How do the feds tap phone lines?There\u2019s much controversy of late over whether the National Security Agency needs warrants to tap the phone lines of U.S. citizens. But as someone in the IT industry, you\u2019re probably just as curious about how such wiretaps are actually performed. This week we take a look. See the story for details.Extreme founder: Beware of closed network-access control schemesOne of Extreme Networks\u2019 founders came out swinging against Cisco\u2019s Network Admission Control scheme, saying it doesn\u2019t embrace open standards and requires Cisco gear to work. Read the full interview.Nortel unveils network access control boxNortel put on display for the first time at RSA Conference 2006 its answer to network access control, an appliance that directs switches to enforce security policies. Click here for more.Cisco CIO: Going mobile is tough for enterprisesDespite improvements in recent years, the wireless industry has done a poor job of giving enterprises the tools they need to let workers access corporate data from mobile devices, Cisco's CIO said Thursday at the 3GSM World Congress. Click here for more.OASIS stamps approval on WS-Security 1.1A standards body on Wednesday gave final approval to a security specification that is recognized as a foundation for securing distributed applications and Web services. Click here for more.Comcast, what part of 'competition' don't you understand?Network World's John Gallant writes an open letter to Comcast CEO Brian Roberts over his skyrocketing cable modem and TV bill. Read the Vortex blog.Coming soon: Application acceleration forumOn Feb. 27, we'll be hosting a weeklong online forum on application acceleration across the WAN. But you don't have to wait until then to submit questions. E-mail us with any questions and we'll forward them to the participating vendors for answering the day the forum starts.For news updated throughout the day, go to Network World's NetFlash news page.