Pat, the Editor

27 Years of the Digest ... founded August 21, 1981

Previous Issue (Only one)
Classified Ads
TD Extra News

Add this Digest to your personal   or  

 
 
Message Digest 
Volume 28 : Issue 100 : "text" Format

Messages in this Issue:
  Re: Demise of on-line telephone directory databases 
  Re: Demise of on-line telephone directory databases 
  Re: Demise of on-line telephone directory databases 
  Re: Demise of on-line telephone directory databases 
  Re: Demise of on-line telephone directory databases 
  Sabotage attacks knock out phone service [Calif.]
  Skype moves in on cellphone industry
  Electricity Grid in U.S. Penetrated By Spies
  Conficker C Analysis
  An Analysis of Conficker
  Sabotage attacks knock out phone service
  Re: Sabotage attacks knock out phone service 
  Re: Sabotage attacks knock out phone service 
  Re: Sabotage attacks knock out phone service 
  fwd: "Service restored in Silicon Valley after fiber cut"   


====== 27 years of TELECOM Digest -- Founded August 21, 1981 ====== Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest. ---------------------------------------------------------------------- Date: Fri, 10 Apr 2009 10:11:40 -0400 From: MC <for.address.look@www.ai.uga.edu.slash.mc> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Demise of on-line telephone directory databases Message-ID: <QnIDl.27117$v8.14969@bignews3.bellsouth.net> Adam H. Kerman wrote: > Might as well resume using printed telephone directories. The number of > published listings is way down, as the ILEC doesn't carry all telephone > numbers from CLEC's, but at least what you find stands a better chance > of being accurate. I have started encountering younger people who don't know what a printed telephone directory *is*. ------------------------------ Date: Sun, 12 Apr 2009 08:35:40 +1000 From: David Clayton <dcstar@myrealbox.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Demise of on-line telephone directory databases Message-ID: <pan.2009.04.11.22.35.39.722032@myrealbox.com> On Sat, 11 Apr 2009 09:02:16 -0400, MC wrote: > Adam H. Kerman wrote: > >> Might as well resume using printed telephone directories. The number of >> published listings is way down, as the ILEC doesn't carry all telephone >> numbers from CLEC's, but at least what you find stands a better chance >> of being accurate. > > I have started encountering younger people who don't know what a printed > telephone directory *is*. Not everybody gets arrested........ ;-) -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have. ------------------------------ Date: Fri, 10 Apr 2009 12:46:28 -0700 (PDT) From: David Kaye <sfdavidkaye2@yahoo.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Demise of on-line telephone directory databases Message-ID: <443164d2-5854-4a6a-ad9d-7055b4efbc85@j9g2000prh.googlegroups.com> On Apr 10, 7:00 am, "Adam H. Kerman" <a...@chinet.com> wrote: > Might as well resume using printed telephone directories. The number of > published listings is way down, as the ILEC doesn't carry all telephone > numbers from CLEC's, but at least what you find stands a better chance > of being accurate. It's impossible to find my phone number via such searches. I prefer it this way. I get nearly zero junk phone calls. ------------------------------ Date: Sat, 11 Apr 2009 10:48:43 -0400 From: Steve Stone <spfleck@citlink.net> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Demise of on-line telephone directory databases Message-ID: <grqaks$520$1@news.motzarella.org> >> Might as well resume using printed telephone directories. In my residential area phone books are dropped off in bags at the foot of the rural mailbox or thrown to the middle of the driveway. Many are never picked up by their intended victims, left to decompose outdoors. Part of the problem is we get so many phone books.. 6 or 7 at last count. Two or three from Frontier, the regional telco, more from Verizon which does not serve my area but serves adjacent areas, and more from independent yellow page distributors. None of them are accurate. ------------------------------ Date: Sat, 11 Apr 2009 18:11:09 -0500 From: gordon@hammy.burditt.org (Gordon Burditt) To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Demise of on-line telephone directory databases Message-ID: <oI2dnXbL24AQvnzUnZ2dnUVZ_jmdnZ2d@posted.internetamerica> >> Might as well resume using printed telephone directories. The number of >> published listings is way down, as the ILEC doesn't carry all telephone >> numbers from CLEC's, but at least what you find stands a better chance >> of being accurate. > >It's impossible to find my phone number via such searches. I prefer >it this way. I get nearly zero junk phone calls. > The model I prefer is: if you want your number listed in a directory, then contact a directory company (or several) and pay for it. Telephone companies may not sell data to directory companies. If a telephone company runs a directory company, it must be done as a separate unit with no access to the telephone company database. Very, very few people within a telephone company, and none outside, should be able to do a lookup by name. There is no national security or 911 exception. They can make their own deals with directory companies. ------------------------------ Date: Fri, 10 Apr 2009 22:22:41 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Sabotage attacks knock out phone service [Calif.] Message-ID: <p0624080bc60400141faa@[10.0.1.6]> Sabotage attacks knock out phone service Henry K. Lee,Ryan Kim, Chronicle Staff Writers Thursday, April 9, 2009 (04-09) 12:20 PDT SAN JOSE -- Vandals cut fiber-optic cable lines belonging to AT&T and Sprint at two locations early today, knocking out landline and cellular phone service to thousands of residential customers and businesses in southern Santa Clara County, in Santa Cruz and San Benito counties and along the Peninsula, authorities said. Four AT&T fiber-optic cables were severed shortly before 1:30 a.m. along Monterey Highway north of Blossom Hill Road in south San Jose, police Sgt. Ronnie Lopez said. Sprint's cable in San Carlos was cut about two hours later, a company official said. The exact location was not immediately known. Police used yellow tape to cordon off the area where the AT&T cables were destroyed, which is near railroad tracks, as investigators and phone company workers descended into an underground vault where the cables are located. ... http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/04/09/BAP816VTE6.DTL ------------------------------ Date: Fri, 10 Apr 2009 22:22:52 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Skype moves in on cellphone industry Message-ID: <p06240813c60469b6e258@[10.0.1.6]> TECH LAB Skype moves in on cellphone industry By Hiawatha Bray, Globe Staff | April 9, 2009 The Boston Globe Technology has a way of eroding corporate empires; ask anybody in the newspaper business. Now the cellular phone industry is getting a taste of the same medicine. By installing new software on their smartphones, consumers are hooking up to alternative phone services and bypassing their cell carriers. It isn't an entirely new trend, but it may have reached a tipping point on March 31. That's when the Internet-based telephone service Skype introduced a version of its software that runs on the popular Apple iPhone. You've probably heard of Skype, a program written by Estonian hackers and later bought by Internet auction house eBay for $2.6 billion. People around the world use it to talk to each other free of charge over their Internet-linked computers. Skype also offers connections to traditional phone services at dirt-cheap prices. For example, Skype calls to any phone number in the United States cost 2.1 cents per minute. But it's mainly a hit with international callers, because the service's prices for overseas calls beat standard phone company rates. My wife pays Skype about 21 cents a minute to chat with her relatives in Congo, while AT&T charges 59 cents a minute. But what good is Skype on a cellphone? Wouldn't you still have to burn cellular minutes to use it? Not if your phone has built-in Wi-Fi wireless networking. Then Skype could relay calls over the Internet, with no help from the phone company. ... http://www.boston.com/business/technology/articles/2009/04/09/skype_moves_in_on_cellphone_industry/ ------------------------------ Date: Fri, 10 Apr 2009 22:24:24 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Electricity Grid in U.S. Penetrated By Spies Message-ID: <p06240817c6046efe1f34@[10.0.1.6]> Electricity Grid in U.S. Penetrated By Spies By SIOBHAN GORMAN APRIL 8, 2009 Robert Moran monitors an electric grid in Dallas. Such infrastructure grids across the country are vulnerable to cyberattacks. WASHINGTON -- Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials. The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war. ... http://online.wsj.com/article/SB123914805204099085.html ------------------------------ Date: Fri, 10 Apr 2009 22:39:55 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Conficker C Analysis Message-ID: <p0624081fc605b1069a8b@[10.0.1.6]> SRI International Technical Report Addendum Conficker C Analysis Phillip Porras, Hassen Saidi, and Vinod Yegneswaran Release Date: 08 March 2009 Last Update: 4 April 2009 Computer Science Laboratory SRI International 333 Ravenswood Avenue Menlo Park CA 94025 USA Introduction This addendum provides an evolving snapshot of our understanding of the latest Conficker variant, referred to as Conficker C. The variant was brought to the attention of the Conficker Working Group when one member reported that a compromised Conficker B honeypot was updated with a new dynamically linked library (DLL). Although a network trace for this infection is not available, we suspect that this DLL may have propagated via Conficker's Internet rendezvous point mechanism (Global Network Impact). The infection was found on the morning of Friday, 6 March 2009 (PST), and it was later reported that other working group members had received other DLL reinfections throughout the same day. Since that point, multiple members have reported upgrades of previously infected machines to this latest variant via HTTP-based Internet rendezvous points. We believe this latest outbreak of Conficker variant C began first spreading at roughly 6 p.m. PST, 4 March 2009 (5 March UTC). In this addendum report, we summarize the inner workings and practical implications of this latest malicious software application produced by the Conficker developers. In addition to the dual layers of packing and encryption used to protect A and B from reverse engineering, this latest variant also cloaks its newest code segments, along with its latest functionality, under a significant layer of code obfuscation to further hinder binary analysis. Nevertheless, with a careful mixture of static and dynamic analysis, we attempt here to summarize the internal logic of Conficker C. ... http://mtc.sri.com/Conficker/addendumC/ New: Free Detection Utilities Conficker C P2P Snort Detection Module http://mtc.sri.com/Conficker/contrib/plugin.html Conficker C Network Scanner http://mtc.sri.com/Conficker/contrib/scanner.html ------------------------------ Date: Fri, 10 Apr 2009 22:39:55 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: An Analysis of Conficker Message-ID: <p0624081ec605b0376a18@[10.0.1.6]> SRI International Technical Report An Analysis of Conficker's Logic and Rendezvous Points Phillip Porras, Hassen Saidi, and Vinod Yegneswaran Release Date: 4 February 2009 Last Update: 19 March 2009 Computer Science Laboratory SRI International 333 Ravenswood Avenue Menlo Park CA 94025 USA Introduction Conficker is one of a new interesting breed of self-updating worms that has drawn much attention recently from those who track malware. In fact, if you have been operating Internet honeynets recently, Conficker has been one very difficult malware to avoid. In the last few months this worm has relentlessly pushed all other infection agents out of the way, as it has infiltrated nearly every Windows 2K and XP honeypot that we have placed out on the Internet. From late November through December 2008 we recorded more than 13,000 Conficker infections within our honeynet, and surveyed more than 1.5 million infected IP addresses from 206 countries. More recently, our cumulative census of Conficker.A indicates that it has affected more than 4.7 million IP addresses, while its successor, Conficker.B, has affected 6.7M IP addresses (see SRI Appendix I: Conficker Census). Our analysis finds that the two worms are comparable in size (within a factor of 3) and the active infection size of Conficker A and B are under 1M and 3M hosts, respectively. The numbers reported in the press are most likely overestimates. That said, as scan and infect worms go, we have not seen such a dominating infection outbreak since Sasser [6] in 2004. Nor have we seen such a broad spectrum of antivirus tools do such a consistently poor job at detecting malware binary variants since the Storm [4] outbreak of 2007. Early accounts of the exploit used by Conficker arose in September of 2008. Chinese hackers were reportedly the first to produce a commercial package to sell this exploit (for $37.80) [5]. The exploit employs a specially crafted remote procedure call (RPC) over port 445/TCP, which can cause Windows 2000, XP, 2003 servers, and Vista to execute an arbitrary code segment without authentication. The exploit can affect systems with firewalls enabled, but which operate with print and file sharing enabled. The patch for this exploit was released by Microsoft on October 23 2008 [3], and those Windows PCs that receive automated security updates have not been vulnerable to this exploit. Nevertheless, nearly a month later, in mid-November, Conficker would utilize this exploit to scan and infect millions of unpatched PCs worldwide. Why Conficker has been able to proliferate so widely may be an interesting testament to the stubbornness of some PC users to avoid staying current with the latest Microsoft security patches [2]. Some reports, such as the case of the Conficker outbreak within Sheffield Hospital's operating ward, suggest that even security-conscious environments may elect to forgo automated software patching, choosing to trade off vulnerability exposure for some perceived notion of platform stability [8]. On the other hand, the uneven concentration of where the vast bulk of Conficker infections have occurred suggest other reasons. For example, regions with dense Conficker populations also appear to correspond to areas where the use of unregistered (pirated) Windows releases are widespread, and the regular application of available security patches [9] are rare. In this paper, we crack open the Conficker A and B binaries, and analyze many aspects of their internal logic. Some important aspects of this logic include its mechanisms for computing a daily list of new domains, a function that in both Conficker variants, laid dormant during their early propagation stages until November 26 and January 1, respectively. Conficker drones use these daily computed domain names to seek out Internet rendezvous points that may be established by the malware authors whenever they wish to census their drones or upload new binary payloads to them. This binary update service essentially replaces the classic command and control functions that allow botnets to operate as a collective. It also provides us with a unique means to measure the prevalence and impact of Conficker A and B. The contributions of this paper include the following: * * A static analysis of Conficker A and B. We dissect its top level control flow, capabilities, and timers. * * A description of the domain generation algorithm and the rendezvous protocol. * * An empirical analysis of infected hosts observed through honeynets and rendezvous points. * * Exploration of Conficker's Ukrainian evidence trail. * * A first look at a variant of Conficker B (which we call B++) and the implications of its binary flash mechanism. ... http://mtc.sri.com/Conficker/ New: Free Detection Utilities Conficker C P2P Snort Detection Module http://mtc.sri.com/Conficker/contrib/plugin.html Conficker C Network Scanner http://mtc.sri.com/Conficker/contrib/scanner.html ------------------------------ Date: Fri, 10 Apr 2009 22:44:19 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Sabotage attacks knock out phone service Message-ID: <p06240821c605b3d14247@[10.0.1.6]> Sabotage attacks knock out phone service Nanette Asimov, Ryan Kim,Kevin Fagan, Chronicle Staff Writers Friday, April 10, 2009 (04-10) 04:00 PDT SAN JOSE -- Police are hunting for vandals who chopped fiber-optic cables and killed landlines, cell phones and Internet service for tens of thousands of people in Santa Clara, Santa Cruz and San Benito counties on Thursday. The sabotage essentially froze operations in parts of the three counties at hospitals, stores, banks and police and fire departments that rely on 911 calls, computerized medical records, ATMs and credit and debit cards. The full extent of the havoc might not be known for days, emergency officials said as they finished repairing the damage late Thursday. Whatever the final toll, one thing is certain: Whoever did this is in a world of trouble if he, she or they get caught. "I pity the individuals who have done this," said San Jose Police Chief Rob Davis. Ten fiber-optic cables carrying were cut at four locations in the predawn darkness. Residential and business customers quickly found that telephone service was perhaps more laced into their everyday needs than they thought. Suddenly they couldn't draw out money, send text messages, check e-mail or Web sites, call anyone for help, or even check on friends or relatives down the road. Several people had to be driven to hospitals because they were unable to summon ambulances. Many businesses lapsed into idleness for hours, without the ability to contact associates or customers. More than 50,000 landline customers lost service - some were residential, others were business lines that needed the connections for ATMs, Internet and bank card transactions. One line alone could affect hundreds of users. ... http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2009/04/10/MNP816VTE6.DTL ------------------------------ Date: Sun, 12 Apr 2009 08:40:34 +1000 From: David Clayton <dcstar@myrealbox.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Sabotage attacks knock out phone service Message-ID: <pan.2009.04.11.22.40.32.572122@myrealbox.com> On Sat, 11 Apr 2009 09:19:47 -0400, Monty Solomon wrote: > > Sabotage attacks knock out phone service > > Nanette Asimov, Ryan Kim,Kevin Fagan, Chronicle Staff Writers > > Friday, April 10, 2009 > > (04-10) 04:00 PDT SAN JOSE -- > > Police are hunting for vandals who chopped fiber-optic cables and > killed landlines, cell phones and Internet service for tens of > thousands of people in Santa Clara, Santa Cruz and San Benito > counties on Thursday. > > The sabotage essentially froze operations in parts of the three > counties at hospitals, stores, banks and police and fire departments > that rely on 911 calls, computerized medical records, ATMs and > credit and debit cards. ......... Gee, all these billions upon billions of dollars spent on "security" around the world each year and still there are ways to bring western civilization to its knees with little effort. Better hope those terrorist type people don't figure out that they could cripple a country's economy (in the short-term, at least) with a well co-ordinated attack on these innumerable easy targets. -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have. ***** Moderator's Note ***** Fiber-optic cables are child's play compared to the other possibilities. The fact is that the infrastructure of the United States is, for practical purposes, unguarded and unprotected. I won't list the obvious attack vectors that come to mind. Although I'm not vain enough to assume that others haven't thought of them, I _am_ getting superstitious in my old age, so I won't. Bill Horne Temporary Moderator ------------------------------ Date: Sat, 11 Apr 2009 17:20:17 -0400 From: T <kd1s.nospam@cox.nospam.net> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Sabotage attacks knock out phone service Message-ID: <MPG.244ad39a76e6bc7d9899b7@reader.motzarella.org> In article <p06240821c605b3d14247@[10.0.1.6]>, monty@roscom.com says... > > Sabotage attacks knock out phone service > > Nanette Asimov, Ryan Kim,Kevin Fagan, Chronicle Staff Writers > > Friday, April 10, 2009 > > (04-10) 04:00 PDT SAN JOSE -- > > Police are hunting for vandals who chopped fiber-optic cables and > killed landlines, cell phones and Internet service for tens of > thousands of people in Santa Clara, Santa Cruz and San Benito > counties on Thursday. [Moderator snip] > http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2009/04/10/MNP816VTE6.DTL As a ham, I have to ask where was the amateur radio communty in this. It's been proven time and again that amateur radio is the only thing standing when landline and cell services go down. ***** Moderator's Note ***** Ham radio may be still standing when cell and landlines are down, but it's not operational. Short of having hams drive around with loudspeakers advertising their presence, there's no way to make the citizenry aware of their capabilities. Bill Horne Temporary Moderator ------------------------------ Date: Sat, 11 Apr 2009 18:15:26 -0700 From: Sam Spade <sam@coldmail.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Sabotage attacks knock out phone service Message-ID: <OgbEl.16884$Qh6.6057@newsfe14.iad> Monty Solomon wrote: > "I pity the individuals who have done this," said San Jose Police > Chief Rob Davis. I can see the San Jose Police closing in on these culprits in some trailer park outside of Modesto. ***** Moderator's Note ***** Given that Modesto is about 90 miles away from San Jose, I'd bet on Los Gatos or Sunnyvale. Bill Horne Temporary Moderator ------------------------------ Date: Sat, 11 Apr 2009 00:26:30 -0400 From: Will Roberts <oldbear@arctos.com> To: redacted@invalid.telecom.csail.mit.edu Subject: fwd: "Service restored in Silicon Valley after fiber cut" Message-ID: <0MKp8S-1LsUnc0h41-000foK@mrelay.perfora.net> C|NET April 10, 2009 Service restored in Silicon Valley after fiber cut by Marguerite Reardon The fiber cut that crippled phone and broadband service and knocked out 911 emergency services in Silicon Valley on Thursday has been fixed, according to a Twitter post from AT&T. "CA Outage Update: Repairs to vandalized San Jose cables were completed overnight. Services are operating normally this morning. " Sprint's public relations spokeswoman Crystal Davis "tweeted" at about 7 a.m. PDT that the "Fiber cut issue affecting Sprint's wireless service in San Jose/Santa Cruz has been completely resolved as of appx 2:40am EDT." Service was slowly coming back online Thursday afternoon and into the evening for many wireless, phone and Internet customers. VerticalResponse, a San Francisco-based company that uses an ISP whose servers are collocated in Palo Alto, Calif., said its servers went back online around 12:30 p.m. PDT. And one CNET News reader living in San Martin, Calif. said he was able to make and receive landline and cell phone calls around 7:15 p.m. PDT on Thursday. Thousands of wireless, Internet and landline phone customers were without service from about 1:30 a.m. PDT after vandals had cut four fiber-optic cables owned by AT&T. A cable in San Carlos, owned by Sprint Nextel, had also been severed about two later. But Sprint spokeswoman Crystal Davis said the company was able to reroute most of that traffic onto another fiber link and for the most part, service was not disrupted. That was not the case with AT&T's fibers. Because AT&T is the local phone company in the area, nearly all wireless, landline telephone, and consumer broadband services travel over the company's regional network regardless of which company provides the service. For example, Verizon Wireless and Sprint use AT&T's regional network to connect their wireless cell phone towers to their respective national networks. As a result, wireless customers were without service in the region where the fibers had been cut. Officials also said that residents in the San Jose/Santa Clara region were without emergency 911 service for much of the day. Exactly how vandals gained access to the cables that had been severed is not yet fully known. Sprint's Davis said a manhole cover was opened and the cables simply cut. She explained that fiber cuts are common, but are usually accidental--done unintentionally by utility repairmen or landscapers. AT&T said on its Twitter feed on Thursday that it is offering a $100,000 reward to anyone who has information that could lead to an arrest or conviction of the vandals who cut the fibers. The company has also said it's working closely with law enforcement. ## ***** Moderator's Note ***** AT&T? Twitter? Repent, sinners! The universe is coming to an end! The signs are all around us! Bill Horne Temporary Moderator ------------------------------ TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is currently being moderated by Bill Horne while Pat Townson recovers from a stroke. Contact information: Bill Horne Telecom Digest 43 Deerfield Road Sharon MA 02067-2301 781-784-7287 bill at horne dot net Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2008 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of The Telecom digest (15 messages) ******************************

Return to Archives**Older Issues