For your convenience in reading: Subject lines are printed in RED and
Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal
or  
TELECOM Digest Fri, 5 Aug 2005 23:53:00 EDT Volume 24 : Issue 356
Inside This Issue: Editor: Patrick A. Townson
Craig Niedorf Remembered - Part 1 (TELECOM Digest Archives Reprint)
Craig Niedorf Remembered - Part 2 (TELECOM Digest Archives Reprint)
Re: Nextel False Advertising (Joseph)
Re: Analysts: ATMs Highly Vulnerable to Fraud (Wesrock@aol.com)
Re: Credit Report, was Re: AT&T Customers Taken By Alltel (Damon Brownd)
Re: Today's Long Distance Circuits? (Neal McLain)
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.
===========================
Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent. Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime. Geoffrey Welsh
===========================
See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.
----------------------------------------------------------------------
Date: Fri, 5 Aug 2005 22:42:12 EDT
From: ptownson@massis.lcs.mit.edu (TELECOM Digest Editor)
Subject: Craig Niedorf Remembered - Part 1
It was fifteen years ago, about this time in the summer of 1990, that
Craig Niedorf, then a college student about 20 years old, was told by
the federal government that they would not be finding him guilty
after all. The federal prosecutor came up with a total crock based
on some flaky testimony by BellSouth. To save embarassment to
themselves because of this prosecutorial misconduct, the government
simply decided to let him go, after all the hell they had first put
him through, for his alleged 'hacking'. I thought you might like to
see the story I ran in the Digest fifteen years ago, over the last
weekend of July, 1990.
Date: Fri, 27 Jul 90 16:55 CDT
From: TK0JUT2%NIU.BITNET@uicvm.uic.edu
Subject: NEIDORF TRIAL OVER! GOVERNMENT DROPS ALL CHARGES!
Less than halfway through the trial, and before it had presented its
remaining witnesses, but government dropped all charges against Craig
Neidorf. Defense Attorney Sheldon Zenner said that Prosecutor Bill
Cook's decision was "in line with the highest standards of good
government and ethical conduct." Zenner said that the government could
have continued to the last and let the jury decide, but did the
honorable thing.
One reason for the surprise decision, according to one inside source,
was that, as the testimony and cross-examination proceeded, the
government realized that BellSouth had not been forthcoming about the
extent of availability of the document and its worth. The prosecution
apparently relied on the good faith of BellSouth because of the
previously good working relationship it had with it and other telecom
companies.
Craig Neidorf was ecstatic about the decision, and feels vindicated.
He can now resume his studies, complete his degree, and seriously
consider law school. He *WILL NOT* resume publication of PHRACK!
Zenner praised Bill Cook's decision to drop all charges, and added he
is not angry, but appreciative. Zenner also felt that the the efforts
of EFF, CuD, and the many individuals who supported Craig were
instrumental in creating credibility and visibility for the case,
generating ideas and information for the defense, and facilitating
enlisting some of the prospective defense witnesses to participate.
There are those who have taken the Ed Meese line and assumed that
Craig must have done *something* or the government wouldn't be
prosecuting him. Others have not been as strident, but have put their
faith in "The System," assuming that the process works, and as long as
Craig's procedural rights were protected, we should "wait and see."
Others on the extreme end have said that those of us who supported
Craig would change our minds once all the evidence has come out, and
we were criticized for raising issues unfairly when the government, so
it was claimed, couldn't respond because it had to protect Craig's
privacy and was required to sit in silence. One prosecutor even said
that when all the evidence comes out, Craig's supporters would slink
back under their rocks.
There is little cause for Craig's supporters to gloat, because the
emotional and financial toll on Craig and his family were substantial.
Dropping the charges hardly means that the system works, because if it
worked, there would have been no charges to begin with. From the
beginning, Craig expressed his willingness to cooperate, but the
government made this impossible with its persecution. Craig's
supporters, from the beginning, have published the evidence, explained
the issues, and we can still see no reason for his indictment. The
evidence presented by the government in some cases could have been
presented as well by the defense to show that *no* criminal acts
occurred. When witnesses must be coached into how to present negative
evidence, and when little, if any, can be adequately constructed, one
would think that somebody in the prosecutor's office might realize
there simply isn't a case there. The government had no case in the
beginning, they could not construct one, and they had nothing at the
end. So, dropping the charges does not indicate that the system works,
but rather that sometimes a just outcome may result despite unjust
actions of over-zealous agents. The prosecution not only lost the
case, but reduced its credibility in all areas of computer
enforcement.
The claim that a recent TELECOM Digest contributor made that the SS
and others may intentionally overstep bounds to establish more clearly
the lines of law may be true, but what about the costs to innocent
victims of such Machiavellian tactics? Do we really live in such a
cynical society that we find it acceptable to place lives, careers,
and reputations at great risk?
Now, however, it is time to move on and address the lessons learned
from the experience. Some of the issues include how computerists can
be protected from overzealousness, how law enforcement agents can
perform their legitimate tasks of gathering evidence without violation
rights, and how legislation can be written to reflect technological
changes that protect us from predators while not subverting our rights
with loose, broad, or inaccurate language. This has been the goal of
Mitch and the EFF, and it is one on which we should *all* unite and
focus our energy.
------------------------------
Date: Fri, 27 Jul 90 03:23 CDT
From: TK0JUT2%NIU.BITNET@uicvm.uic.edu
Subject: Days Three and Four of Craig's Trial
Some final comments on Day Three of Craig Neidorf's trial:
It was curious that, in introducing the PHRACK/INC Hacking Directory,
a list of over 1,300 addresses and handles, the prosecution seemed it
important that LoD participants were on it, and made no mention of
academics, security and law enforcement agents, and others. In some
ways, it seemed that Bill Cook's strategy was to put HACKING (or his
own rather limited definition of it) on trial, and then attempt to
link Craig to hackers and establish guilt by association. It was also
strange that, after several months of supposed familiarization with
the case, that neither Bill Cook nor Agent Foley would pronounce his
name correctly. Neidorf rhymes with eye-dorf. Foley pronounced it
KNEEdorf and Cook insisted on NEDD-orf. Further, his name was spelled
incorrectly on at least three charts introduced as evidence, but as
Sheldon Zenner indicated, "we all make mistakes." Yeh, even Bill Cook.
One can't but think that such an oversight is intentional, because a
prosecutor as aware of detail as Bill Cook surely by now can be
expected to know who he is prosecuting, even when corrected. Perhaps
this is just part of a crude, arrogant style designed to intimidate,
perhaps it is ignorance, or perhaps it is a simple mistake. But, we
judge it an offense both to Craig and especially his family to sit in
the courtroom and listen to the man prosecuting their son to
continually and so obviously mispronounce their name.
DAY FOUR OF THE TRIAL (THURSDAY, JULY 26):
Special Agent Foley continued his testimony, continuing to describe
the step by step procedure of the search, his conversation with Craig,
what he found, and the value of the E911 files. On cross-examination,
Agent Foley was asked how he obtained the original value of the files.
The value is crucial, because of the claim that they are worth more
than $5,000. Agent Foley indicated that he obtained the figure from
BellSouth and didn't bother to verify it. Then, he was asked how he
obtained the revised value of $23,000. Again, Agent Foley indicated
that he didn't verify the worth. Because of the importance of the
value in establishing applicability of Title 18, this seems a crucial,
perhaps fatal, oversight.
Next came the testimony of Robert Riggs (The Prophet), testifying
presumably under immunity and, according to a report in the last issue
of CuD, under the potential threat of a higher sentence if he did not
cooperate. The diminutive Riggs said nothing that seemed harmful to
Craig, and Zenner's skill elicited information that, to an observer,
seemed quite beneficial. For example, Riggs indicated that he had no
knowledge that Craig hacked, had no knowledge that Craig ever traded
in or used passwords for accessing computers, and that Craig never
asked him to steal anything for him. Riggs also indicated that he had
been coached by the prosecution. The coaching even included having a
member of the prosecution team play the role of Zenner to prepare him
for cross-examination. It was also revealed that the prosecution asked
Riggs to go over all the back issues of PHRACK to identify any
articles that may have been helpful in his hacking career. Although
it may damage the egos of some PHRACK writers, Riggs identified only
one article from PHRACK 7 that MIGHT POSSIBLY be helpful.
What are we to make of all this? So far, it seems that the bulk of the
evidence against Craig is weak, exaggerated, and at times seems almost
fabricated (such as the value of the E911 file and Craig's "evil"
attempt to organize a league of "criminals." We have been told
repeatedly be some law enforcement officials and others that we should
wait, because evidence will come out that could not be discussed in
public, and that this evidence would silence critics. Some have even
said that those who have criticized law enforcement would "slink back
under their rocks" when the evidence was presented. Perhaps. But, so
far at least, there has been no smoking gun, no evidence that hasn't
been discussed previously, and no indication of any heinous conspiracy
to bring America to its knees by trashing the E911 system, robbing
banks, or destroying the technological fabric of society. Perhaps a
bombshell will be introduced before the prosecution winds up in a few
days. But, even if Craig is ultimately found guilty on any of the
counts, there is certainly nothing presented thus far that appears to
justify the severity of the charges or the waste of state resources.
To paraphrase that anonymous writer in the last issue of CuD, I can't
help but wonder why we're all here!
------------------------------
Date: Fri, 5 Aug 2005 22:35:21 EDT
From: ptownson@massis.lcs.mit.edu (TELECOM Digest Editor)
Subject: Craig Niedorf Remembered - Part 2
Another incident during that summer of 1990 we shouldn't forget were
the various newspaper accounts written by reporter Joe Abernathy.
Although Mr. Abernathy in his earlier articles got a lot of
details wrong, by this point (summer, 1990) he was doing better at
reporting facts, not hearsay and rumors. Abernathy talked in this
article about the government sponsored witch hunt that went on
for couple of yeas in 1989-1990.
ANOTHER ARTICLE BY JOE ABERNATHY ABOUT THE INTERNET IS LOCATED IN THE
MAIN DIRECTORY OF TELECOM ARCHIVES UNDER THE TITLE
'ABERNATHY.INTERNET.STORY' .
Date: Wed, 5 Sep 90 19:29:47 CDT
From: edtjda@MAGIC712.CHRON.COM(Joe Abernathy)
To: tk0jut2%niu.bitnet@UICVM.UIC.EDU
Subject: Text of chron-sundevil article
War on computer crime waged with search, seizure
By JOE ABERNATHY
Houston Chronicle
The government's first assault on computer crime, unveiled with
fanfare six months ago, has generated few criminal cases and is
drawing allegations that federal agents are using heavy-handed
tactics.
Although only four people have been charged, searches and
seizures have been conducted in at least 44 homes or businesses
in the crackdown, called Operation Sun Devil.
One prosecutor attributed the delay in filing cases to the
vast amount of information that must be sorted. Authorities would
not say, however, when or if additional charges might be re-
turned.
Sun Devil, so named because it began in Arizona and targeted
an evil that investigators deemed biblical in stature, is held
forth as a sophisticated defense of the nation's computer in-
frastructure. Computer-related abuses will cost the nation's
business community $500 million this year, according to some esti
mates.
Operation Sun Devil and several related investigations made
public in March have been under way for more than two years. Hun-
dreds of agents from the Secret Service, U.S. attorney's office,
the Bell companies, and assorted law enforcement agencies are
involved.
But the operation is coming under fire for what critics
describe as unjustified searches and seizures of property and
electronic information protected by the Constitution.
Among examples they cite:
* An Austin publishing house is clinging to life after
Secret Service agents confiscated equipment and manuscripts,
leaving behind an unsigned search warrant.
* A Missouri college student faces an extra year in school
and $100,000 in legal fees after defending himself from charges
that he stole a proprietary document from the telephone company
by publishing it in a newsletter.
* The wife and children of a Baltimore corporate computer
consultant were detained for six hours while he was interrogated
in a locked bedroom and his business equipment was confiscated.
With no way to support itself, the family has sunk into pover-
ty.
At a press conference in March, authorities presented Sun De-
vil as a full-scale response to a serious criminal threat.
"The United States Secret Service, in cooperation with the Un-
ited States attorney's office and the attorney general for the
state of Arizona, established an operation utilizing sophisticat-
ed investigative techniques," a press release said, adding that
40 computers and 23,000 data disks had been seized in the initial
sweep.
"The conceivable criminal violations of this operation have
serious implications for the health and welfare of all individu-
als, corporations, and United States government agencies relying
on computers and telephones to communicate," it continued.
Six months later, most officials are silent about Sun Devil.
But at least one principal denies excesses in the operation.
"I am not a mad dog prosecutor, " said Gail
Thackeray, assistant attorney general for the state of Arizona
and the intellectual parent of Operation Sun Devil.
"(Agents) are acting in good faith, and I don't think that can be
said of the hacker community.
"Over the last couple of years, a lot of us in different places
-- state, federal and local -- have been getting hit with a
dramatic increase in complaints from computer hacker victims. So
in response to that the Secret Service started the Sun Devil in-
vestigation trying to find a more effective way to deal with some
of this."
Thackeray said the Secret Service, an agency of the U.S.
Treasury Department, assumed jurisdiction because computer
crime often involves financial fraud. Most of the losses are at-
tributed to stolen long distance service.
"It's not unusual for hackers to reach six figures (of abuse)
in one month'' at a single business location, she said. "This
whole mess is getting completely out of hand.''
But computer experts critical of Sun Devil contend the opera-
tion also is out of hand. They have rallied behind the banner of
the Electronic Frontier Foundation, which contends that computer
networks represent a fundamentally new realm of self-expression
into which constitutional protection must be extended.
Some visitors to this realm deem it cyberspace, using termi-
nology borrowed from a science fiction genre set in a gritty fu-
ture in which computer and telephone lines become extensions of
one's intellect and even physical being.
Hackers, as those who enter others' computers without authori-
zation are known, are referred to as cyberpunks by some computer
network users.
It may have been this connection that drew the Secret Service
to the Austin offices of Steve Jackson Games, which early this
spring was about to publish something called "GURPS Cyber-
punk."
It is a rule book for a role-playing adventure along the lines
of Dungeons & Dragons, played with dice and not computers.
The cover page, however, credits the Legion of Doom, a self-
professed underground hackers group, for assistance in providing
realism. The game's author admits discoursing with the Le-
gion.
This link ensnared the company in the nationwide sweep con-
ducted March 1, when 27 search warrants were executed in 14 ci-
ties. A number of cases targeted members of the Legion.
The Secret Service seized all copies of the Cyberpunk
manuscript, along with the computers on which it was being stored
prior to publication.
"One of the Secret Service agents told Steve Jackson that they
thought the book was a handbook for computer crime,'' said
Sharon Beckman of the Boston firm Silverglate & Good, Jackson's
attorney. "It looks like what (this) was, in effect, was a prior
restraint on protected speech, speech protected by the First
Amendment."
Jackson's company, which had revenues of $1.4 million in
1989, was nearly dealt a death blow by the raid. Cyberpunk was to
be its main spring release, but it would have to be rewritten
from scratch. Jackson was not allowed access to the reams of in-
formation stored on the confiscated equipment.
"We had to lay off eight people, and we had to cut way back on
the number of products we were producing," said Jackson, who
put the cost of the raid at $125,000. That doesn't include lost
revenues, "or the value to the company of the eight (of 17) em-
ployees we had to lay off, because I don't know where to start to
put a value on that."
Beckman described her client as an ordinary businessman who
uses a computer in his business. "He's not a computer hacker. He's
not even a particularly sophisticated computer user," she said.
"It was terrifying,'' Jackson recalled." I was in the hands of
a lot of keen, earnest, sincere people who had no idea what they
were doing and who had federal law enforcement powers.
"It's frightening that they can do this to innocent people."
No charges have been filed.
Some of the equipment has been returned, but some was damaged
beyond repair. Jackson said agents recently acknowledged that
some equipment indeed is gone forever.
The Secret Service, Arizona U.S. attorney's office and Justice
Department all refused to discuss any specifics of Jackson's
case, or any activities associated with Operation Sun Devil.
"We're a very efficient organization, and we follow the guide-
lines set forth by the law," said Michael Cleary, assistant to
the special agent in charge of the Secret Service in Chicago,
which has jurisdiction in the case. "If we have a signed, sworn
affidavit, and a search warrant, we execute that warrant."
Cleary wouldn't say why the search warrant used against Steve
Jackson was not signed. A request by Jackson's attorney for more
information went unanswered.
Beckman said a raid conducted without a signed warrant would
violate Fourth Amendment protection against unwarranted search
and seizure.
Mike Hurst, a Steve Jackson Games editor who lost his job to
the raid on the company, offered bitter advice: "The Secret Ser-
vice ought to make some attempt to find out if there's actually a
case involved before they begin searches and confiscations of
property."
In one incident, the government did file a case, only to aban-
don it when it fell apart in court. The defendant, Craig Neidorf,
is going back to college at the University of Missouri this
fall, but his reputation is stained, he's having to repeat his
senior year, and he's $100,000 in debt.
An intrusion into the computers of Bell South by a Legion
member in 1988 set off much of the activity in Operation Sun De-
vil, including the case against Neidorf.
While in Bell South's computer, Legion member Robert Riggs
found and copied a document describing administrative aspects of
the emergency 911 system.
Riggs and associates Franklin E. Darden Jr. and E. Grant, all
three of whom are from Georgia, recently pleaded guilty to
federal conspiracy charges and await sentencing. Darden and
Riggs face up to 5 years in prison and a $250,000 fine. Grant
faces up to 10 years in prison and a $250,000 fine.
Neidorf, publisher of Phrack, a newsletter for hackers, was
accused of theft for republishing the 911 document stolen by
Riggs. Prosecutors stopped the trial after the document was
shown to be freely available.
His case received widespread coverage because it raised is-
sues of free speech. Phrack was published electronically via
computer networks instead of on paper, and thus did not immedi-
ately receive the First Amendment protection that virtually
would have been assured a paper document, according to Sheldon
Zenner, Neidorf's attorney.
"Going through this last seven months is not something I would
wish on my worst enemy," said Neidorf, 20, who faced 31 years in
prison. "It devastated my parents. My grandparents, they didn't
take it well. They're in their 80s.
"I kind of broke down myself at one point. I don't like to talk
about it exactly."
Leonard Rose, a computer consultant in Baltimore, let the
Legion forward network mail through his computer, an everyday ar-
rangement on the sprawling Internet research and education net-
work. But because the name of his computer appeared in the
group's electronic address, he was portrayed by the government as
the mastermind of the group.
"I've lost everything because of it," he said. Business con-
tracts worth $100,000 a year, $70,000 worth of computer equipment
used in his business, his top secret clearance, his wife's dream
home, their credit rating, cars, are gone. The Roses now live
with their two young children in an apartment furnished with two
mattresses and a TV.
"I used to look at people in the street and I couldn't under-
stand how they could get there," Rose said. "I couldn't under-
stand how you could sink that low, but now I understand. I under-
stand a lot more now."
He was never charged as part of the Legion of Doom investiga-
tion, but during that probe he was found to have received an il-
licit copy of a computer program that must be licensed from
AT&T.
"What Len Rose is accused of turns software piracy into a felo-
ny," said John Perry Barlow, a co-founder of the Frontier Foun-
dation. "If the government is prepared to go out and turn every-
body who has engaged in software piracy into a felon, it'll make
the war on drugs look like a minor undertaking."
Detractors say that the investigative techniques used in
Operation Sun Devil are at best rude, at worst illegal. Authori-
ties respond that they are adjusting to a new world.
Most concerns center on bulletin board systems, a frequent
point of access into the nation's computer network byways. Locals
call the BBS, which then moves private electronic mail and pub-
lic messages into the public networks, which as a whole are re-
ferred to as Internet or simply the matrix.
"The government is seizing electronic mail like crazy, in the
sense that it's seizing BBS's and all their contents," Barlow
said. "It's the equivalent of seizing post offices and all their
contents."
The privacy of electronic mail is protected under the Computer
Fraud and Abuse Act of 1986, which is also the law setting forth
most of the conditions under which computer hacking can be con-
sidered a crime.
"We've seized lots of BBS's," acknowledged Thackeray of the
Arizona attorney general's office, although search warrants
were obtained only for the owner of each computer, not for each
person with electronic mail stored on that computer.
Benjamin Wright, a Dallas attorney who writes and lectures
frequently on electronic data interchange, said that surveillance
of electronic mail poses serious questions even when conducted
properly under the supervision of a court.
"A huge amount of information could build up, so there could be
a great mass of information laying at the government's feet," he
said. "To tap into all the phone lines of a corporation would be a
lot of work, but if there's this database building up of a large
part of a company's business, then there's a reason for being a
little bit concerned.
"This applies to private people as much as it applies to cor-
porations."
Authorities see the BBS seizures as preventive medicine.
"The only thing I have ever found that has an effect on these
kids is to take their computer away," Thackeray said. "It final-
ly sinks in, 'I'm really not going to get this back.' "
But Barlow criticizes that approach. "Essentially what they
have done is to fine (the suspect), without conviction, for the
entire value of his property," he said. "They're not making
arrests. This is turning the whole search and seizure into the
punishment."
++++++++++++++++++++++++++++++++++++++++++++++++++++++++
The preceding appeared Sunday, 9/2/90, on the front page
of the Houston Chronicle.
Please send comments to: edtjda@chron.com
ANOTHER ARTICLE ON THE INTERNET BY JOE ABERNATHY IS LOCATED IN THE
MAIN TELECOM-ARCHIVES DIRECTORY UNDER THE TITLE 'ABERNATHY.INTERNET.STORY'
[TELECOM Digest Editor's Note: I wonder what the past fifteen years
has done for Craig, Len Rose and those other guys. And also of
interest to me would be what the past fifteen years has done to the
several individuals who were responsible for this misguided attack on
computer 'hackers'. PAT]
------------------------------
From: Joseph <JoeOfSeattle@yahoo.com>
Subject: Re: Nextel False Advertising
Date: Mon, 01 Aug 2005 10:18:56 -0700
Reply-To: JoeOfSeattle@yahoo.com
On Sat, 30 Jul 2005 20:37:41 -0700, Telecom digest editor wrote:
> but now these guys are stuck with a couple phones that are useless,
> and a contract to boot.
Did you even check this out? To my knowledge if you sign up with a
carrier and move to an area that they do not serve they usually will
let you out of a contract. They may need some proof such as a utility
bill, but more than likely they would be let out of any contractual
obligation. If no one checked that out that's yet another error that
they've made.
> When newer technologies are sort
> of a mystery even to relatively experienced users, how is it that kids
> in their early/mid twenties getting a 'cellular phone' for the first
> time in their lives are expected to know anything?
<sigh> No one needs to play the "victim" in this day and age. You do
some not so hard research on the net and you find an answer! Just
typing "cellular phone basics" into Google brings up over 800,000
hits! Going to google and asking the question "cellular service
independence missouri" brings up several results including a Google
page showing all registered cellular towers around Independence. It
also shows you which services are available.
[TELECOM Digest Editor's Note: You are wrong! I am no where close to
Independence, MO; I am in Independence, KS, about 300 miles southwest
and I know what cell towers we have around here. Independence, MO
is a suburb of Kansas City, MO, which is nowhere near me. But I will
explain to Justin how to use Google and look for the information he
will need if he wishes to cancel his contract. He will be returning
back home to Orlando, FL in about a week. PAT]
------------------------------
From: Wesrock@aol.com
Date: Fri, 5 Aug 2005 19:42:04 EDT
Subject: Re: Analysts: ATMs Highly Vulnerable to Fraud
In a message dated Wed, 3 Aug 2005 22:36:32 -0400 Monty Solomon
<monty@roscom.com> writes:
> By BRIAN BERGSTEIN AP Technology Writer
> BOSTON (AP) -- By failing to scan security codes in the magnetic
> strips on ATM and debit cards, many banks are letting thieves get away
> with an increasingly common fraud at a cost of several billion dollars
> a year.
> Surprisingly, Litan said, perhaps half of U.S. financial institutions
> have not programmed their ATM systems to check the security codes.
> Con artists specifically seek out customers of banks that do not
> validate the second track on the strip, she said.
A very large number of ATM's are owned by ATM companies, not banks,
who provide ATMs in many convenience stores, stadiums race tracks and
arenas, shopping malls and casinos. To blame the banks for what these
companies do is disingenuous.
Wes Leatherock
wesrock@aol.com
------------------------------
From: Damon Brownd <dbxyzzy@att.net>
Subject: Re: Credit Reports, was Re: AT&T Customers Taken Over By Alltel
Organization: AT&T Worldnet
Date: Sat, 06 Aug 2005 01:23:41 GMT
Steve Sobol <sjsobol@JustThe.net> wrote in message
news:telecom24.355.17@telecom-digest.org:
> Maybe you got special consideration as a soldier. Perhaps enlisted men
> and women got a special deal because it wouldn't be easy for them to
> deal with credit issues overseas ... But as far as I know, the rest of
> us were not entitled to any free reports unless we were denied credit
> or employment (as I posted earlier) or if there was a state law
> specifying we were not to be charged. There have been some state laws
> on the books prior to this past year.
See https://www.annualcreditreport.com.
------------------------------
Date: Fri, 05 Aug 2005 20:54:46 -0500
From: Neal McLain <nmclain@annsgarden.com>
Subject: Re: Today's Long Distance Circuits?
hancock4@bbs.cpcn.com wrote:
> By how, I mean what physical medium is chosen and how is it
> routed. Do they use satellite, microwave, fibre optic, coax,
> plain wire?
Whereupon Justa Lurker <JustaLurker@att.net> responded:
> Depends on your choice of designated long distance carrier, and
> the extent to which it owns and operates its own facilities vs.
> buying capacity 'wholesale' from one of the big guys or perhaps
> a "carrier's carrier" (Wiltel comes to mind here).
Or even a "carrier's carrier's carrier."
Back in the 1980s, Wiltel provided capacity to Norlight, which in turn
provided capacity to IXCs. At the time, Norlight was owned by a
consortium of Minnesota- and Wisconsin-based electric utility
companies. Most of the network was constructed using grounded Optical
Ground Wire (OPGW) installed at the top of the electric transmission
lines owned by the member utility companies. OPGW is a metallic
(usually aluminum-clad steel) conductor with optical fibers buried
inside; it is installed at the top of a transmission line in place of
a static wire, where it serves the same purpose as the static wire --
protecting lower conductors from lightning.
http://www.phillipsfitel.com/english/48specs.html
Norlight faced a problem when it tried to extend its network to Chicago:
Commonwealth Edison Company. ComEd was not a member of the consortium
that owned Norlight, so it had no financial interest in Norlight's
success. ComEd's price for letting Norlight use its transmission
lines was higher than Norlight was willing to pay.
So Norlight turned to Wiltel instead. Wiltel (then a subsidiary of
Williams Pipeline, a gas and petroleum transmission company) installs
fiber optic cables in abandoned pipelines. Norlight contracted with
Wiltel for dark fiber between Maple Park IL and Chicago, bypassing
most of ComEd's transmission lines.
Thus, Wiltel became a "carrier's carrier's carrier" (and AFAIK, it
still is, although since I've retired I've lost contact with the folks
I used to deal with).
Neal McLain
------------------------------
TELECOM Digest is an electronic journal devoted mostly but not
exclusively to telecommunications topics. It is circulated anywhere
there is email, in addition to various telecom forums on a variety of
networks such as Compuserve and America On Line, Yahoo Groups, and
other forums. It is also gatewayed to Usenet where it appears as the
moderated newsgroup 'comp.dcom.telecom'.
TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.
Contact information: Patrick Townson/TELECOM Digest
Post Office Box 50
Independence, KS 67301
Phone: 620-402-0134
Fax 1: 775-255-9970
Fax 2: 530-309-7234
Fax 3: 208-692-5145
Email: editor@telecom-digest.org
Subscribe: telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org
This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then. Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!
URL information: http://telecom-digest.org
Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
(or use our mirror site: ftp.epix.net/pub/telecom-archives)
RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html
For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308
and also http://feeds.feedburner.com/TelecomDigest
*************************************************************************
* TELECOM Digest is partially funded by a grant from *
* Judith Oppenheimer, President of ICB Inc. and purveyor of accurate *
* 800 & Dot Com News, Intelligence, Analysis, and Consulting. *
* http://ICBTollFree.com, http://1800TheExpert.com *
* Views expressed herein should not be construed as representing *
* views of Judith Oppenheimer or ICB Inc. *
*************************************************************************
ICB Toll Free News. Contact information is not sold, rented or leased.
One click a day feeds a person a meal. Go to http://www.thehungersite.com
Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.
************************
DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD! REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM SIGN UP AT http://www.easy411.com/telecomdigest !
************************
Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.
The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum. Classes
are available in Stillwater, Tulsa, or through distance learning.
Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu
************************
---------------------------------------------------------------
Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list.
All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.
End of TELECOM Digest V24 #356
******************************
| |