Feeds

Hezbollah sting bust sees first phone-unlock DMCA conviction

Mass terrorist jailbreaking not same as fanboi freedom

Choosing a cloud hosting partner with confidence

A Philadelphia federal court has accepted a guilty plea from one Mohamad Majed, who admitted breaching the Digital Millennium Copyright Act in unlocking thousands of phones for resale.

The phones were locked to TracFone, a virtual operator in the US which specialises in pre-paid connections and heavily-subsidised handsets. TracFone has pursued mass unlockers before, but this is the first time anyone has been convicted of breaching the DMCA by unlocking a phone.

The DMCA makes the act of circumventing protection techniques against the law, even if not for commercial gain. That law was clarified earlier this year to exempt subsidised phones that had been used on the subsiding operator's network. Jailbreaking your own phone was declared legal in July this year, despite Apple's objections.

Not that it was unlocked phones that attracted the authorities. Their attention was grabbed by a "suspicious loading of carpets late at night", which was reported by a nearby curtain-twitcher and resulted in a sting operation that exposed a Hezbollah funding operation and led to 16 arrests - that story is at the Philadelphia Inquirer and makes interesting reading.

But almost a year later one of the accused has pled guilty to breaching the DMCA by unlocking phones prior to shipping them abroad. This still isn't grounds to panic in normal circumstances - personal unlocking for use beyond the subsidised period is still exempted - but if you're shipping thousands of handsets abroad with a view to funding a designated terrorist organisation, take heed. ®

Intelligent flash storage arrays

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.