----------------------------------------------------------------------
Message-ID: <20201210102519@telecom-digest.org>
Date: 10 Dec 2020 10:25:19 -0600
From: Anonymous <anonymous@withheld.nowhere.invalid>
Subject: Re: I don't believe in coincidences
This is anecdotal, but I make frequent calls via Verizon Wireless
from my (215) number to a (570) number. Lately I've been getting
spam calls from forged Caller ID's with a (570) area code in the same
exchange as the number I frequently call, which is run by a small
independent LEC.
If phone spammers are getting access to smart phone users' call logs,
I'd guess the smartphone has an app that harvests and sells that
info. But my phone for the past 6 six years is a BlackBerry Z30 with
very few user-installed apps, none of which access my call logs. As
far as I know, only the native BB10 OS native dialer app accesses my
call logs.
My guess is VZW may be selling my call logs. Either as a corporate
business model or by VZW insiders who illicitly access and sell
customers' call data for their own private gain. VZW has a long
history of sleazy business models(1) that exploit customers' privacy,
and a long history of sleazy employees who've illicitly accessed sold
sensitive customer information.
I'm curious about what stories other people have along these lines.
Maybe we can collectively put a picture together and figure out how
this is happening..
(Anonymous)
1. Here's an example of a sleazy VZW business model I personally
experienced: VZW got caught modifying its users' web traffic and
injecting a HTTP header called X-UIDH which was passed on to every
unencrypted website a VZW customer visited from a mobile device on
their network. Maybe you remember that? After some stern letters
from U.S. Senators and many customer complaints to VZW and to the
FCC, VZW stopped doing it and paid a $1,350.000 fine (chump change
for VZW) for violating privacy laws.
https://www.eff.org/deeplinks/2014/11/verizon-x-uidh
https://www.lexology.com/library/detail.aspx?g=49286701-4bfe-4117-ba00-a7fa369c6688
------------------------------
Message-ID: <20201210174203.6C3698A8@telecom2018.csail.mit.edu>
Date: Thu, 10 Dec 2020 17:42:03 +0000 (UTC)
From: Moderator <telecomdigestsubmissions@remove-this.telecom-digest.org>
Subject: AT&T falls behind Verizon in mmWave race
By Mike Dano
Almost exactly two years ago, AT&T loudly trumpeted that it was the
"first and only company in the US" to launch mobile 5G services in
millimeter wave (mmWave) spectrum.
Now, however, the company has little to show for its efforts. It does
not offer a coverage map of its mmWave network, it hasn't disclosed
any statistics on the number of mmWave sites it operates, and it now
offers mmWave services in about half the number of cities that Verizon
does.
https://www.lightreading.com/opticalip/atandt-falls-behind-verizon-in-mmwave-race/a/d-id/766020
------------------------------
Message-ID: <20201210051248.9BBCB73B@telecom2018.csail.mit.edu>
Date: Thu, 10 Dec 2020 05:12:48 +0000 (UTC)
From: Moderator <telecomdigestsubmissions@remove-this.telecom-digest.org>
Subject: Challenges Ahead In Implementing STIR/SHAKEN
by Steve A. Augustino and Chris Laughlin
In the latest episode of Full Spectrum's Inside the TCPA series,
Partner Steve Augustino and Associate Chris Laughlin discuss a series
of FCC orders that require implementation of a call authentication
framework called STIR/SHAKEN. They cover the FCC's anti-robocall
program, the specifics of STIR/SHAKEN, its implementation requirements
and deadlines, and other implications for service providers, including
what might be ahead in 2021.
https://www.mondaq.com/unitedstates/dodd-frank-consumer-protection-act/1012296/podcast-challenges-ahead-in-implementing-stirshaken?email_access=on
------------------------------
*********************************************
End of telecom Digest Fri, 11 Dec 2020