Wednesday, February 29, 2012

RFC :: NTIA :: #privacy :: Multistakeholder Process to Develop Consumer Data Privacy Codes of Conduct :: Comments Due TBD

Date: February 29, 2012  Docket Number:  Docket No. 120214135-2135-01

"NTIA is requesting comment on substantive consumer data privacy issues that warrant the development of legally enforceable codes of conduct, as well as procedures to foster the development of these codes.  NTIA invites public comment on these issues from all stakeholders with an interest in consumer data privacy, including the commercial, academic and civil society sectors, and from federal and state enforcement agencies.  Written comments may be submitted by e-mail to

RFC :: NIST :: #FISMA SP 800-53 Security and Privacy Controls for Federal Info Systems and Orgs :: Comments Due Apr 6

From NIST Tech Beat: February 28, 2012 Contact: Evelyn Brown 301-975-5661

"A major revision of a Federal Information Security Management Act (FISMA) publication released today by the National Institute of Standards and Technology (NIST) adds guidance for combating new information security threats and incorporates new privacy controls to the framework that federal agencies use to protect their information and information systems.

"To handle insider threats, supply chain risk, mobile and cloud computing technologies, and other cybersecurity issues and challenges, NIST has released Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication (SP) 800-53, Revision 4 (Initial Public Draft). The document is considered a principal catalog of security standards and guidelines used by federal government agencies that NIST is required to publish by law.

“The changes we propose in Revision 4 are directly linked to the current state of the threat space—the capabilities, intentions and targeting activities of adversaries—and analysis of attack data over time,” explained Ron Ross, FISMA Implementation Project Leader and NIST fellow.

"The revision also adds a new privacy appendix to the publication that provides privacy controls and associated implementation guidance. “Privacy and security are complementary, so we decided to combine them in SP 800-53," said Ross.

"Other areas addressed in the update in addition to those mentioned above include application security, firmware integrity, distributed systems and advanced persistent threat. “Many organizations are concerned about advanced persistent threats, so we added new controls that will allow organizations to use different strategies to combat those types of threats,” Ross added.

"NIST also modified its guidance on security assurance Appendix E, which outlines how agencies can establish measures of confidence that the security controls put in place are providing the necessary security capability to protect critical missions and business operations. Ross explains, “Having security functionality in your information systems without the appropriate assurance is like skydiving without a backup parachute—you don’t need it until you need it. And without it, the outcome is very predictable.”

"As part of the update to SP 800-53, NIST addressed potential gaps in coverage, added new security controls and control enhancements, provided additional supplemental guidance for these controls, and clarified security control requirements and specification language. Keeping the potential threats in mind, the security control baselines were updated and minimum assurance requirements revised.
This document, when finalized, will be used by the entire federal government. The project was conducted as part of the Joint Task Force Transformation Initiative, which is composed of security experts from NIST, the Department of Defense, the Intelligence Community, the Committee on National Security Systems, and the Department of Homeland Security.

The public draft of Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication (SP) 800-53, Revision 4 may be found at Comments on SP 800-53, Revision 4 are requested by April 6, 2012. Email should be sent to

The Wayward ACPA Part 10: “More Reasoned Decisions Mean Domain Name Owner Wins”

Looking over 11 years of AntiCybersquatting Consumer Protection Act (ACPA) caselaw, I can now test how the courts have wandered astray. Last post, I tested my conspiracy theory that the court’s analysis was all about trademark, and they ignored the unique characteristics of the Internet. That proved not to be so true. 

This time, my conspiracy theory is that in order to favor trademark owners (TMO), courts pick and choose which factors to consider. When the court’s arbitrarily focus on a few select factors, then, according to my theory, you know its going in favor of the TMO; a more reasoned approach that considers all the factors of the case would certainly go in favor of the Domain Name Owner (DNO).

And…… no. Not true.

In fact the exact opposite is true. The more factors considered, the more likely the TMO prevails. When the court considered five or fewer factors, the DNO won 50% of the time. When the court considered six or more factors, the DNO won only 21% of the time. The most number of cases broken out by number of factors considered was 19 cases resolved using 9 factors, where DNOs won only 21% of the time. TMO's highest winning percentage was 100% when 7 factors were considered; DNO's highest winning percentage was 100% when 0 or 1 factors were considered. 

Next: A Conspiracy Theory I Actually Get Right

Monday, February 27, 2012

2.27 :: Study Confirms What U Already Knew :: Unprecedented Powers Over the Internet :: This Isnt a Hoax :: Threatens the Internet :: More Excuses? ::

CyberTelecom News
Federal Internet Law and Policy
"Where a calculator on the ENIAC is equipped with 18,000 vacuum tubes
and weighs 30 tons, computers in the future may have only 1,000 vacuum
tubes and perhaps weigh 1 ½ tons." Popular Mechanics (March 1949)

Study Confirms What You Already Knew: Mobile Data Throttling About The
Money, Not Stopping Data Hogs, Techdirt
Of the four national mobile operators, only Sprint still offers an
"unlimited" data plan -- and most industry watchers expect that to go
away soon. When the operators talk about this stuff, they complain
about how unlimited plans are abused and the amount of data being used
by so-called "data hogs" is crippling network bandwidth. Of course,
the alternative story is that they just want to charge people higher
rates, and putting a toll

Stop the Cycle of Bullying: danah boyd and John Palfrey in the
Huffington Post, Berkman
no description

INDIANA, INC., Ind: Court of Appeals, Indiana Court
At issue is identity of anonymous commentor to news site and
application of the Dendrite Test

CONOCOPHILLIPS COMPANY v. Gonzalez, Dist. Court, ND California 2012, Fed Court
Plaintiff's ACPA ex parte application is DENIED without prejudice.

BEVERLY HILLS ESCROW v. Nazarian, Cal: Court of Appeal, 2nd Appellate
Dist., 7th Div. 2012, CA Court
Affirming Temporary Restraining Order for Defendant's registration of
domain name

City of Carlsbad v. Shah, Dist. Court, SD California 2012, Fed. Court
Registration of multiple domain names including constituted bad faith under ACPA

Robert McDowell: The U.N. Threat to Internet Freedom –, ISOC-DC
On Feb. 27, a diplomatic process will begin in Geneva that could
result in a new treaty giving the United Nations unprecedented powers
over the Internet. Dozens of countries, including Russia and China,
are pushing hard to reach this goal by year's end. As Russian Prime
Minister Vladimir Putin said last June, his goal and that of his
allies is to establish "international control over the Internet"
through the International Telecommunication Union (ITU), a
treaty-based organization under U.N. auspices.

36 state AGs blast Google's privacy policy change, CW
Attorneys General from 36 states are concerned over the potential
implications of Google's new privacy policy, especially for users of
Android-powered smartphones.

Pakistan plans system to filter and block websites, CW
Pakistan has floated a request for proposal for a system to filter and
block websites, some months after banning the use of encryption on the
Internet, and toying with the idea of filtering and blocking SMS
(short message service) messages in the country.

This Isn't a Hoax: Pakistan Requests Proposals for a National
Filtering and Blocking System, EFF
The Pakistani government is looking for new ways to censor the Internet.

An Astounding Week In PIPA/SOPA Comes To A Close, Tales From the Sausage Factory
Today brought a dramatic conclusion to an extraordinary week and the
culmination of months of amazing activism on PIPA/SOPA. A month ago,
hardly anyone had heard of PIPA and a few more had heard of SOPA and
its passage was …

In the context of the Lisbon agenda for growth and jobs, research and
innovation are at the core of the Europe 2020 strategy. As part of
this strategy, the ambitious Digital Agenda of the

Google's Goggles: Is The Future Right Before Our Eyes?, NPR
Eye glasses with computing power have long been sci-fi fantasy,
relegated to Terminator movies and the like. But now it appears Google
may be a few months from selling a beta version of their own.

How The "Right To Be Forgotten" Threatens The Internet, Forbes
A friend of a friend -- let's call her Andrea -- allowed herself to be
photographed in a "compromising position." The pics were posted on the
Internet with her approval, but were later found online by coworkers.

Administration's White Paper OnPrivacy Strikes Positive Tone, AT&T
Collaboration, consensus and consistency are key design principles in
developing good public policy. And we're encouraged that a white
paper issued yesterday by President Obama's Administration embraces
those principles.

Internet Privacy: Protecting Consumers, Building Trust, Creating Jobs,
White House
Yesterday, the White House announced two important steps to promote
consumer privacy rights online and to give users more control over how
their personal information is handled. First, the White House
released a comprehensive roadmap for online privacy protection
centered on a Consumer Privacy Bill of Rights and robust enforcement
by the Federal Trade Commission. Second, industry has stepped up to
the plate by

More Privacy, or More Excuses?, VOA
Examining the Obama Administration's Proposed Privacy Bill of Rights

Protecting Online Privacy: A Live Web Chat with Allan Friedman, Brookings
Aiming to protect online privacy without stifling innovation,
President Obama has proposed a "Consumer Privacy Bill of Rights" to
help users exercise more control over the data they share when
accessing the internet through their web browsers, smart phones and
tablets. Although its

We Can't Wait: Obama Administration Calls for A Consumer Privacy Bill
of Rights for the Digital Age, White House
Today at the White House, the Obama Administration unveiled a
blueprint for a Consumer Privacy Bill of Rights to protect consumers
online. As the President wrote in his cover letter to the report:

FTC Approves Safe Harbor Program for Aristotle International, Inc., FTC
Program Will Promote Compliance With Children's Online Privacy Protection Act

Why Genachowski's Cybersecurity Initiative Is So Radical (In A Good
Way), Tales From the Sausage Factory
When people think of "cybersecurity," they usually think about the big
stuff like Iranian hackers bringing down the power grid or master
criminals hacking Bank of America. We associate it with the Department
of Homeland Security (DHS) and institutions generally …

Microsoft Testifies on U.S. Senate Cybersecurity Legislation, Microsoft
Last week, Scott Charney testified at a hearing of the Senate
Committee on Homeland Security and Government Affairs. The hearing was
about the Cybersecurity Act of 2012, which is Congress's first
comprehensive legislation aimed at improving cybersecurity across the
United States. His full testimony is available here.

US-NL Cybercrime Treaty Signed, CircleID
On Wednesday 22 February the United States and The Netherlands signed
a "declaration of intent" on the cooperation on fighting cybercrime.
This event was reported by the press as a treaty. At least that is
what all Dutch postings I read wrote, with exception of the official
website of the Dutch government. So what was actually signed? Reading
the news reports some thoughts struck me.

FBI turns off 3,000 GPS trackers after Supreme Court ruling, Ars Technica
Andrew Weissmann, general counsel for the FBI, has announced that his
agency is switching off thousands of Global Positioning System-based
tracking devices used for surveillance after a Supreme Court decision
last month. Weissmann made the statement during a University of San

FACEBOOK, INC. v. POWER VENTURES, INC., Dist. Court, ND California
2012, Fed Court
Facebook, Inc. ("Plaintiff") brings this action against Defendants[1]
alleging violations of the Controlling the Assault of Non-Solicited
Pornography and Marketing Act ("CAN-SPAM Act"), 15 U.S.C. §§ 7701 et
seq., the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, and
California Penal Code § 502.

Interconnecting with the Future, Verizon
The FCC made tremendous progress with its order reforming the
Universal Service Fund (USF) and the system for Intercarrier
Compensation (ICC). The FCC's reform plan correctly recognizes the
dramatic changes that have occurred in the marketplace and begins the
difficult process of transforming regulatory structures put in place
decades ago that no longer make sense.

"If there are no dogs in Heaven, then when I die I want to go where
they went."-Will Rogers
:: Adopt a Rescue Dog or Cat :: ::
Website ::
Blog ::
Delicious ::
Twitter & Facebook :: Cybertelecom
Google Group :: cybertelecom-l

AUP ::
Cybertelecom is Off-the-Record. Otherwise play nicely.

Link to us!

Saturday, February 25, 2012

RFC :: LOC :: DMCA :: Copyright Office Accepting Reply Comments in #DMCA Anticircumvention Rulemaking

Copyright Office Accepting Reply Comments in DMCA Anticircumvention Rulemaking
The Copyright Office is now accepting reply comments in its rulemaking regarding proposals to exempt certain classes of works from the prohibition on circumvention of technological measure that control access to copyrighted works. Reply comments should be limited to presentation of facts and arguments in response to comments submitted in the initial round of comments received through February 10, 2012.
The deadline for submission of reply comments is 5:00 p.m. EST on Friday, March 2, 2012. Reply comments may be submitted through a comment page on the Copyright Office website at The proposed classes of works are identified at and the initial comments responding to the proposed classes of works may be found at The Copyright Office received 674 comments on the proposed classes of works. For more information, read the Notice of Proposed Rulemaking at

Thursday, February 23, 2012

2.23 :: Privacy :: Privacy :: Privacy :: What Do CDNs Do??? :: Failed Conspiracies :: Wrong Question ::


             CyberTelecom News 

      Federal Internet Law and Policy


New Report Highlights Wireless Broadband Benefits for Public Safety and Job Creation, White House

oday, Vice President Biden met with law enforcement officials, firefighters and public safety groups in the Roosevelt Room and spoke to a couple hundred more first responders by telephone to thank them for their service and to discuss the new nationwide public-safety broadband network included in the Payroll Tax Extension legislation.


FCC Still Hooked on Speed, CommLawBlog

The FCC has announced plans for yet another effort to determine people's broadband speeds.


What Does a CDN Really Do?, Level3

A CDN (Content Delivery network) means different things to different people. The word is used in many different contexts in a way that can confuse. That confusion is partly understandable because most CDNs utilise many different types of technology. So I thought I'd try and explain what a comprehensive CDN, like ours, does. What follows concentrates on the word delivery.


LightSquared defaults on $56M payment to spectrum owner Inmarsat, CW

LightSquared has defaulted on a US$56.25 million payment due under a 2007 wireless spectrum cooperation agreement with Inmarsat, the U.K. satellite communications operator said Monday, adding that it could terminate the agreement if LightSquared doesn't make payment within 60 days.


LightSquared: Going from bad to worse, CNET

There's been a string of bad news recently for the wireless broadband startup after the FCC pulled its conditional waiver to build its nationwide network. The latest? Job cuts.


Unlicensed TV Band Spectrum: Creating a Nimble Framework for Our Economic Future, Microsoft

All of us have experienced the "spectrum crunch" when using our wireless devices. Dropped voice calls and slow data transfers are symptoms. The crunch is a consequence of both rising demand and spectrum management techniques and wireless radio technologies dating back almost one hundred years. We can't manufacture more spectrum – it's a finite natural resource – but we can manage it more nimbly and share it more efficiently than we have in the past, stimulating economic growth, business innovation and increased competition.


FCC Seeks Comment on Interference into Unlicensed Devices, CommLawBlog

The FCC has asked for comment on whether the licensed Location and Monitoring Service (LMS) at 902-928 MHz will cause interference to unlicensed devices in that band.


PROTECTING CHILDREN ONLINE: Internet risks faced by minors and policies to protect them, OECD

As the Internet permeates every aspect of our economy and society, it is also a daily reality in our children's lives. While it brings considerable benefits to their education and development, it also exposes them to online risks such as access to inappropriate content, abusive interaction with others, exposure to aggressive marketing practices and privacy risks. The OECD has just released recommendations aiming to protect minors online.,3699,en_2649_37441_1_1_1_1_37441,00.html?rssChId=37441#49724812


Youth and Digital Media: From Credibility to Information Quality - New Report from the Berkman Center, Berkman

The Berkman Center for Internet & Society at Harvard University is pleased to share a substantial new report from the Youth and Media project: "Youth and Digital Media: From Credibility to Information Quality" by Urs Gasser, Sandra Cortesi, Momin Malik, & Ashley Lee.


Pew Internet: Mobile, Pew

Highlights of the Pew Internet Project's research related to mobile technology.


ACPA Part 9: Failed Conspiracies: "It's All About Trademark", Cybertelecom

In reviewing 11 years of AntiCybersquatting Consumer Protection Act (ACPA) cases, I came up with a number of conspiracy theories that could be tested but did not pan out.  The next few posts are my failed conspiracy theories. The first theory, which assumes that ACPA decisions have gone astray, is that when the courts conduct their ACPA analysis, they always consider the Good Faith (aka


IPv6: Childhood's End?, CircleID

A few weeks ago, when I was lurking around IPv6, I found that my own was my first ever IPv6 domain. A "whois" on the domain says that it was registered in 2005, but something told me that I actually started this earlier


Former factory workers add pleas to sign Apple labor petition, CNET

Two former factory workers in China who suffered health problems as part of a 2009 incident are urging the public to sign an Internet petition being delivered to Apple tomorrow.


AT&T CEO gets $2 million pay cut following T-Mobile defeat, CNET

CEO Randall Stephenson will see his total pay for 2011 drop by more than $2 million over his role in the failed bid to buy T-Mobile.


State AGs Target Google Privacy Policy, WSJ

A group of dozens of state attorneys general have raised concerns with Google over the Internet giant's new privacy policy, marking the latest public flare-up over the planned changes.


Level 3: Morgan Stanley Ups To Overweight; Shares Rally, Forbes

Shares of telecom services provider Level 3 are trading higher Thursday morning after Morgan Stanley analyst Simon Flannery lifted his rating on the stock to Overweight from Equal Weight, setting a price target of $31. The stock closed yesterday at $20.89,


A View of the Iranian "Internet Blockade" from Akamai's Intelligent Platform, Akamai

The latest Internet blockade affected the most common form of secure connections, including all encrypted international websites outside of Iran that depend on the Secure Sockets Layer protocol, which display addresses beginning with "https."


Are aggregation and curation journalism? Wrong question, Gigaom

The battle between traditional media and the blogosphere over aggregation (or "curation," if you prefer) continues to rage. In the latest skirmish, Forbes blogger Kashmir Hill got thrown under the bus by many for a recent blog post in which she summarized a New York Times piece about data-mining practices and privacy. According to her critics, Hill "stole" the story from the NYT, along with a lot of web traffic that rightfully belonged to the newspaper. Some argue that this doesn't deserve to be called


Google: Please Don't Kill Video on the Web, Microsoft

Earlier today, Microsoft filed a formal competition law complaint with the European Commission (EC) against Motorola Mobility and Google. We have taken this step because Motorola is attempting to block sales of Windows PCs, our Xbox game console and other products. Their offense? These products enable people to view videos on the Web and to connect wirelessly to the Internet using industry standards.


State & Local Government Cloud Commission (SLG-CC), TechAmerica

On February 16, the TechAmerica Foundation released the final report and recommendations from the State and Local Government Cloud Commission (SLG-CC).


Gov Agency Pressuring Facebook To Collect More Info About Users Should Read White House's Privacy Report, Forbes

Today the White House is calling for greater online privacy for consumers. One of seven new "privacy rights" Obama proposes for Americans is the "right to focused collection" -- essentially saying that companies should only collect "the kinds of data they need... to accomplish specific purposes."


Web privacy fears spur US plans, BBC

The White House unveils a "bill of rights" for web users, calling for stronger privacy protections amid fears that online browsing habits are not secure.


Statement from Time Warner Cable Regarding the "Consumer Privacy Bill of Rights" Announced Today by The White House, TWC

"Time Warner Cable commends the Administration for its announcement today of a 'Consumer Privacy Bill of Rights' and a multistakeholder process to foster a consistent and uniform federal framework to protect consumers' privacy online.  Protecting consumers' privacy is a bedrock principle for Time Warner Cable and we are pleased that the Administration is undertaking this important initiative through the Department of Commerce.   By ensuring that personal


White House Announcement Sets Course for Privacy, Microsoft

Consumer trust is vital to the growth of a vibrant Internet, and respect for privacy – putting people first – is essential to earning and maintaining that trust. Today's release by the White House of their framework signifies an important milestone in the evolution of privacy interests of Americans and individuals around the world.


Rockefeller Supports Administration's Online Privacy Proposal, Senate Commerce

Chairman John D. (Jay) Rockefeller IV made the following statement in support of the White House online privacy proposals announced today and reiterated his commitment to making sure consumers' personal information is protected:


White House Unveils New Comprehensive Privacy Blueprint, NTIA

The Obama Administration today unveiled a "Consumer Privacy Bill of Rights" as part of a comprehensive blueprint to improve consumers' privacy protections and ensure that the Internet remains an engine for innovation and economic growth.


Obama Administration Unveils Promising Consumer Privacy Plan, but the Devil Will Be in the Details, EFF

Today the White House proposed a framework for protecting privacy in the digital age. The plan, laid out in detail in a white paper (pdf), includes a Consumer Privacy Bill of Rights based on well-established fair information practice principles. EFF, which has previously proposed a Bill of Privacy Rights for Social Network Users, believes this user-centered approach to privacy protection is a solid one.


Did Google Defeat People's Privacy Preferences?, TLF

Given the importance of privacy self-help—that is, setting your browser to control what it reveals about you when you surf the Web—I was concerned to hear that Google, among others, had circumvented third-party cookie blocking that is a default setting of Apple's Safari browser. Jonathan Mayer of Stanford's Center for Internet and Society published a thorough and highly technical explanation of the problem on Thursday.


Google Under Fire: Tech Giant Bypassed Safari Users' Privacy Settings, Center for Internet and Society

no description


Are Librarians Encouraging Public Libraries to Abide by COPPA?, apophenia

The Children's Online Privacy Protection Act (COPPA) was created to prevent corporations from collecting data about children without parental permission. This law explicitly does not apply to public institutions, non-profits, and government agencies. Yet, many public institutions not only choose not to collect data about children; they forbid children from accessing information without parental permission. Much to my surprise, this includes many public libraries


FCC chairman calls on ISPs to adopt new security measures, CW

U.S. Internet service providers should take new steps to protect subscribers against cyberattacks, including notifying customers when their computers are compromised, the chairman of the U.S. Federal Communications Commission said Wednesday.


Does The Cybersecurity Act Of 2012 Mark The Beginning Of The War On Cyber-terrorism?, Forbes

The Cybersecurity Act of 2012 is the latest effort by Congress to do something about the threat of cyber attacks and cyber crime. Fortunately, and perhaps thanks to the efforts to quash SOPA and PIPA, the Act is quite a bit more restrained in scope than its predecessors.


FCC chairman calls on ISPs to help fight cyber attacks, CNET

Cyber security is a growing problem that threatens the U.S. economy, and FCC Chairman Julius Genachowski says broadband providers can help protect the public.


FCC Chairman Embraces Industry Solutions for Cyber Security, Comcast

Today, FCC Chairman Julius Genachowski spoke about the growing threat of cyber attacks to our national economy and security, and embraced the need for real-time, industry-led solutions, rather than government mandates, as the best approach to address this problem.


NIST Establishes National Cybersecurity Center of Excellence, NIST

State of Maryland and Montgomery County Join PartnershipThe State of Maryland and Montgomery County, Md., partner with NIST in the New National Cybersecurity Center of Excellence. At the Memorandum of Understanding Signing Feb. 21, from ...


Keeping the Internet Safe, AT&T

"Keeping the Internet safe for consumers to browse, transact business and communicate is an important objective not only for AT&T but any other business that operates online.


The Death of SMS? Maybe So With Mountain Lion, Forbes

no description


How The Guy Who Didn't Invent Email Got Memorialized In The Press & The Smithsonian As The Inventor Of Email, Techdirt

Late last week, the Washington Post reported that The Smithsonian had acquired "tapes, documentation, copyrights, and over 50,000 lines of code from V.A. Shiva Ayyadurai, who both the Smithsonian and the Washington Post insisted was the "inventor of e-mail." There's just one problem with this: It's not actually true. Lots of


US Telecom Says FCC Broadband Order Would Be Better if a Few Rules Were Clarified, USTelecom

no description




"If there are no dogs in Heaven, then when I die I want to go where they went."-Will Rogers

:: Adopt a Rescue Dog or Cat :: ::


Website ::

Blog ::

Delicious ::

Twitter & Facebook :: Cybertelecom

Google Group :: cybertelecom-l


AUP ::

Cybertelecom is Off-the-Record. Otherwise play nicely.


 Link to us!   


Monday, February 20, 2012

ACPA Part 9: Failed Conspiracies: "It's All About Trademark"

In reviewing 11 years of AntiCybersquatting Consumer Protection Act (ACPA) cases, I came up with a number of conspiracy theories that could be tested but did not pan out.  The next few posts are my failed conspiracy theories.

The first theory, which assumes that ACPA decisions have gone astray, is that when the courts conduct their ACPA analysis, they always consider the Good Faith (aka mitigating) Factors, treating them like a standard trademark infringement analysis, and hold it against the Domain Name Owners (DNOs). According to this theory, the courts only consider the Bad Faith Factors (aka aggravating), which deal directly with cybersquatting, only when it's convenient to the courts outcome. Furthermore, according to the theory, the courts consider the trademark-like factors more often than the domain name registration factors. In other words, if you mess with someone's trademark, it matters a lot; how your register domain names doesn't matter so much.

But all this turns out not to be true.

In the 67 cases reviewed:
  • the average percentage of Good Faith Factors considered is 59%; and
  • the average percentage of Bad Faith Factors considered is 60%. 
If we plot the percentage of Good Faith Factors considered against the percentage of Bad Faith Factors considered, on an individual litigation basis, nothing jumps out suggesting that Good Faith Factors are favored.

On average, the more that Good Faith Factors are considered, the more Bad Faith Factors are considered.

There is one interesting distinction between the treatment of Good Faith Factors and Bad Faith Factors: the "neutral" score. In consideration of the Bad Faith Factors, some courts  scored the Bad Faith Factors as "neutral." For example, if the DNO had provided accurate information in the domain name registration, instead of scoring this in favor of the DNO, the court would score it as "neutral." Conversely, Good Faith Factors were rarely scored as neutral. The Good Faith Factors were scored as "Neutral" 6 times where the Bad Faith Factors were scored as "Neutral" 25 times.

To be clear, I support the “Neutral” score. On the mitigating factors, the factors should either justify the DNO’s actions, or they should be neutral. On the aggravating factors, either they should cast further aspiration on the DNO’s actions, or they should be neutral. I am not objecting to the neutral score. However, One would expect to see these equally balanced between the good faith factors and the bad-bad faith factors – the fact that they are not, this is where some sandbagging may be taking place.

Next: Another Failed Conspiracy

Saturday, February 18, 2012

2.15 :: 67 Cases :: Crowded :: Linus' Law :: Depressing :: That Must Be Illegal :: Smartphone, Dumb Regs :: Fear-mongering Surveillance

CyberTelecom News
Federal Internet Law and Policy

>> This was cued up early this week and I never got it out. Sorry.

Got Open WiFi? Get a lawyer., Forbes
Sometime ago I wrote about how your WiFi might be hacked due to a
technical SNAFU in something that is a standard feature of WiFi access

Would a "right of reply" f ix Section 230 of the Communications
Decency Act?, Intl J of Law and Info Tech
Section 230 of the Communications Decency Act provides immunity from
defamation claims to ISPs and website owners for materials posted by
third parties. However, the statute also imposes a hardship on the
victims of that defamation, since they are often left without a remedy
against an anonymous

"Network Neutrality": the meme, its cost, its future, CAIDA
k. claffy, "'Network Neutrality': the meme, its cost, its future", ACM
SIGCOMM Computer Communication Review (CCR), vol. 41, no. 1, pp.
44--45, Sep 2011.

Net neutrality and the EU electronic communications regulatory
framework, Intl J of Law and Info Tech
For the most part, the current Internet is open, the whole Internet is
available to anyone who connects to it. The reason for this openness
is that the network

AT&T Throttles Customers, Comes Under Fire, Forbes
AT&T is under fire for throttling its top data users, as the spectrum
crunch gradually renders unlimited data plans a thing of the past.

ACPA Part 8: Sixty Seven Cases, Cybertelecom
These posts review the first 11 years of AntiCybersquatting Consumer
Protective Act (ACPA) dispositive federal caselaw. Decisions were
found by searching Google Scholar for the term "cybersquatting,"
reviewing cases cited by uncovered cases and literature, and tracking
new cases

Will the UN take over Net governance?, TLF
Over at I write that we should keep a close eye on moves by
Russia, China and other countries to move Internet governance to the

The World Of Open Textbooks Just Became A Little More Crowded -- And A
Little More Open, Techdirt
Open e-textbooks are hardly new: Techdirt has been reporting on the
pioneer in this market, Flat World Knowledge, for several years now.
But a new entrant called OpenStax College is noteworthy for a number
of reasons:

Justice Department OKs Google's bid for Motorola, CNET
The Justice Department says it doesn't believe that Google's $12.5
billion acquisition of Motorola Mobility will affect competition.

Iran Starts Blocking All Encrypted Traffic - As Tor Works on Solution
to Bypass Iranian Filters, DSLReports
Late last year Iranian leaders made it a criminal offense to bypass
the country's Internet filters using VPNs or any other technology. The
announcement by Iranian Telecommunications Minister Reza Taghipour
insisted the move was made to combat a "soft war being waged by

Canada wants warrantless Internet spying, says critics support child
porn, Ars Technica
Canada's conservative government has re-introduced an Internet
surveillance bill that would allow the government to obtain
information about Internet subscribers—without a warrant.

The Curious Case of the D.C. District's Anonymity Orders, Citizens
Media Law Project
Just before Christmas 2011, a federal magistrate working under D.C.
District Court issued a… curious ruling. The case is Hard Drive v.
Does 1-1,495, another one of these mass-joinder copyright-infringement
cases. I recommend hitting that link for the full story, but here's
the basic sketch:

EU Official Who Resigned Over ACTA Details Why ACTA Is Dangerous;
While His Replacement Seems Unlikely To Care, Techdirt
Last month, we noted that, Kader Arif, the ACTA rapporteur -- or the
guy in charge of "investigating" ACTA for the EU Parliament -- had
resigned in disgust over the fact that the EU was moving forward with
ACTA. He noted that he was denouncing both the process and the
agreement itself. Arif

Jessica Wang, A Brave New Step: Why the Music Industry Should Follow
the Hulu Model, IDEA
The single greatest problem facing the music industry today is its
inability to find an effective response to illegal music downloading.
Approximately ninety-five percent of music was downloaded illegally in
2008,1 and one can

Germany Won't Sign ACTA, Forbes
It worked against SOPA, and it seems like the massive mobilization of
internet protests may be derailing the once-inevitable ACTA as well.

The range of Linus' Law, Virulent Word of Mouse
After more than a decade of successful growth, Wikipedia continues to
defy easy characterization. It receives more than 400 million viewers
per month. Close to four million articles grace its web pages in
English alone. Volunteers built the entire corpus of text.

Depressing: News Sites Are Their Own Biggest Advertisers, Forbes
Broadly speaking, legacy publishers have done a terrible job of
convincing the marketers who advertise with them in print to extend
their relationships to the digital realm. A new report from the Pew
Research Center's Project for Excellence in Journalism shows just how

EFF Unveils New Project: Bloggers Under Fire, EFF
2011 was by many accounts 'the year of the protester.' From Tunisia
to Oakland, activists took to the streets—and to social networks—to
express themselves and their grievances. But while many were
successful in using online tools in their activism, others faced grave

Oh No! Car Dealers Might Have To Deal With Informed Customers! That
Must Be Illegal!, Techdirt
A few folks sent over this recent NY Times article about how the
traditional auto sales world was apparently up in arms about a company
called TrueCar that seeks to make the process of buying cars easier by
providing more info to buyers about what cars are actually selling
for, what the

Netflix Cuts Q4 Profits To Reflect Suit Settlement; Shrs Off, Forbes
Netflix has reduced its previously reported Q4 profits to 64 cents a
share from 73 cents.

Netflix pays $9 million to settle privacy violation lawsuit, CNET
After a higher-than-expected fourth quarter, the video subscription
service unburdens itself of a pending yearlong class action suit and
settles for $9 million.

Take that, Netflix: Hulu premieres Battleground series, Gigaom
Hulu launched its first original scripted series Battleground Monday
night, just one week after Netflix started its foray into original
programming with Lilyhammer.

Tidbits from the FCC's Proposed Budget, Telecom Law Monitor
Yesterday, the FCC released its proposed budget for fiscal year 2103
(beginning in October 2012). The budget offers a few interesting
insights into the balance of the FCC's functions. It also offers a
preview of what to expect with the FCC's regulatory fees, which are
due in September of each year. See below for more.

VIDEO: Who owns your online personal data?, BBC
David Reid reports on the new European Commission directive that aims
to put you back in charge of your data.

NIST Proposes Governance Structure for Internet Identity, EPIC
The National Institute of Standards and Technology has released a
report detailing the governance structure for the White House's
National Strategy for Trusted Identities in Cyberspace. EPIC, joined
by the Liberty Coalition, submitted comments on the original proposal,

Smartphone, Dumb Regulations: Mixed Signals in Mobile Privacy, Fordham
IP Media & Ent LJ
If you happen to use one of the 200 million1 iPhone, iPad, and iPod
touch devices on the planet, Apple knows where you are.

Anonymous Hacks CIA Website, Forbes
"CIA TANGO DOWN" reads an Anonymous-affiliated Twitter account. It's
military-speak for eliminating a hostile force that has infilitrated
hacker circles as an announcement of a successful attack.

Staff-led Background Briefing on Cybersecurity Act of 2012, Senate Commerce
The Senate Committees on Commerce, Science, and Transportation and
Homeland Security and Governmental Affairs will host a staff-led
background briefing on bipartisan cybersecurity legislation, the
Cybersecurity Act of 2012.

FDA defends its monitoring of whistle-blowers' email, CW
The FDA Friday said it monitored the private email accounts of nine
agency whistle-blowers starting in 2010 to determine whether any of
them leaked confidential information to the public.

FBI seeks social media monitoring tool, CW
In a move that's unlikely to sit well with privacy advocates, the FBI
has begun scouting for a tool that will allow it to gather and mine
data from social networks like Facebook, Twitter and blogs.

15 Years On, President Clinton's 5 Principles for Internet Policy
Remain the Perfect Paradigm, Forbes
What principles should guide Internet policy? Fifteen years ago, the
Clinton Administration proposed a paradigm for how cyberspace should
be governed that remains the most succinct articulation of a
pro-liberty, market-oriented vision for cyberspace ever penned. It
recommended that we

"If there are no dogs in Heaven, then when I die I want to go where
they went."-Will Rogers
:: Adopt a Rescue Dog or Cat :: ::
Website ::
Blog ::
Delicious ::
Twitter & Facebook :: Cybertelecom
Google Group :: cybertelecom-l

AUP ::
Cybertelecom is Off-the-Record. Otherwise play nicely.

Link to us!

NYU Privacy Research Fellowship Available for 2012-13 Academic Year

A research opportunity that was forward to me

The Information Law Institute of NYU's Engelberg Center on Innovation  Law and Policy is accepting applications for one or more one-year  fellowships in the area of privacy law and policy to begin in Fall 2012. The fellowship is open to law school graduates or PhDs in relevant disciplines with excellent credentials. Additional legal or policy experience is a plus, particularly if in a related field.  While in residence at NYU School of Law, the fellow will be expected to devote time to joint projects, pursue his or her own privacy-related research agenda, and help with programming of topical events. Joint research may be supervised by Professors Florencia Marotta-Wurgler, Helen Nissenbaum, Katherine Strandburg, or ILI Senior Fellow Ira Rubinstein. The fellow will have the opportunity to participate in Information Law Institute activities, including the multidisciplinary Privacy Research Group, interact with other faculty associated with the ILI and Engelberg Center, and take part in many other activities at NYU School of Law.  Applications should be sent via email to ILI assistant  Nicole Arzt ( and should include a cover letter, curriculum vitae, copies of or links to any relevant publications, and the names and contact information of three references. We will begin reviewing applications March 10 and continue until the position is  filled. The fellowship is made possible by a generous grant from Microsoft Corporation.

Monday, February 13, 2012

ACPA Part 8: Sixty Seven Cases

These posts review the first 11 years of AntiCybersquatting Consumer Protective Act (ACPA) dispositive federal caselaw. Decisions were found by searching Google Scholar for the term "cybersquatting," reviewing cases cited by uncovered cases and literature, and tracking new cases through the use of Google Scholar Alerts using the terms "cybersquatting" and "15 U.S.C. § 1125(d)."

Preliminary Results

Some preliminary results:
  • Total number of cases reviewed: 67 
  • Percentage of cases where Trademark Owner (TMO) prevailed: 66%
  • Percentage of cases where Domain Name Owner (DNO) prevailed: 34%
  • Total factors considered all cases: 364
  • Average number of factors considered in a case: 5.4
  • Total factors in favor of DNO: 93 (26%) 
  • Total factors in favor of TMO: 261 (72%)
  • The number of cases that considered 9 or more factors: 22
  • Fewest factors considered in a TMO winning case: 1
When the ACPA was first enacting, there was a flurry of cases. Then, for the next eight years, generally the number of ACPA cases hovered at small numbers. The year 2010 saw a spike in cases, but 2011 (8 months into the year) does not appear to be sustaining that spike.

DNOs have won on average 34% of the cases. In the initial year of litigation, TMO won all of the cases. Over time DNOs have fared progressively better, winning the majority of cases two out of the last three full calendar years. 

 Next: Failed Conspiracies

Saturday, February 11, 2012

2.10 :: Crippled :: In a Suspect Move :: Map For Places You Wont Go :: No Mere Tiffs :: The Scorecard :: Deceptive, Dishonest :: No Patent for You! ::

CyberTelecom News
Federal Internet Law and Policy
Microsoft isn't evil, they just make really crappy operating systems.
-Linus Torvalds

Smart Government Fixes for Lifeline, FCC
These past few months have been especially proud ones for me at the
Federal Communications Commission for one very simple reason: I have
had the privilege of being part of a team that put the principles of
smart government to work. Yesterday, the Commission released a
bipartisan Order comprehensively reforming the Lifeline program, the
culmination of months of effort to clean-up and modernize this vital

Frontier Lays Off FiOS Install Staff - Continuing Their "Dedication"
to FiOS, DSLReports
Frontier just got done swearing to the heavens they were dedicated to
the FiOS TV customers they acquired from Verizon, after socking those
customers with huge price hikes and whopping new $500 installation
fees. The company can't afford to be in the TV business or expand
fiber to the home services, but couldn't acknowledge

GPS air traffic navigation system would be crippled by LightSquared
network, Congress is told, Ars Technica
Airline industry representatives and a US transportation official told
members of Congress yesterday that LightSquared's planned 4G LTE
network would interfere with a GPS-based navigation system that
government and industry has invested $8 billion in.

LightSquared asks FCC for stricter GPS gear standards, CNET
LightSquared is asking the FCC to impose stricter standards on GPS
equipment to ensure that its network can coexist with these GPS

In a suspect move, LightSquared calls for GPS design standards, Gigaom
In its ongoing fight to launch its nationwide LTE service,
LightSquared on Wednesday Tuesday asked the Federal Communications
Commission to impose the first-ever standards on GPS device design,
claiming such requirements would allow GPS and its 4G network to
co-exist peacefully in the satellite bands. While LightSquared would
appear to be taking the middle path, the proposal smacks of a
political stunt.

The FCC map of places your mobile data plan won't work, Gigaom
The Federal Communications Commission is spearheading a big effort to
get rural Americans online, and to help, later this year carriers can
apply for a $300 million fund to bring wireless broadband to the
heartlands. Only it's not the heartlands, as the nifty interactive map
shows. The largest areas without 3G coverage are in the Western U.S.

Verizon, AT&T Lobby to Weaken FCC Spectrum Authority - Duopoly
Protection Language Buried in Jobs Bill, DSLReports
Since 1993 the FCC has had the authority to place restrictions on
auctions or conditions on spectrum (like requiring auction winners
offer wholesale access) -- depending on the bidders' market dominance
and/or current spectrum holdings. As their spectrum and market
positions attest, neither AT&T and Verizon have been harmed by the
requirements. Still,

Auctions Should Be Open, Not Closed, AT&T
"Auctions should be open, not closed. Any qualified carrier,
including those on today's letter, should have a chance to bid on any
spectrum available in an auction. This group, however, wants the FCC
to stack the deck in its favor. Congress is right to resist this
notion. In fact, what this group proposes could not be called an
auction with a straight face. These companies should be prepared to
compete in a fair and open auction, and should stop seeking a rigged
spectrum auction that would harm consumers and cost the Treasury

State of the Internet in Q3 2011: Observations on Attack Traffic, Akamai
To say that Web-based security attacks are on the rise would be an
understatement. Consider this: in just the past three years, we've
seen an eye-popping 2,000% increase in the number of DDoS attack
incidents investigated on behalf of our customers.

Cisco to Issue Updated Mobile Internet Traffic Forecast and Host Panel
on Global Policy Implications of Surging Bandwidth Demand, CISCO
On Tuesday, Feb. 14 at 10 a.m. (GMT) at the Royal Opera Housein
London, Cisco will announce the latest findings of the Cisco Visual
Networking Index (VNI) forecast for global mobile Internet traffic.
The event will also include a panel discussing the implications of
surging bandwidth demands on service provider networks, consumers,
business services and policies for the radio spectrum.

ACPA Part 7: Safe Harbor (no mere tiffs allowed), Cybertelecom
At the end of the AntiCybersquatting Consumer Protection Act nine
factors is the Safe Harbor Provision, which acts as a failsafe and
reiterates Congressional intent: Bad faith intent described under
subparagraph (A) shall not be found in any case in which the court
determines that the person believed and had reasonable grounds to
believe that the use of the domain name was a fair use or

ACPA Part 6: The Scorecard, Cybertelecom
The courts reject the notion that they mechanically churn through the
9 Bad Faith Factors, allotting points to the different parties, adding
up the score, and declaring victory for the party with the highest
score. But hat is exactly what the courts have done. They have created
a scorecard, they go down the factors and they score points for either
the Trademark Owner

Trustwave Admits It Issued A Certificate To Allow Company To Run
Man-In-The-Middle Attacks, Techdirt
We've pointed out for years that the whole structure of SSL
certificate-based security is open to attack via man-in-the-middle
attacks... if you can somehow get a certificate authority to grant you
a fake certificate. Of course, the protection against that was
supposed to be that a certificate authority wouldn't do that. But what
if one

FBI reveals 1991 probe of Steve Jobs, CW
The FBI today made public a background probe of Steve Jobs conducted
in 1991, when he was being considered by the George H. W. Bush
administration for a spot on the President's Export Council.

FBI file paints Steve Jobs as deceptive, dishonest, Globe
Newly released FBI interviews conducted in 1991 were part of a
background check for an appointment to the President's Export Council
during George H.W. Bush's administration

The FBI's Steve Jobs File: Computing 'Genius,' Lousy GPA, Forbes
Guest post written by Connie Guglielmo

AT&T Responds to Throttling Complaints - Says That 2 GB is Not the
Magic Number for Everyone, DSLReports
Earlier this week we noted how AT&T's waging a quiet war on those
"unlimited" data users it had agreed to grandfather when it eliminated
unlimited data back in 2010. One, those that legally jailbreak and use
unofficial tethering options are automatically being moved to metered
service as punishment for refusing to pay AT&T a fee for doing
nothing. Two,

AT&T data throttling prompts outcry, FierceBroadband
AT&T (NYSE: T) is not winning friends with its efforts to throttle
service to alleged data hogs that are grandfathered in on its
unlimited plans.

Federal court expedites case on Google privacy policies, WAPO
A federal court said Thursday that it would accelerate a lawsuit that
aims to punish Google for alleged privacy violations.

EPIC sues FTC over Google privacy plan, CW
The Electronic Privacy Information Center has filed a lawsuit against
the Federal Trade Commission to force the agency to take action
against Google over planned changes in collecting personal data.

Level 3: Cowen Ups Rating, Level 3
Cowen analyst Colby Synesael this morning raised his rating on the
telecom services provider Level 3 to Outperform from Neutral.

Xbox 360 Maintains Lead in U.S. Console Market in January, Ends 2011
as No. 1 Console Worldwide, Microsoft
Kicking off 2012, Xbox 360 continues to lead the console market,
turning in another month as the best-selling console in the U.S.

comScore Releases January 2012 U.S. Search Engine Rankings, comscore
released its monthly comScore qSearch analysis of the U.S. search
marketplace. Google Sites led the explicit core search market in
January with 66.2 percent of search queries conducted.

Wolfram Alpha unveils Pro service, BBC
The data-crunching site unveils a premium service that allows users to
upload data, photos and sounds for analysis.

Supreme Court rules ISPs not subject to broadcast regulations, Globe
Court says Internet service providers just a mode of transmission, not
subject to same rules and levies as content originators

Supreme Court of Canada Rules ISPs Are Not Broadcasters, Geist
The Supreme Court of Canada has ruled that Internet providers are not
broadcasters for the purposes of the Broadcasting Act when they simply
transmit content to subscribers. The court noted "when providing
access to the Internet, which is the only function of ISPs placed in
issue by the reference question, they take no part in

Indonesia bans website for the International Gay and Lesbian Human
Rights Commission, APC
The website for the International Gay and Lesbian Human Rights
Commission is the latest victim of censorship in Indonesia. It joins a
number of other LGBT rights organisations which have been blocked by
pornography filters.

RIAA Whines About The Public Standing Up to Them - Insists That
SOPA/PIPA Opponents Were Duped by Evil Wikipedia, DSLReports
RIAA boss Cary Sherman penned an editorial in the New York Times this
week that's effectively a very large pout against the recent backlash
to both SOPA and PIPA. According to Sherman, opponents of the
universally-considered-awful laws (including thousands of websites and
technical experts in numerous fields) were engaged in a campaign of
"misinformation" when they were pointing out how the law effectively
created a system of website censorship while potentially breaking key
components of the Internet:

What the RIAA Won't Tell You: Users Matter, EFF
We really have to wonder when the message is going to sink in. On
January 18, millions of Internet users spoke out together in one of
the most profound and effective uses of technology to organize
political opposition in U.S. history, sending a clear message to
Congress that voters will not tolerate crippling of the Internet. But
big content remains tone deaf to this chorus of Internet users.

Latvia Freezes ACTA Ratification, Germany Won't Sign For Now, Geist
Latvia has become the latest European country to freeze ratification
of the Anti-Counterfeiting Trade Agreement and Germany has said it
will await the European Parliament vote before deciding whether to
sign the agreement. The moves comes as the mainstream media takes
increasing notice of the ACTA protests (coverage from the Economist
here) and continent-wide protests are planned for Saturday.

Meet Richard Mack, Republican challenger to SOPA's author, CNET
Richard Mack, a retired sheriff and constitutional conservative, is
hoping to use Rep. Lamar Smith's authorship of SOPA and an Internet
surveillance bill to pry him out of office.

Boxee to Consumers: More Service Calls for You, Cable Tech Talk
Boxee should be applauded for their creativity. For years, they have
proudly touted their service as the ultimate answer for consumers who
want to "cut the cord" and cancel their cable or satellite service.
We disagree with their premise, but it's a free country.

TV 'cord cutters' and 'cord nevers' increase, finds Nielsen study, Lost Remote
A new report by Nielsen reveals a rise in homes with over-the-air TV
and a broadband connection, but no cable, satellite or IPTV service.
It's still a small segment of the overall U.S. population (5% of
households), it's grown 22.8% over the last year. While this group
still watches much more traditional TV than broadband-delivered video,
it watches half as much TV and streams twice as much video as the
general population.

FBI Puts Cloud Providers on Notice Over Security Rules, Wired
The FBI is taking a tough line on cloud vendors looking to do business
with U.S. law enforcement agencies, saying Tuesday that there would be
no compromise in its new rule that all such services comply with the
agency's Criminal Justice Information Systems (CJIS) security

NIST Cloud Computing Videos Available Online, NIST
Video recordings of the Nov. 2-4, 2011 Cloud Computing Forum ampamp
Workshop IV hosted by the National Institute of Standards and
Technology (NIST) are now available for on-line viewing.The three-day
November meeting featured, among

Jury strikes down Eolas' 'Interactive Web' patent, CNET
Patent-holding company claimed a host of Web giants owed it hundreds
of millions in royalties for their use of online video streaming,
search suggestions, and other "interactive" elements on pages.

Tim Berners-Lee In Court To Try To Prevent Patent Troll Eolas From
Patenting Key Web Concepts, Techdirt
Remember Eolas? We've written about this infamous patent troll many
times, mostly focusing on its big patent fight with Microsoft over the
idea of browser plugins -- a case it eventually settled. In 2009,
however, Eolas came back and basically sued the web, claiming that all
sorts of very basic web technologies were, in fact, infringing on a
brand new,

Eolas loses in Web patents claim against Google and others, CW
A jury in Texas gave the verdict that two patents of Eolas
Technologies that enable Internet browsers to host embedded
interactive applications were invalid, in a protracted legal battle
which involved top Internet companies like Google and

Good call: Path apologizes, erases all lifted address book data from
servers, Gigaom
Path, the mobile app for cataloging your daily activities and sharing
them with a relatively small circle of contacts, came under serious
fire on Tuesday when it was discovered that Path's iPhone app imports
all of its users' address book data onto Path's own servers without
notification or asking permission. Not surprisingly, many people saw
this as a major breach of user trust.

Your Online Privacy Is Worth Less Than A Six Pack Of Marshmallow Fluff, Forbes
Privacy utopians have long dreamed of a day when we would be paid for
giving up our data, and would get a slice of the profits that
companies make from collecting, storing, aggregating, remixing,
sharing, and selling our personal information. Well, utopians, the day
has arrived! Google is going to pay Chrome users who are willing to

Senate Cybersecurity Bill Nukes Privacy Protections, TLF
My seen-it-all cool was shaken yesterday when I examined how a Senate
cybersecurity bill would scythe down legal protections for privacy.
Anyone participating in government "cybersecurity exchanges" would
have nearly total immunity from liability under any law. No Privacy
Act, no ECPA, no E-Government Act, no contract law, no privacy torts.
The scuttlebutt is that Senator Reid (D-NV) may push this especially
hard as payback to the Internet for the SOPA/PIPA debacle.

Time to Act on Companies Selling Mass Spy Gear to Authoritarian Regimes, EFF
On Wednesday, EFF will give recommendations to the European Parliament
for how to combat one of the most troubling problems facing democracy
activists around the world: the fact that European and American
companies are providing key surveillance technology to authoritarian
governments that is then being used to aid repression.

FCC Clarifies USF Reform/Intercarrier Compensation Order, Telecom Law Monitor
On Friday, February 3, 2012, the FCC's Wireline Competition Bureau and
Wireless Telecommunications Bureau jointly released an order revising
and clarifying certain aspects of the sweeping universal service and
intercarrier compensation reform order adopted last November. The
clarifications address the rates applicable to VoIP-PSTN traffic,
access stimulation and the CETC phase-down of high-cost support, among
other things.

VoIP Outage Reporting Obligations to be Adopted at February 15 FCC
Meeting, Telecom Law Monitor
VoIP providers, prepare to report outages to the FCC. Since early in
2010, the FCC has been on a path to impose new outage reporting
obligations on providers of interconnected VoIP services, despite
industry opposition to the new requirements. Today, the FCC released
its "Sunshine Notice" confirming that it will vote on an order to
adopt reporting

"If there are no dogs in Heaven, then when I die I want to go where
they went."-Will Rogers
:: Adopt a Rescue Dog or Cat :: ::
Website ::
Blog ::
Delicious ::
Twitter & Facebook :: Cybertelecom
Google Group :: cybertelecom-l

AUP ::
Cybertelecom is Off-the-Record. Otherwise play nicely.

Link to us!