Categories
Business spam

Louis Vuitton spam

Just emptied around 1,600 spam comments – good ole Akismet. Lots of it is for Louis Vuitton stuff.

I’ve never thought about buying anything from Louis Vuitton. Paying more than twenty quid for any sort of bag seems excessive to me. I was in a taxi in London on Friday and we passed the Louis Vuitton store. The driver said that apparently they just spent £60m on a shop refit! Shows how much profit there is in handbags.

Just took a look at their site – they do a lovely line in men’s clutch bags from £590 though you can pay a lot more. It’s not about the money though is it? 🙂

Categories
broken gear End User phones

50% of smartphones have broken screen

50% of smartphones have a broken screen. This is based on an extensive survey of the six phones in the Davies family.

The sceptics amongst you will say huh, what kind of sample size is that? My response is that we are just a normal family & I’d like to bet that pretty much most of you out there have had a screen go on their phone at some stage or other.

My kids use protective cases for their phones and despite this one of them has just had a crack in their screen. He hadn’t dropped the phone or bashed it in anyway to his knowledge. This isn’t good enough. Glass tech needs to improve.

It might be interesting to conduct a little survey here. How many of you have had a screen break on their phone at some stage? This isn’t a scientific survey but it will be interesting to see the results. I might also ask people to let me know if they have never had a screen break.

Let’s see what the results look like – answers as comments please.

Ciao…

Categories
Business online safety spam

spam blocking strategies

Trefor DaviesI am pretty aggressive in protecting my gmail account from unwanted email. The Timico mail is beyond redemption after years of attending trade shows although my strategy of signing up as The Reverend or Lord Trefor Davies seems to be working. Any mail or phone calls I get for one of those titles gets shoved straight in the bin.

The main problem I have with my trefor.net/gmail account is people wanting to sell me SEO or web development services. Often these emails come with elaborate messaging in the footer telling me that this is absolutely not spam and that they provide an unsubscribe function. However they usually can’t be bothered to find out my name and address the email as Hi. On this basis I tell Google that they are spammers. It gives me pleasure.

I’ve started to add similar emails to my block list on my Microsoft Exchange account. This morning someone I have never heard of from a company I have never heard from invited me to hook up on LinkedIn. I ignored it. This afternoon that same person has sent me a generic mailer addressed to “Hi”. If he went to the effort of looking me up on LinkedIn he might as well have gone that extra step and added my name into the email!

Ciao baby…

Categories
Engineer security

Is Huawei in your network a national security concern?

I am reminded that yesterday’s post on how would Huawei spy on your network has an additional dimension in the UK in that a significant chunk of BT’s 21CN infrastructure is based on the Chinese vendor’s kit. I hadn’t noticed that this hit the headlines a couple of months ago.

The BT Huawei deal would have been based on very attractive commercials spread over the lifetime of the contract. I’ll leave you to draw your own conclusions on its wisdom from a national security perspective. I don’t have any details to suppose there is a risk other than what I already covered yesterday and then I couldn’t assess the level of risk. That’s somebody’s job.

One wonders whether the powers that be might be might at this very moment be redrawing rules of engagement for secure national networks roll-outs. I can’t imagine that UK defence networks touch any part of 21CN anyway. They will be totally separate. Won’t they?

Access to non defence networks that are strategic could also be a problem. For example how are all our power stations connected? The telecommunications infrastructure itself? Imagine if nobody could make a phone call or send an email for a week? How about the oil refineries? No oil = everywhere grinds to a halt. I’m sure you can come up with other scenarios.

I dunno.

PS takes me a while to catch up with the news, I know.

Categories
End User internet security voip

How to tell if a phone call is going to be a scammer

Most people have picked up scam phone call at sometime in their recent short lives. I’ve noticed that they all have similar characteristics in that when you pick up the phone there is always a second or two of silence followed by a foreign voice saying “can I speak to Mr Davies please?” (replace Davies with your own name obv). It’s down to the latency over the internet.

It’s also because they are using some cheapo poor quality VoIP service. Thinking about it, their conversion rate would be much higher if they spent a bit more cash on better quality comms. The quality of their internet access is particularly important although in their case it might not make that much difference as I suspect the packets are traversing the internet for most of their journey. A good quality VoIP provider will hardly touch the internet, if at all.

I’ve adopted the practice, upon hearing the noisy silence before the attempt at a con, of being very familiar “I thought it was you. I wondered when you were going to call”. This tends to confuse them momentarily. All these scammers sound the same to me anyway. It’s probably the bad line but it might always be the same person. Would explain how they always seem to know my name.

That’s how you tell it’s a scammer. It’s all about the noisy silence before they realise you’ve answered the phone.

A public service blog post from trefor.net

Categories
End User internet online safety security

The return of the “virus on your Microsoft PC” scam #speedytechies @TeamViewer

The “you have a virus on your Microsoft PC” scam is back. I thought they had locked up the people responsible and this was dead. Like everything related to the internet crime – spam, botnets they always find a way back.

I got home from work on Friday and took a call from Anna of http://speedytechies.com/. They apparently have thousands of staff servicing thousands of customers every day despite the fact that the website is only around 3 months old. Pretty impressive business growth.

Either that or Anna is lying and she doesn’t work for speedytechies. She sounded as if she was from India or maybe the Philippines – that general part of the world anyway.

http://speedytechies.com/ is owned by a small business based at a residential address in Houston Texas. You can easily find out lots of info about the business and its owner by shelling out a few dollars to an online resource that does this kind of thing. Not worth it because the chances are the scammer has nothing to do with this guy. Slightly suspicious that the website is only 3 months old though.

Anna wanted me to go to www.teamviewer.com so that she could take over my laptop to check out the virus. www.teamviewer.com looks like a legit site though it would be interesting to audit their list of paying customers to get a trail back to the scammers.

Anna gave me a phone number to call back if I had a problem: 18007137734. The line with Anna was not great so it might be wrong and don’t know where it terminates as I’ve not tried ringing it. Her line quality kept disappearing so she was probably using Skype or some similar OTT service.

I guess it would be possible to trace where Anna was calling from and compile a list of times that her ilk had tried the scam. It isn’t easy though for a punter and it would take a concerted effort from a number of stakeholders. It would be easier if the whole world was VoIP but it isn’t. Also the level of individual harm that will probably accrue from a single incident is not worth the effort it would take. This would have to be coordinated on a wide scale to build up a body of evidence for cross border efforts/cooperation to kick in.

That’s all for now. Ciao.

Categories
Engineer internet online safety security

How would Huawei spy on your network?

Last week the talk was about a story about former head of the CIA and the NSA, Michael Hayden, who thinks Huawei are spying on networks that have installed their kit. Link here to the Register story though it appeared in a lot of places.

One has to think about how Huawei might do this without the network operator knowing?

paul sherrattI had a chat about this with one of our networking gurus Paul Sherratt (pic inset – good looking boy) and this is what he had to say:

“They would write traffic tap/backdoor code into pre-shipped FPGA firmware or on an ASIC, hidden from any local intelligence agency code review body.  If for spying/traffic tap function, there would be some safeguards against activating the code if the router believes it is under test/non-production conditions.  There may also be some kind of ‘Hello, I am here’ call-out, which for example may be done by modifying a large DNS request packet contents and padding to the same length to avoid detection by looking at packet headers.

Whether that is even possible will depend on the hardware design – so that should also go through a full review by an intelligence body to determine if pre-shipped chips are an intelligence risk.  If they are, the only way to 100% prevent it happening would be to fully review the ASIC design and manufacture outside of China, which would probably rule out Huawei as a supplier.

It would be easier to implement in software/FPGA firmware, but easier to tackle from a security standpoint.  All software and FPGA firmware would be compiled after intelligence review and installed on network equipment after shipment.  If I were China, I may find it easier to get software engineer spies working for a more ‘trusted’ vendor not imposed with the same level of hardware and software review.”

It’s a tangled web innit? It feels as if we should be looking over our shoulder all the time.

As a footnote I used to work in the chip business. The company I worked for produced military ASICs amongst other things. it was quite common for chip designers to leave little messages or their names etched into the metal layers in empty spaces a chip. I remember once one of the guys leaving the words  “live fast die young” in the corner of a chip. They had to redo the metal mask and re-manufacture the whole chip. It was destined for a high reliability application where the notion of dying young was not too popular! Good times…

Categories
broadband broken gear Business

Broadband speed bits or bytes, no bones broken, just the advertising agency

Broadband speed bits or bytes – ISP PRs gets it wrong

I just lurve it when I see technical cockups in advertising & pr blurb from technical companies selling technical products – broadband sped bits or bytes.

It happened in this blog post ostensibly written by TalkTalk CTO  Clive Dorsman.
Now it’s BTs turn. On page 8 of today’s Times their half page advert tells us that with Infinity for business you will be downloading a big 200Mb file in less than half a minute. That’s because Infinity is “as much as 6 times faster” than the UK average broadband speed which the BBC told us in March of this year is 12Mbps. So a 72Mbps broadand service can download a 200Mb file in under half a minute. By my calcs it should take less than 3 seconds, ok a bit more if you chuck in some packet overhead.

If I were BT I’d get a new advertising agency. This one’s rubbish. Even if you accept that very few people get the max advertised “up to” speed of “Infinity” broadband it would not be unreasonable to say “(up to) less than 5 seconds”.

You can check out our broadband here. According to BT it’s a lot faster than theirs 🙂 Broadband is broadband is broadband, right? Wrong.

Photo is of the BT ad. Serendipity eh. I only read a hard copy paper about once a year. I’m only doing so today cos I’m en route to Laandan on a rare trip without my laptop. ISPA council, AGM & awards. Wish us luck:)

Update 6/7/2014 This subject is getting almost boring as I periodically meet people who get their broadband speed bits or bytes mixed up. When I point out the error of their ways they shrug it off. However to us purists it does matter 🙂

image

This blog post comes to you courtesy of the Samsung Galaxy S4 and the excellent WordPress for Android app.

Categories
End User nuisance calls and messages piracy

08452865284 nuisance call

Just in an ITSPA council meeting and rejected a call from 08452865284. This was a bit of a result as a quick google shows people complaining about answering a call from that number and getting a recorded message.

You may have noticed me posting more stuff like this. I’m going to do it every time I get a spam call for a while as a record for how much I get. Otherwise we have no data on the subject. Lets see how it goes.

Categories
End User nuisance calls and messages

08000641087 – another number to stick in your block list

pirate_flag_thumbAnother scam number for you to stick in your block list is 08000641087.

My 16 year old son had a missed call from these guys 08000641087 and rang my mobile thinking it might have been my office number.

A search reveals that this number comes from LBM Direct Marketing Ltd, a legit organisation that allegedly does telemarketing for O2 and Vodafone amongst others. They may be legit but it doesn’t mean we have to like them. There is a lot out there about this organisation if you Google it or the number.

In the direct mail world I’m sure that legislation was introduced years ago saying that only people who had opted in to receive direct mail could be bombarded with it. It’s about time they introduced a similar system for telephone numbers to replace the TPS.

The returns on cold calling are very low anyway and you wonder why people bother. The job is soul destroying and I doubt that people can stick it for very long. An inbound sales strategy is far more successful. Get people to want to call you and then it is easy.

Btw I know I said to block the number but in reality this is impractical. There are probably thousands of such numbers in use and cold calling organisations can easily change them.

Wonder what this blog is about?

Post on where to complain about nuisance calls and messages here.

Footnote 21/2/2014 since this post was written it has had 9,853 visitors. That’s a lot of people being pestered.

LDM Marketing up to more antics here.

More scam number info here.

Categories
Business nuisance calls and messages Regs

ICO Annual Report and nuisance calls from 08432890049

ICOThe Information Commissioners Office has 355 staff. Hadn’t realised it was such a big outfit. When you think about it with the world moving online and with so much information about us being kept in so many places the ICO has a huge brief. Also the ICO website has been changed from .gov to .org to emphasise its independence.

I know this because I’ve just come from the ICO’s Annual Review at Central Hall in Westminster. Being on the ICO’s Tech Reference Panel and all that!

A lot of meeting was just the presentation of statistics. Did you know that over the past year more than 225,000 people called the ICO’s helpline? Well you do now. There are some big growth areas such as SPAM calls and texts. It’s good to see that the ICO is starting to bare its teeth when it comes to this kind of stuff. We have seen the first two lots of fines (called civil monetary penalties for some reason) to the value of £225k imposed on pest cold callers. These people are just the lowest of the low.

I’ve started to report incidents of spam calls to my own phone – coincidentally got one this morning from 08432890049. I have duly reported it here. If all of us report it every time we get a spam call or text we can at least contribute towards nailing the ones in the UK. The overseas call centres are unfortunately beyond the reach of the ICO. I’ve just started to get rude with them.

You can look at the report yourself here. In line with the ICO’s new green policy the only hard copies available are the ones required to be kept by Parliament. Now there’s a very telling message in itself.

I will leave you with a fact that was related by Commissioner Christopher Graham. The ICO is currently looking at online privacy Ts & Cs. I got the impression that they are looking to try and come up with recommendations for a set of rules that would provide adequate privacy protection for people signing up for new products and services online and who just tick a box to accept conditions imposed. Did you know that if you added up every set of T’s and C’s you accept in this way it would take 77 days if you had to actually read it all? Well now you do 🙂

Categories
Business media online safety

Maria Miller ISP Safety Summit

PortcullisThere’s been a lot in the news about the Government’s Safety Summit where a number of consumer  ISPs and online entities (such as Google) have been asked to attend a meeting to discuss how they can do more to prevent people accessing illegal online child abuse material.

Sometimes when this kind of news hits our screens I don’t bother to comment. It seems like every man and bonzo gets their word in.

It is worth however emphasising a point made this morning by The Today Programme on BBC Radio4 which was that there are two issues here. One is accessing illegal child abuse material and the other is preventing children accessing legal pornography.

Access to illegal online child abuse material is totally wrong and the ISP industry already works to stop accidental access to this stuff via the Internet Watch Foundation which produces a list of sites to be blocked. Most of these sites reside outside the UK and really it needs a concerted global Government effort to take them down. They should discuss it at this week’s G8 Leaders’ Summit.

Consumer ISPs have measures in place to block access to these sites where they are known. However the nature of the internet being what it is all that these measures do is to prevent someone accidentally landing on an illegal page. The determined sicko will easily find a way around the blocks. Interesting to note the BBC report that the Government has actually cut funding in the area of online child protection (CEOP).

There may be a discussion to be had with Google and other search engines (are there any others?) re how they themselves prevent illegal material coming up in search results but it seems to me that the real issue here is how we identify the sites so that they can be included in the IWF list and ultimately taken down.

The issue of how to prevent kids accessing porn is totally separate.

Categories
Business online safety piracy

School connectivity and filtering – google translate

Trefor Davies thumbnail pictureDropped the kids off at school today. I don’t normally do it. It’s out of my way and gets in the way of my early morning swimming regime. It’s the last GCSE so it was only fair that the run in would be comfortable. Let the lad get in the zone.

I mentioned that last night I had sent their headmaster an email. This of course naturally sets off the alarms bells but I explained that I am planning a talk on connectivity trends to a room full of headmasters and school IT staff and thought it would be a good idea to chat to a horse’s mouth. Get my drift.

The car heaved a sigh of relief and someone mentioned the fact that the school had added Google translate to their list of blocked sites. The kids were somewhat puzzled at this and thought it might be to stop them cheating with their French translation homework.

I then explained that it was almost certainly because Google translate could act as a proxy to bypass their school filter. They didn’t know this. Oops. It was also mentioned that it took the school 5 days to realise that FIFA13 was out and to block that.

It goes to show that the whole blocking and filtering game is one of a constant war of attrition. It’s too late for the kids to use Google translate now, not that I want to encourage such things (get yer dictionary out). However you can bet your booties that someone in school will have another way around it, expellable offence or not.

To finish off on a different note a school’s connectivity need is changing. These days pupils need to use video conferencing suites to access lessons given by specialist teachers on other sites, in some schools sixth formers get given iPads for use in lessons and at breaks etc etc. These all add up to the need for more bandwidth, just like it is at home and in the office. Gimme a bell. I can help;)

Categories
Business Cloud internet online safety piracy scams

Should we regulate the cloud?

Today I am at a CIO event in London discussing the topic “Too important to be regulated and too important to be left alone” (Forbes) – Should we regulate the cloud?

You could extend this question to encompass the whole internet. Really there is no difference between the internet and the cloud.

When you think about it, as the whole world drags its living and breathing self into the cloud, it is natural that we should expect laws that exist on terra firma to apply to the cloud. There is no reason why they should not. What is illegal on earth should also be illegal in the heavens. The notion of being robbed or assaulted is just as unattractive in cyberspace as it is in the high street.

It is reasonable therefore that regulations should apply.

Categories
broken gear End User phones

Samsung Galaxy S4 faulty USB socket #SGS4 problem

sgs4My Samsung Galaxy S4 has a faulty USB socket. I got this phone on 13th May 2013. Today is the 30th May 2013. The phone has lasted 17 days (I know, I’m sharp).

dead Samsung Galaxy S4 sgs4The picture of the phone is on the right. Looks dead doesn’t it. That’s because it’s switched off. It isn’t totally kaput yet but it was about to become so. I plugged in the charger but didn’t plug in the charger. It wouldn’t fit in the socket.  I tried three different cables. None of them would go. I tried them in another phone and they all fitted in as designed. Ergo something is wrong with the socket on the SGS4. The highly efficient gang in the Timico logistics department has taken control and are sending it back. I had to switch it off to conserve battery settings before making sure it was fully backed up (it now is) and reset to factory settings so my precious personal data was not accessible to whoever is going to fix it.

Ok I know what you’re saying. S*&t happens. You are right. However it seems to happen on a disappointingly regular basis with the Samsung Galaxy phones. The last one I had, a Galaxy S3 had a problem with the USB socket and separately with the headphone socket. Data transfer was dodgy and the actual charging was very intermittent, It was clearly about to go. I got it fixed. Before then I had a screen go dead on me and “water ingress” problems despite the fact that I know darn well there hadn’t been any water ingress.

I am a Samsung Galaxy fan but I have no hesitation in saying that the build quality on the Samsungs must stink. You’re not telling me I can have had all these problems and I’m the only one. In fact I know I’m not. Having written blog posts about each problem as it happen the “Samsung Galaxy S3 problem” search term in one guise or another has become one of the most popular reasons for people reaching this site. In fact there have been around 51,000 page views on the subject in the last 6 months.

In the meantime this morning I have reverted to my Nokia Lumia 920. It’s functionality is some way behind that of Samsung/Android and even, dare I say it Apple despite not being an Apple fan for unzombie-like reasons (good word structure there). What we need is the Android software running on Nokia build quality. I do accept that I haven’t been running the Nokia much but I did give it a chance for at least a month and in that time it didn’t stop charging, the headphone socket carried on working, oh and it didn’t have a dent in the casing which the SGS4 did after a few days despite, and you have to take my word for it here, me not banging it about or dropping it.

The Samsung build quality is not great. That’s all. Got it off my chest. tune in later for more mobile phone fun and frolics (though I have to get on and revise a guide to migrating to SIP trunks now so it will be a while)

Ciao amigos.

PS to make it easy for those who are interested I’ve pasted links to all the other posts that talk about Samsung Galaxy S2 and S3 problems:

http://www.trefor.net/2012/09/07/samsung-galaxy-s3-factory-reset-phone-not-charging-battery/
http://www.trefor.net/2012/06/17/headset-socket-on-my-samsung-galaxy-s3-is-not-working-audio-problem/
http://www.trefor.net/2012/09/06/samsung-galaxy-s3-not-charging-problem/
http://www.trefor.net/2012/07/06/water-water-everywhere-mobile-phone-water-damage-samsung-galaxy-s2-s3/
http://www.trefor.net/2012/09/26/galaxy-s3-mended-under-warranty-faulty-usb-socket/

Categories
Apps Business mobile apps spam

Slightly disappointing email from Microsoft :) #joshfire

Just had a slightly disappointing junk email from Microsoft. I don’t normally bother opening this “legitimate spam” that pushes a company’s products but the subject line for this one was “Proud partners of the 2013 British & Irish Lions tour to Australia”.

You might guess where my thinking was here. Maybe it was a free draw for a trip to Australia for the Lions Tour. I’m in I thought, clicked and downloaded the pictures. The disappointment came when I read the following:

“Your First Windows 8 app in minutes

Joshfire is an online tool that Microsoft have partnered with to enable you to create a free and simpler than ever Windows 8 app for your business. Simply select a template, then add your existing sources of online content – Flickr for photos, YouTube for videos, blogs, social feeds and so on.

Even better, for the next 6 weeks Joshfire is free. And what’s more, if you’re one of the first 250 to create an app with Joshfire, we will give you a lovely Microsoft British & Irish Lions commemorative toy. ”

Am I alone in thinking that the Microsoft marketing is somewhat off the mark here? A there can’t be that many people developing apps for Windows 8 and B is a lovely commemorative toy the right incentive?

Well as I write this I’m changing my tune from contemptuous disappointment to idle nay vague curiosity so that I can see what it’s all about. After all I do have a Windows 8 PC and a Nokia Lumia 920 Windows 8 phone. I just clicked on the “Create your first Windows 8 app” link. Oops. Got the following screen:

joshfireMy vague curiosity changed back to a disinterested disappointment. No lovely commemorative toy for me eh? Also ah well! I will make it on another Lions tour some day. I went to South Africa on the last one with the Commons and Lords Rugby Club. Had a great time.

Ciao baby.

Categories
End User security

Privacy on London Underground Metropolitan Line #googleglass

hfobd_trust_thumbThe Metropolitan Line on London Underground has nice newish interconnected carriages and you can walk from one end of the train to the other. As we wound our way to Kings Cross for me to catch the train back north I noticed that the carriages were making interesting snake like movements. Very artistic I thought. I’ll video it.

I whipped out my S3 and propping against an upright for some semblance of stability I started recording (action – roll). I do this sort of thing. The first thing that happened was that a girl in the carriage noticed what I was doing and lifted her newspaper up to cover her face. That made me think.

There are obvious privacy issues in doing this although we were in a public place. However if I was wearing Google Glass I would be able to do it without anyone noticing. What is the implication of this? It really means the total end to privacy and anonymity in public places. That girl would not have noticed that I was recording.

I’m not sure there is anything that can be done about it. Maybe some sort of device that blocks other electronic devices from being able to video the space around you. There would have to be a standard for it. Maybe Bluetooth based. Not an easy thing to implement and it would only catch accidental video recording. If someone was hell bent on recording you they would obviously just disable that blocking function. I can imagine videos where lots of people had blurred out faces based on the fact that they have been transmitting blocking signals.

Makes you think dunnit?

Categories
Business spam

Spam

pirate_flag_thumbI like to occasionally click on the unsubscribe link on unsolicited emails, ie spam. It makes me feel better even though I know it isn’t going to make a blind bit of difference to the amount of crap that comes through to my inbox. Sometimes I block the user and sometimes I even respond to them telling them to go away.

I’ve done it on a number of occasions with recruitment firm ComputerFutures who send me no end of rubbish. Including one “consultant” who said he was going to be in North London and would I like to meet for a coffee. I said it was a bit far to come from Newark. I’ve tried unsubscribing from their list as well as individually asking their people to take me off the list but to no avail. The last time was this week when I threatened the sender that if I got another email from his company I would ask all my friends in the industry to blacklist their IP addresses. Probably not hugely ethical but so far I haven’t had another peep from them!

Today  I was merrily blocking and unsubscribing when  I got a  mail from Amanda at Sheffield Chamber of Commerce and Industry. It wasn’t addressed to me personally, ie none of the old familiar Hi Trefor, hope things are well. It was just  “Good morning”. No name (no pack drill either fwiw and whatever one of those is).

Amanda was offering me a “free taster session for her 1 Day Telephone Prospecting Masterclass”. This seemed particularly not well targeted, me being a CTO and all.

I replied to her asking where she got my email address from and got a reply saying she “captured data from a search which includes Companies House, Dunn & Brad Street etc”. There really is no hope for us all. These mailing lists get recompiled from scratch on a dynamic basis. As soon as you unsubscribe from one someone else goes ahead and puts together another and there is no way you can stop it.

I’m pretty sure the Sheffield Chamber of Commerce are a good bunch of people and Amanda is just doing her job but it is a shame there is no way for people to have better targeting. It almost makes Google, Facebook et al seem like good guys. Like it or not at least I am sometimes interested in they chuck my way because as often as not it’s based on my search history.

Amanda does need to adopt some best practices mind you. She offered no unsubscribe link for example. I told her this in a reply and copied one of our sales guys in so that he could give her a call and sell her something. Seemed like the right thing to do. If she becomes a customer I’ll delete this post. Can’t have people writing stuff like this about our customers now can we?

Ciao baby!

Categories
End User online safety surveillance & privacy

Snooper’s Charter update #CCDB – Nick Clegg kills it off

PortcullisIt’s been a week of publicity around the Snooper’s Charter. On Tuesday I attended a meeting with Julian Huppert MP where we talked about what is known about the expected redraft of the Draft Communications Data Bill.

Home Secretary Theresa May is widely expected to include this as an item in the Queen’s Speech on May 8th. If it doesn’t make this Queen’s Speech then it is not likely to happen during this parliament because of the length of time (the outrageous haste of the Digital Economy Act aside) it takes to process the Bills.

There is clearly an appetite at the Home Office to introduce such a law. It was attempted by the last labour Government but withdrawn for a number of reasons, not least of which was the opposition of the Conservative Party. How the heavy mantle of responsibility changes people!

My own view up until now has been if they are going to pass a law anyway then lets minimise the damage. For example although no details have been made available on the contents of the Bill it is believed that the Home Office is desirous of an automated access to the various databases that will be accumulated if this Bill became law. If we keep this as a purely manual interface, where the ISP has to physically hand over data, then there is less likely of mass data loss due to hacking by a 3rd party.
However reading some of the stuff published this week has made me rethink my tactics. The Open Rights Group (and others) letter that appeared on the front page of the Times does ask us to consider what kind of society do we want to live in. Do we want a surveillance state?

The precedent being set would legitimise similar activities around the world in countries that are notionally less democratic than our own and whose purposes are on the face of it likely to be more sinister. I say “on the face of it” but we would have to be very careful of mission creep in the UK.

Content providers operating on a global scale should be very concerned. If UK law said they had to handover private data on their customers’ activities whenever required by the government then their defence for refusing to do so when these requests were made by totalitarian regimes would be removed.

The Home Office has been very secretive about the content of the revised draft of the Bill keeping all briefings very general. My belief is that this is because there will continue to be huge holes in their arguments and they won’t want too much detailed discussion that might derail its inclusion in the Queen’s speech.

It is natural for people to be suspicious when others are keeping secrets. For example it’s like the attitude of most people towards the Masons. In this instance the ORG letter attacks ISPs for supporting the Home Office by maintaining radio silence regarding the details of the Bill.

Although I don’t know for sure I expect most ISPs haven’t seen the detail either. Certainly I doubt that Zen, who have been openly vociferous with concerns about the Bill will have been involved. Of course the bigger the ISPs get the more they have to lose. Some of the bigger ones are known to take neutral stances in respect of proposed legislation because they wouldn’t want the negative PR in their customer base by being seen to cooperate with the government on contentious matters.

On the other hand they need to be seen to be taking a responsible line where law enforcement is concerned. ISPs are after all staffed by human beings. We all want to clamp down on paedophiles and evildoers and always cooperate with requests from law enforcement for help using the existing RIPA system.

The other aspect of this line of debate is also the issue of competition and subsidies. A Freedom of Information request made at the end of last year showed that at least £400m had already been spent by Government on this Bill. A big chunk of this is likely to have gone on equipment in ISP networks. Part of me says “great, the government can pay for Timico to upgrade our own network” but the opportunity cost for us would be huge – diversion of key engineering staff to government projects.
You do have to ask how much of that £400 spend is now contributing towards lower operating costs of larger ISPs and thus increasing their competitiveness.

We still don’t know the detail of the Bill although we don’t have long to wait. In the meantime we can only look for clues. BAE Systems’ Detica who “develop, integrate and manage information intelligence solutions” are known to have been involve in HO meetings re the Bill.

We now have to wait and see but on balance I think this is likely to be a Bill whose disadvantages far outweigh its benefits. Julian Huppert by the way is a good guy. He is of the few technology savvy in a Parliament in which we have a highly dangerous situation: MPs who don’t understand technology voting on technology oriented laws drafted by civil servants who also don’t understand technology.

More when I have it…

Update just a few minutes later:

Looks like this has been killed off – Nick Clegg has come out against it and it will not now appear in the Queen’s Speech. I must say this a good demonstration of common sense and leadership by Nick Clegg which can’t do him any harm in the eyes of the electorate.

Categories
End User mobile connectivity online safety

Unwanted text messages from dodgy outfits

Just had two text messages in this morning. One made me smile. It was from Premier Inn (yes I no longer suffer Travelodge) reminding me of my booking and booking reference number. I thought that was good. “Like”.

The other was from an extremely dodgy looking outfit saying “Government Legislation allows any unaffordable debts to be legally written off. Reply Y for a callback or click www.d-lg.co.uk and use our quick enquiry form”. The number was 07767169003.

Following the link takes you to a really dodgy looking site telling you nothing about who you are talking to. This really annoyed me – the opposite effect of the sms from the Premier Inn.

We the people really do need to get to grips with this.  In fact that statement about Government Legislation must surely be erring on the side of illegal. I think I will explore it and find out more.

Categories
Engineer nuisance calls and messages ofcom voip

Nuisance calls

At last week’s ITSPA Council meeting we discussed nuisance calls. This post on on the subject was written by Pete Farmer, writing in a personal capacity. Pete is the Commercial and Regulatory Manager for Gamma  a wholesale supplier of telecoms services. Pete is a colleague on the ITSPA Council  and chairs their Regulatory Committee. His contact details can be found via his LinkedIn profile.

Nuisance Calls

No-one doubts for a second that silent or abandoned calls – the current focus of Ofcom’s attentions whereby predictive diallers make more calls than they have agents for- are a pain. It is even worse for a vulnerable person to receive a prank call at 3am let alone one where the content is potentially violent or sexual. These are often criminal acts that require decisive action from law enforcement.

What people don’t talk about so much though, is the effect such calls have on businesses. The economic harm as well as the effect on the staff can be commensurate with that suffered in a residential setting.

A business can of course be pseudo-domestic; by which I mean that a plumber, electrician or window cleaner procures their telephony services much as they would at home

Categories
Business spam

Does this person come from the double glazing industry?

Hello
Enterprise Management 360 along with Gartner and IDC will be distributing a comprehensive research on Building bridges with real-time Optimized Data Center Infrastructure Management with key content from Emerson, a leading infrastructure Management Industry

You have been selected out of 100 executives you will also have a No Obligation opportunity to speak with an industry expert to discuss any questions or possible solutions that can help your organisation to maximise your Infrastructure Management.

Please do email me if you have any questions.
Regards,
xxx

Like most of you I get more than my fair share of “legitimate” junk email. I occasionally spend a few minutes unsubscribing from lists but I know it is a futile task. My name is out there. I am a marked man.

It is usually easy to spot true spam should it make it past the trap. This one however is one of the legitimate junk mails that looks like genuine spam.

The text has been lifted verbatim including grammatical errors. How can a business hope to win customers if this is how it speaks to prospects. No name – just Hello. No Obligation opportunity to speak with an industry expert! No unsubscribe link. I wonder how they chose my name out of the 100 executives. Must have been a chance in a million hundred.

I allude to the double glazing industry in the title but I suspect I am being most unfair to the hard working folk in that market sector. I don’t even know why I bothered to write this post but it tickled my fancy and it has given me a break from writing some really interesting stuff on SIP trunks. I have remove the links to protect the innocent.

PS for a No Obligation opportunity to talk about SIP trunks go to the Timico business website – there is a chat line there. Tell em I sent ya 🙂

Categories
Engineer Net security

The Fortigate100D firewall & MPLS networks

Fortigate100DI find it profitable to sit around the development teams. Someone always says “hey Tref come and see this”. On this occasion it was a couple of Fortigate100D firewalls.

Now the cynics amongst you will say so what? A firewall? What’s so interesting about that? I realise that there can be few readers of this blog of that disposition and those that are have probably only stumbled upon it by accident, never to return.

I also realise that it’s not quite the same as saying “hey Tref come and see this Cisco CRS-3 322 Tbps router”. Well we don’t have such a beast at Timico, yet (although it is is surely just a question of time before we need routers of that capacity, Cisco or otherwise). It’s unlikely that the Cisco CRS-3 would have been lying around the lab anyway as it takes up three racks and no doubt a DC hall full of power.

In fact the FortiGate100D is not a particularly high spec firewall at least compared with what you can get. It is however more than adequate for the job it is lined up for which is a network refresh of one of our customer’s MPLS implementations.

It is in the lab being set up and tested prior to roll-out sometime over the next few weeks.  These things don’t want rushing, they want careful planning. That’s probably the single biggest difference between us as an ISP now and when we first started off with just a few hundred ADSL customer and a few Ethernet connections. Planning and project management is a far bigger proportion of the network engineering job now that the straight setting up of the noughts and ones. It’s a discipline that leads to fewer tears later on and I’m all for cutting down on the time spent weeping by engineers.

These particular firewalls are destined for separate London locations on our core network. Once in they won’t see the light of day for a few more years. TTFN.

PS thanks to that fine person Gareth Bryan for this snippet.

Categories
Business security voip

How to make your VoIP secure #fraud

VoIP securityIt’s a pretty simple process to set up your own VoIP phone system. Google “free VoIP server” and you will find links to 3CX or Asterisk. Download their free software and install it on a computer in your office. Sign up for a few SIP trunks from an Internet Telephony Service Provider (eg Timico) and you can be up and running making VoIP phone calls from your Local Area Network in an afternoon. You don’t even need to buy phones. You can download free soft phones that will run on a PC or a smart phone that will work perfectly well over WiFi. The cost is minimal. It’s as simple as that.

Except it isn’t. Now google “VoIP fraud” and

Categories
Engineer online safety security

How to achieve a PCI Compliant network

Trefor DaviesA lot of effort goes into achieving PCI compliance for a network. Without going into huge detail I thought some of you would like to know the type of work we had to do to get the badge.

Implementation of secure LDAP cluster

This consists of a master server and three read-only slaves, the master server is locked down heavily and the read-only slaves are used for applications to authenticate against. All communication is authenticated and encrypted. All of our new systems have been moved over to authenticate against this LDAP cluster.

TACACS+ / RADIUS (2-Factor) authentication front ends

TACACS+ is an authentication protocol used by all our network equipment and passes authentication through to the LDAP cluster. This system was rebuilt to use encrypted communication, a well structured user/group system, and various security features.

RADIUS (2-Factor) was implemented to pass one factor of the authentication back to the LDAP cluster and the second factor back to a Yubi Key server so that Yubi Keys can be used.

Secure VPN, was implemented using

Categories
Business Regs security surveillance & privacy

The Report of the Joint Select Committee on the Draft Communications Data Bill

Report on Draft Communications data BillThe Report of the Joint Select Committee on the Draft communications Data Bill was issued this morning at one minute past midnight. It’s been in the news this morning with the deputy Prime Minister Nick Clegg calling on ministers to rip up their plans and go to “back to the drawing board“.

The 105 page Report concludes that “there is a case for legislation which will provide the law enforcement authorities with some further access to communications data, but that the current draft Bill is too sweeping, and goes further than it need or should.”

I have always said that the right balance between our personal security and our personal privacy needs to be maintained when considering this subject area and this is the tenet of the Joint Select Committee’s recommendations.

Unfortunately some of the basic conclusions of the report do not put the Home Office in a good light. There would appear to be a widespread failure to consult with many of the stakeholders involved, notably on the costs of the project and what might reasonably be achievable in terms of Communications Data capture and storage. In particular it is recommended that the HO will have to carry out a careful cost/benefit analysis and obtain advice and assurances from a wider body of experts than the companies that stand to earn money from devising secure storage solutions.

The committee recommends that the scope of the Bill be significantly reduced to cover only the retention of IP address data and “web logs” although regarding the latter they also “acknowledge that storing web log data, however securely, carries the possible risk that it may be hacked into or may fall accidentally into the wrong hands, and that, if this were to happen, potentially damaging inferences about people’s interests or activities could be drawn. Parliament will have to decide where the balance between these opposing considerations should be struck.

There is also a concern that web log data also contains content, which due to privacy concerns was specifically excluded from the Draft Bill. The committee has asked the Home Office to review whether it is operationally and technically feasible to only retain web logs of certain types of service where those services enable communications between individuals.

Regarding the storage of third party data traversing a CSP’s network it is recommended that the requirement to store such data only after attempts to retrieve the data from the third party be given statutory force. The effectiveness of this considering the overall objective must be questionable historical data is unlikely to be available in a timely manner for specific crime stopping targets.

The recommendations continue with the suggestion that the Home secretary should not have the power to extend the scope of “permitted purposes” of the bill and that indeed this list of purposes should be examined with a view to shortening it.

It is also recommended that the definitions for communications data under RIPA should be reviewed following consultation with industry with a particular focus on what is subscriber data (ie info on me and you) and what is traffic data.

A specialised SPoC (Single Point of Contact) team should be established that provides a central expertise for the approval of RIPA requests. This in theory should prevent misuse of the system – although Local Authorities are not specifically mentioned amongst the authorities that should be able to access the data under discussion here the committee recommends that bodies over and above the six in the Draft Bill should be considered for inclusion based on their case – notably the Financial Services Authority  and the UK Border Agency. Local Authorities, although representing a fairly small proportion of the nearly half a million RIPA requests each year and 20 times more likely to put in a non-compliant request.

Coming back to costs the committee is being polite when it says “that the Home Office’s cost estimates are not robust. They were prepared without consultation with the telecommunications industry on which they largely depend, and they project forward 10 years to a time where the communications landscape may be very different. Given successive governments’ poor records of bringing IT projects in on budget, and the general lack of detail about how the powers under the Bill will be used, there is a reasonable fear that this legislation will cost considerably more than the current estimates.”

It was nice to get a mention myself in para 276 regarding the effect on small CSPs of having to meet the requirements of this Bill.

The commitment to reimburse CPs the necessary cost of complying with the requirements of legislation should also be written into law and not left in any doubt.

Finally  “the figure for estimated benefits is even less reliable than that for costs, and the estimated net benefit figure is fanciful and misleading. It ought not to be used to influence Parliament in deciding on the relative advantages and disadvantages of this legislation. Whatever the benefits of the Bill, they are unlikely to be financial.”

The cost aspects of the recommendations are pretty damning. It would be nice to think that as much effort is put into all legislation as this committee has put into the Draft Communications Data Bill. I’m thinking specifically of the Digital Economy Act but I’m sure there must be others.

I’m not totally comfortable that any safeguards built into the Bill will really work, especially when it is noted that nobody can 100% guarantee the security of the storage of the data. At least on this occasion  the Government is being sent away and told to get their homework right and the subject of security versus proportionality is highlighted as being central to the debate.

That’s all for now. You can read the whole report here. I’m sure I will have missed something. You can also read my other stuff on this subject – use the search box at the top right hand corner of this page. There is a lot of material.

Categories
End User nuisance calls and messages

missed call from 0161 662 6518

Accidentally left my phone on mute and noticed I had missed a call from  0161 662 6518. Hmm  I thought. Who do  I know that lives in Manchester. Might have been someone calling to discuss the Draft Comms Data Bill Report that I am in the middle of reading and digesting.

I googled the number and found that others had had the same missed call. Seems to come from some outfit styling themselves as “Claims Professionals”. Lowest of the low in my view. Glad I missed the call.

Wonder what this blog is about?

Details on whereto complain can be found here.

More info on dodgy phone number stuff here.

ciao…

Categories
End User scams security

Great phishing season

All you anglers out there will appreciate this little phishing effort from “Lloyds Bank”. I picked it up from our spam filter – pleasing to see that it works. I do wonder what percentage of recipients of this kind of email actually fall for it.

This one isn’t a bad attempt though as is the nature of these things they have speled departament wrong & the use of grammar isn’t quite how I like it. Should have worked harder for their English GCSE. They might have got a proper job instead of having to resort to crime. The italics are mine.

The inset photo is of me with a phishing rod on the pier at Whitby, Summer 2008 (fwiw – it’s the nearest I could find that had anything to do with the subject).

Dear Customer,

This is an important Lloyds TSB Bank Security Message. We reviewed your account and we suspect that it may have been compromised. Assuring the security of your account and of Lloyds TSB Bank’s Network is our primary concern. Therefore, as a preventive measure, we have temporarily limited your account. Please take the following steps in order to restore your account access and ensure that your account has not been compromised:

1. Please Download the Login Form attached to your e-mail.

2. Login to your Lloyds TSB Bank account and fill in all required information.

3. We will review your activity to confirm that you are the account holder and we will remove any restrictions placed on your online banking account.

If you choose to ignore our request you leave us no choice but to suspend your online account indefinitely.

IMPORTANT NOTICE: You are strictly advised to match your information rightly to avoid service suspension.

Kind regards,
Lloyds TSB Bank Online Security Departament.

Please send us any scam/phishing emails you have received. Please do not reply to this e-mail. Mail sent to this address cannot be answered. For assistance, log in to your Lloyds TSB Online Bank account and choose the “Help” link on any page.

Copyright Lloyds TSB Bank Plc. 2012 – All rights reserved. Email ID # 705

Categories
Business olympics spam

Unsubscribe UKTI

I’ve just unsubscribed from the UK Trade and Industry mailing list. I think I must have got on it from being at the Global Business Summit at Lancaster House during the Olympics. They need to improve their data base. I’ve just been spammed with an invitation to “Business Hindi for Beginners”.

Previously it was “Meet the Sports and Infrastructure Expert: Russia, Brazil and Israel” and before that it was “Business Japanese for Beginners”. Then it was “Financial, Professional and Business Services Roadshows for the ASEAN region (Singapore, Malaysia, Vietnam, Thailand, Philippines and Indonesia)”.

Maybe I’m being ungrateful because I did have a good day at Lancaster House. I guess it underlines the importance of accurate mailing list demographic data. Never mind. They’re gone now.

Categories
End User security spam

Automated spam calls to mobile – what to do

unwanted automated phone callsThe scam business continues. Just got what I think was another PPI mis-selling call via automated call to my mobile. The originating number was 07588034908. I was expecting a call and was just trying to figure out if this was it at the same time as answering the phone so I missed the first half sentence. I just caught the words “to claim your compensation press 5” so I hit the cancel button.

This is the first time I have had an automated phone call. I stayed with some friends in the USA once and they never used to take a call at home until the person had started to leave a voice mail so they knew who it was. They got so many automated calls it had become a real nuisance.

It started to get like that here to the point that the ICO has begun to address the problem. It may be that the ICO makes headway but I’d like to bet not. The law is complex with many areas where it is not easy to prove guilt. It is also difficult to know whether you have given permission for your number to be called by accidentally not unchecking a box at some stage of an online registration process. The Telephone Preference Service (TPS) certainly doesn’t seem to be effective.

There is more info on this subject on the ICO website here. It covers unwanted marketing calls, texts and faxes and tells you what is and isn’t allowed and what you should do if you get these unwanted communications.

I just registered the above phone number as the source though often these are pre-pay sims where the operator doesn’t know who the owner is. I rang it back but it is obviously just a machine making outbound calls. If we all register incidents as they happen we may at least make some progress.

The PPI mis-selling compensation industry may not be outside the law but the methods used to drum up leads must surely be pretty borderline.