Range Networks Unveils Enhanced OpenBTS Platform

Software Allows Deployment of Mobile Networks by Open Source Cellular Developers

SAN FRANCISCO Range Networks, the leading provider of commercial open source cellular systems and leader of the OpenBTS software project, today announced the release of OpenBTS 4.0. The software is now shipping in Range Networks laboratory development kits and commercial base stations and is also available to the OpenBTS community as a free download.

The latest generation of OpenBTS offers significant improvements in processing capacity and system management features, including multi-node network scaling enhancements to Range Networks' commercial systems. These enhancements further the migration of radio access network (RAN) infrastructure to low cost, standard hardware using open source software.

OpenBTS 4.0 Key Facts:

-- Expanded capacity: Concurrent registration processing capacity has been increased by 14x, providing improved SIP authentication and service for over 1000 subscribers on a single node. -- Frequency scanning and system management API: Includes a built-in channel-scanning tool for transmission frequency selection whendeploying systems. Also included is a newly implemented JSON API that allows mobile network operators to easily configure and manage the software remotely. This is done through a browser-based administrative console and provides third parties with an effective way to develop tools and interfaces for OpenBTS and other components. -- Seamless handover and enhanced encryption: A completely new Layer 3 architecture has significantly improved network scalability, including improved handover for multi-node networks. The software now supports the A5/1 and A5/3 GSM link encryption algorithms for enhanced security. -- 4.0 field-tested by small carrier in French overseas territory: Following several weeks of field trials, OpenBTS 4.0 is the foundation of a new, multi-node, low-cost commercial network being implemented by French carrier GlobalTel that will cover the island and city of St. Pierre (pop. 7000) of the French territory St. Pierre & Miquelon, located off the coast of Newfoundland. -- Platform for open source innovation: With its improved performance, Range Networks expects to see an increase in new and interesting applications, services and OEM integration based upon the OpenBTS 4.0 platform. -- Enhanced open source program: Range Networks is also announcing the assignment of a senior engineer, Michael Iedema, as a technical resource dedicated to inciting innovation in the OpenBTS open source community.

SUPPORTING QUOTES:

Christophe Boutin, CEO of GlobalTel, said: "Range Networks' OpenBTS 4.0 and base stations have been fundamental in helping us build a cost-effective carrier network in the remote territory of St. Pierre & Miquelon. We have been testing the network thoroughly for weeks as we prepare to launch this service and are impressed by the improvements in overall stability and performance in this new release."

Edward Kozel, CEO of Range Networks, said: "This launch represents a significant milestone in Range Networks' product development. In addition to the new features, OpenBTS continues to provide stability, reliability and scalability. We see this as a major leap forward in terms of what OpenBTS can do for expanding the reach of non-traditional mobile networks."

About Range Networks Range Networks is developing the future of cellular networks. Founded by the inventors of OpenBTS, the company is the leader in commercial open source cellular systems. Range Networks' systems are simple to deploy and manage at a fraction of the cost of traditional solutions. Based on OpenBTS, Range Networks delivers mobile connectivity for rural communities, remote industries and emergency responders, and supplies development networks to commercial labs and universities. Additional information is available at: http://www.rangenetworks.com.

MEDIA CONTACT: Kim Dearborn Nadel Phelan, Inc. +1-831-440-2407 kim.dearborn@nadelphelan.com

Read more here:
Range Networks Unveils Enhanced OpenBTS Platform

Book Review: How I Discovered World War IIs Greatest Spy

benrothke (2577567) writes "When it comes to documenting the history of cryptography, David Kahn is singularly one of the finest, if not the finest writers in that domain. For anyone with an interest in the topic, Kahn's works are read in detail and anticipated. His first book was written almost 50 years ago: The Codebreakers The Story of Secret Writing; which was a comprehensive overview on the history of cryptography. Other titles of his include Seizing the Enigma: The Race to Break the German U-Boats Codes, 1939-1943. The Codebreakers was so good and so groundbreaking, that some in the US intelligence community wanted the book banned. They did not bear a grudge, as Kahn became an NSA scholar-in-residence in the mid 1990's. With such a pedigree, many were looking forward, including myself, to his latest book How I Discovered World War IIs Greatest Spy and Other Stories of Intelligence and Code. While the entire book is fascinating, it is somewhat disingenuous, in that there is no new material in it. Many of the articles are decades old, and some go back to the late 1970's. From the book description and cover, one would get the impression that this is an all new work. But it is not until ones reads the preface, that it is detailed that the book is simple an assemblage of collected articles." Keep reading for the rest of Ben's review. How I Discovered World War IIs Greatest Spy and Other Stories of Intelligence and Code author David Kahn pages 469 publisher Auerbach Publications rating 8/10 reviewer Ben Rothke ISBN 978-1466561991 summary Very good collection of a large number of excellent articles from David Kahn For those that are long-time fans of Kahn, there is nothing new in the book. For those that want a wide-ranging overview of intelligence, espionage and codebreaking, the book does provide that.

The book gets its title from a 2007 article in which Kahn tracked down whom he felt was the greatest spy of World War 2. That was none other than Hans-Thilo Schmidt, who sold information about the Enigma cipher machine to the French. That information made its way to Marian Rejewski of Poland, which lead to the ability of the Polish military to read many Enigma-enciphered communications.

An interesting question Kahn deals with is the old conspiracy theory that President Franklin Roosevelt and many in is administration knew about the impending attack on Pearl Harbor. He writes that the theory is flawed for numerous reasons. Kahn notes that the attack on Pearl Harbor succeeded because of Japan's total secrecy about the attack. Even the Japanese ambassador's in Washington, D.C., whose messages the US was reading were never told of the attack.

Chapter 4 from 1984 is particularly interesting which deals with how the US viewed Germany and Japan in 1941. Kahn writes that part of the reason the US did not anticipate a Japanese attack was due to racist attitudes. The book notes that many Americans viewed the Japanese as a bucktoothed and bespectacled nation.

Chapter 10 Why Germany's intelligence failed in World War II, is one of the most interesting chapters in the book. It is from Kahn's 1978 book Hitlers Spies: German Military Intelligence In World War II.

In the Allies vs. the Axis, the Allies were far from perfect. Battles at Norway, Arnhem and the Bulge were met with huge losses. But overall, the Allies enjoyed significant success in their intelligence, much of it due to their superiority in verbal intelligence because of their far better code-breaking. Kahn writes that the Germans in contrast, were glaringly inferior.

Kahn writes that there were five basic factors that led to the failure of the Germans, namely: unjustified arrogance, which caused them to lose touch with reality; aggression, which led to a neglect of intelligence; a power struggle within the officer corps, which made many generals hostile to intelligence; the authority structure of the Nazi state, which gravely impaired its intelligence, and anti-Semitism, which deprived German intelligence of many brains.

The Germans negative attitude towards intelligence went all the way back to World War I, when in 1914 the German Army was so certain of success that many units left their intelligence officers behind. Jump to 1941 and Hitler invaded Russia with no real intelligence preparation. This arrogance, which broke Germany's contact with reality, also prevented intelligence from seeking to resume that contact.

Other interesting stories in the book include how the US spied on the Vatican in WW2, the great spy capers between the US and Soviets, and more.

For those that want a broad overview of the recent history of cryptography, spying and military intelligence, How I Discovered World War IIs Greatest Spy and Other Stories of Intelligence and Code, is an enjoyable, albeit somewhat disjointed summary of the topic.

Original post:
Book Review: How I Discovered World War IIs Greatest Spy

NSA Searched Americans’ E-Mail, Phone Calls, Clapper Says

U.S. intelligence agencies searched the content of e-mails and other electronic communications of Americans without warrants, the nations top intelligence official told members of Congress.

The queries were part of efforts to obtain information about suspected foreign terrorists under a law that Congress passed in 2008, Director of National Intelligence James Clapper wrote in a March 28 letter to Senator Ron Wyden, an Oregon Democrat and one of the most vocal critics of government surveillance.

The spying is unacceptable and proves the existence of a loophole in surveillance law that allows the National Security Agency to illegally search the Internet communications and listen to the phone calls of Americans who may have no connection to terrorism, Wyden and Senator Mark Udall, a Colorado Democrat, said in an e-mailed statement yesterday.

It raises serious constitutional questions and poses a real threat to the privacy rights of law-abiding Americans, the lawmakers said. Senior officials have sometimes suggested that government agencies do not deliberately read Americans e-mails, monitor their online activity or listen to their phone calls without a warrant. However, the facts show that those suggestions were misleading.

Big Data Meets Big Surveillance

The disclosure is significant because it potentially opens up a new line of public and congressional scrutiny into NSA spying. Until now, most of the focus of public debate has been on restraining the NSAs ability to collect and store bulk phone records, which include numbers dialed and call durations without the contents of conversations.

The NSA collects phone records from Verizon Communications Inc. (VZ) and other carriers and operates a program known as Prism under which it compels Google Inc. (GOOG), Facebook Inc. (FB) and other Internet companies to hand over data about users suspected of being foreign terrorists, according to documents exposed since June by former government contractor Edward Snowden.

The 2008 law amending the Foreign Intelligence Surveillance Act allows the NSA to intercept the communications of suspected foreign terrorists without warrants. The data can include the communications of U.S. citizens as long as they arent the target of an investigation. A warrant is required to search the communications of Americans who are the focus of an investigation.

Wyden and Udall have long warned that intelligence agencies use the loophole to monitor the communications of Americans without warrants and said legislation is needed to prevent that type of spying.

It is now clear to the public that the list of ongoing intrusive surveillance practices by the NSA includes not only bulk collection of Americans phone records, but also warrantless searches of the content of Americans personal communications, Wyden and Udall said yesterday.

Read more:
NSA Searched Americans’ E-Mail, Phone Calls, Clapper Says