Feeds

Hezbollah sting bust sees first phone-unlock DMCA conviction

Mass terrorist jailbreaking not same as fanboi freedom

Internet Security Threat Report 2014

A Philadelphia federal court has accepted a guilty plea from one Mohamad Majed, who admitted breaching the Digital Millennium Copyright Act in unlocking thousands of phones for resale.

The phones were locked to TracFone, a virtual operator in the US which specialises in pre-paid connections and heavily-subsidised handsets. TracFone has pursued mass unlockers before, but this is the first time anyone has been convicted of breaching the DMCA by unlocking a phone.

The DMCA makes the act of circumventing protection techniques against the law, even if not for commercial gain. That law was clarified earlier this year to exempt subsidised phones that had been used on the subsiding operator's network. Jailbreaking your own phone was declared legal in July this year, despite Apple's objections.

Not that it was unlocked phones that attracted the authorities. Their attention was grabbed by a "suspicious loading of carpets late at night", which was reported by a nearby curtain-twitcher and resulted in a sting operation that exposed a Hezbollah funding operation and led to 16 arrests - that story is at the Philadelphia Inquirer and makes interesting reading.

But almost a year later one of the accused has pled guilty to breaching the DMCA by unlocking phones prior to shipping them abroad. This still isn't grounds to panic in normal circumstances - personal unlocking for use beyond the subsidised period is still exempted - but if you're shipping thousands of handsets abroad with a view to funding a designated terrorist organisation, take heed. ®

Intelligent flash storage arrays

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.