tag:blogger.com,1999:blog-19854860860959457402024-03-14T07:54:06.414-07:00Telecom Fraud and TechnologiesWith Telecom Fraud costing more than $40 billion annually, I will try to comment on the new trends while offering tips and suggestions on how you can avoid adding to the total fraud loss.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comBlogger70125tag:blogger.com,1999:blog-1985486086095945740.post-89953966488258556992015-11-09T01:38:00.000-08:002015-11-09T01:38:40.304-08:00Happy 101st Birthday to Hedy Lamar<div class="separator" style="clear: both; text-align: left;">
<span style="background-color: white; color: #141823; font-family: helvetica, arial, sans-serif; font-size: 14px; line-height: 19.32px;">The woman who proved that you can really have it all:</span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://upload.wikimedia.org/wikipedia/commons/thumb/f/f0/Hedy_Lamarr_in_a_1940_MGM_publicity_still.jpg/220px-Hedy_Lamarr_in_a_1940_MGM_publicity_still.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://upload.wikimedia.org/wikipedia/commons/thumb/f/f0/Hedy_Lamarr_in_a_1940_MGM_publicity_still.jpg/220px-Hedy_Lamarr_in_a_1940_MGM_publicity_still.jpg" /></a></div>
<div style="background-color: white; color: #141823; font-family: helvetica, arial, sans-serif; font-size: 14px; line-height: 19.32px; margin-bottom: 6px;">
<br /></div>
<div style="background-color: white; color: #141823; font-family: helvetica, arial, sans-serif; font-size: 14px; line-height: 19.32px; margin-bottom: 6px;">
<br />- Beauty (she was called the "most beautiful woman in Europe")<br />- Movie Career with a Star on the Hollywood walk of fame<br />- Developed an improved traffic stoplight<br />- Patents for spread spectrum and frequency hopping technology to thwart the Nazis that make our modern communications possible <a href="https://www.google.com/patents/US2292387">U.S. Patent 2,292,387</a> (but the US Navy did not use it until the patent had expired).</div>
<div class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: helvetica, arial, sans-serif; font-size: 14px; line-height: 19.32px;">
<div style="margin-bottom: 6px;">
and she is today's Google Doodle</div>
<div class="separator" style="clear: both; text-align: center;">
<iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/Z0gu2QhV1dc/0.jpg" src="https://www.youtube.com/embed/Z0gu2QhV1dc?feature=player_embedded" frameborder="0" allowfullscreen></iframe></div>
<div style="margin-bottom: 6px;">
<br /></div>
</div>
Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-5263670075147070852015-02-22T01:19:00.000-08:002015-02-22T01:19:50.296-08:00Android malware can make calls even after switching your phone offA recent warning has come out from AVG has come out that some 3rd party App stores have Apps which bring in a Android Trojan which pretends to shut off your phone when you press the power button.<br />
<br />
The Hacker News has a nice article about it <a href="http://thehackernews.com/2015/02/poweroffhijack-android-malware.html">Android Malware Can Spy On You Even When Your Mobile Is Off</a> or you can read the original AVG post <a href="http://now.avg.com/malware-is-still-spying-on-you-after-your-mobile-is-off/">Malware Is Still Spying On You Even When Your Mobile Is Off</a><br />
As the AVG blog explains:<br />
<blockquote class="tr_bq">
The malware affects versions of Android older than v.5 (Lollipop) and requires root permission to hijack the shut down process.<br />After pressing the power button, the phone displays an authentic shutdown animation, and the phone appears off. Although the screen is black, it is still on.<br />While the phone is in this state, the malware can make outgoing calls, take pictures and perform many other tasks without notifying you.</blockquote>
But beyond the obvious problems with a malware spying on you, recording you, and sending your data to Chinese servers, it can be making Premium Rate SMS or calls without your knowing it.<br />
<br />
The Hacker news article points this out:<br />
<blockquote class="tr_bq">
PowerOffHijack malware has ability to silently send lots of premium-rate text messages, make calls to expensive overseas numbers, take photos and perform many other tasks even if the phone is supposedly switched off.</blockquote>
The article also has good options for removing PowerOffHijack and preventing it from getting on your phoneEric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-62140251136043573852014-07-13T05:51:00.000-07:002014-07-13T05:51:29.817-07:00Preparing for Astricon 2014I will be heading out to Vegas to talk security in October<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidQJr5a4PxoufZ05GE0G4mkB3JVLfEfl4f3wKp4jaMJw-ePXNppFjTqglUGdcGxHQ_54qcRwBi7izS_NSoQjxawKPdbIfRh34wYUOCutFRiQ_rVw5R_dbzRB3aKmh2CXWBzXlrHB7DMxs/s1600/astricon-2014-speaking.jpg" height="320" width="280" /></div>
<br />
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<span lang="EN-US">I have been allocated the following date and time for my talk (but would advise that this <b>may</b> be subject to change):</span></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<br /></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<span lang="EN-US">Date: Thursday, October 23<sup>rd</sup></span></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<span lang="EN-US">Time: <span class="aBn" data-term="goog_532950447" style="border-bottom-color: rgb(204, 204, 204); border-bottom-style: dashed; border-bottom-width: 1px; position: relative; top: -2px; z-index: 0;" tabindex="0"><span class="aQJ" style="position: relative; top: 2px; z-index: -1;">10.00-10.35am</span></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<span lang="EN-US">Track: Security</span></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<span lang="EN-US">Title: Making your Asterisk system secure</span></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
<span lang="EN-US"><span id="goog_1803687952"></span><span id="goog_1803687953"></span><br /></span></div>
<div class="MsoNormal" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.800000190734863px;">
Have you signed up <a href="http://www.asterisk.org/community/astricon-user-conference">Astricon </a>yet? </div>
Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-58749615603775922072014-07-09T04:37:00.000-07:002014-07-09T04:47:12.834-07:00Celebrating 137 years of public telephoneToday is the birthday of good old Ma Bell:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://upload.wikimedia.org/wikipedia/commons/thumb/5/50/Bell_System_hires_1889_logo.PNG/220px-Bell_System_hires_1889_logo.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://upload.wikimedia.org/wikipedia/commons/thumb/5/50/Bell_System_hires_1889_logo.PNG/220px-Bell_System_hires_1889_logo.PNG" /></a></div>
<br />
<br />
The Bell Telephone Company, a common law joint stock company, was organized in Boston, Massachusetts on July 9, 1877, by Alexander Graham Bell's father-in-law Gardiner Greene Hubbard, who also helped organize a sister company — the New England Telephone and Telegraph Company. (Source <a href="http://en.wikipedia.org/wiki/Bell_Telephone_Company">Wikipedia</a>)<br />
<br />
It constantly amazes me that we have come so far from Bell's original design to HD voice, fiber to the home, the internet, mobile phones, smart phones, and VoIP.<br />
<br />
In so little time we have gone well beyond anything that could be imagined by the science fiction authors, some of whom influenced the current tech trend.<br />
<br />
To please take a min. to think of good ol'Ma Bell and all her children (legitimate or otherwise) that bring you this post today.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-78758457671961015052014-06-16T05:13:00.000-07:002014-06-16T05:13:10.454-07:00Is a Smart House a Smart choice?<span style="font-family: Arial, Helvetica, sans-serif;">Over the past several weeks there have been numerous announcements about smart houses and smart homes.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">There was a nice summary about how <a href="http://www.techtimes.com/articles/8003/20140608/the-smart-home-is-the-next-battleground-what-to-expect-from-the-top-3-tech-giants.htm" style="font-size: 12pt;" target="_blank" title="The smart home is the next battleground: What to expect from the top 3 tech companies?">The
smart home is the next battleground: What to expect from the top 3 tech
companies?</a> In this article TechTimes explains how </span><br />
<blockquote class="tr_bq">
<span style="font-family: Arial, Helvetica, sans-serif;">Google, Microsoft, and Apple getting involved in home automation, it is clear that this will be the next battleground, and at the moment no one truly has the upper hand.</span></blockquote>
<span style="font-size: 11pt;"><span style="font-family: Arial, Helvetica, sans-serif;">But there are more players looking to get into this market.</span></span><br />
<br />
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 11pt;"> </span><span style="font-size: 12.0pt;"><a href="http://gigaom.com/2014/05/30/deutsche-telekom-seeks-u-s-partners-for-its-qivicon-smart-home-play/">Deutsche Telekom seeks U.S. partners for its Qivicon
smart home play</a></span></span></li>
<li><span style="font-size: 11pt;"><a href="http://www.zdnet.com/splunk-can-it-be-a-back-end-smart-home-play-7000030030/"><span style="font-family: Arial, Helvetica, sans-serif;">Splunk: Can it be a back-end smart home play?</span></a></span></li>
</ul>
<br />
<div class="MsoNormal">
<span style="font-size: 12.0pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><o:p></o:p></span></span></div>
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 11pt;">There are even do it yourself (DIY) options with articles explaining </span><span style="background: white; font-size: 12.0pt; mso-bidi-font-family: Arial;"><a href="http://www.zawya.com/story/It_is_cheap_and_easy_to_turn_your_home_into_a_smart_house-ZAWYA20140530044922/">It is
cheap and easy to turn your home into a smart house</a>.</span></span><br />
<div class="MsoNormal">
<span style="background: white; color: #222222; font-size: 12.0pt; mso-bidi-font-family: Arial;"><span style="font-family: Arial, Helvetica, sans-serif;"><o:p></o:p></span></span></div>
<span style="font-size: 11pt;"><span style="font-family: Arial, Helvetica, sans-serif;"> </span></span><div class="MsoNormal">
<span style="background: white; font-size: 12.0pt; mso-bidi-font-family: Arial;"><a href="http://www.techtimes.com/articles/8003/20140608/the-smart-home-is-the-next-battleground-what-to-expect-from-the-top-3-tech-giants.htm" target="_blank" title="The smart home is the next battleground: What to expect from the top 3 tech companies?"><span style="font-family: Arial, Helvetica, sans-serif;"><o:p></o:p></span></a></span></div>
<div>
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 11pt;">As with any new connected </span><span style="font-size: 15px;">technology</span><span style="font-size: 11pt;"> there are reasons to be concerned. For example here is a slide show of </span><span style="background: white; font-size: 12.0pt; mso-bidi-font-family: Arial;"><a href="http://www.marketwatch.com/story/4-smart-home-gadgets-you-dont-want-hacked-2014-05-29">4 ‘smart
home’ gadgets you don’t want hacked</a> and there are </span><span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt;"><a href="https://finance.yahoo.com/blogs/daily-ticker/3-problems-with-%E2%80%9Csmart-homes%E2%80%9D-180852839.html" style="font-size: 11pt;">3 big
risks with 'smart homes'</a>.</span></span></div>
<div class="MsoNormal">
<span style="background: white; color: #222222; font-size: 12.0pt; mso-bidi-font-family: Arial;"><span style="font-family: Arial, Helvetica, sans-serif;"> <o:p></o:p></span></span></div>
<div>
<span style="font-size: 11pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div>
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="font-size: 11pt;">But for me the biggest concern is stories like how </span><span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt;"><a href="http://www.washingtonpost.com/news/morning-mix/wp/2014/05/28/australian-apple-devices-hijacked-and-held-for-ransom/" style="font-size: 11pt;">Australian
Apple devices hijacked and held for ransom</a>. </span></span></div>
<div>
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div>
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt;"><span style="font-family: Arial, Helvetica, sans-serif;">Now consider that someone could hack your home, change (or deactivate) your alarm, change the access code, play with your heat, etc. </span></span></div>
<div>
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div>
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt;"><span style="font-family: Arial, Helvetica, sans-serif;">It reminds me of some of the tricks played by a computer in Robert Heinlein's The Moon is a Harsh Mistress:</span></span></div>
<blockquote class="tr_bq">
<span style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial;"><blockquote class="tr_bq">
<span style="font-family: Arial, Helvetica, sans-serif;">Mike had thought up a dandy; his "illness" was wild oscillations in conditioning Warden's residence. He was running its heat up, then down, on an eleven-minute cycle, while oscillating its air pressure on a short cycle, ca. 2c/s, enough to make a man dreadfully nervy and perhaps cause earache.</span></blockquote>
</span></blockquote>
<span style="font-family: Arial, Helvetica, sans-serif;">Do you want someone to have that kind of control over your home? I don't.</span>Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-31793290867725008062014-05-19T01:13:00.003-07:002014-05-19T01:18:03.242-07:00As always, Scott Adams gets it right<br />
<div class="separator" style="clear: both; text-align: center;">
And this is why we can not kill spam, phishing, and fraud</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.dilbert.com/dyn/str_strip/000000000/00000000/0000000/200000/20000/1000/600/221657/221657.strip.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www.dilbert.com/dyn/str_strip/000000000/00000000/0000000/200000/20000/1000/600/221657/221657.strip.gif" height="123" width="400" /></a></div>
<div style="text-align: center;">
For every 99 people with a clue there is one that falls for it.</div>
Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-90381784861038595252014-04-08T03:05:00.001-07:002014-04-08T03:05:26.834-07:00Move to end Bill Shock: Telecoms Slash Data Roaming<div class="3DMsoNormal">
(Cross posted between my <a href="https://www.blogger.com/3D" http:="" travel-grainofsalt.blogspot.com="">travel</a> and <a href="https://www.blogger.com/3D" http:="" telecom-fraud.blogspot.com="">telecom</a> blogs)</div>
<div class="3DMsoNormal">
<br /></div>
<div class="3DMsoNormal">
Over the past 18 months or so the telecom industry has been
slowly going through a subtle change that affects travelers.</div>
<div class="3DMsoNormal">
<br /></div>
<div class="3DMsoNormal">
Back in December 2012 <a href="https://www.blogger.com/3D" http:="" id="3D3865" releases_detail.asp="" www.telecom-media.co.nz="">Telecom [New
Zealand] announced</a> a breakthrough new approach to international data roaming
that will slash costs for <span class="3DSpellE">travellers</span> when using their
smartphones and other mobile devices overseas. </div>
<div class="3DMsoNormal" margin-left:.5in="">
A feature is a flat daily rate for
data roaming by postpaid customers across major travel markets. Australia
roaming will start at a specially reduced rate of $6 a day (Telecom will review
the rate in <span class="3DSpellE">mid 2013</span>). Customers will pay just $10 a
day flat rate for data while travelling in the UK, USA, Canada, China, Hong
Kong, Macau, Taiwan, and Saudi Arabia. Telecom’s fair use policy applies to
these rates.</div>
<div class="3DMsoNormal" margin-left:.5in="">
<br /></div>
<div class="3DMsoNormal" margin-left:.5in="">
Telecom’s CEO, Simon <span class="3DSpellE">Moutter</span>, said the flat rate would make it much simpler for
customers to understand data roaming costs and would give them the freedom to
make use of their smartphones in the same way they would at home.</div>
<div class="3DMsoNormal" margin-left:.5in="">
<br /></div>
<div class="3DMsoNormal" margin-left:.5in="">
“We know data roaming charges have
been a pain-point for customers – personally, it was a real bugbear of mine as
a customer before I joined Telecom earlier this year. A flat fee provides
certainty and puts an end to concerns about nasty bill shocks on your return
home.</div>
<div class="3DMsoNormal" margin-left:.5in="">
<br /></div>
<div class="3DMsoNormal" margin-left:.5in="">
“It’s also much simpler to follow
than any usage-based system – as most customers don’t really know how quickly
their phone apps will chew through 1MB, 10MB or 100MB.”</div>
<div class="3DMsoNormal">
<span mso-tab-count:1=""> </span></div>
<div class="3DMsoNormal">
Now other companies have started to follow suit:</div>
<div class="3DMsoNormal" margin-left:.5in="">
On October 20, 2013 “T-Mobile changed
the way you can use your smartphone in more than 100 foreign countries” with
their <a href="https://www.blogger.com/3D" http:="" marcwebertobias="" sites="" why-t-mobile="s-new-global-roaming-plan-is-an-industry-game-changer/" www.forbes.com="">T-Mobile's
New Global Roaming</a>. While T-Mobile’s <a href="https://www.blogger.com/3D" http:="" multimediacapsule.thomsonone.com="" s-un-c="arrier-3-event" t-mobile="" t-mobileusa="">Simple
Choice</a> plan allows certain customers to roam in about 116 countries as if
they were at home.</div>
<div class="3DMsoNormal" margin-left:.5in="">
In March 2014 T-Mobile added <a briefly-the-7-countries-being-added-="to-simple-choice-global-international-roaming-list/" href="https://www.blogger.com/3D" http:="" www.tmonews.com="">7
countries to Simple Choice Global International roaming list</a> so it is now
122 countries.</div>
<div class="3DMsoNormal" margin-left:.5in="">
<br /></div>
<div class="3DMsoNormal" margin-left:.5in="">
<a href="https://www.blogger.com/3D" http:="" pebble.asp="" relid="3D8131" www.gadget.co.za="">MTN cuts cost of roaming
across own 'footprint'</a> MTN has introduced its Roam like Home service that
enables all its customers to keep in touch with family and friends at
affordable rates while travelling in any of the 21 countries that it operates in.</div>
<div class="3DMsoNormal" margin-left:.5in="">
<br /></div>
<div class="3DMsoNormal" margin-left:.5in="">
Now the <a content="" eu-parliament-votes-abolish-roam="ing" href="https://www.blogger.com/3D" http:="" www.telecomasia.net="">EU
parliament votes to abolish roaming</a> end to mobile roaming charges across
the EU by 2016, if it is approved by all the member countries.</div>
<div class="3DMsoNormal" margin-left:.5in="">
<br /></div>
<div class="3DMsoNormal">
So, now with only a few SIM cards you can now have unlimited
calling and flat rate data in 145 countries:<br />
<br /></div>
<table 837px="" border=""0"" cellpadding=""0"" cellspacing=""0"" collapse="" fixed="" quot="" table-layout:="" width:="">
<colgroup><col 184pt="" 8960="" mso-width-source:="" quot="" userset="" width:="" width=""245""></col>
<col 3949="" 81pt="" mso-width-source:="" quot="" userset="" width:="" width=""108""></col>
<col 162pt="" 7899="" mso-width-source:="" quot="" userset="" width:="" width=""216""></col>
<col 128pt="" 6253="" mso-width-source:="" quot="" userset="" width:="" width=""171""></col>
<col 3547="" 73pt="" mso-width-source:="" quot="" userset="" width:="" width=""97""></col>
</colgroup><tbody>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" 184pt="" class=""xl65"" height=""20"" quot="" width:="" width=""245""><b>Country</b></td>
<td 81pt="" class=""xl66"" quot="" width=""108""><b>Telecom NZ SIM</b></td>
<td 162pt="" class=""xl66"" quot="" width=""216""><b>T-Mobile USA Simple Choice SIM</b></td>
<td 128pt="" class=""xl66"" quot="" width=""171""><b>Any MTN SIM</b></td>
<td 73pt="" class=""xl67"" quot="" width=""97""><b>Any EU Carrier</b></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Afghanistan</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70"">as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Aland Islands</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Anguilla</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Antigua and Barbuda</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Argentina</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Armenia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Aruba</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Australia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Austria</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Bahrain</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Barbados</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Belgium</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Benin</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Bermuda</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Bolivia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Bonaire</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Botswana</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Botswana Mascom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Brazil</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">British Virgin Islands</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Bulgaria</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Cambodia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Cameroon</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Cameroon</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Canada</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Canary Islands</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Cayman Islands</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Chile</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">China</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Christmas Island</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Colombia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Costa Rica</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Cote d'Ivoire</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Cote d'Ivoire</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Croatia</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Curacao (Netherlands/Dutch
Antilles)</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Cyprus</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Cyprus</td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Czech Republic</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Denmark</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Dominica</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Dominican Republic</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Easter Island</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Ecuador</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Egypt</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">El Salvador</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Estonia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Faeroe Islands</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Finland</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">France</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">French Guiana</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Germany</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Ghana</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom, MTN Ghana</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Greece</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Grenada</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Guadeloupe</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Guam</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Guatemala</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Guinea Bissau</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Guyana</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Honduras</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Hong Kong</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Hungary</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71"">in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Iceland</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">India</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Indonesia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Iran</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Irancell</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Iraq</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Ireland</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Israel</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Italy</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Jamaica</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Japan</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Kenya</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Kuwait</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Latvia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Liberia</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Lonestar Cell</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Lithuania</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Luxembourg</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71"">in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Macau</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl72""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Malaysia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Malta</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Martinique</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Mexico</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Moldova</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Montserrat</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Netherlands</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Netherlands Antilles</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">New Zealand</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Nicaragua</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Nigeria</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Nigeria</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">North America & Caribbean</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Northern Ireland</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Norway</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Pakistan</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Panama</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Peru</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Philippines</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Poland</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Portugal</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Qatar</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Republic of Congo</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Congo SA</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Republic of Guinea</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Romania</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Russia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Rwanda</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Rwanda</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">San Marino</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Saudi Arabia</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Scotland</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Singapore</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Sint Maarten</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Slovakia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Slovenia</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">South Africa</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN South Africa</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">South Korea</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">South Sudan</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Spain</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Sri Lanka</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">St. Barthelemy</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">St. Kitts and Nevis</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">St. Lucia</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">St. Martin</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">St. Vincent and the Grenadines</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Sudan</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Suriname</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Svalbard</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Swaziland</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Swaziland</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Sweden</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Switzerland</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Syria</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Taiwan</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Thailand</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Trinidad and Tobago</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Turkey</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Turkmenistan (No Data network)</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Turks and Caicos Islands</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Uganda</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""><span quot="" yes=""> </span>as MTN Uganda</td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">UK</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl73""></td>
<td class=""xl71""> in 2016</td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Ukraine</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">United Arab Emirates</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Uruguay</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">USA</td>
<td class=""xl70"">Telecom NZ</td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Vatican City</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Venezuela</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Vietnam</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Wales</td>
<td class=""xl70""></td>
<td class=""xl70"">T-Mobile</td>
<td class=""xl70""></td>
<td class=""xl71""></td>
</tr>
<tr 15.0pt="" height=""20"" quot="">
<td 15.0pt="" class=""xl68"" height=""20"" quot="">Yemen</td>
<td class=""xl70""></td>
<td class=""xl70""></td>
<td class=""xl70""><span quot="" yes=""> </span>as Investcom</td>
<td class=""xl71""></td>
</tr>
<tr 15.75pt="" height=""21"" quot="">
<td 15.75pt="" class=""xl74"" height=""21"" quot="">Zambia</td>
<td class=""xl75""></td>
<td class=""xl75"">T-Mobile</td>
<td class=""xl75""><span quot="" yes=""> </span>as MTN Zambia</td>
<td class=""xl76""></td>
</tr>
</tbody></table>
Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-19414125652298398062014-02-12T05:25:00.002-08:002014-02-12T05:25:49.978-08:00Replacing Flappybird with Premium Number FruadMuch to the dismay of millions of players, the creator of the Flappybird mobile game took it down from <a href="https://play.google.com/store">Google Play</a> and <a href="https://www.apple.com/itunes/">Apple iTunes</a> app stores.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www1.pcmag.com/media/images/416710-7-tips-for-high-scores-on-flappy-bird.jpg?thumb=y" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www1.pcmag.com/media/images/416710-7-tips-for-high-scores-on-flappy-bird.jpg?thumb=y" height="180" width="320" /></a></div>
<br />
Now there has been many speculations as to why someone would take down a game that was earning him $50,000 a day in advertising revenue. The various reasons have been stated as:<br />
<br />
<ul>
<li><a href="http://www.uproxx.com/gammasquad/2014/02/flappy-bird-removed-creator-stress-pressure-forever/">Too Stressful</a></li>
<li><a href="http://www.ibtimes.com/flappy-bird-game-deleted-over-nintendo-copyright-creator-receiving-death-threats-1554401">Threatened legal action by Nintendo</a> (<a href="http://www.gamespot.com/articles/flappy-bird-removal-wasn-t-nintendo-s-doing/1100-6417644/">which they deny</a>)</li>
<li><a href="http://www.latimes.com/business/technology/la-fi-tn-flappy-bird-developer-addictive-20140211,0,7518016.story">It was too addictive</a></li>
</ul>
<br />
But regardless of what the real reason is people have come in to fill your Flappybird addiction with <a href="http://www.theguardian.com/technology/2014/feb/12/flappy-bird-online-app-smartphone">replacements</a> or by <a href="http://www.theguardian.com/technology/2014/feb/10/phones-flappy-bird-ebay-app-store">selling phones with it installed on e-bay</a> (<a href="http://news.cnet.com/8301-17938_105-57618745-1/you-cant-actually-sell-your-flappy-bird-phone-on-ebay/">which you can not do anymore</a>).<br />
<br />
But you should be wary of FlappyBird replacements -<a href="http://blog.trendmicro.com/trendlabs-security-intelligence/trojanized-flappy-bird-comes-on-the-heels-of-takedown-by-app-creator">According to a report by Trend Microsystems</a><br />
<blockquote class="tr_bq">
All of the fake versions we’ve seen so far are Premium Service Abusers — apps that send messages to premium numbers, thus causing unwanted charges to victims’ phone billing statements.</blockquote>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/02/140212comment03.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://blog.trendmicro.com/trendlabs-security-intelligence/files/2014/02/140212comment03.jpg" height="112" width="320" /></a></div>
<br />
<br />
As the <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/trojanized-flappy-bird-comes-on-the-heels-of-takedown-by-app-creator/">TrendMicro article</a> advises:<br />
<blockquote class="tr_bq">
<span style="font-family: inherit;"><span style="color: #333333;"><span style="line-height: 17px;">We advise Android users (especially those who are keen to download the now “extinct” Flappy Bird app) to be careful when installing apps. Cybercriminals are constantly cashing in on popular games (like <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/dubious-developers-cash-in-on-candy-crush/">Candy Crush</a>, <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/rogue-instagram-and-angry-birds-space-for-android-spotted/">Angry Birds Space</a>, <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/fake-versions-of-temple-run-2-sprint-their-way-to-users/">Temple Run 2</a>; <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/malicious-developers-released-rogue-bad-piggies-versions/">Bad Piggies</a>) to unleash mobile threats. Our past entry, <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/checking-the-legitimacy-of-android-apps/">Checking the Legitimacy of Android Apps</a>, enumerates some tips on how to do avoid suspicious or malicious apps. Users may also opt to install a security app (such as Trend Micro Mobile Security) to be able to check apps even before installation. </span></span><span style="background-color: white; color: #404040; font-size: 13px; line-height: 1.4;"> </span></span></blockquote>
<span style="font-family: inherit;">Always remember in cases like this </span><a href="http://en.wikipedia.org/wiki/There_ain't_no_such_thing_as_a_free_lunch" style="font-family: inherit;">TANSTAAFL</a> so be careful there are those who are out there to take advantage of you.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-51026581529484433042013-11-21T06:34:00.000-08:002013-11-21T06:34:11.028-08:00Astricon 2013 Security Master Class Videos<span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12.727272033691406px; line-height: 17.99715805053711px;">All of the Official Videos from Astricon 2013 Security Master Class have been posted</span><br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12.727272033691406px; line-height: 17.99715805053711px;" /><br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12.727272033691406px; line-height: 17.99715805053711px;" /><a href="http://www.youtube.com/playlist?list=PLighc-2vlRgT3DhE9DkIgSmpUX6v2AtYo" rel="nofollow nofollow" style="background-color: white; color: #3b5998; cursor: pointer; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12.727272033691406px; line-height: 17.99715805053711px; text-decoration: none;" target="_blank">http://www.youtube.com/playlist?list=PLighc-2vlRgT3DhE9DkIgSmpUX6v2AtYo</a><br />
<br />
Mine are the first 2.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-39362235243733454452013-09-11T03:42:00.001-07:002013-09-11T03:42:54.260-07:00Astricon 10 October 2013<div class="separator" style="clear: both; text-align: left;">
I will be giving the first 2 sessions in the <a href="http://www.asterisk.org/community/astricon-user-conference/schedule-day-two">Asterisk Security Master Class</a> while Nir will be presenting on the last day.</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvgyWQAmcfJREfkBmbG_Api5oHE_B3oVsj_q5F3bSfD_SIRpRaKTRBMG9S8xPNMXSF6UzbqYarckVxCuCRzlsPEob1XBlWyc3sDOYQ4S44BqtBS2_fU47v4Bp3p4D9iMcLIxkQaYnVGJw/s1600/Astricon+speaker+(2).jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvgyWQAmcfJREfkBmbG_Api5oHE_B3oVsj_q5F3bSfD_SIRpRaKTRBMG9S8xPNMXSF6UzbqYarckVxCuCRzlsPEob1XBlWyc3sDOYQ4S44BqtBS2_fU47v4Bp3p4D9iMcLIxkQaYnVGJw/s1600/Astricon+speaker+(2).jpg" height="245" width="320" /></a></div>
<br />
<br />
For more information go to <a href="http://www.asterisk.org/community/astricon-user-conference">http://www.asterisk.org/community/astricon-user-conference</a><br />
<br />
<br />
<br />Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-48897543359556981732013-04-09T06:11:00.003-07:002013-04-09T06:11:52.126-07:00What do the crooks get from PBX hacking?I have been asked many times what the crooks get out of hacking or attacking a phone switch.<br /><br />William Jackson offers a good explanation in this blog post<br />
<br />
<b>Phone DOS: What's in it for the crooks</b> <br />
http://gcn.com/blogs/cybereye/2013/04/phone-dos-whats-in-it-for-crooks.aspx<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://gcn.com/~/media/GIG/GCN/Redesign/Articles/2013/April/TDOShacker.ashx" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="154" src="http://gcn.com/~/media/GIG/GCN/Redesign/Articles/2013/April/TDOShacker.ashx" width="320" /></a></div>
(Image from the blog).Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-66393711392169339012013-03-27T12:11:00.001-07:002013-03-27T12:11:02.287-07:00Nice article on effects of Toll FraudThanks to <a href="http://www.voipsecurityblog.com/">Mark Collier's VoIP Security Blog</a> I point you to this article that <a href="http://companies.mybroadband.co.za/blog/2013/03/14/toll-fraud-can-put-smes-out-of-business-in-minutes/">Toll fraud can put SMEs out of business in minutes. </a><br />
<br />
Unfortunately the premise and conclusions are correct. If you think of the example from the 2011 Astricon where a company was hit for <a href="http://www.youtube.com/watch?v=ro8WMr04iBA">$400,000 in fraud</a> over 2 days then it is easy to see how this kind of hit could cost a small business everything in almost no time.<br />
<br />
Real time monitory and proper security checks are needed to help prevent this kind of fraud. I will keep posting details on how you can protect your company, or you can contact me directly for more information about real-time monitoring or VoIP Security Audits.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-33629549566074422362013-02-04T02:19:00.000-08:002013-02-04T02:19:12.684-08:00Pulp PhishingFound a neat new web tool to create retro looking Pulp Fiction covers.<br />
<br />
So here is one to remind everyone that telecom fraud is not just taking your money, but is being used to fund terror.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7LuAteK64ig7Ud92RUfSJoL4T9uNKeFF2cMyctbrsG38UKWrfdeYKl7eTeHQ11pMy-06UJVlrRat-rP6ODVv89f3oWRtZqpz8wSBuCqLpNyrt2va7eBFSoUTumGax0cVfmaQPsIYyeqM/s1600/Pulp-O-Mizer_Cover_Image-Al-Qaeda+.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7LuAteK64ig7Ud92RUfSJoL4T9uNKeFF2cMyctbrsG38UKWrfdeYKl7eTeHQ11pMy-06UJVlrRat-rP6ODVv89f3oWRtZqpz8wSBuCqLpNyrt2va7eBFSoUTumGax0cVfmaQPsIYyeqM/s400/Pulp-O-Mizer_Cover_Image-Al-Qaeda+.jpg" width="268" /></a></div>
<br />
Past posts about Al Qaeda Phishing attacks<br />
<ul>
<li><a href="http://telecom-fraud.blogspot.co.il/2011/11/fraud-from-fun-phreak-to-terrorism.html">Fraud – From Fun Phreak to Terrorism</a> (Posted: <span>Sunday, January 27, 2013</span>)</li>
<li><a href="http://telecom-fraud.blogspot.co.il/2011/12/shssshhhhhh-al-qaeda-phreaking.html">Shssshhhhhh!!!! Al-Qaeda Phreaking! </a>(Posted: <span>Thursday, December 1, 2011)</span></li>
<li><a href="http://telecom-fraud.blogspot.co.il/2013/01/al-qaeda-linked-phone-hackers-are-back.html">Al Qaeda-linked phone hackers are back</a> (Posted: <span>Sunday, January 27, 2013)</span></li>
</ul>
<span> </span><br /><span>Pulp cover made with: http://thrilling-tales.webomator.com/derange-o-lab/pulp-o-mizer/pulp-o-mizer.html </span><br /><span> </span>Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-76249474800609520702013-01-27T07:32:00.000-08:002017-01-01T01:29:11.829-08:00Al Qaeda-linked phone hackers are backA little over a year ago I was explaining on the <a href="http://www.voipusersconference.org/">VoIP Users Conference</a> weekly call about how Al Qaeda had been hacking AT&T customers for over US$2 million in the session titled <a href="http://www.voipusersconference.org/2011/terrorist-phone-hacking/">Shssshhhhhh!!!! Al-Qaeda Phreaking!</a> (a recording of the session is available at: http://www.voipusersconference.org/?powerpress_embed=3669-podcast.<br />
<br />
Now a year later New York <a href="https://www.schumer.senate.gov/newsroom/press-releases/schumer-ny-phone-hacking-ring-with-possible-al-qaeda-link-connection-to-syracuse-has-cost-mom-and-pop-businesses-hundreds-of-thousands-of-dollars-senator-to-call-on-telecom-industry-feds-to-immediately-step-up-fraud-detection">Sen. Schumer: Al Qaeda-linked phone hackers costing NY small businesses</a> says that another:<br />
<blockquote class="tr_bq">
phone hacking ring with ties to Al Qaeda-related groups in the
Philippines and Somalia have targeted small businesses in New York,
<b>stealing hundreds of thousands of dollars worth of overseas long
distance calls. </b></blockquote>
It is not as large an amount stolen as last time, but it is scary to think that in-spite of the assassination of their leader Al Qaeda is back to their old tricks of hiring people to hack to fund them.<br />
<br />
As Sen. Schumer reports<br />
<blockquote class="tr_bq">
<b>26 businesses in New York's capital area</b>, which includes Albany, have come forward to say they’ve been victims of a communications
scheme. Schumer said hackers were manipulating businesses’
voicemail systems to make thousands of costly long-distance calls
overseas, leaving New York businesses on the hook for the substantial
bills.</blockquote>
For example: <br />
<blockquote class="tr_bq">
One dry cleaning company in the area, he said, was hit with a $150,000
phone bill for nearly 9,000 overseas calls. That business is currently
in a legal battle with its telephone provider over the bill .</blockquote>
<br />
On his <a href="http://www.schumer.senate.gov/Newsroom/record.cfm?id=338210">official site</a> he has called on carriers to put in place limits.<br />
<br />
A copy of Schumer’s letter to the telecom industry and the Federal Communications Commission appears below:<br />
<br />
<blockquote class="tr_bq">
Dear US Telecom and NTCA,<br />
<br />
I am writing today after learning of several instances of a voicemail
scam praying on multiple New York small businesses. As I am sure you
are aware, this fraud occurs when hackers discover a loophole in the
voicemail system and use this to make long-distance calls that can cost
thousands of dollars. As this scam can occur over a series of days or
even weeks, many of these victims are left with a bill of hundreds of
thousands of dollars. During these times, small businesses need all the
available help in order for them to continue to prosper and grow.<br />
<br />
Both your members and these small businesses have been victims of
this crime. These hackers, as they mostly operate from overseas, can be
very difficult for law enforcement to catch. Therefore, I am hopeful
that we can work together on adequate steps to provide stringent fraud
detection services for small business phone lines so that we can
eliminate the charges for small businesses and for your members. I
believe that the credit card industry could provide inspiration in this
effort. They have established robust fraud prevention services to allow
businesses and customers to learn almost immediately when a suspicious
purchase is made. In addition, they can require authorization prior to a
suspicious purchase.<br />
<br />
We all have an interest in
ending this fraud. Neither your members nor their customers wish to
help connect potential criminals or terrorists with their allies
overseas. I believe an industry-led effort to detect voicemail fraud and
end these unauthorized charges would allow small businesses to continue
to innovate without the fear of extremely high charges. I have copied
the Federal Communications Commission to ask them to assist your members
with their expertise in this matter.<br />
<br />
I thank
you for your attention to this important matter, and look forward to
working with you to assist you in protecting American small businesses
from unfair and deceptive practices.<br />
<br />
Sincerely,<br />
U.S. Senator Charles E. Schumer<br />
<br />
CC: Federal Communications Commission</blockquote>
Although Senetor Schumer is correct that this is a problem that the carriers need to address, that does not mean that businesses can not, or should not, be proactive with monitoring, blocking, and call restrictions on their phone switch.<br />
<br />
As our <a href="http://www.greenfieldtech.net/services/greenfieldtech-voip-security-audits-2/">security audits</a> have shown many PBXs leave open holes that can be exploited.<br />
<ul>
<li>Do all phones need long distance or international calling?</li>
<li>Have unused/unneeded voicemail boxes been left open?</li>
<li>Do you have time of day/day of week restrictions on your phones (why can calls be made at 2 am on a Saturday if you are only open Monday to Friday 9-5)?</li>
<li>Do you still have easy to use or default passwords on your voicemail, PBX, or phones?</li>
</ul>
Have your phone staff or vendor check to make sure that these basic problems have been addressed or contact me and we can discuss a security audit.<br />
<br />
Protect yourself because the phone companies will almost always expect you to pay at least part of the phone fraud done using your phone lines.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-23559983463551250612013-01-23T02:27:00.000-08:002013-01-23T02:27:16.164-08:00Interesting Article on the Challenges and Prevention in a VoIP Environment<span style="font-family: Times,"Times New Roman",serif;"> As I have been writing here, VoIP service has become more common and thus more of an attractive target for fraud attacks.</span><br />
<br />
<span style="font-family: Times,"Times New Roman",serif;"><a href="http://www.blogger.com/blogger.g?blogID=1985486086095945740">Jim Murphy</a>, President of <a href="http://www.phonepower.com/voiphome.aspx">Phone Power</a> has a nicely written article on <a href="http://www.tmcnet.com/">TMCNet</a> titled <a href="http://www.tmcnet.com/topics/articles/2013/01/18/323475-toll-fraud-challenges-prevention-a-voip-environment.htm"><b>Toll Fraud Challenges and Prevention in a VoIP Environment</b></a> </span><br />
<br />
<span style="font-family: Times,"Times New Roman",serif;">He discusses the fact that there are always new targets to attack and that many PBXs use default or easy to crack passwords (1234).</span><br />
<span style="font-family: Times,"Times New Roman",serif;"><br /></span>
<span style="font-family: Times,"Times New Roman",serif;">But to me the most worrying thing he mentions is how much this can cost a company:</span><br />
<blockquote class="tr_bq">
<span style="font-family: Times,"Times New Roman",serif;"><span style="background-color: white; color: #171717; display: inline ! important; float: none; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 22px; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">The risks of toll fraud within a VoIP network are severe. Some hackers are able to hijack systems and push through charges that can total $2,000 an hour or more.</span> </span></blockquote>
<span style="font-family: Times,"Times New Roman",serif;">Now we have seen companies hit in a few days with $25,000 - $50,000 in fraud, or even 1 case for $400,000 over 2 days, so this number of $2,000 per hour sounds quite plausible to me. </span><br />
<span style="font-family: Times,"Times New Roman",serif;"><br /></span>
<span style="font-family: Times,"Times New Roman",serif;">This is why I moved to <a href="http://www.greenfieldtech.net/">Greenfield Technologies</a> and am specializing in doing <a href="http://www.greenfieldtech.net/services/greenfieldtech-voip-security-audits-2/">Security Audits</a> for Asterisk based VoIP PBXs.</span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /></span></span>
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;">After performing auditing on more than 35 PBXs</span></span><br />
<br />
<span style="font-family: Times,"Times New Roman",serif;"><b>We have found that the most common Policy issues are:</b></span>
<br />
<div style="direction: ltr; language: en-US; margin-bottom: 0pt; margin-left: .3in; margin-top: 2.88pt; mso-line-break-override: none; punctuation-wrap: hanging; text-align: left; text-indent: -.3in; unicode-bidi: embed; word-break: normal;">
<span style="font-family: Times,"Times New Roman",serif;"><span style="font-size: 12.0pt;"><span style="color: #d16349; font-size: 85%;"></span></span></span><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<div class="MsoNormal">
<span style="font-family: Times,"Times New Roman",serif;">Incomplete, non-existent, unenforced Password policies:</span></div>
<br /><span style="font-family: Times,"Times New Roman",serif;">Many had identical default
SIP passwords for all phones that were never changed</span><br /><span style="font-family: Times,"Times New Roman",serif;">Many had identical default voice-mail passwords for all extensions that were never changed</span></div>
<div style="direction: ltr; language: en-US; margin-bottom: 0pt; margin-left: .3in; margin-top: 2.88pt; mso-line-break-override: none; punctuation-wrap: hanging; text-align: left; text-indent: -.3in; unicode-bidi: embed; word-break: normal;">
<br />
<div class="MsoNormal">
<span style="font-family: Times,"Times New Roman",serif;">Server / PBX Passwords</span></div>
<br /><span style="font-family: Times,"Times New Roman",serif;">Multiple PBXs using the
same password</span><br /><span style="font-family: Times,"Times New Roman",serif;">Root access and web client
interface using the same password (if any)</span></div>
<div style="direction: ltr; language: en-US; margin-bottom: 0pt; margin-left: .3in; margin-top: 2.88pt; mso-line-break-override: none; punctuation-wrap: hanging; text-align: left; text-indent: -.3in; unicode-bidi: embed; word-break: normal;">
<br />
<div class="MsoNormal">
<span style="font-family: Times,"Times New Roman",serif;">No update policy</span></div>
<br /><span style="font-family: Times,"Times New Roman",serif;">Server OS</span><br /><span style="font-family: Times,"Times New Roman",serif;">PBX software</span><br /><span style="font-family: Times,"Times New Roman",serif;">Phone firmware</span></div>
<div style="direction: ltr; language: en-US; margin-bottom: 0pt; margin-left: .3in; margin-top: 2.88pt; mso-line-break-override: none; punctuation-wrap: hanging; text-align: left; text-indent: -.3in; unicode-bidi: embed; word-break: normal;">
<br />
<div class="MsoNormal">
<span style="font-family: Times,"Times New Roman",serif;">No mailbox polices</span></div>
<br /><span style="font-family: Times,"Times New Roman",serif;">Who get voice-mail</span><br /><span style="font-family: Times,"Times New Roman",serif;">When to close them</span><br />
<div class="MsoNormal">
<span style="font-family: Times,"Times New Roman",serif;">No policy to monitor phone usage / activity</span></div>
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>HE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]--><span style="font-family: Times,"Times New Roman",serif;"><span style="color: black; font-size: 12pt;"></span></span></div>
<span style="font-family: Times,"Times New Roman",serif;"><br /></span>Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-12406205766817478962012-12-01T07:21:00.001-08:002012-12-01T07:22:41.695-08:00Crime and attacks are business that advertiseIt seems that cyber crime does pay, or at least you can hire people to do it for you.<br />
<br />
In a recent article <a href="http://krebsonsecurity.com/">KrebsonSecurity</a> describes an <a href="http://krebsonsecurity.com/2012/11/online-service-offers-bank-robbers-for-hire/">Online Service Offers Bank Robbers for Hire.</a><br />
<blockquote class="tr_bq">
An online service boldly advertised in the cyber underground lets
miscreants hire accomplices in several major U.S. cities to help empty
bank accounts, steal tax refunds and intercept fraudulent purchases of
high-dollar merchandise.</blockquote>
Now this is nothing new in the world of cyber crime, but it is a bit new for physical crime.<br />
<br />
Last year it was reported that there was a service offering to break <a href="http://news.cnet.com/8301-17939_109-10222514-2.html">Captchas</a>,
those often unreadable, always annoying distorted letters that you're
required to type in at many a Web site to prove that you're really a
human.<br />
<br />
Also there is a service for <a href="http://www.humbuglabs.org/blog/2012/02/fraud-enabling-service-false-answer-supervision/">False Answer Supervision</a>.<br />
<br />
Or there was the case of out sourcing to hack phone systems for <a href="http://telecom-fraud.blogspot.se/2011/12/shssshhhhhh-al-qaeda-phreaking.html">Al Qaeda</a> - $2 million stolen for the cost of $4,000.<br />
<br />
It seems that the criminals are working harder to find ways to make money from committing crimes, they share tools and data in forums that cater to cybercrooks or hackers.<br />
<br />
It is time that we start to work harder to share information to beat these guys before they unionize.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-42388341588513946272012-11-14T09:59:00.001-08:002012-11-14T09:59:21.088-08:00AstriCON '12 presentations<div class="js-tweet-text" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Arial, sans-serif; font-size: 14.666666984558105px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; word-wrap: break-word;">
GreenfieldTech Presentations from AstriCON'12 are now available at:</div>
<div class="js-tweet-text" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Arial, sans-serif; font-size: 14.666666984558105px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; margin: 0px; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; word-wrap: break-word;">
<a class="twitter-timeline-link" data-expanded-url="http://www.greenfieldtech.net/corporate/downloads/" dir="ltr" href="http://www.greenfieldtech.net/corporate/downloads/" style="color: #0099b9; text-decoration: initial;" target="" title="http://www.greenfieldtech.net/corporate/downloads/">http://www.greenfieldtech.net/corporate/downloads/ </a><span class="Apple-converted-space"> </span><a class="twitter-hashtag pretty-link js-nav" data-query-source="hashtag_click" dir="ltr" href="https://twitter.com/search?q=%23asterisk&src=hash" style="color: #0099b9; text-decoration: initial;"><s style="color: #66c1d5; text-decoration: initial;"></s></a></div>
Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-42509683671477739422012-11-11T03:45:00.004-08:002012-11-11T03:45:50.485-08:00The hard truth about technology securityWhy our job in technology security is so hard<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://media.zenfs.com/en_us/News/ucomics.com/wd121111.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://media.zenfs.com/en_us/News/ucomics.com/wd121111.jpg" /></a></div>
<br />Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-36812789663457662012-11-01T02:34:00.000-07:002012-11-01T02:35:01.445-07:00Holiday Hacks are upon us again<span style="font-family: inherit;">Today I found a very nice article on the <a href="http://www.cso.com.au/">CSO Security News</a> site called <a href="http://www.cso.com.au/article/440664/12_cons_christmas/"><b>The 12 Cons of Christmas</b></a> by <a href="http://www.cso.com.au/author/1626648734/joan-goodchild/articles" style="color: #035c83; outline: 0px; text-decoration: underline;">Joan Goodchild</a><span class="Apple-converted-space"> </span>(CSO (US)).</span><br />
<br />
<span style="font-family: inherit;">In this article she points out that this is the time of the year when the fraudsters and phishers are out in force. Or as Joan put it:</span><br />
<blockquote class="tr_bq">
<span style="font-family: inherit;"><span style="background-color: white; color: black; display: inline ! important; float: none; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">While the risk of being hacked, conned or having sensitive information stolen is possible all through the year, most security experts agree that the holiday season brings a spike in fraudulent activity, both online and off.</span></span></blockquote>
<h3>
<span style="font-family: inherit;"><span style="background-color: white; color: black; display: inline ! important; float: none; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><b>Hot Holiday items are lures </b></span></span></h3>
<span style="font-family: inherit;">With the increased use of Facebook and Twitter they can get more information about what you want and can use that to better target you. To make it worse, the scammers have learned not to be so obvious, and "the </span><span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><span class="Apple-converted-space"></span>signs that made scams so obvious before are no longer always present as more sophisticated techniques employed by criminals on Twitter and Facebook make it harder than ever to know what's legit."</span><br />
<br />
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">Take a look at the article for some good hints on how to detect these scams and protect yourself. </span><br />
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">Full article: </span><span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: black; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><a href="http://www.cso.com.au/article/440664/12_cons_christmas/">http://www.cso.com.au/article/440664/12_cons_christmas/</a> </span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><br /></span>Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-20958319540722039572012-10-03T05:10:00.000-07:002012-10-03T05:10:10.936-07:00Activity at Astricon’12<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.astricon.net/2012/default.aspx"><img border="0" height="80" src="http://images.tmcnet.com/expo/astricon-2012/images/top-2012.jpg" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<span id="goog_1936823437"></span><a href="http://www.blogger.com/"></a><span id="goog_1936823438"></span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">During <a href="http://www.astricon.net/2012/default.aspx">Astricon’12</a>
I will be part of the <a href="http://www.greenfieldtech.net/">Greenfield
Technology</a> team at the show, along with speaking I will be at the <a href="http://www.kamailio.org/w/2012/10/kamailio-booth-at-astricon12/">Kamailio
booth</a> during <a href="http://www.astricon.net/2012/default.aspx">Astricon’12</a>.</span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;"><a href="http://www.astricon.net/2012/default.aspx">Astricon’12</a>
is taking place in Atlanta, GA, USA, during October 23-25, 2012</span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<h2 class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;"><span style="font-size: large;">Speaking </span></span></h2>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Nir and I will be presenting at the event. I will be presenting on Wednesday, October 24, 2012, in the
11:40-12:15 time slot. </span></div>
<h3 class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<b><span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Presentation title: </span></b><span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;"></span></h3>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Found in the wild: Telecom Fraud and Security Problems </span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<h4 class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<b><span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Abstract</span></b><span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;"> </span></h4>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Last year's Security Panels at AstriCon brought examples from the
audience (like: found and hacked in under 10 min. and $400k in fraud in 2
days). This year there are many new fraud attacks and audit horror stories and
recommendations for you.</span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">This session will review the security breaches of the past year as
well as highlights of the most common problems found in security audits. The
audience is encouraged to provide their own examples and jointly define
solutions.</span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Also, Nir Simionovich will be presenting on Thursday, October 25,
2012, in the 10:00-10:35am time slot.</span></div>
<h3 class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 4;">
<b><span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Presentation title: </span></b></h3>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Asterisk Lock Down - Beyond Fail2Ban</span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<h4 class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Abstract</span></h4>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Fail2Ban is a wonderful tool, but it is only one of many tools out
there to assist in the protection of your Asterisk server. Some of these tools
are so simple, that by utilizing very simple techniques, a complete lock down
can be enforced. The session will share some methods that were deployed over
the course of the years 2010 and 2011 and several locations and had proved to
reduce the risk of hacking and fraud tremendously. <b> </b></span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<br /></div>
<h2 class="MsoNormal" style="line-height: normal;">
<b><span style="font-weight: normal;"><span style="font-size: large;"><span style="font-family: "Arial","sans-serif";">Kamailio Booth</span></span></span></b></h2>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Arial","sans-serif"; font-size: 12.0pt; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-hansi-theme-font: minor-bidi;">Along with speaking we will be at the Kamailio booth in the open
source area. The Kamailio <a href="http://images.tmcnet.com/expo/astricon-2012/floormap-astricon-12.html">booth number is 20</a>, if you are attending the show;
stop by to learn about use cases of Kamailio and what is new in the project.</span><span style="font-family: "Arial","sans-serif"; mso-ascii-theme-font: minor-bidi; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-hansi-theme-font: minor-bidi;"></span></div>
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>HE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:Arial;
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-82640719330579556562012-08-03T06:58:00.000-07:002012-08-03T06:58:40.020-07:00Infographic: Fraudulent Calls Up 29 Percent in 2012<a href="http://threatpost.com/">Threat Post</a>, the Kaspersky Labs Security News Service has a nice article about the status of fraudulent calls in 2012 titled <a href="http://threatpost.com/en_us/blogs/report-fraudulent-calls-29-percent-2012-080212">Report: Fraudulent Calls Up 29 Percent in 2012</a> that starts:<br />
<blockquote class="tr_bq">
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: #333333; display: inline !important; float: none; font-family: Arial, Helvetica, 'Bitstream Vera Sans', sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 21px; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">On average, there were almost five fraudulent phone calls every minute earlier this year according to a report released today from security firm Pindrop Security. The Atlanta-based company found phone fraud was up 29 percent January to June this year from the last half of 2011 after it analyzed 1.3 million different instances as part of its 2012 State of Phone Fraud Report.</span></blockquote>
The accompanying graphic shows how things are already looking in 2012 speaks loudly as to why companies need to be proactive in their approach to telecom fraud.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://pindropsecurity.com/wp-content/uploads/2012/08/pindrop_infographic_final5.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="640" src="http://pindropsecurity.com/wp-content/uploads/2012/08/pindrop_infographic_final5.jpeg" width="290" /></a></div>
<br />Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-15933259596403143092012-06-28T09:33:00.003-07:002012-06-28T09:33:43.009-07:00Cloning makes its returnI am not sure if this has become a problem in other areas yet, but apparently there is a new twist in cloning the <a href="http://en.wikipedia.org/wiki/Subscriber_identity_module">SIM card</a> in a mobile phone. <br />
<br />
Ok a little history first, when mobile phones first came out they did not have SIM cards. Identifying information was "hard coded" to the phone letting the network know that it was you on your phone using the network. Then someone worked out that they could scan and clone that information (similar to what is now starting to be common for <a href="https://www.eff.org/deeplinks/2009/02/rfid-passports-scanned-car">RFIDs</a>). You see that by broadcasting your "unique" identifier to the network the fraudster can trick the system into thinking they are you. For RFID this means that they can clone your credit card and start charging against your account.<br />
<br />
In the late '90s I know that fraudsters rented a room on the lowest floor of a building that was over FDR Drive in NYC. This put them close enough to ping and scan the mobile devices in the cars that passed below them. They then input the information into other phones and were able to arrange dial out, long distance, <a href="http://telecom-fraud.blogspot.com/2011/11/term-tuesdays-premium-rate-fraud.html">premium number</a> and <a href="http://telecom-fraud.blogspot.com/2012/02/term-tuesday-sweepstakes-or-premium.html">saweepstakes fraud</a> against those mobile user's accounts.<br />
<br />
Now in theory this has stopped happening in mobile devices as the information is supposed to be harder to get.<br />
<br />
Today I came across an article in the Arab Times <a href="http://www.arabtimesonline.com/NewsDetails/tabid/96/smid/414/ArticleID/184959/reftab/36/t/Phone-clone-latest-scam-to-prey-on-mobile-users/Default.aspx">Phone Clone Latest Scam To Prey On Mobile Users</a>. A man called a reporter on her mobile phone and told her<br />
<blockquote class="tr_bq">
Congratulations, you have just won KD 100,000 from ------ (name of the telecommunication company). I’m from the (name of the telecommunication company) International Government Department. You can claim your prize from ------ (name of local bank) by calling this number 00447624192661 for instructions on how to claim the KD 100,000 prize from (name of the local bank),” went a man to one of the reporters of the Arab Times early this week. He was calling her on her mobile phone from the number 22280636.</blockquote>
Now to be fair, at this point she knew it was a scam - but being a journalist she wanted to get the full story and called the number and got the same man. <br />
<blockquote class="tr_bq">
He was the same man who called up the reporter earlier but this time he introduced himself as Michael Husky of the (name of the telecommunication company) International Govern-ment Department of Kuwait. He then gave an eight-digit number to the reporter and asked her to check if the eight-digit number that he gave matched the first eight-digit number at the back of her mobile phone SIM card. “Switch it off and check it. Please check if it’s the same and please call again to confirm and I will give you the final instructions on how to claim your KD 100,000 prize from _____ (name of local bank)” said the man. The reporter removed the SIM card from her phone and much to her surprise, the eight-digit number that the man gave her earlier was the exact number at the back of her SIM card. </blockquote>
<blockquote class="tr_bq">
The reporter removed the SIM card from her phone and much to her surprise, the eight-digit number that the man gave her earlier was the exact number at the back of her SIM card. However, when she switched on her mobile phone, it went offline and she had to go to one of the branches of this telecommunication company to check on what had gone wrong with her phone line. Her phone started working again after a customer service representative helped her out. The reporter then told the customer service representative about the earlier incident about the KD 100,000 cash prize. The customer service representative laughed aloud and told the reporter that it was not the first time that she heard such story as a number of other subscribers had also called up and claimed that they had won a cash prize from the telecommunication company. </blockquote>
The article goes on to say that she called again, got new instructions and was told to expect a text (SMS) message with a new PIN and to sign in using it.<br />
<br />
When she checked with the legitimate phone company she was told that if she had gone ahead with it they would have cloned her phone.<br />
<br />
There is a well written and detailed explanation about this could be done by the fraudsters and what each part of the scam actually was doing.<br />
<br />
But this shows that when you get unexpected "You have won" calls or messages you should be wary as they are almost always too good to be true and can end up costing you a lot.Eric Kleinhttp://www.blogger.com/profile/03586199093045165730noreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-41010471416367047812012-04-16T02:13:00.000-07:002012-04-16T02:13:20.000-07:00Remembering the Titanic disaster was made worse by bad communicationsAs the world remembers the <a href="http://www.rmstitanic.net/">Titanic </a>disaster's 100years ago today I would like to take this blog entry to remind people that the disaster was made worse by bad communications technology, flooded bandwidth, and new protocols.<br />
<br />
As Bill Kovarik writes in his article<a href="http://revolutionsincommunication.wordpress.com/features/radio-and-the-titanic/"> Radio and the Titanic</a><br />
<br />
<blockquote class="tr_bq">
Problems with the radio played a major role in the
Titanic disaster of April 14, 1912, when the British passenger liner
sank after hitting an iceberg in the mid-Atlantic.</blockquote>
<blockquote>
These problems delayed and complicated the rescue, contributing to
the deaths of 1,514 passengers and crew, and very nearly sealing the
fates of those who managed to survive. </blockquote>
<blockquote>
Although its owners boasted that the Titanic was the most modern ship of
its day, the Marconi radio system that had been installed in the weeks
before the disaster was already obsolete. </blockquote>
So the first problem seems that the system in use was not the best available and had some known technical issues. This kind of thing happens when radically new technologies come out and bandwidth problems.<br />
<br />
<b><u>Bandwidth problems</u></b> you may ask, yes bandwidth.<br />
<br />
It seems that "After sending personal messages from the Titanic, the operators were
taking down personal messages, along with news and stock reports for
the passengers to read the next morning." Thus they were unable to receive the warning<br />
<blockquote class="tr_bq">
About fifteen minutes before the Titanic hit the iceberg, Cyril F.
Evans, a wireless operator on the Californian, which was about 20 miles
away, attempted to contact the Titanic to tell them they were surrounded
by dangerous icebergs.</blockquote>
As Bill Kovarik explains: (<b><span style="color: red;">emphasis </span></b>is mine)<br />
<blockquote class="tr_bq">
Technically, the problem with the Titanic’s radio telegraph system was
that Marconi’s “spark” system <b><span style="color: red;">soaked up virtually all of the frequency
bandwidth</span></b> and <b><span style="color: red;">created interference for all other ships within signaling
distance</span></b>. As many engineers were realizing at the time, it was far
better to use continuous wave radio transmitters (where signals were
carried inside the wave) instead of the Marconi intermittent spark
transmissions (where wide-spectrum interruptions in the wave<em> were</em> the signal).</blockquote>
<b><u>Changing protocols</u></b><br />
The other part of the problem was that Captain Stanley Lord, the captain of the Californian stood accused of ignoring Titanic’s distress calls after the huge ship sank on April 15, 1912 while Sir Arthur Rostron, the captain of the Carpathia, rescued more than 700 people from the Atlantic on the night the Titanic went down.
<br />
<br />
<h3 class="r" style="text-align: center;">
<span style="font-weight: normal;">Listen to the </span><a class="l" href="http://www.youtube.com/watch?v=snkwsU98QlQ">RMS <em>Titanic</em> "<em>SOS</em>" on YouTube</a> <div style="display: inline !important; position: relative; text-decoration: none; top: -11px;">
<a href="https://www.google.com/url?url=http://www.youtube.com/watch%3Fv%3DsnkwsU98QlQ&rct=j&sa=X&ei=cNyLT87zM6OH4gTFhaDNCQ&ved=0CEAQuAIwAg&q=Titanic+sos&usg=AFQjCNEZFGKlw3ojToSkuloH5EBYrKArTQ" id="v12860363749034050132" style="text-decoration: none;"><img align="middle" alt="" border="0" class="th vidthumb3" height="87" id="vidthumb3" src="data:image/jpeg;base64,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" style="border: 0; display: inline-block; height: 87px; margin: 0px 0px 0px 0px; width: 116px;" width="116" /></a></div>
<i> </i></h3>
<div>
Now if you look at the time that the sinking occurred, there was a change in the work in message content as well as the technology mentioned above. </div>
<div>
<br /></div>
<div>
As Neal McEwen explains in his article <a href="http://telegraph-office.com/pages/arc2-2.html">"'SOS,' 'CQD' and the History of Maritime Distress Calls"</a></div>
<blockquote class="tr_bq">
misinformation surrounds the origin and
use of maritime distress calls. The general populace believes that
"SOS"
signifies "Save Our Ship." Casual students of radio history are aware
that
"CQD" preceded the use of "SOS." </blockquote>
<blockquote class="tr_bq">
In 1904, the Marconi company (suggested) the use of
"CQD" for a distress signal. It was established on February 1 of
that year by Marconi Company's circular No. 57. Although
generally
accepted to mean, "Come Quick Danger," that is not the case. It is a
general
call, "CQ," followed by "D," meaning distress. A strict interpretation
would be "All stations, Distress." In the U.S. Senate hearings
following
the <i>Titanic</i> disaster, interrogator Senator William Smith asked
Harold
Bride, the surviving wireless operator, "Is CQD in itself
composed
of the first letter of three words, or merely a code?" Bride
responded,
"Merely a code call sir." Marconi also testified, "It [CQD] is a
conventional signal which was introduced originally by my company to
express
a state of danger or peril of a ship that sends it."</blockquote>
While 2 years later <div>
<blockquote class="tr_bq">
At the second Berlin Radiotelegraphic Conference of 1906, the
subject
of a distress signal was again addressed. The distress signal chosen
was
"SOS." </blockquote>
<blockquote class="tr_bq">
Although the use of "SOS" was officially ratified in 1908, the use
of
"CQD" lingered for several more years, especially in British service
where
it originated. It is well documented in personal accounts of Harold
Bride,
second Radio Officer, and in the logs of the SS Carpathia, that the <i>Titanic</i>
first used "CQD" to call for help. When Captain Smith gave the order to
radio for help, first radio officer Jack Phillips sent "CQD" six times
followed by the <i>Titanic</i> call letters, "MGY." Later, at Brides
suggestion,
Phillips interspersed his calls with "SOS.".</blockquote>
<blockquote class="tr_bq">
In <u>SOS to the Rescue</u>, 1935, author Baarslag notes, "Although
adopted intentionally in 1908, it [SOS] had not completely displaced
the
older "CQD" in the British operators' affections." Marconi
in his U.S. Senate testimony on the <i>Titanic</i> disaster said, "I
should
state that the international signal [SOS] is really less known that the
Marconi Co.'s [CQD] signal." (It is interesting to observe that
Marconi
was waiting in New York to return home to England on the <i>Titanic</i>.) </blockquote>
<div>
Thus you have a case where the wrong code was sent out, due to a protocol (in this case human) error. Meaning that the message went out 6 times before the right code was sent out, causing a long delay in getting help.
</div>
<div>
<br /></div>
<div>
Now there is a call that it is <a href="http://www.theboltonnews.co.uk/news/9650412.Time_to_forgive_the_man_who____ignored____Titanic_SOS/?ref=mmsp">Time to forgive the man who ‘ignored’ Titanic SOS</a> as "It has ... been proved that any action by Captain Lord would not have
led to a different outcome to the tragedy, as Californian would have
arrived well after Titanic had sunk."</div>
<div>
<br /></div>
<div>
Given the details I have seen, I think that Captain Lord was used as a scapegoat when there was a need to hand someone out for the loss, even though the Captain Lord had sent ice warnings </div>
<blockquote class="tr_bq">
"The Titanic was going full speed ahead, despite being warned about the
ice, and the captain was encouraged to do so to make it the fastest
crossing of the Atlantic."</blockquote>
It is time to stop blaming
Captain Lord for the sinking, when the Titanic was already hit after not getting the warnings.<br />
<br />
<br />
</div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-24996747995697752692012-04-03T00:17:00.000-07:002012-04-03T00:17:29.425-07:00Term Tuesdays - Employee Fraud<span class="comment-body" data-li-comment-text="">Employee Fraud - when an employee knowingly steals from the company.</span><br />
<span class="comment-body" data-li-comment-text=""><br /></span><br />
<span class="comment-body" data-li-comment-text="">Example provided by a former coworker</span><br />
<span class="comment-body" data-li-comment-text=""><br /></span><br />
<span class="comment-body" data-li-comment-text="">Here is a story from
the 1980's. </span><br />
<span class="comment-body" data-li-comment-text="">A carrier was paying sales guys up front for sales and one day an installer called me in Houston and was concerned about a new
installation. </span><br />
<span class="comment-body" data-li-comment-text=""><br /></span><br />
<span class="comment-body" data-li-comment-text="">The location was an empty field and in the middle of the
field was a telephone pole with 25 66 blocks. The installer said he
counted 50 lines terminated to this 66 block. So I told him to reject
the order back to us and we would handle it.</span><br />
<span class="comment-body" data-li-comment-text=""><br /></span><br />
<span class="comment-body" data-li-comment-text="">I contacted the VP of Sales and he contacted
the Legal Department. </span><br />
<span class="comment-body" data-li-comment-text=""><br /></span><br />
<span class="comment-body" data-li-comment-text="">There where five (5) sales guys that where fired, but
not sued. Their names were given the the IRS for all the money they stole.</span>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1985486086095945740.post-22538503200619999822012-03-27T04:29:00.001-07:002012-04-01T01:20:46.092-07:00Term Tuesday - a version of 'advance-fee' fraudThis example was provided by Mitchell Hellman<strong>, </strong>a former coworker<br />
<br />
<b>Background</b><br />
AT&T offers several free services for people with hearing related disabilities, details are available at <a href="http://relayservices.att.com/">http://relayservices.att.com/</a>, this service is funded by the FCC.<br />
<blockquote class="tr_bq">
IM Relay is a solution for individuals who are Deaf, hard-of-hearing, or
have speech loss. Request a phone number to be dialed and a AT&T
Relay operator calls the phone number and translates the text to voice
to the other party. There is no charge to use this service, but all
users must register first.</blockquote>
<blockquote class="tr_bq">
Aside from using IM relay on PC or MACs, IM relay is accessible wherever
there is AIM. Today, many mobile devices support AOL Instant Messenger
applications. Just send the phone number you want to dial to the screen
name "ATTRelay" and you can make calls on the go. Remember, there is no
charge to use IM relay, but if you use a mobile device to access IM
relay please check with your service provider to see if there may be any
applicable data fees. </blockquote>
<b>Real world example</b><br />
<br />
<div class="popular-item comment" data-li-comment_id="73811854">
<div class="popular-content">
<div class="popular-article" id="commentID_73811854">
<div class="commenter">
<span class="comment-body" data-li-comment-text="">I own and operate the oldest gelato shop in New Mexico. Apparently,
some people think that this makes me easy prey, but (so far) all
attempts to victimize me have failed.
<br />
<br />
An article in the NY Times, "<a href="http://www.nytimes.com/2012/03/23/business/att-accused-of-improperly-billing-for-service-for-deaf.html?_r=2">AT&T Accused of Improperly Billing for Service for Deaf</a>," about a fraud
tactic that has been tried on me numerous times without success. I've
been getting calls from fraudsters on the average of one every couple of
weeks. They are attempting a version of 'advance-fee' fraud: they
masquerade as someone interested in buying a large quantity of product
(since some directories, etc. consider me to be a restaurant, the fraud
often involves ordering common items such as club sandwiches or box
lunches), they obtain a price from the victim, then send a check or
credit card number to use as payment. The payment is for a larger amount
than the quoted price; they tell the victim to send the overage back to
them, often by Western Union (which is virtually impossible to trace).
The victim deposits the check or enters the credit card info, sends back
the overage-- and the fraudster disappears; the payment turns out to be
bogus, and the victim is on the hook to the bank to pay them the money
that went to the fraudster.
<br />
<br />
What this has to do with the relay service mentioned in the article is:
</span></div>
<ol>
<li>Since the victim never speaks to the fraudster, the victim can't hear
the fraudster's accent...which might make him/her suspicious. </li>
<li>The fraudster gains the victim's sympathy, because the victim believes that the party he/she is dealing with is deaf. </li>
<li>The slow pace of the communication often means that the victim
doesn't want to take a lot of time asking questions about the
fraudster's bonafides. </li>
</ol>
Keep in mind that, because of the Communications Act of 1938, the
operators who are relaying the conversation can not discuss any of this
with the party on the receiving end of one of these calls... even when
they are certain that the call is bogus.
<br />
<br />
The way I have been dealing with these calls lately is to tell the operator to relay the following:
<br />
<br />
"This is <business name="">. Because of the high incidence of
fraudulent relay calls that we have received, before we can continue,
your call will be traced back to its source. Please stand by..."
<br />
<br />
They hang up pretty quickly after that. Of course no such trace is
taking place, but they don't know that, and can't take the chance. Looks
like they're not the only ones telling a little white lie, huh. :)</business></div>
</div>
</div>Unknownnoreply@blogger.com