|Wireless News Aggregation|
Welcome Back To The Wireless Messaging News
Mac malware attack found to hide payload in advertising graphics
By Malcolm Owen
A new way of attacking macOS with malware has been detailed by security researchers, with malicious online advertising found to have used steganography to disguise its payload within the ad's image files, in order to fool security systems.
The results of malware-based advertising that hid code in graphic files.
Analyzed by Confiant and Malwarebytes, an attempt to infect Macs from January 11 until January 13 was performed by a "malvertizer" dubbed "VeryMal" by the firms. It is believed that the attempted attack ad was viewed on as many as 5 million Macs during the brief period of time it was active.
To those who saw the ad, the attack went down a familiar tactic of displaying notices that the Adobe Flash Player needed to be updated, and urged users to open a file that would attempt to download in their browser, writes Confiant. Those who accepted the download and ran the malware ended up infecting their Mac with the Shlayer trojan.
While many attempts to obscure an attack via advertising fail to dupe the various protection systems in place in advertising networks and on user's desktops, the attempt is notable for hiding the payload of the attack within the visible advert itself. The graphic file had hidden code, using steganography, that required other non-malicious code to examine the image file for extraneous data, which was then used as a payload.
Specifically, the code would create a Canvas object, grab an image file from a specific URL, and define a function that checks if a specific font family is supported by the browser. If a check for Apple fonts failed, nothing would happen, but on success, the underlying data in the image file would be looped through, with each loop determining a pixel value that became an alphanumeric character. This was turned into a string and executed.
Despite containing the payload, the image itself can be viewed without harm. It is only harmful when the code is run on the file, followed by the browser being redirected to a link included in the payload.
VeryMal had performed similar attacks in the past, including targeting Macs and iOS in December, but the latest attempt is a subtle shift for the outfit to a less detectable method.
While macOS is generally easier to protect compared against other operating systems like Windows, it is still possible for bad actors to attempt to infect or acquire data from a target system. Mac users should continue to be wary of online notices urging to install or to update software from unofficial sources, and to closely scrutinize such notices to determine if they are indeed genuine. Additionally, users should not authenticate any request from the operating system, without knowing what it is for, and why it is asking.
Malware continues to be a problem for online users, but is becoming more of an issue for those using macOS, with seemingly more frequent attempts to defeat its security being discovered. It is not only limited to advertizing-based attacks, with reports in September noting even some apps in the Mac App Store were performing malicious actions, such as extracting a user's data.
Apple itself has also come under fire from critics for failing to share definitions of existing threats with third-party antivirus companies in a timely fashion.
Source: Apple Insider
NO POLITICS HERE
This doesn't mean that nothing is ever published here that mentions a US political party—it just means that the editorial policy of this newsletter is to remain neutral on all political issues. We don't take sides.
A new issue of the Wireless Messaging Newsletter is posted on the web each week. A notification goes out by e-mail to subscribers on most Fridays around noon central US time. The notification message has a link to the actual newsletter on the web. That way it doesn’t fill up your incoming e-mail account.
There is no charge for subscription and there are no membership restrictions. Readers are a very select group of wireless industry professionals, and include the senior managers of many of the world’s major Paging and Wireless Messaging companies. There is an even mix of operations managers, marketing people, and engineers — so I try to include items of interest to all three groups. It’s all about staying up-to-date with business trends and technology.
I regularly get readers’ comments, so this newsletter has become a community forum for the Paging, and Wireless Messaging communities. You are welcome to contribute your ideas and opinions. Unless otherwise requested, all correspondence addressed to me is subject to publication in the newsletter and on my web site. I am very careful to protect the anonymity of those who request it.
TIME TO HUDDLE UP
I spend the whole week searching the INTERNET for news that I think may be of interest to you — so you won’t have to. This newsletter is an aggregator — a service that aggregates news from other news sources. You can help our community by sharing any interesting news that you find.
Editorial Opinion pieces present only the opinions of the author. They do not necessarily reflect the views of any of advertisers or supporters. This newsletter is independent of any trade association. I don't intend to hurt anyone's feelings, but I do freely express my own opinions.
Prism-IPX Systems is growing and they are looking for more good software developers with communications experience. Additional information is available on their web site. Click here .
We need your help. This is probably the only weekly news source about paging and wireless messaging.
* required field
Written by: Sam Fenwick | Published: 22 January 2019
Richard Lambley speaks to Sam Fenwick about the telecommunication industry’s earlier years and some of the highlights from his time as editor of Land Mobile
While his insight piece does an excellent job of capturing the state of the wireless communications industry when Land Mobile was founded, we would be remiss if we didn’t ask Richard Lambley for more details and anecdotes gathered from the broad sweep of his time as founding editor.
To this end, I visited Lambley at his home. When I arrived, he was tinkering with a system that uses an antenna and Raspberry Pi computer board to track commercial flights across South-East England — nicely illustrating the way his interest in radio communications is a life-long fascination rather than simply being a profession.
One thing that Lambley was always keen to do during his time as editor (and is still something of a Land Mobile tradition to this day) was to highlight “small companies that had done something creative or clever and giving them a bit of publicity to help them along”. As an example, he cites a mobile data terminal developed by a Finnish company, which he saw for the first time at the CeBIT show in Hanover, Germany. “I thought this was novel and wrote it up and gave it a bit of space in my report. I was quite surprised to get a phone call 18 months later from a company which was operating a fleet of prison vans. They had put these mobile data terminals in their vans so that they could be tracked on their journeys, which was a new idea at the time. To have seen this little product go from just something at an exhibition to actually working because of a story I wrote was quite exciting really. I felt I’d done a bit of good in bringing it to their notice.”
In the early years, “people were making terrible mistakes with radio, it was a big learning curve for everybody”. Lambley remembers visiting a provincial brewery which wanted an onsite radio system as it had a lot of “people working in hard-to-get-at places, it was all steelwork and tanks and pipes going everywhere”. They opted for DECT cordless phones, which were just coming in at the time. “They soon discovered that DECT phones don’t do very well if there are a lot of radio reflections as it interferes with the time slot structure of the transmission – they ended up having to install two or three times the number of base stations originally planned just to make these handsets work, so it was a rather expensive project for the supplier, who evidently hadn’t foreseen this.”
Lambley came across this issue again a few years ago when he was visiting “a glassworks which was making enormous sheets of cheap glass. They had a huge production line, which was about a quarter of a mile long. They decided to use DECT cordless phones, and they worked a treat until they installed the huge glass-making machinery” — at which point the system stopped working and the owners decided to put in a private GSM network instead.
GSM – God send mobiles
The ‘chicken and egg’ problem for telecoms (networks are useless without terminals and vice versa) reared its head for 2G at the 1992 Pan-European Digital Cellular Radio Conference in Berlin (a precursor to MWC – Mobile World Congress – Barcelona), at which point although infrastructure was available, the only evidence of the handsets that the manufacturers at the time were working to produce were a few product data sheets on the tables that passed for stands in a 200- to 250-seater ballroom where the event took place (a far cry from the gargantuan undertaking that is today’s MWC Barcelona with its 2,400 exhibitors and 107,000 visitors). Such was the concern that, according to Lambley, it prompted one delegate to crack that GSM should really stand for “God send mobiles”.
Mobiles came in time, but Lambley says some of the first iterations were almost the size of a sewing machine, fantastically heavy and short-lived, with nickel-cadmium batteries that could last for only eight hours. A big change in battery technology was called for, and fortunately lithium batteries came quite quickly. In addition to their higher energy density, these are less of an environmental hazard when discarded. Mobile phones’ first foothold was in the business world, but they were very expensive — both in terms of the devices (a fact partially hidden by wrapping the cost of the phones into airtime contracts) and the calls (if you made a 10-second call, you’d be charged for the full minute, and the concept of bundled calls had yet to arrive).
While it was still unattractive to managers of vehicle fleets (because of the tendency for duplex calling to encourage people to talk far longer than they would when using a half-duplex PTT device, making it easy to rack up a hefty bill), GSM was good at providing national coverage; but national and regional PMR networks based on analogue trunking in Band III began to provide an affordable alternative. GSM also solved the problem of low network capacity that had frustrated early users of analogue systems — when they moved from the area covered by one base station to that covered by another, there would be a switching delay, and if the station was busy the call would drop.
3G’s ‘killer app’
I can’t help but draw parallels with the debate over 5G — it may well be that data-based services are a bit like a gas, in that over time they will quite happily diffuse to fill all the available ‘space’.
Not every technology has succeeded — Lambley recalls Telepoint, “which has pretty much been forgotten… the concept of having low-power base stations in shopping centres, offices and public places. The idea was that you’d subscribe to the network that operated the sites, and if you needed to make a phone call, you could go to one of these points, which had a range of about 100-150 yards around it, and you could make a call with your cordless telephone from home or your office. That was quite exciting at the time, although not enough to make it a big commercial success.”
Of course, it’s not just technology that has changed over the years. Lambley remembers how the telecoms sector’s love affair with consumers began with a paging service that became fashionable among teenagers. For ‘only’ £20 or so, people could buy a subscription-free message pager, and their friends could call a premium telephone number to leave messages. This concept led to the introduction of pay-as-you-go/pre-paid cellular phones. Similarly, marketing and branding took a quantum leap in 1998 when a French manufacturer introduced the first coloured GSM phone – it was a startling shade of lime green. Up until that point, Lambley says the debate was only over what shade of grey or black a phone should be. The lime green phone was to be marketed at teenagers – and when Lambley pointed out to the company that teenagers couldn’t afford mobile phones, the response was simply ‘Well, maybe we can find a way to make them affordable’. The rest is history.
Paging Transmitters 150/900 MHz
The RFI High Performance Paging Transmitter is designed for use in campus, city, state and country-wide paging systems. Designed for use where reliable simulcast systems where RF signal overlap coverage is critical.
Built-in custom interface for Prism-IPX ipBSC Base Controller for remote control, management and alarm reporting.
Prism-IPX Systems LLC.
Back To Paging
Still The Most Reliable Protocol For Wireless Messaging!
No Change in Motorola-Hytera ITC Decision Following Presidential Review
By Danny Ramey, Web Editor Wednesday, January 16, 2019
The presidential review period in Motorola Solutions’ patent infringement suit against Hytera Communications with the International Trade Commission (ITC) passed with no change to the ITC’s final determination.
As a result, exclusion and cease-and-desist orders preventing the importation, sale and distribution of Hytera Digital Mobile Radio (DMR) products found to infringe three Motorola patents went into effect Jan. 16.
In November, the ITC released a final determination confirming an administrative law judge’s (ALJ) initial determination that Hytera infringed several Motorola patents and recommending exclusion and cease-and-desist orders against the infringing products. However, the ITC also overturned the ALJ’s finding that redesigned products submitted by Hytera for the ITC’s approval infringed Motorola patents.
Under ITC rules, the U.S. president, or a representative, has 60 days to disapprove a final determination by the ITC. The ITC’s final determination was issued Nov. 16.
Hytera products affected by the exclusion and cease-and-desist orders are the MD652, MD782, BD302, BD362, BD502, PD412, PD502, PD562, PD602, PD662, PD682, PD702, PD752, PD782, PD792, PD982, X1e and X1p radios, as well as the RD622 and RD982 repeaters.
“The commencement of the importation ban and the rejection of Hytera’s request for a repair and service exception are major steps in holding Hytera accountable for its theft and serial infringement of our patents, technology and innovation,” said Mark Hacker, general counsel and chief administrative officer for Motorola Solutions, said in a statement. “Motorola Solutions welcomes legitimate competition, but it is only legitimate when companies compete on the basis of their own original technologies. We will continue to vigorously defend our intellectual property for the benefit of our stakeholders around the world, and we look forward to presenting our trade secret misappropriation and copyright infringement claims to a jury in Chicago in November.
”Hytera released a firmware update that upgrades existing products to the capabilities of the new, redesigned i-Series products and began selling the i-Series products in place of existing products in November.
“The review is simply the procedural conclusion of a process all parties understood two months ago, and the main takeaway remains that Hytera’s new generation of i-Series DMR radios do not infringe any patents, and we will continue to be able to offer our entire product line in the U.S.,” a Hytera spokesperson said. “The new generation of i-Series products is already available to our dealers and customers, despite Motorola Solutions’ attempts to suggest otherwise. Motorola Solutions’ continued efforts to misinform, rehash and reframe the ITC ruling are aimed at confusing our customers in an ongoing campaign seeking to exclude us from competing in the market. That is why Hytera is suing Motorola Solutions for various forms of anticompetitive conduct under the Sherman Antitrust Act.”
Motorola has also filed theft of trade secrets and patent infringement suits against Hytera in the U.S. District Court for the Northern District of Illinois. The patent infringement suit was put on hold pending the outcome of the ITC case, while the theft of trade secrets case is scheduled to go to trial in November.
Meanwhile, Hytera filed an anticompetitive practices lawsuit in the U.S. District for New Jersey, alleging that Motorola has used a monopolistic scheme including sham litigation to interfere with Hytera’s relationship with distributors and customers and prevent it from competing in the U.S. market. That case was recently transferred to Illinois after a judge determined that it rose out of similar claims to the patent infringement and theft of trade secrets suit and the legal factors favored transfer.
|Source:||Radio Resource Media Group|
I would like to recommend Easy Solutions for Support of all Glenayre Paging Equipment. This Texas company is owned and operated by Vaughan Bowden. I have known Vaughan for over 35 years. Without going into a long list of his experience and qualifications, let me just say that he was the V.P. of Engineering at PageNet which was—at that time—the largest paging company in the world. So Vaughan knows Paging.
GTES is no longer offering support contracts. GTES was the original group from Vancouver that was setup to offer support to customers that wanted to continue with the legacy Glenayre support. Many U.S. customers chose not to use this service because of the price and the original requirement to upgrade to version 8.0 software (which required expensive hardware upgrades, etc.). Most contracts ended as of February 2018.
If you are at all concerned about future support of Glenayre products, especially the “king of the hill” the GL3000 paging control terminal, I encourage you to talk to Vaughan about a service contract and please tell him about my recommendation.
The Wireless Messaging News
The Board of Advisor members are people with whom I have developed a special rapport, and have met personally. They are not obligated to support the newsletter in any way, except with advice, and maybe an occasional letter to the editor.
Can You Help The Newsletter?
You can help support The Wireless Messaging News by clicking on the PayPal Donate button above. It is not necessary to be a member of PayPal to use this service.
Newspapers generally cost
A donation of $50.00 would certainly help cover a one-year period. If you are wiling and able, please click on the PayPal Donate button above.
|Voluntary Newsletter Supporters By Donation|
Premium Newsletter Supporter
Premium Newsletter Supporter
Canyon Ridge Communications
Premium Newsletter Supporter
e*Message Wireless Information Services Europe
Donate to have your company's logo added.
Incyte Capital Holdings LLC
|Product Support Services, Inc.|
Repair and Refurbishment Services
Click on the image above for more info about advertising here.
INTERNET Protocol Terminal
The IPT accepts INTERNET or serial messaging using various protocols and can easily convert them to different protocols, or send them out as paging messages.
An ideal platform for hospitals, on-site paging applications, or converting legacy systems to modern protocols.
Prism-IPX Systems LLC.
Paging Data Receiver PDR-4
The PDR-4 is a multi-function paging data receiver that decodes paging messages and outputs them via the serial port, USB or Ethernet connectors.
Designed for use with Prism-IPX ECHO software Message Logging Software to receive messages and log the information for proof of transmission over the air, and if the data was error free.
Prism-IPX Systems LLC.
Wireless Network Planners
Remote AB Switches
ABX-1 switches are often used at remote transmitter sites to convert from old, outdated and unsupported controllers to the new modern Prism-IPX ipBSC base station controllers. Remotely switch to new controllers with GUI commands.
ABX-3 switches are widely used for enabling or disabling remote equipment and switching I/O connections between redundant messaging systems.
Prism-IPX Systems LLC.
The BlackBerry Device Is 20 Yet Still Full of Potential
Demetris Afxentiou | January 23, 2019
This month, BlackBerry (TSX:BB)(NYSE:BB) is turning 20.
Just to be clear, I’m not talking about the company, which was founded back in 1984, but more the first iconic BlackBerry product, the 850. The device was essentially a pager with a larger screen to accommodate multiple lines of text and, perhaps most importantly, that iconic keyboard. It’s the device that started a movement in both the corporate and consumer market and arguably lit the flame that became the smartphone market we have today.
Since then, that iconic keyboard has been outfitted on a variety of differently sized devices, leading to the current BlackBerry flagship device, the Key2 (which is, in fact, built by and brought to market by a partner and not BlackBerry). Incredibly, despite the constant barrage of criticisms from legions of touchscreen-wielding consumers, there’s still a place in the market, albeit a niche one for that type of device, and it still commands a loyal following of users.
The 20th anniversary of the BlackBerry device is also a time to reflect back on the significant growth that the company has made over the past few years, particularly in transitioning from a hardware-and-software shop to a software-first operation with an emphasis on maintaining privacy and security.
With BlackBerry’s focus no longer directly on devices, the company has branched out in recent years, working on a variety of new projects that are all slated to provide a decade or more of revenue for the company across a variety of fronts. To start, there’s BlackBerry’s secure enterprise software and cybersecurity business, which have thankfully regained focus as foundational elements of BlackBerry’s business under CEO John Chen. The emphasis on security was bolstered further by the $1.4 billion acquisition of Cylance, a leader in the emerging AI-cybersecurity field that was announced last year.
As an example of the potential growth in this field, consider the slew of new IoT devices coming to market every month. Industry experts see the market hitting 20 billion connected devices within the next year, all of which will need security.
Opportunity: QNX can and will power everything
A big portion of BlackBerry’s new focus can be traced back to QNX, which remains one of the main reasons that any tech-seeking investor should contemplate an investment in the company. QNX is the stable, secure, and modular operating system that was pulling the strings behind BlackBerry’s BB10 operating system, but, more importantly, it powers an increasing number of devices, vehicles, and processes across a wide segment of the market.
For example, QNX powers the infotainment systems in over 120 million vehicles around the world, and that pre-existing arrangement with automotive manufacturers, coupled with QNX’s capabilities to manage multiple processes and functions, makes the operating system a great candidate to help power the next generation of autonomous vehicles — something that BlackBerry has shown and demonstrated for some time now.
Here’s another more interesting, often dismissed point: when we think of autonomous vehicles, we often only think of the vehicle itself. We rarely consider the connectivity functions required for one vehicle to relay to another about a traffic incident, or, more importantly, how all of our infrastructures, from land-based centres to traffic lights need to communicate with each other securely.
While upcoming 5G connectivity options will provide the network speed and bandwidth to facilitate this, BlackBerry has already looked deeper towards securing those communications. This is the concept behind a vehicle-to-vehicle and vehicle-to-infrastructure service, which is a key element to building out the smart cities of tomorrow, and BlackBerry, in a subtle announcement last month, stated the availability of service that does exactly that.
Then there are the other areas of the economy that QNX is already heavily invested in and operates in, such as the medical, government, finance, aerospace, power generation, and numerous other fields. To put it another way, if there was ever a reason to be bullish on BlackBerry, particularly over the long term, that time is now.
All that potential started from a small pager with a keyboard 20 years ago.
Few people have… yet some of the greatest minds in the world believe this innovative technology could change the world.
Amazon doesn’t want anyone to know about this top-secret project, but there’s something even Amazon doesn’t know…
One grassroots Canadian company has already begun introducing this technology to the market – which is why legendary Canadian investor Iain Butler thinks they have a leg up on Amazon in this once-in-a-generation tech race.
But you’ll need to hurry if you want to pick up this TSX stock before its name is on everyone’s lips.
FCC’s 28 GHz Auction Ends, $700M+ Raised
The FCC’s 28 GHz auction concluded yesterday after 176 rounds of bidding. 40 entities bid a total of $702,572,410 for 2,965 licenses. 107 licenses received no bids. The auction lasted 38 days.
FCC Chairman Ajit Pai called the first high-band 5G spectrum auction a success and said the next one, for 24 GHz spectrum licenses, would begin soon. “We can’t afford to rest on our laurels—and won’t,” he said. “The FCC will continue to aggressively push more spectrum into the commercial marketplace.”
After the 24 GHz auction, the agency will hold an auction of three more spectrum bands later this year. “By making more spectrum available, promoting the deployment of wireless infrastructure, and modernizing our regulations—the three components of the FCC’s 5G FAST plan—we’ll ensure that American consumers reap the substantial benefits that will come from the next generation of wireless connectivity,” said Pai.
|Source:||Inside Towers newsletter||Courtesy of the editor of Inside Towers.|
Selected portions [sometimes more — sometimes less] of the BloostonLaw Telecom Update and/or the BloostonLaw Private Users Update — newsletters from the Law Offices of Blooston, Mordkofsky, Dickens, Duffy & Prendergast, LLP — are reproduced in this section of The Wireless Messaging News with kind permission from the firm. The firm's contact information is included at the end of this section of the newsletter.
FCC Shutdown Continues
As we reported in a previous edition of the BloostonLaw Telecom Update, the FCC shut down on January 3 as a result of the current lapse in federal government funding. On January 2, the FCC issued a Public Notice announcing how filing and database systems, filing deadlines, regulatory and application fee payments, and transaction shot clocks will be affected. Please refer to the January 2 edition of the BloostonLaw Telecom Update for more information.
Please note that Auction 101 continues as scheduled. Other items reported below may also be affected by the shutdown.
BloostonLaw Contacts: Ben Dickens, John Prendergast, and Sal Taillefer.
FCC To Hold January Open Meeting Despite Shutdown, Considering Announcements Only
On January 23, the FCC released a Public Notice announcing that the next Open Meeting, scheduled for January 30, will be conducted via conference call if the lapse in appropriations continues through January 29. Meeting participants can listen to the “audio only” of the meeting by calling 1-866-233-3841 and using pass code 463377. Call-in capacity may be limited depending on the volume of calls. Callers may call the toll-free number up to ten minutes before the scheduled meeting time.
However, the FCC will not consider the items the items set forth in the January 3, 2019 Tentative Agenda.
BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and John Prendergast.
Senators Reintroduce Robocall Bill
On January 17, U.S. Sens. John Thune (R-S.D.), a member of the Senate Commerce Committee and chairman of the Subcommittee on Communications, Technology, Innovation, and the Internet, and Ed Markey (D-Mass.), also a member of the Commerce Committee and author of the Telephone Consumer Protection Act, this week reintroduced the Telephone Robocall Abuse Criminal Enforcement and Deterrence (TRACED) Act (S. 151).
As we reported when the bill was first introduced in November of last year, the TRACED Act:
“Robocall scams are more than just a nuisance to folks, they’re a shameful tactic to prey on the vulnerable,” said Thune. “The TRACED Act holds those people who participate in robocall scams and intentionally violate telemarketing laws accountable and does more to proactively protect consumers who are potential victims of these bad actors.”
“As Americans continue to suffer an endless stream of harassing spoofed calls and robocalls, the bipartisan TRACED Act will provide every person with a phone much needed relief,” said Markey. “To address the scourge of calls, we need a simple formula: call authentication, blocking, and enforcement, and this legislation achieves all three. I thank Chairman Thune for his continued partnership on this effort, and look forward to seeing this legislation through to its passage.”
FCC Reopens Device Approval System
On January 18, the FCC issued a Public Notice announcing that it will reactivate the Equipment Authorization System (EAS), effective the same day. According to the Public Notice, the decision came after the FCC reviewed its statutory authority, the status of contract obligations, and its lapse in funding plan. While the EAS will be available to the public, no support will be provided by FCC staff.
Applications for certification are reviewed and granted by private sector Telecommunications Certification Bodies (TCBs). The TCBs are required to enter the application and grant of equipment certification into the EAS before the grant becomes effective. The reactivation of the EAS will enable the TCBs to grant equipment certifications, thereby allowing that equipment to be imported and marketed in the United States. The FCC noted that while the EAS will be available to the public, no support will be provided by Commission staff.
However, TCBs will not be able to grant equipment certification for products subject to the pre-approval guidance procedure until the FCC resumes normal operations, because that process requires TCBs to consult with FCC staff before granting certification.
BloostonLaw Contacts: John Prendergast and Richard Rubino.
T-Mobile Announces First Implementation of Robocall Blocking Standards
On January 10, T-Mobile announced that it has implemented the FCC’s STIR/SHAKEN standards for combating robocalls through the launch of a new “Caller Verified” technology. According to a press release from T-Mobile, “[t]hrough the latest Samsung Galaxy Note9 software update, calls on the T-Mobile network to an updated Galaxy Note9 are now Caller Verified, and customers see “Caller Verified” on the incoming call screen when T-Mobile has verified that the call is authentic and not intercepted by scammers/spammers”
As we reported in a previous edition of the BloostonLaw Telecom Update, FCC Chairman Ajit Pai sent letters to major U.S. voice providers demanding they establish concrete plans to protect their customers using the Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR) standards to do so without delay. Under the SHAKEN/STIR framework, calls traveling through interconnected phone networks would be “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. The framework digitally validates the handoff of phone calls passing through the complex web of networks, allowing the phone company of the consumer receiving the call to verify that a call is from the person supposedly making it.
T-Mobile indicated that the technology would roll out to other devices in the near future.
JANUARY 31: FCC FORM 555, ANNUAL LIFELINE RECERTIFICATION FORM. Lifeline service providers are required to re-certify each of their Lifeline customers by the customer’s anniversary date – i.e., 12 months from the customer's service initiation date, or the date when their eligibility was last verified – each year. Form 555 reports the results of the annual rolling recertification process and includes data accuracy certifications. Form 555 is due January 31 to USAC, the FCC, and state regulatory commissions. Due to hurricanes, certain carriers have extensions of this filing requirement, per the FCC’s Hurricane Relief Orders applies.
BloostonLaw Contacts: Gerry Duffy, Mary Sisak, and Sal Taillefer.
FEBRUARY 1: FCC FORM 499-Q, TELECOMMUNICATIONS REPORTING WORKSHEET. All telecommunications common carriers that expect to contribute more than $10,000 to federal Universal Service Fund (USF) support mechanisms must file this quarterly form. The FCC has modified this form in light of its decision to establish interim measures for USF contribution assessments. The form contains revenue information from the prior quarter plus projections for the next quarter. Form 499-Q relates only to USF contributions. It does not relate to the cost recovery mechanisms for the Telecommunications Relay Service (TRS) Fund, the North American Numbering Plan Administration (NANPA), and the shared costs of local number portability (LNP), which are covered in the annual Form 499-A that is due April 1.
BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and Mary Sisak.
FEBRUARY 1: FCC FORM 502, NUMBER UTILIZATION AND FORECAST REPORT. Any wireless or wireline carrier (including paging companies) that have received number blocks--including 100, 1,000, or 10,000 number blocks--from the North American Numbering Plan Administrator (NANPA), a Pooling Administrator, or from another carrier, must file Form 502 by February 1. Carriers porting numbers for the purpose of transferring an established customer’s service to another service provider must also report, but the carrier receiving numbers through porting does not. Resold services should also be treated like ported numbers, meaning the carrier transferring the resold service to another carrier is required to report those numbers but the carrier receiving such numbers should not report them. Reporting carriers are required to include their FCC Registration Number (FRN). Reporting carriers file utilization and forecast reports semiannually on or before February 1 for the preceding six-month reporting period ending December 31, and on or before August 1 for the preceding six-month reporting period ending June 30.
BloostonLaw Contacts: Ben Dickens and Gerry Duffy.
MARCH 1: COPYRIGHT STATEMENT OF ACCOUNT FORM FOR CABLE COMPANIES. This form, plus royalty payment for the second half of calendar year 2018, is due March 1. The form covers the period July 1 to December 31, 2018, and is due to be mailed directly to cable TV operators by the Library of Congress’ Copyright Office. If you do not receive the form, please contact the firm.
BloostonLaw Contact: Gerry Duffy.
MARCH 1: CPNI ANNUAL CERTIFICATION. Carriers should modify (as necessary) and complete their “Annual Certification of CPNI Compliance” for 2019. The certification must be filed with the FCC by March 1. Note that the annual certification should include the following three required Exhibits: (a) a detailed Statement Explaining How The Company’s Operating Procedures Ensure Compliance With The FCC’S CPNI Rules to reflect the Company’s policies and information; (b) a Statement of Actions Taken Against Data Brokers; and (c) a Summary of Customer Complaints Regarding Unauthorized Release of CPNI. A company officer with personal knowledge that the company has established operating procedures adequate to ensure compliance with the rules must execute the Certification, place a copy of the Certification and accompanying Exhibits in the Company’s CPNI Compliance Records, and file the certification with the FCC in the correct fashion. Our clients can forward the original to BloostonLaw in time for the firm to make the filing with the FCC by March 1, if desired. BloostonLaw is prepared to help our clients meet this requirement, which we expect will be strictly enforced, by assisting with preparation of their certification filing; reviewing the filing to make sure that the required showings are made; filing the certification with the FCC, and obtaining a proof-of-filing copy for your records. Clients interested in obtaining BloostonLaw's CPNI compliance manual should contact the firm.
BloostonLaw Contacts: Gerry Duffy
MARCH 1: FCC FORM 477, LOCAL COMPETITION & BROADBAND REPORTING FORM. This annual form is due March 1 and September 1 annually. The FCC requires facilities-based wired, terrestrial fixed wireless, and satellite broadband service providers to report on FCC Form 477 the number of broadband subscribers they have in each census tract they serve. The Census Bureau changed the boundaries of some census tracts as part of the 2010 Census.
Specifically, three types of entities must file this form:
BloostonLaw Contacts: Ben Dickens and Gerry Duffy.
MARCH 1: HIGH COST UNIVERSAL BROADBAND PORTAL FILING. Carriers participating in Connect America Fund (CAF) Phase II, Alternative Connect America Cost Model (A-CAM), Rural Broadband Experiments (RBE), Alaska Plan, and Connect America Fund-Broadband Loop Support (CAF-BLS) programs must file broadband deployment data with USAC where they are building out mass-market, high-speed Internet service. This information includes latitude and longitude coordinates for every location where service is available.
BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and Sal Taillefer.
MARCH 31: FCC FORM 508, CAF-BLS PROJECTED ANNUAL COMMON LINE REQUIREMENT. Each rate-of-return incumbent telecommunications carrier that does not elect voluntary model-based support to provide information needed to calculate the projected annual cost and revenue data for each of its study areas in the upcoming funding year to USAC. This information must be submitted on March 31st of each year, in order for the carrier to be eligible to receive Connect America Fund-Broadband Loop Support (CAF-BLS).
BloostonLaw Contacts: Gerry Duffy, Mary Sisak, and Sal Taillefer.
MARCH 31: FCC FORM 525, CETC LINE COUNTS. Competitive eligible telecommunications carriers (CETCs) are eligible to receive High Cost support if they serve lines in an incumbent carrier’s service area, and that incumbent carrier receives High Cost support. CETCs are eligible to receive the same per-line support amount received by the incumbent carrier in whose study area the CETC serves lines. Unlike the incumbent carriers, CETCs will use FCC Form 525 to submit their line count data to USAC. Form 525 is due by March 31 each year.
BloostonLaw Contacts: Gerry Duffy, Mary Sisak, and Sal Taillefer.
Per the FCC’s shutdown policy, all FCC submissions that would be due during a suspension of operations will be due on the second day of normal operations. Deadlines affected by this policy are marked “TBD” below.
Current member or former member of these organizations.
|THOUGHT FOR THE WEEK|
“The most important thing in communication is hearing what isn't said.”
|VIDEO OF THE WEEK|
|Source:||YouTube||P.S. I like classical music too.|
|Home Page||Directory||Consulting||Newsletters||Free Subscription||Products||Reference||Glossary||Send e-mail|