newsletter logo

Wireless News Aggregation

Friday — March 11, 2016 — Issue No. 698

Dear Friends of Wireless Messaging,

Welcome back to The Wireless Messaging News.

For our readers whose native language is not English, “nuff said” is a common expression meaning “enough said” As in: what I have previously said should adequately demonstrate my point.

One reader who previewed my cartoon—and is much smarter them I am—said that I am a “meme.” I had to look it up in Wikipedia:

A meme (meem) is “an idea, behavior, or style that spreads from person to person within a culture.” A meme acts as a unit for carrying cultural ideas, symbols, or practices that can be transmitted from one mind to another through writing, speech, gestures, rituals, or other imitable phenomena with a mimicked theme.

So I guess that isn't a bad thing. Further reading revealed that the word meme originated with Richard Dawkins' 1976 book The Selfish Gene. I have read some of Dawkins' works, but didn't remember this word.

Unfortunately, at my age there are a lot of things that I can't remember.

Since Edward Snowden leaked documents detailing the practices of the NSA and other government agencies, several of the big players on the Internet have incorporated robust encryption to protect their users from “prying eyes.”

As long as we have a warm and fuzzy feeling that our government will always do what's best for us, everything is OK. However, once a government starts to discriminate on the basis of political alignment, religion, or race then it's time to take a stand.

National security can be used as an excuse for overstepping our constitutional rights to privacy, but remember what Adolf Hitler—the democratically elected leader of Germany—did to the Jews!

I can painfully remember seeing signs in a bus station in Virginia, in 1961 saying “White Only” at the water fountain and on the restroom doors.

Can we always trust the government to do the right thing?

I have had agents from secret government agencies come right here to my office and ask for my assistance.

I gave them permission to look through my files, and to search through my computer because I consider myself a patriot, I have no secrets, and I trusted them. Now I wonder. . .

This is why I am sharing several news articles again this week on the Apple vs. FBI issue of private text messages on iPhones. I think it matters—a lot.

What do you think?

Why Apple vs. FBI might be the worst cybersecurity dilemma ever

Vikram Mansharamani
March 11, 2016 at 8:00 AM EST
PBS Newshour

Given the critical importance of both cybersecurity and national security, prioritizing one over the other is no trivial task, writes Vikram Mansharamani Image by Brian Klug via Flickr

Earlier this week, MIT welcomed a distinguished guest to speak as part of its Internet Policy Research Initiative: Robert Hannigan, director of GCHQ, Britain’s version of the National Security Agency . Extending an olive branch to a fiercely skeptical audience, Hannigan tried to clarify the elusive balance between cybersecurity and national security when it comes to encryption.

His talk in Cambridge took place amid a raging legal battle between Apple and the FBI regarding the tech giant’s refusal to unlock an iPhone belonging to one of the San Bernardino shooters. The FBI needs Apple to modify the operating system on the attacker’s phone so that it can gain access to its contents; without doing so, the phone’s contents would be automatically erased after 10 failed attempts to guess the shooter’s password. By circumventing this automatic self-destruct mechanism, an Apple-written “backdoor” to the device would enable the FBI to gain access to the phone by trying every possible password.

Silicon Valley fears that a ruling favorable to the FBI would set a precedent that ultimately undermines the tech industry’s ability to secure its products.

Apple argues that the FBI is imposing an unfair burden on the company and is violating its right to freedom of speech . It’s relying on prior cases in which software code has been deemed a form of speech. Major tech firms including Google, Amazon, Facebook and Microsoft have lined up in support of their traditional rival.

Silicon Valley fears that a ruling favorable to the FBI would set a precedent that ultimately undermines the tech industry’s ability to secure its products. Given that any backdoor access available to law enforcement might be exploited for nefarious purposes, customers might grow wary of using these devices. Ultimately, the move could undermine both the industry’s and the country’s economic interests.

The GCHQ director stressed he did not come to offer a panacea to such dilemmas. Instead, Hannigan argued, solutions would have to be diverse and dynamic to address different contexts and shifting circumstances.

In a controversy that often is framed as a binary (privacy vs. security, backdoor vs. locked), he suggested all involved might benefit from looking beyond a simplified black and white characterization. Engineers asking questions after his talk seemed fiercely skeptical. One cryptographer asked why he shouldn’t include Britain’s spy agency in his “threat model,” given allegations of abuses. Another attendee questioned the director’s assertion that TOR , an anonymous networking tool, was predominantly used by criminals. A third expressed skepticism toward the British courts’ Orwellian distinction between “bulk collection” and “bulk surveillance.”

Edward Snowden speaks to The Guardian newspaper.
Handout photo from The Guardian

The lively debate was a testament to the increased public scrutiny heaped on spying agencies since Booz Allen Hamilton contractor Edward Snowden leaked documents detailing the practices of the NSA and GCHQ. Although many had suspected the scale of these surveillance efforts was enormous — in part thanks to earlier whistleblowers like William Binney and Thomas Drake — Snowden’s files drew public attention to the tension between privacy and large-scale information gathering in the name of security. But how can we debate the tradeoffs between the cybersecurity of individual devices and our national security interests? Aren’t both important?

Given the critical importance of both cybersecurity and national security, prioritizing one over the other is no trivial task.

The case of the San Bernardino shooter’s iPhone has highlighted the intractability of this predicament more clearly than ever. Given the critical importance of both cybersecurity and national security, prioritizing one over the other is no trivial task. Indeed, FBI Director James Comey said it was the “the hardest question I’ve seen in government,” and Hillary Clinton called it the “worst dilemma ever.” Clearly, there are no easy or obvious answers.

Apple supporters argue that mandating restrictions on security would endanger those that rely on the encryption, including journalists and activists in foreign countries. Indeed, as Bloomberg View columnist Eli Lake has pointed out , the U.S. government has helped develop and spread user-friendly encryption technologies for precisely this reason — to support dissidents from China to Russia. Critics argue that such strong encryption enables criminals to communicate without fear of detection.

Given the situation’s complexity, the GCHQ director’s call for open, calm, nuanced public dialogue appears sound. Whenever participants in a debate frame problems in black and white and call for silver bullet resolutions, it’s best to summon the most potent superpower we humans have: empathy. It’s essential that we try to see and feel the perspectives of those with whom we disagree.

It may well turn out, as advocates of tech firms suggest, that there is an unacceptable security tradeoff in accommodating law enforcement’s demands. But it’s also possible the opposite is true — might technology prevent law enforcement from ensuring our safety? So before you dig your heels in to a position and defend it at all costs, try to see the world differently.

Are you in the privacy camp, defending cybersecurity at all costs? How would you feel if you had family members killed in the San Bernardino attack? Or if threats were made today against you or your family?

Or are you convinced that law enforcement should take priority? What if hackers could track your every move, every communication? Would that make you feel safer or more vulnerable?

We humans tend to prefer clearly defined and certain situations rather than more ambiguous ones. Seeing the world through the eyes of those with whom we disagree is one way to appreciate complexities. Indeed, adopting multiple perspectives may offer our best hope for finding common ground. When it comes to cybersecurity, privacy and national security, doing so may lead us, as Hannigan suggested, to a hodgepodge of partial, diverse and impermanent solutions. As unsatisfying as that may seem, it may be the best we can hope for at this point in time.

Taking a step back, analyzing the situation from multiple perspectives and empathizing with those with whom we disagree is the best chance we have to tackle this and the many other conundrums we will increasingly face in the hyper-connected 21st century.

Vikram Mansharamani
Vikram Mansharamani is a lecturer in the Program on Ethics, Politics & Economics at Yale University and a senior fellow at the Mossavar-Rahmani Center for Business and Government at the Harvard Kennedy School. He is also the author of “Boombustology: Spotting Financial Bubbles Before They Burst” and is a regular commentator in the financial and business media

Now on to more news and views.

Wayne County, Illinois

Wireless Messaging News

  • Emergency Radio Communications
  • Wireless Messaging
  • Critical Messaging
  • Telemetry
  • Paging
  • Wi-Fi
wireless logo medium

About Us

A new issue of the Wireless Messaging Newsletter is posted on the web each week. A notification goes out by e-mail to subscribers on most Fridays around noon central US time. The notification message has a link to the actual newsletter on the web. That way it doesn’t fill up your incoming e-mail account.

There is no charge for subscription and there are no membership restrictions. Readers are a very select group of wireless industry professionals, and include the senior managers of many of the world’s major Paging and Wireless Messaging companies. There is an even mix of operations managers, marketing people, and engineers — so I try to include items of interest to all three groups. It’s all about staying up-to-date with business trends and technology.

I regularly get readers’ comments, so this newsletter has become a community forum for the Paging, and Wireless Messaging communities. You are welcome to contribute your ideas and opinions. Unless otherwise requested, all correspondence addressed to me is subject to publication in the newsletter and on my web site. I am very careful to protect the anonymity of those who request it.

I spend the whole week searching the Internet for news that I think may be of interest to you — so you won’t have to. This newsletter is an aggregator — a service that aggregates news from other news sources. You can help our community by sharing any interesting news that you find.

Editorial Policy

Editorial Opinion pieces present only the opinions of the author. They do not necessarily reflect the views of any of advertisers or supporters. This newsletter is independent of any trade association.

Back To Paging


Still The Most Reliable Protocol For Wireless Messaging!



* required field

If you would like to subscribe to the newsletter just fill in the blanks in the form above, and then click on the “Subscribe” button.

There is no charge for subscription and there are no membership restrictions. It’s all about staying up-to-date with business trends and technology.




Can You Help The Newsletter?

left arrow

You can help support The Wireless Messaging News by clicking on the PayPal Donate button above. It is not necessary to be a member of PayPal to use this service.

Reader Support

Newspapers generally cost 75¢ $1.50 a copy and they hardly ever mention paging or wireless messaging, unless in a negative way. If you receive some benefit from this publication maybe you would like to help support it financially?

A donation of $50.00 would certainly help cover a one-year period. If you are wiling and able, please click on the PayPal Donate button above.

Newsletter Advertising


If you are reading this, your potential customers are reading it as well. Please click here to find out about our advertising options.

The Wireless Messaging News
Board of Advisors

Frank McNeill
Founder & CEO
Communications Specialists
Jim Nelson
President & CEO
Prism Systems International
Kevin D. McFarland, MSCIS
Sr. Application Systems Analyst
Medical Center
Paul Lauttamus
Lauttamus Communications & Security
R.H. (Ron) Mercer
Wireless Consultant
Barry Kanne
Paging Industry Veteran
Ira Wiesenfeld, P.E.
Consulting Engineer
Allan Angus
Consulting Engineer

The Board of Advisor members are people with whom I have developed a special rapport, and have met personally. They are not obligated to support the newsletter in any way, except with advice, and maybe an occasional letter to the editor.

Advertiser Index

American Messaging
Critical Alert
Easy Solutions
Hark Technologies
Ira Wiesenfeld & Associates
Leavitt Communications
Preferred Wireless
Prism Paging
Product Support Services — (PSSI)
Paging & Wireless Network Planners LLC — (Ron Mercer)
RF Demand Solutions
STI Engineering
UltraTek Security Cameras
WaveWare Technologies











Be sure your infrastructure is up and running with the ProTek Flex Site Monitor from PageTek.

ProTek Flex—reliable, adaptable, expandable, affordable—and no surprises.




WaveWare Technologies

2630 National Dr., Garland, TX 75041

Now stocking the full line of Daviscomms paging products

New Products

SPS-5v9E Paging System

  • 1 Serial Port Connection
  • 2 Ethernet Connections
  • Browser and Serial Port Configuration
  • TAP, COMP2, Scope, WaveWare SNPP, COMP2, & PET Protocols
  • 2W, 5W Option

DMG Protocol Converter

  • Linux Based Embedded System
  • Up to 4 Serial Port Connections
  • Ethernet Connections
  • Browser Configuration
  • Protocol Conversion
  • Additional Protocols Available Soon

WaveWare Technologies


protect yourself !

Combination, Body, Desk or Dash Camera

Model EH-15 EYE-CAM

Standard Features Include:

  • 2 inch viewing screen
  • IR Night viewing up to 50 feet
  • Super HD Viewing Wide Field of View (140 degrees, 6G lens)
  • Waterproof per IP65 Specification
  • GPS Tracking (standard feature)
  • 64 GB Data Storage (standard feature)
  • 2800 mAh battery for up to 11 hours recording
  • External mini camera
  • Accessory Kit for all normal needs
  • $349.00 each

Call: 662-284-6724 (Jim Tucker)

Email address:
Web site:



Easy Solutions

easy solutions

Easy Solutions provides cost effective computer and wireless solutions at affordable prices. We can help in most any situation with your communications systems. We have many years of experience and a vast network of resources to support the industry, your system and an ever changing completive landscape.

  • We treat our customers like family. We don’t just fix problems . . . We recommend and implement better cost-effective solutions.
  • We are not just another vendor . . . We are a part of your team. All the advantages of high priced full time employment without the cost.
  • We are not in the Technical Services business . . . We are in the Customer Satisfaction business.

Experts in Paging Infrastructure

  • Glenayre, Motorola, Unipage, etc.
  • Excellent Service Contracts
  • Full Service—Beyond Factory Support
  • Contracts for Glenayre and other Systems starting at $100
  • Making systems More Reliable and MORE PROFITABLE for over 30 years.

Please see our web site for exciting solutions designed specifically for the Wireless Industry. We also maintain a diagnostic lab and provide important repair and replacement parts services for Motorola and Glenayre equipment. Call or e-mail us for more information.

Easy Solutions
3220 San Simeon Way
Plano, Texas 75023

Vaughan Bowden
Telephone: 972-898-1119

Easy Solutions

FBI could force us to turn on iPhone cameras and microphones, says Apple

Eddy Cue warns precedent set by San Bernardino case could lead to company being forced to turn users’ smartphones into surveillance devices

Samuel Gibbs
Thursday 10 March 2016 09.33 EST

The FBI have demanded Apple’s help to brute force the passcode of the San Bernardino killer’s iPhone 5C.
Photograph: ZUMA/Rex

If the FBI wins in its case against Apple to help it unlock the San Bernardino killer’s iPhone 5C , it won’t be long before the government forces Apple to turn on users’ iPhone cameras and microphones to spy on them, according to the company’s head of services Eddy Cue.

The FBI has demanded that Apple creates custom software that bypasses certain security features of the company’s iOS to allow law enforcement to brute force the passcode of the gunman’s iPhone 5C.

But according to Apple , making the modifications necessary in this case would set a dangerous precedent in offering backdoors into users’ smartphones.

Cue said to Univision : “Someday they will want [Apple] to turn on [a user’s] camera or microphone. We can’t do that now, but what if we’re forced to do that?

“Where will this stop? In a divorce case? In an immigration case? In a tax case? Some day, someone will be able to turn on a phone’s microphone. That should not happen in this country.”

The FBI is trying to access the locked iPhone of one of the San Bernardino killers and insists it needs Apple’s due to the software protections built into iOS, which require Apple’s unique signature.

But security expert and NSA surveillance leaker Edward Snowden recently said that the FBI’s assertions that only Apple has the capability to unlock the phone is “ respectfully, bullshit ”.

FBI can unlock San Bernardino iPhone, says Snowden — video

Other security researchers have said that for Apple to modify the iOS software of the iPhone 5C to allow the FBI to guess the passcode via a machine without losing data would be a slippery slope.

Apple has the backing of the majority of the technology industry, including Microsoft, Twitter, Facebook and Google, which makes the most-used smartphone operating system, Android.

The case will come to a head this month when Apple and the FBI go to federal court to contest the order. The US government was recently dealt a blow in a similar but unrelated case over the unlocking of an iPhone in New York , which it is currently appealing against.

Apple v the FBI – video explainer

Source: The  

RF Demand Solutions

Codan Paging Transmitters

  • The smart choice for Critical Messaging
  • Proven performance in extreme conditions
  • Trusted by the World's largest mission critical security, military, & humanitarian agencies

Flexible Modern Design:

  • Analog & Digital
  • VHF, UHF & 900 MHz
  • WB, NB, & Splinter Operation
  • Multiple Frequencies & Protocols
  • High Power Output Configuration available
  • Integrates with Motorola & Glenayre Simulcast
  • Compatible with most popular Controllers

 Thousands In Use...

  • Utility Load Demand
  • Healthcare
  • Enterprise

Your US Distributor for Codan Radio Paging Equipment
847-829-4730 / /

Voluntary Newsletter Supporters By Donation

Kansas City


Premium Newsletter Supporter

gcs logo

Premium Newsletter Supporter

Canyon Ridge Communications

canyon ridge

Premium Newsletter Supporter

ProPage Inc.


Newsletter Supporter

Metropolitan Communications


Newsletter Supporter

e*Message Wireless Information Services Europe

Newsletter Supporter

Incyte Capital Holdings LLC
Dallas, Texas

Newsletter Supporter

Le Réseau Mobilité Plus
Montreal, Quebec


Newsletter Supporter

Communication Specialists

communication specialists

Newsletter Supporter

Cook Paging

cook paging

Premium Newsletter Supporter



Premium Newsletter Supporter

Citipage Ltd.
Edmonton, Alberta


Newsletter Supporter

Prism Paging

white stripe


white stripe


  • VoIP telephone access — eliminate interconnect expense
  • Call from anywhere — Prism SIP Gateway allows calls from PSTN and PBX
  • All the Features for Paging, Voice-mail, Text-to-Pager, Wireless and DECT phones
  • Prism Inet, the new IP interface for TAP, TNPP, SNPP, SMTP — Industry standard message input
  • Direct Connect to NurseCall, Assisted Living, Aged Care, Remote Monitoring, Access Control Systems

Product Support Services, Inc.

Repair and Refurbishment Services

pssi logo


Product Support Services, Inc.

511 South Royal Lane
Coppell, Texas 75019
(972) 462-3970 Ext. 261 left arrow left arrow

PSSI is the industry leader in reverse logistics, our services include depot repair, product returns management, RMA and RTV management, product audit, test, refurbishment, re-kitting and value recovery.

Leavitt Communications


Specialists in sales and service of equipment from these leading manufacturers, as well as other two-way radio and paging products:

UNICATIONbendix king

motorola blue Motorola SOLUTIONS

COMmotorola red Motorola MOBILITY spacer
Philip C. Leavitt
Leavitt Communications
7508 N. Red Ledge Drive
Paradise Valley, AZ 85253
Web Site:
Mobile phone:847-494-0000
Skype ID:pcleavitt

STI Engineering
sti header

250W VHF Paging Transmitter

STI Engineering’s RFI-148 250 high performance paging transmitter features true DDS frequency generation that enables precise control and flexibility for a wide range of data transmission applications.

The transmitter is particularly suitable for large simulcast POCSAG and FLEX paging networks and can be used as drop-in replacement of older and obsolete transmitters. The unit has a proven track record in large scale critical messaging systems.

sti tx
  • High power output
    (selectable from 20 W - 250 W)
  • SNMP Diagnostics and alarms
  • Full VHF Band coverage
    (138-174 MHz)
  • DSP precision modulation
  • Integrated isolator
  • Sniffer port for in-rack receiver
  • Remote firmware upgrade capability
  • Software selectable frequency offset
  • Adjustable absolute delay correction
  • Front panel diagnostics
  • Hardware alarm outputs
  • High frequency stability
  • External reference option
  • FCC and ACMA approved
  • CE compliant version in development
sti22 Boulder Road Malaga 6090 Western Australia
Telephone:  +61 8 9209 0900
Facsimile:  +61 8 9248 2833

Leavitt Communications

its stil here

It’s still here — the tried and true Motorola Alphamate 250. Now owned, supported, and available from Leavitt Communications. Call us for new or reconditioned units, parts, manuals, and repairs.

We also offer refurbished Alphamate 250s, Alphamate IIs, the original Alphamate and new and refurbished pagers, pager repairs, pager parts and accessories. We are FULL SERVICE in Paging!

E-mail Phil Leavitt ( ) for pricing and delivery information or for a list of other available paging and two-way related equipment.

black line

Phil Leavitt

leavitt logo

7508 N. Red Ledge Drive
Paradise Valley, AZ 85253

Hark Technologies

hark logo

Wireless Communication Solutions

USB Paging Encoder

paging encoder

  • Single channel up to eight zones
  • Connects to Linux computer via USB
  • Programmable timeouts and batch sizes
  • Supports 2-tone, 5/6-tone, POCSAG 512/1200/2400, GOLAY
  • Supports Tone Only, Voice, Numeric, and Alphanumeric
  • PURC or direct connect
  • Pictured version mounts in 5.25" drive bay
  • Other mounting options available
  • Available as a daughter board for our embedded Internet Paging Terminal (IPT)

Paging Data Receiver (PDR)


  • Frequency agile—only one receiver to stock
  • USB or RS-232 interface
  • Two contact closures
  • End-user programmable w/o requiring special hardware
  • 16 capcodes
  • Eight contact closure version also available
  • Product customization available

Other products

Please see our web site for other products including Internet Messaging Gateways, Unified Messaging Servers, test equipment, and Paging Terminals.

Hark Technologies
717 Old Trolley Rd Ste 6 #163
Summerville, SC 29485
Tel: 843-821-6888
Fax: 843-821-6894
E-mail: left arrow CLICK
Web: left arrow CLICK

Hark Technologies

Preferred Wireless

preferred logo

Terminals & Controllers:
4ASC1500 Complete, w/Spares
3CNET Platinum Controllers
2GL3100 RF Director
1GL3000 ES — 2 Chassis — Configurable
1GL3000 L — 2 Cabinets, complete working, w/spares
35SkyData 8466 B Receivers
1Unipage — Many Unipage Cards & Chassis
10Zetron M66 Transmitter Controllers
15Glenayre Complete GPS Kits
1Glenayre QT6994, 150W, 900 MHz Link TX
3Motorola 10W, 900 MHz Link TX (C35JZB6106)
Link Transmitters:
6Glenayre QT4201 25W Midband Link TX
3Motorola 10W, 900 MHz Link TX (C35JZB6106)
1Motorola Q2630A, 30W, UHF Link TX
VHF Paging Transmitters:
19Motorola Nucleus 125W CNET
6Motorola Nucleus 350W CNET
11Motorola Nucleus 350W NAC
14Motorola Nucleus 125W NAC
1Glenayre QT7505
1Glenayre QT8505
3Glenayre QT-100C
UHF Paging Transmitters:
16Glenayre UHF GLT5340, 125W, DSP Exciter
900 MHz Paging Transmitters:
2Glenayre GLT8200, 25W (NEW)
15Glenayre GLT-8500 250W
4Glenayre GLT 8600, 500W
 Nucleus Power Supplies
 Nucleus NIU, Matched Pairs
 Nucleus GPS Reference Modules
 Nucleus GPS Receivers
 Nucleus Chassis
 Glenayre 8500, PAs, PSs, DSP Exciters
 Glenayre VHF DSP Exciters


Too Much To List • Call or E-Mail

Rick McMichael
Preferred Wireless, Inc.
Telephone: 888-429-4171
(If you are calling from outside of the USA, please use: 314-575-8425) left arrow

Preferred Wireless


Critical Alert

spacer cas logo

Critical Alert Systems, Inc.

Formed in 2010, CAS brought together the resources and capabilities of two leading critical messaging solutions providers, UCOM™ and Teletouch™ Paging, along with lntego Systems™, a pioneer in next-generation nurse call systems. The result was an organization that represented more than 40 years of combined experience serving hospitals and healthcare providers.

CAS was created to be a single-source provider for hospitals and healthcare facilities in need of advanced nurse call and communications technologies.

Unlike our competitors, our product development process embraced the power of software from its inception. This enables us to design hardware-agnostic solutions focused on built-in integration, flexibility and advanced performance.


Nurse Call Solutions

Innovative, software-based nurse call solutions for acute and long-term care organizations.


Paging Solutions

To this day, for critical messaging, nothing beats paging. It’s simply the best way to deliver a critical message.



© Copyright 2015 - Critical Alert Systems, Inc.

BloostonLaw Newsletter

Selected portions of the BloostonLaw Telecom Update, and/or the BloostonLaw Private Users Update — newsletters from the Law Offices of Blooston, Mordkofsky, Dickens, Duffy & Prendergast, LLP — are reproduced in this section with the firm’s permission.

BloostonLaw Telecom UpdateVol. 19, No. 10March 9, 2016

REMINDER: Accessibility Recordkeeping Compliance Certifications Due April 1

On March 4, the FCC issued a Public Notice reminding service providers that are subject to Section 255, 716, or 718 of the Communications Act of their obligation to maintain records of the efforts they take to implement these accessibility requirements, and of their obligation to file their annual recordkeeping certifications and required contact information by April 1, 2016, in the “Recordkeeping Compliance Certification and Contact Information Registry” (RCCCI Registry).

Service providers interested in obtaining assistance with this filing should contact the firm.


Chairman Wheeler and Commissioner Clyburn Propose Lifeline Broadband Revisions

On March 8, FCC Chairman Tom Wheeler and Commissioner Mignon Clyburn issued a “Fact Sheet” summarizing an Order they are circulating with the full commission aimed at “making broadband more affordable for low-income consumers.” According to the Fact Sheet, the proposed Order will be voted on by the full Commission at the March 31 Open Meeting.

Specifically, the draft Order proposes that low income consumers can apply the $9.25 per month support to stand-alone broadband service as well as bundled voice and data service packages. It also proposes minimum service standards, establishes a National Eligibility Verifier, and incorporates a budget mechanism. The Fact Sheet states that the Order:

  • Provides support for robust broadband
    • Allows Lifeline support for stand-alone mobile or fixed broadband Internet access service
    • Lifeline consumers may also receive support for bundling of fixed or mobile voice and broadband
    • Supports mobile voice with unlimited talk through the end of 2019, after which Lifeline providers of mobile services will be required to include broadband as part of any supported service.
    • Support for fixed-only voice service remains in light of ongoing affordability challenges
    • Helps close the homework gap by promoting appropriate Lifeline-supported mobile devices with Wi-Fi functionality
    • Requires a mid-2019 program review and report by the FCC’s Wireline Competition Bureau
  • Ensures that Lifeline subscribers receive services meeting 21st Century needs
    • Sets minimum standards for broadband to enable consumers to fully participate in digital society
    • Fixes speed standard based on what a substantial majority of consumers receive (currently 10 Mbps downloads/1 Mbps uploads)
    • Sets minimum monthly fixed broadband usage allowance standard of 150 GB
    • Phases in minimum standards for mobile broadband service, starting at 500 Megabits per month of 3G data, increasing to 2 gigabits/per month by the end of 2018
    • Requires unlimited minutes for mobile voice service, starting in December 1, 2016, reflecting typical plans in the market
    • Anticipates technological advances in the convergence of mobile voice and data. Support for standalone mobile voice will be gradually phased down over three years: reduced from $9.25 per month to $7.25 on Dec. 1, 2017, $5.25 on Dec. 1, 2018, and no support after Dec, 1, 2019
    • Mobile voice remains eligible for full support as part of a mobile voice and data bundle
  • Frees up the Lifeline marketplace to encourage participation by broadband providers, increasing availability and consumer choice
    • Unlocks Lifeline for broadband services by providing streamlined, nationwide entry for a new category of providers, called Lifeline Broadband Providers
    • Establishes third-party National Eligibility Verifier, reducing cost to providers of verifying subscriber eligibility
    • Modernizes rules to improve program flexibility, reduce burdens, and incentivize participation by providers
  • Builds on 2012 reforms and closes any remaining vulnerabilities to curb waste, fraud and abuse
    • Establishes a National Eligibility Verifier as neutral third-party entity that removes the opportunity for providers to enroll ineligible subscribers
    • Refines list of federal programs that may be used to validate Lifeline eligibility to those that support electronic validation, are most accountable, and best identify people needing support (SNAP, SSI, Medicaid, Veterans Pension, Tribal), along with income-based eligibility
    • Increases transparency by making program data publicly available and understandable, including subscriber counts by provider and uniform disclosure of annual subscriber recertification data
  • Establishes budget mechanism to minimize impact on ratepayers
    • Sets budget of $2.25 billion, indexed to inflation, sufficient to allow for increased participation generated by support for broadband service
    • Requires FCC’s Wireline Competition Bureau to notify Commission when spending reaches 90 percent of the budget and to prepare an analysis of the causes of spending growth, followed by Commission action within 6 months.
    • Maintains current $9.25 monthly household subsidy.

In a statement released shortly after the Fact Sheet, Commissioner O’Rielly expressed some consternation:

It’s impossible to tell whether the “budget mechanism” is actually a budget in any real sense of the word. It is unclear what “Commission action” would take place when spending gets close to the amount specified — would the full Commission get a vote? And what is the rationale to justify increasing spending on this Universal Service program — but not others – by $750 million, an increase of 50%?

More details will become available when the Order itself is actually adopted and released.

FCC Modifies Rural Broadband Experiment Letter of Credit Obligation

On March 9, the FCC issued an Order in which it (i) clarified that price cap carriers can use Phase II model-based support to serve locations in eligible census blocks where the price cap carrier has served or intends to serve a location or locations using Phase I Round 2 incremental support and (ii) made several modifications to the letter of credit (LoC) requirements for recipients of rural broadband experiment support. Although by no means a guarantee, it is possible that future use of these mechanisms may feature these modifications.

With regard to the use of model-based support, the FCC found that, in light of the adoption of the geo-coded location reporting requirement for recipients of Phase II model-based support, if a price cap carrier has served or intends to serve a location or locations using Phase I Round 2 incremental support in a census block where that price cap carrier accepted Phase II model-based support, that price cap carrier may use Phase II model-based support to serve the remaining eligible locations within that census block. This is because, according to the FCC, it would be an inefficient use of Connect America support to permit a price cap carrier to receive both Phase I incremental and Phase II model-based support to serve a single location; however, the price cap carrier may not count the locations it serves using Phase I Round 2 incremental support towards its Phase II obligation to serve a set number of locations within the state. Accordingly, if the price cap carrier is using Phase I Round 2 funding to upgrade, or has already upgraded, specific locations in census blocks that were part of the offer of model-based support, it will need to deploy service to other locations in Phase II eligible census blocks or extremely high-cost census blocks in the state to fulfill its Phase II model-based support obligation to serve a specific number of locations.

With regard to rural broadband experiment LoC requirements, the FCC attempted to reduce the cost of obtaining such instruments by (i) requiring that the LoC only remain open until the recipient has certified that it has deployed broadband and voice service meeting the Commission’s requirements to 100 percent of the required number of locations, and USA has validated that the entity has fully deployed its network and (ii) allowing recipients that have met the 85 percent build-out milestone to obtain a new letter or renew their existing letter of credit so that they are valued at 80 percent of the total support disbursed plus the next year of support until the 100 percent build-out milestone has been met and verified.

LPTV Licensees Continue to Seek Postponement of the Incentive Auction

With less than three weeks before broadcasters eligible to participate in the reverse auction must submit their initial election options, and the March 29 official start date for the incentive auction, we wanted to provide our clients with a roundup of potential legal hurdles that the FCC faces before the auction can commence.

Videohouse Appeal

The Videohouse is a Pittsburgh-area LPTV licensee that is challenging the FCC’s determination that only licensees of stations that had a full-power or Class A low-power license or pending application for a license as of February 22, 2012, have a statutory right to repacking protection and eligibility to participate in the incentive auction. The Media Bureau’s ruling was upheld by the Commission in an Order on Reconsideration that the FCC released on February 12, 2016.

In brief, the FCC in its Incentive Auction Report and Order extended repacking protection (and auction eligibility) to current Class A stations that had a Class A construction permit or application for a permit on file as of February 22, 2012, as a matter of discretion . In other words, the FCC had to draw a line somewhere, and it chose February 22, 2012 ( i.e., the date that the Spectrum Act became law), as the eligibility cut-off date. Even through Videohouse subsequently obtained its Class A license, it did not file an application to convert its LPTV station to Class A status until January of 2013 (i.e., almost a year after the FCC’s cutoff date). Thus, the FCC has determined that Videohouse does not qualify under its discretionary standard for auction eligibility.

Videohouse has filed a Petition for Stay with the DC Circuit and the DC Circuit has received responsive pleadings from the FCC, as well as amicus curiae (friend of the court) briefs from broadcasters who want to auction to proceed on schedule, as well as other LPTV interests who want to delay the auction until the Court can address the merits of Videohouse’s case. Oral argument for the case has been scheduled for May 9, which is 40+ days after the scheduled March 29 start date of the incentive auction. Thus, unless the court grants the stay request, a victory on the merits would be a hollow one. The FCC could choose to postpone the start of the incentive auction until after the court issues its ruling on the merits of the Videohouse’s arguments, but it has shown no inclination to do so, suggesting the FCC believes it holds a strong hand. Videohouse has asked the Court to issue a ruling by Friday, March 11th, but the Court is under no obligation to meet that deadline.

Latina Appeal

Latina Broadcasters is a minority- and female-owned LPTV license that is situated somewhat differently than The Videohouse. For its part, Latina claims the FCC discriminated against its Daytona Beach LPTV station, when it reversed its original decision that it was eligible to participate in the incentive auction, but allowed another similarly situated LPTV station in Los Angeles to participate.

Latina purchased LPTV station WDYB (which had previously secured Class A status on channel 28) in November of 2010, and a year later it filed for a construction permit to construct broadcast facilities on in-core channel 14. According to Latina, FCC Media Bureau staff instructed it to file its application on a low power station form, and said it would be able to convert the facility back to Class A status when it filed a license application. In November of 2012 ( i.e., nine months after the FCC’s incentive auction eligibility cutoff date), Latina filed for its license and application to convert to Class A status, which the FCC granted in October of 2014. In its June 2014 incentive auction Report and Order, the FCC did not protect previously out-of-core Class A eligible stations that had obtained in-core channels prior to February 22, 2012. However, it made a single exception for KHTV, an LPTV station in Los Angeles. The FCC subsequently issued a Second Order on Reconsideration and Declaratory Ruling in June of 2015 extending auction eligibility and repacking protection to stations in addition to KHTV that hold a Class A license today and that had an application for a Class A construction permit pending or granted as of February 22, 2012. Latina believes that Station WDYB met both of these criteria.

In the Declaratory Ruling, and on a number of other occasions in 2015, the FCC affirmed that WDYB was among those stations entitled to protection. All the time believing its station was eligible, Latina timely filed an application to participate in the reverse auction. Then in an Order for Reconsideration released on February 12, 2016, the FCC clarified its eligibility criteria and concluded that WDYB was not eligible for the incentive auction because the current licensee (Latina) was not pursuing Class A status as of February 22, 2012. Moreover, the FCC said it its June 2015 Declaratory Ruling was not intended to pre-judge the outcome of pending reconsideration petitions regarding the scope of protection.

Latina is also challenging the FCC’s February 2016 Order on Reconsideration before the DC Circuit, and it filed a request for stay of the incentive auction with the Court at the end of February, just days after the Media Bureau denied Latina’s request to stay the March 29 auction on its own motion. In denying Latina’s request, the Bureau said that denying the stay would not cause irreparable harm, one of the legal tests for a stay, because the station would not have to go off the air. The Bureau also concluded that granting the stay would harm others. Latina has also requested that the Court issue a ruling on its motion for stay by March 11.

The stakes for Latina — and its incentive to litigate this to the death — are very high because the opening bid price for WDYB going off the air would have been over $87 million. While there are no guarantees that Latina would have won, or that it would be able to get this top price, the company won’t be eligible for any compensation if it isn’t allowed to participate in the auction.

Mako Communications and Free Access & Broadcast Telemedia

Mako Communications, LLC is the licensee of 31 LPTV stations, the majority of which are in the top 30 US markets. The company is lead petitioner in another DC Circuit case that is challenging what Mako sees as the FCC’s “subordination” of LPTV broadcasters’ rights to other “more favored” interests. Free Access & Broadcast Telemedia, LLC is another LPTV licensee that has filed as an intervenor in support of Mako.

It is undisputed that the FCC grants LPTV licenses with secondary (as opposed to primary) status, which means that LPTV licensees cannot cause harmful interference and must accept such interference from other licensed primary status spectrum users. The gist of Mako’s arguments are that the FCC acted illegally by promulgating spectrum auction rules subordinating LPTV licensees to spectrum users well beyond full power and Class A television, that the auction rules effectively “revoke” Mako’s broadcast licenses and terminate LPTV broadcasters’ license rights en masse without proper administrative due process through adjudication.

Mako’s challenge is a much more broad one, and would appear to have the least likelihood of success on the merits. The FCC has repeatedly rejected arguments that seek to raise LPTV’s secondary status to something greater. If successful, a reclassification of LPTV as having secondary status, but still being entitled to protection from other non-broadcast operations (such as new commercial wireless licensees) would significantly expand the pool of licensees entitled to receive a share of the incentive auction proceeds. A LPTV advocacy group known as the LPTV Spectrum Rights Coalition has estimated that an additional $1 billion would be needed to need to protect and help relocate LPTV and TV translators, which currently have secondary status.

These and other LPTV licensees and their advocates have been furiously battling the FCC and are seeking to delay the auction through the courts and in Congress so they may have greater leverage in seeking repacking rights and a share of auction proceeds. However, as we have reported over the past few months, the FCC seems to be confident in its legal positions, and we are not aware of any inclination among members of Congress to change the status quo, which does not protect LPTV or TV translators.

Law & Regulation

Eshoo Introduces Robocall Bill to Protect Individuals with Federal Loans

On March 4, Congresswoman Anna G. Eshoo (D-Calif.), Ranking Member of the Communications and Technology Subcommittee, introduced legislation to protect anyone with a federal loan ( e.g., student loans, mortgages, veteran’s loans, farming loans) from unwanted robocalls and texts, specifically to their mobile phones. The Help Americans Never Get Unwanted Phone calls (HANGUP) Act rescinds a recently enacted provision in the Budget Act of 2015 exempting debt collectors from longstanding law that has prohibited them from robocalling without consent the mobile phones of those who have a debt owed or guaranteed by the federal government. The Telephone Consumer Protection Act (TCPA) has provided statutory protection to consumers until now.

“We’ve all experienced the highly annoying dinner hour robocall with a prerecorded message,” Eshoo said. “Phone harassment was stopped by the 1991 Telephone Consumer Protection Act, but the provision in the Budget Act of 2015 has rolled back important consumer protections in TCPA. The exemption allows private debt collectors to conduct robocalls and send texts to mobile phones for debt owed or guaranteed by the federal government. The HANGUP Act restores critical protections for consumers by establishing a statutory roadblock to unwanted robocalls and texts.”

FCC Fines Net One $1.6 Million for Cramming

On March 9, the FCC announced a $1.6 million fine against Net One International, a Florida-based long distance carrier, for billing consumers for unauthorized charges and fees — a.k.a. “cramming.” According to a press release, the FCC’s Enforcement Bureau reviewed over 100 consumer complaints filed with the agency as well as the Better Business Bureau against Net One. Consumers complained that Net One continued to charge them for services and “late fees” after they cancelled service and paid all final bills. Net One then refused to let consumers close their accounts until they paid these unauthorized charges and fees. In many cases, consumers contacted Net One repeatedly about the unauthorized billings, but were unable to resolve the issue until after they filed a complaint. Net One continued to engage in cramming despite repeated warnings from the FCC that such actions violated the law.

The Forfeiture Order issued affirms a Notice of Apparent Liability for Forfeiture that was issued by the FCC in July 2014.

FCC Provides Limited Compensation Rate Relief for Small VRS Providers

On March 1, the FCC adopted a Report and Order “provid[ing] limited compensation rate relief for video relay service (VRS) providers with 500,000 or fewer monthly minutes (smallest VRS providers).” Specifically, for the 16-month period beginning July 1, 2015, and ending October 31, 2016, the FCC directed the administrator of the Interstate Telecommunications Relay Services Fund (TRS Fund) to pay compensation to such providers at a rate of $5.29 per minute; for the period from November 1, 2016, to April 30, 2017, a rate of $5.06 per minute; and for the period from May 1 to June 30, 2017, a rate of $4.82 per minute.

In 2013, the FCC adopted a four-year schedule that gradually adjusts the VRS compensation rates downward every six months, beginning July 1, 2013, and ending June 30, 2017. The net effect of the FCC’s Report and Order of March 1 is to temporarily “freeze” the compensation rates of providers handling 500,000 or fewer monthly minutes on this four-year glide path for 16 months. The FCC found that, among other considerations, “available financing arrangements will not permit [these providers] to maintain operations indefinitely in accordance with the FCC’s minimum TRS standards while continuing to operate at a loss.” As such, the FCC concluded that it should temporarily halt the scheduled reduction in the VRS compensation rates applicable to the smallest VRS providers, in order to permit them “a reasonable opportunity to grow and to attain efficiencies comparable to those of larger VRS providers.”


Verizon Settles “Supercookie” Investigation, Requires Consumer Opt-In for Third Parties

On March 7, the FCC announced a settlement resolving an investigation into Verizon Wireless’s practice of inserting unique identifier headers called “supercookies” into its customers’ mobile Internet traffic without their knowledge or consent. These unique, undeletable identifiers — referred to as UIDH — are used to identify customers in order to deliver targeted ads from Verizon and other third parties. As a result of the investigation and settlement, Verizon Wireless is notifying consumers about its targeted advertising programs, will obtain customers’ opt-in consent before sharing UIDH with third parties, and will obtain customers’ opt-in or opt-out consent before sharing UIDH internally within the Verizon corporate family.

The investigation began in December of 2014 to determine whether Verizon Wireless failed to appropriately protect customer proprietary information and whether the company failed to disclose accurate and adequate information regarding use of UIDH, in violation of the FCC’s 2010 Open Internet Transparency Rule and Section 222 of the Communications Act. The investigation found that Verizon Wireless began using UIDH as early as December 2012, but failed to disclose this practice until October 2014. Although Verizon Wireless claimed that it was unlikely third parties would use the UIDH’s for any reason, news reports claimed in January 2015 that a Verizon Wireless advertising partner used UIDH for unauthorized purposes — specifically, restoring cookie IDs that users had cleared from their browsers by associating them with Verizon Wireless’s UIDH, in effect overriding customers’ privacy choices. It was not until late March 2015, over two years after Verizon Wireless first began inserting UIDH, that the company updated its privacy policy to disclose its use of UIDH and began to offer consumers the opportunity to opt-out of the insertion of unique identifier headers into their Internet traffic.

Under the terms of the settlement, the company must also pay a fine of $1,350,000 and adopt a three-year compliance plan.

Comcast Gets Net Neutrality Complaint Over Zero Rating

On March 8, non-profit public interest group Public Knowledge filed a complaint with the FCC regarding Comcast's Stream TV service. Specifically, the complaint alleges that Comcast excludes Stream TV traffic from its own data cap, which is both a violation of its merger agreement and counter to the FCC's Open Internet rules. Stream TV is a $15 per month offering for Xfinity internet customers. It includes local channels, some basic cable, HBO, and the use of a cloud DVR.

In a statement, Public Knowledge's senior staff attorney said “Comcast's actions could result in fewer online video choices for viewers nationwide, while increasing its dominance as a video gatekeeper. If its behavior persists, prices will go up, the number of choices will go down, creators will have a harder time reaching an audience, and viewers will have a harder time accessing diverse and independent programming.”


MARCH 31: INTERNATIONAL CIRCUIT CAPACITY REPORT. No later than March 31, all U.S. international carriers that owned or leased bare capacity on a submarine cable between the United States and any foreign point on December 31, 2015 and any person or entity that held a submarine cable landing license on December 31, 2015 must file a Circuit Capacity Report to provide information about the submarine cable capacity it holds. Additionally, cable landing licensees must file information on the Circuit Capacity Report about the amount of available and planned capacity on the submarine cable for which they have a license. Any U.S. International Carrier that owned or leased bare capacity on a terrestrial or satellite facility as of December 31, 2015 must file a Circuit Capacity Report showing its active common carrier circuits for the provision of service to an end-user or resale carrier, including active circuits used by itself or its affiliates. Any satellite licensee that is not a U.S. International Carrier and that owns circuits between the United States and any foreign point as of December 31, 2015 of the reporting period must file a Circuit Capacity Report showing its active circuits sold or leased to any customer, including itself or its affiliates, other than a carrier authorized by the FCC to provide U.S. international common carrier services.

APRIL 1: FCC FORM 499-A, TELECOMMUNICATIONS REPORTING WORKSHEET. This form must be filed by all contributors to the Universal Service Fund (USF) sup-port mechanisms, the Telecommunications Relay Service (TRS) Fund, the cost recovery mechanism for the North American Numbering Plan Administration (NANPA), and the shared costs of local number portability (LNP). Contributors include every telecommunications carrier that provides interstate, intrastate, and international telecommunications, and certain other entities that provide interstate telecommunications for a fee. Even common carriers that qualify for the de minimis exemption must file Form 499-A. Entities whose universal service contributions will be less than $10,000 qualify for the de minimis exemption. De minimis entities do not have to file the quarterly report (FCC Form 499-Q), which was due February 1, and will again be due May 1. Form 499-Q relates to universal and LNP mechanisms. Form 499-A relates to all of these mechanisms and, hence, applies to all providers of interstate, intrastate, and international telecommunications services. Form 499-A contains revenue information for January 1 through December 31 of the prior calendar year. And Form 499-Q contains revenue information from the prior quarter plus projections for the next quarter. (Note: the revised 499-A and 499-Q forms are now available.) Block 2-B of the Form 499-A requires each carrier to designate an agent in the District of Columbia upon whom all notices, process, orders, and decisions by the FCC may be served on behalf of that carrier in proceedings before the FCC. Carriers receiving this newsletter may specify our law firm as their D.C. agent for service of process using the information in our masthead. There is no charge for this service.

APRIL 1: ANNUAL ACCESS TO ADVANCED SERVICES CERTIFICATION. All providers of telecommunications services and telecommunications carriers subject to Section 255 of the Telecommunications Act are required to file with the FCC an annual certification that (1) states the company has procedures in place to meet the recordkeeping requirements of Part 14 of the Rules; (2) states that the company has in fact kept records for the previous calendar year; (3) contains contact information for the individual or individuals handling customer complaints under Part 14; (4) contains contact information for the company’s designated agent; and (5) is supported by an affidavit or declaration under penalty of perjury signed by an officer of the company.

MAY 31: FCC FORM 395, EMPLOYMENT REPORT. Common carriers, including wireless carriers, with 16 or more full-time employees must file their annual Common Carrier Employment Reports (FCC Form 395) by May 31. This report tracks carrier compliance with rules requiring recruitment of minority employees. Further, the FCC requires all common carriers to report any employment discrimination complaints they received during the past year. That information is also due on June 1. The FCC encourages carriers to complete the discrimination report requirement by filling out Section V of Form 395, rather than submitting a separate report.

Calendar At-A-Glance

Mar. 9 – Reply comments are due on 911/E911 Fees and Charges Report.
Mar. 15 – Comments are due on Vonage Direct VoIP Numbering Application.
Mar. 21 – Comments are due on AM Revitalization FNPRM.
Mar. 21 – Comments are due on ORBIT Act Report.
Mar. 30 – Comments are due on Video Programming Diversity NOI.
Mar. 30 – Comments are due on Consumer Signal Boosters Public Notice.
Mar. 31 – FCC Form 525 (Delayed Phasedown CETC Line Counts) is due.
Mar. 31 – FCC Form 508 (ICLS Projected Annual Common Line Requirement) is due.
Mar. 31 – International Circuit Capacity Report is due.

Apr. 1 – FCC Form 499-A (Annual Telecommunications Reporting Worksheet) is due.
Apr. 1 – Annual Accessibility Certification is due.
Apr. 4 – Reply comments are due on ORBIT Act Report.
Apr. 14 – Reply comments are due on Consumer Signal Boosters Public Notice.
Apr. 18 – Reply comments are due on AM Revitalization FNPRM.
Apr. 19 – Reply comments are due on Video Programming Diversity NOI.

May 1 – FCC Form 499-Q (Quarterly Telecommunications Reporting Worksheet) is due.
May 31 – FCC Form 395 (Annual Employment Report) is due.

This newsletter is not intended to provide legal advice. Those interested in more information should contact the firm. For additional information, please contact Hal Mordkofsky at 202-828-5520 or .

Why the NSA is staying out of Apple's fight with the FBI

Apple’s court fight has exposed a deep rift in how the two agencies deal with technology

By Russell Brandom on March 9, 2016 01:44 pm

(Chip Somodevilla/Getty Images)

From the beginning of Apple’s fight with the FBI, there’s been an inconvenient question: why can’t the NSA just break into the San Bernardino iPhone ? We know from Edward Snowden that the agency has eyes nearly everywhere, amassing data in transit and developing exploits to break specific devices like the iPhone at the center of this case. What could we be looking for in the San Bernardino phone that the NSA can’t somehow pry loose?

But while the FBI has pulled no punches in going after Apple, the NSA has largely stayed out of the fight. In a judiciary committee hearing last week, FBI Director James Comey said he had asked for a way to open the phone from "anybody who will talk to us" but came up empty. He declined to name the NSA specifically, but the implication was clear. The agency has now denied the FBI even political cover, with Reuters reporting that "several key officials" in the NSA opposed the move against Apple.

It’s puzzling from the outside, but the encryption divide between the NSA and FBI is just one sign of a growing split in the way the government investigates cases and infiltrates technology. The NSA and FBI both deal with locked iPhones, but they come at them with very different tools and very different goals. The FBI’s fight with Apple has thrust that divide into the spotlight. While the FBI is pushing for court-mandated access through Apple, the NSA and other intelligence agencies specialize in a much more covert and adversarial approach. With so much pressure on accessing the San Bernardino phone, exploits seem like an easy compromise, a way to give feds the evidence they want without compelling Apple’s help or setting any ugly precedents. But relying on exploits would set a precedent of its own, and that tactic could have more consequences than Apple defenders realize.

First, there’s good reason to think that the NSA really could help with at least some of the phones that the FBI is looking at. The phone in the New York unlocking case, which has played out in parallel to the San Bernardino trial , is still running iOS 7, making it vulnerable to a $350 lockscreen-breaking device that’s commercially available to law enforcement agencies. The same device could handle at least 11 of the 12 other Apple devices identified as under FBI order . There are plenty of similar tools available, as detailed here , and it’s genuinely unclear why the feds haven’t used them to unlock at least some of the phones. All of the attacks take advantage of bugs that were closed in more recent versions of iOS, and while we still don’t know if there’s an outstanding bug for iOS 9 — that is, a bug that could get into the specific San Bernardino phone at the center of all this — the broader picture is clear. There’s been some bug in the lockscreen protections of every previous version of iOS. It would be foolish to think iOS 9 is the exception.

Many of these attacks would be possible even without the NSA’s help. But while those bugs would get the FBI into some of the phones, the solution wouldn’t be as clean as the GovtOS system proposed in the San Bernardino case. A string of exploits isn’t as reliable as a legally mandated backdoor, and it’s a poor substitute. It’s the difference between climbing up your neighbor’s drainpipe and making a copy of his keys. If the FBI really has the legal right to compel Apple’s help — as Comey clearly believes — it would be foolish to settle for exploits like this.

There are also structural forces keeping the FBI out of the exploit business. The NSA can put some of the nation's smartest researchers to work finding iOS bugs, or buy them from freelancers on the open market. Once they’ve got a good way in, the agency can deploy it in conditions of extreme secrecy, making sure news of its use never leaves Fort Meade. There are only a limited number of ways to break into a given phone — a number that dwindles with each security update — and extreme secrecy ensures the NSA will make the most of each technique.

The FBI can’t play that game. It’s a law enforcement agency rather than an intelligence agency, which means most of its work eventually ends up in open court. The data on the San Bernardino phone isn’t just intelligence, it’s evidence. If FBI agents did manage to unlock the phone, they’d be expected to explain how they did it in public court. News of the technique would quickly work its way back to Apple, and a fix would be put in place shortly after. The next time a locked phone came up, the FBI would need a brand new way in. At that rate, the bureau would run out of workable exploits long before they make a dent in the growing pile of iPhone search warrants.

That’s why, from the beginning, the anti-encryption fight has been waged by the FBI, prosecutors, and local police — all law enforcement groups in the business of presenting evidence in court. Director Comey planted the flag in 2014 with his "Going Dark" initiative , and the message was picked up by affiliated groups like the IACP and APA. When bills banning iPhone encryption surfaced in California and New York state legislatures, it was because of active lobbying efforts from local District Attorneys.

The exploit divide also explains why intelligence agencies like the CIA and NSA have been mostly indifferent to the fight. They don’t care about evidence, just intelligence — and intelligence can be collected much easier. The NSA doesn’t ask for help cracking individual devices, and doesn’t have much use for warrants either. It's playing a different game, and Comey’s fight for judicial power simply doesn’t do it any good.

That’s a particularly bitter pill for Director Comey because the NSA is a big part of why Apple pushed for device encryption in the first place. The Snowden documents hit Silicon Valley hard, particularly the news that the NSA had broken into private networks run by Google and Yahoo . It’s no coincidence that iOS 8’s stronger encryption features arrived less than a year after that news broke. Discontent around the NSA also undercuts FBI claims that the use of the proposed GovtOS will be limited. The biggest protection is that it will only be used with a warrant — but how much does that protection mean when a FISA court can issue a single warrant for the phone records of every US citizen?

At the same time, the split between the NSA and FBI means that a win for Apple won’t be entirely good news for civil libertarians. As Apple fights to maintain a balance between users and the government, there’s another balance being struck between law enforcement and intelligence agencies within the government. If the FBI loses its case, the CIA and the NSA will be left as the only ones with a shot at breaking the iPhone’s last line of defense, which will tip the balance in their favor. In cases like San Bernardino where local crimes are linked to international conflicts, it’s easy to imagine the CIA stepping in, producing intelligence where evidence collection is impossible. There’s also the chance that, faced with a loss in court, the FBI will try to take up intelligence methods to solve cases without giving too much detail in court. In the case of the Stingray, that meant entering evidence while actively concealing where that evidence came from, a tactic that proved disastrous once the defendants caught on.

For those focused on Apple’s current legal fight, all of this might seem beside the point. The FBI’s proposed backdoor is still invasive, and would set a terrible precedent for technology companies around the world. And for now, that stockpile of exploits is still a useful talking point in fending off FBI demands. As the bureau tries to prove it has exhausted every avenue, civil libertarians can point at hacking techniques as evidence that there’s another way in, and that the FBI doesn’t need the backdoor it’s trying to build.

But after the trial is over, those same attacks become much more troubling. As invasive as the FBI’s proposal is, the NSA alternative is near anarchy, simply breaking whatever can be broken and grabbing whatever can be grabbed. If that becomes the standard for digital evidence collection, the future may be even bleaker than we thought.

Source: The  

Friends & Colleagues

Ira Wiesenfeld, P.E.

Complete Technical Services For The Communications and Electronics Industries Design • Installation • Maintenance • Training • Engineering • Licensing • Technical Assistance

black line

Ira Wiesenfeld, P.E.
Consulting Engineer
Registered Professional Engineer

Tel/Fax: 972-960-9336
Cell: 214-707-7711
7711 Scotia Dr.
Dallas, TX 75248-3112

Ira Wiesenfeld, P.E.

Consulting Alliance

Brad Dye, Ron Mercer, Allan Angus, Vic Jackson, and Ira Wiesenfeld are friends and colleagues who work both together and independently, on wireline and wireless communications projects.

Click here left arrow for a summary of their qualifications and experience. Each one has unique abilities. We would be happy to help you with a project, and maybe save you some time and money.

Note: We do not like Patent Trolls, i.e. �a person or company who enforces patent rights against accused infringers in an attempt to collect licensing fees, but does not manufacture products or supply services based upon the patents in question. We have helped some prominent law firms defend their clients against this annoyance, and would be happy to do some more of this same kind of work.

“If you would know the road ahead, ask someone who has traveled it.”
— Chinese Proverb

“He knows the water best who has waded through it.”
— Danish Proverb

Consulting Alliance

Wireless Network Planners

Wireless Network Planners
Wireless Specialists

R.H. (Ron) Mercer
217 First Street
East Northport, NY 11731

ron mercer
Telephone: 631-786-9359

Wireless Network Planners





The Wireless Messaging News

Current member or former member of these organizations.

Best regards,
brad's signature
Newsletter Editor
Licensed 57 years

Brad Dye
P.O. Box 266
Fairfield, IL 62837 USA

mensa member

If you are curious about why I joined Mensa, click here

U.S. Navy

radioman second class
Second Class
Petty Officer



A Public Library of
animated gif
Paging Information


European Mobile Messaging Association
emma logo
Former Board Member

radio club paraguay
Radio Club
of Paraguay

Quarter Century qcwa k9iqy
Wireless Association

Back To Paging
Still The Most Reliable Wireless Protocol For Emergencies!

Skype: braddye
Twitter: @BradDye1
Telephone: +1-618-599-7869
Wireless: Consulting page
Paging: Home Page
Marketing & Engineering Papers
K9IQY: Ham Radio Page

Institute of Electrical and
Electronics Engineers

wireless logo medium

Radio Club
radio club of america
of America

Life is good!

I am a person in
long-term recovery.


When something bad happens, you have three choices:

  1. You can either let it define you;
  2. Let destroy you;
  3. Or you can let it strengthen you.



San Francisco

A blanket of fog covers the San Francisco skyline in a view from the Berkeley Hills, Feb. 28, in Berkeley, California.


Source: NBC News Marcio Jose Sanchez / AP

Home Page Directory Consulting Newsletters Free Subscription Products Reference Glossary Send e-mail