CyberTelecom News Weekly
Federal Internet Law and Policy :: An Educational Project
- Sept. 11 :: Berkman Center: Book Launch: Open Access :: Harvard Law School
- Sept. 12 :: FOSI: A Platform for Good - Launch Event :: National Press Club
- Sept. 13 :: Public Knowledge's 9th annual IP3 awards :: Washington DC
- Sept. 15 :: 1998 :: MCI and WCOM become WCOM
- Sept. 19 :: NTIA Privacy Multistakeholder Process Open Meeting :: Washington DC
- Sept. 20 :: Comments Due 9th FCC 706 NOI
- Sept. 21-23 :: Telecommunications Policy Research Conference :: Arlington, VA
- Sept. 24 :: Extended Deadline Comments FTC Modification to COPPA
- Sept. 25 :: GMU: Bronwyn Howell: Regulating Broadband Networks: The Global Data for Evidence-Based Public Policy
[M]any problems that can be thought through in advance are very difficult to think through in advance. They would be easier to solve, and they could be solved faster, through an intuitively guided trial-and-error procedure in which the computer cooperated, turning up flaws in the reasoning or revealing unexpected turns in the solution. Other problems simply cannot be formulated without computing-machine aid. Poincare anticipated the frustration of an important group of would-be computer users when he said, "The question is not, 'What is the answer?' The question is, 'What is the question?'" One of the main aims of man-computer symbiosis is to bring the computing machine effectively into the formulative parts of technical problems. - J.C.R. Licklider, "Man-Computer Symbiosis," IRE Transactions on Human Factors in Electronics, HFE-1 (1960): 4-11, accessed May 21, 2012, http://groups.csail.mit.edu/medg/people/psz/Licklider.html
FCC to measure mobile broadband speeds, WAPO :: Keyword: 
The Federal Communications Commission said Thursday that it would begin to measure the speeds of wireless networks, a move to give consumers more information on the performance of their wireless providers and to keep carriers accountable for advertised speeds.
FCC to test mobile broadband performance for consumers, CNET :: Keyword: 
The government agency says that the evaluations will be useful to consumers and will "spur competition among service providers."
Former FCC Chairman Kevin Martin lobbies for LightSquared, CW :: Keyword: [GPS]
Two names that have recently been out of the limelight recently turned up on Tuesday at the U.S. Federal Communications Commission: Bankrupt would-be mobile broadband carrier LightSquared and former FCC Chairman Kevin Martin, who was helping to sell LightSquared's story to the agency.
Broadband Progress Report Map – Another Digital First, FCC :: Keyword: [MAP]
In another digital first for the FCC, we just released an interactive, web-based map that illustrates our Broadband Progress Report. This congressionally mandated report assesses how well broadband deployment and adoption is progressing in the nation. With this new map, our report is more responsive to both Congress and the American people.
Olympics Stimulate Growth of Wi-Fi Service in Britain, NYT :: Keyword: [WIFI ]
In preparations for the Games, the operators O2 U.K., Virgin Mobile and BT carved up public places across London, broadcasting open wireless networks in major squares, airports and subways.
FCC TO LAUNCH MOBILE BROADBAND SERVICES TESTING AND MEASUREMENT PROGRAM., FCC :: Keyword: [Wireless]
The National Broadband Plan (NBP), developed by the FCC, made recommendations to improve the availability of information for consumers about their broadband service. The FCC has undertaken a series of projects as part of its Consumer Empowerment Agenda to realize this charge, including launching a
FCC Authority Questioned In Wake of Verizon Deal Approval, Teckfreedom :: Keyword: [Wireless]
"There's a common misperception that the FCC somehow gets to review all deals in the communications industry," said TechFreedom's Berin Szoka in an interview with Bloomberg BNA Aug. 27. "
FCC Authority In VZ/SpectrumCo, or "Real Lawyers Read The Footnotes.", Tales From the Sausage Factory :: Keyword: [Wireless]
Many years ago, I taught a semester of law school as an adjunct. I assigned the students to read the FCC's 2005 Internet Policy Statement. I was dismayed to discover that, after doing the reading, none of them had
Section 230 Immunizes Links to Defamatory Third Party Content--Directory Assistants v. Supermedia, Tech & Marketing Law Blog :: Keyword: [47 U.S.C. § 230]
Assistants, Inc. v. Supermedia, LLC, 2012 WL 3329615 (E.D. Va. May 30, 2012) [For some reason,...
George S. Ford and Lawrence J. Spiwak , Justifying the Ends: Section 706 and the Regulation of Broadband, Phoenix Center Policy Perspective No. 12-04 :: Keyword: [Open Internet]
Over the past several years, the FCC under Chairman Julius Genachowski has argued that because broadband is not universally ubiquitous, the agency may use the "reasonable and timely" standard contained in Section 706 in the Communications Act as an independent source
90% of US households with computers have broadband, Gigaom :: Keyword: [Broadband]
Broadband penetration in the U.S. is continuing to grow, and now stands at 90 percent of U.S. households that have a computer at home, according to Broadband Access & Services in the Home 2012, a study by Leichtman Research Group (LRG). Five years ago, 65 percent of households with a computer subscribed to broadband service, LRG notes. Its research shows that broadband subscriptions go up with household incomes.
comScore Reports July 2012 U.S. Mobile Subscriber Market Share, comscore :: Keyword: [Broadband]
key trends in the U.S. mobile phone industry during the three month average period ending July 2012. The study surveyed more than 30,000 U.S. mobile subscribers and found Samsung to
Accelerating IPv6 Growth and Sunsetting IPv4, Arbor Networks :: Keyword: [IPV6]
The next-generation Internet Protocol, IPv6, has experienced more growth in the last 2 years than in any other period in its 18-year existence . While there are many challenges ahead in the deployment of IPv6, IPv6 is a certain, although eventual, replacement for the currently dominant IP protocol, IPv4. As deployment of IPv6 gains
Chris Jay Hoofnagle, Ashkan Soltani , Nathan Good , Dietrich James Wambach, Mika Ayenson, Behavioral Advertising: The Offer You Cannot Refuse, 6 Harvard Law & Policy Review 273 (2012) :: Keyword: [Advertising]
At UC Berkeley, we are informing political debates surrounding online privacy through empirical study of website behaviors. In 2009 and 2011, we surveyed top websites to determine how they were tracking consumers. We found that advertisers were using persistent tracking technologies
Visiting the White House, "Anytime, Anywhere, and on Any Device", White House :: Keyword: [EGOV]
Today, we're excited to announce some big changes to the way you connect with the White House. More Americans rely on tablets and smart phones for news and information than ever before and we've certainly seen these trends reflected at WhiteHouse.gov. Over the past two years the number of mobile visits to the site has
Chinese Dissident in Yahoo Case Is Freed After 10 Years, NYT :: Keyword: [YAHOO]
Wang Xiaoning served 10 years after being convicted of state subversion on evidence provided by the Internet giant Yahoo, which was criticized for helping Chinese authorities in the case.
Eldar Haber, Copyrights in the Stream: The Battle on Webcasting, 28 Santa Clara Computer & High Tech. L.J. 769 (2012) :: Keyword: [Webcasting]
The Internet threatens many right holders who consistently battle against technologies that enable people to use their copyrighted materials without their consent. While copyright holders have succeeded in some cases, their main battle against peer-to-peer (P2P) file-sharing has yet
Castree, Sam, Cyber-Plagiarism for Sale!: The Growing Problem of Blatant Copyright Infringement in Online Digital Media Stores, SSRN :: Keyword: [Copyright]
While much ink and rhetoric have been spilled over cyber-piracy, there has been little mention of the problem of what we shall call 'cyber-plagiarism': thieves copying completely the works of others and selling them on online digital media stores like Apple's App Store and Amazon's
Members of Congress Demand Answers for Homeland Security's Unjust Domain Name Seizures, EFF :: Keyword: [IP DNS]
This morning, a bipartisan group of Representatives, led by Rep. Zoe Lofgren (D-Calif.), sent a pointed letter to Attorney General Eric Holder and the Secretary of Homeland Security Janet Napolitano protesting the recent spat of domain name seizures—executed on dubious copyright grounds—that have been censoring websites with no due process.
Talking Twitter at the #GOP2012 Convention #2, Twitter :: Keyword: [Media]
While we're here in Tampa, we've been talking to journalists, candidates, political pundits and more about the way Twitter has affected the election and their work. Now we're talking with @BretBaier, Anchor of FOX News Channel's Special Report.
#DNC2012: 3 million Tweets and counting, Twitter :: Keyword: [Media]
Although it's just the first night at the Democratic National Convention in Charlotte, people have already posted more than 3 million Tweets, including #DNC2012 and related terms. In comparison, there were 4 million Tweets sent throughout the three days of last week's Republican National Convention (#RNC2012).
The Cloud: Understanding the Security, Privacy and Trust Challenges, Rand :: Keyword: [Cloud]
Our research investigated the security, privacy and trust aspects of cloud computing and determined whether these were sufficiently distinct to warrant public policy intervention. On the whole, cloud computing brings into acute focus many security and privacy challenges already
The Privacy Multistakeholder Process Turns to Substance, NTIA :: Keyword: [Privacy]
At the second privacy multistakeholder meeting regarding mobile application transparency held August 22, stakeholders made substantial progress on procedural issues to move this process forward. Poll results from the meeting are available here. NTIA grouped the poll results into three categories: "general support," "mixed views," and
FTC Extends Deadline to Comment on Proposed Modifications to the Children's Online Privacy Protection Rule Until September 24, 2012, FTC :: Keyword: [COPPA]
FTC Extends Deadline to Comment on Proposed Modifications to the Children's Online Privacy Protection Rule Until September 24, 2012
Carol M. Hayes and Jay P. Kesan , At War Over CISPA: Towards a Reasonable Balance between Privacy and Security, Illinois Public Law Research Paper No. 13-03 :: Keyword: [Security]
Congress has recently begun attempting to address cybersecurity threats. Whenever the topic is raised, alarms sound from both sides of the political aisle. On one side, the intelligence community stresses that protection from cybersecurity threats is essential to national security,
BitCoin exchange loses $250,0000 after unencrypted keys stolen, CW :: Keyword: [Security]
Hackers stole about $250,000 from BitFloor, a BitCoin exchange, and it does not have the money to reimburse account holders, according to the website's founder.
Court ruling that NSA spying violated 4th Amendment remains secret, Ars Technica :: Keyword: [Big Brother]
Last month, a letter to Congress noted that "on at least one occasion" a secretive US court ruled that National Security Agency surveillance carried out under a 2008 act of Congress violated the Fourth Amendment's restriction against unreasonable searches and seizures. But the actual ruling remains secret. Decisions handed down by
The Law of Cyber-Attack, California Law Review, Vol. 100, No. 4, 2012 :: Keyword: [Cyberwar]
Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear centrifuges, air defense systems, and electrical grids, cyber-attacks pose a serious threat to national security. As a result, some have suggested that cyber-attacks should be
FBI: Hackers didn't get Apple IDs from us, CNN :: Keyword: [Hacker]
The FBI on Tuesday said there is "no evidence" to support claims by a hackers group that they accessed information about millions of Apple users on a bureau computer.
David W. Opderbeck, Does the Communications Act of 1934 Contain a Hidden Internet Kill Switch?, Seton Hall Public Law Research Paper :: Keyword: [Kill Switch]
A key area of debate over cybersecurity policy concerns whether the President should have authority to shut down all or part of the Internet in the event of a cyber-emergency or cyber-war. The proposed Cybersecurity Act of 2009, for example, contained what critics derided as an
Universal Service Policies in the Context of National Broadband Plans (OECD Digital Economy Paper 203), OECD :: Keyword: [USF]
This report discusses the main areas in which national strategies to expand broadband networks affect universal service objectives, proposes criteria to rethink the terms of universal service policies, and shares the latest developments across a selected group of OECD countries.
We Believe in America, Telecommunications, and the Internet, Benton :: Keyword: [VOTE]
Meeting in Tampa this week, the Republican Party adopted its 2012 platform self-proclaimed to be "both a vision of where we are headed and an invitation to join us in that journey." Telecommunications and, specifically, the Internet are key planks in the party's principles and policies this year.
2012 Democrat Platform Endorses Internet Privacy, EPIC :: Keyword: [Vote]
The 2012 Democratic National Platform supports the administration's Internet Privacy Bill of Rights to protect consumer privacy. Separate provisions in the platform call for privacy protections for broadband deployment, intellectual property enforcement, and cybersecurity laws; the Democratic platform opposes voter identification laws.
Democratic Convention on pace to trump GOP in social media, Lost Remote :: Keyword: [Vote]
Perhaps this shouldn't come as a surprise, but the DNC is out to a much stronger start than the RNC on social media. Twitter said that Michelle Obama's speech peaked at more tweets per minute (28,003) than Mitt Romney's speech (14,239). The mayor of San Antonio, Julian Castro, drove more Twitter conversation than any GOP speaker except for Mitt Romney
Clint Eastwood's RNC Obama chair gets own Twitter account, CNET :: Keyword: [VOTE]
Wow. It doesn't take long for Twitter to tap into the cultural zeitgeist. Invisible Obama, fast made famous at tonight's RNC, gets an account that goes from zero to nearly 20K followers in less than an hour.
Obama's response to Eastwood most re-tweeted tweet of RNC, CNET :: Keyword: [VOTE]
Clint Eastwood's berating of an invisible Obama launched a viral "Eastwooding" meme, but it was the president's response that garnered the most Twitter traction.
Democrats push for open internet, cybersecurity, WAPO :: Keyword: [VOTE]
Democrats late Sunday reiterated support for open Internet policies that protect free speech and consumer choice, stronger cybersecurity laws and the protection of movies and songs from online copyright violations.