Pat, the Editor

For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal   or  

 

TELECOM Digest     Sun, 26 Jun 2005 22:00:00 EDT    Volume 24 : Issue 293

Inside This Issue:                             Editor: Patrick A. Townson

    Should VOIP be Put on 'Hold'? (Lisa Minter)
    VOIP Security Concerns are Severe, Say Some Experts (Lisa Minter)
    Spit in Here, Please (Lisa Minter)
    Technology Has its Own Hangups For Users (Lisa Minter)
    WECO 302 Wiring Question (David Perrussel)
    Re: Where to Buy a Cellular Jammer (Dale Farmer)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Should VOIP be Put on 'Hold' For Now?
Date: Sun, 26 Jun 2005 18:59:17 -0500


A controversial series of articles about VOIP came across my desk over
the weekend; I am sharing them with you to get some opinions on the
topic.

Lisa

Let's Put VOIP on Hold
By David Coursey   May 17, 2005

Opinion: Until better defenses are available against phone hackers and
voice spam, hang up.

So you think your buying a VOIP telephone system for your company was
really smart? You certainly have reason to: Your users love the tight
integration between the phone system, their e-mail, and other PC
features. And the chief financial officer loves the "deal" you got on
long-distance rates. Everyone agrees: You're a hero.

Not so fast-and, probably, not for long.

How do you think people are going to feel about your VOIP (voice over
IP) system when they arrive one morning to find their voice mail boxes
completely filled with voice spam? When they read about hackers
listening in on what's being said in people's offices, even though the
phone is still on the hook?

VOIP has been around for a few years and, so far, seems to have been
pretty secure. But that's only because the bad guys have yet to turn
it into a major target. When they do, life promises to be very
different. And not in a good way.

Last week, I moderated another of our eSeminars, this one an
eye-opening discussion of VOIP security issues. I say "issues" because
there weren't too many solutions to discuss.

The panel included Wayne Rash, who writes much of our VOIP security
coverage; Andrew Graydon, of the VOIP Security Alliance, a trade
group; and Tom Leh, of VOIP Inc. a vendor.

[Lisa notes: See another article today here regards VOIP security threats.]

If you've got an hour, you can watch and listen to a replay of the
presentations. I walked away from the event convinced there shouldn't
be any more VOIP installations until we have a better idea of how to
protect them.

VOIP takes all the security problems associated with PCs and all the
security problems associated with the Internet, and throws in a bunch
of new telephony hardware, new protocols, and different user behavior
and expectations. The possibilities for voice spamming, called SPIT,
for SPam over Internet Telephony, ought to give every network
administrator pause.

[Lisa notes: We also talk about SPIT {or VOIP spam} in this issue and
the potential for SPIT, or voice spamming.]

Then comes eavesdropping, both of phone calls and room conversations,
and a whole new set of opportunities for what used to be called phone
phreaking.

We really don't know what's possible for the VOIP hacker, but we do
know that the hobby hacker has been replaced by the criminal
hacker. On thing's certain: This time phone phreaking won't be a
fairly harmless bunch of kids blowing Cap'n Crunch whistles to get
free long-distance calls.

ost people don't realize how secure our telephone network has
been. Sure, you get spam phone calls, despite the "no-call" list.

But, on the whole, your hardwired telephone is quite secure,
especially the one in your home. Getting at your conversations
generally requires a physical tap on your line. Modern cordless
telephones can be hacked, but you still have to be close enough to
pick up the radio signals.

With IP telephony, an intrusion can be launched from almost
anywhere. And even if the VOIP system is well-protected, each PC with
a "soft phone" application installed provides a potential door for a
hacker to exploit.

On basic principles, I am not wild about running our nation's critical
telecom infrastructure entirely over the Internet. Or even mostly.
There is too much at stake and the network is too insecure and perhaps
too brittle for the job.

Despite my grave misgivings, however, VOIP is here to stay. But until
we have seen what the hackers can do, I'll keep VOIP away from my
network and I recommend you do the same.

Check out eWEEK.com's VOIP & Telephony Center for the latest
news, views and analysis on voice over IP and telephony.

Copyright 1996-2005 Ziff Davis Publishing Holdings Inc.



[TELECOM Digest Editor's Note: Next, Lisa presents an article on 
security concerns when you install VOIP.   PAT]

------------------------------

From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Severe Vulnerabilities Possible in VOIP According to Experts
Date: Sun, 26 Jun 2005 19:02:30 -0500


By Wayne Rash
April 5, 2005

Dr. Shashi Phoha, director of the Information Technology Laboratory at
the National Institute of Standards and Technology, said she thinks
that the growth of VOIP technology brings with it some significant
risks that users need to be prepared to address.

"The vulnerabilities are severe," she said, pointing to a list that
included ways to spoof or spy that aren't easily available on regular
phones.

One of the biggest sources for vulnerabilities is the involvement of
personal computers in creating VOIP solutions.

She said that while it may not appear to be that critical, the fact
that it can be relatively easy to hack into computers can also expose
the phone system to fraud and abuse.

Phoha's list went on to address the availability of open source
eavesdropping tools, that digital phone calls could be edited by
digital voice editors to add, remove or change words without any
possibility of detection.

She also said that the government was worried that it would be
relatively easy with VOIP phones to bug a room using on-hook audio.

This is a technique in which hackers or spies can turn on the
microphone in a VOIP handset while it remains on its cradle.

This way, the phone would appear to be operating properly while
actually transmitting every sound within its range to a remote site.

Other things that keep Phoha worried, she says, are the
vulnerabilities related to soft phones, which are applications that
work like phones, but are entirely software and are run on personal
computers.

She said that these phones are vulnerable to worms, viruses and Trojan
horses, and could spread these problems throughout the voice network.

[Lisa notes: And you know, she has good points. Consider how many 
computers are 'Zombies' which spend their time attacking other 
computers. Would it be that much of a hassle to continue the
'zombification' to include the VOIP terminals on computers? Read my
third article today in this series about SPIT (spam over Internet 
telephony) which has begun to make its appearance.]

She says that what worries her the most, however, are "attacks we
haven't thought of yet."

Phoha made her remarks at a panel discussing VOIP held at the National
Press Club a few weeks ago.

Phoha said that it's possible to combat some of the threats her
organization is finding by careful design and risk analysis.

She said that risk can also be reduced by using encryption of the
voice traffic, and by using VOIP-specific intrusion detection systems
and firewalls.

She also advocated keeping data traffic and VOIP on logically separate
networks. She noted that her group is also working to develop new
security architectures for use by the government, but that commercial
and private users should also consider following the NIST
recommendations, which are available on the agency's Web site.

Check out eWEEK.com's VOIP & Telephony Center for the latest news,
views and analysis on voice over IP and telephony.

Copyright 1996-2005 Ziff Davis Publishing Holdings Inc.

------------------------------

From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Spit in Here, Please
Date: Sun, 26 Jun 2005 19:00:47 -0500


SPIT Into This, Please
By Wayne Rash
March 16, 2005

Opinion: VOIP faces threats from spam and offshoring, but how bad?


Picture the world of voice traffic on the Internet as a dark and
forbidding place, rife with mobsters, con artists and shadowy sellers
of dubious products.

Now picture getting hundreds of calls from these people every day.

Imagine your worst day ever of telemarketing, back before the Do Not
Call list, and then magnify it 10 times over.

That's the depressing future of VOIP (voice over IP), according to a
report just released by the Burton Group.

According to analyst Daniel Golding, the report's author, low costs
brought on by outsourcing and offshoring, coupled with VOIP
communications that are essentially free, can bring you exactly that
kind of future, unless you take precautions.

According to Golding, current federal laws prohibiting such
unsolicited calls are also part of the driving force for those
overseas call centers.

"The big issue here is: How much do I have to spend to get a certain
number of responses?" Golding explained.

He predicts that most of the calls will come from organizations
operating illegally or committing fraud.

He said this will mean that they won't care about the Do Not Call
list, or about the hostility telemarketers currently meet.

"They don't care if 99 percent of the people hate them," Golding
said. "They know that 1 percent are idiots."

Despite all of the hoopla about just how much of a problem VOIP spam
might be, there's little agreement.

In fact, there's little agreement on what constitutes VOIP spam
(sometimes called "SPIT," for spam over Internet telephony).

On one hand, you'll hear that U.S. consumers are about to feel an
onslaught of tens of thousands of telemarketing calls from overseas
call centers taking advantage of cheap calling, and using their
location to avoid U.S. do-not-call regulations.

On another, you'll hear that the real threat is more traditional spam
aimed at VOIP systems, or perhaps denial of service attacks on these
systems.

And on a third hand, you'll hear that the problem isn't all that bad,
and that it can be managed.

Copyright 1996-2005 Ziff Davis Publishing Holdings Inc.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Ziff Davis Publishing Holdings, Inc.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml


[TELECOM Digest Editor's Note: So ordinarily, we hear many good things
about VOIP; how it will revolutionize the telecom industry, etc, which
I am sure is the case. But there is a dark side to it all, as these
three special articles in this issue of the Digest indicate. Will in
fact the people who have turned so many computers into Zombies
continue their work with VOIP? If you think not, then why not?  PAT]

------------------------------

From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Technology Has its Own Hangups For Users
Date: Sun, 26 Jun 2005 18:54:27 -0500


Dateline: Pittsburgh, Pa. Sunday, June 26, 2005

Technology has its own hangups for users. For better or worse, techn-
ology that allows us to screen callers can throw a wrench into timely
communications.

We want answers, and we want them fast.

And when the speed with which these answers arrive isn't up to our
expectations, we look for someone -- or something -- to blame.

Technology, it seems, is an easy target.

In a recent survey, 67 percent of the 1,750 people interviewed by
Siemens Communications Inc. took target practice at telephone and
online communications, saying they spend too much time leaving voice
mails and sending e-mails when quick answers are what they need. And
when answers finally do arrive, these same people reported the calls
often came back too late.

Society is plugged in as never before -- with PDAs, cell phones,
e-mail, faxes, caller ID and voice mail -- and experts offer varying
opinions about the cause and effect. Some say Americans are feeling
increasingly unplugged, disconnected and out of control, trapped in a
never-ending game of phone tag. Others say that the ability to screen
phone calls through caller ID, sift through e-mail and, particularly
for businesses, handle customer calls through automated voice systems
is worth any inconvenience and potential waiting game.

"Isn't it interesting that we blame the technology?" said Richard
Thompson, a professor and director of the graduate program in
telecommunications at the University of Pittsburgh. Thompson worked
for 20 years at AT&T Bell Labs before coming to Pitt in 1989.

"Isn't this like being annoyed about traffic congestion, so we blame
the inventors of the automobile? It sounds to me like when people need
information from someone else, that 67 percent of them put off getting
it until the last possible minute.

"I think this complaint says a lot about how busy we are and how
hectic our jobs are, on both sides of the phone call or e-mail, but
especially on the calling party's side."

Barry Lawrence of Siemens, the survey folks, says productivity is
declining because it's so hard to reach people. And our personal lives
have grown more frustrating because it's hard to reach a live person
at your health club or day-care center. The communications technology
designed to make our lives easier is affecting our work, lifestyles
and mental health, Lawrence said.

Playing phone tag also is making our skins thinner, said Wu Zhou, a
senior analyst for Boston-based IDC, a top telecommunications research
firm, because we never know when or if the person we're trying to
reach listens to voice mail or reads e-mails.

But technology doesn't give people a license to be rude, said Martin
Weiss, associate professor of telecommunications at Pitt. "It's like
the argument about guns," he said -- do you blame the people who use
the technology for not returning calls or e-mails, or the technology
that allows them to screen your communication? And is caller ID
something the complainer covets himself because he can screen, say,
persistent telemarketers?

"You can't have it both ways," Weiss said.

Zhou argued that those who do listen to voice mails and read e-mails
could be using that time more productively.

It's a balancing act, these questions of civility versus service,
efficiency versus delay, and which side you fall on depends mostly on
which side of the phone line you happen to be on.

Out of reach

"We are so bombarded by information that we are defending ourselves
with tools such as caller ID," said Pier Forni, an expert on manners
at Johns Hopkins University in Baltimore and author of "Choosing
Civility: The 25 Rules of Considerate Conduct."

"If a talkative friend is calling and you are busy, you have the good,
traditional option of answering. Just state that you are busy, and
that you will call back later."

But not responding to voice or e-mails "is a form of
non-acknowledgement; hence it's rude," Forni said.

Once again, Pitt's Thompson advised not to blame the messenger.

In an e-mail -- a prompt answer to a query about this article -- he
set up a premise, explaining that he is "usually someone from whom
people want information, instead of the one seeking the
information. People have a question about my master's program, so they
call me or send an e-mail."

He notes that most questions could be answered by viewing the
University's Web site, "but they're too lazy or too busy to work
independently." So a percentage of that group might call him and wind
up leaving voice mail, setting up a potential phone-tag situation.

"If they had sent me an e-mail, with the question in the e-mail, I
could respond directly, at least by the next day," Thompson said.

"I think many of us haven't learned how to use the appropriate
technology for the given task."

Any human will do ...

The one universal villain in advanced telecommunications seems to be
automated voice mail. All telephone users have visited that special
ring of Hades where automated menus reside.

Last week, Gene Dwyer of Crafton called the Pennsylvania American
Water Co. to report a problem with muddy, rusty water.

"I went through three or four button pushes until a lady came on
wanting my account number, my Social Security number and telephone
number, and then they were willing to listen to my story," says Dwyer.

The woman told him they hadn't received any other complaints but that
one of their water experts would look into it.

Dwyer also called KQV radio, reporting the muddy water as a news tip.
They, too, said they'd look into it.

"You go through a long series of automated phone menus, then you pick
the number closest to your topic," Dwyer says. "Go through four menus,
then in the fourth menu, you go through two additional sub menus."

When Dwyer has called Duquesne Light during a power outage, he has
been given another number to call.

"You have to get a flashlight to make the call," he says.

"I won't even get into trying to contact a doctor, credit-card
company, Blue Cross, airlines, banks, etc.," says writer Patricia
Orendorff Smith, 62, of Indiana, Indiana County. "I am put on hold
after punching number after number only to hear a computerized
voice. It drives me nuts. I want to talk to a real live person, one in
the flesh."

Joanna L. Krotz, in a report titled "'Voice-mail jail' and other
blunders of automation" for www.microsoft.com, acknowledged that
"increasingly, customer care is being managed and massaged by
automation."  She added that more than 70 percent of midmarket
companies say they plan to invest in contact center or e-mail
management systems within the next two years, according to a survey
from AMR Research, a Boston-based market analyst.

Although automated systems may come at a cost to customers' time and
nerves, they also save the company money, a savings that should filter
back to clients.

"There's no question that computerized services offer dramatic
savings," Krotz wrote. "Typically, it costs an exorbitant $50 or more
for a human agent to field a customer's call. By contrast,
self-service interactions on the Web run mere pennies. In between,
combinations of human agents and technologies ... cost a few bucks per
call."

Weiss admitted that automated voice mail isn't winning any fans.

"I hate them, everybody hates them. But does it mean that, let's say,
the bank having them can offer me cheaper services? If it does, then
it's a trade-off. Life is full of trade-offs. This is just one of
them."

Interpreting the survey

We began with a poll that says a majority of us are ticked off about
the time ticking away as we wait for an answer.

The follow-up question we asked experts is: Are the trade-offs -- such
as caller ID and cheaper services -- worth the waiting game?

"I think the technology has raised our expectation that we can get the
information we need easier and sooner," Thompson said. "Like the
automobile has raised our expectation that we can commute from Harmar
Township to Smithfield Street in 25 minutes. Since we can't do it,
because we spend 20 minutes trying to get through the traffic light at
Route 28 and the 31st Street Bridge, we vent our frustration on the
technology in some survey."

If the survey implies that things are worse than they used to be, then
it's giving a false impression, Thompson said.

"I don't want to appear defensive about telecom technology, but what
did we do before we had voice mail and e-mail? That was a different
time, when we all weren't so frantic, so it's hard to make an A-B
comparison."

The survey reminded Pitt's Weiss of a time when caller ID was a case
for the Federal Communications Commissions and the courts.

"Back around the late '80s, early '90s, one of the big debates was
whether caller ID should be allowed at all because of privacy issues,"
he said.

"Some 15 years later, it's become ubiquitous," he said. "And where
before we were complaining about privacy invasion ... now we have it
and people are taking advantage of it. You can't have it both ways."

Liz Raphael Helegesen, 41, who records messages for corporate
America's voice mail systems, screens calls with caller ID and says
she returns all voice mails.

"When I'm on the other line, in a conference, in a recording session,
parenting or eating a meal, it would be inappropriate to interrupt an
existing conversation, meeting or family time to take a phone call,"
she said.

To Helegesen, caller ID is an important tool.

"People rely on caller ID because they don't want to talk to you,"
said Jeff Kagan, a national telecommunications analyst in
Atlanta. Added management consultant April Callis of Lansing, Mich.:
People use voice mail "to collect calls they don't want to deal with
and don't plan on returning."

Weiss quotes an article that he thinks sums it up when he said caller
ID and other telecom tools are "a way of defending ourselves from the
information onslaught, and I think that's true."

The future, he adds, is bound to include more intelligent screening
devices as the onslaught of information continues unabated.

"I think we'll see a lot of different techniques for helping us cope,"
Weiss said.

But that doesn't mean we'll see an end to complaints.

(Bill Hendrick of the Atlanta Journal-Constitution and Post-Gazette
staff writer L.A. Johnson contributed to this story.)

Copyright 1997-2005 PG Publishing Co., Inc.


NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, PG Publishing, Pittsburgh, PA.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

From: David Perrussel <diamond45@withheld_on_request>
Date: Sun, 26 Jun 2005 19:46:54 -0400
Subject: WECO 302 Wiring Question


Pat, please withhold my posting address for obvious resons.

I have a friend who has an old Western Electric 302 phone. He would
like to hook it up to the modern PSTN network, but doesn't know how to
connect the wires. This is how he explains it:

Inside is a transformer with connections labeled GN, R, Y(L2), L1, and
C, and on the base is a terminal block with connections labeled GND
and K.  The connections labeled Y(L2), and L1 have screws for
additional connections that appear to have been removed; the screws
are unscrewed up off the metal connector.

Could someone provide us with instructions of how to connect this
phone to a modern phone jack?  We would appreciate any help you can
give me.

Thanks!

David Perrussel


[TELECOM Digest Editor's Note: I _thought_ most WE 302 phones had
all (or most of their guts) in the 'side ringer' box which was mounted
on the wall. PAT]

------------------------------

From: Dale Farmer <dale@cybercom.net>
Organization: The  fuzz in the back of the fridge. 
Subject: Re: Where to Buy a Cellular Phone Jammer?
Date: Sun, 26 Jun 2005 23:49:03 GMT


Fred Atkinson wrote:

> On Sat, 25 Jun 2005 21:05:50 GMT, Bruce L. Bergman
> <blbergman@withheld_on_request> wrote:

>>> The operation of transmitters designed to jam or block wireless
>>> communications is a violation of the Communications Act of 1934,
>>> as amended ("Act"). See 47 U.S.C. Sections 301, 302a, 333. The Act
>>> prohibits any person from willfully or maliciously interfering with
>>> the radio communications of any station licensed or authorized under
>>> the Act or operated by the U.S. government. 47 U.S.C. Section 333.
>>> The manufacture, importation, sale or offer for sale, including
>>> advertising, of devices designed to block or jam wireless
>>> transmissions is prohibited. 47 U.S.C. Section 302a(b). Parties in
>>> violation of these provisions may be subject to the penalties set
>>> out in 47 U.S.C. Sections 501-510. Fines for a first offense can
>>> range as high as $11,000 for each violation or imprisonment for up
>>> to one year, and the device used may also be seized and forfeited
>>> to the U.S. government.

>> Bruce L. Bergman, Woodland Hills (Los Angeles) CA - Desktop
>> Electrician for Westend Electric - CA726700
>> 5737 Kanan Rd. #359, Agoura CA 91301 (818) 889-9545
>> Spamtrapped address:  Remove the python and the invalid, and use a net.

> Don't miunderstand me here.  I basically agree with your position.
> But didn't the more recent communications act render the
> Communications Act of 1934 obsolete?  I don't think that cell phone
> technology was considered when it was written, either.

> I do think that perhaps use of such jamming devices (if properly
> designed) might be useful in prisons where there is a problem with
> contraband cell phones running being used for drug deals and other
> problematic things.  Of course, we'd have to address the issues and
> how to correctly make it legal for use (so that situations like you've
> described can be avoided).

> Fred

And here you fall into that common fallacy.  'We can't have these
people doing this bad behavior that we outlawed.  So lets ban one of
their instrumentalities to stop their bad behavior.'  Remember how
effective those laws against flagrant beeper use in the 80s were at
stopping the drug dealers?  You would be far better served by going
after the root causes of the bad behavior, then by blocking this or
that object from functioning, or making the object more difficult to
obtain legally for the ordinary citizen.

    --Dale

------------------------------


TELECOM Digest is an electronic journal devoted mostly but not
exclusively to telecommunications topics. It is circulated anywhere
there is email, in addition to various telecom forums on a variety of
networks such as Compuserve and America On Line, Yahoo Groups, and
other forums.  It is also gatewayed to Usenet where it appears as the
moderated newsgroup 'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html
  For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308
    and also http://feeds.feedburner.com/TelecomDigest

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #293
******************************

Return to Archives**Older Issues