless services like mobile wireless high-speed Internet access. Michael Gallagher, who heads the Commerce Department's National Telecommunications and Information Administration which worked on the cost estimates, said they were less than industry estimates of several billions of dollars. "We need to make sure the industry has the resources" for new services, he said in a telephone interview. The additional airwaves will help carriers "to be the broadband competitors of tomorrow." The airwaves could also be used to expand coverage and improve cell phone service quality. It could take some agencies up to four years or longer to move 2,240 frequency assignments though most will be completed within three years, Gallagher said. There are roughly 201 million wireless subscribers in the United States and companies like Cingular Wireless and Verizon Wireless are rolling out new services like high-speed Internet and video accessible on mobile devices. The bands to be sold at auction include 1710-1755 Megahertz and 2110-2155 Mhz. The Federal Communications Commission, which conducts the auction, is currently working on the procedures for the sale. A law signed last year provides for the proceeds from the auction to cover the relocation costs for the government agencies. But the FCC sale can only be completed if the proceeds bring in at least 10 percent more than the costs to relocate the government operations. The biggest cost is expected to be moving the Defense Department, at almost $289 million, followed by the Justice Department at approximately $263 million. Other agencies switching airwaves include the Energy Department, Federal Aviation Administration and NASA, among others. The last major FCC commercial wireless airwaves sale, concluded in February, raised $2.25 billion. Cingular Wireless, the No. 1 U.S. carrier, is a joint venture of BellSouth Corp. and AT&T Inc., Verizon Wireless is the No. 2 provider and a joint venture of Verizon Communications and Vodafone Group Plc. Copyright 2005 Reuters Limited. NOTE: For more telecom/internet/networking/computer news from the daily media, check out our feature 'Telecom Digest Extra' each day at http://telecom-digest.org/td-extra/more-news.html . Hundreds of new articles daily. And, discuss this and other topics in our forum at http://telecom-digest.org/forum (or) http://telecom-digest.org/chat/index.html Look for more news headlines and stories daily in the Christian Science Monitor and the New York Times by going to: http://telecom-digest.org/td-extra/nytimes.html ------------------------------ From: Phil Earnhardt <pae@dim.com> Subject: Reliable, Easy, and Cost Effective Way to Record Calls? Date: 28 Dec 2005 10:36:56 -0800 Organization: Newsguy News Service [http://newsguy.com] I'm going to be doing interviews over the phone; I'd like to be able to easily and reliably record the calls. Radio Shack SKU #17-855 connects between the headphone jack of a cordless (or cellular) telephone and a headset. There is a 1/8 inch autio out plug. However, I suspect that such devices may not be tremendously reliable -- lots of connectors, batteries, etc. Are there any cell phones that allow conversations to be streemed directly to an SD card? How about a BT phone that can stream the conversation to a computer? Are there services that provide a number I can conference in that will record the call and then allow me to pull a recording of the call off of a website for $5-10/hour? Any other alternatives -- any corded phones with built-in recording capability for less than $200? TIA. --phil [TELECOM Digest Editor's Note: Are you sure your real name isn't Condi Rice, and 'Phil Earnhardt' isn't an alias you use for spying on the net? PAT] ------------------------------ Date: Wed, 28 Dec 2005 13:00:21 EST From: USTelecom dailyLead <ustelecom@dailylead.com> Subject: Covad, Verizon Settle Their Differences USTelecom dailyLead December 28, 2005 http://r.smartbrief.com/resp/APnwatagCDuiBJFcfu TODAY'S HEADLINES NEWS OF THE DAY * Covad, Verizon settle their differences BUSINESS & INDUSTRY WATCH * Washington state regulators clear Verizon-MCI deal * Predicting the telecom and media mergers of 2006 * South, North Korea linked via phone connections * Lucent's overfunded pension plan contributes heavily to profits USTELECOM SPOTLIGHT * Explore the Business of Communications and Entertainment at TelecomNEXT TECHNOLOGY TRENDS * Review: AT&T's CallVantage stands up to the test * Breakthrough technology takes home networks to next level * Mobile TV gathers steam REGULATORY & LEGISLATIVE * Report: Wireless spectrum transition could cost $936M * China reveals more details about 3G plans Follow the link below to read quick summaries of these stories and others. http://r.smartbrief.com/resp/APnwatagCDuiBJFcfu ------------------------------ From: hancock4@bbs.cpcn.com Subject: Re: Physically Protecting The Local Loop Network? Date: 28 Dec 2005 08:33:55 -0800 Organization: http://groups.google.com Steven Lichter wrote: > I had a space saver type of phone (the old black ones with the dial on > top) installed in a room in my parent's garage and the installer that > installed it worked on the phone the better part of a day, could not > get it to work, and had other installers coming by to look at it, he > came back the next day and got it to work, it needed a special bell > box to work. When I ordered the phone the rep had no idea what it > even was, this was in Pacific Telephone area. Presumably this was before divesture and the phone company still owned the telephone unit? Before divesture there were a fair amount of older phones still in service that required separate bell boxes. All candle stick and 202 ("French") telephone sets did. The 302 set (1938) was a technical advance in that no separate bell box was required. Many 202 sets still in service were modernized with an "F" (300 series) handset replacing the older one, and candle sticks got "F" transmitter and receivers; so this equipment all remained in service and was very common in the 1950s and 1960s. The Space Saver was very popular on workbenches, and even advertised for the home. Anyway, before divesture I'm surprised the phoneco had trouble working with a phone that required a bell box. Sure they were rare by the 1980s, but not so rare. Steven Lichter wrote: > Many years ago I had an old magneto phone on my line (before > deregulation) my daughter at the time was about 1 1/2 years old and > cranked it, to say the least it caused problems, first the fuses on my > both sides of my line were blown, and it must have taken the protector > on the frame out, PacTel was out within an hour and they were not > happy with me, I pointed out it had been a phone that was made by for > for The Western Electric Co., that did not seem to impress them, I was > told not to put it on the line again; I did, but disables the magneto. That was a reason -- quite legitimate -- that the phone companies (both Bell and indepedents) fought customer owned equipment, especially without protective devices. If a lot of customers had this sort of thing it would add up to a lot of service calls for the phone company, and for them considerable extra expense and aggrvation without benefit. The pre-divesture Bell System physical plant was engineered for low maintenance to minimize service calls. Customer owned equipment likely wouldn't have such high quality and be more likely to fail. The result is service calls and finger pointing. The phone company correctly realized new customer telephone sets would be cheap junk and cause false busies, shorts, and bad connections all of which were heresy to the service standards principles of the old Bell System. Once customer owned equipment was clearly here to stay, the phone companies did a 180 degree reversal, and ceased end-to-end responsibility for service. So now if you have a telephone problem, the phone company does nothing until you are absolutely sure it is not a problem in your wiring or your telephone sets; if it is, they will charge you and charge you dearly to fix it. And of course now we have fingerpointing over which side of the demarc the problem is on. The phone company added more protection in the local loop and C.O. for this sort of thing and of course we customers add to pay for it in our bills. [TELECOM Digest Editor's Note: Everytime I get a piece of junk mail from Southwestern Bell, err, SBC, err AT&T offering some new promotion or another ("take it all for six months or a year for ten dollars per month", etc) one thing they _always_ insist has to be included in the 'deal' is Wire and Line Protection/Repair Service; they always clearly indicate this is _not_ optional. PAT] ------------------------------ From: richgr@panix.com (Rich Greenberg) Subject: Re: Physically Protecting The Local Loop Network? Date: Wed, 28 Dec 2005 15:51:18 UTC Organization: Organized? Me? In article <telecom24.583.9@telecom-digest.org>, Steven Lichter <Die@spammers.com> wrote: > I had a space saver type of phone (the old black ones with the dial on > top) installed in a room in my parent's garage and the installer that > installed it worked on the phone the better part of a day, could not > get it to work, and had other installers coming by to look at it, he > came back the next day and got it to work, it needed a special bell > box to work. When I ordered the phone the rep had no idea what it > even was, this was in Pacific Telephone area. When I moved out they > never came and got it, they just left it there. I came and got it one > day and it lives with my other old phone in my den. I also had one of those many years ago. I didn't have the bell box that was normally used with it, so I took an induction coil from another phone (probably a 300 series) and wired it up. Worked fine. That was 6 houses and 40+ years ago, and I have no idea where it is now. Rich Greenberg Marietta, GA, USA richgr atsign panix.com + 1 770 321 6507 Eastern time. N6LRT I speak for myself & my dogs only. VM'er since CP-67 Canines:Val, Red & Shasta (RIP),Red, husky Owner:Chinook-L Atlanta Siberian Husky Rescue. www.panix.com/~richgr/ Asst Owner:Sibernet-L [TELECOM Digest Editor's Note: I had one of those for awhile, but instead of hunting down a side-ringer I just plugged it in and used one of the other phones in my house for a ringing signal. It was easier just listen for a bell ringing somewhere else close by. PAT] ------------------------------ From: DevilsPGD <spam_narf_spam@crazyhat.net> Subject: Re: Payphone Surcharges (was: Unanswered Cellphones) Date: Tue, 27 Dec 2005 23:05:05 -0700 Organization: Disorganized In message <telecom24.583.7@telecom-digest.org> Anthony Bellanga <anthonybellanga@spam-poison.com wrote: > PAT: Please suppress my email address! THNX! > DevilsPGD <spam_narf_spam@crazyhat.net> wrote: >> Anthony Bellanga wrote: >>> And using a calling card from a payphone can be significant these >>> days since the payphone owner can now "legally" extort huge charges >>> from the long distance carrier or card provider, who will then extort >>> those surcharges from us. >> No extortion involved. If someone held a gun to your head or >> otherwise forced you to use the payphone, it would be extortion. >> Since you choose to use a payphone, you choose to absorb that cost. >> A cost, which is regulated, and which helps telcos continue to run pay >> phones at all, since they're not generally considered profitable >> anymore, at least around here. > It IS extortion at the rates they charge. While I have a cellphone, > not everyone has one, and payphones with calling cards are still the > way they need to place calls while not at home. Extortion is a criminal offense, which occurs when a person obtains money, behaviour, or other goods and/or services from another by wrongfully threatening or inflicting harm to this person, reputation, or property. Unless the owner of the payphone is threatening or inflicting harm upon you causing you to make a call, no extortion has been committed. Feel free to contact your AG or a local ADA and see if you can get extortion charges filed against a payphone operator or owner, if you want confirmation. > The surcharge rates are *NOT* regulated! The FCC/etc. have "allowed" > the payphone owners to charge these surcharges, LONG AFTER the private > payphone owners first became involved in the payphone game. But the > rates themselves, while "recommended" by the FCC/etc., are NOT > regulated! The amounts that the payphone owners charge back to the > Long Distance carriers who then pass back to the card-holder is *PURE > GRAVY* for both, since the Long Distance and Card companies are most > likely adding even more profit for themselves. The rate the payphone operator charges IS regulated, the rate your calling card charges you is not. If you're paying too much, get a better calling card -- There are tons of options. > Payphone service used to be a good convenient public service when > telco really did own the phones. But when the non-telco owners came > in, like a cancer, payphone service went to hell, with the telcos > finally pulling out of the game completely in many places. I'll just > use my cellphone whenever I'm not able to use my home phone, but I do > feel for those who don't have cellphones and have to use remaining > sleazy (non-telco) payphones. Not really -- Private non-telco payphones are still regulated. Things "went to hell" when payphones ceased being profitable. Making a payphone call is not a right. Your "need" to make a call does not give you the right to do so at a rate of your choosing. ------------------------------ From: hancock4@bbs.cpcn.com Subject: Re: Payphone Surcharges (was: Unanswered Cellphones) Date: 28 Dec 2005 08:27:09 -0800 Organization: http://groups.google.com John Levine wrote: > The amount the payphone owner charges the calling card company is > regulated, but you are correct that they can mark it up as much as > they want. I would think that the obvious solution would be to find a > calling card that doesn't. It's not like there is a shortage of > options. Well, one obvious option is to require payphones to run like any other business and post its rates clearly on the phone. Today, pay phones still treat customers like the old days, where toll charges were instantly available 24/7 by asking the operator, so there was no need to post rates. Yet, they don't charge like that nor make the pricing known. That IS sleazy business to hide your costs. Another example of how modern day phone "competition" screws customers. But we're just so better off that we got rid of the evil Bell System! <sarc> ------------------------------ From: DevilsPGD <spam_narf_spam@crazyhat.net> Subject: Re: Cell Phone Extenders? Date: Tue, 27 Dec 2005 23:05:05 -0700 Organization: Disorganized In message <telecom24.584.4@telecom-digest.org> kludge@panix.com (Scott Dorsey) wrote: > These devices are very illegal. They are also very poorly built and > freqently sources of bizarre interference to 800 MHz trunked radio > systems as well as to various military UHF comm systems. > When I find them, I smash them in front of the owner, and discourage > him from installing any more of them. It helps to have an MP along. Sounds like a good witness when you get prosecuted for destruction of private property, MPs wouldn't want to tarnish their reputation by committing perjury. As for the devices, they're not illegal to own, only to operate (And then, they're only illegal without a license, or only if they operate outside the licensed bands) Oh, and having an MP is smart too, since they have no authority over civilians. You might as well bring FEMA and the CDC with you. *shrugs* ------------------------------ From: Rik <hrasmussen@nc.rr.com> Subject: Re: Cell Phone Extenders? Date: 28 Dec 2005 05:44:38 -0800 Organization: http://groups.google.com An external antenna, being a passive device, would probably cause no problems and probably would not lead to any issues of its use even though one might argue that such an antenna could be deemed illegal on the grounds that the cellphone's FCC Type Acceptance only is for the manufacturer's supplied antenna. The argument being made here about illegality concerns the use of active BDA's. ------------------------------ From: kludge@panix.com (Scott Dorsey) Subject: Re: Cell Phone Extenders? Date: 28 Dec 2005 16:00:12 -0500 Organization: Former users of Netcom shell (1989-2000) Scott Dorsey <kludge@panix.com> wrote: > [TELECOM Digest Editor's Note: I do not see what would be so illegal > about hooking up an external antenna at a somewhat higher line of > sight. Many phones (Nokia models for example) have a plug on the back > side for just that reason. PAT] That is not illegal, but that is not what these devices do. --scott "C'est un Nagra. C'est suisse, et tres, tres precis." ------------------------------ From: niallgal@yahoo.com <niallgal@yahoo.com> Subject: Re: Cell Phone Extenders? Date: 28 Dec 2005 13:01:22 -0800 Organization: http://groups.google.com A quick web search comes up with http://www.digitalantenna.com/cellamprep_DA4000SBR.html which makes the following claims: Q: Does the owner of this equipment (installed location) require an FCC license to operate the repeater? A: No, neither the user nor the installer needs an FCC license. All of our products are FCC approved. In the instruction manual, you will find guidelines to follow to comply with all FCC requirements, such as proper separation between antennas, and persons must be 6 meters horizontally away from outside antenna. Maybe worth a try. N ------------------------------ From: hancock4@bbs.cpcn.com Subject: Re: Unanswered Calls to Cell Phones? Date: 28 Dec 2005 08:36:58 -0800 Organization: http://groups.google.com John Levine wrote: > I suspect your calling card was charging you for any call over N > seconds rather than checking for supervision. I make test calls from > my landline to my cell numbers in Luxembourg and Switzerland from time > to time, hanging up once my phone starts ringing, and I don't ever > recall being charged unless I answered. No. At that time the Calling Card worked fine on traditional calls, using supervision. It was going to a cell phone and having the carrier answer that caused the charge. I suspect when the carrier answers supervision says the call is answered, even if it is an intercept recording. The cellphone and landline world work very differently. DevilsPGD wrote: >> And using a calling card from a payphone can be significant these >> days since the payphone owner can now "legally" extort huge charges >> from the long distance carrier or card provider, who will then extort >> those surcharges from us. > No extortion involved. If someone held a gun to your head or > otherwise forced you to use the payphone, it would be extortion. > Since you choose to use a payphone, you choose to absorb that cost. A > cost, which is regulated, and which helps telcos continue to run pay > phones at all, since they're not generally considered profitable > anymore, at least around here. Utter nonsense. It IS extortion. When you are in an emergency situation (ie in a hospital) and they don't allow cellphone use or you don't have one, you indeed are forced to use their phone and pay their charges. As others pointed out, all charges the customer pays on a pay phone are UNREGULATED. The pay phone provider can charge you whatever you wish. Unlike normal businesses, pay phone providers do not have to tell you their prices; you only find out a month later when you get the bill. Imagine going food shopping with the prices unmarked and not knowing how much you spent for food until the bill comes. Would you tolerate that? But it's perfectly fine with pay phones. > (TELECOM Digest Editor's Note: However, considering that a cell phone > is normally always within its owner's reach (a holster fastened to > your trousers, in your purse, in a holder near the driver of an > automobile, etc) it would seem very odd that it had to ring more than > three or four times, at best, unanswered. PAT] Actually, it is not always in reach, or the recipient isn't always in a position to promptly answer. Some people, while driving, prefer to pull over before taking a call, or our in a critical moment in traffic (navigating a busy interchange) and don't want the distraction. If the phone is stored in a purse or backpack, the bag has to be put down and searched to dig out the phone. The old Bell System always taught us to allow 10 rings to give someone time to answer, I don't see why that should be any different for a cell phone. I suspect the intercept after three rings is to save them tower and switch time, and I think it represents too much frugality on their part. ------------------------------ From: Tony P. <nospam.kd1s@cox.nospam.net> Subject: Re: What Carriers Does Vonage Use to Terminate Calls? Organization: The Ace Tomato and Cement Company Date: Wed, 28 Dec 2005 10:29:36 -0500 In article <telecom24.584.6@telecom-digest.org>, advertising@adtomi.com says: > I'm just currious what companies Vonage users to terminate calls across > the country since they do not have their own true infrastructure. Any > ideas? > Gabriel Mostly Paetec and Focal CLEC switches in various regions. Probably why they can't do proper LNP in some cases since neither Paetec or Focal have a switch in those regions. Luckily we've got a pretty much idle Paetec #5ESS here in Providence that handles things quite nicely. Vonage simply uses IP packets instead of copper pairs to haul calls to underutilized capacity on CLEC switches. Really elegant when you come right down to it. They completely bypassed the local regulatory environments. ------------------------------ TELECOM Digest is an electronic journal devoted mostly to telecomm- unications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of networks such as Compuserve and America On Line, Yahoo Groups, and other forums. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. Contact information: Patrick Townson/TELECOM Digest Post Office Box 50 Independence, KS 67301 Phone: 620-402-0134 Fax 1: 775-255-9970 Fax 2: 530-309-7234 Fax 3: 208-692-5145 Email: editor@telecom-digest.org Subscribe: telecom-subscribe@telecom-digest.org Unsubscribe:telecom-unsubscribe@telecom-digest.org This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/ (or use our mirror site: ftp.epix.net/pub/telecom-archives) RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308 and also http://feeds.feedburner.com/TelecomDigest ************************************************************************* * TELECOM Digest is partially funded by a grant from * * Judith Oppenheimer, President of ICB Inc. and purveyor of accurate * * 800 & Dot Com News, Intelligence, Analysis, and Consulting. * * http://ICBTollFree.com, http://1800TheExpert.com * * Views expressed herein should not be construed as representing * * views of Judith Oppenheimer or ICB Inc. * ************************************************************************* ICB Toll Free News. Contact information is not sold, rented or leased. One click a day feeds a person a meal. Go to http://www.thehungersite.com Copyright 2005-06 ICB, Inc. and TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO YOUR CREDIT CARD! REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST AND EASY411.COM SIGN UP AT http://www.easy411.com/telecomdigest ! ************************ Visit http://www.mstm.okstate.edu and take the next step in your career with a Master of Science in Telecommunications Management (MSTM) degree from Oklahoma State University (OSU). This 35 credit-hour interdisciplinary program is designed to give you the skills necessary to manage telecommunications networks, including data, video, and voice networks. The MSTM degree draws on the expertise of the OSU's College of Business Administration; the College of Arts and Sciences; and the College of Engineering, Architecture and Technology. The program has state-of-the-art lab facilities on the Stillwater and Tulsa campus offering hands-on learning to enhance the program curriculum. Classes are available in Stillwater, Tulsa, or through distance learning. Please contact Jay Boyington for additional information at 405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at http://www.mstm.okstate.edu ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of TELECOM Digest V24 #585 ****************************** | |