“Sprint doesn’t change overnight because of SoftBank — it’s still Sprint,” he said. “Sprint transforms overnight with Dish.”
Susan P. Crawford, a law professor at Cardozo School of Law who served as special assistant to President Obama for science, technology and innovation policy, said there were pros and cons to a merger with Dish Networks. A combination with Dish Networks would pose more of a threat to AT&T and Verizon, which account for two-thirds of American wireless subscribers, than a partnership with SoftBank, she said.
But it would also weaken T-Mobile USA, the No. 4 carrier, which has been offering cheaper phone plans to consumers, like its latest contract-free phone plans.
“Right now, we have two giants and two also-rans, and now you’re getting potentially three giants dividing up the American marketplace, with T-Mobile lagging far behind,” she said of the potential Dish-Sprint merger.
It is unclear whether a Dish takeover would change much about Sprint’s wireless service. Chetan Sharma, an independent telecom analyst who is a consultant for carriers, said that the only obvious change for consumers would be at a marketing level, not a technology level. While the bills may be consolidated, it would not be easy to share the benefits of a high-speed Internet connection at home with wireless networks that connect to a phone outside, he said.
The Internet Apocalypse That Wasn’t.
So much for the Internet apocalypse.
Several security experts and media reports predicted that Monday, July 9, would be remembered as the day millions lost their Internet connections — and possibly their livelihoods. Those concerns did not play out.
At 12:01 a.m. Eastern Time on Monday, the Federal Bureau of Investigation pulled the plug on servers that had been communicating with personal computers infected with a particularly thorny piece of malware. The malware, called DNSChanger, reconfigured the computers’ settings for the Domain Name System, or DNS, which functions as the switchboard for the Internet. The DNS translates user-friendly Web addresses like fbi.gov into numerical addresses that allow computers to speak to each other. Without DNS servers operated by Internet service providers, the Internet could not operate.
For four years, criminals based in Eastern Europe used the malware to tell computers to use the criminals’ own DNS servers and redirect Internet users to fraudulent advertising sites, in a scheme that federal officials say generated $14 million.
Last November, officials traced the scheme to six men in Estonia and one man in Russia; the former were arrested, and the latter remains at large. But by that point, officials said, DNSChanger had infected four million computers, including 500,000 in the United States. The malware was so stealthy that it was impossible for users to know if they had been infected.
As part of a federal court order, the F.B.I. arranged for a private company to swap the rogue DNS servers with legitimate servers to keep millions of infected users connected to the Internet. It also worked with Google, Facebook and major Internet service providers on a public awareness campaign to notify infected users that their systems had been compromised. As part of that push, a DNS Changer Working Group was formed to manage a Web site that let users check if their computers were infected and linked to sites that could help clean their systems.
But the federal court order keeping those legitimate servers running expired at midnight on Sunday, which left many security firms and the media forecasting a Y2K-like Internet blackout.
That never happened. By Monday afternoon, Internet service providers had yet to release the number of affected systems. But the final tally is likely to be nowhere near Internet Armageddon, partly because Internet service providers, like AT&T and Verizon, temporarily substituted their own DNS servers for those set up by the F.B.I. AT&T plans to keep its servers running through the end of the year. Verizon will keep its servers running through the end of July.