Wireless News Aggregation |
Friday — October 30, 2015 — Issue No. 681 |
Dear Friends of Wireless Messaging, Welcome back to The Wireless Messaging News. Guess where I am going to be next week? It's not too late to join me at the Critical Messaging Association conference. You might as well come. There will be no newsletter next week. This is too important of an event to miss. The following week, I will tell you about all the important things that you missed, and you will be very sorry. Very sorry. You will miss the interactive discussions, and information that could potentially benefit your business — and the wonderful chance to sit down and have coffee with me. ha ha Maybe even they will have espresso — my favorite. Did I mention that you will be very sorry if you don't attend? For some of my ex-Motorola Communications readers, Wayne Hansen passed away on May 26, 2015. I just found out. Now on to the news and views.
| Wayne County, Illinois
A new issue of the Wireless Messaging Newsletter is posted on the web each week. A notification goes out by e-mail to subscribers on most Fridays around noon central US time. The notification message has a link to the actual newsletter on the web. That way it doesn’t fill up your incoming e-mail account. There is no charge for subscription and there are no membership restrictions. Readers are a very select group of wireless industry professionals, and include the senior managers of many of the world’s major Paging and Wireless Messaging companies. There is an even mix of operations managers, marketing people, and engineers — so I try to include items of interest to all three groups. It’s all about staying up-to-date with business trends and technology. I regularly get readers’ comments, so this newsletter has become a community forum for the Paging, and Wireless Messaging communities. You are welcome to contribute your ideas and opinions. Unless otherwise requested, all correspondence addressed to me is subject to publication in the newsletter and on my web site. I am very careful to protect the anonymity of those who request it. I spend the whole week searching the Internet for news that I think may be of interest to you — so you won’t have to. This newsletter is an aggregator — a service that aggregates news from other news sources. You can help our community by sharing any interesting news that you find.
Editorial Opinion pieces present only the opinions of the author. They do not necessarily reflect the views of any of advertisers or supporters. This newsletter is independent of any trade association. Back To Paging
Subscribe It's Free!* required field If you would like to subscribe to the newsletter just fill in the blanks in the form above, and then click on the “Subscribe” button. There is no charge for subscription and there are no membership restrictions. It’s all about staying up-to-date with business trends and technology.
Can You Help The Newsletter? You can help support The Wireless Messaging News by clicking on the PayPal Donate button above. It is not necessary to be a member of PayPal to use this service.
Newspapers generally cost A donation of $50.00 would certainly help cover a one-year period. If you are wiling and able, please click on the PayPal Donate button above.
If you are reading this, your potential customers are reading it as well. Please click here to find out about our advertising options. NEW COMPUTER FOR THE NEWSLETTER It's Time To Help
NEW COMPUTER DONATION LOG
|
CONFERENCE November 5 - 6, 2015 Conference Hotel If you have registered, you should have received confirmation for your hotel reservations directly from the hotel. Parking for the group is $5.00/day; this is a reduced rate. Transportation Board Meetings The Convention agenda follows. All sessions will be in Mulligans. Note this meeting is designed to provoke interactive discussions as opposed to speakers providing presentations. Our goal is to introduce a topic and ideally help everyone in attendance leave with valuable information to move forward with their business. Therefore we hope you will actively participate and encourage you to introduce your own topics of concern if you do not see them on the agenda. Thursday Friday If you have any questions regarding the event, please contact Linda Hoover . Agenda
|
RF Demand Solutions |
|
Falcon Wireless Direct |
AN INVITATION TO JOIN OUR TEAM!
|
Voluntary Newsletter Supporters By Donation |
Kansas CityPremium Newsletter SupporterPremium Newsletter SupporterCanyon Ridge CommunicationsPremium Newsletter SupporterProPage Inc.Newsletter SupporterMetropolitan CommunicationsNewsletter Supportere*Message Wireless Information Services EuropeNewsletter Supporter | Incyte Capital Holdings LLC |
Motorola’s Moto X Force smartphone has ‘unbreakable screen’Display that has been three years in the making ‘will not break no matter how many times the phone is dropped’, and is covered by four-year guarantee Samuel Gibbs
Motorola has made a very bold claim. It says its latest top-end Android smartphone has a screen that’s not just shatter-resistant but shatterproof, no matter how many times you drop the phone. If the screen does break in normal use, which includes drops, impacts and falls, but excludes deliberate abuse, Motorola will replace it under a four-year guarantee. The screen has been under development for three years, which means it spans both Google’s and Lenovo’s ownership of Motorola. Marcus Frost, senior marketing director for the company in Emea, insists that it is a wholly Motorola endeavour. “In the past we’ve innovated just because we can. Now we’re attempting to make meaningful innovation, addressing consumer pain points of which battery life and smashed screens are key,” Frost said. The five-layer screen has a user-replaceable, scratch-resistant top layer, otherwise known as a screen protector, two touchscreen layers – just in case one breaks – and two rigid layers to hold it together. The rest of the phone is not covered by the same four-year guarantee. A 5.4in quad HD AMOLED display is sandwiched into the five-layer screen, giving it one of the highest pixel densities of any smartphone currently available at 540 pixels per inch. The higher the pixel density the sharper the screen.
The rest of the smartphone’s specifications are similar to other versions of the company’s Moto X line, including the phone’s splash resistance. It contains a Qualcomm’s top processor, the Snapdragon 810, and, like the Moto X Style , has 3GB of RAM and 32GB of storage. It also has a two-day battery, like the Moto X Play . The Moto X Force has a microSD card slot for adding extra storage and wireless charging, but no removable battery. The camera on the back is the same 21-megapixel sensor as used on the Moto X Style, but has optical image stabilisation for removing hand shake. The five-megapixel selfie camera on the front of the phone has its own LED flash. The Moto X Force reads like a smartphone geek’s wishlist, with only one big exception: it doesn’t have a fingerprint scanner, which is quickly becoming the mark of a high-end smartphone. It also ships running last year’s Android 5.1 Lollipop, not the latest Android 6.0 Marshmallow, but Motorola promises an update will be available. The Moto X Force will be available in the middle of November in the UK costing £499 with 32GB of storage and £534 with 64GB, with various customisation options through Motorola’s Moto Maker site. |
Source: | The Guardian |
Prism Paging |
|
Product Support Services, Inc. |
Repair and Refurbishment ServicesProduct Support Services, Inc.511 South Royal Lane PSSI is the industry leader in reverse logistics, our services include depot repair, product returns management, RMA and RTV management, product audit, test, refurbishment, re-kitting and value recovery. |
YOUR
Now stocking the full line of Daviscomms paging products New Products SPS-5v9E Paging System
DMG Protocol Converter
|
|
Leavitt Communications |
|
Spōk Reports Third Quarter Operating Results; Board Declares Regular Quarterly and Special DividendWireless Trends Continue to Improve; Operating Expenses Decrease; Balance Sheet Remains Strong Stock Repurchase Plan Extended October 28, 2015 04:30 PM Eastern Daylight Time SPRINGFIELD, Va.—(BUSINESS WIRE)—Spok Holdings, Inc. (NASDAQ: SPOK), a global leader in critical communications, today announced operating results for the third quarter ended September 30, 2015. In addition, the Company’s Board of Directors declared a regular quarterly dividend of $0.125 per share, plus a special dividend of $0.125 cents per share, both payable on December 10, 2015 to stockholders of record on November 18, 2015. Consolidated revenue for the third quarter was $46.2 million, compared to $49.8 million in the third quarter of 2014. Software revenue totaled $16.8 million versus $16.9 million in the year-earlier quarter, while wireless revenue was $29.4 million versus $32.9 million in the third quarter of 2014. Third quarter EBITDA (earnings before interest, taxes, depreciation, amortization and accretion) totaled $10.1 million, or 21.8 percent of revenue, compared to $12.3 million, or 24.7 percent of revenue, in the year-earlier quarter, and $9.1 million, or 18.9 percent of revenue, in the second quarter of 2015. Net income for the third quarter was $4.2 million, or $0.20 per fully diluted share, compared to $4.7 million, or $0.21 per fully diluted share, in the third quarter of 2014. Other key results and highlights for the third quarter included:
Vincent D. Kelly, president and chief executive officer, said: “We continued to make solid progress in the third quarter. Software revenue, while flat versus the year-earlier quarter, increased 7.7 percent for the first nine months of 2015 from the same period of 2014 and 20.3 percent from the first nine months of 2013. Our software backlog and pipeline also remained strong at September 30. Wireless trends continued to improve during the quarter as the rates of paging unit churn and revenue erosion either achieved or approached record levels. In addition, we met or exceeded our expectations on most other key operating metrics for the quarter, including cash flow, expenses, operating margins, and average revenue per unit (ARPU). Overall, we continued to operate profitably, enhance our product offerings, and generate sufficient cash flow to again return capital to stockholders in the form of cash dividends and share repurchases.” Commenting on software results, Kelly said: “Software bookings came in lower than expected due in part to softer sales in the Asia-Pacific region, which has been experiencing weaker economic conditions and headwinds. The shortfall included the withdrawal of bids on several key sales opportunities and delayed commitments on a few sizable contracts, both in Asia-Pacific and EMEA. The EMEA market has taken a bit longer to evolve. We haven’t lost business to competitors, but the market is opening up slower than we had hoped. Still, domestic healthcare bookings rose 12 percent from the year-earlier quarter, while new customer bookings more than doubled from the third quarter of 2014. In short, we continued to see continuing demand from Spok’s worldwide customer base for upgrades to existing applications as well as for new communications products and solutions. Additionally,” Kelly noted, “maintenance revenue increased to $8.9 million for the quarter from $7.8 million in the year-earlier quarter, reflecting our continued success in achieving maintenance renewals rates in excess of 99 percent.” Kelly said third quarter bookings of $16.7 million included $9.3 million of operations bookings and $7.4 million in maintenance renewals, while the software backlog at September 30 remained strong at $41.6 million. “Customer demand, especially within our healthcare customer base, remained strongest for secure messaging, call center solutions, applications to increase patient safety, and improved clinical workflows.” Kelly added: “We also experienced steady demand for such software solutions as critical smartphone communications, emergency management, and delivery of critical test results. Overall, we added more than 30 new customers during the quarter.” The Company again recorded solid results for its wireless products and services for the quarter. “Gross pager placements totaled 36,000 versus 40,000 in the prior quarter, while gross disconnects of 55,000 improved from 59,000 in the prior quarter,” Kelly said. “As a result, the rates of quarterly and annual net pager losses for the third quarter improved to 1.5 percent and 6.4 percent, respectively, and achieved the best levels in many years. In addition, the annual rate of wireless revenue erosion improved from the year-earlier quarter. Wireless sales continued to focus primarily on our core market segments of Healthcare, Government and Large Enterprise. Healthcare continued to be our best performing market segment with the highest rate of gross placements and lowest rate of unit disconnects, and comprised 79.2 percent of our direct units-in-service and 74.8 percent of direct paging revenue at September 30.” Kelly added that the Company again returned capital to stockholders during the third quarter, distributing cash dividends totaling $2.7 million and repurchasing 502,942 shares of common stock for $8.3 million, or an average price of $16.56 per share, under its stock buy-back program. Commenting on Spok’s financial results, Shawn E. Endsley, chief financial officer, said: “Solid consolidated revenue combined with effective expense management contributed to higher cash flow and operating margins for the quarter as we continued to position the Company for long-term growth. EBITDA margin improved to 21.8 percent in the third quarter from 18.9 percent in the second quarter, a result of the margin improvement plan we initiated in January. In addition, our balance sheet remained strong at September 30 with no debt and a cash balance of $113.4 million.” Endsley said the Company is maintaining previously provided financial guidance for 2015, which projects total revenue to range from $183 million to $201 million, operating expenses (excluding depreciation, amortization and accretion) to range from $145 million to $154 million, and capital expenses to range from $5.5 million to $7.5 million. The Company announced that its Board of Directors has approved extension of the Company’s stock repurchase program from December 31, 2015 to December 31, 2016. In extending the plan, the Board also reset the repurchase authority in the amount of $10 million to begin at the earlier of January 4, 2016 or the completion of the existing 2015 stock repurchase plan. Since the program began in 2008, Spok has repurchased approximately 7.2 million shares of its common stock at an average price of $10.48 per share while maintaining appropriate cash balances and a strong balance sheet. Spok plans to host a conference call for investors on its third quarter operating results at 10:00 a.m. Eastern Time on Thursday, October 29, 2015. Dial-in numbers for the call are 212-444-0896 or 877-280-2342. The pass code for the call is 4793188. A replay of the call will be available from 1:00 p.m. ET on October 29 until 1:00 p.m. on Thursday, November 12. Replay numbers are 719-457-0820 or 888-203-1112. The pass code for the replay is 4793188. Also, Spok will host its annual “Analyst Day” Investor Meeting for financial analysts on November 3, 2015 in New York City. For further details and to RSVP, please contact Stacy Sloan at stacy.sloan@spok.com (or call 703-269-6950), send an email to investor.relations@spok.com , or sign-up directly at surveymonkey.com/r/M69M6R7 . About Spok Spok Holdings, Inc., headquartered in Springfield, Va., is proud to be a leader in critical communications for healthcare, government, public safety, and other industries. We deliver smart, reliable solutions to help protect the health, well-being, and safety of people around the globe. Organizations worldwide rely on Spok for workflow improvement, secure texting, paging services, contact center optimization, and public safety response. When communications matter, Spok delivers. Visit us at spok.com or find us on Twitter @Spoktweets. Safe Harbor Statement under the Private Securities Litigation Reform Act: Statements contained herein or in prior press releases which are not historical fact, such as statements regarding Spok’s future operating and financial performance, are forward-looking statements for purposes of the safe harbor provisions under the Private Securities Litigation Reform Act of 1995. These forward-looking statements involve risks and uncertainties that may cause Spok’s actual results to be materially different from the future results expressed or implied by such forward-looking statements. Factors that could cause actual results to differ materially from those expectations include, but are not limited to, declining demand for paging products and services, continued demand for our software products and services, our ability to develop additional software solutions for our customers and manage our development as a global organization, the ability to manage operating expenses, future capital needs, competitive pricing pressures, competition from both traditional paging services and other wireless communications services, competition from other software providers, government regulation, reliance upon third-party providers for certain equipment and services, as well as other risks described from time to time in our periodic reports and other filings with the Securities and Exchange Commission. Although Spok believes the expectations reflected in the forward-looking statements are based on reasonable assumptions, it can give no assurance that its expectations will be attained. Spok disclaims any intent or obligation to update any forward-looking statements. Tables to Follow (at the source) |
Source: | BusinessWire |
STI Engineering |
|
Leavitt Communications |
|
Low-cost IMSI catcher for 4G/LTE networks tracks phones’ precise locations$1,400 device can track users for days with little indication anything is amiss. by Dan Goodin - Oct 28, 2015 7:59am CDT Researchers have devised a low-cost way to discover the precise location of smartphones using the latest LTE standard for mobile networks , a feat that shatters widely held perceptions that the standard is immune to the types of attacks that targeted earlier specifications. The attacks target the LTE specification , which is expected to have a user base of about 1.37 billion people by the end of the year, and require about $1,400 worth of hardware that run freely available open source software. The equipment can cause all LTE-compliant phones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates, although such attacks may be detected by savvy phone users. A separate method that's almost impossible to detect teases out locations to within an area of roughly one square mile in an urban setting. The researchers have devised a separate class of attacks that causes phones to lose connections to LTE networks, a scenario that could be exploited to silently downgrade devices to the less secure 2G and 3G mobile specifications. The 2G, or GSM, protocol has long been known to be susceptible to man-in-the-middle attacks using a form of a fake base station known as an IMSI catcher (like the Stingray). 2G networks are also vulnerable to attacks that reveal a phone's location within about 0.6 square mile . 3G phones suffer from a similar tracking flaw . The new attacks, described in a research paper published Monday, are believed to be the first to target LTE networks, which have been widely viewed as more secure than their predecessors. "The LTE access network security protocols promise several layers of protection techniques to prevent tracking of subscribers and ensure availability of network services at all times," the researchers wrote in the paper, which is titled " Practical attacks against privacy and availability in 4G/LTE mobile communication systems ." "We have shown that the vulnerabilities we discovered in LTE access network security protocols lead to new privacy and availability threats to LTE subscribers," the researchers wrote. Like some of its predecessors, LTE attempts to conceal the location of a specific phone by assigning it a regularly changing TMSI, short for a temporary mobile subscriber identity. When a network interacts with a handset, it will address it by its TMSI rather than by its phone number or other permanent identifier to prevent attackers monitoring network traffic from tracking the location of a given user. The 2G attack worked around this scheme by sending phones an invisible text message or imperceptibly brief call that caused the mobile network to locate the phone. That paging request allowed the researchers to tie the TMSI to the phone number. Passive aggression versus evolved NodeBThe researchers behind the LTE attack found that similar paging requests can be triggered by social messaging apps such as those provided by Facebook, WhatsApp, and Viber, with little to no indication to the owner that any tracking is taking place. A Facebook message sent by someone not in the receiver's friend list, for instance, will cause the text to be silently diverted to a folder marked "other." But behind the scenes, an attacker can use the data sent over the network to link the receiver's Facebook profile to the TMSI. The TMSI, in turn, can be used to locate the phone and track it as it moves from place to place. A text sent through Whatsapp or Viber, meanwhile, first must be returned by the targeted phone owner. From then on, the attacker can use the apps' typing notification feature to trigger paging requests. The researchers describe such exploits as "semi-passive" because they mainly involve the passive monitoring of network traffic rather than the impersonation and traffic manipulation found in a fully active man-in-the-middle attack. Attackers can also opt to launch far more accurate active attacks by operating a rogue base station, which in LTE parlance is known as an eNodeB, short for evolved NodeB. To create their own eNodeB, the researchers used a computer-controlled radio known as a Universal Software Radio Peripheral that ran OpenLTE , an open source implementation of the official LTE specification. The total cost of the gear, including the radio board and antennas, was about €1,250 (about $1,400), Ravishankar Borgaonkar, one of the researchers and a post-doctorate student at Aalto University in Finland, told Ars. When running in active mode, the eNodeB impersonates an official base station provided by a network carrier and forces LTE phones to connect to it. The attackers can then run troubleshooting routines that cause the handset to provide a wealth of information, including all nearby base stations and the signal strength of each one. Attackers can use the data to triangulate the precise location of the device. In some cases, the rogue eNodeB can be used to obtain the GPS coordinates of the phone. This machine catches stingrays: Pwnie Express demos cellular threat detector An exclusive first look at Pwnie's new tool for catching cellular network attacks. While the active attack provides much more granular location data, it comes at a cost. Darshak , an IMSI-catcher detection app that was released at the 2014 Blackhat security conference in Las Vegas , as well as similar apps from Pwnie Express and others, can easily detect the full-on attacks. That means the semi-passive attacks may be preferable for many attackers, even though the location data is coarser. There's another feature that makes the semi-passive attacks attractive: At least one of the LTE networks the researchers studied allowed TMSIs to last as long as three days before being changed. That means an attacker who executed such an attack could use it to track a target's comings and goings for days, with an accuracy of about a half mile. While it's likely the messaging apps will try to make changes that thwart the attack, it wouldn't be surprising if there are other ways to trigger the paging requests. But wait... there’s moreThe paper includes a separate attack that prevents phones from connecting to LTE networks. Such an attack would either prevent a phone from receiving voice or data service or would cause the devices to connect using 3G or even 2G technology, which are vulnerable to other types of exploits. In any event, the denial-of-service attacks are generally effective until after a device is rebooted. The researchers also included Altaf Shaik, a doctoral student at Technische Universität Berlin; N. Asokan of Aalto University and University of Helsinki; Valtteri Niemi of the University of Helsinki; and Jean-Pierre Seifert, a professor at Technische Universität Berlin. They said they contacted all manufacturers and carriers affected by their research in June and July and have proposed several changes the companies can make to better secure their products and networks. The researchers are scheduled to present their findings at the upcoming Blackhat Security conference in Amsterdam, the T2 Security conference 2015 , and the Internet Society NDSS conference . A brief description of the attacks is here . As noted earlier, several of the vulnerabilities exploited reside in the LTE specification itself. That likely means every LTE-compatible manufacturer and carrier is vulnerable to these attacks. A fix will almost certainly take time and money, but at least there will be near unanimous agreement among industry partners that the weaknesses represent a concrete and imminent threat to customers. |
Source: | ARS Technica |
Wireless Communication Solutions USB Paging Encoder
Paging Data Receiver (PDR)
Other products Please see our web site for other products including Internet Messaging Gateways, Unified Messaging Servers, test equipment, and Paging Terminals.
|
SEE WEB FOR COMPLETE LIST:
|
Critical Alert |
|
Microsoft offers amnesty of sorts to pirates of older Windows softwareIf you own a pirated copy of Windows 7 or Windows 8.1, you'll have the chance to come clean.
Mark Hachman If you pirated Windows 7 or Windows 8.1, Microsoft wants to welcome you back—all is forgiven. Microsoft said Thursday that it will run an “experiment” to offer a path for those users who have either pirated or purchased an unlicensed copy of Windows 7 or Windows 8.1 to download a licensed copy from Microsoft itself, or to use a code from a third-party reseller. Either way, the licensed Windows 10 software will be used to update the PC with a valid license. “We’d like to welcome as many of these customers as possible to the legitimate Windows ecosystem,” Microsoft’s Terry Myerson said in a blog post Thursday afternoon. Why this matters: Microsoft originally said in March that users with a pirated copy of Windows 7 or 8.1 would be able to upgrade to Windows 10 . The company later clarified that any user who did so would still be running an unlicensed copy . It’s unclear how much software in the world is pirated—the Business Software Alliance claimed that in 2010 four out of ten software programs installed around the world were illegally copied—but Microsoft’s free upgrade to Windows 10 has surely cut into that. Otherwise, Amazon sells a USB flash drive with Windows 10 Home installed upon it for $110, and Microsoft itself sells Windows 10 Pro for $200. An amnesty of sorts? “We’ll offer a one-click opportunity to get Genuine via the Windows Store or by entering an activation code purchased elsewhere,” Myerson wrote. “If this turns into a path for most customers to get Genuine, we will expand the experiment.”
So what’s the appeal for a pirate to suddenly go legit? Microsoft relied upon the tried-and-true tactic of trying to scare users straight—which, to be fair, isn’t necessarily wrong. “The best Windows is genuine Windows,” Microsoft said in a statement. “Non-genuine Windows is not published by Microsoft, not properly licensed, nor supported by Microsoft or our trusted partners. According to industry experts, use of pirated software, including non-genuine Windows, results in a higher risk of malware, fraud public exposure of personal information, and a higher risk for poor performance or feature malfunctions.” Microsoft also said that if you’re running a legitimate copy of Windows 7 or Windows 8.1, beginning in 2015 the Windows 10 update will be moved to “Recommended” status, meaning that most PCs will download and install it by default. You’ll still have the option to opt out or even revert back to the older OS once that update takes place, however. Finally, there’s better news for those who are keeping up with Windows updates: Microsoft has pledged to reveal more information about what’s actually in them, as it used to do. The company also said that it would improve “scheduling options” for when those updates are installed. |
Source: | PCWorld |
BloostonLaw Newsletter |
Selected portions of the BloostonLaw Telecom Update, and/or the BloostonLaw Private Users Update — newsletters from the Law Offices of Blooston, Mordkofsky, Dickens, Duffy & Prendergast, LLP — are reproduced in this section with the firm’s permission.
Slides from FCC Webinar on Part 1 DE and Joint Bidding Rules to be Available OnlineFor potential auction applicants who may not have been able to virtually attend the FCC’s Incentive Auction Task Force and Wireless Telecommunications Bureau webinar regarding recent modifications to the Part 1 rules governing designated entities and other auction-related matters, including joint bidding, the webinar slides will be posted following the event on the LEARN website ( www.fcc.gov/LEARN ). BloostonLaw attorneys attended the webinar and are available to answer questions about the rules. HeadlinesFCC Adopts Methodology for Resolving 600 MHz Wireless and Television InterferenceOn Monday, the FCC adopted an Order which resolves the remaining technical issues affecting the operation of new 600 MHz wireless licensees and broadcast television stations in areas where they operate on the same or adjacent channels in close proximity. In particular, the FCC’s Third Report and Order and First Order on Reconsideration in the Incentive Auction Inter-Service Interference (ISIX) proceeding (ET Docket No. 14-14) adopted the methodology and the regulatory framework for the protection of both wireless services and broadcasting in the post-auction environment that were proposed back in October 2014; it affirmed the methodology to be used during the incentive auction to predict inter-service interference between broadcasting and wireless services; and it affirmed the Commission’s previous denial to propose a cap on the aggregate amount of new interference a broadcast television station may receive from other television stations in the repacking process. The ISIX proceeding illustrates the complexities that arise when trying to accommodate two distinct services – broadcasting and two-way mobile wireless communications – in the same spectrum band. Policy decisions in this proceeding directly impact how many “impaired” 600 MHz licenses that the Commission can make available for bidding in the forward auction, and the potential interference that certain broadcasters may encounter with their post-auction channel assignments. Despite objections from the broadcast industry and Republican commissioners, the Commission previously chose to adopt auction and band plan designs that would result in a limited number of broadcast stations being placed in the 600 MHz uplink, downlink and duplex gap, in a handful of markets, in order to maximize the amount of broadcast spectrum that could be repurposed in the rest of the country. The ISIX rules and procedures are designed to minimize the amount of post-auction interference between broadcast television and new wireless services. A concurring statement from FCC Commissioner Mike O’Rielly applauded the OET staff for coming up with procedures that should allow wireless providers and broadcasters to operate in close proximity, but took issue with the Commission’s previously-adopted auction and band plan designs. “While the placement of a few broadcasters in the new wireless band was an unfortunate necessity to prevent interference with stations located in Canada and Mexico, the Commission should have ensured that market variation was as limited as possible and only occurred to prevent cross-border interference,” wrote O’Rielly. “Instead of minimizing market variation and the number of impaired licenses, the Commission is inclined to place more broadcasters in the 600 MHz Band in order to increase the number of licenses that can be auctioned, even if these licenses are not ‘clean.’ ” FCC Promotes Higher Frequency Spectrum for Future Wireless TechnologyThe FCC last week issued a Notice of Proposed Rulemaking ( FCC 15-138 ) proposing new rules for the next generation of wireless broadband services in wireless frequencies above 24 GHz. Initial Comments are due by January 26, 2016 with Reply Comments due by February 23, 2016. Clients should contact us if they may be interested in submitting comments or otherwise following this proceeding. These proposed rules are an opportunity for the FCC to move forward on creating a regulatory environment in which these emerging next-generation mobile technologies – such as so-called 5G mobile service – can potentially be deployed. Due to physical and technological limitations, it was previously assumed that these “millimeter wave” frequencies could not support mobile services. However, the FCC believes that new tech developments may allow the use of these high frequencies for mobile applications – like 5G service – with significantly more capacity and faster speeds. This NPRM proposes to create new flexible use service rules in the 28 GHz, 37 GHz, 39 GHz, and 64-71 GHz bands. The NPRM proposes to make these bands available using a variety of authorization schemes, including traditional wide area licensing, unlicensed, and a shared approach that provides access for both local area and wide area networks. In addition, the NPRM provides a path for a variety of platforms and uses, including satellite uses, to coexist and expand through market-based mechanisms. The NPRM seeks extensive comment on the service, licensing, and technical rules for facilitating flexible use in these bands. Finally, the NPRM seeks comment on other bands above 24 GHz that may be considered in the future. By taking this action now, the Commission intends to establish a framework to proceed in parallel with technological development in order to keep pace and help future mobile and other wireless technologies flourish. Tentative Budget Would Extend Auction Authority; Additional Auctions of Federal Spectrum by 2024Even as the world’s first incentive auction has finally made it off of the drawing board, Congress is already planning for future incentive auctions to repurpose federal spectrum for commercial use and to raise funds for the U.S. Treasury. As part of the tentative budget deal that must be passed to avoid government shutdown, labeled as a Discussion Draft, proposed legislation known as the ‘‘Spectrum Pipeline Act of 2015’’(Title X of the Discussion Draft) calls for the NTIA to identify 30 additional megahertz of federal spectrum below 3 GHz (excluding 1675-1695 MHz) that will be reallocated for non-federal use or shared use by federal and non-federal users, or a combination of those, and for a "federal spectrum incentive auction" to be conducted no later than July 1, 2024. As a related matter, the proposed bill would also extend the FCC’s auction authority, currently set to expire in 2022, until 2025. Ed Luttrell, President of The National Grange of the Order of Patrons of Husbandry, an organization that has previously urged policies to promote rapid buildout of wireless networks in rural areas, applauded inclusion of the spectrum legislation as part of the budget bill. "We are particularly pleased that the draft budget introduced Monday includes specific language with deadlines designed to get more wireless spectrum to the private market," he said in a statement. "While we agree more must be done to deploy high-speed, fixed broadband to remote corners of the country, we believe that selling or sharing underused, federally-held spectrum is the most pressing matter. We are happy that all discussions continue to emphasize underserved communities such as rural America and urge Congress to turn words into action.” Following is a summary of the spectrum management provisions submitted by the House as part of a 146-page discussion draft:
Wireless Bureau Seeks Comment on Protected Contours for Grandfathered 3.65 GHz LicenseesThe FCC Wireless Telecommunications Bureau last week issued a Public Notice ( DA 15-1208 ) seeking comment on an appropriate methodology for determining the protected contours for grandfathered 3650-3700 MHz band licensees. Interested parties may file comments on or before 30 days after publication in the Federal Register and may file reply comments on or before 15 days after the comment due date. Federal Register publication has not yet occurred, so the comment/reply deadlines are not yet set. By way of background the FCC last April adopted a Report and Order and Second Further Notice of Proposed Rulemaking (3.5 GHz Order) that established a new Citizens Broadband Radio Service in the 3550-3700 MHz band (3.5 GHz Band). In the 3.5 GHz Order, the Commission adopted rules to protect existing licensees in the 3650-3700 MHz band from harmful interference from Citizens Broadband Radio Service users for a fixed transition period. During the transition period existing licensees will receive protection for operations that are within their “Grandfathered Wireless Protection Zone,” provided that: (1) the stations were registered in the Commission’s Universal Licensing System (ULS) on or before April 17, 2015; and (2) as of a year later (April 17, 2016) the stations are constructed, in service, and fully compliant with the relevant operating rules. The Bureau’s Public Notice seeks comment on a two-pronged approach to defining Grandfathered Wireless Protection Zones around “grandfathered” base stations. Under this two-part approach, the Grandfathered Wireless Protection Zone around each base station would be defined by: (1) sectors with a 4.4 km radius from each registered base station, and the azimuth and beam width registered for that base station with associated unregistered customer premises equipment (CPE) to encompass the operational area of unregistered subscriber stations; and (2) sectors (centered on each base station with the registered azimuth and beachside) which would encompass all registered subscriber stations within that sector. The Public Notice also seeks comment on other issues related to the establishment of the Grandfathered Wireless Protection Zone, including: (1) procedures for determining compliance with the Commission’s construction and operation requirements for the band; and (2) an implementation strategy to ensure that an accurate definition of the Grandfathered Wireless Protection Zone is available to the authorized Spectrum Access Systems (SASs). Existing networks in the 3650-3700 MHz band in the majority of cases are constructed to provide last mile wireless broadband access. Generally, a base station is constructed in the center of the area intended to be served and then as subscribers are enrolled, CPE is put in place at various points around the base station. CPE that operates below the mobile power limit of 1 watt/25 MHz EIRP does not have to be registered in ULS, while all equipment that operates above that limit must be registered. Our law firm’s clients with registered 3650-3700 MHz band operations will want to keep a close eye on this proceeding, and let us know if they want us to provide them with a more detailed report on the Commission’s proposals. Law & RegulationFCC Reminds Tower Applicants to Ensure Full Compliance with Environmental Review ProceduresIn a case involving an AT&T Mobility Services, Inc. (AT&T) antenna tower at Fort Ransom, North Dakota, the FCC is taking the opportunity to remind all tower applicants of their responsibility to follow not only the substantive Environmental Review Procedures, but also the non-substantive procedural requirements that may not affect the ultimate outcome of the review itself. This case arises out of several complaints that AT&T did not comply with the Commission’s environmental and historic preservation review requirements in connection with the construction of an antenna tower at Fort Ransom, North Dakota. The complaints against AT&T were in three general categories: (a) AT&T failed to provide adequate notice of the proposed antenna tower to interested parties, (b) AT&T failed to adequately assess whether the proposed tower would have a significant environmental affect or impact on historic properties and (c) AT&T violated city zoning laws and failed to obtain a local building permit before it commenced construction. The FCC determined that AT&T substantively completed the steps required by the FCC’s rules for historic preservation and environmental review, and that there is nothing in the record to suggest that the Fort Ransom antenna tower would cause significant environmental impacts or otherwise affect historic properties.
The FCC’s notice requirement does not require individual notification to interested parties or compliance with the Scenic Trails Resolution (of which AT&T is not a signatory) that included a special early notification procedure. Rather, notice must be given through publication of a notice in a local newspaper of general circulation or other appropriate means.
The Nationwide Programmatic Agreements (NPA) requires applicants to provide written notice to ‘the local government that has primary land use jurisdiction over the site’, which in this case is the City of Fort Ransom. The FCC noted that while the City did not complain about a lack of notice, it appeared that AT&T’s notice did not comply with Rule Section 17.4(c) or the NPA in several respects: (a) NPA notices did not include a street address for the proposed antenna tower and instead indicated that the tower would be located near a particular intersection; (b) Notices were untimely – NPA requires notice to be given on or before the date an applicant submits its Form 620 to the State Historic Preservation Officer (SHPO) so that the SHPO will have time to consider any public comments generated by the local notice during the SHPO’s own review period; (c) Local notice provided in newspapers of general circulation under the FCC’s ASR rules require applicants to provide specific details about the proposed tower and instructions for filing requests for further environmental review. The FCC’s Rules require that local notice be given prior to national notice so that there is a 30-day comment period. Here, AT&T published its local notice six days after national notice and did not amend its application to update the local notification publication date.
While the FCC noted this complaint, it stated that ensuring compliance with local building permit requirements “falls outside of the Commission’s purview.” Any client considering the construction of a new antenna tower must remember to take the FCC’s environmental processes into account when proposing a tower – even if the tower will not require notice to the FAA or registration with the FCC. The FCC has established programmatic agreements that are designed to streamline and define the process. There can be significant fines if the rules are not followed. Please contact our office with any questions. FCC Fines Six Companies $30 Million for Misleading Consumers of Prepaid Calling CardsOn October 21, the FCC announced that it had fined six companies $5 million each, a combined $30 million, for deceptively marketing prepaid calling cards. Specifically, the companies “falsely advertised that their low-cost prepaid calling cards could allow consumers far more calling minutes than were in fact being sold.” Specifically, Locus Telecommunications, Inc.; Lyca Tel, LLC; NobelTel, LLC; Simple Network, Inc.; STi Telecom Inc.; and Touch-Tel USA, LLC were found to have “targeted advertising to immigrant consumers promising that the prepaid calling cards, which cost only a few dollars, could be used for hundreds or thousands of minutes in international phone calls.” In reality, however, the consumers would be able to use only a fraction of the promised minutes due to the assessment of multiple fees and surcharges that FCC found were not clearly and conspicuously disclosed to consumers, based upon a review of the companies’ marketing materials and disclosures. FCC Announces AM Revitalization Outreach EffortsThe FCC has announced that later this week it will release an initial order adopting rule and policy changes to strengthen the AM service. A key component of the order, according to a press release, is a series of filing windows to promote the greater use of FM translators by AM licensees and permittees. In order to provide immediate relief to AM broadcasters, the FCC’s Media Bureau will promptly open two FM translator modification application windows, under modified procedures that will “vastly increase opportunities for AM stations to relocate FM translator stations.” The first such window open during the first quarter of 2016, for a period of six months (“First Modification Window”). The second window will open immediately after the close of the first window (“Second Modification Window”) for a period of three months. Applications will be processed on a first-come, first-served basis. The First Modification Window will be open to only Class C and D AM licensees seeking to modify and/or relocate FM translator stations. The Second Modification Window will be open to AM licensees of any class. Build-out requirements will depend on whether the modification application proposes to modify a licensed and operating FM translator station or a new, unbuilt Auction 83 construction permit. An FM translator station modified under these procedures must rebroadcast the specified primary AM station for a minimum of four years, exclusive of silent periods, commencing with the initiation of service at the new location. IndustryNew York State Attorney General Launches Investigation into Internet SpeedsReuters , Bloomberg , and others are reporting that New York State’s attorney general is probing whether three major Internet providers are charging customers for faster broadband speeds but failing to deliver them. "New Yorkers deserve the Internet speeds they pay for. But, it turns out, many of us may be paying for one thing, and getting another," Attorney General Eric Schneiderman said in a statement. In letters dated Oct. 23, Tim Wu, new senior enforcement counsel to the New York Attorney General and coiner of the term “Net Neutrality” told Verizon, Time Warner, and Cablevision Systems that he is “specifically concerned about the disruptions to the consumer experience caused by interconnection disputes,” and that there is a “possibility that interconnection arrangements may in some instances render irrelevant any benefit” of paying for so-called premium options ( e.g., Verizon’s FiOS). A 2014 study conducted by the Measurement Lab Consortium, or M-Lab, found that customers' Internet service “tended to suffer at points where their broadband providers connected with long-haul Internet traffic carriers.” The study’s finding, along with consumer complaints and internal analysis, reportedly prompted the investigation. DeadlinesOCTOBER 29: COMMENTS DUE ON APPLICABLITY OF TELEMARKETING RULES TO GOVERNMENTS. A petition for declaratory ruling (CG Docket No. 02-278) asks the FCC to find that the Telephone Consumer Protection Act (TCPA) and the Commission’s implementing rules do not apply to calls made by or on behalf of federal, state, and local governments, including calls made by legislative, judicial, and executive bodies, and those who act on behalf of such government entities, when such calls are made for official purposes. NOVEMBER 1: FCC FORM 499-Q, TELECOMMUNICATIONS REPORTING WORKSHEET. All telecommunications common carriers that expect to contribute more than $10,000 to federal Universal Service Fund (USF) support mechanisms must file this quarterly form. The FCC has modified this form in light of its decision to establish interim measures for USF contribution assessments. The form contains revenue information from the prior quarter plus projections for the next quarter. Form 499-Q relates only to USF contributions. It does not relate to the cost recovery mechanisms for the Telecommunications Relay Service (TRS) Fund, the North American Numbering Plan Administration (NANPA), and the shared costs of local number portability (LNP), which are covered in the annual Form 499-A that is due April 1. Calendar At-A-Glance October November December January 2016
Failure to Register and Light Antenna Towers Nets $620,500 PenaltyThe Federal Communications Commission and General Communications, Inc. (GCI) have entered into a consent decree in order to resolve the FCC’s investigation of antenna structure registration and marking and lighting violations. Under this agreement, GCI will make a “voluntary contribution” to the US Treasury in the amount of $620,500. In 2014, GCI self-reported to the FCC that it had discovered numerous violations of the FCC’s antenna structure registration requirements – including those antenna towers that it had purchased. Following an investigation by the Enforcement Bureau, it was found that approximately 118 antenna towers had not been registered and 3 were not properly marked and lighted. Following a spate of aviation accidents, including a 1989 medevac helicopter crash in Coinjock, North Carolina that killed two medics, the FCC modified its procedures and required the registration of all antenna towers that require notice to the Federal Aviation Administration (FAA) for evaluation. The FCC’s Antenna Structure Registration (ASR) system works in concert with the FAA’s regulations in order to ensure that communications towers do not pose hazards to air navigation. As a general rule, antenna towers that are either greater than 200 feet above ground or are located within the glide path of a nearby protected aircraft landing area (such as a public use airport, helipad or military air base) require notice to the FAA and registration with the FCC. Office clients with questions regarding whether their antenna towers should be obstruction marked and lighted or registered with the FCC should contact our office. FCC Uses Tracking Technology to Locate and Fine Private Radio Licensee for Operation on Unauthorized FrequencyThe FCC has imposed a $6,000 fine against Lakewood Transportation (Lakewood) for operating its radio station on an unauthorized frequency. In March, 2013, the FCC received a complaint involving unauthorized transmissions on the frequency 159.675 MHz in the Lakewood, New Jersey area. Using direction finding techniques, the FCC was able to determine that the source of the transmission was Lakewood’s dispatch office. Upon being notified of the violation, Lakewood took prompt action to correct the violation and operate on its authorized frequency. On this basis, Lakewood requests a reduction or elimination of the fine. The FCC notes that it will give favorable consideration where a licensee corrects a violation on its own – without having been first notified of the violation by the FCC. In this case, the FCC found that the violation was not cured until after the March 2013 station inspection following the interference complaint. More telling is the fact that the FCC had previously notified Lakewood of this very same violation on the frequency 159.675 MHz in April 2011. And, while Lakewood obtained a license following that encounter on the frequency 160.0575 MHz, it would appear that it never bothered to retune its equipment to match the parameters of the license. Lakewood asked for a reduction based upon financial condition. The FCC has a high bar to justify a “financial hardship” reduction, basing their decision solely upon whether gross revenues are enough to pay the fine. Because Lakewood could not demonstrate that payment of a $6,000 fine would place it in financial distress, the FCC did not reduce the fine. This case illustrates the importance of proactive station inspections to make sure that you are operating in compliance with the specifications of your licenses. Incorrect frequencies, power limits, locations, etc. could lead to the imposition of fines by the FCC. We encourage our clients to review their facilities against their license authorizations and contact us with any questions or needed corrective action. Ritron Inc. Obtains Waiver to Manufacture and Import Wide-band Private Land Mobile EquipmentThe FCC has granted Ritron, Inc.’s waiver request in order to allow it to supply its wide-band capable RCCR locomotive cab two-way voice radios to the Kansas City Southern Railway Company (KCS) for use on trains that travel between the United States and Mexico. As part of the Part 90 narrowbanding process, the FCC adopted Rule Section 90.203(j)(10), which prohibits the manufacture and importation of wide-band equipment. For multi-mode equipment, such as the Ritron RCCR locomotive radio, the radio is shipped to U.S. customers with only the narrowband modes accessible to the enduser. KCS is a US rail operator. While the United States has already transitioned to narrowband operations in the railroad voice band, it notes that Mexico still has wide-band railroad systems in operation. Ritron requested a waiver so that it can provide wide-band radios to KCS for use on locomotives travelling between the United States and Mexico. Ritron states that the radios will not be operated in a wide-band mode when in the United States. In granting the waiver, the FCC notes that KCS would otherwise be required to purchase two radios for its locomotives – one for use in the United States and the other for Mexico. This would require the trains to stop at the border crossing and change radios – which would impose added expense and time. The FCC noted that changing out radios that cannot be used in Mexico and reinstalling them when the locomotive crosses back into the United States is impractical and unduly burdensome on KCS, and presents an unnecessary risk of equipment damage or loss. FCC Grants Blanket Six-Month Waiver of Certain Imported Equipment Declaration RequirementsThe FCC has issued a six-month waiver, from July 1, 2016 through December 31, 2016, of the requirements in Rule Sections 2.1203 and 2.1205, which require the submission of information in connection with the importation of radio frequency (RF) devices. In this regard, Rule Section 2.1203 states that no RF device may be imported into the United States unless the importer (or designated customs broker) declares that the device meets the conditions for importation set forth in the FCC’s rules. This declaration can be made in two methods — electronically or on paper using the FCC Form 740 and attaching it to the customs declaration where electronic submission is not available. The US Customs and Border Protection Service (CBP) is in the process of deploying a new electronic filing system – the Automated Commercial Environment (ACE) — that is scheduled to go online on November 1, 2015. Unfortunately, ACE will not have the capability for importers to submit the required Form 740 information electronically. As a result, importers will be able to submit the FCC related importation filings electronically by the current Automated Commercial System (ACS) or on paper through July 1, 2016 – after which the CBP will no longer accept filings made via its legacy ACS system. The FCC is in the process of updating its rules that govern the evaluation and approval of RF devices, which includes a proposal to eliminate the importation filing requirement, since most of the information that was submitted on the Form 740 (or its electronic equivalent) is readily available from other sources such as the CBP itself or the Internet. Inasmuch as the rulemaking is ongoing and it will be some time before a determination is made on the proposal, the FCC has determined that the public interest would be served by waiving the requirement, since requiring paper filings for all shipments was deemed to be impractical. FCC Denies North Carolina Highway Patrol Early Access to Expansion Band Channels, But Grants Waiver of Inter-Category FreezeIn a mixed bag, the FCC issued two orders – one denying the North Carolina Highway Patrol early access to 800 MHz expansion band channels and the other waiving the freeze on 800 MHz intercategory sharing.
In April, 2007, the Public Safety and Homeland Security Bureau stated that public safety licensees who elected to remain on their Expansion Band channels could modify their operations, including expanding coverage contours and adding channels, without having to request a rule waiver. The requirements were clarified in April 2015. Specifically, the FCC stated that it would accept applications only after it established a filing date upon completion of band reconfiguration in each of the National Public Safety Planning Advisory Committee (NPSPAC) regions, and that the applications would be subject to pre-coordination. This change was made because Expansion Band channels were available to all eligibles, and the FCC therefore needed a “stable” spectrum environment. The FCC noted that it would still consider waivers to permit early access to the Expansion Band, but that the applicant would be required to have a “compelling” justification as to why it could not wait for the official filing date. The Highway Patrol stated that it had elected to stay in the Expansion Band and that the geography surrounding its Concord, North Carolina site “offers no natural separation between any of the nearby sites for any short spacing of the normal 800 MHz channels.” In evaluating this request, the FCC determined that the Highway Patrol had not made a “compelling” case to justify its rule waiver request, especially since it was also proposing to delete three NPSPAC channels and replace them with Expansion Band frequencies. In this regard, the FCC noted that the Highway Patrol waiver request did not explain why there was a preference for the Expansion Band channels over the NPSPAC channels.
The Highway Patrol also asked for a waiver of the intercategory sharing freeze, indicating that two of its frequencies in High Point, North Carolina were experiencing interference from the City of Salisbury, which rendered the channels unusable. As a result, it was seeking access to two replacement channels and to add a third channel in order to accommodate increased radio traffic on the system. APCO provided a letter indicating that the only three channels available for the High Point site had been vacated by Sprint as part of the 800 MHz rebanding. These channels were identified because they were inside the service contour of the original Sprint station and are available to public safety for a three-year period after the Public Notice announcing their availability. APCO noted that one of the frequencies would also have a portion of service area that was outside the original Sprint Service contour – and that portion of the service area would therefore be assigned to the Business/Industrial Land Transportation Pool. In granting this waiver, the FCC notes that the Highway Patrol satisfied the requirements for intercategory sharing, since APCO demonstrated that no spectrum was available in the public safety pool due to distance/spacing requirements between transmitter sites and UTC – an out of category frequency coordinator – issued a concurrence letter. The FCC noted that the freeze was put in place in 1995 because SMR applicants had obtained numerous intercategory sharing authorizations for channels in the B/ILT Pool, which in turn, led to a shortage of channels in that pool. Nonetheless, the FCC found that applying the freeze to the Highway Patrol would not serve the purpose of the freeze and that a grant would further the public interest by providing the Highway Patrol with interference-free channels and expanded capacity to meet is public safety communications needs – not only in the High Point area, but also statewide. FCC Seeks Comment on Method for Determining Protected Contours for Grandfathered/Incumbent 3.65 GHz LicenseesThe FCC has released a public notice requesting comment on the appropriate methodology for determining the Grandfathered Wireless Protection Zone. Comments will be due 30 days after publication in the Federal Register. Reply Comments will be due 15 days thereafter. The FCC is seeking comment on a two-prong approach to defining Grandfathered Wireless Protection Zones, including (a) procedures for determining compliance with the FCC’s construction and operational requirements for the band and (2) implementation of a strategy to ensure an accurate definition of Grandfathered Wireless Protection Zone is available to the authorized Spectrum Access Systems (SASs).
The FCC is proposing to define the Grandfathered Wireless Protection Zone around each base station by (a) sectors with a 4.4 km radius from each registered base station and the azimuth and beam width registered for that base station with associated unregistered CPE to encompass the operational area of unregistered subscriber stations; and (b) sectors (centered on each base station with the registered azimuth and beam width) which would encompass all registered subscriber stations within that sector. The FCC notes that existing 3650-3700 MHz networks have been constructed in a majority of cases to provide “last mile” wireless broadband access and that most base stations are constructed in the center of an area intended to be served. The FCC believes that the first prong of the approach will provide protection for unregistered subscribers that operate below the mobile power limit and are in range of the base station. The FCC is proposing a conservative approach since the locations of unregistered subscriber stations are unknown and the protection zone will exist for a limited time period. With respect to the second prong, protection will be provided to each base station’s registered CPE. Protected sectors around each base station will be defined based on the distance from the base station to the furthest CPE unit registered in ULS and the base station parameters (e.g., azimuth and beam width registered in ULS). Because subscriber units operating above the power limit are required to be registered in ULS, the FCC is proposing to use sector-based protection zones only in areas where licensees have registered CPE units. The FCC is requiring new stations in the Citizens Broadband Radio Service limit the field strength of their operations at the boundary of any Grandfathered Wireless Protection Zone and is proposing a field strength limit of 44 dBuV/m MHz at the boundary of the Grandfathered Wireless Protection Zone. Specifically, the FCC is seeking comment on the two-pronged approach described above, as well as the values and methodology used to calculate the size of the protection zones and whether other methodologies might be more appropriate. The FCC is also seeking comment on whether different network topologies and use cases ( e.g., WISP networks and utilities) could require different types of protection and whether these factors should be considered in calculating protection criteria. The FCC has indicated that commenters must support their comments – particularly, those advocating alternate protection methodologies – with detailed technical and cost/benefit analysis. Comment Sought on Regulatory Status of Mobile MessagingOn October 13, the FCC’s Wireless Telecommunications Bureau issued a Public Notice seeking comment on a declaratory ruling clarifying the regulatory status of mobile messaging services. Comments are due November 20, and reply comments are due December 21. The declaratory ruling request was filed in August by Twilio, Inc., a “cloud-based developer-platform company” that facilitates “merging cloud computing, web services, and traditional voice and messaging communications.” In its Petition, Twilio asks the Commission “to declare that messaging services are governed by Title II” of the Communications Act. According to Twilio, wireless providers engage in a variety of discriminatory and anticompetitive practices that cannot be adequately addressed absent a declaratory ruling classifying messaging services as being governed by Title II. Twilio further asserts that, under judicial and Commission precedent, messaging services constitute telecommunications services and commercial mobile radio services and are thus subject to Title II. The Bureau seeks comment on the issue, specifically detailed estimates – numerical estimates if available – of any costs or benefits claimed. California Signs Strictest Digital Privacy Bill in US into LawMedia outlets are reporting that last Thursday, California Governor Jerry Brown (D) signed the Electronic Communications Privacy Act into law. This bill provides extremely broad protections, and bars any state law enforcement agency or other investigative entity from forcing a business to turn over any digital communications or related metadata – including e-mail, text and SMS messages, documents and other data files stored in the cloud, etc., without a properly issued warrant. This legislation goes further to require the issuance of a warrant to permit law enforcement to track mobile phone signals or otherwise search the contents of mobile wireless devices. While a few other states have warrant protection for either content or GPS tracking, the California legislation is the first to protect location data, content, metadata and device searches. According to State Senator Mark Leno, D-San Francisco, there was no logical reason that “a handwritten letter stored in a desk drawer [should] enjoy more protection from warrantless government surveillance than an email sent to a colleague or a text message sent to a loved one.” Leno also stated that “[t]his is nonsensical and violates the right to liberty and privacy that every Californian expects under the constitution.” It is important to note that this legislation only applies to California law enforcement agencies and that agencies outside the state are bound by the laws of their home jurisdiction. Thus, an investigation originating in another state of a California citizen might not be subject to the limitations of the new California law. That said, the California law could be a harbinger of things to come – especially in view of recent outcries for digital privacy protections. Federal Magistrate Wades into Debate, Requests to Unlock Encrypted Smart PhonesThe Washington Post is reporting that Magistrate Judge James Orenstein of the US District Court for the Eastern District of New York has waded into the debate concerning whether device manufacturers can be compelled to unlock a customer’s smart phone. The current controversy involves Apple and a customer’s iPhone. Magistrate Orenstein has declined to rule in the case, and instead, issued an order directing Apple to explain whether the government’s request would be “unduly burdensome.” The Post indicates that Orenstein has a reputation on the bench for being an “activist” in the surveillance debate and that he would like a similar discussion on encryption. Analysts indicate that Orenstein may have picked the wrong case for his challenge since, according to law enforcement sources, the iPhone in question runs on an older version of Apple’s IOS operating system and therefore can be easily unlocked. Nonetheless, Apple started the national debate last year when offered encryption on its more recent mobile devices that could only be unlocked by the customer. Interestingly enough, while the FBI says that it is hampered by this sort of encryption, it has chosen to try to persuade device manufacturers to provide the government with the encryption keys. This tact may be the result of the current administration’s support for strong encryption on mobile devices. Even so, it is important that law enforcement have access to information if a warrant has been issued in a criminal or terrorism case. |
This newsletter is not intended to provide legal advice. Those interested in more information should contact the firm. For additional information, please contact Hal Mordkofsky at 202-828-5520 or halmor@bloostonlaw.com . |
Friends & Colleagues |
|
Wireless Network Planners www.wirelessplanners.com
|
Source: | K9IQY |
LETTERS TO THE EDITOR |
Brad, I remember reading this magazine in the 70’s. Here are scanned copies of the magazine going back to the 50’s http://www.americanradiohistory.com/Popular-Electronics-Guide.htm Alan Gilmour |
Brad, I hope you are doing well. It’s been a long time since we’ve talked but I read your newsletter most of the time so I feel like we keep in touch. Launching a wireless technology company has been a challenge but it’s exciting and growing nicely. Check out our sites cell-gate.com and wirelesstraps.com. I saw this article and thought of you and that it would be of interest to your readers. While reading it I thought “yeah, there’s been a great technology for this for a LONG time . . . paging.” Having had the P&L responsibility for M2M with USA Mobility, I felt very strongly that it would be the salvation of the paging industry, and it should have been. When it became obvious to me that Vince Kelly was not interested in growing revenue but reducing cost, I knew it was time for me to leave. Then I went to the dark side (aka cellular). http://iotworldnews.com/2015/10/low-power-dumb-devices-forecast-to-take-iot-off-cellular-networks/ Take care! Noel Gouldin |
UNTIL NEXT WEEK |
|
THOUGHT FOR THE WEEK |
IoT — Internet of Things
|
PHOTOS OF THE WEEK |
Supermoon Eclipse Stuns Stargazers Around the World
The supermoon rises behind Glastonbury Tor on Sept. 27, 2015 in Glastonbury, England. Sunday night's supermoon, so called because it takes place when a full moon makes its closest approach to Earth, is particularly rare as it coincided with a lunar eclipse. The combination had not happened since 1982 and won't happen again until 2033. |
Source: | NBC News |
Home Page | Directory | Consulting | Newsletters | Free Subscription | Products | Reference | Glossary | Send e-mail |