Sunday, September 23, 2012

9.23 :: This Paper Addresses :: This Paper is Concerned :: This Paper uses :: This Paper Discusses :: This Paper Explains ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project

"DeForest has said . . . that it would be possible to transmit the human voice across the Atlantic before many years. Based on these absurd and deliberately misleading statements, the misguided public ... has been persuaded to purchase stock in his company. "     U. S. District Attorney, prosecuting inventor Lee Deforest for fraud, 1913

Pet Adoption

Hendrik Rood*, David Yoshikawa, René Wevers, René Post, Arend-Jan Tetteroo, Andries Kuipers and Rik Schurmann, Usability of Broadband Performance Measurements for Statistical Surveys, TPRC :: Keyword: [Broadband]
This paper addresses the usability of a broadband performance measurement application for end users, as introduced in Europe since 2003 by iPing Research B.V. The small Application, executes various automated performance measurements 

Kenneth Flamm,* University of Texas at Austin, Dynamics of Quality Improvement in US Broadband Networks: An Exploratory Study, TPRC :: Keyword: [Broadband]
This very preliminary paper is concerned with measurement of broadband quality, making use of a unique, rich new data source that allows us to directly measure the evolution of many dimensions of broadband quality over the period 2011-2012. 

Steven Bauer,* Massachusetts Institute of Technology; William Lehr, Massachusetts Institute of Technology; and David D. Clark, Massachusetts Institute of Technology, A Data Driven Exploration of Broadband Traffic Issues: Growth, Management, and Policy, TPRC :: Keyword: [Broadband]
This paper uses a novel dataset from multiple ISPs to characterize important trends in broadband traffic growth, develop a better understanding of usage-related costs, and consider the implications of this growth for both network operators (e.g. 

Laura DeNardis,* American University, Governance at the Internet's Core: The Geopolitics of Interconnection and Internet Exchange Points (IXPs) in Emerging Markets, TPRC :: Keyword: [Backbone]
The market arrangements negotiated between Internet operators to interconnect at private or shared exchange points are a critical form of privatized global governance necessary for the Internet to remain operational, secure, and technically 

LightSquared redux: Lawmakers admit lack of expertise, but blame FCC, Ars Technica :: Keyword: [Lightsquared]
The saga of LightSquared and its failed plan to build a nationwide LTE network on spectrum adjacent to that used by GPS receivers has been debated ad nauseam. But one party didn’t get involved until after LightSquared’s plan was defeated: the US House of Representatives committee with primary jurisdiction over the matter.

Your Privacy and FCC Broadband Measurement: What You Need to Know About Your Personal Data, Tech Lib :: Keyword: [BB Plan]
Consumers should be aware that “government transparency” also applies to the data consumers voluntarily provide to the FCC when they participate in a government-run broadband measurement program.

Heather Hudson, Broadband Adoption in Remote Regions: An Evaluation of Broadband Projects in Alaska Villages, TPRC :: Keyword: [Rural]
Alaska is the largest state in the U.S. but with the nation’s lowest population density, of only 1.2 persons per square mile. Its total population now exceeds 710,000, of which 14.8 percent are Alaska Natives. Approximately two-thirds of the indigenous 

Amit M. Schejter,* Pennsylvania State University and Brandie Martin, Pennsylvania State University, If You Build It-Will they Come? Understanding the Information Needs of Users of BTOP Funded Broadband Internet Public Computer Centers, TPRC :: Keyword: [BTOP]
This study on the users of three public computer centers (PCCs) operating in a city in the Midwest region of the US attempts to further understand the localized value of broadband Internet access for members of low-income communities. 

Court Says No Negligence Claim for Third Party Infringement via Open Wi-Fi Connection – AF Holdings v. Doe, Tech & Marketing Law Blog :: Keyword: [Wifi Security]
AF Holdings, LLC v. Doe, C 12 2049 (PJH) (N.D. Cal.; Sept. 4, 2012) I blogged...

Three conversations for parents: navigating networked publics, apophenia :: Keyword: [Child]
Parenting is hard. Many parents find parenting in an era of social media to be confusing, in part because they must advise their children to make sense of spaces that they don’t understand themselves. It’s easy to be afraid of what’s new, but by focusing on technology, parents often lose track of the underlying social issues that their

Richard S. Whitt,* Motorola Mobility LLC/Google Inc., A Deference to Protocol: Fashioning a Three-Dimensional Public Policy Framework for the Internet Age, TPRC :: Keyword: [Net Neutrality]
This paper discusses how public policy grounded in the Internet’s architecture can best ensure that the Net fully enables tangible benefits such as innovation, economic growth, free expression, and user empowerment. In particular, recognizing 

AT&T's FaceTime Blocking: There's a Complaint for That, Free Press :: Keyword: [Neutral Enforcement]
Last week, Apple unveiled the iPhone 5 and with it, its updated mobile operating system, iOS 6. While Apple fans were busy inhaling details like the new screen size, better camera lens and thinner body, Free Press made sure people knew about another feature: AT&T’s intent to block mobile FaceTime for iPhone and iPad users.

AT&T faces Net neutrality complaint for FaceTime over 3G, CNET :: Keyword: [Neutral Enforcement]
Three public interest groups say they're filing a formal complaint against AT&T with the FCC for its policy on FaceTime over 3G.

Groups to file suit against AT&T over FaceTime #thecircuit, WAPO :: Keyword: [Neutral Enforcement]
Public Knowledge and Free Press said Tuesday they will sue AT&T over the company’s decision to disallow iPhone users from using the FaceTime video chat service over cellular networks.

AT&T faces formal FCC complaint for blocking cellular FaceTime use, Ars Technica :: Keyword: [Neutral Enforcement]
A coalition of liberal advocacy groups has announced plans to challenge AT&T's policy of blocking FaceTime video chat over its cellular network. AT&T has insisted that the policy does not raise network neutrality concerns, characterizing the uproar over the policy as "another knee-jerk reaction" by the consumer groups. Three of those

Kaleb August Sieh, BITAG and Dale N. Hatfield*, BITAG, The Broadband Internet Technical Advisory Group (BITAG) and Its Role in Internet Governance, TPRC :: Keyword: [Net Neutrality]
There has been an increased recognition of the importance of multistakeholder (MSH) organizations and processes in how the Internet functions. These organizations, largely without official government action, have guided the Internet in its growth 

Masatsugu Tsuji,* University of Hyogo; Sobee Shinohara, National Cheng Cung University; and Yuji Akematsu, Osaka University , Empirical Analysis of Factors Promoting Broadband Deployment in OECD 30 Countries, TPRC :: Keyword: [Broadband]
Currently it is said that investment in broadband deployment has already reached a ceiling (Atkinson, Noam, Shultz; 2010). However, the average diffusion rate of OECD is about 60%, and policy measures are required for further deployment 

ARIN Enters Phase Two of the IPv4 Countdown Plan, ARIN :: Keyword: [IPv6]
ARIN now has 3 /8s of available space in its inventory and has moved into Phase Two of its IPv4 Countdown Plan.

Milton Mueller,* Syracuse University; Brenden Kuerbis, Syracuse University; Hadi Asgharia, Technical University of Delft, Dimensioning the Elephant: An Empirical Analysis of the IPv4 Number Market, TPRC :: Keyword: [IPv6]
One of the most important but least-studied aspects of Internet policy is the emergence of a trading market for previously allocated Internet address blocks. The controversies associated with commoditization of Internet addresses, and the way

RIPE NCC is Reaching the Last /8 of IPv4, CircleID :: Keyword: [IPv6]
In an earlier article, IPv4 - Business As Usual, we pointed out that the RIPE NCC will reach the last /8 of IPv4 address space (16,777,216 addresses) sometime later this year. On Friday, 14 September 2012 we reached this important milestone; we allocated the last IPv4 addresses from the unallocated pool. From now on, the RIPE NCC

RIPE in Europe runs dry…, IPv4 Depletion Site :: Keyword: [IPv6]
On 14 September 2012, the RIPE NCC essentially ran out of IPv4 addresses. They began to allocate IPv4 address space from the last /8 of IPv4 address with a very restrictive policy. Next in turn is ARIN. ARIN’s supply of IPv4 addresses is expected to last about 1 year.

It’s official: Legacy IPv4 address holders own their number blocks, IGP :: Keyword: [IPv6]
A company that holds a legacy address block recently sought an opinion from the General Counsel of the U.S. National Science Foundation (NSF) about the legal status of its IPv4 address holdings.The answers make for an explosive entry in the emerging IPv4 address market. IGP Blog has obtained a copy of this letter with the name of the company and any other identifying information redacted.

IPv4 address transfer markets are forming where we least expected, Ars :: Keyword: [IPV6]
The distribution of IP addresses has always occurred in a somewhat socialist manner: "to each according to his needs." But those days are drawing to an end now. So far in 2012 within the North American region, no less than a quarter of all IPv4 address blocks obtained by new owners/users have been traded in some way.

Counting DNSSEC, Potaroo :: Keyword: [DNSSEC]
At the Nordunet 2012 conference in September, a presentation included the assertion that "more than 80% of domains could use DNSSEC if they so chose." This is an interesting claim that speaks to a very rapid rise in the deployment of DNSSEC in recent years, and it raises many questions about the overall status of DNSSEC deployment in today's

Open Government, Open Data, Open Source, White House :: Keyword: [eGov]
Thomas Jefferson once wrote that when you share an idea with someone, they receive that idea without taking it away from you, just, "as he who lights his taper (candle) at mine, receives light without darkening me."

Comcast launches uncapped 305 Mbps service in Northeast, but caps Tucson, Gigaom :: Keyword: [Comcast]
Comcast, the nation’s largest broadband provider, has launched the second of its two planned broadband cap trials in Tucson, Ariz. The new caps limit users of its premium tiers at 600 GB per month and economy tiers at 300 GB per month. A day after the trials came to light, Comcast announced that its super fast 305 Mbps

Adam Candeub, Michigan State University and Steven S. Wildman,* Michigan State University, Search Engines: Antitrust Law in the Feedback Economy, TPRC :: Keyword: [Search]
Opposing views on regulating search engines have emerged in recent years. On one hand, many believe that search engines do not exercise unjustified market power but rather stand at the forefront of economic and technical innovation. On

Twitter Forced To Hand Over Occupy Protestor's Tweets It Sought To Protect, Forbes :: Keyword: [Twitter]
Twitter has proven it's willing to go the mat to protect its users' privacy from government requests for their data--But after a long legal battle, it turns out that the company isn't so willing that it will swallow hefty fines for contempt of court.

BfA Applauds Chairman Genachowski’s Statement on Senate Foreign Relations Committee Internet Governance Resolution, Broadband for America :: Keyword: [ITU]
Today, Federal Communications Commission Chairman Julius Genachowski issued the following statement on the Senate Foreign Relations Committee Internet Governance Resolution

David Waterman, Indiana University; Ryland Sherman, Indiana University; Sung Wook Ji, Michigan State University, The Economics of Online Television: Revenue Models, Aggregation, and "TV Everywhere", TPRC :: Keyword: [Video]
Unlike most media, the U.S. television industry has continued to prosper as broadband diffusion has grown to reach over 2/3 of households. We first identify the source of standard TV’s long term prosperity: technology, especially digital 

Jonathan Cave,* RAND; Neil Robinson, RAND; Svitlana Kobzar, RAND; and Rebecca Schindler, RAND, Regulating the Cloud: More, Less or Different Regulation and Competing Agendas, TPRC :: Keyword: [Cloud]
Cloud computing challenges existing regulatory paradigms in a variety of ways. This paper, which differentiates among cloud services, services hosted on cloud platforms and ‘cloud-enhanced’ services delivered with the aid of cloud-based 

Barbara A. Cherry,* Indiana University, Further Erosion of State Consumer Protection Remedies for U.S. Telecommunications Services: Flawed Federal Preemption Under AT&T Mobility v. Concepcion, TPRC :: Keyword: [Common Carrier]
Deregulatory policies have reduced or eliminated industry-specific regulatory power, shifting reliance to economic competition and legal remedies available under other bodies of state and federal law applicable to general businesses. The 

Christopher S. Yoo and Michael Janson, The Roots of Monopoly Power and Universal Service and the Limits of Government Ownership: Insights from the OFT Overlooked Nationalization of the U.S. Telephone System During World War I, TPRC :: Keyword: [Telephone]
One of the most distinctive characteristics of the U.S. telephone system is that it eschewed the government-owned PTT model in favor of one in which the telephone system is privately owned. According to the conventional wisdom, private 

Rob Frieden,* Pennsylvania State University, The Mixed Blessing of a Deregulatory Endpoint for the Public Switched Telephone Network, TPRC :: Keyword: [Title II]
Receiving authority to dismantle the wireline public switched telephone network (“PSTN”) will deliver a mixture of financial benefits and costs to incumbent carriers. Even if these carriers continue to provide basic telephone services via wireless 

Five Pilot Projects Receive Grants to Promote Online Security and Privacy, NIST :: Keyword: [Privacy]
The U.S. Department of Commerceamp's National Institute of Standards and Technology (NIST) today announced more than $9 million in grant awards to support the National Strategy for Trusted Identities in Cyberspace (NSTIC). Five U.S.

Wendy Seltzer,* Yale Law School, Privacy, Option Value, and Feedback, TPRC :: Keyword: [Social Networks]
We have confused intuitions about privacy in public. Sometimes we say “if you don’t want something known, don’t say or post it where anyone can see,” even while, at other times, we recognize the more fluid nature of privacy and the value of semi-public space

Google+ hits milestone -- 100M active monthly users, CW :: Keyword: [Social Networks]
Answering critics who said Google+ was among the walking dead, Google this week announced that it has some 100 million active users among the 400 million that have signed up for the social network that turned a year-old in June.

John S. Quarterman,* Quarterman Creations; Leigh L. Linden, University of Texas at Austin; Qian Tang, University of Texas at Austin; Andrew B. Whinston, University of Texas at Austin, Reputation as Public Policy for Internet Security, TPRC :: Keyword: [Security]
Insufficient resource allocation causes an Internet information security (infosec) problem that public policy could improve. Lack of transparency lets organizations avoid addressing internal risks, leaving vulnerabilities that are exploited by botnets, 

High Alert Issued to U.S. Banks against Cyber Attacks, USTelecom :: Keyword: [Security]
On the heels of several unauthorized overseas transactions and money transfers using stolen bank employee credentials, and several network disruptions of large U.S

Democratic senators call for 'cybersecurity' executive order, CNET :: Keyword: [Security]
This summer's partisan sparring that derailed a federal cybersecurity law has resumed, with Democrats proposing an executive order and Republicans saying it would levy "more mandates and regulations."

Senator Presses on Cybersecurity, WSJ :: Keyword: [Security]
Sen. Jay Rockefeller is sending letters to every Fortune 500 CEO, asking them to describe their company's handling of computer security.

Peter P. Swire,* Ohio State University, From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud , TPRC :: Keyword: [4th Amendment]
This paper explains how changing technology, especially the rising adoption of encryption, is shifting law enforcement and national security lawful access to far greater emphasis on stored records, notably records stored in the cloud. The major and growing reliance on surveillance access to stored records results from the following changes:

ECPA Amendment Adopted Despite Flurry of Law Enforcement Letters, CDT :: Keyword: [ECPA]
Today, the Senate Judiciary Committee adopted an amendment that would require law enforcement officers to obtain a warrant in order to access the contents of email and other personal and proprietary electronic communications. The warrant-for-content amendment to the Senate version of H.R. 2471 would update the 1986 Electronic Communications

James Miller,* Washington College of Law, Lessons from the 2011 Tohoku Earthquake and Tsunami for Researchers and Policy Makers: Legal and Regulatory Comparative of the Role of Telecommunications in Disaster Planning and Response in the US and Japan, TPRC :: Keyword: [Emergency]
Devastating natural disasters struck Japan on March 11, 2011 leaving some 340,000 citizens refugees, and nearly 20,000 dead or missing. The 9.0 magnitude Great East Japan Earthquake and the ensuing tsunami wrought destruction on all

Two men plead guilty to hacking 150 Subway stores, CNET :: Keyword: [Hacker]
Romanians reportedly admit to being part of ring that hacked into payment systems at sandwich shops and stole credit card data.

October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management, NIST :: Keyword: [NIST]
The National Institute of Standards and Technology (NIST) will host a workshop at its Gaithersburg, Md., headquarters October 15 and16, 2012, to discuss ways NIST can focus its work to help federal departments and agencies manage the

Hackers exploit new IE zero-day vulnerability, CW :: Keyword: [Vulnerability]
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said today.

John B. Horrigan,* Joint Center for Political and Economic Studies, Recent Tech Adoption Trends and Implications for the Digital Divide, TPRC :: Keyword: [Digital Divide]
In recent years, there have been two developments in technology adoption that are in tension with one another. On the one hand, home broadband adoption has increased only modestly since 2009. On the other, there has been a very rapid

Post a Comment