Pat, the Editor

For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal   or  

 

TELECOM Digest     Sat, 1 Oct 2005 16:33:00 EDT    Volume 24 : Issue 447

Inside This Issue:                            Editor: Patrick A. Townson

    State of the Internet, 2005 (TELECOM Digest Editor)
    'Ethical Hacker' Reveals Trade Secrets (Daniel Sieberg)
    Hackers Shift to Financial Gain (Daniel Siedberg)
    EU Wants Shared Control of Internet (Aoife White)
    United States Says No! Internet is Ours (Bradley S. Klapper)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

Subject: State of the Internet, 2005
Date: Sat,  1 Oct 2005 14:28:36 EDT
From: ptownson@massis.lcs.mit.edu (TELECOM Digest Editor)


A look at the internet as it stands now, in 2005, from a compilation
originally prepared by CNN.com:

Spam:

"Spam," a slang term for unsolicited e-mail, is a multimillion-dollar
business and a daily nuisance to people the world over. E-mails with
subject lines such as "Miracle weight loss drug!" and "Get Viagra
cheap!" flood inboxes -- along with e-mail to enlarge your penis --
waste time and irritate Internet users. Spam now accounts for 80-95
percent of all e-mail, depending on whose estimate you wish to accept.

Despite the passage of anti-spam laws, the volume of spam has
overtaken other e-mail. According to IBM, three in four e-mails sent
in February 2005 were spam, inventive spammers constantly change their
methods to defeat even the most sophisticated e-mail filters, so the
ratio of spam to.

Hoaxes, rumors and urban legends

Bill Gates is giving away free money! Muggers at malls are using
perfume to render victims unconscious! A cafe at an upscale department
store charged a woman $250 for a cookie recipe! Urban legends like
these make the rounds of inboxes every day, and every day someone is
duped into believing the rumor and forwarding it.

According to Snopes.com, which identifies and tracks urban legends,
the Bill Gates rumor, which began making the rounds in 1997, is still
the most circulated urban legend on the Internet.

Experts advise checking your facts before forwarding messages to your
friends and family. Want to know if an item is true? Check out one of
the many Web sites devoted to investigating and debunking urban myths
and legends.

Chain letters

"Forward this message to 10 people and DO NOT BREAK THE CHAIN!" the
writer implores. Messages like these have been pouring into inboxes since
the inception of e-mail -- taking the old-fashioned chain letter from the
post office to cyberspace. Chain letters are a particularly annoying form of
spam because they often come from friends and promise negative consequences
for not forwarding the message (bad luck or a lost chance at riches, for
example).

Choosing to forward a message, however, could get you in trouble. Many
people don't know it is illegal to start or forward an e-mail chain letter
that promises any kind of return. Anyone doing so could be prosecuted for
mail fraud.

Pop ups/pop unders:

It's practically impossible to surf the Web without encountering some
form of advertising. It's big business, totaling more than $2.8
billion in just the first quarter of 2005. Many savvy surfers have
strategies to tune them out or ignore them, but when the ads are
unexpected or disruptive, tempers flare.

The advent of pop-up blockers has some predicting the death of this
form of advertising. Until that happens, software to block ads and pop-ups
is available, but advertisers are constantly inventing new ways to
circumvent techniques intended to block their ads.

How-to Lessons:

Want to know how to grow cannabis? What are the ingredients for a
Molotov cocktail? What's the best strategy to successfully shoplift?
Web surfers can get just about any kind of information, including
bomb-making manuals, recipes for illegal drugs and even a step-by-step
guide to becoming anorexic.

To date, efforts to regulate controversial sites like these have
failed. The lack of regulation may be a victory for free speech, but
is it compromising public safety? As technology improves and more
people embrace the Internet, the question of freedom of speech versus
public safety is sure to persist.

Piracy (file sharing):

Internet piracy first entered the public's consciousness when Napster
burst on the scene in the late 1990s. Napster allowed users to
download songs without paying for them, which rankled the music
industry. The members of Metallica were among those who sued Napster
(the case was settled out of court).

According to the Pew Internet & American Life Project, a nonprofit
research group focusing on the Internet, some 17 million Americans are
using the Web, e-mail and other technology -- like their friends'
iPods -- to get bootlegged music.

Online extremism:

Hate groups have been around a long time, but widespread use of the
internet has enabled extremist groups to get their messages to a
worldwide audience. The relative anonymity of the Internet allows
fringe groups to flourish. Hate groups and everything in between use
the Internet to recruit members and promote their agendas.

The U.S. Constitution protects the freedom of speech of most of these
groups and, as long as no crime is being committed, there is little
that can be done to regulate them.

Pornography:

Sex sells, so it's no surprise that Internet pornography is big
business. Now, instead of an embarrassing trip to buy pornography,
users can just log on the Net and access millions of racy images --
all in the privacy of their homes. Pornographers keep pushing the
limits, catering to just about any taste, fetish or proclivity.

The ease of accessing porn has long worried parents, but efforts to
regulate the industry have largely failed. Internet and spam filters
aid those who want to avoid pornographic material, but pornographers
are constantly creating new ways to circumvent them.

Terrorist groups:

Terror has gone high-tech. In recent years, terrorist groups have set
up Web sites to issue messages, recruit followers and share
information.  Some have even shown video of hostages being killed. On
the Web, terrorist groups can reach millions, while hiding in the
anonymity of cyberspace.  Identity masking and other techniques allow
groups to post their messages with little fear of being tracked down.

Phishing:

The messages look official, down to the spoofed e-mail addresses in
the from line, but if the message asks for personal information such
as credit card or Social Security numbers, chances are it's a
fake. Phishing schemes trick users into revealing personal
information, and scammers use this data to steal the identities of
their victims.

A 2004 study by the Internet Crime Complaint Center found that e-mail
and Web pages are the two primary ways in which fraudulent contact
takes place. The Federal Trade Commission recommends avoiding filling
out forms that come in e-mail messages and that users never e-mail
personal or financial information.

The Internet has been fertile ground for scammers and con artists.
According to the FBI, in 2004 scammers tricked Americans out of more
than $68.14 million, with a median dollar loss of about $220 per
complaint.

The FBI recommends that users closely guard their personal
information. The FBI's Internet Fraud Complaint Center has more tips
on avoiding online fraud.

Harassment/cyberstalking:

The popularity of the Internet has given stalkers a new medium to
torment their victims. Cyberstalkers track their victims online,
making threats and harassing them. This virtual stalking can be
difficult to prosecute, as some states have not yet adopted
cyberstalking laws.

According to Working to Halt Online Abuse, a volunteer organization
focused on fighting online harassment, 69 percent of cyberstalking
victims are women, while 52.5 percent of harassers are men. To avoid
becoming a victim, WHOA recommends that users select a gender-neutral
username and e-mail address, keep primary e-mail addresses private and
don't give out personal information online.

Spyware:

Spyware is a type of software that gathers and reports information
about users without their consent. Users acquire these unwanted
programs -- often without their knowledge -- by downloading free
software or through e-mail or some instant message applications.

Efforts to rein in spyware have started to pick up steam. A year ago,
Utah became the first state to enact anti-spyware legislation. In
March, the U.S. House of Representatives got into the act, passing the
Internet Spyware Prevention Act of 2005. Despite these measures,
spyware continues to plague Internet users.

Child pornography:

According to the Department of Justice, the trafficking of child
pornography in the United States was all but eliminated in the
1980s. The Internet boom changed that. The new technology has enabled
purveyors of child porn to create and disseminate images and video,
while remaining almost anonymous.

Fraud in General:

The Internet has been fertile ground for scammers and con artists.
According to the FBI, in 2004 scammers tricked Americans out of more
than $68.14 million, with a median dollar loss of about $220 per
complaint.

The FBI recommends that users closely guard their personal
information. The FBI's Internet Fraud Complaint Center has more tips on
avoiding online fraud.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, CNN.com Cable News Network.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

From: Daniel Sieberg <cnn@telecom-digest.org> 
Subject: 'Ethical Hacker' Reveals Trade Secrets
Date: Sat, 1 Oct 2005 12:52:04 -0500


By Daniel Sieberg

ATLANTA, Georgia (CNN) -- What comes to mind when you think of
wireless Web surfing? It may not be security, or lack of it. There are
nearly 30,000 public wireless "hot spots" in the United States at
places such as parks and cafes, but there's more to consider than just
where to log on. The convenience comes with a caveat.

"Understand that the information you're sending is very similar to
standing up here in the park and shouting out all the information --
would I normally do that?" said Richard Rushing, a wireless expert
with security firm Air Defense who visited an Atlanta park to show
security vunerabilities.

Rushing is considered an "ethical hacker" and works with companies to
strengthen their wireless networks. He said many people don't realize
they could have all their personal data stolen while checking out
their checking account.

"It's great to be able to sit somewhere and work without having any
wires attached, no nothing attached, but you have that risk that it
comes back to," Rushing said.

At the park, Rushing was able to log onto an unsecured hotel wireless
signal in a matter of seconds. To illustrate how vulnerable such
networks can be, Rushing then sent an e-mail and intercepted the
entire contents of the message. He could've done the same thing to any
of the dozens of people sitting nearby in the park.

"At any point in time, I can reach out and touch everyone's laptop at
the hot spot, and there's usually not any way of preventing that --
from me touching and looking at other people's stuff at the hot spot
itself," Rushing said.

He also demonstrated a growing concern called "evil twins" -- fake
wireless hot spots that look like the real thing.

For example, he said, a hacker could be sitting around the corner
sending out a wireless signal. It may look like a legitimate one, even
offering people a chance to sign up for service. But if you log on,
the hacker then would have complete access to your machine.

He said anybody with some tech know-how and the right tools can break
into the basic level of wireless security that's commonly used. There
are even how-to video instructions online.

Rushing said people need to imagine that nothing is truly private at a
wireless hot spot.

"A lot of the time you really want to stay away from doing certain
things at the hot spot that you would normally not do if you knew
somebody would be watching," he said.

Nevertheless, Rushing doesn't discourage using wireless. He tells
people to be aware of what they're sending and the potential for
theft. In other words, it's a good chance to read the baseball scores,
but even if you're sitting by yourself, it doesn't mean you are all
alone.

There may be no wires attached, but the convenience still comes with
strings.

Copyright 2005 Cable News Network LP, LLLP.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Cable News Network LP, LLLP.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

From: Daniel Sieberg <cnn@telecom-digest.org>
Subject: Hackers Shift to Financial Gain
Date: Sat, 1 Oct 2005 12:54:04 -0500


By Daniel Sieberg, Staff Writer for CNN.com

      Internet criminals not content to just wreak havoc online

(CNN) -- Internet criminals want your computer, your money and your
identity. And their tactics are becoming increasingly refined and
organized, according to security experts.

The prime objective for hackers and online thieves has shifted from
largely hitting major corporate networks to gaining control of home
desktops, both to steal data and collect processing power.

"Attackers are increasingly seeking financial gain rather than mere
notoriety," said Vincent Weafer, senior director at Symantec
Corp. "During the past year we have seen a significant decrease in the
number of large scale global virus outbreaks and, instead, are
observing that attackers are moving towards smaller, more focused
attacks."

Symantec this week released its Internet Security Threat Report. The
company says it is compiled from data from 500 Symantec customers,
20,000 sensors that monitor network activity around the world and
Symantec's database of vulnerabilities, which includes about 11,000
entries.

The report echoes what many analysts say is a rise in malicious code
for profit; in other words, stealing your sensitive data and selling
or using it. The report's authors also worry that with this tempting
opportunity to make money, virus writers will find stealthier ways to
disable firewalls and other security measures.

"Criminals today view home computers as resources for committing
crimes," writes Jason Milletary, Internet security analyst at the CERT
Coordination Center. "One resource is the increasing amounts of
information of value that we store on our computers, including user
names and passwords for online banks and commerce sites, e-mail
addresses, instant message IDs, and software licensing keys. This
information can be used directly or sold for monetary gain."

Online organized crime

It's that monetary gain that has many security analysts concerned that
the coordination and sophistication behind recent worms and viruses
has escalated to the level of organized crime. Gone may be the days
when it was mostly about kids experimenting with their newfound
hacking skills, though that tendency remains.

With the global nature of the Internet, it's difficult to track down
offenders who hide behind countless networks and often erase their
digital footprints. High-level criminals could be anywhere on the
planet and may recruit younger computer hackers half a world away to
carry out their plans, each one getting a cut of the action, say law
enforcement and security experts.

While terms such as "worm" and "spam" have become part of the
Internet-user vernacular, people should also become familiar with
"bots" and "phishing."

Symantec's Weafer explains bot networks as computers controlled by an
attacker or attackers to launch harmful activities, such as spam,
fraud, extortion and spyware. Symantec's report found that bot network
activity has doubled in the past six months, and these bot networks
often are used for illegal financial gain and are readily available
for third-parties to purchase or rent.

Phishing e-mails appear to be from a reputable source or company,
complete with logo and language, and often ask for personal
data. Symantec found the volume of phishing messages also has doubled
in the past several months, from 3 million messages a day to almost
5.7 million. Often, phishers simply are identity thieves looking for
victims.

And the money can add up.

Profits from online scams can range from a few dollars to several
thousand and in some cases, much more.

In 2004 the average loss to consumers who reported Internet-related
fraud to the Internet Crime Complaint Center (a partnership between
the FBI and the National White Collar Crime Center) was $240 for
credit card fraud and $907.30 for identity theft.

In June 2005, two men in the UK were sentenced to four to six years in
prison for conspiracy to defraud and conspiracy to launder
money. Their operation was connected to phishing scams, which netted
them at least $11.8 million over a couple of years.

Dan Clements, who runs CardCops.com, a service that helps consumers
and companies deal with identity theft, said many phishing e-mails are
designed to get people to launch a virus by opening an attachment or
clicking on a link.

If the hidden program, or Trojan horse, is launched, it could then
look for keywords on your computer, such as "password," "username" or
"login," and send them to the thief's e-mail account. In some cases
the phishing messages contain key-logging software that will enable a
thief to record all your keystrokes, Clements said. Your data can then
end up for sale online in underground chat rooms.

Clements recommends changing passwords and logins every 90 days, and
getting new credit cards every four to six months. If you receive an
e-mail asking to confirm your personal information, he says do not
click on the link in the message. Instead, Clements says to open a new
Web browser window and type in the link. And then delete the message.

Beyond money, the motivations for hackers or computer criminals can
vary. George Spillman is a computer security expert and the event
coordinator for ToorCon, an annual gathering that attracts both
hackers and security professionals. Spillman said hackers sometimes
break in to networks simply because they can; to gain credibility
within the hacking community or because they see it as a puzzle or
challenge. But many times it's more predatory and profitable.

Securing your computer

"The most obvious aspect is trying to steal things like your credit
card number or your passwords to important accounts or, even more
general, just trying to steal 'you' by being able to take your
identity," Spillman said. "Most people don't think much about securing
their computer. They lock their front door when they leave the house
but don't bother to lock their computer."

So what's the best defense?

Howard Schmidt, former White House cyber security advisor, and
president and CEO of R&H Security Consulting, says it's not enough for
people to install a few security programs and move on.

Schmidt offers these tips:

   a.. Install security patches and keep security software updated;
   b.. Do not click on unexpected e-mail attachments;
   c.. Secure your wireless networks at home by turning on encryption
       features;
   d.. Be cautious when using any peer-to-peer products, such as
       file-sharing networks;
   e.. Educate family members on how to use the Internet safely;
   f.. Be aware of taking a potentially infected laptop between home
       and work;

      Find this article at:
      http://www.cnn.com/2005/TECH/internet/09/26/identity.hacker

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

------------------------------

From: Aoife White <ap@telecom-digest.org>
Subject: EU Wants Shared Control of Internet
Date: Sat, 1 Oct 2005 12:39:13 -0500


By AOIFE WHITE, AP Business Writer

The European Union insisted Friday that governments and the private
sector must share the responsibility of overseeing the Internet,
setting the stage for a showdown with the United States on the future
of Internet governance.

A senior U.S. official reiterated Thursday that the country wants to
remain the Internet's ultimate authority, rejecting calls in a United
Nations meeting in Geneva for a U.N. body to take over.

EU spokesman Martin Selmayr said a new cooperation model was important
"because the Internet is a global resource."

"The EU ... is very firm on this position," he added.

The Geneva talks were the last preparatory meeting before November's
World Summit on the Information Society in Tunisia.

A stalemate over who should serve as the principal traffic cops for
Internet routing and addressing could derail the summit, which aims to
ensure a fair sharing of the Internet for the benefit of the whole
world.

At issue is who would have ultimate authority over the Internet's
master directories, which tell Web browsers and e-mail programs how to
direct traffic.

That role has historically gone to the United States, which created
the Internet as a Pentagon project and funded much of its early
development. The U.S. Commerce Department has delegated much of that
responsibility to a U.S.-based private organization with international
board members, but Commerce ultimately retains veto power.

Some countries have been frustrated that the United States and
European countries that got on the Internet first gobbled up most of
the available addresses required for computers to connect, leaving
developing nations with a limited supply to share.

They also want greater assurance that as they come to rely on the
Internet more for governmental and other services, their plans won't
get derailed by some future U.S. policy.

Policy decisions could at a stroke make all Web sites ending in a
specific suffix essentially unreachable. Other decisions could affect
the availability of domain names in non-English characters or ones
dedicated to special interests such as pornography.


Copyright 2005 The Associated Press.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

More AP headlines and news reports at:
http://telecom-digest.org/td-extra/AP.html   (also)
http://telecom-digest.org/td-extra/newstoday.html

------------------------------

From: Bradley S. Klapper <ap@telecom-digest.org>
Subject: United States Says No! Internet is Ours!
Date: Sat, 1 Oct 2005 12:40:32 -0500


By BRADLEY S. KLAPPER, Associated Press Writer

A senior U.S. official rejected calls on Thursday for a U.N. body to
take over control of the main computers that direct traffic on the
Internet, reiterating U.S. intentions to keep its historical role as
the medium's principal overseer.

"We will not agree to the U.N. taking over the management of the
Internet," said Ambassador David Gross, the U.S. coordinator for
international communications and information policy at the State
Department. "Some countries want that. We think that's unacceptable."

Many countries, particularly developing ones, have become increasingly
concerned about the U.S. control, which stems from the country's role
in creating the Internet as a Pentagon project and funding much of its
early development.

Gross was in Geneva for the last preparatory meeting ahead of
November's U.N. World Summit on the Information Society in Tunisia.

Some negotiators from other countries said there was a growing sense
that a compromise had to be reached and that no single country ought
to be the ultimate authority over such a vital part of the global
economy.

But Gross said that while progress was being made on a number of
issues necessary for producing a finalized text for Tunis, the
question of Internet governance remained contentious.

A stalemate over who should serve as the principal traffic cops for
Internet routing and addressing could derail the summit, which aims to
ensure a fair sharing of the Internet for the benefit of the whole
world.

Some countries have been frustrated that the United States and
European countries that got on the Internet first gobbled up most of
the available addresses required for computers to connect, leaving
developing nations with a limited supply to share.

They also want greater assurance that as they come to rely on the
Internet more for governmental and other services, their plans won't
get derailed by some future U.S. policy.

One proposal that countries have been discussing would wrest control
of domain names from the U.S.-based Internet Corporation for Assigned
Names and Numbers, or ICANN, and place it with an intergovernmental
group, possibly under the United Nations.

Gross dismissed it as unacceptable.

"We've been very, very clear throughout the process that there are
certain things we can agree to and certain things we can't agree to,"
Gross told reporters at U.N. offices in Geneva. "It's not a
negotiating issue. This is a matter of national policy."

He said the United States was "deeply disappointed" with the European
Union's proposal Wednesday advocating a "new cooperation model," which
would involve governments in questions of naming, numbering and
addressing on the Internet.

In 1998, the U.S. Commerce Department selected ICANN to oversees the
Internet's master directories, which tell Web browsers and e-mail
programs how to direct traffic. Internet users around the world
interact with them everyday, likely without knowing it.

Although ICANN is a private organization with international board
members, Commerce ultimately retains veto power. Policy decisions
could at a stroke make all Web sites ending in a specific suffix
essentially unreachable.  Other decisions could affect the
availability of domain names in non-English characters or ones
dedicated to special interests such as pornography.


Copyright 2005 The Associated Press.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.


[TELECOM Digest Editor's Note: For the life of me, I do not understand
why United States insists on keeping total control of Internet for
itself, rather than at least sharing control with other countries. I
do not think other countries could make any more of a mess out of
Internet than ICANN and Vint Cerf have already made. I mean, just 
consider how much spam, scam, illegitimate advertising, viruses,
spyware, etc -- in aggregate total about half of the internet -- ICANN
has fostered since its inception. Since ICANN refuses to do anything
about it at all, maybe the Europeans could do better.   PAT]

------------------------------


TELECOM Digest is an electronic journal devoted mostly to telecomm-
unications topics. It is circulated anywhere there is email, in
addition to various telecom forums on a variety of networks such as
Compuserve and America On Line, Yahoo Groups, and other forums.  It is
also gatewayed to Usenet where it appears as the moderated newsgroup
'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html
  For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308
    and also http://feeds.feedburner.com/TelecomDigest

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #447
******************************

Return to Archives**Older Issues