29 Years of the Digest ... founded August 21, 1981
The Telecom Digest for July 18, 2011
====== 29 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Sat, 16 Jul 2011 12:18:24 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: In Framingham, ring helps man find his stolen iPhone Message-ID: <email@example.com> In Framingham, ring helps man find his stolen iPhone By Scott O'Connell/Daily News staff MetroWest Daily News Posted Jul 16, 2011 @ 12:14 AM Last update Jul 16, 2011 @ 12:55 AM FRAMINGHAM - A truck driver made the right call after discovering his phone had been stolen Thursday morning. He quickly used another phone to dial his own number, which led him to the suspected thief just a few feet away. Police said they arrested Ronald B. Horne, 26, of 17B Thompson St., after he broke into a truck parked outside Dunkin' Donuts on Concord Street at 11:50 a.m. and took a cellphone, GPS unit, cigarettes and about $450 in cash. After taking the items, police said, Horne went inside the shop, where the truck's driver was getting his order. When the driver went back to his company truck, he noticed that his iPhone and GPS were gone. He went back into Dunkin' Donuts and asked to use the phone, which he used to call his iPhone, Lt. Victor Pereira said. "When he did this, he heard his ring tone coming from Mr. Horne's pocket," Pereira said. Horne admitted he took the phone and GPS, police said. ... http://www.metrowestdailynews.com/highlight/x633527300/Police-say-ringing-phone-gives-away-thief-in-Framingham
Date: Sat, 16 Jul 2011 18:25:54 -0700 From: Sam Spade <firstname.lastname@example.org> To: email@example.com. Subject: Re: Tracing Calls w/Spoofed Numbers? Message-ID: <r6qdnfU34P6-p7_TnZ2dnUVZ_tWdnZ2d@giganews.com> Robert Bonomi wrote: r-all problem. > > Now, if -you- can identify who the caller is, and establish that > they're inside the U.S.A., such a complaint to the AG has a much > better chance of action. In fact, you can also sue them directly. > Exactly. But, you better be prepared to pay your attorney up-front. A retainer of $20,000 would be a good starting place.
Date: Sat, 16 Jul 2011 20:06:48 -0700 (PDT) From: Lisa or Jeff <firstname.lastname@example.org> To: email@example.com. Subject: area code named beer Message-ID: <firstname.lastname@example.org> It seems that Budweiser will market beer named for the primary area code of a city. For instance, Philadelphia will soon have "215 beer" and there's a 312 for Chicago. for full article please see: http://www.philly.com/philly/business/homepage/20110716_Budweiser_trademarks__215___plans_challenge_to_local_brews.html Actually, this isn't as strange as it seems. Years ago, in the days of exchange names, some local businesses named themselves after the local exchange name. For instance, we had a small chain of pharmacies named Hyatt, Windsor, and Cypress, all exchanges of the towns they were in.
Date: Fri, 15 Jul 2011 12:38:37 -0400 From: Matt Simpson <email@example.com> To: firstname.lastname@example.org. Subject: Re: Tracing Calls w/Spoofed Numbers? Message-ID: <net-news69-CC93D2.email@example.com> In article <firstname.lastname@example.org>, "\(PeteCresswell\)" <x@y.Invalid> wrote: > Is this even possible - given the resources of a government? > > I keep getting these lame-sounding letters from the Pennsylvania > (USA) AG's office explaining why they can't do anything about > telephone solicitors calling my cell phone. > Tracing the calls is probably difficult. But they don't need to trace them. All they need to do is follow the money. The solicitors calling your cell phone (or your home phone) want money from you, probably via credit card. If the AG's office gave a crap, they could figure out where the money went and bust the callers that way.
Date: Fri, 15 Jul 2011 21:28:19 +0000 (UTC) From: email@example.com (Thor Lancelot Simon) To: firstname.lastname@example.org. Subject: Re: Most cellphone voice mail is vulnerable to hackers Message-ID: <email@example.com> In article <MPG.firstname.lastname@example.org>, T <email@example.com> wrote: >In article <firstname.lastname@example.org>, email@example.com says... >> >> Most cellphone voice mail is vulnerable to hackers >> Online services guide the way >> >> By Hiawatha Bray >> Globe Staff / July 13, 2011 >> >> Breaking into someone's voice mailbox - in the style of the hackers >> at the British tabloid News of the World - can be as easy in the >> United States as it is on the other side of the Atlantic. >> >> It is done using a readily available online service known as "caller >> ID spoofing,'' which can make a call appear to be coming from any >> phone number. Hackers can use it to access someone else's voice mail >> messages by fooling the system into thinking the call is coming from >> the owner's cellphone. >> >> If the mailbox is not protected by a password, as is often the case, >> the attacker can hear and even delete messages in the target's voice >> mailbox. >> >> There are numerous spoofing services in the United States; all you >> need to do is Google them. Although these services are used by >> hackers to commit crimes, they're also used legitimately by, for >> example, battered women who do not want their calls traced, or law >> enforcement agents operating undercover. >> >> ... >> >> >http://www.boston.com/business/technology/articles/2011/07/13/most_cellphone_voice_mail_is_vulnerable/ > >This was the case with Sprint phones some time ago. Actually assisted >someone in hacking their SO's voicemail using a MagicJack adapter and a >PERL script that allowed you to set your outbound CLID to anything your >heart desired. This means one of two things. Either: 1) Sprint's voicemail system is ignoring the "customer-provided" bit on calling number identification, or 2) Whoever is currently providing SS7 interconnect to Magic Jack should be forced to disconnect them post-haste, or use gateway screening to mark all calling party name and number fields received from Magic Jack as "customer provided" no matter what Magic Jack tells them. -- Thor Lancelot Simon firstname.lastname@example.org "All of my opinions are consistent, but I cannot present them all at once." -Jean-Jacques Rousseau, On The Social Contract
Date: Sun, 17 Jul 2011 02:10:38 -0400 From: T <email@example.com> To: firstname.lastname@example.org. Subject: Re: Neighbour from hell hacker gets 18 years in jail Message-ID: <MPG.email@example.com> In article <firstname.lastname@example.org>, dcstarbox- email@example.com says... > 'I'm going to kill you': neighbour from hell hacker gets 18 years jail > Asher Moses > July 14, 2011 > > A US man has been jailed for 18 years for waging a "campaign of terror" > against his neighbours, using their Wi-Fi to frame them for child > pornography, sexual harassment and other misconduct. > > Barry Ardolf, 46, repeatedly hacked into the Wi-Fi network of his > neighbours, Matt and Bethany Kostolnik, as part of an elaborate revenge > scheme after they reported him to police for kissing their four-year-old > son. > > Wow, seriously off his rocker. If you're going to crack all the WEP passwords in your neighborhood only use them for safe things, like downloading music and copyrighed videos. ***** Moderator's Note ***** We don't know that his neighbors were using WEP: the story said he used "password cracking software", and that could include dictionary attacks on WPA nodes. This story, although clearly so far out of the norm that the risk of it happening to anyone else can be discounted, is still a great starting point for a discussion about identity in the digital age. If you are what people think you are, then anyone who can influence what they think can decide what you are. Bill Bill Horne Moderator
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
|Contact information:||Bill Horne|
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecom- munications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2009 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.