Wireless News Aggregation |
|
Welcome Back To
The Wireless
|
NO POLITICS HERE
This doesn't mean that nothing is ever published here that mentions a US political party—it just means that the editorial policy of this newsletter is to remain neutral on all political issues. We don't take sides.
A new issue of the Wireless Messaging Newsletter is posted on the web each week. A notification goes out by e-mail to subscribers on most Fridays around noon central US time. The notification message has a link to the actual newsletter on the web. That way it doesn’t fill up your incoming e-mail account. There is no charge for subscription and there are no membership restrictions. Readers are a very select group of wireless industry professionals, and include the senior managers of many of the world’s major Paging and Wireless Messaging companies. There is an even mix of operations managers, marketing people, and engineers — so I try to include items of interest to all three groups. It’s all about staying up-to-date with business trends and technology. I regularly get readers’ comments, so this newsletter has become a community forum for the Paging, and Wireless Messaging communities. You are welcome to contribute your ideas and opinions. Unless otherwise requested, all correspondence addressed to me is subject to publication in the newsletter and on my web site. I am very careful to protect the anonymity of those who request it. I spend the whole week searching the INTERNET for news that I think may be of interest to you — so you won’t have to. This newsletter is an aggregator — a service that aggregates news from other news sources. You can help our community by sharing any interesting news that you find.
Editorial Opinion pieces present only the opinions of the author. They do not necessarily reflect the views of any of advertisers or supporters. This newsletter is independent of any trade association. I don't intend to hurt anyone's feelings, but I do freely express my own opinions.
HELP SUPPORT THE NEWSLETTER These are uncertain times.
|
Subscribe Here IT'S FREE * required field
|
Advertiser Index
|
Service Monitors and Frequency Standards for Sale
(Images are typical units, not actual photos of items offered for sale here.)
|
Leavitt Communications |
|
January 18, 2021 About the Critical Messaging Association: Members of the CMA Board are: |
Source: | contact@critmsg.org Gabriele Deska Assistant to CEO |
|
Page last updated on: Sunday, January 17, 2021 New digital protocol Q65SARL News reports WSJT-X version 2.4.0 will introduce a new digital protocol called Q65, which, according to the Quick Start Guide, is designed for "minimal two-way QSOs over especially difficult propagation paths." The Guide said, "On paths with Doppler spread more than a few hertz, the weak-signal performance of Q65 is the best among all WSJT-X modes. Q65 is particularly effective for tropospheric scatter, ionospheric scatter, and EME on VHF and higher bands, as well as other types of fast-fading signals." The new protocol uses 65-tone frequency-shift keying and builds on the demonstrated weak-signal strengths of QRA64, introduced in 2016. User messages and sequencing are identical to those in FT4, FT8, FST4 and MSK144. Q65 employs a "unique tone" to sync time and frequency. "As with JT65, this 'sync tone' is readily visible on the waterfall spectral display," the Guide said. "Unlike JT65, synchronization and decoding are effective even when meteor pings or other short signal enhancements are present. Transmit/receive sequence lengths of 15, 30, 60, 120 and 300 seconds are available. According to the Guide, "Q65 will enable stations with a modest Yagi and 100 W or more to work one another on 6 meters at distances up to ~1,600 kilometres at most times, in dead-band conditions." |
Source: | Southgate |
Paging Transmitters 150/900 MHz The RFI High Performance Paging Transmitter is designed for use in campus, city, state and country-wide paging systems. Designed for use where reliable simulcast systems where RF signal overlap coverage is critical.
Built-in custom interface for Prism-IPX ipBSC Base Controller for remote control, management and alarm reporting.
Prism-IPX Systems LLC.
11175 Cicero Dr., Alpharetta, GA 30022
|
The Wireless Messaging News
The Board of Advisor members are people with whom I have developed a special rapport, and have met personally. They are not obligated to support the newsletter in any way, except with advice, and maybe an occasional letter to the editor.
Can You Help The Newsletter? You can help support The Wireless Messaging News by clicking on the PayPal Donate button above. It is not necessary to be a member of PayPal to use this service.
Newspapers generally cost A donation of $50.00 would certainly help cover a one-year period. If you are wiling and able, please click on the PayPal Donate button above.
|
How Devices Use Wi-Fi to Determine Your Physical LocationCHRIS HOFFMAN @chrisbhoffman
Did you know that laptops and other devices without GPS hardware can determine your precise physical location—with just a Wi-Fi radio? Here’s how this often-overlooked feature of modern “Location Services” works. “Location Services” Is More Than GPSModern operating systems—including iOS, iPadOS, Android, Windows 10, macOS, and Chrome OS—have their own “Location Services” systems built in. When an app—like a map or navigation app, for example—wants to request your location, it doesn’t just access your device’s GPS radio directly. Instead, it asks your operating system’s “Location Services” where you are. Modern Location Services systems use a variety of techniques to find your location. GPS is one of those techniques. But, when a GPS signal or GPS hardware is unavailable—or just too slow—Location Services has other tricks up its sleeve. For example, if your device has a cellular signal, it may triangulate your location based on signals from cellular towers. Based on the relative signal strength from three different cellular towers nearby, they may be able to guess your location pretty closely. However, there’s one other technique that they can take advantage of: scanning nearby Wi-Fi access points. Your IP Address Only Gives Away a General LocationThere’s a good chance that you’ve seen this in action. Let’s say that you’re sitting at your laptop using a web browser, and a website asks for your location in your web browser. You give it access and—great, the website now has your precise location. It’s often good enough to guess your address, although it might be off by a building or two. But your laptop probably doesn’t have GPS built in, so how did that website pin down your physical address so precisely? No, it’s not via your IP address. If you give a website access to your location while you’re using a desktop without Wi-Fi (or a laptop with an Ethernet connection and Wi-Fi disabled), you’ll just see a general estimate of your location. For example, you may see city, state, and country, but nothing down to the precise street level you get with GPS. How Wi-Fi Gives Away Your LocationHere’s how the “Wi-Fi positioning system” works: Your device scans nearby Wi-Fi access points and creates a list of them as well as their relative signal strength in your current location. It then contacts online servers that, essentially, contain a list of Wi-Fi access points around the world and their geographical locations. The database doesn’t just include a list of Wi-FI access point names (SSIDs). The database includes the unique MAC addresses (BSSIDs) of those access points, which normally do not change—even if the Wi-Fi network’s visible name changes. By comparing this list of Wi-Fi networks near you to a known list of access points and their locations, Location Services can guess at your relevant location. And, by comparing the relative signal strengths of the various Wi-Fi networks, Location Services can triangulate your location and, often, precisely determine your location, just as if you were using GPS. Devices might also download and cache some of this data. For example, if they know that you’re in a particular town, they might download and store Wi-Fi information in and around that town so that they can more easily find your location, even if you don’t have a network connection to check the database. But Where Does the Wi-Fi Database Come From?Over a decade ago, Google was gathering data about Wi-Fi networks using its Street View cars. While those cars were driving around and capturing photos of storefronts, houses, and roads, they were also scanning for nearby Wi-Fi networks and saving the Wi-Fi data for use with Location Services. But this applies to more than just Google—Apple, Microsoft, and other companies have their own Location Services systems. Also, it’s not about Street View cars anymore. Google’s Street View cars no longer drive around scanning everyone’s Wi-Fi to keep its databases up to date. Instead, the Location Services software built into your devices continually sends data that keeps these databases up to date. For example, let’s say that you open Google Maps on an Android phone. You have a strong GPS signal—great, your phone knows where you are via GPS. Now, your phone scans your nearby wireless networks and uploads a list of them to Google’s Location Services database along with your current location. Everyone using Location Services is continually updating the database with more current data. Of course, companies promise that this data is anonymous and not connected to any individual. For example, Apple’s Location Services & Privacy policy describes it in this way on an iPhone:
What About Privacy?A Wi-Fi access point’s name and address is public by definition. Your wireless router is constantly broadcasting this information to any device that cares to listen nearby. Again, the databases just get a list of nearby networks, their unique identifiers, and their physical locations. They don’t get any information about who is using these networks or what data is being transferred over WI-Fi. They don’t get any passphrases people need to connect to these networks. Modern operating systems prevent apps and websites from accessing this data unless you give them permission. A website or an app can’t just view the list of nearby Wi-Fi networks and do this calculation on its own. It has to ask your browser or operating system for access to your location, and you can turn down the request. You remain in control. (Of course, desktop software that has full access to your operating system—traditional Windows desktop applications, for example—could access the Wi-Fi data directly. Websites, mobile apps, and apps written using Windows 10’s UWP framework are restricted from accessing this information.) What If You Don’t Want Your Wi-Fi in the Databases?To prevent your own devices from uploading information about their nearby Wi-Fi networks, you’d have to disable Location Services. However, other people near you are almost certainly using Location Services on their phones, and their devices would upload this data. You can prevent your own wireless access point from being captured in some Location Services databases if you like. To opt out of Google’s Location Services database, Google asks you to add “_nomap” to the end of your wireless network’s name, or SSID. For example, if your network is currently “My Network,” you could change it to “My Network_nomap”. However, Google notes that this will only affect Google’s own Location Services database—other providers may not work in the same way. You’ll have to do some research into this if you care to remove it from other Location Services databases, too. We don’t think it’s necessary, but you do have the option. |
Source: | How-To Geek |
PRISM IPX Systems |
|
Easy Solutions |
Providing Expert Support and Service Contracts for all Glenayre Paging Systems. The GL3000 is the most prolific paging system in the world and Easy Solutions gladly welcomes you to join us in providing reliable support to the paging industry for many more decades in the future. Easy Solutions provides cost effective computer and wireless solutions at affordable prices. We can help in most any situation with your communications systems. We have many years of experience and a vast network of resources to support the industry, your system and an ever changing completive landscape.
Please see our web site for exciting solutions designed specifically for the Wireless Industry. We also maintain a diagnostic lab and provide important repair and replacement parts services for Motorola and Glenayre equipment. Call or
Easy Solutions |
GLENAYRE INFRASTRUCTUREI would like to recommend Easy Solutions for Support of all Glenayre Paging Equipment. This Texas company is owned and operated by Vaughan Bowden. I have known Vaughan for over 35 years. Without going into a long list of his experience and qualifications, let me just say that he was the V.P. of Engineering at PageNet which was—at that time—the largest paging company in the world. So Vaughan knows Paging. GTES is no longer offering support contracts. GTES was the original group from Vancouver that was setup to offer support to customers that wanted to continue with the legacy Glenayre support. Many U.S. customers chose not to use this service because of the price and the original requirement to upgrade to version 8.0 software (which required expensive hardware upgrades, etc.). Most contracts ended as of February 2018. If you are at all concerned about future support of Glenayre products, especially the “king of the hill” the GL3000 paging control terminal, I encourage you to talk to Vaughan about a service contract and please tell him about my recommendation. Click on the image above for more info about advertising here. |
INTERNET Protocol Terminal
The IPT accepts INTERNET or serial messaging using various protocols and can easily convert them to different protocols, or send them out as paging messages. An ideal platform for hospitals, on-site paging applications, or converting legacy systems to modern protocols.
Additional/Optional Features
Prism-IPX Systems LLC.
11175 Cicero Dr., Alpharetta, GA 30022 |
Paging Data Receiver PDR-4 The PDR-4 is a multi-function paging data receiver that decodes paging messages and outputs them via the serial port, USB or Ethernet connectors. Designed for use with Prism-IPX ECHO software Message Logging Software to receive messages and log the information for proof of transmission over the air, and if the data was error free.
Prism-IPX Systems LLC.
11175 Cicero Dr., Alpharetta, GA 30022 |
Wireless Network Planners
|
FCC Issues Enforcement Advisory: Radio Users Reminded Not to Use Radios in Crimes01/17/2021 The FCC has released an Enforcement Advisory for licensees and operators across radio services.[Complete text of FCC Enforcement Advisory follows.]
WARNING: AMATEUR AND PERSONAL RADIO SERVICES LICENSEES AND OPERATORS MAY NOT USE RADIO EQUIPMENT TO COMMIT OR FACILITATE CRIMINAL ACTS The Enforcement Bureau (Bureau) of the Federal Communications Commission issues this Enforcement Advisory to remind licensees in the Amateur Radio Service, as well as licensees and operators in the Personal Radio Services, that the Commission prohibits the use of radios in those services to commit or facilitate criminal acts. The Bureau has become aware of discussions on social media platforms suggesting that certain radio services regulated by the Commission may be an alternative to social media platforms for groups to communicate and coordinate future activities. The Bureau recognizes that these services can be used for a wide range of permitted purposes, including speech that is protected under the First Amendment of the U.S. Constitution. Amateur and Personal Radio Services, however, may not be used to commit or facilitate crimes. Specifically, the Bureau reminds amateur licensees that they are prohibited from transmitting “communications intended to facilitate a criminal act” or “messages encoded for the purpose of obscuring their meaning.” 47 CFR § 97.113(a)(4). Likewise, individuals operating radios in the Personal Radio Services, a category that includes Citizens Band radios, Family Radio Service walkie-talkies, and General Mobile Radio Service, are prohibited from using those radios “in connection with any activity which is against Federal, State or local law.” 47 CFR § 95.333(a). Individuals using radios in the Amateur or Personal Radio Services in this manner may be subject to severe penalties, including significant fines, seizure of the offending equipment, and, in some cases, criminal prosecution. 47 U.S.C. §§ 401, 501, 503, 510. Media inquiries should be directed to 202-418-0500 or MediaRelations@fcc.gov. To file a complaint with the FCC, visit https://consumercomplaints.fcc.gov or call 1-888-CALL-FCC. To report a crime, contact your local law enforcement office or the FBI. To request materials in accessible formats for people with disabilities (Braille, large print, electronic files, audio format), send an e-mail to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at (202) 418-0530 (voice), (202) 418-0432 (TTY). Issued by: Chief, Enforcement Bureau |
Source: | ARRL.org |
Brad Dye, Ron Mercer, Allan Angus, Vic Jackson, and Ira Wiesenfeld are friends and colleagues who work both together and independently, on wireline and wireless communications projects. Click here for a summary of their qualifications and experience. Each one has unique abilities. We would be happy to help you with a project, and maybe save you some time and money. Note: We do not like Patent Trolls, i.e. “a person or company who enforces patent rights against accused infringers in an attempt to collect licensing fees, but does not manufacture products or supply services based upon the patents in question.” We have helped some prominent law firms defend their clients against this annoyance, and would be happy to do some more of this same kind of work. Some people use the title “consultant” when they don't have a real job. We actually do consulting work, and help others based on our many years of experience. “If you would know the road ahead, ask someone who has traveled it.” — Chinese Proverb WHAT IS 5G? 5G is the ext generation of wireless networks and promises a mobile experience that's 10x to 100x faster than today's 4G networks. We say the word promise because we're in the early days of 5G. When more smartphones and networks support 5G tech, it will have far-reaching consequences for consumers, from the cars we drive (or that drive us) to the food we eat to the safety of our roads to the ways we shop to the entertainment we share with family and friends. And that doesn't include things we haven't yet imagined because we've never had the capability to unlock those new scenarios. Today, 5G may seem confusing even as it's widely hyped. We're here to help you sort fact from fiction, weed through the acronyms and jargon, and figure out when and how 5G can change the way you live. And we'll keep you from getting caught up in hyperbole — and empty promises. [ source ] |
Remote AB Switches ABX-1 switches are often used at remote transmitter sites to convert from old, outdated and unsupported controllers to the new modern Prism-IPX ipBSC base station controllers. Remotely switch to new controllers with GUI commands. ABX-1
ABX-3 switches are widely used for enabling or disabling remote equipment and switching I/O connections between redundant messaging systems. ABX-3
Common Features:
Prism-IPX Systems LLC.
11175 Cicero Dr., Alpharetta, GA 30022 |
Leavitt Communications |
|
Inside Towers Newsletter |
FCC Warns Personal and Ham Radios Prohibited in Use of Criminal ActsAhead of the inauguration, the FCC’s Enforcement Bureau warned licensees and operators in the Personal Radio Services as well as licensees in the Amateur Radio Service that the agency prohibits the use of these radios to commit or facilitate criminal acts. The General Mobile Radio Service (GMRS) uses channels around 462 MHz and 467 MHz. The most common use of GMRS channels is for short-distance, two-way voice communications using hand-held radios, mobile radios and repeater systems. The bureau said in an advisory it’s become aware of discussions on social media platforms suggesting that certain radio services regulated by the Commission may be an alternative to social media platforms for extremist groups to communicate and coordinate future activities. The bureau recognizes these services can be used for a range of permitted purposes, including speech that is protected under the First Amendment of the U.S. Constitution. “Personal Radio Services and Amateur Service, however, may not be used to commit or facilitate crimes,” states the FCC in the advisory. Specifically, the bureau reminds amateur licensees they’re prohibited from transmitting “communications intended to facilitate a criminal act” or “messages encoded for the purpose of obscuring their meaning.” Likewise, individuals operating radios in the Personal Radio Services are prohibited from using those radios “in connection with any activity which is against federal, state or local law.” Individuals using radios in the Amateur or Personal Radio Services in this manner may be subject to severe penalties, including significant fines, seizure of the offending equipment, and, in some cases, criminal prosecution, according to the agency. To file a complaint with the FCC, visit https://consumercomplaints.fcc.gov or call 1-888-CALLFCC. To report a crime, the agency suggests contacting local law enforcement offices or the FBI. |
Source: | Inside Towers newsletter | Courtesy of the editor of Inside Towers Jim Fryer. Inside Towers is a daily newsletter by subscription. |
BloostonLaw Newsletter |
FCC Releases Additional Auction 904 Educational MaterialsOn January 13, the FCC issued a Public Notice announcing the availability of additional educational materials related to the detailed technology and system design descriptions that must be filed by Rural Digital Opportunity Fund Phase I (Auction 904) long-form applicants. Specifically, these materials include a video tutorial, recommended standards and data fields for wireless coverage maps submitted in ESRI Shapefile format, and an optional template for long-form applicants to submit. These materials are available on the Auction 904 website (www.fcc.gov/auction/904) under the “Education” tab. Long-form applications are initially due January 29, 2021, with additional deadlines for further information. The detailed technical description and the letter of credit commitment letter described in the Public Notice are due February 16 by 6 p.m. BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and Sal Taillefer. HeadlinesFCC Adopts Additional Rules for Digital Opportunity Data CollectionOn January 19, the FCC adopted an Order containing additional rules for the Digital Opportunity Data Collection – a new data collection adopted in 2019 that is intended to be more accurate and robust than the Form 477 data the FCC relies on presently. According to a Press Release, the new rules specify which fixed and mobile broadband Internet access service providers are required to report availability and/or coverage data, and adopt requirements for reporting speed and latency for fixed technologies. The Order also requires fixed broadband Internet access providers to report whether broadband services are offered to residential and/or business customers. Specifically, the Order purports to create standards for collecting broadband deployment data from state, local, and Tribal mapping entities; other federal agencies; and third parties. It also includes a process for providers to submit and respond to challenges to fixed and mobile coverage map data. Among other things, it would require mobile service providers to submit, on a case-by-case basis, either infrastructure information or on-the-ground test data as part of the Commission’s investigation and verification of a mobile service provider’s coverage data. According to a Press Release, this information will also be used to respond to challenges of mobile broadband coverage in a particular area. Mobile providers will be required to submit, for each 4G LTE or 5G NR propagation map they submit, a set of heat maps showing the signal levels from each active cell site. Finally, the Order establishes standards for enforcing data collection requirements and sets a process for continuing the Form 477 data collection as the Commission transitions to the Digital Opportunity Data Collection. Carriers with questions about the Digital Opportunity Data Collection may contact the firm for more information. BloostonLaw Contacts: Ben Dickens, Gerry Duffy, John Prendergast, and Sal Taillefer. Comment Sought on Efficient Use of 12 GHz BandOn January 15, the FCC adopted a Notice of Proposed Rulemaking in which it seeks comment on how to maximize efficient use of the 500 megahertz of mid-band spectrum in the 12.2-12.7 GHz band. According to a Press Release, this action will “advance a conversation as to whether terrestrial mobile wireless service could coexist with existing operations in the band without causing harmful interference to incumbent licensees.” Comment deadlines have not yet been established. Specifically, the FCC seeks comment on whether it is possible to add mobile service throughout the 12 GHz band without causing harmful interference to incumbent satellite and fixed licensees. Interestingly, the Notice draws no tentative conclusions but seeks comment on whether there are technical parameters that would allow additional terrestrial shared used of the band, methods for assigning flexible use rights in the band, and potential sharing mechanisms for the band if coexistence among the incumbent services and new flexible use service is technically feasible. The Notice also seeks comment on whether the public interest benefits of maintaining the current allocations and framework for the band outweigh the potential benefits of accommodating new services in the band. Currently, the 12 GHz band is licensed to Direct Broadcast Satellite (DBS) operators, non-geostationary orbit (NGSO) satellite systems, and fixed service providers—all on a co-primary basis. DISH Network and DirecTV, the two DBS licensees, use this spectrum to provide video programming content to millions of American consumers. The Commission has authorized several NGSO constellations in recent years to operate using this spectrum, in coordination with one-way, fixed Multichannel Video Distribution and Data Service (MVDDS). NGSO and MVDDS services must operate on a non-harmful interference basis with respect to DBS. BloostonLaw Contacts: John Prendergast and Cary Mitchell. Comments on Petitions for Reconsideration of TRACED Act Second Order Due January 29On January 14, the FCC established the pleading cycle for Petitions for Reconsideration of portions of the Call Authentication Trust Anchor Second Report and Order, which implements obligations and deadlines for voice service providers regarding caller ID authentication, and completes implementation of the caller ID authentication provisions of the TRACED Act. Comments are due January 29, and reply comments are due February 8. Specifically, the Order “prohibit[s] intermediate providers and terminating voice service providers from accepting voice traffic directly from any voice service provider that does not appear in the database, including a foreign voice service provider that uses NANP resources that pertain to the United States to send voice traffic to residential or business subscribers in the United States.” CTIA alleges that this prohibition will interfere with international mobile roaming. According to CTIA, “there are a number of hand-offs for a call on its way back to a U.S. consumer, and any one of hundreds of foreign providers could be chosen as the final foreign provider in the call path that interconnects with a U.S. intermediate or terminating provider. If that final foreign provider fails to implement a robocall mitigation program and certify to such in the Commission’s database, all of that foreign provider’s traffic—including legitimate, legal traffic—would be prohibited from reaching the intended recipients under the Foreign Provider Prohibition.” In addition, they argue that foreign service providers that interconnect with U.S. providers would likely fail to register in a timely manner with the robocall mitigation database. VON alleges it will limit foreign carriers who can terminate calls to the US; put US service providers in breach of traffic termination agreements; and is overall unmanageable because carriers cannot check the database (when it exists) in real time. BloostonLaw Contacts: John Prendergast and Cary Mitchell. Law and RegulationFCC Proposes Appeal Process for STIR/SHAKEN Trust Authentication RevocationsOn January 14, the FCC adopted a Notice of Proposed Rulemaking proposing a framework for voice service providers to appeal decisions by the STIR/SHAKEN Governance Authority to revoke Service Provider Code (SPC) tokens. Comment and reply comment deadline have not yet been established. Specifically, the FCC is proposing an oversight role in which it would review the Governance Authority’s token revocation decisions, similar to the role it currently holds in the context of decisions by the Universal Service Administrative Company (USAC). Indeed, the proposes rules would follow the same format as the rules for appealing a decision of USAC. Under the universal service appeals rules, after first seeking internal review by USAC, an aggrieved party may seek review of USAC’s decision by the Commission. The proposed procedure for STIR/SHAKEN Governance Authority decisions would use similar procedural and timing requirements. SPC tokens are issued by the STIR/SHAKEN Policy Administrator, and can be revoked by the Governance Authority. The SPC token permits a voice service provider to obtain the digital certificates it will use to authenticate calls from one of the approved Certification Authorities. The SPC token therefore is a prerequisite for a voice service provider to participate in the STIR/SHAKEN ecosystem, and management of token access is the mechanism by which the Policy Administrator and Governance Authority protect the system from abuse and misuse. Reasons for revoking an SPC can include: 1) compromised credentials, i.e., a voice service provider’s private key has been lost, stolen, or compromised, or a certification authority has been compromised; (2) the voice service provider exits the STIR/SHAKEN ecosystem; (3) the voice service provider fails to adhere to the policy and technical requirements of the system, including the SPC Token Access Policy, funding requirements, or technical specifications regarding the use of STIR/SHAKEN; or (4) when directed by a court, the FCC, or another body with relevant legal authority due to a violation of Federal law related to caller ID authentication. BloostonLaw Contacts: Ben Dickens, Gerry Duffy, Mary Sisak, and Sal Taillefer. FCC Clarifies Pole Attachment RulesOn January 19, the FCC adopted a Declaratory Ruling in which it clarify that it is unreasonable and inconsistent with the Communications Act, the FCC’s rules, and past precedent, for utilities to impose the entire cost of a pole replacement on a requesting attacher when the attacher is not the sole cause of the pole replacement. The Ruling was prompted by a Petition for Declaratory Ruling filed by NCTA in July of 2020, asking the FCC to declare that: (1) pole owners must share in the cost of pole replacements in unserved areas; (2) pole attachment complaints arising in unserved areas should be prioritized through placement on the Accelerated Docket; and (3) the FCC may order a pole owner to complete a pole replacement within a specified time frame or designate an authorized contractor to do so. The FCC noted that the record developed in the proceeding demonstrated that “utilities throughout the country have disparate and inconsistent practices with regard to cost responsibility for pole replacements. Specifically, comments in the record indicate that some utilities may delay needed pole replacements until they receive a request for a new attachment, at which point they allocate the entire cost of the replacement to the new attacher.” The FCC was careful to note that its clarification was narrower than that requested in the NCTA Petition and by commenters supporting the NCTA Petition. Therefore, this Declaratory Ruling is a narrow clarification that when a utility replaces a pole in response to an attachment request, it cannot require the new attacher to pay the entire cost of the pole replacement if it is not solely caused by the new attacher. BloostonLaw Contacts: John Prendergast and Cary Mitchell. FCC Releases Technical Specifications for Reassigned Numbers DatabaseOn January 15, the FCC issued a Public Notice announcing the technical specifications instructing voice service providers how to submit their data for the file containing information about disconnected numbers to the Reassigned Numbers Database. The FCC expects to announce soon when providers must begin reporting disconnection data. The technical specifications can be found here, in Appendix A. In December 2018, the FCC authorized establishment of the Reassigned Numbers Database. Once operational, the Database will allow callers to determine whether a telephone number has been permanently disconnected after a date certain and therefore is no longer assigned to the party the caller wants to reach. SomosGov, Inc. is the Reassigned Numbers Database Administrator. BloostonLaw Contacts: Ben Dickens, Gerry Duffy, and John Prendergast. IndustryFederal-State Joint Board on USF Releases USF Monitoring ReportOn January 15, the Federal-State-Joint Board on Universal Service (Universal Service Joint Board) released the twenty-third report focused on monitoring the impact of various universal service support mechanisms and the method used to finance them. The Monitoring Report incorporates data from several sources, including the National Exchange Carrier Association (NECA) and the Universal Service Administrative Company (USAC). USAC collects information from both contributors to, and beneficiaries of, the Universal Service Fund, including incumbent local exchange carriers (ILECs), competitive eligible telecommunications carriers (competitive ETCs), schools, libraries, and health care providers. NECA, at the direction of the FCC, provides information to USAC used to administer certain aspects of the high-cost program. Section 1 of the report provides an update on industry revenues, universal service program funding requirements, and contribution factors. Sections 2 through 5 provide the latest data on the low-income, high-cost, schools and libraries, and rural health care support mechanisms. Section 6 presents recent Census and Bureau of Labor Statistics data on voice telephony subscribership and expenses taken from the Current Population Survey, the American Community Survey and the Consumer Expenditure Survey as well as data on telephone subscribership by income by state. It also includes data on residential Internet subscribership and expenses. Section 7 includes updated Consumer Price Index data. This entire report is available electronically at http://www.fcc.gov/encyclopedia/federal-state-joint-board-monitoring-reports; the tables of the report are also available separately as spreadsheet files in a single compressed (.zip) format file at this site. DeadlinesJANUARY 31: FCC FORM 555, ANNUAL TELECOMMUNICATIONS CARRIER CERTIFICATION FORM. All Lifeline Program service providers are required to file the FCC Form 555, except where the National Verifier, state Lifeline administrator, or other entity is responsible. Since January 31 falls on a weekend or holiday this year, Form 555 may be filed by February 1. The FCC Form 555 must be submitted to the Universal Service Administrative Company (USAC) electronically via USAC’s E-File (One Portal). Carriers must also file a copy of their FCC Form 555 in the FCC's Electronic Comment Filing System, Docket 14-171, and with their state regulatory commission. The form reports the results of the annual recertification process and non-usage de-enrollments. Recertification results are reported month-by-month based on the subscribers’ anniversary date. BloostonLaw Contacts: Ben Dickens and John Prendergast. FEBRUARY 1: FCC FORM 499-Q, TELECOMMUNICATIONS REPORTING WORKSHEET. All telecommunications common carriers that expect to contribute more than $10,000 to federal Universal Service Fund (USF) support mechanisms must file this quarterly form. The FCC has modified this form in light of its decision to establish interim measures for USF contribution assessments. The form contains revenue information from the prior quarter plus projections for the next quarter. Form 499-Q relates only to USF contributions. It does not relate to the cost recovery mechanisms for the Telecommunications Relay Service (TRS) Fund, the North American Numbering Plan Administration (NANPA), and the shared costs of local number portability (LNP), which are covered in the annual Form 499-A that is due April 1. FEBRUARY 1: FCC FORM 502, NUMBER UTILIZATION AND FORECAST REPORT. Any wireless or wireline carrier (including paging companies) that have received number blocks—including 100, 1,000, or 10,000 number blocks—from the North American Numbering Plan Administrator (NANPA), a Pooling Administrator, or from another carrier, must file Form 502 by February 1. Carriers porting numbers for the purpose of transferring an established customer’s service to another service provider must also report, but the carrier receiving numbers through porting does not. Resold services should also be treated like ported numbers, meaning the carrier transferring the resold service to another carrier is required to report those numbers but the carrier receiving such numbers should not report them. Reporting carriers are required to include their FCC Registration Number (FRN). Reporting carriers file utilization and forecast reports semiannually on or before February 1 for the preceding six-month reporting period ending December 31, and on or before August 1 for the preceding six-month reporting period ending June 30. BloostonLaw contacts: Ben Dickens, Gerry Duffy, and Mary Sisak. FEBRUARY 1: Live 911 Call Data Reports – Non-Nationwide Providers that do not provide coverage in any of the Test Cities must collect and report aggregate data based on the largest county within its footprint to APCO, NENA, and NASNA on the location technologies used for live 911 calls in those areas. Clients should obtain spreadsheets with their company’s compliance data from their E911 service provider (e.g., Intrado / West). BloostonLaw Contacts: Cary Mitchell. MARCH 1: COPYRIGHT STATEMENT OF ACCOUNT FORM FOR CABLE COMPANIES. This form, plus royalty payment for the second half of last year, is due March 1. The form covers the period July 1 to December 31, and is due to be mailed directly to cable TV operators by the Library of Congress’ Copyright Office. If you do not receive the form, please contact Gerry Duffy. MARCH 1: CPNI ANNUAL CERTIFICATION. Carriers should modify (as necessary) and complete their “Annual Certification of CPNI Compliance” for this year. The certification must be filed with the FCC by March 1. Note that the annual certification should include the following three required Exhibits: (a) a detailed Statement Explaining How The Company’s Operating Procedures Ensure Compliance With The FCC’S CPNI Rules to reflect the Company’s policies and information; (b) a Statement of Actions Taken Against Data Brokers; and (c) a Summary of Customer Complaints Regarding Unauthorized Release of CPNI. A company officer with personal knowledge that the company has established operating procedures adequate to ensure compliance with the rules must execute the Certification, place a copy of the Certification and accompanying Exhibits in the Company’s CPNI Compliance Records, and file the certification with the FCC in the correct fashion. Our clients can forward the original to BloostonLaw in time for the firm to make the filing with the FCC by March 1, if desired. BloostonLaw is prepared to help our clients meet this requirement, which we expect will be strictly enforced, by assisting with preparation of their certification filing; reviewing the filing to make sure that the required showings are made; filing the certification with the FCC, and obtaining a proof-of-filing copy for your records. Clients interested in obtaining BloostonLaw's CPNI compliance manual should contact Gerry Duffy (202-828-5528) or Mary Sisak (202-828-5554). Note: If you file the CPNI certification, you must also file the FCC Form 499-A Telecom Reporting Worksheet by April 1. BloostonLaw contacts: Gerry Duffy and Mary Sisak. MARCH 1: FCC FORM 477, LOCAL COMPETITION & BROADBAND REPORTING FORM. This annual form is due March 1 and September 1 annually. The FCC requires facilities-based wired, terrestrial fixed wireless, and satellite broadband service providers to report on FCC Form 477 the number of broadband subscribers they have in each census tract they serve. The Census Bureau changed the boundaries of some census tracts as part of the 2010 Census. Specifically, three types of entities must file this form:
BloostonLaw contacts: Ben Dickens, Gerry Duffy, and Mary Sisak. Calendar At-a-GlanceJanuary February March Mar. 1 – Copyright Statement of Account Form for cable companies is due.
|
|
THIS WEEK'S MUSIC VIDEO |
“One Love”
June 11, 2020
|
Source: |
Best regards, Newsletter Editor 73 DE K9IQY Licensed since 1957 |
Current member or former member of these organizations. | ||||
The National Rifle Association |
MENSA MEMBER |
A Public Library of Paging and Wireless Messaging Information |
Wireless Messaging |
||
|
Critical Messaging Association |
European Mobile Messaging Association Former Board Member |
ZP5TQ Radio Club of Paraguay |
Quarter Century Wireless Association |
|
Back To Paging Still The Most Reliable Wireless Protocol For Emergencies! |
American Association of Woodturners |
U.S. Navy Radioman |
U.S. Navy Radioman Second Class Petty Officer |
Boy Scouts of America National Honor Society |
Creator of the Paging Wheel of Fortune |
National Skeet Shooting Association |
Institute Electrical and Electronics Engineers |
American Radio Relay League |
The Radio Club of America |
Life is good! |
|
CONTACT INFO & LINKS
|
Amateur Radio
|
VETERAN United States Navy |
Home Page | Directory | Consulting | Newsletters | Free Subscription | Products | Reference | Glossary | Send e-mail |