Feeds

MCI denies national security ‘compromised’

Hires law firm for latest inquiry

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Scandal-smeared MCI has insisted that all US government secure calls on MCI networks have been handled properly and denied that national security was compromised at any time.

The firm stand follows a fresh round of allegations that the telecoms outfit improperly rerouted long-distance calls in the US and Canada in order to avoid paying hundreds of millions of dollars in access fees to other phone companies.

The allegations - filed by rival outfit AT&T - also claimed that the rerouting put national security at risk because it exposed Government phone calls to eavesdroppers.

Fending off this latest round of accusations MCI senior exec, Jerry Edgerton, said: "It is important to emphasise that we are confident that all US government secure calls on MCI networks have been handled properly.

"Contrary to some of our competitors' implications, secure government traffic travels over MCI's network with a dedicated connection and encryption, not through gateways. National security has not been compromised through our secure network," he said.

And in a bid to show that it is prepared to do all it can to help an inquiry into the matter, MCI has appointed Washington DC law firm, Gibson, Dunn & Crutcher LLP, to investigate the latest allegations.

MCI is committed to providing all necessary company resources and its full cooperation to the review, the company said in a statement. ®

Related Story

MCI faces new fraud inquiry
Judge waves through Worldcom $750m settlement
Reports slam WorldCom corporate culture
WorldCom to adopt MCI name

Secure remote control for conventional and virtual desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.