30 Years of the Digest ... founded August 21, 1981
The Telecom Digest for March 17, 2012
====== 30 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using any name or email address
included herein for any reason other than responding to an article
herein, you agree to pay a hundred dollars to that person, or email address
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Fri, 16 Mar 2012 04:18:58 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: Spring Break Gets Tamer as World Watches Online Message-ID: <email@example.com> Spring Break Gets Tamer as World Watches Online By LIZETTE ALVAREZ March 16, 2012 KEY WEST, Fla. - Ah, Spring Break, with its copious debauchery, its spontaneous bouts of breast-baring, Jager bombing and après-binge vomit. In this era of "Jersey Shore" antics and "Girls Gone Wild," where bikini tops vanish like unattended wallets, it would seem natural to assume that this generation of college student has outdone the spring break hordes of decades past on the carousal meter. But today's spring breakers - at least some of them - say they have been tamed, in part, not by parents or colleges or the fed-up cities they invade, but by the hand-held gizmos they hold dearest and the fear of being betrayed by an unsavory, unsanctioned photo or video popping up on Facebook or YouTube. Late one March evening at Rick's Bar on rum-soaked Duval Street, college students alternated Jell-O shots with iPhone shots. ... http://www.nytimes.com/2012/03/16/us/spring-break-gets-tamer-as-world-watches-online.html ***** Moderator's Note ***** Ah, at last: the second wave of electronic awareness. Users are moderating their behavior based on past experience, and next (dare we hope?) they will think about the information being gathered by others, and how it's being used. Bill Horne Moderator
Date: Thu, 15 Mar 2012 22:11:24 +0000 (UTC) From: firstname.lastname@example.org (Garrett Wollman) To: email@example.com. Subject: Re: Inside the Stratfor Attack Message-ID: <firstname.lastname@example.org> In article <c_KdnYDBEdCk_v_SnZ2dnUVZ_gednZ2d@posted.nuvoxcommunications>, Robert Bonomi <email@example.com> wrote: >If the attacks were conducted by citizens of Ireland and England, who >arrested them? Are those countries party to a treaty that makes their >citizens subject to U.S. law? The United States has extradition treaties with many other countries. The "hacking" took place on machines located within the United States, against a U.S. corporation, so no extraterritoriality is implied. -GAWollman -- Garrett A. Wollman | What intellectual phenomenon can be older, or more oft firstname.lastname@example.org| repeated, than the story of a large research program Opinions not shared by| that impaled itself upon a false central assumption my employers. | accepted by all practitioners? - S.J. Gould, 1993 ***** Moderator's Note ***** The real question is whether Ireland and Great Britain should be willing to surrender their citizens to draconian penalties and interminable prison terms, when what Anonymous really did was mostly embarrass a few powerful companies that should have paid more attention to security. Bill Horne Moderator
Date: Thu, 15 Mar 2012 22:49:11 -0500 From: email@example.com (Robert Bonomi) To: firstname.lastname@example.org. Subject: Re: Inside the Stratfor Attack Message-ID: <BdWdnVgq9IyqJf_SnZ2dnUVZ_sydnZ2d@posted.nuvoxcommunications> In article <c_KdnYDBEdCk_v_SnZ2dnUVZ_gednZ2d@posted.nuvoxcommunications>, Robert Bonomi <email@example.com> wrote: >In article <firstname.lastname@example.org>, >> >>***** Moderator's Note ***** >> >>Is Ms. Perlroth referring to the "Anonymous" hackers, or was the >>Stratfor attack conducted by a different group? > >Yes, it was the 'anonymous' gang. > >***** Moderator's Note ***** > >If the attacks were conducted by citizens of Ireland and England, who >arrested them? Are those countries party to a treaty that makes their >citizens subject to U.S. law? The legal issue is where the crime occurred. The laws of that jurisdiction apply. I believe that a violation of, say, 18 USC 1030 is deemed to occur where the computer(s) in question is(are) located. Thus, U.S. law enforcement can file a criminal complaint/indictment in U.S. Courts, even if the perp is extra-territorial -- his acts in 'touching' the computer 'inside' the U.S. is sufficient -- according to U.S. law -- to give the U.S. courts "jurisdiction" over him. Then it is simply a matter of bringing the purported perpetrator before said court for trial. There -are- extradition treaties in place between a lot of countries that do apply in such situations. Thus 'local' law-enforcement could take the alleged perp(s) into custody pending extradition. The alleged perps may also have violated 'domestic' laws concerning, say, 'receiving stolen property' -- with the evidence developed by "the F.B.I. and others" being sufficient to support local charges in that jurisdiction as well. This is all a matter of long-established legal principles, and practice. The NY Times article is lacking in 'technical details' of the arrests, so anything based on that is 'speculation". Some subsequent digging shows that those arrested used the collective name of "LulzSec", which is described as "*an* operating arm of the hacking organization known as 'Anonymous''. Of the six persons arrested, two are residents of the U.S., two resided in the United Kingdom, and two reside in Ireland. All six face multiple charges in the U.S, prosecution being coordinated by the U.S. Atty for the Southern District of New York. The two U.K. residents face separate charges in the U.K., and at least one of the Ireland residents appears to be facing local charges there. Googling for 'lulzsec' and 'f.b.i.' brings up a bunch of more detailed coverage. ***** Moderator's Note ***** The NY Times article was a once-over-lightly fluff piece, with no background, no research, and lots of scare tactics. The EFFA_BEE_EYE is coming to get you if you embarrass the big boys! The EFFA_BEE_EYE will reach out to anyone who DARES to hack into a computer! Pulleeze. Bill Horne Moderator
Date: 16 Mar 2012 17:16:02 -0000 From: "John Levine" <email@example.com> To: firstname.lastname@example.org. Subject: Re: Inside the Stratfor Attack Message-ID: <email@example.com> >The legal issue is where the crime occurred. The laws of that >jurisdiction apply. Yes, but extradition treaties invariably have limits. For example, many countries will not extradite murder suspects to the US unless they get a guarantee of no death penalty. The UK has a fairly bad extradition treaty which makes it way too easy to extradite people to the US for stuff that's (arguably) legal in the UK. It's a political issue there. R's, John
Date: Fri, 16 Mar 2012 04:16:58 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: For Apple, Pressure Builds Over App Store Fraud Message-ID: <firstname.lastname@example.org> For Apple, Pressure Builds Over App Store Fraud By EVELYN M. RUSLI and BRIAN X. CHEN March 15, 2012 In a little over an hour, Ryan Matthew Pierson racked up $437.71 in iTunes charges for virtual currency that he could use to buy guns, nightclubs and cars in iMobsters, a popular iPhone game. One problem: Mr. Pierson, a technology writer in Texas, has never played iMobsters. "This was fraud," said Mr. Pierson, recalling the November incident. "I woke up, checked my e-mail, and I could see these purchases happening in real time." Mr. Pierson raised the issue with Apple and his bank, and the problem was eventually resolved. But his experience is hardly unique, as reflected by hundreds of online complaints saying that Apple's iTunes Store, and in particular its App Store, which the company portrays as the safest of shopping environments, is not so secure. The complaints come from consumers like Mr. Pierson, who say that their accounts have been hijacked or that some apps are falsely advertised. And they come from creators of apps, who say they are having to deal with fraudulent purchases that drain their time and resources. Software makers also complain that competition in the App Store has become so brutal that many companies resort to artificially inflating their popularity rankings to grab attention. It's a change for Apple, which was once criticized for its micromanaging of the App Store. Now the problem is not too much control, but too little. ... http://www.nytimes.com/2012/03/16/technology/pressure-on-apple-builds-over-app-store-fraud.html
Date: Fri, 16 Mar 2012 12:43:49 -0400 From: danny burstein <email@example.com> To: firstname.lastname@example.org. Subject: Looks like lights out for LightSquared Message-ID: <Pine.NEB.email@example.com> [CNN] Sprint terminates contract with LightSquared (New York) - Sprint ended its $9 billion agreement with LightSquared on Friday, after it became increasingly clear that LightSquared's network may not get off the ground. ... The nation's third-largest wireless carrier was hoping to build out and license a 4G network to LightSquared, which the wholesaler would use in tandem with its own infrastructure to launch its service. In turn, Sprint would have been able to use up to 50% of LightSquared's network capacity for its own customers. .... Sprint had twice extended its tentative agreement with LightSquared in hope that the company could gain regulatory approval, but Sprint's faith in that process ended Friday. "Due to these unresolved issues ... Sprint has elected to exercise its right to terminate the agreement announced last summer," a Sprint spokesman wrote in an e-mailed statement. -------- rest: http://money.cnn.com/2012/03/16/technology/sprint-lightsquared/index.htm _____________________________________________________ Knowledge may be power, but communications is the key firstname.lastname@example.org [to foil spammers, my address has been double rot-13 encoded]
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2012 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.