35 Years of the Digest ... founded August 21, 1981
Copyright © 2017 E. William Horne. All Rights Reserved.

telecom digest Thu, 16 Mar 2017
Volume 36 : Issue 30 : "text" format

Table of contents
Re: With Jews nationwide watching, the FBI works to crack the tough case of a telephone culpritScott Dorsey
Malware found preinstalled on 38 Android phones used by 2 companiesMonty Solomon
Re: FCC chair wants carriers to block robocalls from spoofed numbersScott Dorsey
In tiny town, phone service comes with customer service Monty Solomon
Re: FCC grants emergency "unblocking" of CNID to Jewish CentersScott Dorsey
History--Bell System television work in 1957HAncock4
---------------------------------------------------------------------- Message-ID: <oa2e4c$7ep$1@panix2.panix.com> Date: 11 Mar 2017 22:09:00 -0500 From: kludge@panix.com (Scott Dorsey) Subject: Re: With Jews nationwide watching, the FBI works to crack the tough case of a telephone culprit In article <o9c4vu$4eb$1@gal.iecc.com>, John Levine <johnl@iecc.com> wrote: >In article <20170303111911.GA29159@telecom.csail.mit.edu>, >>> Or a spoofed legitimate phone number used by somebody behind multiple >>> VOIP hops (whatever *that* is... but it's the reason cited in the >>> letters I get from the Pennsylvania AG's office explaining why they >>> cannot prosecute Do-Not-Call-List violations). >> >>Frankly, that sounds like a bureaucratic brush-off. I suggest you make >>some noise. > >Unfortunately, it's real. VoIP gateways can send arbitrary junk. I >have an account with a VoIP provider that happens to be in Europe, and >I can send pretty much any calling number I want. Yes, but the VoIP gateway has a record of your IP address when that call was made, and that gateway is likely in a country with an INTERPOL agreement. It's possible to loop through multiple gateways, leading to an awful lot of footwork being required. But the police have people on staff whose job it is do that footwork. VoIP systems make it harder to track down callers, but in no way impossible. --scott -- "C'est un Nagra. C'est suisse, et tres, tres precis." ------------------------------ Message-ID: <F630B8F5-42F0-40BD-A038-3222811DF91A@roscom.com> Date: Fri, 10 Mar 2017 21:43:56 -0500 From: Monty Solomon <monty@roscom.com> Subject: Malware found preinstalled on 38 Android phones used by 2 companies By Dan Goodin A commercial malware scanner used by businesses has recently detected an outbreak of malware that came preinstalled on more than three dozen Android devices. An assortment of malware was found on 38 Android devices belonging to two unidentified companies. This is according to a blog post published Friday by Check Point Software Technologies, maker of a mobile threat prevention app. The malicious apps weren't part of the official ROM firmware supplied by the phone manufacturers but were added later somewhere along the supply chain. In six of the cases, the malware was installed to the ROM using system privileges, a technique that requires the firmware to be completely reinstalled for the phone to be disinfected. https://arstechnica.com/security/2017/03/preinstalled-malware-targets-android-users-of-two-companies/ ------------------------------ Message-ID: <oa6anq$g8a$1@panix2.panix.com> Date: 13 Mar 2017 10:35:38 -0400 From: kludge@panix.com (Scott Dorsey) Subject: Re: FCC chair wants carriers to block robocalls from spoofed numbers Monty Solomon <monty@roscom.com> wrote: >The FCC in 2015 made it clear that voice service providers can offer >call blocking tools to customers, but commissioners said at the time >that more needed to be done about Caller ID spoofing. FCC Chairman >Ajit Pai has now scheduled a preliminary vote for March 23 on new >rules designed to solve the problem. We already have plenty of rules that have no technical means of enforcement to deal with robocalling. What makes anyone think that adding more is going to help anything? --scott -- "C'est un Nagra. C'est suisse, et tres, tres precis." ------------------------------ Message-ID: <F1921F04-0B49-4D57-A5F9-85111ABEB4D1@roscom.com> Date: Sun, 12 Mar 2017 15:33:12 -0400 From: Monty Solomon <monty@roscom.com> Subject: In tiny town, phone service comes with customer service By Thomas Farragher RICHMOND - She is a tiny woman with a wide smile and a memory sharp enough to keenly recall those pesky rumors about her old job in this former Massachusetts mining town on the New York border. But Nancy Benedict wants you to know that she was no snoop. "Did I listen in?" she asked, repeating the question. "Not really intentionally. But you had to listen in to see if they were through talking." https://www.bostonglobe.com/metro/2017/03/11/tiny-town-phone-service-comes-with-customer-service/6vTRTAPeOoZ5VSGSDuTGaP/story.html ------------------------------ Message-ID: <oa6avc$dbn$1@panix2.panix.com> Date: 13 Mar 2017 10:39:40 -0400 From: kludge@panix.com (Scott Dorsey) Subject: Re: FCC grants emergency "unblocking" of CNID to Jewish Centers HAncock4 <withheld@invalid.telecom-digest.org> wrote: >On Saturday, March 4, 2017 at 5:49:26 PM UTC-5, danny burstein wrote: > >> The Federal Communications Commission today issued an emergency >> temporary waiver to Jewish Community Centers and [the] telecom- >> munications carriers [which] serve them to allow these entities >> and law enforcement agencies to access the caller-ID information >> of threatening and harassing callers. > [snip] >> ***** Moderator's Note ***** >> Cops are schooled and experienced at evaluating both context and >> capability, which is why they are given the job of evaluating "threat" >> calls, and they should be the first line of defense, not the second. > >I'm confused: What happened to the *57 Call Trace feature? The >information gathered by that was never available to consumers, >but was given to law enforcement. Also, I thought that information >was the more reliable ANI, not caller-ID. Could someone elaborate >on current practice? Dialing *57 gets the ANI sent to law enforcement. The ANI is the outgoing number at the VoIP gateway. The law enforcement people then send a subpoena to the gateway operators to look through their logs to find the IP address of the caller. If they are lucky that IP address is the caller's machine, if more likely the are unlucky it turns out to be a proxy server in China somewhere. At this point INTERPOL has to get involved in order to request logs from the proxy server, if the proxy server can be found, and if the operator of the proxy server hasn't shut it down and moved it to another hotel room.... --scott -- "C'est un Nagra. C'est suisse, et tres, tres precis." ------------------------------ Message-ID: <56826b60-b50b-4bc8-ad0f-916b8d5543c9@googlegroups.com> Date: Fri, 10 Mar 2017 12:58:33 -0800 (PST) From: HAncock4 <withheld@invalid.telecom-digest.org> Subject: History--Bell System television work in 1957 The Bell System ran several ads in Billboard magazine touting its contribution to broadcasting. Billboard covered the entertainment industry. On 8/12/1957, pg 15, Bell noted it's high speed broadband switching facilities that allowed advanced setup. https://books.google.com/books?id=XCEEAAAAMBAJ&lpg=PA70&dq=billboard%20august%2012%201957&pg=PA15#v=onepage&q=bell%20telephone&f=false On 3/9/1957, pg 16, Bell noted its automatic protection switching that instantly switched a bad TV channel to a backup so fast that the changed wasn't noticed. https://books.google.com/books?id=LyAEAAAAMBAJ&lpg=PA67&dq=billboard%20march%209%201957&pg=PA16#v=onepage&q=bell%20telephone&f=false Also, back on 3/11/1944, an article describes the future plans of Bell and others to implement television transmission facilities to allow coast-to-coast broadcasting. https://books.google.com/books?id=bQwEAAAAMBAJ&lpg=PA7&dq=billboard%20coaxial%20cable&pg=PA7#v=onepage&q=billboard%20coaxial%20cable&f=false On all of these, you can scroll through the entire magazine. Interesting business history. ------------------------------ ********************************************* End of telecom Digest Thu, 16 Mar 2017

Telecom Digest Archives