For your convenience in reading: Subject lines are printed in RED and
Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal
or  
TELECOM Digest Fri, 5 Aug 2005 23:53:00 EDT Volume 24 : Issue 356 Inside This Issue: Editor: Patrick A. Townson Craig Niedorf Remembered - Part 1 (TELECOM Digest Archives Reprint) Craig Niedorf Remembered - Part 2 (TELECOM Digest Archives Reprint) Re: Nextel False Advertising (Joseph) Re: Analysts: ATMs Highly Vulnerable to Fraud (Wesrock@aol.com) Re: Credit Report, was Re: AT&T Customers Taken By Alltel (Damon Brownd) Re: Today's Long Distance Circuits? (Neal McLain) Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer; other stuff of interest. ---------------------------------------------------------------------- Date: Fri, 5 Aug 2005 22:42:12 EDT From: ptownson@massis.lcs.mit.edu (TELECOM Digest Editor) Subject: Craig Niedorf Remembered - Part 1 It was fifteen years ago, about this time in the summer of 1990, that Craig Niedorf, then a college student about 20 years old, was told by the federal government that they would not be finding him guilty after all. The federal prosecutor came up with a total crock based on some flaky testimony by BellSouth. To save embarassment to themselves because of this prosecutorial misconduct, the government simply decided to let him go, after all the hell they had first put him through, for his alleged 'hacking'. I thought you might like to see the story I ran in the Digest fifteen years ago, over the last weekend of July, 1990. Date: Fri, 27 Jul 90 16:55 CDT From: TK0JUT2%NIU.BITNET@uicvm.uic.edu Subject: NEIDORF TRIAL OVER! GOVERNMENT DROPS ALL CHARGES! Less than halfway through the trial, and before it had presented its remaining witnesses, but government dropped all charges against Craig Neidorf. Defense Attorney Sheldon Zenner said that Prosecutor Bill Cook's decision was "in line with the highest standards of good government and ethical conduct." Zenner said that the government could have continued to the last and let the jury decide, but did the honorable thing. One reason for the surprise decision, according to one inside source, was that, as the testimony and cross-examination proceeded, the government realized that BellSouth had not been forthcoming about the extent of availability of the document and its worth. The prosecution apparently relied on the good faith of BellSouth because of the previously good working relationship it had with it and other telecom companies. Craig Neidorf was ecstatic about the decision, and feels vindicated. He can now resume his studies, complete his degree, and seriously consider law school. He *WILL NOT* resume publication of PHRACK! Zenner praised Bill Cook's decision to drop all charges, and added he is not angry, but appreciative. Zenner also felt that the the efforts of EFF, CuD, and the many individuals who supported Craig were instrumental in creating credibility and visibility for the case, generating ideas and information for the defense, and facilitating enlisting some of the prospective defense witnesses to participate. There are those who have taken the Ed Meese line and assumed that Craig must have done *something* or the government wouldn't be prosecuting him. Others have not been as strident, but have put their faith in "The System," assuming that the process works, and as long as Craig's procedural rights were protected, we should "wait and see." Others on the extreme end have said that those of us who supported Craig would change our minds once all the evidence has come out, and we were criticized for raising issues unfairly when the government, so it was claimed, couldn't respond because it had to protect Craig's privacy and was required to sit in silence. One prosecutor even said that when all the evidence comes out, Craig's supporters would slink back under their rocks. There is little cause for Craig's supporters to gloat, because the emotional and financial toll on Craig and his family were substantial. Dropping the charges hardly means that the system works, because if it worked, there would have been no charges to begin with. From the beginning, Craig expressed his willingness to cooperate, but the government made this impossible with its persecution. Craig's supporters, from the beginning, have published the evidence, explained the issues, and we can still see no reason for his indictment. The evidence presented by the government in some cases could have been presented as well by the defense to show that *no* criminal acts occurred. When witnesses must be coached into how to present negative evidence, and when little, if any, can be adequately constructed, one would think that somebody in the prosecutor's office might realize there simply isn't a case there. The government had no case in the beginning, they could not construct one, and they had nothing at the end. So, dropping the charges does not indicate that the system works, but rather that sometimes a just outcome may result despite unjust actions of over-zealous agents. The prosecution not only lost the case, but reduced its credibility in all areas of computer enforcement. The claim that a recent TELECOM Digest contributor made that the SS and others may intentionally overstep bounds to establish more clearly the lines of law may be true, but what about the costs to innocent victims of such Machiavellian tactics? Do we really live in such a cynical society that we find it acceptable to place lives, careers, and reputations at great risk? Now, however, it is time to move on and address the lessons learned from the experience. Some of the issues include how computerists can be protected from overzealousness, how law enforcement agents can perform their legitimate tasks of gathering evidence without violation rights, and how legislation can be written to reflect technological changes that protect us from predators while not subverting our rights with loose, broad, or inaccurate language. This has been the goal of Mitch and the EFF, and it is one on which we should *all* unite and focus our energy. ------------------------------ Date: Fri, 27 Jul 90 03:23 CDT From: TK0JUT2%NIU.BITNET@uicvm.uic.edu Subject: Days Three and Four of Craig's Trial Some final comments on Day Three of Craig Neidorf's trial: It was curious that, in introducing the PHRACK/INC Hacking Directory, a list of over 1,300 addresses and handles, the prosecution seemed it important that LoD participants were on it, and made no mention of academics, security and law enforcement agents, and others. In some ways, it seemed that Bill Cook's strategy was to put HACKING (or his own rather limited definition of it) on trial, and then attempt to link Craig to hackers and establish guilt by association. It was also strange that, after several months of supposed familiarization with the case, that neither Bill Cook nor Agent Foley would pronounce his name correctly. Neidorf rhymes with eye-dorf. Foley pronounced it KNEEdorf and Cook insisted on NEDD-orf. Further, his name was spelled incorrectly on at least three charts introduced as evidence, but as Sheldon Zenner indicated, "we all make mistakes." Yeh, even Bill Cook. One can't but think that such an oversight is intentional, because a prosecutor as aware of detail as Bill Cook surely by now can be expected to know who he is prosecuting, even when corrected. Perhaps this is just part of a crude, arrogant style designed to intimidate, perhaps it is ignorance, or perhaps it is a simple mistake. But, we judge it an offense both to Craig and especially his family to sit in the courtroom and listen to the man prosecuting their son to continually and so obviously mispronounce their name. DAY FOUR OF THE TRIAL (THURSDAY, JULY 26): Special Agent Foley continued his testimony, continuing to describe the step by step procedure of the search, his conversation with Craig, what he found, and the value of the E911 files. On cross-examination, Agent Foley was asked how he obtained the original value of the files. The value is crucial, because of the claim that they are worth more than $5,000. Agent Foley indicated that he obtained the figure from BellSouth and didn't bother to verify it. Then, he was asked how he obtained the revised value of $23,000. Again, Agent Foley indicated that he didn't verify the worth. Because of the importance of the value in establishing applicability of Title 18, this seems a crucial, perhaps fatal, oversight. Next came the testimony of Robert Riggs (The Prophet), testifying presumably under immunity and, according to a report in the last issue of CuD, under the potential threat of a higher sentence if he did not cooperate. The diminutive Riggs said nothing that seemed harmful to Craig, and Zenner's skill elicited information that, to an observer, seemed quite beneficial. For example, Riggs indicated that he had no knowledge that Craig hacked, had no knowledge that Craig ever traded in or used passwords for accessing computers, and that Craig never asked him to steal anything for him. Riggs also indicated that he had been coached by the prosecution. The coaching even included having a member of the prosecution team play the role of Zenner to prepare him for cross-examination. It was also revealed that the prosecution asked Riggs to go over all the back issues of PHRACK to identify any articles that may have been helpful in his hacking career. Although it may damage the egos of some PHRACK writers, Riggs identified only one article from PHRACK 7 that MIGHT POSSIBLY be helpful. What are we to make of all this? So far, it seems that the bulk of the evidence against Craig is weak, exaggerated, and at times seems almost fabricated (such as the value of the E911 file and Craig's "evil" attempt to organize a league of "criminals." We have been told repeatedly be some law enforcement officials and others that we should wait, because evidence will come out that could not be discussed in public, and that this evidence would silence critics. Some have even said that those who have criticized law enforcement would "slink back under their rocks" when the evidence was presented. Perhaps. But, so far at least, there has been no smoking gun, no evidence that hasn't been discussed previously, and no indication of any heinous conspiracy to bring America to its knees by trashing the E911 system, robbing banks, or destroying the technological fabric of society. Perhaps a bombshell will be introduced before the prosecution winds up in a few days. But, even if Craig is ultimately found guilty on any of the counts, there is certainly nothing presented thus far that appears to justify the severity of the charges or the waste of state resources. To paraphrase that anonymous writer in the last issue of CuD, I can't help but wonder why we're all here! ------------------------------ Date: Fri, 5 Aug 2005 22:35:21 EDT From: ptownson@massis.lcs.mit.edu (TELECOM Digest Editor) Subject: Craig Niedorf Remembered - Part 2 Another incident during that summer of 1990 we shouldn't forget were the various newspaper accounts written by reporter Joe Abernathy. Although Mr. Abernathy in his earlier articles got a lot of details wrong, by this point (summer, 1990) he was doing better at reporting facts, not hearsay and rumors. Abernathy talked in this article about the government sponsored witch hunt that went on for couple of yeas in 1989-1990. ANOTHER ARTICLE BY JOE ABERNATHY ABOUT THE INTERNET IS LOCATED IN THE MAIN DIRECTORY OF TELECOM ARCHIVES UNDER THE TITLE 'ABERNATHY.INTERNET.STORY' . Date: Wed, 5 Sep 90 19:29:47 CDT From: edtjda@MAGIC712.CHRON.COM(Joe Abernathy) To: tk0jut2%niu.bitnet@UICVM.UIC.EDU Subject: Text of chron-sundevil article War on computer crime waged with search, seizure By JOE ABERNATHY Houston Chronicle The government's first assault on computer crime, unveiled with fanfare six months ago, has generated few criminal cases and is drawing allegations that federal agents are using heavy-handed tactics. Although only four people have been charged, searches and seizures have been conducted in at least 44 homes or businesses in the crackdown, called Operation Sun Devil. One prosecutor attributed the delay in filing cases to the vast amount of information that must be sorted. Authorities would not say, however, when or if additional charges might be re- turned. Sun Devil, so named because it began in Arizona and targeted an evil that investigators deemed biblical in stature, is held forth as a sophisticated defense of the nation's computer in- frastructure. Computer-related abuses will cost the nation's business community $500 million this year, according to some esti mates. Operation Sun Devil and several related investigations made public in March have been under way for more than two years. Hun- dreds of agents from the Secret Service, U.S. attorney's office, the Bell companies, and assorted law enforcement agencies are involved. But the operation is coming under fire for what critics describe as unjustified searches and seizures of property and electronic information protected by the Constitution. Among examples they cite: * An Austin publishing house is clinging to life after Secret Service agents confiscated equipment and manuscripts, leaving behind an unsigned search warrant. * A Missouri college student faces an extra year in school and $100,000 in legal fees after defending himself from charges that he stole a proprietary document from the telephone company by publishing it in a newsletter. * The wife and children of a Baltimore corporate computer consultant were detained for six hours while he was interrogated in a locked bedroom and his business equipment was confiscated. With no way to support itself, the family has sunk into pover- ty. At a press conference in March, authorities presented Sun De- vil as a full-scale response to a serious criminal threat. "The United States Secret Service, in cooperation with the Un- ited States attorney's office and the attorney general for the state of Arizona, established an operation utilizing sophisticat- ed investigative techniques," a press release said, adding that 40 computers and 23,000 data disks had been seized in the initial sweep. "The conceivable criminal violations of this operation have serious implications for the health and welfare of all individu- als, corporations, and United States government agencies relying on computers and telephones to communicate," it continued. Six months later, most officials are silent about Sun Devil. But at least one principal denies excesses in the operation. "I am not a mad dog prosecutor, " said Gail Thackeray, assistant attorney general for the state of Arizona and the intellectual parent of Operation Sun Devil. "(Agents) are acting in good faith, and I don't think that can be said of the hacker community. "Over the last couple of years, a lot of us in different places -- state, federal and local -- have been getting hit with a dramatic increase in complaints from computer hacker victims. So in response to that the Secret Service started the Sun Devil in- vestigation trying to find a more effective way to deal with some of this." Thackeray said the Secret Service, an agency of the U.S. Treasury Department, assumed jurisdiction because computer crime often involves financial fraud. Most of the losses are at- tributed to stolen long distance service. "It's not unusual for hackers to reach six figures (of abuse) in one month'' at a single business location, she said. "This whole mess is getting completely out of hand.'' But computer experts critical of Sun Devil contend the opera- tion also is out of hand. They have rallied behind the banner of the Electronic Frontier Foundation, which contends that computer networks represent a fundamentally new realm of self-expression into which constitutional protection must be extended. Some visitors to this realm deem it cyberspace, using termi- nology borrowed from a science fiction genre set in a gritty fu- ture in which computer and telephone lines become extensions of one's intellect and even physical being. Hackers, as those who enter others' computers without authori- zation are known, are referred to as cyberpunks by some computer network users. It may have been this connection that drew the Secret Service to the Austin offices of Steve Jackson Games, which early this spring was about to publish something called "GURPS Cyber- punk." It is a rule book for a role-playing adventure along the lines of Dungeons & Dragons, played with dice and not computers. The cover page, however, credits the Legion of Doom, a self- professed underground hackers group, for assistance in providing realism. The game's author admits discoursing with the Le- gion. This link ensnared the company in the nationwide sweep con- ducted March 1, when 27 search warrants were executed in 14 ci- ties. A number of cases targeted members of the Legion. The Secret Service seized all copies of the Cyberpunk manuscript, along with the computers on which it was being stored prior to publication. "One of the Secret Service agents told Steve Jackson that they thought the book was a handbook for computer crime,'' said Sharon Beckman of the Boston firm Silverglate & Good, Jackson's attorney. "It looks like what (this) was, in effect, was a prior restraint on protected speech, speech protected by the First Amendment." Jackson's company, which had revenues of $1.4 million in 1989, was nearly dealt a death blow by the raid. Cyberpunk was to be its main spring release, but it would have to be rewritten from scratch. Jackson was not allowed access to the reams of in- formation stored on the confiscated equipment. "We had to lay off eight people, and we had to cut way back on the number of products we were producing," said Jackson, who put the cost of the raid at $125,000. That doesn't include lost revenues, "or the value to the company of the eight (of 17) em- ployees we had to lay off, because I don't know where to start to put a value on that." Beckman described her client as an ordinary businessman who uses a computer in his business. "He's not a computer hacker. He's not even a particularly sophisticated computer user," she said. "It was terrifying,'' Jackson recalled." I was in the hands of a lot of keen, earnest, sincere people who had no idea what they were doing and who had federal law enforcement powers. "It's frightening that they can do this to innocent people." No charges have been filed. Some of the equipment has been returned, but some was damaged beyond repair. Jackson said agents recently acknowledged that some equipment indeed is gone forever. The Secret Service, Arizona U.S. attorney's office and Justice Department all refused to discuss any specifics of Jackson's case, or any activities associated with Operation Sun Devil. "We're a very efficient organization, and we follow the guide- lines set forth by the law," said Michael Cleary, assistant to the special agent in charge of the Secret Service in Chicago, which has jurisdiction in the case. "If we have a signed, sworn affidavit, and a search warrant, we execute that warrant." Cleary wouldn't say why the search warrant used against Steve Jackson was not signed. A request by Jackson's attorney for more information went unanswered. Beckman said a raid conducted without a signed warrant would violate Fourth Amendment protection against unwarranted search and seizure. Mike Hurst, a Steve Jackson Games editor who lost his job to the raid on the company, offered bitter advice: "The Secret Ser- vice ought to make some attempt to find out if there's actually a case involved before they begin searches and confiscations of property." In one incident, the government did file a case, only to aban- don it when it fell apart in court. The defendant, Craig Neidorf, is going back to college at the University of Missouri this fall, but his reputation is stained, he's having to repeat his senior year, and he's $100,000 in debt. An intrusion into the computers of Bell South by a Legion member in 1988 set off much of the activity in Operation Sun De- vil, including the case against Neidorf. While in Bell South's computer, Legion member Robert Riggs found and copied a document describing administrative aspects of the emergency 911 system. Riggs and associates Franklin E. Darden Jr. and E. Grant, all three of whom are from Georgia, recently pleaded guilty to federal conspiracy charges and await sentencing. Darden and Riggs face up to 5 years in prison and a $250,000 fine. Grant faces up to 10 years in prison and a $250,000 fine. Neidorf, publisher of Phrack, a newsletter for hackers, was accused of theft for republishing the 911 document stolen by Riggs. Prosecutors stopped the trial after the document was shown to be freely available. His case received widespread coverage because it raised is- sues of free speech. Phrack was published electronically via computer networks instead of on paper, and thus did not immedi- ately receive the First Amendment protection that virtually would have been assured a paper document, according to Sheldon Zenner, Neidorf's attorney. "Going through this last seven months is not something I would wish on my worst enemy," said Neidorf, 20, who faced 31 years in prison. "It devastated my parents. My grandparents, they didn't take it well. They're in their 80s. "I kind of broke down myself at one point. I don't like to talk about it exactly." Leonard Rose, a computer consultant in Baltimore, let the Legion forward network mail through his computer, an everyday ar- rangement on the sprawling Internet research and education net- work. But because the name of his computer appeared in the group's electronic address, he was portrayed by the government as the mastermind of the group. "I've lost everything because of it," he said. Business con- tracts worth $100,000 a year, $70,000 worth of computer equipment used in his business, his top secret clearance, his wife's dream home, their credit rating, cars, are gone. The Roses now live with their two young children in an apartment furnished with two mattresses and a TV. "I used to look at people in the street and I couldn't under- stand how they could get there," Rose said. "I couldn't under- stand how you could sink that low, but now I understand. I under- stand a lot more now." He was never charged as part of the Legion of Doom investiga- tion, but during that probe he was found to have received an il- licit copy of a computer program that must be licensed from AT&T. "What Len Rose is accused of turns software piracy into a felo- ny," said John Perry Barlow, a co-founder of the Frontier Foun- dation. "If the government is prepared to go out and turn every- body who has engaged in software piracy into a felon, it'll make the war on drugs look like a minor undertaking." Detractors say that the investigative techniques used in Operation Sun Devil are at best rude, at worst illegal. Authori- ties respond that they are adjusting to a new world. Most concerns center on bulletin board systems, a frequent point of access into the nation's computer network byways. Locals call the BBS, which then moves private electronic mail and pub- lic messages into the public networks, which as a whole are re- ferred to as Internet or simply the matrix. "The government is seizing electronic mail like crazy, in the sense that it's seizing BBS's and all their contents," Barlow said. "It's the equivalent of seizing post offices and all their contents." The privacy of electronic mail is protected under the Computer Fraud and Abuse Act of 1986, which is also the law setting forth most of the conditions under which computer hacking can be con- sidered a crime. "We've seized lots of BBS's," acknowledged Thackeray of the Arizona attorney general's office, although search warrants were obtained only for the owner of each computer, not for each person with electronic mail stored on that computer. Benjamin Wright, a Dallas attorney who writes and lectures frequently on electronic data interchange, said that surveillance of electronic mail poses serious questions even when conducted properly under the supervision of a court. "A huge amount of information could build up, so there could be a great mass of information laying at the government's feet," he said. "To tap into all the phone lines of a corporation would be a lot of work, but if there's this database building up of a large part of a company's business, then there's a reason for being a little bit concerned. "This applies to private people as much as it applies to cor- porations." Authorities see the BBS seizures as preventive medicine. "The only thing I have ever found that has an effect on these kids is to take their computer away," Thackeray said. "It final- ly sinks in, 'I'm really not going to get this back.' " But Barlow criticizes that approach. "Essentially what they have done is to fine (the suspect), without conviction, for the entire value of his property," he said. "They're not making arrests. This is turning the whole search and seizure into the punishment." ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ The preceding appeared Sunday, 9/2/90, on the front page of the Houston Chronicle. Please send comments to: edtjda@chron.com ANOTHER ARTICLE ON THE INTERNET BY JOE ABERNATHY IS LOCATED IN THE MAIN TELECOM-ARCHIVES DIRECTORY UNDER THE TITLE 'ABERNATHY.INTERNET.STORY' [TELECOM Digest Editor's Note: I wonder what the past fifteen years has done for Craig, Len Rose and those other guys. And also of interest to me would be what the past fifteen years has done to the several individuals who were responsible for this misguided attack on computer 'hackers'. PAT] ------------------------------ From: Joseph <JoeOfSeattle@yahoo.com> Subject: Re: Nextel False Advertising Date: Mon, 01 Aug 2005 10:18:56 -0700 Reply-To: JoeOfSeattle@yahoo.com On Sat, 30 Jul 2005 20:37:41 -0700, Telecom digest editor wrote: > but now these guys are stuck with a couple phones that are useless, > and a contract to boot. Did you even check this out? To my knowledge if you sign up with a carrier and move to an area that they do not serve they usually will let you out of a contract. They may need some proof such as a utility bill, but more than likely they would be let out of any contractual obligation. If no one checked that out that's yet another error that they've made. > When newer technologies are sort > of a mystery even to relatively experienced users, how is it that kids > in their early/mid twenties getting a 'cellular phone' for the first > time in their lives are expected to know anything? <sigh> No one needs to play the "victim" in this day and age. You do some not so hard research on the net and you find an answer! Just typing "cellular phone basics" into Google brings up over 800,000 hits! Going to google and asking the question "cellular service independence missouri" brings up several results including a Google page showing all registered cellular towers around Independence. It also shows you which services are available. [TELECOM Digest Editor's Note: You are wrong! I am no where close to Independence, MO; I am in Independence, KS, about 300 miles southwest and I know what cell towers we have around here. Independence, MO is a suburb of Kansas City, MO, which is nowhere near me. But I will explain to Justin how to use Google and look for the information he will need if he wishes to cancel his contract. He will be returning back home to Orlando, FL in about a week. PAT] ------------------------------ From: Wesrock@aol.com Date: Fri, 5 Aug 2005 19:42:04 EDT Subject: Re: Analysts: ATMs Highly Vulnerable to Fraud In a message dated Wed, 3 Aug 2005 22:36:32 -0400 Monty Solomon <monty@roscom.com> writes: > By BRIAN BERGSTEIN AP Technology Writer > BOSTON (AP) -- By failing to scan security codes in the magnetic > strips on ATM and debit cards, many banks are letting thieves get away > with an increasingly common fraud at a cost of several billion dollars > a year. > Surprisingly, Litan said, perhaps half of U.S. financial institutions > have not programmed their ATM systems to check the security codes. > Con artists specifically seek out customers of banks that do not > validate the second track on the strip, she said. A very large number of ATM's are owned by ATM companies, not banks, who provide ATMs in many convenience stores, stadiums race tracks and arenas, shopping malls and casinos. To blame the banks for what these companies do is disingenuous. Wes Leatherock wesrock@aol.com ------------------------------ From: Damon Brownd <dbxyzzy@att.net> Subject: Re: Credit Reports, was Re: AT&T Customers Taken Over By Alltel Organization: AT&T Worldnet Date: Sat, 06 Aug 2005 01:23:41 GMT Steve Sobol <sjsobol@JustThe.net> wrote in message news:telecom24.355.17@telecom-digest.org: > Maybe you got special consideration as a soldier. Perhaps enlisted men > and women got a special deal because it wouldn't be easy for them to > deal with credit issues overseas ... But as far as I know, the rest of > us were not entitled to any free reports unless we were denied credit > or employment (as I posted earlier) or if there was a state law > specifying we were not to be charged. There have been some state laws > on the books prior to this past year. See https://www.annualcreditreport.com. ------------------------------ Date: Fri, 05 Aug 2005 20:54:46 -0500 From: Neal McLain <nmclain@annsgarden.com> Subject: Re: Today's Long Distance Circuits? hancock4@bbs.cpcn.com wrote: > By how, I mean what physical medium is chosen and how is it > routed. Do they use satellite, microwave, fibre optic, coax, > plain wire? Whereupon Justa Lurker <JustaLurker@att.net> responded: > Depends on your choice of designated long distance carrier, and > the extent to which it owns and operates its own facilities vs. > buying capacity 'wholesale' from one of the big guys or perhaps > a "carrier's carrier" (Wiltel comes to mind here). Or even a "carrier's carrier's carrier." Back in the 1980s, Wiltel provided capacity to Norlight, which in turn provided capacity to IXCs. At the time, Norlight was owned by a consortium of Minnesota- and Wisconsin-based electric utility companies. Most of the network was constructed using grounded Optical Ground Wire (OPGW) installed at the top of the electric transmission lines owned by the member utility companies. OPGW is a metallic (usually aluminum-clad steel) conductor with optical fibers buried inside; it is installed at the top of a transmission line in place of a static wire, where it serves the same purpose as the static wire -- protecting lower conductors from lightning. http://www.phillipsfitel.com/english/48specs.html Norlight faced a problem when it tried to extend its network to Chicago: Commonwealth Edison Company. ComEd was not a member of the consortium that owned Norlight, so it had no financial interest in Norlight's success. ComEd's price for letting Norlight use its transmission lines was higher than Norlight was willing to pay. So Norlight turned to Wiltel instead. Wiltel (then a subsidiary of Williams Pipeline, a gas and petroleum transmission company) installs fiber optic cables in abandoned pipelines. Norlight contracted with Wiltel for dark fiber between Maple Park IL and Chicago, bypassing most of ComEd's transmission lines. Thus, Wiltel became a "carrier's carrier's carrier" (and AFAIK, it still is, although since I've retired I've lost contact with the folks I used to deal with). Neal McLain ------------------------------ TELECOM Digest is an electronic journal devoted mostly but not exclusively to telecommunications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of networks such as Compuserve and America On Line, Yahoo Groups, and other forums. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. Contact information: Patrick Townson/TELECOM Digest Post Office Box 50 Independence, KS 67301 Phone: 620-402-0134 Fax 1: 775-255-9970 Fax 2: 530-309-7234 Fax 3: 208-692-5145 Email: editor@telecom-digest.org Subscribe: telecom-subscribe@telecom-digest.org Unsubscribe:telecom-unsubscribe@telecom-digest.org This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/ (or use our mirror site: ftp.epix.net/pub/telecom-archives) RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308 and also http://feeds.feedburner.com/TelecomDigest ************************************************************************* * TELECOM Digest is partially funded by a grant from * * Judith Oppenheimer, President of ICB Inc. and purveyor of accurate * * 800 & Dot Com News, Intelligence, Analysis, and Consulting. * * http://ICBTollFree.com, http://1800TheExpert.com * * Views expressed herein should not be construed as representing * * views of Judith Oppenheimer or ICB Inc. * ************************************************************************* ICB Toll Free News. Contact information is not sold, rented or leased. One click a day feeds a person a meal. Go to http://www.thehungersite.com Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO YOUR CREDIT CARD! REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST AND EASY411.COM SIGN UP AT http://www.easy411.com/telecomdigest ! ************************ Visit http://www.mstm.okstate.edu and take the next step in your career with a Master of Science in Telecommunications Management (MSTM) degree from Oklahoma State University (OSU). This 35 credit-hour interdisciplinary program is designed to give you the skills necessary to manage telecommunications networks, including data, video, and voice networks. The MSTM degree draws on the expertise of the OSU's College of Business Administration; the College of Arts and Sciences; and the College of Engineering, Architecture and Technology. The program has state-of-the-art lab facilities on the Stillwater and Tulsa campus offering hands-on learning to enhance the program curriculum. Classes are available in Stillwater, Tulsa, or through distance learning. Please contact Jay Boyington for additional information at 405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at http://www.mstm.okstate.edu ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of TELECOM Digest V24 #356 ****************************** | |