<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_06_13_0132214</id>
	<title>Default Passwords Blamed In $55M PBX Hacks</title>
	<author>ScuttleMonkey</author>
	<datestamp>1244921220000</datestamp>
	<htmltext>An anonymous reader writes <i>"The Washington Post is reporting that the US Justice Department has indicted three residents of the Philippines for <a href="http://voices.washingtonpost.com/securityfix/2009/06/default\_passwords\_led\_to\_55\_mi.html">breaking into more than 2,500 corporate PBX systems</a> in the United States and abroad. The government says the hackers sold access to those systems to operators of call centers in Italy, which allegedly made 12 million minutes of unauthorized phone calls through the system, valued at more than $55 million. The DOJ's action coincides with an announcement from Italian authorities today of the arrest of five men there who are suspected of funneling the profits from those call centers to terrorist groups in Southeast Asia."</i></htmltext>
<tokenext>An anonymous reader writes " The Washington Post is reporting that the US Justice Department has indicted three residents of the Philippines for breaking into more than 2,500 corporate PBX systems in the United States and abroad .
The government says the hackers sold access to those systems to operators of call centers in Italy , which allegedly made 12 million minutes of unauthorized phone calls through the system , valued at more than $ 55 million .
The DOJ 's action coincides with an announcement from Italian authorities today of the arrest of five men there who are suspected of funneling the profits from those call centers to terrorist groups in Southeast Asia .
"</tokentext>
<sentencetext>An anonymous reader writes "The Washington Post is reporting that the US Justice Department has indicted three residents of the Philippines for breaking into more than 2,500 corporate PBX systems in the United States and abroad.
The government says the hackers sold access to those systems to operators of call centers in Italy, which allegedly made 12 million minutes of unauthorized phone calls through the system, valued at more than $55 million.
The DOJ's action coincides with an announcement from Italian authorities today of the arrest of five men there who are suspected of funneling the profits from those call centers to terrorist groups in Southeast Asia.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319521</id>
	<title>simple solution..</title>
	<author>orange47</author>
	<datestamp>1244904900000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext>..make all default passwords hard to guess!</htmltext>
<tokenext>..make all default passwords hard to guess !</tokentext>
<sentencetext>..make all default passwords hard to guess!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320821</id>
	<title>Re:Hacking?</title>
	<author>timmyd</author>
	<datestamp>1244916720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I wouldn't necessarily call it default passwords. I believe I was one of the people victim to this. I have an asterisk PBX setup for my parents at their house so they could call me for free. One of the problems I think with asterisk is that the flag "allowguest" is set to true by default which means random computers on the internet can connect to your box and try to call out. (I also made the mistake of allowing the default dialplan to have a way to dial out on this computer). I noticed this a few weeks prior when bots had been randomly connecting to me and tried to place outgoing calls. I promptly found the 'feature' and turned it off on my computer and I was planning to do the same on my parents box. Unfortunately I forgot about doing it and about a week ago I noticed that I had a lot of calls had been placed to cell phones in the Philippines. It easily ate through the $60 I had in my prepaid account until I had realized what had happened.</p></htmltext>
<tokenext>I would n't necessarily call it default passwords .
I believe I was one of the people victim to this .
I have an asterisk PBX setup for my parents at their house so they could call me for free .
One of the problems I think with asterisk is that the flag " allowguest " is set to true by default which means random computers on the internet can connect to your box and try to call out .
( I also made the mistake of allowing the default dialplan to have a way to dial out on this computer ) .
I noticed this a few weeks prior when bots had been randomly connecting to me and tried to place outgoing calls .
I promptly found the 'feature ' and turned it off on my computer and I was planning to do the same on my parents box .
Unfortunately I forgot about doing it and about a week ago I noticed that I had a lot of calls had been placed to cell phones in the Philippines .
It easily ate through the $ 60 I had in my prepaid account until I had realized what had happened .</tokentext>
<sentencetext>I wouldn't necessarily call it default passwords.
I believe I was one of the people victim to this.
I have an asterisk PBX setup for my parents at their house so they could call me for free.
One of the problems I think with asterisk is that the flag "allowguest" is set to true by default which means random computers on the internet can connect to your box and try to call out.
(I also made the mistake of allowing the default dialplan to have a way to dial out on this computer).
I noticed this a few weeks prior when bots had been randomly connecting to me and tried to place outgoing calls.
I promptly found the 'feature' and turned it off on my computer and I was planning to do the same on my parents box.
Unfortunately I forgot about doing it and about a week ago I noticed that I had a lot of calls had been placed to cell phones in the Philippines.
It easily ate through the $60 I had in my prepaid account until I had realized what had happened.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319743</id>
	<title>Missed Call Centrees</title>
	<author>Luthair</author>
	<datestamp>1244907420000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext>At first I thought it was trying to claim that 3 men used 12 million minutes of phone time, I mean three women I could believe!</htmltext>
<tokenext>At first I thought it was trying to claim that 3 men used 12 million minutes of phone time , I mean three women I could believe !</tokentext>
<sentencetext>At first I thought it was trying to claim that 3 men used 12 million minutes of phone time, I mean three women I could believe!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320311</id>
	<title>Re:Hacking?</title>
	<author>Anonymous</author>
	<datestamp>1244912520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I know of a hospital in a major metropolitan area which has default passwords set for its inter-staff communication system, security cameras, and God only knows what else. They're also dependent on 802.11g for communication between units as well as their security cameras. Then they have the IV pumps which have their own network -- WHY THE FUCK ARE IV PUMPS ON A WIRELESS NETWORK?!</p><p>I'm waiting for someone to just stick a cheap laptop up under a desk and throw up thousands of bogus access points and jam the whole mess, or to change the sounds for their Vocera system to fart sounds and F-bombs. And can you imagine what you could do with the unencrypted public network they have for their patients and guests with airpwn?</p></htmltext>
<tokenext>I know of a hospital in a major metropolitan area which has default passwords set for its inter-staff communication system , security cameras , and God only knows what else .
They 're also dependent on 802.11g for communication between units as well as their security cameras .
Then they have the IV pumps which have their own network -- WHY THE FUCK ARE IV PUMPS ON A WIRELESS NETWORK ?
! I 'm waiting for someone to just stick a cheap laptop up under a desk and throw up thousands of bogus access points and jam the whole mess , or to change the sounds for their Vocera system to fart sounds and F-bombs .
And can you imagine what you could do with the unencrypted public network they have for their patients and guests with airpwn ?</tokentext>
<sentencetext>I know of a hospital in a major metropolitan area which has default passwords set for its inter-staff communication system, security cameras, and God only knows what else.
They're also dependent on 802.11g for communication between units as well as their security cameras.
Then they have the IV pumps which have their own network -- WHY THE FUCK ARE IV PUMPS ON A WIRELESS NETWORK?
!I'm waiting for someone to just stick a cheap laptop up under a desk and throw up thousands of bogus access points and jam the whole mess, or to change the sounds for their Vocera system to fart sounds and F-bombs.
And can you imagine what you could do with the unencrypted public network they have for their patients and guests with airpwn?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318095</id>
	<title>Yea well</title>
	<author>Anonymous</author>
	<datestamp>1244925600000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>Maybe governments should figure out its the 21st century out there, and stop treating phone traffic as a source of tax revenue, instead of treating it exactly like every other kind of electronic traffic (internet, bank transactions, etc), which is tax free the way it should be. Then those "terrorist groups" would suddenly find themselves out of profit.</p><p>CAPTCHA: Rackets. How appropriate.</p></htmltext>
<tokenext>Maybe governments should figure out its the 21st century out there , and stop treating phone traffic as a source of tax revenue , instead of treating it exactly like every other kind of electronic traffic ( internet , bank transactions , etc ) , which is tax free the way it should be .
Then those " terrorist groups " would suddenly find themselves out of profit.CAPTCHA : Rackets .
How appropriate .</tokentext>
<sentencetext>Maybe governments should figure out its the 21st century out there, and stop treating phone traffic as a source of tax revenue, instead of treating it exactly like every other kind of electronic traffic (internet, bank transactions, etc), which is tax free the way it should be.
Then those "terrorist groups" would suddenly find themselves out of profit.CAPTCHA: Rackets.
How appropriate.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319897</id>
	<title>This is the bottom of the barrel</title>
	<author>aminorex</author>
	<datestamp>1244908800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>So slashdot is now echoing anonymous rumors of blatant lies in its headlines.  This is pretty shoddy work, ScuttleMonkey.</p><p>55 bucks for 12 minutes of long distance?  Not unless you're using an Iridium sat phone!  It's typical LEO bullcrap propaganda.</p><p>And don't get me started on "financing terrorism".  It's the pot calling the snowman "darkie", is what that is.</p></htmltext>
<tokenext>So slashdot is now echoing anonymous rumors of blatant lies in its headlines .
This is pretty shoddy work , ScuttleMonkey.55 bucks for 12 minutes of long distance ?
Not unless you 're using an Iridium sat phone !
It 's typical LEO bullcrap propaganda.And do n't get me started on " financing terrorism " .
It 's the pot calling the snowman " darkie " , is what that is .</tokentext>
<sentencetext>So slashdot is now echoing anonymous rumors of blatant lies in its headlines.
This is pretty shoddy work, ScuttleMonkey.55 bucks for 12 minutes of long distance?
Not unless you're using an Iridium sat phone!
It's typical LEO bullcrap propaganda.And don't get me started on "financing terrorism".
It's the pot calling the snowman "darkie", is what that is.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28328099</id>
	<title>Re:Its probably a DISA hack</title>
	<author>djdavetrouble</author>
	<datestamp>1245009660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>Anyhow back in my TDM days I used to run PABXs for a large corporation. A few years before I started the EXACT SAME THING happened to us - someone phreaked the PIN code to the disa number - and was then selling calling cards in the phillipines that rerouted using one of our PABX's DISA lol.</i></p><p>back before hacking vs cracking (cracking was what you did to apple ][ games), phreaking was very popular as a teenage sport. PBX's and voicemail systems were popular targets, of course. I had access to a local PBX belonging to LCC (LARGE COMPUTER CORPORATION) via brute force. It had unlimited outbound, and the password famously spelled "Rock". We kept it to ourselves and it worked for 4 or 5 years for our little team. I have seen a few large scale operations to monetize stolen telephone networks, this is nothing new. In New York City, there are so many foreign people that want to call home that there<br>is a cottage industry catering to them. There are even long distance "stores" where you go to a booth and call the Dominican Republic or whatever. Back when calling cards were more popular, it was known that there were spotters at JFK airport that would try to look at your fingers as you entered your code.<br>Still, it is a pretty ambitious plan that these guys undertook.... and terrorists omglol</p></htmltext>
<tokenext>Anyhow back in my TDM days I used to run PABXs for a large corporation .
A few years before I started the EXACT SAME THING happened to us - someone phreaked the PIN code to the disa number - and was then selling calling cards in the phillipines that rerouted using one of our PABX 's DISA lol.back before hacking vs cracking ( cracking was what you did to apple ] [ games ) , phreaking was very popular as a teenage sport .
PBX 's and voicemail systems were popular targets , of course .
I had access to a local PBX belonging to LCC ( LARGE COMPUTER CORPORATION ) via brute force .
It had unlimited outbound , and the password famously spelled " Rock " .
We kept it to ourselves and it worked for 4 or 5 years for our little team .
I have seen a few large scale operations to monetize stolen telephone networks , this is nothing new .
In New York City , there are so many foreign people that want to call home that thereis a cottage industry catering to them .
There are even long distance " stores " where you go to a booth and call the Dominican Republic or whatever .
Back when calling cards were more popular , it was known that there were spotters at JFK airport that would try to look at your fingers as you entered your code.Still , it is a pretty ambitious plan that these guys undertook.... and terrorists omglol</tokentext>
<sentencetext>Anyhow back in my TDM days I used to run PABXs for a large corporation.
A few years before I started the EXACT SAME THING happened to us - someone phreaked the PIN code to the disa number - and was then selling calling cards in the phillipines that rerouted using one of our PABX's DISA lol.back before hacking vs cracking (cracking was what you did to apple ][ games), phreaking was very popular as a teenage sport.
PBX's and voicemail systems were popular targets, of course.
I had access to a local PBX belonging to LCC (LARGE COMPUTER CORPORATION) via brute force.
It had unlimited outbound, and the password famously spelled "Rock".
We kept it to ourselves and it worked for 4 or 5 years for our little team.
I have seen a few large scale operations to monetize stolen telephone networks, this is nothing new.
In New York City, there are so many foreign people that want to call home that thereis a cottage industry catering to them.
There are even long distance "stores" where you go to a booth and call the Dominican Republic or whatever.
Back when calling cards were more popular, it was known that there were spotters at JFK airport that would try to look at your fingers as you entered your code.Still, it is a pretty ambitious plan that these guys undertook.... and terrorists omglol</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318783</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319863</id>
	<title>Re:Hacking?</title>
	<author>Anonymous</author>
	<datestamp>1244908500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The law doesn't require it to be a challenge.  It might increase the penalties, but the mere fact that there was a password and as such, a security system in place, makes it hacking.</p></htmltext>
<tokenext>The law does n't require it to be a challenge .
It might increase the penalties , but the mere fact that there was a password and as such , a security system in place , makes it hacking .</tokentext>
<sentencetext>The law doesn't require it to be a challenge.
It might increase the penalties, but the mere fact that there was a password and as such, a security system in place, makes it hacking.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318445</id>
	<title>FREE XXX GALLERIES</title>
	<author>Anonymous</author>
	<datestamp>1244888580000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Tons and tons of FREE XXX GALLERIES / PICS / PORN VIDEOS! Visit my blog at: <a href="http://hardfckr69.blogspot.com/" title="blogspot.com" rel="nofollow">http://hardfckr69.blogspot.com</a> [blogspot.com]</p></htmltext>
<tokenext>Tons and tons of FREE XXX GALLERIES / PICS / PORN VIDEOS !
Visit my blog at : http : //hardfckr69.blogspot.com [ blogspot.com ]</tokentext>
<sentencetext>Tons and tons of FREE XXX GALLERIES / PICS / PORN VIDEOS!
Visit my blog at: http://hardfckr69.blogspot.com [blogspot.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318631</id>
	<title>Re:Hackers, hacks ??!?</title>
	<author>dns\_server</author>
	<datestamp>1244891760000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>"Hacking" laws are generally written with that language.<br>The COMPUTER CRIMES ACT 1997 has as section 3. "Unauthorized access to computer material."</p></htmltext>
<tokenext>" Hacking " laws are generally written with that language.The COMPUTER CRIMES ACT 1997 has as section 3 .
" Unauthorized access to computer material .
"</tokentext>
<sentencetext>"Hacking" laws are generally written with that language.The COMPUTER CRIMES ACT 1997 has as section 3.
"Unauthorized access to computer material.
"</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319003</id>
	<title>Re:Yea well</title>
	<author>PopeRatzo</author>
	<datestamp>1244898600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Or maybe, we should <i>all</i> figure out this is the 21st century, and stop treating phone traffic (and all electronic traffic) like a source of revenue.</p><p>While we're at it, I suggest we stop treating health care as a source of revenue, too, unless you are a provider.</p><p>I could continue...</p></htmltext>
<tokenext>Or maybe , we should all figure out this is the 21st century , and stop treating phone traffic ( and all electronic traffic ) like a source of revenue.While we 're at it , I suggest we stop treating health care as a source of revenue , too , unless you are a provider.I could continue.. .</tokentext>
<sentencetext>Or maybe, we should all figure out this is the 21st century, and stop treating phone traffic (and all electronic traffic) like a source of revenue.While we're at it, I suggest we stop treating health care as a source of revenue, too, unless you are a provider.I could continue...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318095</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28329151</id>
	<title>Re:Hackers, hacks ??!?</title>
	<author>liquiddark</author>
	<datestamp>1244973420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>"You make an excellent point, but your overall case suffers because you stole the 60 inch plasma screen and the family dog."</htmltext>
<tokenext>" You make an excellent point , but your overall case suffers because you stole the 60 inch plasma screen and the family dog .
"</tokentext>
<sentencetext>"You make an excellent point, but your overall case suffers because you stole the 60 inch plasma screen and the family dog.
"</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318333</id>
	<title>Re:12345 post</title>
	<author>Anonymous</author>
	<datestamp>1244886720000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><blockquote><div><p>12345</p></div></blockquote><p>That's the kinda thing an idiot would have on his luggage.</p></div>
	</htmltext>
<tokenext>12345That 's the kinda thing an idiot would have on his luggage .</tokentext>
<sentencetext>12345That's the kinda thing an idiot would have on his luggage.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318079</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28322669</id>
	<title>You're paying how much!?</title>
	<author>alexandre</author>
	<datestamp>1244889720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Are you saying the average cost of a phone call is 4.58$ per minute ?<br>you need to change your phone company! Calling oversee is usually 5-10 cents max, and maybe 25 cents&#194;for far out places.<br>(unless you really want to call that weird looking pacific island of course...)</p></htmltext>
<tokenext>Are you saying the average cost of a phone call is 4.58 $ per minute ? you need to change your phone company !
Calling oversee is usually 5-10 cents max , and maybe 25 cents   for far out places .
( unless you really want to call that weird looking pacific island of course... )</tokentext>
<sentencetext>Are you saying the average cost of a phone call is 4.58$ per minute ?you need to change your phone company!
Calling oversee is usually 5-10 cents max, and maybe 25 centsÂfor far out places.
(unless you really want to call that weird looking pacific island of course...)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318093</id>
	<title>Which one was it?</title>
	<author>Anonymous</author>
	<datestamp>1244925600000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext>admin or password?</htmltext>
<tokenext>admin or password ?</tokentext>
<sentencetext>admin or password?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318323</id>
	<title>Talk about obscure...</title>
	<author>Anonymous</author>
	<datestamp>1244886480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>What a <a href="http://www.youtube.com/watch?v=ErgdUhZteqw" title="youtube.com" rel="nofollow">reference!</a> [youtube.com]</p><p>Now where's the beef?</p></htmltext>
<tokenext>What a reference !
[ youtube.com ] Now where 's the beef ?</tokentext>
<sentencetext>What a reference!
[youtube.com]Now where's the beef?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318619</id>
	<title>Re:Hacking?</title>
	<author>Anonymous</author>
	<datestamp>1244891640000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><blockquote><div><p>Never leave default passwords is Rule #1. Or at least in the top 3.</p></div></blockquote><p>Indeed. The rules of IT:</p><ol> <li>You do not talk about IT.</li><li>You DO NOT talk about IT.</li><li>Never leave default passwords.</li><li>No girls allowed.</li></ol></div>
	</htmltext>
<tokenext>Never leave default passwords is Rule # 1 .
Or at least in the top 3.Indeed .
The rules of IT : You do not talk about IT.You DO NOT talk about IT.Never leave default passwords.No girls allowed .</tokentext>
<sentencetext>Never leave default passwords is Rule #1.
Or at least in the top 3.Indeed.
The rules of IT: You do not talk about IT.You DO NOT talk about IT.Never leave default passwords.No girls allowed.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318137</id>
	<title>$55 million</title>
	<author>Anonymous</author>
	<datestamp>1244926200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yeah. $55 million dollars in routings costs. Call me an idiot, but I just don't see how they could have used so much electricity that it added up to $55 million dollars. Maybe $54.98 million dollars was for technical support.</p></htmltext>
<tokenext>Yeah .
$ 55 million dollars in routings costs .
Call me an idiot , but I just do n't see how they could have used so much electricity that it added up to $ 55 million dollars .
Maybe $ 54.98 million dollars was for technical support .</tokentext>
<sentencetext>Yeah.
$55 million dollars in routings costs.
Call me an idiot, but I just don't see how they could have used so much electricity that it added up to $55 million dollars.
Maybe $54.98 million dollars was for technical support.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319925</id>
	<title>Re:That's a spicy meatball!</title>
	<author>Joe The Dragon</author>
	<datestamp>1244909040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>There are ways around that. Just like the time I call every number in Sunnyvale ca.</p></htmltext>
<tokenext>There are ways around that .
Just like the time I call every number in Sunnyvale ca .</tokentext>
<sentencetext>There are ways around that.
Just like the time I call every number in Sunnyvale ca.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319021</id>
	<title>Re:Feh.</title>
	<author>PopeRatzo</author>
	<datestamp>1244898840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>or at least, what is called terrorism</p></div></blockquote><p>That's how you get people's attention.  Say it's "funding terrorists".</p><p>Did you know that marijuana funds terrorism? That argument has been made repeatedly.</p></div>
	</htmltext>
<tokenext>or at least , what is called terrorismThat 's how you get people 's attention .
Say it 's " funding terrorists " .Did you know that marijuana funds terrorism ?
That argument has been made repeatedly .</tokentext>
<sentencetext>or at least, what is called terrorismThat's how you get people's attention.
Say it's "funding terrorists".Did you know that marijuana funds terrorism?
That argument has been made repeatedly.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318109</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28322873</id>
	<title>4.5 cents per minute</title>
	<author>Anonymous</author>
	<datestamp>1244891700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I doubt it - I get cheaper legitimate rates</p></htmltext>
<tokenext>I doubt it - I get cheaper legitimate rates</tokentext>
<sentencetext>I doubt it - I get cheaper legitimate rates</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28322919</id>
	<title>Re:Hackers, hacks ??!?</title>
	<author>Dare nMc</author>
	<datestamp>1244892120000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>The last PBX system I did has the default admin password but, 1) it is behind NAT 2) behind firewall 3) truck to main office is wrapped inside the VPN (VPN not default password).<br>Likely they need a bot net to scan ports, or some social engineering to find their way inside the networks.  another option is to trick the box into accepting a second trunk.  The last possibility is they placed calls, and knew which keys to get, or which modem type capability's to try and exploit, so have to take several guesses at which system they are hitting.<br>Even having dealt with many PBX's, it takes considerable effort on most of them, even with full access, to get these non-standard call in and be able to call back out...  (available feature on many systems, but not a standard line setting, that needs enabled/setup...)</p></htmltext>
<tokenext>The last PBX system I did has the default admin password but , 1 ) it is behind NAT 2 ) behind firewall 3 ) truck to main office is wrapped inside the VPN ( VPN not default password ) .Likely they need a bot net to scan ports , or some social engineering to find their way inside the networks .
another option is to trick the box into accepting a second trunk .
The last possibility is they placed calls , and knew which keys to get , or which modem type capability 's to try and exploit , so have to take several guesses at which system they are hitting.Even having dealt with many PBX 's , it takes considerable effort on most of them , even with full access , to get these non-standard call in and be able to call back out... ( available feature on many systems , but not a standard line setting , that needs enabled/setup... )</tokentext>
<sentencetext>The last PBX system I did has the default admin password but, 1) it is behind NAT 2) behind firewall 3) truck to main office is wrapped inside the VPN (VPN not default password).Likely they need a bot net to scan ports, or some social engineering to find their way inside the networks.
another option is to trick the box into accepting a second trunk.
The last possibility is they placed calls, and knew which keys to get, or which modem type capability's to try and exploit, so have to take several guesses at which system they are hitting.Even having dealt with many PBX's, it takes considerable effort on most of them, even with full access, to get these non-standard call in and be able to call back out...  (available feature on many systems, but not a standard line setting, that needs enabled/setup...)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320605</id>
	<title>Re:12345 post</title>
	<author>Sique</author>
	<datestamp>1244914860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>And it nearly matches the default password on most phone stations I am working with (not the PBX though). And because most customers have a very lousy password retainment and password storing policy, the colleagues keep the phone systems on their default passwords. If you know the extension for the modem that connects to the admin console, you could dial in from outside and go forward to administrate...</p></htmltext>
<tokenext>And it nearly matches the default password on most phone stations I am working with ( not the PBX though ) .
And because most customers have a very lousy password retainment and password storing policy , the colleagues keep the phone systems on their default passwords .
If you know the extension for the modem that connects to the admin console , you could dial in from outside and go forward to administrate.. .</tokentext>
<sentencetext>And it nearly matches the default password on most phone stations I am working with (not the PBX though).
And because most customers have a very lousy password retainment and password storing policy, the colleagues keep the phone systems on their default passwords.
If you know the extension for the modem that connects to the admin console, you could dial in from outside and go forward to administrate...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318333</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318847</id>
	<title>Re:Hacking?</title>
	<author>nausicaa</author>
	<datestamp>1244896200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Why does this remind me of The Cuckoo's Egg?</p><p>Same problem with default passwords, some 20+ years ago..</p><p>I'm well aware that the problems there weren't limited to default passwords, but it's one of those issues you'd think people would be more carefull about these days, at least when it comes to that kind of system.. It's one thing to have a homesystem with lax security, but this? Seriously? I guess it might be a case in point for me to use when explaining to people why it's actually important to try and use proper grammar all the time; skimp on it in one place and others easilly follow..</p></htmltext>
<tokenext>Why does this remind me of The Cuckoo 's Egg ? Same problem with default passwords , some 20 + years ago..I 'm well aware that the problems there were n't limited to default passwords , but it 's one of those issues you 'd think people would be more carefull about these days , at least when it comes to that kind of system.. It 's one thing to have a homesystem with lax security , but this ?
Seriously ? I guess it might be a case in point for me to use when explaining to people why it 's actually important to try and use proper grammar all the time ; skimp on it in one place and others easilly follow. .</tokentext>
<sentencetext>Why does this remind me of The Cuckoo's Egg?Same problem with default passwords, some 20+ years ago..I'm well aware that the problems there weren't limited to default passwords, but it's one of those issues you'd think people would be more carefull about these days, at least when it comes to that kind of system.. It's one thing to have a homesystem with lax security, but this?
Seriously? I guess it might be a case in point for me to use when explaining to people why it's actually important to try and use proper grammar all the time; skimp on it in one place and others easilly follow..</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318369</id>
	<title>Re:Which one was it?</title>
	<author>GreenTech11</author>
	<datestamp>1244887500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Most likely, the username...</htmltext>
<tokenext>Most likely , the username.. .</tokentext>
<sentencetext>Most likely, the username...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318093</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318079</id>
	<title>12345 post</title>
	<author>Anonymous</author>
	<datestamp>1244925420000</datestamp>
	<modclass>Funny</modclass>
	<modscore>0</modscore>
	<htmltext><p>12345</p></htmltext>
<tokenext>12345</tokentext>
<sentencetext>12345</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319209</id>
	<title>Re:Hackers, hacks ??!?</title>
	<author>Thaelon</author>
	<datestamp>1244901480000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>How is it even unauthorized?  <em>They used the correct passwords.</em></p></htmltext>
<tokenext>How is it even unauthorized ?
They used the correct passwords .</tokentext>
<sentencetext>How is it even unauthorized?
They used the correct passwords.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319893</id>
	<title>Phreak Freely...</title>
	<author>Anonymous</author>
	<datestamp>1244908800000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>It could be done via DISA... But DISA is usually not enabled by default, neither is Trunk to Trunk Transfer.</p><p>The brunt of the civil litigation will be aimed at the VAR's and manufacturers. It will be claimed that the breaches happened on their watch and they are therefore responsible. Toll Fraud Prevention is always one the the major selling points of any Maintenance Contract from the VAR's and PBX makers. Unless the PBX's were bought grey-market, and I think it's pretty unlikely that so many switches are floating around on the grey-market. Most IT departments don't admin their own switches beyond simple MAC... Rarely do you meet anyone in corporate IT that understand Dialplans, CoS, CoR, etc... unless the Telco side is their specialty... sadly, they are a dying breed.</p><p>Anyone that bashes the Filipinos as terrorist is simply a bigoted nitwit. If you have spent any time in Telco, you know that some of the best and brightest are the Filipinos techs. Just too bad that a couple of them used their talents for criminal purposes.</p><p>One questions that begs to be asked, was it a Cust level default password or a Vendor level default?</p></htmltext>
<tokenext>It could be done via DISA... But DISA is usually not enabled by default , neither is Trunk to Trunk Transfer.The brunt of the civil litigation will be aimed at the VAR 's and manufacturers .
It will be claimed that the breaches happened on their watch and they are therefore responsible .
Toll Fraud Prevention is always one the the major selling points of any Maintenance Contract from the VAR 's and PBX makers .
Unless the PBX 's were bought grey-market , and I think it 's pretty unlikely that so many switches are floating around on the grey-market .
Most IT departments do n't admin their own switches beyond simple MAC... Rarely do you meet anyone in corporate IT that understand Dialplans , CoS , CoR , etc... unless the Telco side is their specialty... sadly , they are a dying breed.Anyone that bashes the Filipinos as terrorist is simply a bigoted nitwit .
If you have spent any time in Telco , you know that some of the best and brightest are the Filipinos techs .
Just too bad that a couple of them used their talents for criminal purposes.One questions that begs to be asked , was it a Cust level default password or a Vendor level default ?</tokentext>
<sentencetext>It could be done via DISA... But DISA is usually not enabled by default, neither is Trunk to Trunk Transfer.The brunt of the civil litigation will be aimed at the VAR's and manufacturers.
It will be claimed that the breaches happened on their watch and they are therefore responsible.
Toll Fraud Prevention is always one the the major selling points of any Maintenance Contract from the VAR's and PBX makers.
Unless the PBX's were bought grey-market, and I think it's pretty unlikely that so many switches are floating around on the grey-market.
Most IT departments don't admin their own switches beyond simple MAC... Rarely do you meet anyone in corporate IT that understand Dialplans, CoS, CoR, etc... unless the Telco side is their specialty... sadly, they are a dying breed.Anyone that bashes the Filipinos as terrorist is simply a bigoted nitwit.
If you have spent any time in Telco, you know that some of the best and brightest are the Filipinos techs.
Just too bad that a couple of them used their talents for criminal purposes.One questions that begs to be asked, was it a Cust level default password or a Vendor level default?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318597</id>
	<title>Re:That's a spicy meatball!</title>
	<author>DavidD\_CA</author>
	<datestamp>1244891040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If they were from Italy to the US, that might be right.</p><p>Granted, not if you have VoIP or some international long distance plan, but rarely do these kinds of numbers ever show discounted prices.</p><p>I'd love to know if this was the source of those annoying "auto warranty" calls I keep getting.</p></htmltext>
<tokenext>If they were from Italy to the US , that might be right.Granted , not if you have VoIP or some international long distance plan , but rarely do these kinds of numbers ever show discounted prices.I 'd love to know if this was the source of those annoying " auto warranty " calls I keep getting .</tokentext>
<sentencetext>If they were from Italy to the US, that might be right.Granted, not if you have VoIP or some international long distance plan, but rarely do these kinds of numbers ever show discounted prices.I'd love to know if this was the source of those annoying "auto warranty" calls I keep getting.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318283</id>
	<title>Re:That's a spicy meatball!</title>
	<author>stephanruby</author>
	<datestamp>1244885580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Good catch. They were actually paid $100 for each PBX they found, and they found 25,000. So in theory they were paid $2,500,000 (that's roughly 21 cents per minute, plus the operators still had to incur local charges).</htmltext>
<tokenext>Good catch .
They were actually paid $ 100 for each PBX they found , and they found 25,000 .
So in theory they were paid $ 2,500,000 ( that 's roughly 21 cents per minute , plus the operators still had to incur local charges ) .</tokentext>
<sentencetext>Good catch.
They were actually paid $100 for each PBX they found, and they found 25,000.
So in theory they were paid $2,500,000 (that's roughly 21 cents per minute, plus the operators still had to incur local charges).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318111</id>
	<title>Telcos suck</title>
	<author>Anonymous</author>
	<datestamp>1244925780000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>12 million minutes of unauthorized phone calls through the system, <strong>valued at more than $55 million.</strong></p> </div><p>... or a lot less.<br>$5 per minute?!! Just to route some packets a bit farther?<br>And then telcos wonder why IP phones are eating their lunch.</p><p>Maybe they're using MAFIAA math... Each minute causes $5 worth of damage to their network...?</p></div>
	</htmltext>
<tokenext>12 million minutes of unauthorized phone calls through the system , valued at more than $ 55 million .
... or a lot less. $ 5 per minute ? ! !
Just to route some packets a bit farther ? And then telcos wonder why IP phones are eating their lunch.Maybe they 're using MAFIAA math... Each minute causes $ 5 worth of damage to their network... ?</tokentext>
<sentencetext>12 million minutes of unauthorized phone calls through the system, valued at more than $55 million.
... or a lot less.$5 per minute?!!
Just to route some packets a bit farther?And then telcos wonder why IP phones are eating their lunch.Maybe they're using MAFIAA math... Each minute causes $5 worth of damage to their network...?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318297</id>
	<title>Gary McKinnon wants</title>
	<author>AHuxley</author>
	<datestamp>1244885880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>His intellectual property back.<br>
What is it with the US gov and the use of MS like default passwords?
<br>
<a href="http://freegary.org.uk/" title="freegary.org.uk">http://freegary.org.uk/</a> [freegary.org.uk]</htmltext>
<tokenext>His intellectual property back .
What is it with the US gov and the use of MS like default passwords ?
http : //freegary.org.uk/ [ freegary.org.uk ]</tokentext>
<sentencetext>His intellectual property back.
What is it with the US gov and the use of MS like default passwords?
http://freegary.org.uk/ [freegary.org.uk]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319111</id>
	<title>Which brand(s) of PBX?</title>
	<author>PuddleBoy</author>
	<datestamp>1244900220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Does anyone know which brand(s) of PBX were 'hacked'? Were these 'traditional' PBX's or were many (most?) of them VoIP systems?<p>
I work for a telco and we notice that the vendors who have IT backgrounds often decide that voice is just another kind of data, and frequently have trouble setting up PBX's (like Asterisk). (You ask them if they'd like that PRI as NI-2 Standard and they just mumble at you.)</p></htmltext>
<tokenext>Does anyone know which brand ( s ) of PBX were 'hacked ' ?
Were these 'traditional ' PBX 's or were many ( most ?
) of them VoIP systems ?
I work for a telco and we notice that the vendors who have IT backgrounds often decide that voice is just another kind of data , and frequently have trouble setting up PBX 's ( like Asterisk ) .
( You ask them if they 'd like that PRI as NI-2 Standard and they just mumble at you .
)</tokentext>
<sentencetext>Does anyone know which brand(s) of PBX were 'hacked'?
Were these 'traditional' PBX's or were many (most?
) of them VoIP systems?
I work for a telco and we notice that the vendors who have IT backgrounds often decide that voice is just another kind of data, and frequently have trouble setting up PBX's (like Asterisk).
(You ask them if they'd like that PRI as NI-2 Standard and they just mumble at you.
)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165</id>
	<title>Hackers, hacks ??!?</title>
	<author>Alwin Henseler</author>
	<datestamp>1244926680000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>
If factory-set default passwords were used to gain access to the systems and use them, what exactly did they 'hack' ?
</p><p>
That would seem like a typical case of unauthorized <em>use</em> of a system to me, but hardly qualify as 'hacking'. When legal charges are to be brought, use a correct description of the crime, will you?
</p><p>
"Your honor, there was a gaping hole where the door used to be! I didn't even have to touch the doorknob!" <br>
"I don't care! Since a computer system was involved, you <em>broke</em> into the place, understood?"
</p></htmltext>
<tokenext>If factory-set default passwords were used to gain access to the systems and use them , what exactly did they 'hack ' ?
That would seem like a typical case of unauthorized use of a system to me , but hardly qualify as 'hacking' .
When legal charges are to be brought , use a correct description of the crime , will you ?
" Your honor , there was a gaping hole where the door used to be !
I did n't even have to touch the doorknob !
" " I do n't care !
Since a computer system was involved , you broke into the place , understood ?
"</tokentext>
<sentencetext>
If factory-set default passwords were used to gain access to the systems and use them, what exactly did they 'hack' ?
That would seem like a typical case of unauthorized use of a system to me, but hardly qualify as 'hacking'.
When legal charges are to be brought, use a correct description of the crime, will you?
"Your honor, there was a gaping hole where the door used to be!
I didn't even have to touch the doorknob!
" 
"I don't care!
Since a computer system was involved, you broke into the place, understood?
"
</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28324783</id>
	<title>Changing the password should be a permissive</title>
	<author>Grocks</author>
	<datestamp>1244916660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You should not be allowed to get the system running unless you change all the default passwords.  Too bad if this a problem.  The documentation should say in big letters "NOTE: THIS SYSTEM WILL NOT OPERATE UNTIL YOU PROVIDE NEW PASSWORDS FOR ALL ITEMS THAT HAVE PASSWORDS.  To do this please follow these instructions..."</htmltext>
<tokenext>You should not be allowed to get the system running unless you change all the default passwords .
Too bad if this a problem .
The documentation should say in big letters " NOTE : THIS SYSTEM WILL NOT OPERATE UNTIL YOU PROVIDE NEW PASSWORDS FOR ALL ITEMS THAT HAVE PASSWORDS .
To do this please follow these instructions... "</tokentext>
<sentencetext>You should not be allowed to get the system running unless you change all the default passwords.
Too bad if this a problem.
The documentation should say in big letters "NOTE: THIS SYSTEM WILL NOT OPERATE UNTIL YOU PROVIDE NEW PASSWORDS FOR ALL ITEMS THAT HAVE PASSWORDS.
To do this please follow these instructions..."</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</id>
	<title>Hacking?</title>
	<author>Anonymous</author>
	<datestamp>1244926020000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext><p>These were default passwords on more than likely open ports. I would hardly call that hacking. That would be like walking by a house with an open door and saying you picked the lock by walking inside.</p><p>One heck of an expensive lesson to the IT guys responsible.  Never leave default passwords is Rule #1.  Or at least in the top 3.</p></htmltext>
<tokenext>These were default passwords on more than likely open ports .
I would hardly call that hacking .
That would be like walking by a house with an open door and saying you picked the lock by walking inside.One heck of an expensive lesson to the IT guys responsible .
Never leave default passwords is Rule # 1 .
Or at least in the top 3 .</tokentext>
<sentencetext>These were default passwords on more than likely open ports.
I would hardly call that hacking.
That would be like walking by a house with an open door and saying you picked the lock by walking inside.One heck of an expensive lesson to the IT guys responsible.
Never leave default passwords is Rule #1.
Or at least in the top 3.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318539</id>
	<title>Sue the people who neglected to change passwords?</title>
	<author>kasperd</author>
	<datestamp>1244889960000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Is it illegal to support terrorism by remiss? The people who left those default passwords have indirectly supported terrorists, even if it was unintentional. Can they be sentenced for that, should they be? I think they ought to be fined for it, but I don't think they deserve as harsh a punishment as the people who abused the systems for economical gain.</htmltext>
<tokenext>Is it illegal to support terrorism by remiss ?
The people who left those default passwords have indirectly supported terrorists , even if it was unintentional .
Can they be sentenced for that , should they be ?
I think they ought to be fined for it , but I do n't think they deserve as harsh a punishment as the people who abused the systems for economical gain .</tokentext>
<sentencetext>Is it illegal to support terrorism by remiss?
The people who left those default passwords have indirectly supported terrorists, even if it was unintentional.
Can they be sentenced for that, should they be?
I think they ought to be fined for it, but I don't think they deserve as harsh a punishment as the people who abused the systems for economical gain.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28333297</id>
	<title>Basic Security failure</title>
	<author>hysonmb</author>
	<datestamp>1245064560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I'm just shocked that no one ever thought to change the password! Even a weak password is better than default. I guess someone will be writing a 10 page paper, aka, an SOP.</htmltext>
<tokenext>I 'm just shocked that no one ever thought to change the password !
Even a weak password is better than default .
I guess someone will be writing a 10 page paper , aka , an SOP .</tokentext>
<sentencetext>I'm just shocked that no one ever thought to change the password!
Even a weak password is better than default.
I guess someone will be writing a 10 page paper, aka, an SOP.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085</id>
	<title>That's a spicy meatball!</title>
	<author>RickRussellTX</author>
	<datestamp>1244925540000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext>I'm just amazed they found somebody willing to pay almost $5 per minute for long distance.</htmltext>
<tokenext>I 'm just amazed they found somebody willing to pay almost $ 5 per minute for long distance .</tokentext>
<sentencetext>I'm just amazed they found somebody willing to pay almost $5 per minute for long distance.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318329</id>
	<title>Privacy? What privacy? (use encryption folks)</title>
	<author>Anonymous</author>
	<datestamp>1244886660000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Wait! before I thought only the NSA by statute and Google (because Google is truly eViL by supplying the NSA (&amp; NASA!) with technology &amp; staff), could listen to my phone calls, transcribe, translate, &amp; index them into perpetuity. But now I'm reading the Italian mafia can listen in too?</p><p>Of course this explains why the Italian mafia learned awhile ago to encrypt their own calls. On the job training if you ask me.</p><p>FWIW, there's an asterisk module for pretty good privacy: <a href="http://www.zfoneproject.com/prod\_asterisk.html" title="zfoneproject.com">http://www.zfoneproject.com/prod\_asterisk.html</a> [zfoneproject.com]</p><p><a href="http://www.securitymanagement.com/article/new-voip-encryption-challenges-005680" title="securitymanagement.com">http://www.securitymanagement.com/article/new-voip-encryption-challenges-005680</a> [securitymanagement.com]</p><p>Why not?</p></htmltext>
<tokenext>Wait !
before I thought only the NSA by statute and Google ( because Google is truly eViL by supplying the NSA ( &amp; NASA !
) with technology &amp; staff ) , could listen to my phone calls , transcribe , translate , &amp; index them into perpetuity .
But now I 'm reading the Italian mafia can listen in too ? Of course this explains why the Italian mafia learned awhile ago to encrypt their own calls .
On the job training if you ask me.FWIW , there 's an asterisk module for pretty good privacy : http : //www.zfoneproject.com/prod \ _asterisk.html [ zfoneproject.com ] http : //www.securitymanagement.com/article/new-voip-encryption-challenges-005680 [ securitymanagement.com ] Why not ?</tokentext>
<sentencetext>Wait!
before I thought only the NSA by statute and Google (because Google is truly eViL by supplying the NSA (&amp; NASA!
) with technology &amp; staff), could listen to my phone calls, transcribe, translate, &amp; index them into perpetuity.
But now I'm reading the Italian mafia can listen in too?Of course this explains why the Italian mafia learned awhile ago to encrypt their own calls.
On the job training if you ask me.FWIW, there's an asterisk module for pretty good privacy: http://www.zfoneproject.com/prod\_asterisk.html [zfoneproject.com]http://www.securitymanagement.com/article/new-voip-encryption-challenges-005680 [securitymanagement.com]Why not?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28326615</id>
	<title>Re:12345 post</title>
	<author>myspace-cn</author>
	<datestamp>1244995680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>That's literally what telemarketers like to use too.</p><p>Wanna bet telemarketers are on the list of targets who failed to set any security at all on their PBX's?</p><p>Wanna bet<br>4321 or 0000 or 1234 or 12345 or 00000 was what they had their annoying kit set to I even saw 123 being used as a password.</p><p>I worked for a telemarketer before. (Flame suit on) I did, and I noticed a theme, no firewall, simple guessable passwords everywhere. I wanted to add firewalls, and make all the default passwords harder to crack, but they weren't interested. The only thing they wanted me to do, was drill, pull twisted pairs, mount all their crap on the wall, hook it all up, get the video surveillance, workstations and digital dialers up as quick as possible.  They already had an admin for the 600 win98SE workstations, and the dns server and win2000 server.  I got finished, got paid, and I got the hell out cause everyone was either annoying, or pretty creepy anyway.</p><p>At some point there has to be some kind of shared responsibility.  I mean with lists like <a href="http://rootfox.com/defpass.html" title="rootfox.com" rel="nofollow">this</a> [rootfox.com] well known for years now.</p><p>Na, I guess not, just spy on everyone's communications and fry motherfuckers when they start to cost too much after the fact. It's the retarded American way.</p></htmltext>
<tokenext>That 's literally what telemarketers like to use too.Wan na bet telemarketers are on the list of targets who failed to set any security at all on their PBX 's ? Wan na bet4321 or 0000 or 1234 or 12345 or 00000 was what they had their annoying kit set to I even saw 123 being used as a password.I worked for a telemarketer before .
( Flame suit on ) I did , and I noticed a theme , no firewall , simple guessable passwords everywhere .
I wanted to add firewalls , and make all the default passwords harder to crack , but they were n't interested .
The only thing they wanted me to do , was drill , pull twisted pairs , mount all their crap on the wall , hook it all up , get the video surveillance , workstations and digital dialers up as quick as possible .
They already had an admin for the 600 win98SE workstations , and the dns server and win2000 server .
I got finished , got paid , and I got the hell out cause everyone was either annoying , or pretty creepy anyway.At some point there has to be some kind of shared responsibility .
I mean with lists like this [ rootfox.com ] well known for years now.Na , I guess not , just spy on everyone 's communications and fry motherfuckers when they start to cost too much after the fact .
It 's the retarded American way .</tokentext>
<sentencetext>That's literally what telemarketers like to use too.Wanna bet telemarketers are on the list of targets who failed to set any security at all on their PBX's?Wanna bet4321 or 0000 or 1234 or 12345 or 00000 was what they had their annoying kit set to I even saw 123 being used as a password.I worked for a telemarketer before.
(Flame suit on) I did, and I noticed a theme, no firewall, simple guessable passwords everywhere.
I wanted to add firewalls, and make all the default passwords harder to crack, but they weren't interested.
The only thing they wanted me to do, was drill, pull twisted pairs, mount all their crap on the wall, hook it all up, get the video surveillance, workstations and digital dialers up as quick as possible.
They already had an admin for the 600 win98SE workstations, and the dns server and win2000 server.
I got finished, got paid, and I got the hell out cause everyone was either annoying, or pretty creepy anyway.At some point there has to be some kind of shared responsibility.
I mean with lists like this [rootfox.com] well known for years now.Na, I guess not, just spy on everyone's communications and fry motherfuckers when they start to cost too much after the fact.
It's the retarded American way.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318333</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318449</id>
	<title>Re:Hacking?</title>
	<author>houghi</author>
	<datestamp>1244888580000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>That could never happen to where I work. We use the default password on the PBX, but it is protected by a Cisco router. Encrypted password, so it can never be found out. In fact I am so sure of that that I just post it here: 095c4f1a0a1218000f.<br>Obviously you need the address as well. That is <a href="http://hackme.houghi.org/" title="houghi.org">http://hackme.houghi.org/</a> [houghi.org]</p></htmltext>
<tokenext>That could never happen to where I work .
We use the default password on the PBX , but it is protected by a Cisco router .
Encrypted password , so it can never be found out .
In fact I am so sure of that that I just post it here : 095c4f1a0a1218000f.Obviously you need the address as well .
That is http : //hackme.houghi.org/ [ houghi.org ]</tokentext>
<sentencetext>That could never happen to where I work.
We use the default password on the PBX, but it is protected by a Cisco router.
Encrypted password, so it can never be found out.
In fact I am so sure of that that I just post it here: 095c4f1a0a1218000f.Obviously you need the address as well.
That is http://hackme.houghi.org/ [houghi.org]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318109</id>
	<title>Feh.</title>
	<author>Renraku</author>
	<datestamp>1244925780000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext><p>The companies that got 'hacked' should get a serious talking to by the anti-terrorism folks.  After all, they played a part in terrorism (or at least, what is called terrorism, who knows what it really funded?), and should be punished!</p><p>Not changing default passwords is literally begging for trouble.</p></htmltext>
<tokenext>The companies that got 'hacked ' should get a serious talking to by the anti-terrorism folks .
After all , they played a part in terrorism ( or at least , what is called terrorism , who knows what it really funded ?
) , and should be punished ! Not changing default passwords is literally begging for trouble .</tokentext>
<sentencetext>The companies that got 'hacked' should get a serious talking to by the anti-terrorism folks.
After all, they played a part in terrorism (or at least, what is called terrorism, who knows what it really funded?
), and should be punished!Not changing default passwords is literally begging for trouble.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318671</id>
	<title>Re:Hacking?</title>
	<author>jonadab</author>
	<datestamp>1244892540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>&gt; Never leave default passwords is Rule #1.  Or at least in the top 3.<br><br>Actually, I think it's a corollary to Rule #2, "Only grant access to the people who actually need to have it."  HTH.HAND.</htmltext>
<tokenext>&gt; Never leave default passwords is Rule # 1 .
Or at least in the top 3.Actually , I think it 's a corollary to Rule # 2 , " Only grant access to the people who actually need to have it .
" HTH.HAND .</tokentext>
<sentencetext>&gt; Never leave default passwords is Rule #1.
Or at least in the top 3.Actually, I think it's a corollary to Rule #2, "Only grant access to the people who actually need to have it.
"  HTH.HAND.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318783</id>
	<title>Its probably a DISA hack</title>
	<author>Anonymous</author>
	<datestamp>1244895000000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Guys its probably a DISA they discovered NOT CLI ACCESS TO THE PABX.....</p><p>Many PABXs have a feature where a specific incoming extension (DISA) is configured to allow calls to be re-routed from the PABX if you enter the correct PIN.</p><p>e.g. you dial into the secret number, enter the secret PIN, then from there you have full access to the PABX's destination codes.<br>so e.g. if your DISA extension is 333-88888, and PIN is 12345, and you dial 0 for external, then dialling this would work: 333-88888-12345-0-(number you want to dial). The call would then be originated from the PABX instead of the caller.</p><p>This is mostly used for troubleshooting because in PABX tie line networks your number codes determine how your calls route, with complex tie line networks you end up with destination codes upon destination codes which require a lot of thinking to get right as its basically a huge, layered sequence of static routes.</p><p>Anyhow back in my TDM days I used to run PABXs for a large corporation. A few years before I started the EXACT SAME THING happened to us - someone phreaked the PIN code to the disa number - and was then selling calling cards in the phillipines that rerouted using one of our PABX's DISA lol.</p></htmltext>
<tokenext>Guys its probably a DISA they discovered NOT CLI ACCESS TO THE PABX.....Many PABXs have a feature where a specific incoming extension ( DISA ) is configured to allow calls to be re-routed from the PABX if you enter the correct PIN.e.g .
you dial into the secret number , enter the secret PIN , then from there you have full access to the PABX 's destination codes.so e.g .
if your DISA extension is 333-88888 , and PIN is 12345 , and you dial 0 for external , then dialling this would work : 333-88888-12345-0- ( number you want to dial ) .
The call would then be originated from the PABX instead of the caller.This is mostly used for troubleshooting because in PABX tie line networks your number codes determine how your calls route , with complex tie line networks you end up with destination codes upon destination codes which require a lot of thinking to get right as its basically a huge , layered sequence of static routes.Anyhow back in my TDM days I used to run PABXs for a large corporation .
A few years before I started the EXACT SAME THING happened to us - someone phreaked the PIN code to the disa number - and was then selling calling cards in the phillipines that rerouted using one of our PABX 's DISA lol .</tokentext>
<sentencetext>Guys its probably a DISA they discovered NOT CLI ACCESS TO THE PABX.....Many PABXs have a feature where a specific incoming extension (DISA) is configured to allow calls to be re-routed from the PABX if you enter the correct PIN.e.g.
you dial into the secret number, enter the secret PIN, then from there you have full access to the PABX's destination codes.so e.g.
if your DISA extension is 333-88888, and PIN is 12345, and you dial 0 for external, then dialling this would work: 333-88888-12345-0-(number you want to dial).
The call would then be originated from the PABX instead of the caller.This is mostly used for troubleshooting because in PABX tie line networks your number codes determine how your calls route, with complex tie line networks you end up with destination codes upon destination codes which require a lot of thinking to get right as its basically a huge, layered sequence of static routes.Anyhow back in my TDM days I used to run PABXs for a large corporation.
A few years before I started the EXACT SAME THING happened to us - someone phreaked the PIN code to the disa number - and was then selling calling cards in the phillipines that rerouted using one of our PABX's DISA lol.</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318283
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28329151
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28328099
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318783
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319209
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318369
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318093
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28326615
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318333
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318079
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318619
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318597
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318449
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320821
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320605
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318333
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318079
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319863
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318847
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319925
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319021
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318109
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318323
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318671
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28322919
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319003
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318095
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318631
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_13_0132214_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320311
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318085
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319925
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318323
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318283
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318597
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318123
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318449
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319863
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318619
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318847
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320821
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318671
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320311
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318109
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319021
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318095
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319003
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319521
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318111
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28322669
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318093
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318369
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318783
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28328099
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318329
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318079
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318333
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28326615
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28320605
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319743
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318137
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_13_0132214.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318165
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28329151
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28318631
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28322919
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_13_0132214.28319209
</commentlist>
</conversation>
