|
Message Digest
Volume 28 : Issue 100 : "text" Format
Messages in this Issue:
Re: Demise of on-line telephone directory databases
Re: Demise of on-line telephone directory databases
Re: Demise of on-line telephone directory databases
Re: Demise of on-line telephone directory databases
Re: Demise of on-line telephone directory databases
Sabotage attacks knock out phone service [Calif.]
Skype moves in on cellphone industry
Electricity Grid in U.S. Penetrated By Spies
Conficker C Analysis
An Analysis of Conficker
Sabotage attacks knock out phone service
Re: Sabotage attacks knock out phone service
Re: Sabotage attacks knock out phone service
Re: Sabotage attacks knock out phone service
fwd: "Service restored in Silicon Valley after fiber cut"
====== 27 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.
===========================
Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent. Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime. Geoffrey Welsh
===========================
See the bottom of this issue for subscription and archive details
and the name of our lawyer, and other stuff of interest.
----------------------------------------------------------------------
Date: Fri, 10 Apr 2009 10:11:40 -0400
From: MC <for.address.look@www.ai.uga.edu.slash.mc>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Demise of on-line telephone directory databases
Message-ID: <QnIDl.27117$v8.14969@bignews3.bellsouth.net>
Adam H. Kerman wrote:
> Might as well resume using printed telephone directories. The number of
> published listings is way down, as the ILEC doesn't carry all telephone
> numbers from CLEC's, but at least what you find stands a better chance
> of being accurate.
I have started encountering younger people who don't know what a printed
telephone directory *is*.
------------------------------
Date: Sun, 12 Apr 2009 08:35:40 +1000
From: David Clayton <dcstar@myrealbox.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Demise of on-line telephone directory databases
Message-ID: <pan.2009.04.11.22.35.39.722032@myrealbox.com>
On Sat, 11 Apr 2009 09:02:16 -0400, MC wrote:
> Adam H. Kerman wrote:
>
>> Might as well resume using printed telephone directories. The number of
>> published listings is way down, as the ILEC doesn't carry all telephone
>> numbers from CLEC's, but at least what you find stands a better chance
>> of being accurate.
>
> I have started encountering younger people who don't know what a printed
> telephone directory *is*.
Not everybody gets arrested........ ;-)
--
Regards, David.
David Clayton
Melbourne, Victoria, Australia.
Knowledge is a measure of how many answers you have, intelligence is a
measure of how many questions you have.
------------------------------
Date: Fri, 10 Apr 2009 12:46:28 -0700 (PDT)
From: David Kaye <sfdavidkaye2@yahoo.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Demise of on-line telephone directory databases
Message-ID: <443164d2-5854-4a6a-ad9d-7055b4efbc85@j9g2000prh.googlegroups.com>
On Apr 10, 7:00 am, "Adam H. Kerman" <a...@chinet.com> wrote:
> Might as well resume using printed telephone directories. The number of
> published listings is way down, as the ILEC doesn't carry all telephone
> numbers from CLEC's, but at least what you find stands a better chance
> of being accurate.
It's impossible to find my phone number via such searches. I prefer
it this way. I get nearly zero junk phone calls.
------------------------------
Date: Sat, 11 Apr 2009 10:48:43 -0400
From: Steve Stone <spfleck@citlink.net>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Demise of on-line telephone directory databases
Message-ID: <grqaks$520$1@news.motzarella.org>
>> Might as well resume using printed telephone directories.
In my residential area phone books are dropped off in bags at the foot
of the rural mailbox or thrown to the middle of the driveway. Many are
never picked up by their intended victims, left to decompose outdoors.
Part of the problem is we get so many phone books.. 6 or 7 at last
count. Two or three from Frontier, the regional telco, more from
Verizon which does not serve my area but serves adjacent areas, and
more from independent yellow page distributors. None of them are
accurate.
------------------------------
Date: Sat, 11 Apr 2009 18:11:09 -0500
From: gordon@hammy.burditt.org (Gordon Burditt)
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Demise of on-line telephone directory databases
Message-ID: <oI2dnXbL24AQvnzUnZ2dnUVZ_jmdnZ2d@posted.internetamerica>
>> Might as well resume using printed telephone directories. The number of
>> published listings is way down, as the ILEC doesn't carry all telephone
>> numbers from CLEC's, but at least what you find stands a better chance
>> of being accurate.
>
>It's impossible to find my phone number via such searches. I prefer
>it this way. I get nearly zero junk phone calls.
>
The model I prefer is: if you want your number listed in a directory,
then contact a directory company (or several) and pay for it.
Telephone companies may not sell data to directory companies. If
a telephone company runs a directory company, it must be done as a
separate unit with no access to the telephone company database.
Very, very few people within a telephone company, and none outside,
should be able to do a lookup by name. There is no national security
or 911 exception. They can make their own deals with directory
companies.
------------------------------
Date: Fri, 10 Apr 2009 22:22:41 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Sabotage attacks knock out phone service [Calif.]
Message-ID: <p0624080bc60400141faa@[10.0.1.6]>
Sabotage attacks knock out phone service
Henry K. Lee,Ryan Kim, Chronicle Staff Writers
Thursday, April 9, 2009
(04-09) 12:20 PDT SAN JOSE -- Vandals cut fiber-optic cable lines
belonging to AT&T and Sprint at two locations early today, knocking
out landline and cellular phone service to thousands of residential
customers and businesses in southern Santa Clara County, in Santa
Cruz and San Benito counties and along the Peninsula, authorities
said.
Four AT&T fiber-optic cables were severed shortly before 1:30 a.m.
along Monterey Highway north of Blossom Hill Road in south San Jose,
police Sgt. Ronnie Lopez said. Sprint's cable in San Carlos was cut
about two hours later, a company official said. The exact location
was not immediately known.
Police used yellow tape to cordon off the area where the AT&T cables
were destroyed, which is near railroad tracks, as investigators and
phone company workers descended into an underground vault where the
cables are located.
...
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/04/09/BAP816VTE6.DTL
------------------------------
Date: Fri, 10 Apr 2009 22:22:52 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Skype moves in on cellphone industry
Message-ID: <p06240813c60469b6e258@[10.0.1.6]>
TECH LAB
Skype moves in on cellphone industry
By Hiawatha Bray, Globe Staff | April 9, 2009
The Boston Globe
Technology has a way of eroding corporate empires; ask anybody in the
newspaper business. Now the cellular phone industry is getting a
taste of the same medicine. By installing new software on their
smartphones, consumers are hooking up to alternative phone services
and bypassing their cell carriers.
It isn't an entirely new trend, but it may have reached a tipping
point on March 31. That's when the Internet-based telephone service
Skype introduced a version of its software that runs on the popular
Apple iPhone.
You've probably heard of Skype, a program written by Estonian hackers
and later bought by Internet auction house eBay for $2.6 billion.
People around the world use it to talk to each other free of charge
over their Internet-linked computers. Skype also offers connections
to traditional phone services at dirt-cheap prices. For example,
Skype calls to any phone number in the United States cost 2.1 cents
per minute. But it's mainly a hit with international callers, because
the service's prices for overseas calls beat standard phone company
rates. My wife pays Skype about 21 cents a minute to chat with her
relatives in Congo, while AT&T charges 59 cents a minute.
But what good is Skype on a cellphone? Wouldn't you still have to
burn cellular minutes to use it? Not if your phone has built-in Wi-Fi
wireless networking. Then Skype could relay calls over the Internet,
with no help from the phone company.
...
http://www.boston.com/business/technology/articles/2009/04/09/skype_moves_in_on_cellphone_industry/
------------------------------
Date: Fri, 10 Apr 2009 22:24:24 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Electricity Grid in U.S. Penetrated By Spies
Message-ID: <p06240817c6046efe1f34@[10.0.1.6]>
Electricity Grid in U.S. Penetrated By Spies
By SIOBHAN GORMAN
APRIL 8, 2009
Robert Moran monitors an electric grid in Dallas. Such infrastructure
grids across the country are vulnerable to cyberattacks.
WASHINGTON -- Cyberspies have penetrated the U.S. electrical grid and
left behind software programs that could be used to disrupt the
system, according to current and former national-security officials.
The spies came from China, Russia and other countries, these
officials said, and were believed to be on a mission to navigate the
U.S. electrical system and its controls. The intruders haven't sought
to damage the power grid or other key infrastructure, but officials
warned they could try during a crisis or war.
...
http://online.wsj.com/article/SB123914805204099085.html
------------------------------
Date: Fri, 10 Apr 2009 22:39:55 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Conficker C Analysis
Message-ID: <p0624081fc605b1069a8b@[10.0.1.6]>
SRI International
Technical Report
Addendum
Conficker C Analysis
Phillip Porras, Hassen Saidi, and Vinod Yegneswaran
Release Date: 08 March 2009
Last Update: 4 April 2009
Computer Science Laboratory
SRI International
333 Ravenswood Avenue
Menlo Park CA 94025 USA
Introduction
This addendum provides an evolving snapshot of our understanding of
the latest Conficker variant, referred to as Conficker C. The
variant was brought to the attention of the Conficker Working Group
when one member reported that a compromised Conficker B honeypot was
updated with a new dynamically linked library (DLL). Although a
network trace for this infection is not available, we suspect that
this DLL may have propagated via Conficker's Internet rendezvous
point mechanism (Global Network Impact). The infection was found on
the morning of Friday, 6 March 2009 (PST), and it was later reported
that other working group members had received other DLL reinfections
throughout the same day. Since that point, multiple members have
reported upgrades of previously infected machines to this latest
variant via HTTP-based Internet rendezvous points. We believe this
latest outbreak of Conficker variant C began first spreading at
roughly 6 p.m. PST, 4 March 2009 (5 March UTC).
In this addendum report, we summarize the inner workings and
practical implications of this latest malicious software application
produced by the Conficker developers. In addition to the dual
layers of packing and encryption used to protect A and B from reverse
engineering, this latest variant also cloaks its newest code
segments, along with its latest functionality, under a significant
layer of code obfuscation to further hinder binary analysis.
Nevertheless, with a careful mixture of static and dynamic analysis,
we attempt here to summarize the internal logic of Conficker C.
...
http://mtc.sri.com/Conficker/addendumC/
New: Free Detection Utilities
Conficker C P2P Snort Detection Module
http://mtc.sri.com/Conficker/contrib/plugin.html
Conficker C Network Scanner
http://mtc.sri.com/Conficker/contrib/scanner.html
------------------------------
Date: Fri, 10 Apr 2009 22:39:55 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: An Analysis of Conficker
Message-ID: <p0624081ec605b0376a18@[10.0.1.6]>
SRI International
Technical Report
An Analysis of Conficker's Logic and Rendezvous Points
Phillip Porras, Hassen Saidi, and Vinod Yegneswaran
Release Date: 4 February 2009
Last Update: 19 March 2009
Computer Science Laboratory
SRI International
333 Ravenswood Avenue
Menlo Park CA 94025 USA
Introduction
Conficker is one of a new interesting breed of self-updating worms
that has drawn much attention recently from those who track malware.
In fact, if you have been operating Internet honeynets recently,
Conficker has been one very difficult malware to avoid. In the last
few months this worm has relentlessly pushed all other infection
agents out of the way, as it has infiltrated nearly every Windows 2K
and XP honeypot that we have placed out on the Internet. From late
November through December 2008 we recorded more than 13,000 Conficker
infections within our honeynet, and surveyed more than 1.5 million
infected IP addresses from 206 countries. More recently, our
cumulative census of Conficker.A indicates that it has affected more
than 4.7 million IP addresses, while its successor, Conficker.B, has
affected 6.7M IP addresses (see SRI Appendix I: Conficker Census).
Our analysis finds that the two worms are comparable in size (within
a factor of 3) and the active infection size of Conficker A and B
are under 1M and 3M hosts, respectively. The numbers reported in the
press are most likely overestimates. That said, as scan and infect
worms go, we have not seen such a dominating infection outbreak since
Sasser [6] in 2004. Nor have we seen such a broad spectrum of
antivirus tools do such a consistently poor job at detecting malware
binary variants since the Storm [4] outbreak of 2007.
Early accounts of the exploit used by Conficker arose in September of
2008. Chinese hackers were reportedly the first to produce a
commercial package to sell this exploit (for $37.80) [5]. The exploit
employs a specially crafted remote procedure call (RPC) over port
445/TCP, which can cause Windows 2000, XP, 2003 servers, and Vista to
execute an arbitrary code segment without authentication. The
exploit can affect systems with firewalls enabled, but which operate
with print and file sharing enabled. The patch for this exploit was
released by Microsoft on October 23 2008 [3], and those Windows PCs
that receive automated security updates have not been vulnerable to
this exploit. Nevertheless, nearly a month later, in mid-November,
Conficker would utilize this exploit to scan and infect millions of
unpatched PCs worldwide.
Why Conficker has been able to proliferate so widely may be an
interesting testament to the stubbornness of some PC users to avoid
staying current with the latest Microsoft security patches [2].
Some reports, such as the case of the Conficker outbreak within
Sheffield Hospital's operating ward, suggest that even
security-conscious environments may elect to forgo automated software
patching, choosing to trade off vulnerability exposure for some
perceived notion of platform stability [8]. On the other hand, the
uneven concentration of where the vast bulk of Conficker infections
have occurred suggest other reasons. For example, regions with dense
Conficker populations also appear to correspond to areas where the
use of unregistered (pirated) Windows releases are widespread, and
the regular application of available security patches [9] are rare.
In this paper, we crack open the Conficker A and B binaries, and
analyze many aspects of their internal logic. Some important aspects
of this logic include its mechanisms for computing a daily list of
new domains, a function that in both Conficker variants, laid dormant
during their early propagation stages until November 26 and January
1, respectively. Conficker drones use these daily computed domain
names to seek out Internet rendezvous points that may be established
by the malware authors whenever they wish to census their drones or
upload new binary payloads to them. This binary update service
essentially replaces the classic command and control functions that
allow botnets to operate as a collective. It also provides us with a
unique means to measure the prevalence and impact of Conficker A and
B. The contributions of this paper include the following:
* * A static analysis of Conficker A and B. We dissect its top
level control flow, capabilities, and timers.
* * A description of the domain generation algorithm and the
rendezvous protocol.
* * An empirical analysis of infected hosts observed through
honeynets and rendezvous points.
* * Exploration of Conficker's Ukrainian evidence trail.
* * A first look at a variant of Conficker B (which we call B++)
and the implications of its binary flash mechanism.
...
http://mtc.sri.com/Conficker/
New: Free Detection Utilities
Conficker C P2P Snort Detection Module
http://mtc.sri.com/Conficker/contrib/plugin.html
Conficker C Network Scanner
http://mtc.sri.com/Conficker/contrib/scanner.html
------------------------------
Date: Fri, 10 Apr 2009 22:44:19 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Sabotage attacks knock out phone service
Message-ID: <p06240821c605b3d14247@[10.0.1.6]>
Sabotage attacks knock out phone service
Nanette Asimov, Ryan Kim,Kevin Fagan, Chronicle Staff Writers
Friday, April 10, 2009
(04-10) 04:00 PDT SAN JOSE --
Police are hunting for vandals who chopped fiber-optic cables and
killed landlines, cell phones and Internet service for tens of
thousands of people in Santa Clara, Santa Cruz and San Benito
counties on Thursday.
The sabotage essentially froze operations in parts of the three
counties at hospitals, stores, banks and police and fire departments
that rely on 911 calls, computerized medical records, ATMs and credit
and debit cards.
The full extent of the havoc might not be known for days, emergency
officials said as they finished repairing the damage late Thursday.
Whatever the final toll, one thing is certain: Whoever did this is in
a world of trouble if he, she or they get caught.
"I pity the individuals who have done this," said San Jose Police
Chief Rob Davis.
Ten fiber-optic cables carrying were cut at four locations in the
predawn darkness. Residential and business customers quickly found
that telephone service was perhaps more laced into their everyday
needs than they thought. Suddenly they couldn't draw out money, send
text messages, check e-mail or Web sites, call anyone for help, or
even check on friends or relatives down the road.
Several people had to be driven to hospitals because they were unable
to summon ambulances. Many businesses lapsed into idleness for hours,
without the ability to contact associates or customers.
More than 50,000 landline customers lost service - some were
residential, others were business lines that needed the connections
for ATMs, Internet and bank card transactions. One line alone could
affect hundreds of users.
...
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2009/04/10/MNP816VTE6.DTL
------------------------------
Date: Sun, 12 Apr 2009 08:40:34 +1000
From: David Clayton <dcstar@myrealbox.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Sabotage attacks knock out phone service
Message-ID: <pan.2009.04.11.22.40.32.572122@myrealbox.com>
On Sat, 11 Apr 2009 09:19:47 -0400, Monty Solomon wrote:
>
> Sabotage attacks knock out phone service
>
> Nanette Asimov, Ryan Kim,Kevin Fagan, Chronicle Staff Writers
>
> Friday, April 10, 2009
>
> (04-10) 04:00 PDT SAN JOSE --
>
> Police are hunting for vandals who chopped fiber-optic cables and
> killed landlines, cell phones and Internet service for tens of
> thousands of people in Santa Clara, Santa Cruz and San Benito
> counties on Thursday.
>
> The sabotage essentially froze operations in parts of the three
> counties at hospitals, stores, banks and police and fire departments
> that rely on 911 calls, computerized medical records, ATMs and
> credit and debit cards.
.........
Gee, all these billions upon billions of dollars spent on "security"
around the world each year and still there are ways to bring western
civilization to its knees with little effort.
Better hope those terrorist type people don't figure out that they
could cripple a country's economy (in the short-term, at least) with a
well co-ordinated attack on these innumerable easy targets.
--
Regards, David.
David Clayton
Melbourne, Victoria, Australia.
Knowledge is a measure of how many answers you have, intelligence is a
measure of how many questions you have.
***** Moderator's Note *****
Fiber-optic cables are child's play compared to the other
possibilities. The fact is that the infrastructure of the United
States is, for practical purposes, unguarded and unprotected.
I won't list the obvious attack vectors that come to mind. Although
I'm not vain enough to assume that others haven't thought of them, I
_am_ getting superstitious in my old age, so I won't.
Bill Horne
Temporary Moderator
------------------------------
Date: Sat, 11 Apr 2009 17:20:17 -0400
From: T <kd1s.nospam@cox.nospam.net>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Sabotage attacks knock out phone service
Message-ID: <MPG.244ad39a76e6bc7d9899b7@reader.motzarella.org>
In article <p06240821c605b3d14247@[10.0.1.6]>, monty@roscom.com says...
>
> Sabotage attacks knock out phone service
>
> Nanette Asimov, Ryan Kim,Kevin Fagan, Chronicle Staff Writers
>
> Friday, April 10, 2009
>
> (04-10) 04:00 PDT SAN JOSE --
>
> Police are hunting for vandals who chopped fiber-optic cables and
> killed landlines, cell phones and Internet service for tens of
> thousands of people in Santa Clara, Santa Cruz and San Benito
> counties on Thursday.
[Moderator snip]
> http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2009/04/10/MNP816VTE6.DTL
As a ham, I have to ask where was the amateur radio communty in this.
It's been proven time and again that amateur radio is the only thing
standing when landline and cell services go down.
***** Moderator's Note *****
Ham radio may be still standing when cell and landlines are down, but
it's not operational. Short of having hams drive around with
loudspeakers advertising their presence, there's no way to make the
citizenry aware of their capabilities.
Bill Horne
Temporary Moderator
------------------------------
Date: Sat, 11 Apr 2009 18:15:26 -0700
From: Sam Spade <sam@coldmail.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Re: Sabotage attacks knock out phone service
Message-ID: <OgbEl.16884$Qh6.6057@newsfe14.iad>
Monty Solomon wrote:
> "I pity the individuals who have done this," said San Jose Police
> Chief Rob Davis.
I can see the San Jose Police closing in on these culprits in some
trailer park outside of Modesto.
***** Moderator's Note *****
Given that Modesto is about 90 miles away from San Jose, I'd bet on
Los Gatos or Sunnyvale.
Bill Horne
Temporary Moderator
------------------------------
Date: Sat, 11 Apr 2009 00:26:30 -0400
From: Will Roberts <oldbear@arctos.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: fwd: "Service restored in Silicon Valley after fiber cut"
Message-ID: <0MKp8S-1LsUnc0h41-000foK@mrelay.perfora.net>
C|NET
April 10, 2009
Service restored in Silicon Valley after fiber cut
by
Marguerite Reardon
The fiber cut that crippled phone and broadband service and knocked out 911
emergency services in Silicon Valley on Thursday has been fixed, according
to a Twitter post from AT&T.
"CA Outage Update: Repairs to vandalized San Jose cables were completed
overnight. Services are operating normally this morning. "
Sprint's public relations spokeswoman Crystal Davis "tweeted" at about
7 a.m. PDT that the "Fiber cut issue affecting Sprint's wireless service
in San Jose/Santa Cruz has been completely resolved as of appx 2:40am EDT."
Service was slowly coming back online Thursday afternoon and into the
evening for many wireless, phone and Internet customers. VerticalResponse,
a San Francisco-based company that uses an ISP whose servers are collocated
in Palo Alto, Calif., said its servers went back online around 12:30 p.m.
PDT. And one CNET News reader living in San Martin, Calif. said he was able
to make and receive landline and cell phone calls around 7:15 p.m. PDT on
Thursday.
Thousands of wireless, Internet and landline phone customers were without
service from about 1:30 a.m. PDT after vandals had cut four fiber-optic
cables owned by AT&T. A cable in San Carlos, owned by Sprint Nextel, had
also been severed about two later. But Sprint spokeswoman Crystal Davis
said the company was able to reroute most of that traffic onto another
fiber link and for the most part, service was not disrupted.
That was not the case with AT&T's fibers. Because AT&T is the local phone
company in the area, nearly all wireless, landline telephone, and consumer
broadband services travel over the company's regional network regardless
of which company provides the service. For example, Verizon Wireless and
Sprint use AT&T's regional network to connect their wireless cell phone
towers to their respective national networks. As a result, wireless
customers were without service in the region where the fibers had been
cut.
Officials also said that residents in the San Jose/Santa Clara region
were without emergency 911 service for much of the day.
Exactly how vandals gained access to the cables that had been severed is
not yet fully known. Sprint's Davis said a manhole cover was opened and
the cables simply cut. She explained that fiber cuts are common, but are
usually accidental--done unintentionally by utility repairmen or
landscapers.
AT&T said on its Twitter feed on Thursday that it is offering a $100,000
reward to anyone who has information that could lead to an arrest or
conviction of the vandals who cut the fibers. The company has also said
it's working closely with law enforcement.
##
***** Moderator's Note *****
AT&T? Twitter?
Repent, sinners! The universe is coming to an end! The signs are all around us!
Bill Horne
Temporary Moderator
------------------------------
TELECOM Digest is an electronic journal devoted mostly to telecom-
munications topics. It is circulated anywhere there is email, in
addition to Usenet, where it appears as the moderated newsgroup
'comp.dcom.telecom'.
TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.
The Telecom Digest is currently being moderated by Bill Horne while
Pat Townson recovers from a stroke.
Contact information: Bill Horne
Telecom Digest
43 Deerfield Road
Sharon MA 02067-2301
781-784-7287
bill at horne dot net
Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom
Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom
This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then. Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!
URL information: http://telecom-digest.org
Copyright (C) 2008 TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.
************************
---------------------------------------------------------------
Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list.
All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.
End of The Telecom digest (15 messages)
******************************
|