Feeds

MCI denies national security ‘compromised’

Hires law firm for latest inquiry

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Scandal-smeared MCI has insisted that all US government secure calls on MCI networks have been handled properly and denied that national security was compromised at any time.

The firm stand follows a fresh round of allegations that the telecoms outfit improperly rerouted long-distance calls in the US and Canada in order to avoid paying hundreds of millions of dollars in access fees to other phone companies.

The allegations - filed by rival outfit AT&T - also claimed that the rerouting put national security at risk because it exposed Government phone calls to eavesdroppers.

Fending off this latest round of accusations MCI senior exec, Jerry Edgerton, said: "It is important to emphasise that we are confident that all US government secure calls on MCI networks have been handled properly.

"Contrary to some of our competitors' implications, secure government traffic travels over MCI's network with a dedicated connection and encryption, not through gateways. National security has not been compromised through our secure network," he said.

And in a bid to show that it is prepared to do all it can to help an inquiry into the matter, MCI has appointed Washington DC law firm, Gibson, Dunn & Crutcher LLP, to investigate the latest allegations.

MCI is committed to providing all necessary company resources and its full cooperation to the review, the company said in a statement. ®

Related Story

MCI faces new fraud inquiry
Judge waves through Worldcom $750m settlement
Reports slam WorldCom corporate culture
WorldCom to adopt MCI name

Build a business case: developing custom apps

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?