Drug Enforcement Administration Office of Investigative Technology



Similar documents
5C-315. Presentation To. United States Department of Justice Office of Enforcement Operations Narcotics & Dangerous Drugs Section

BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

Mobility and cellular networks

Your Guide to Broadband and Telecom in Ohio

September 16, Georgia Letter Ruling SUT No Communications

Written Testimony of John L. Barnes Director of Product Development Verizon Business. Hearing on VoIP: Who Has Jurisdiction to Tax It?

How To Make A Cell Phone Converged Into A Cell Network

Definition of Mobile Instant Messaging (MIM) Systems

Small Business Mobility

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief.

The Internet and Network Technologies

NATOA 2011 Conference - Gigabit Communities San Francisco September 20-23, 2011

Social Media The Technology HCCA Compliance Institute Orlando, Florida

Small Business Mobility

Practical Steps Toward Fixed Mobile Convergence for IP Communications

Is Skype Safe for Judges?

Service Providers and WebRTC

Definitions of the Telecommunication indicators used in the EUROSTAT telecommunications inquiry

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

NSW Government. Wireless services (WiFi) Standard

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

Small Business Mobility

WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services

Small Business Mobility

DOCUMENT REFERENCE: SQ EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014

Small Business Mobility

Mobile Device Manual for 3G DVRs

BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

Wireless Broadband Access

Small Business Mobility

Small Business Mobility

Small Business Mobility

MAKING THE RIGHT CONNECTIONS

VoIP Growing Statistics

Small Business Mobility

Mobility at Northwestern

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

DATA RETENTION. Guidelines for Service Providers

FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction

Beginners Guide to Mobile Technology

Mobile Wireless Overview

TAXONOMY OF TELECOM TERMS

International Seminar on ICT Applications in Agriculture/Rural Industry, 5-7 April 2004 Beijing, China

Purdue University proudly presents. Aaron Jarvis, Network Engineer.

Small Business Mobility

Wi-Fi calling for business: ROGERS WHITE PAPER. An Executive Overview

Calling All Countries: The VoIP Revolution is Here!

Deaf access to 911 via new technologies

DRAFT Second Circulation for Comments

NATIONAL COST OF VoIP BYPASS

Small Business Mobility

Is Skype Safe for Judges?

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

HOW IT WORKS: THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction

Fixed Mobile Convergence Options for the Enterprise

VOIP NEXT GENERATION MOBILE TELEPHONY Piyush Yadav, Yogesh Yadav

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Small Business Mobility

Clients for Unified Communications

MaXphone Multi-Access Extension for Smartphones

3G/Wi-Fi Seamless Offload

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition

Small Business Mobility

Ultimate SME Solution

Small Business Mobility

Regional Bell Operating Companies (RBOC) Data Communications Strategies and Opportunities, Market Forecasts,

Personal Broadband and the Enterprise Customer

Developing a successful Big Data strategy. Using Big Data to improve business outcomes

The GENBAND IP Interconnect Solution. Natasha Tamaskar VP, Product Marketing GENBAND

U.S. Patent Appl. No. 13/ filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

How To Answer A Question About Your Organization'S History Of Esi

HARNESS THE POWER OF IP based TELECOMMS

Using Mobiles for On Campus Location Tracking

White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers

Wi-Fi integration with cellular networks enhances the customer experience. White paper

The U.S. Cellular Industry Analysis and Forecasts: Manufacturers, Operating Systems and Carriers

Wireless Telecommunication Industry Overview

WHITE PAPER. Gaining Total Visibility for Lawful Interception

VoIP Survivor s s Guide

Cloud Voice A new and simpler way to deliver your voice communications

5 Common Hosted VoIP Myths Debunked

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

Mobile-Convergence Solution Unified Enterprise Communications

Lee Barnes, CTO Utopia Solutions. Utopia Solutions

Why VoIP Peer to Peer and Social Networking providers cannot ignore Legacy Telecoms! Or why Peer to Peer VoIP needs Voip-Pal IP to succeed!

Converged IP Messaging

Privacy Year in Review: Privacy and VoIP Technology

Mobile Phone Terminology Simplifying telecoms management

VOIP Security Essentials. Jeff Waldron

THE NATIONAL JUDICIAL COLLEGE

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

Skype network has three types of machines, all running the same software and treated equally:

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

RCS - Overview. Rich Communication Suite

Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the

GPSintegrated - GPS Tracking Platform

Transcription:

Drug Enforcement Administration Office of Investigative Technology Emerging Communications New York April 8, 2010 DEA Sensitive I nformation May Not Be Used Or Disclosed Outside DEA

Next Generation Wireless (NGW) Office of Investigative Technology Operational Support Unit Emerging Communications Challenges Electronic Surveillance Reform Communications Records Exploitation DEA Sensitive I nformation May Not Be Used Or Disclosed Outside DEA

Technology Transition World-wide Industry full-scale convergence and transition from traditional circuit -switched communications to I.P. - based communications throughout the world. Wireless data (i.e., Smart-phones, mobile broadband) is driving the telecommunications industry and creating new revenues. Consumer's growing demand for wireless data services and computer-like capabilities (wireless apps) such as Skype, Facebook, email. Chat, IM, encryption, peer-to-peer, Location based Services (LBS), multi-media, VoIP. AT&T wireless data traffic is doubling every quarter and being driven by messaging, internet access, applications and related services. DEA Sensitive I nformation May Not Be Used Or Disclosed Outside DEA

ELSUR Capabilities Increasing Technical Capability Gap Intercept Capabilities 1990 Digital Electronics and Computer Revolution Telecommunications Revolution Evolution of Technology 2000 2008 Convergence of Wireless and Internet Technologies

Did You Know-

Definitions 5* Voice Over Internet Protocol - VOIP ; Smart-phone ; Public Switched Telephone Network - PSTN ; Circuit Switched - Traditional Telephone Comms ; Packet Switched - LP. based - Data Communications Convergence App Store (Itunes, Google, RIM App World) WiFi [ 5C-213

Communications Assistance For Law Enforcement Act (CALEA) Congress enacted CALEA in October 1994 to preserve the ability of law enforcement to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have the necessary surveillance capabilities. Applies to - Common carriers - Facilities-based broadband Internet access providers - providers of interconnected "Managed" Voice over Internet Protocol (VoIP) service. - All defined as "telecommunications carriers" for purposes of CALEA

Traditional Switch Based Intercept Telephone Law Enforcement CALEA was designed and Implemented for the PSTN Infrastructure depicted here.

Emerging Communications Challenges Target Mobility Target Identification (WiFi) IP Based Communications Peer to Peer Communications Multiple types of Broadband Services (e.g., Wireless, Cable, FIOS) Encryption Authentication Data Retention (Text Messai

Mobile Device Capabilities Hand-held gaming and Smart-phone Devices Voice over LP. (VoIP) Email Text Messaging (SMS) Instant Messaging (IM)/ Chat 90+ different Voice over IP (VoIP) applications available Web-based Virtual Worlds. (Second life, World of Warcraft! Wi-Fi 3 rd party GPS Mapping Applications Social Networking (Facebook, Flickr, MySpace etc...) Web-based email (Hotmail, Yahoo etc.. )

WIRELESS EVOLUTION 1.8 1.6 ^ ^ # 1.4 1.2 Annualized Total 1 Wireless Revenues (in Billions) 0.8 Annualized Wireless 0.6 Data Revenues (in Billions) 0.4 0.2 / 0 é n\ nx * < sv N-vV- & Annualized Yearly SMS (Text) Msgs (in Trillions) S152.6B $41.5B $113.SB $8.5B $45.3B $19B S211.2M N/A 1.56T 81B N/A N/A 5C-219

Shift from Mobile Voice to Mobile Internet and Text Messaging- Data Communications 45.0 40.0 35.0 Mobile Data Customers 1000 900 800 700 Text Messages 30.0 600 25.0 500 20.0 400 15.0 300 10.0 5.0 0.0 Jan-06 Jan-07 Jan-08 200 100 0 2007 Dec-08 5C - 220

Shift in Judicial Intercept Trends Wireless communications technologies are the preferred Method of communications for drug traffickers 1991 2007 W l%vl%v2% Wireless Mobile Landline Multiple Business Roving Other

5C - 224

Voice over I.P. (VoIP) A communications method that converts analog voice to standard I.P. Language, so that it can be transmitted over the internet. Managed VoIP: (Vonage, Magic Jack, Google Voice) Unmanaged VoIP: (Skype, Fring, and other 3 rd party Apps) Cable ^ Modem;' î i * Personal Computer Personal Computer Telephone < 0 Phone Adapter v Telephone dm A w 5C - 225

Skype An unmanaged provider of peerto-peer global communications via the internet i j 5C - 226

Skype Supports three primary methods of communications: " ; - Skype to Skype: Free, Encrypted Computer to computer voice, chat, IM, video ; - Skype-Out: Unencrypted I.P. call to traditional telephone (cellular/ landline). CDR's and I.P. Logs available.. Cost per call. I - Skype-ln: Traditional cellular or landline unencrypted call to j a Skype assigned number. Cost per call. 5C - 227

5C - 229 -"i^ef An unmana S ec * provider of encrypted peer to peer global communications via the internet

Google Voice-Managed VoIP

Research in Motion Blackberry Records Exploitation 5C - 236

Blackberry A communication device developed by Research in Motion (RIM), Waterloo, Canada. Provides encrypted data communication services over wireless networks. Not subject to U.S. CALEA laws. Service is provided by multiple providers, internationally and domestically, such as AT&T, Verizon, T-Mobile, Sprint.

Basic Architecture of Blackberry BIS (Blackberry Internet Service): Provides subscribers with delivery of email messages, web-browsing. Blackberry.net (Encrypted email service hosted by RIM/) and integrated webmail accounts (Hotmail, Yahoo, GmaiL.)

Basic Architecture of Blackberry BES (Blackberry Enterprise Server). Designed to establish encrypted, two-way communications between blackberry devices among user defined groups Also marketed to the public i 5C - 239

PIN to PIN Messaging PIN to PIN Messaging. Encrypted peer to peer messaging between j blackberry devices. Messages can be sent across networks, worldwide, via a central relay managed by RIM. 5C - 240

v v n a c s UBITRACK i UBITRACK is a tracking system that combines GSM and GPS technologies with internet, allowing in a fast simple way the monitoring and localization of vehicles, assets, and persons worldwide, in real time, 24 hours a day, 365 days a year. http://www.ubitrackonline.com/gps/index.aspx 5C - 246

I-Touch Demo

I-Phone A Smartphone manufactured by Apple Inc. and currently offered only through AT&T- (U.S.) Supports multiple applications through Apple itunes that facilitate voice and data communications over the cellular and WiFi networks. - Skype, Fring, Free SMS, Email, Facebook

IMSI & IMEI An International Mobile Subscriber Identity or IMSI (pronounced /Ehmzi/) is a unique number associated with all GSM and UMTS network mobile phone users. It is stored in the SIM inside the phone and is sent by the phone to the network. IMSI: 310 150123456789 MCC MNC MSIN 310 USA 150 AT&T Mobility 123456789 The International Mobile Equipment Identity or IMEI (pronounced /aibmi ; /) is only used to identify the device, and has no permanent or semi- ; permanent relation to the subscriber However, the IMEI is valuable information for determining the types of applications and features the device can support.

I Wireless Fidelity (WiFi) I 5C - 252

Wi-Fi Cell Phones Expected to Double in Two Years 8-28-09 CIO.com 400% Growth in WW Public Wi-Fi Hotspots: 2004-2009 (June) " 1 «. '."»in II nr.,,, - Vt-,- -.-1- ---. -:,-- -..-vf. l V --.,...,,....... ' _ ^ Source; JM/ire y 2009 Source: JiWtre, 2009 5C - 253

Unlicensed Mobile Access (UMAJ allows some smartphone users to seamlessly switch from a 3G network to an Wij-Fi Hot Spot without beinglprompted What does this mean for Title III and Call Detail Records? 5C - 254

Internet Protocol Address I. P. Address 4* Resolution i! Í! 5C - 257

Other I.P. Address Registry Authorities 5C - 262

Social Networking A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services, such as pictures. Most social network services are web based and provides means for users to interact over the internet, such as e-mail and ; instant messaging Features offered by these sites, such as ease of use and user control of j privacy settings, offer an alternative means of communication to criminal entities. Facebook, MySpace and Sonico, as well as others, offer features I which give the user control of how they communicate and exchange j information hi oonicoyoufqtg 5C - 263

Facebook Exploiting social networking account s allows law enforcement to obtain information to further an investigation, including associates (friends), email addresses, phone numbers, photos, credit card information, etc 2703c Preservation Letter 2703d Search Warrant

Virtual Worlds Defined A virtual world is an animated three-dimensional computer generated world that allow users the ability to interact within I the environment by virtue of an avatar (computerized ; character that the user chooses to represent themselves). The user's avatar interacts and communicates with other users in the virtual world through VoIP and/or instant messaging. In simple terms, the avatar is a remote controlled character or proxy.

5C - 266 Virtual Gaming Example

5C - 267 Summary

Q & A Handouts

Drug Enforcement Administration Office of Investigative Technology Diminishing Electronic Surveillance Capabilities in the Communications Age St. Louis Division August 10, 2010 DEA Sensitive Information. May Not Be Used Or Disclosed Outside DEA

AGENDA Overview of current LI capabilities Convergence of circuit and packet switched technologies (2G, 3G, 4G). Emerging Communications Challenges Legal Challenges Resource Challenges DEA Sensitive Information. May Not Be Used Or Disclosed Outside DEA

Communications Assistance For Law Enforcement Act (CALEA) Congress enacted CALEA in October 1994 to preserve the ability of law enforcement to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have the necessary surveillance capabilities. Applies to - Common carriers - Facilities-based broadband Internet access providers - Providers of interconnected (MANAGED) Voice over Internet Protocol (VoIP) services. - All defined as "telecommunications carriers'' for purposes of CALEA -273

Traditional Switch Based Intercept 1994 Landscape Telephone Switch Office k 2 Target Devices >o^s/cj I f* «# o I u I i\ ti i ^ «j Law Enforcement CALEA was designed and Implemented for the PSTN Infrastructure depicted here. 5C - 274

Drivers Industry full scale convergence and transformation of traditional circuit switched communications to LP. based communications throughout the world. Wireless data (i.e., Smart-phones, mobile broadband) is driving the telecommunications industry and creating new revenues. Consumer's growing demand for wireless data services and computer-like capabilities such as Skype, encryption, peer-to-peer, location based services (LBS), multi-media, VoIP. AT&T wireless data traffic is doubling every quarter and being driven by messaging, internet access, applications and related services. "Wireless data is driving the economy, Smartphone wireless connectivity is the answer." Communications Commission Meredith Attweil-Baker, Commissioner Federal 5C - 277

Wireless Data Trends Wireless data service revenues for the first half of 2009 climbed to more than $19.4 billion a 31% increase from the first half of 2008. - There are more than 276 million U.S. wireless subscribers. - More than 740 billion text messages were reported for the first half of 2009 breaking down to 4.1 billion messages per day which is nearly double the amount of texts reported for the first half of 2008. - 1.1 trillion minutes were used in the first half of 2009 breaking down to 6.4 billion minutes-of-use per day. - More than 246 million data-capable devices are in the hands of consumers today. More than 40 million of these devices are Smart-phones or wirelessenabled PDAs and more than 10 million are wireless-enabled laptops, notebooks or air-cards -278

Shift from Mobile Voice to Mobile Internet - Data Communications 45.0 Mobile Data Customers 1000 900 800 Text Messages 700 600 500 400 300 200 100 Jan-06 Jan-07 Jan-08 0 2007 5C - 279

Global Mobile Data Traffic Growth ; < '! 2,500,000 131% CÄGR 2008-2013 2.2 EB/mo AAA AAA m 2,000,000 1,500,000 1,000,000 2008 2009 2010 2011 2012 2013 Source: Cisco Visual Networking index-forecast, 2008-2013 5C - 280

Chasing Technology Target exploitation in an IP world does not look the same as in a switched-based world. Scale and pace of wireless IP communications technology is developing quicker that we can adapt to in light of current legislation and policies. We need to improve our ability to respond to developing communications technologies through both resource allocation and legislative reform. DEA Sensitive Information. May Not Be Used Or Disclosed Outside DEA

Technology Challenges Today Target Mobility Target Identification IP Based Communications Peer to Peer Communications Multiple types of Broadband Services (e.g., Wireless, Cable, FIOS) «Encryption Authentication 5C - 282

User talking via standard cell tower When in range of Wi-Fi hotspot.. Handset connects over VoIP Lose Wi-Fi ^ signal.. Back to standard cell tower : L Auto-authentication allows some smart-phone users to seamlessly switch from a 3G network to an Wi-Fi Hot Spot without being prompted 5C - 283

Wi-Fi Cell Phones Expected to Double in Two Years 8-28-09 CIO.com Worldwide Public Wi-Fi Hotspots: 2004-2009 400% Growth in WW Publie Wi-Fi Hotspots: 2004-2009 (June) Top 10 U.S. Cities for Pi jblic Wi-Fi: June 2009 June Rank U.S. Cities 2009 # Of HotSpOtS 219,681 237,507 258.853 l New York City 887 1 2 San Francisco 872 I 3 Chicago 792! j 53,746 4 Seattle 625 f 5 Houston 617 6 Los Angeles 505 1 7 Atlanta 453 I 8 San Diego 438 1 2004 200S Source: JiWire, 2009 2006 2007 2008 2QOS (June) 9 San Antonio 431 I 10 Austin 417! in Source: JiWire, 2009

5C - 285 Convergence of Smart-Phones, Game Stations, VoIP Applications and 3G/Wi-Fi Technology

Smart-Phone Capabilities Mobile Data Smart-phone capabilities include: - Traditional Voice - Email - Text Messaging (SMS) - Instant Messaging (IM)/Chat - 72 different Voice over IP (VoIP) applications available - Web-based Virtual Worlds. (Second life, World of Warcraft - Wi-Fi - 3 rd party GPS Mapping Applications - Social Networking (Facebook, Flickr, MySpace etc...) - Web-based email (Hotmail, Yahoo etc.. ) 5C - 286

IS GOING DARK GOING ANYWHERE? 5C - 292

Drug Enforcement Administration Office of Investigative Technology Diminishing Electronic Surveillance Capabilities in the Communications Age Merlin Users Group October 21, 2010 DEA Sensitive Information. May Not Be Used Or Disclosed Outside DEA

AGENDA Overview of current LI capabilities Convergence of circuit and packet switched technologies (2G, 3G, 4G). Emerging Communications Challenges Legal Challenges Resource Challenges DEA Sensitive Information. May Not Be Used Or Disclosed Outside DEA

Communications Assistance For Law Enforcement Act (CALEA) Congress enacted CALEA in October 1994 to preserve the ability of law enforcement to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have the necessary surveillance capabilities. Applies to - Common carriers - Facilities-based broadband Internet access providers - Providers of interconnected (MANAGED) Voice over Internet Protocol (VoIP) services. - All defined as "telecommunications carriers" for purposes of CALEA

Traditional Switch Based Intercept 1994 Landscape Telephone Switch Office Target Devices : M M JSä Law Enforcement CALEA was designed and implemented for the PSTf Infrastructure depicted he 5C - 297

Wireless Data Trends Wireless data service revenues for the first half of 2009 climbed to more than $19.4 billion a 31% increase from the first half of 2008. - There are more than 276 million U.S. wireless subscribers. - More than 740 billion text messages were reported for the first half of 2009 breaking down to 4.1 billion messages per day which is nearly double the amount of texts reported for the first half of 2008. - 1.1 trillion minutes were used in the first half of 2009 breaking down to 6.4 billion minutes-of-use per day. - More than 246 million data-capable devices are in the hands of consumers today. More than 40 million of these devices are Smart-phones or wirelessenabled PDAs and more than 10 million are wireless-enabled laptops, notebooks or air-cards 5C - 300

Global Mobile Data Traffic Growth lilmwt 2.2 EB/mo 1,500,000 1,000,000 500,000 2008 2009 2010 2011 2012 2013 Source: Cisco Visual Networking Index - Forecast, 2008-2013 5C-301

Chasing Technology Target exploitation in an IP world does not look the same as in a switched-based world. Scale and pace of wireless IP communications technology is developing quicker that we can adapt to in light of current legislation and policies. We need to improve our ability to respond to developing communications technologies through both resource allocation and legislative reform. DEA Sensitive Information. May Not Be Used Or Disclosed Outside DEA

Technology Challenges Todav Target Mobility Target Identification IP Based Communications Peer to Peer Communications Multiple types of Broadband Services (e.g., Wireless, Cable, FIOS) Encryption Authentication 5C - 303

Sprint ZONE "i 'i M Ç Sprint r User talking via Standard cell tower When in range of Wi-Fi hotspot.. Handset connects over VoIP Lose Wi-Fi signal.. Back to standard cell tower Auto-authentication allows some smart-phone users to seamlessly switch from a 3G network to an Wi-Fi Hot Spot without being prompted What does this mean for Title I and Call Detail Records? 5C - 304

Wi-Fi Cell Phones Expected to Double m Two Years Worldwide Public Wi-Fi Hotspots: 2004-2009 400% Growth in WW Public Wi-Fi Hotspots: 2004-2009 (June) 213,681 237,507 258,853 8-28-09 CIO.com Top 10 U.S. Cities for Public Wi-Fi June 2009 2009 Rank U.S. Cities # 0 f Hotspots 1 New York City S87 2 Sari Francisco 872 3 Chicago 792 4 Seattle 625 5 Houston 617 53,746 6 Los Angeles 505 7 Atlanta 453 8 San Diego 438 2004 20Ö5 2006 2007 2008 2009 (June) 9 San Antonio 431 10 Austin 417 Source: JiWire, 2009 Source: JiWire, 2009 5C - 305

5C - 306 Convergence of Smart-Phones, Game Stations, VoIP Applications and 3G/Wi-Fi Technology

Smart-Phone Capabilities Mobile Data Smart-phone capabilities include: - Traditional Voice - Email - Text Messaging (SMS) - Instant Messaging (IM)/Chat - 72 different Voice over IP (VoIP) applications available - Web-based Virtual Worlds. (Second life, World of Warcraft - Wi-Fi I - 3 rd party GPS Mapping Applications - Social Networking (Facebook, Flickr, MySpace etc,..) - Web-based email (Hotmail, Yahoo etc.. ) 5C - 307

IS GOING DARK GOING ANYWHERE? 5C-313