32 Years of the Digest ... founded August 21, 1981
The Telecom Digest for September 7, 2013
====== 32 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using any name or email address
included herein for any reason other than responding to an article
herein, you agree to pay a hundred dollars to that person, or email address
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Fri, 6 Sep 2013 23:50:40 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: Judge Sets Restrictions for Apple on E-Books Message-ID: <email@example.com> Judge Sets Restrictions for Apple on E-Books By JULIE BOSMAN September 6, 2013 As punishment for engaging in an e-book price-fixing conspiracy, Apple will be forced to abide by new restrictions on its agreements with publishers and be evaluated by an external "compliance officer" for two years, a federal judge has ruled. But the judge, Denise L. Cote of Federal District Court in Manhattan, rejected some of the measures sought by the Justice Department, including extensive government oversight over Apple's App Store. In a filing this week, Judge Cote issued her final ruling on the penalties to be imposed on Apple after the long-running lawsuit against the technology giant filed by the Justice Department in April 2012. ... http://www.nytimes.com/2013/09/07/business/media/judge-sets-final-restrictions-for-apple-on-e-books.html
Date: Fri, 6 Sep 2013 23:50:40 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: Legislation Seeks to Bar N.S.A. Tactic in Encryption Message-ID: <firstname.lastname@example.org> Legislation Seeks to Bar N.S.A. Tactic in Encryption By SCOTT SHANE and NICOLE PERLROTH September 6, 2013 After disclosures about the National Security Agency's stealth campaign to counter Internet privacy protections, a congressman has proposed legislation that would prohibit the agency from installing "back doors" into encryption, the electronic scrambling that protects e-mail, online transactions and other communications. Representative Rush D. Holt, a New Jersey Democrat who is also a physicist, said Friday that he believed the N.S.A. was overreaching and could hurt American interests, including the reputations of American companies whose products the agency may have altered or influenced. ... http://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html
Date: Fri, 6 Sep 2013 23:50:40 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: F.T.C. Says Webcam's Flaw Put Users' Lives on Display Message-ID: <email@example.com> F.T.C. Says Webcam's Flaw Put Users' Lives on Display By EDWARD WYATT September 4, 2013 WASHINGTON - The so-called Internet of Things - digitally connected devices like appliances, cars and medical equipment - promises to make life easier for consumers. But regulators are worried that some products may be magnets for hackers. On Wednesday, the Federal Trade Commission took its first action to protect consumers from reckless invasions of privacy, penalizing a company that sells Web-enabled video cameras for lax security practices. According to the F.T.C., the company, TRENDnet, told customers that its products were "secure," marketing its cameras for home security and baby monitoring. In fact, the devices were compromised. The commission said a hacker in January 2012 exploited a security flaw and posted links to the live feeds, which "displayed babies asleep in their cribs, young children playing and adults going about their daily lives." ... http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html
Date: Fri, 6 Sep 2013 23:50:40 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: N.S.A. Able to Foil Basic Safeguards of Privacy on Web Message-ID: <firstname.lastname@example.org> N.S.A. Able to Foil Basic Safeguards of Privacy on Web By NICOLE PERLROTH, JEFF LARSON and SCOTT SHANE September 5, 2013 The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume - or have been assured by Internet companies - that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own "back door" in all encryption, it set out to accomplish the same goal by stealth. The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated. ... http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2013 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.