Sunday, October 28, 2012

10.28 :: "Dont Panic" :: icePhone :: Smear :: Not the Titanic :: Unintended Consequenses :: Harass Me Maybe ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project

Incomprehensible jargon is the hallmark of a profession. – Kingman Brewster, Jr.

Pet Adoption

OECD Study: Internet Thriving without Regulation, USTelecom :: Keyword: [Backbone]
The Internet is thriving in a competitive and largely decentralized environment, according to a new study released by the Organization for Economic Co-operation and D

Store refuses to serve customers talking on cell phones, CNET :: Keyword: [Wireless]
A British store is so fed up with people coming up to the counter and gassing on their cell phones that it has put up signs to say the next person in line will be served instead.

US government agency drops BlackBerry in favor of iPhone, CW :: Keyword: [Wireless]
Over 17,600 users in U.S. Immigration & Customs Enforcement (ICE) are being moved from their BlackBerry devices to Apple's iPhone, after it was found that technology from Research In Motion cannot meet the mobile technology needs of the agency, according to contract documents

Average teenager has never met quarter of Facebook friends, Guardian :: Keyword: [Child]
Girls send more than 220 texts a week, and 12- to 15-year-olds spend 17 hours a week on internet, research shows

FCC Commissioner McDowell Wrong on Net Neutrality and Investment, Free Press :: Keyword: [Neutral]
Washington, D.C., is often referred to as a “bubble,” and for good reason. On any given day there will be some kind of panel at an industry-funded “think tank” that includes regulators or other government officials speaking about the ills of government — and the virtues of unrestrained monopoly. This week we got two of these bubble

Digital Differences, Pew :: Keyword: [Data]
Pew Internet Research Analyst Kathryn Zickuhr discussed differences in how different demographic groups use technology at the WSU Elliott School of Communications’ annual Comm Week conference.

Verisign Reports 13 Percent Year-Over-Year Revenue Growth in Third Quarter 2012, Verisign :: Keyword: [DNS ]
VeriSign, Inc. (NASDAQ: VRSN), the trusted provider of Internet infrastructure services for the networked world, today reported financial results for the third quarter ended Sept. 30, 2012.

ICANN's core principles and the expansion of generic top-level domain names, Intl J of Law & Info Tech :: Keyword: [ICANN]
ICANN is a self-regulatory body that oversees the registration of domain names and coordinates Internet protocol addresses. As a multi-stakeholder body with significant influence over the root of the Internet, ICANN’s role is crucial in order to maintain its stability and interoperability. From January 2012, a call for Expressions of Interest

Is ICANN Stumbling Forward? GAC Advice and Shared Decision Making Procedures, CircleID :: Keyword: [ICANN]
When Bill Clinton addresses the 40th ICANN meeting in San Francisco in March 2010 he described Internet Governance as a process of "stumbling forward". Stumbling is good, he said, as long as it goes forward. Five ICANN meetings later — in the meantime ICANN adopted the new gTLD program, got nearly 2000 applications for Top

Is ICANN Stumbling Forward? GAC Advice and Shared Decision Making Procedures , CircleID :: Keyword: [ICANN]
When Bill Clinton addresses the 40th ICANN meeting in San Francisco in March 2010 he described Internet Governance as a process of "stumbling forward". Stumbling is good, he said, as long as it goes forward. Five ICANN meetings later — in the meantime ICANN adopted the new gTLD program, got nearly 2000 applications for Top

Akamai Reports 460 Times Increase in IPv6 Requests Over Its Platform Since Last Year, CircleID :: Keyword: [IPv6]
In its latest State of the Internet report, Akamai has highlighted industry numbers showing imminent global exhaustion of IPv4 addresses. Report has also identifies 460 times increase in IPv6 requests over Akamai's platform from June 2011 – June 2012. A fair amount of the IPv6 request growth is attributed to the "World IPv6 Launch"

Counting IPv6 over DNS, Potaroo :: Keyword: [IPv6]
At the recent ARIN XXX meeting in October 2012 I listened to a debate on a policy proposal concerning the reservation of a pool of IPv4 addresses to address critical infrastructure. This term is intended to cover a variety of applications, including use by public Internet Exchanges and authoritative nameservers for various top level domains. As far as I can tell,

Re-Counting DNSSEC, Potaroo :: Keyword: [DNSSEC]
This is a followup article to Counting DNSSEC that reflects some further examination of the collected data. This time I'd like to describe some additional thoughts about the experiment, and some revised results in our efforts to count just how much DNSSEC is being used out there.

Blase Ur, Pedro G. Leon, Lorrie Faith Cranor, Richard Shay and Yang Wang, Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising, FPF :: Keyword: [Advertising]
We report results of 48 semi-structured interviews about online behavioral advertising (OBA). We investigate non-technical users’ attitudes about OBA, then explain these attitudes by delving into users’ understanding of its practice. Participants were surprised

Best Buy Tells Time Warner Customers to Ditch VoIP - In Order to Avoid New Modem Fee, DSLReports :: Keyword: [TW]
Time Warner Cable took heavy criticism earlier this month when they announced users would have to pay a new $4 monthly modem rental fee. Time Warner Cable struggled to adequately support users looking to buy their own modems, and then stumbled when asked to justify the price hike on the company's already pricey service. As noted previously

Apple warns of pre-Christmas profit fall, FT :: Keyword: [Apple]
Apple reported earnings broadly in line with recently lowered expectations as it shrugged off fears of supply shortages for its smartphone

Akamai Reports Third Quarter 2012 Financial Results, Akamai :: Keyword: [Backbone]
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere, today reported financial results for the third quarter ended September 30, 2012. Revenue for the third

Google's email security flaw is embarrassing, but no catastrophe, CW :: Keyword: [Google]
It was almost a year ago that a curious mathematician with no real Internet security training was able to walk through a gaping security hole left by Google -- a weak email cryptographic key.

Knowledge Management for eDiplomacy Resources, Brookings :: Keyword: [International]
The third area at State attracting serious ediplomacy resources is knowledge management. This was the first use ediplomacy at State. It is also emerging as one of the most far-reaching applications of ediplomacy, and has garnered the attention of big business as well as other foreign ministries. It is attempting to solve some of the toughest organizational challenges foreign ministries face including:

The History of eDiplomacy at the U.S. Department of State, Brookings :: Keyword: [International]
Despite the United States’ long history of innovation in the field of communications technologies, the State Department’s emergence as the world’s leading user of ediplomacy was not a natural consequence of this. A 2001 book by Wilson Dizard Jr., Digital Diplomacy: U.S. Foreign Policy in the Information Age, tracks a long history of reluctant adaptation to technological innovations at State. In a discussion about the UK and other countries’ adoption of the telegraph, he notes:

China Blocks Web Access to Times, NYT :: Keyword: [China]
The Chinese government began blocking access to The Times after publication of an article describing the wealth accumulated by relatives of Prime Minister Wen Jiabao.

China condemns NY Times 'smear', BBC :: Keyword: [China]
China condemns as a "smear" a New York Times report saying Premier Wen Jiabao's relatives have accumulated billions of dollars.

Proposal for ICT and internet ecosystem: setting new rules on trade order, ITU :: Keyword: [ITU]
Internet usage patterns have evolved from web/text based usage to a high concentration on video. This has led to a sudden spike in traffic and the number of heavy users

WCIT and the tower of Babel, ITU :: Keyword: [ITU]
A key reason for the heated debate in relation to the International Telecommunications Regulations (ITRs) at the next World Conference on International Telecommunications (WCIT) is the problem that different parties are talking about different elements while using the same words.

The Great ITU Internet Heist, CircleID :: Keyword: [ITU]
There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years.

UN: Terrorists Just Love An Open Useful Internet - Thinks ISPs Should Crack Down to Stop Terrorists, DSLReports :: Keyword: [ITU]
CNET directs our attention to a new study (pdf) that effectively complains that the Internet has become too open and useful, and that ISPs need to crack down on anonymity, increase data retention, and even crack down on open Wi-Fi hotspots -- or the terrorists win. The report, recently released at a conference in Vienna by the

UN: The Problem With The Internet Today Is It's Just Too Open & Terrorists Might Use It, Techdirt :: Keyword: [ITU]
Ah, the UN. As highlighted by Declan McCullagh, a new report from the United Nations Counter-Terrorism Implementation Task Force, clocking in at an unwieldy 158 pages (pdf) warns that this old internet of ours is just too damn open, and that means terrorists can use it. Thus, it has to stop the openness. The report really is just

The ITU: How we got here, how PK is involved, and what’s at stake, PK :: Keyword: [ITU]
This December, the 193 countries of the International Telecommunications Union (ITU) will gather in Dubai to revise the International Telecommunication Regulations (ITRs). Before diving into specific issues and proposals, let’s lay out how we got here, how PK is involved, and what’s at stake.

The Internet is not the Titanic, ISOC :: Keyword: [Itu]
In recent months, the question of whether the Internet is sustainable in the face of increasing demand has been a focal point for discussions surrounding the upcoming World Conference on International Telecommunications (WCIT), which is being convened to modify the International Telecommunications Regulations (ITR) treaty

U.N. calls for 'anti-terror' Internet surveillance, CNET :: Keyword: [ITU]
United Nations report calls for Internet surveillance, saying lack of "internationally agreed framework for retention of data" is a problem, as are open Wi-Fi networks in airports, cafes, and libraries.

U.S. Ambassador Terry Kramer Says Leave Well Enough Alone for Regulating Internet, TechZone :: Keyword: [ITU]
While the topics here are about technology today, how technology will be used tomorrow has moved to center stage. The reason is the run up to the International Telecommunication Union’s (ITU’s) convention in December in Dubai

The ETNO Proposal: Unintended Consequences, CircleID :: Keyword: [ITU]
In the run up to the WCIT negotiations in December, the most talked about proposed change to the ITRs (International Telecommunications Regulations) is the ETNO proposal. Most of the discussion centers around the clause;

Japan Was the First to Ratify ACTA. Will They Join TPP Next?, EFF :: Keyword: [Copyright]
Two of the biggest threats to the Internet are two international agreements: the Trans-Pacific Partnership agreement (TPP) and the Anti-Counterfeiting Trade Agreement (ACTA). TPP continues to expand across the Pacific, with Mexico and Canada joining in the next round in New Zealand. With ACTA, it is increasingly doubtful that it was successfully

Internet Providers Begin Rolling Out Warning System To Stop Illegal Downloads, CNN :: Keyword: [Copyright]
It is about to get a bit more difficult to illegally download TV shows, movies or music online.

NTIA 2012 DMCA Letter, NTIA :: Keyword: [DMCA]
NTIA letter to the Register of Copyrights continuing the consultative process required by the Digital Millenium Copyright Act (DMCA). The Copyright Office's Federal Register Notice containing the Librarian's Determination and Final Rule can be found at .

Final Rule Published in Section 1201 Proceeding , LOC :: Keyword: [DMCA]
The Librarian of Congress, upon the recommendation of the Register of Copyrights, has announced the classes of works to be subject to the exemption from the prohibition in 17 U.S.C. section 1201(a)(1) against circumvention of technological measures that control access to copyrighted works. 

United States Copyright Office: Ripping is Illegal, PK :: Keyword: [DMCA]
Today the Register of Copyrights and the Librarian of Congress announced the 1201 exemptions. You may remember that the 1201 review is the triannual process where organizations, communities, and individuals request permission to circumvent Digital Rights Management (DRM) technologies that prevent them from doing otherwise perfectly legal things. This time around, Public Knowledge requested an exemption that would allow people to rip DVDs they already own in order to transfer

Netflix misses subscriber target for third quarter, CNET :: Keyword: [Video]
he video-rental service adds 1.2 million new U.S. subscribers in its third quarter, shy of the nearly 1.8 million it needed to hit its full-year target of 7 million

Privacy and Technology in Balance?, MS :: Keyword: [Privacy]
This week, I had the opportunity to speak in Uruguay at the 34th International Conference of Data Protection and Privacy Commissioners. This conference brings together leading authorities on privacy from more than 50 countries, including many of the key government officials and regulators

Use fake birthdate, official says, BBC :: Keyword: [Privacy]
A government internet security chief sparks anger by advising people not to put accurate personal details on social networking sites to protect their security.

Deirdre Mulligan and Jennifer King, Bridging the Gap Between Privacy and Design, FPF :: Keyword: [Privacy]
This article explores the gap between privacy and design in the context of “lateral privacy”— privacy issues arising among users of a service rather than from the service provider—on social networking sites (SNSs) and other platforms by analyzing the privacy concerns lodged against the

Hey, I’ve Never Met You. And This Is Crazy. But Here’s My Number. Harass Me Maybe., VOA :: Keyword: [Social Networks]
Facebook has never had a stellar reputation when it comes to privacy. Here is the latest annoyance.

Wi-Fi Electricity Meters Helping Burglars? - Easily Hacked, Showing Whether You're Home, DSLReports :: Keyword: [Security]
Add increased home thefts as another potential side-effect of utilities' efforts to deploy electricity meters with embedded Wi-Fi. We've already noted how these meters have a strong tendency to interfere with home routers and WISP equipment, but now concerns are being raised that they're too easy to hack, allowing people to easily

Leveraging the Science and Technology of Internet Mapping for Homeland Security slideset, CAIDA :: Keyword: [Security]
This slideset was presented at the Cyber Security Division 2012 Principal Investigator Meeting in October 2012.

Suspect Named In Devastating Cyberattack On World's Most Valuable Oil Company, NYT :: Keyword: [Security]
On Aug. 15, more than 55,000 Saudi Aramco employees stayed home from work to prepare for one of Islam's holiest nights of the year -- Lailat al Qadr, or the Night of Power -- celebrating the revelation of the Koran to Muhammad.

Peter Swire and Kenesa Ahmad, ‘Going Dark’ Versus a ‘Golden Age for Surveillance’, FPF :: Keyword: [Big Brother]
Law enforcement and national security agencies are worried that they are “going dark” due to new technology. Their fear is that they will not be able to wiretap and decode new forms of Internet and

Cyberattack on Saudi Oil Firm Disquiets U.S., NYT :: Keyword: [Cyberwar]
American officials believe a virus unleashed on an oil giant was a return volley in a conflict begun by the United States and Israel with software that targeted Iran’s centrifuges.

A Decade of DDoS, Arbor Networks :: Keyword: [DOS]
In a little over a decade, DDoS attacks have broken the 100 Gbps barrier, up 1000%. Watch this video to see the evolution of DDoS attacks — from nuisance to menace

Interne2's NSTIC Pilot Plan, SecureID :: Keyword: [NSTIC]
nternet2 has been in the online identity business for more than a decade so its involvement with the National Strategy for Trusted Identities in Cyberspace may seem like a given.

FCC May Consider Whether Unsolicited Email To Text On Mobile Phones Is Legal, Techpresident :: Keyword: [Can Spam Act]
The Federal Communications Commission opened a proceeding on Tuesday to determine whether e-mails sent to phones as texts should be subject to its rules that protect consumers from unsolicited messages on their mobile phones.

South Carolina reveals massive data breach of Social Security Numbers, credit cards, CW :: Keyword: [SC]
Approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers belonging to South Carolina taxpayers were exposed after a server at the state's Department of Revenue was breached by an international hacker, state officials said Friday.

Cyber Security Fails As 3.6 Million Social Security Numbers Breached In South Carolina, Forbes :: Keyword: [SC]
South Carolina has announced that an "international hacker" has compromised the Social Security numbers of more than three-quarters of the State's population. Is South Carolina's cyber security particularly lax, or do we have a national problem?

Uncertified voting equipment, Freedom to tinker :: Keyword: [Vote]
Or, why doing the obvious thing to improve voter throughput in Harris County early voting would exacerbate a serious security vulnerability.

NICE Workship cancelled

URGENT NOTICE: The National Initiative for Cybersecurity Education Workshop scheduled for October 29, 30, and November 1st is now cancelled due to the possible impact of Hurricane Sandy. The storm's impact on our region is expected to be severe, and for the safety of all participants, NIST has elected to cancel the workshop.

Thursday, October 25, 2012

FPF Announces Privacy Papers for Policy Makers 2012

A collection of some of the best privacy policy papers of the year

The Future of Privacy Forum Announces Privacy Papers for Policy Makers 2012
WASHINGTON – The Future of Privacy Forum (FPF) today released the 2012 Privacy Papers for Policy Makers, highlighting eight leading privacy writings that were voted by the FPF Advisory Board to be most useful for policy makers. The papers cover a wide array of topics, including privacy by design, online behavioral advertising, mobile privacy, government surveillance, de-identification, and social networks.
The digest will be featured at an event held at the Microsoft Innovation and Policy Center on November 7th in Washington, D.C. The eight papers featured in the digest were selected among more than thirty-five entries, and were chosen by members of FPF’s Advisory Board, which is comprised of leading figures from industry, academia, law and advocacy groups. The digest was sponsored with support from AT&T, Microsoft, and GMAC.
Christopher Wolf, FPF’s founder and co-chair commented on the significance of the Privacy Papers for Policy Makers Digest, “Improving privacy protection is vitally important in this technology age so we are delighted to help build a bridge of communication between privacy scholars and privacy policy makers. We hope this publication will lead to greater communication and collaboration.”
FPF’s director and co-chair Jules Polonetsky emphasized the need to educate more policy makers about the diverse issues surrounding privacy issues and explore the myriad of thoughts that academics, industry leaders, and privacy advocates have on the issue.
“There’s no silver bullet to resolving all of the privacy concerns the public has in this new technological age,” Polonetsky said. “These writings offer some of the most compelling and innovative viewpoints that we hope policymakers consider as they look to address privacy issues.”
A full list of the writings and authors featured in the Privacy Papers for Policy Makers Digest are listed below. To see the full text of the digest and the executive summaries of the writings, click here.
Leading Papers:
Bridging the Gap Between Privacy and Design,
Deirdre Mulligan and Jennifer King
Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising
Blase Ur, PedroGiovanni Leon, Lorrie Faith Cranor, Richard Shay and Yang Wang
‘Going Dark’ Versus a ‘Golden Age of Surveillance’
Peter Swire and Kenesa Ahmad
How Come I’m Allowing Strangers to go Through My Phone? Smart Phones and Privacy Expectations
Jennifer King
Mobile Payments: Consumer Benefits & New Privacy Concerns
Chris Jay Hoofnagle, Jennifer M. Urban and Su Li
The ‘Re-Identification’ of Governor William Weld’s Medical Information: A Critical
Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now
Dr. Daniel Barth-Jones
Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents
Ira Rubinstein and Nathan Good
Will Johnny Facebook Get a Job? An Experiment in Hiring Discrimination via Online Social Networks
Alessandro Acquisti and Christina Fong
Please join the Future of Privacy Forum for a reception celebrating the selected authors on Wednesday, November 7 from 4:00-6:30 pm at the Microsoft Innovation & Policy Center, 901 K Street, 11th Floor, Washington DC, 20001
To RSVP for this event please e-mail
The Future of Privacy Forum (FPF) is a Washington, DC based think tank that seeks to advance responsible data practices. The forum is led by Internet privacy experts Jules Polonetsky and Christopher Wolf and includes an advisory board comprised of leading figures from industry, academia, law and advocacy groups.

Monday, October 22, 2012

10.22 :: Nobody Goes There Any More :: 90% Physical, the other half is Mental :: We made too many wrong mistakes. :: Even Napoleon had his Watergate ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project

“People are just as happy as they make up their minds to be.” - Abraham Lincoln

Pet Adoption

Netflix will add closed captions to all of its videos within two years, Gigaom :: Keyword: [ADA]
Netflix has settled a court case brought against it by the National Association for the Deaf and other disability rights advocates, agreeing to a consent decree that will require it to have closed captions for all of its videos by October 2014.

Netflix and deaf-rights group settle suit over video captions, CNET :: Keyword: [ADA]
A two-year class action lawsuit under the Americans with Disabilities Act ended with the streaming service agreeing to put captions on 100 percent of its video library by 2014.

Is There Something To Be Done About Broadband Competition?, Forbes :: Keyword: [Broadband]
Two dominant schools of thought have emerged in the broadband policy arena. The first, represented by the views of Susan Crawford, a visiting professor at Harvard Law School, is that there is not enough competition to cable modem service and thus government must intervene to prevent a likely abuse of market power. A second

FOIA Request Turns Up Info on Non-FCC-Compliant Transmitters., Comlawblog :: Keyword: [Wifi]
In our recent blog post about an AT&T wireless Internet service causing interference to an airport weather radar in Puerto Rico, we asked whether the FCC had charged AT&T with the wrong offense. Because the transmitter operated outside its FCC-certified frequency range (among other

AT&T's FaceTime policy triggers formal complaint, Fierce :: Keyword: [Net Neutrality]
AT&T's (NYSE:T) decision to offer Apple's (NASDAQ:AAPL) FaceTime video calling feature over cellular at no extra charge only to its Mobile Share data plan customers has led one consumer to file a formal complaint with the FCC.

Akamai Releases Second Quarter 2012 'State of the Internet' Report, Akamai :: Keyword: [Data]
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere, today released its Second Quarter, 2012 State of the Internet report. Based on data gathered from the Akamai Intelligent

Nobody 'Goes Online' Anymore, Huffpo :: Keyword: [Data]
A large survey of Internet users found that they say they spend fewer hours per week online than they did a year ago.

Internet Governance World Meets in Toronto Amid New Domains Controversy, Michael Geist :: Keyword: [ICANN]
The Internet governance world gathers in Toronto this week as the Internet Corporation for Assigned Names and Numbers (ICANN), the California-based non-profit corporation charged with the principal responsibility for maintaining the Internet's domain name system, holds one of its meetings in Canada for only the third time. My

Indian Internet Governance Conference: a Multistakeholder Success Story, ISOC :: Keyword: [ICANN]
On 04-05 October, the Internet Society was honored to be a co-organiser of the first-ever Indian Internet Governance Conference (IIGC). Organized

FCC targets Craigslist cellphone jammer vendors, issues six citations, Ars Technica :: Keyword: [eCommerce]
The Federal Communications Commission has stepped up its enforcement game, issuing citations to six individuals for advertising and selling signal cellphone jamming devices on Craigslist. The FCC has also warned several online vendors and produced public service announcements in Spanish and Mandarin Chinese.

Kirk D. Homeyer, Can a State Seize an Internet Gambling Website's Domain Name? An Analysis of the Kentucky Case, SSRN :: Keyword: [Gambling]
The recently developed Internet gambling forum has produced myriad legal issues affecting state, federal, and international law, which issues arise in large part from the ubiquity of the Internet. Based on an analysis of the Kentucky Case, this 

Google Under Pressure from EU Regulators on Privacy Policy, EFF :: Keyword: [Google]
On Oct. 16, European Union data protection authorities issued a letter to Google CEO Larry Page calling upon the search engine giant to revisit its privacy policy. Earlier this year, the policy was unified into one policy covering a wide range of different Google services and integrating data from Google search history and YouTube

EU warns Google risks fines over privacy, FT :: Keyword: [Google]
Regulators demand policy changes after an investigation shows Google fails to provide users with adequate information about use of their personal data

F.T.C. Staff Prepares Antitrust Case Against Google Over Search, NYT :: Keyword: [Google]
For investigators preparing a recommendation that the government sue, a main line of inquiry has been whether Google has manipulated its search results to favor its products.

US lawmaker questions FTC Google antitrust probe, CW :: Keyword: [Google]
The U.S. Federal Trade Commission should "tread carefully" before bringing an antitrust complaint against Google, a veteran U.S. lawmaker said as news reports suggested the agency is ready to move forward.

Sprint gains control over Clearwire with stock buy, Gigaom :: Keyword: [Sprint]
Sprint has upped in investment in Clearwire to give it the majority stake it needs to take direct control of the struggling 4G carrier. In a filing with the Securities and Exchange Commission on Thursday, Sprint revealed it has bought the outstanding shares of Eagle River Holdings, the investment arm of Clearwire’s original founder Craig McCaw.

Japanese Company to Acquire 70% of Sprint, MTTLR :: Keyword: [Sprint]
On October 15, Japanese tech titan SoftBank announced that it will acquire 70% of Sprint Nextel. The $20.1 billion deal will allow Sprint to compete with the two largest American wireless companies, Verizon and AT&T, by providing Sprint with $8 billion in new capital. Of the $8 billion, $3.1 billion will come in the form of a bond, to be

US review finds no proof of Huawei spying, FT :: Keyword: [China]
A White House-ordered inquiry has concluded that relying on the networking gear maker exposes security vulnerabilities that hackers could exploit

'No evidence' of Huawei espionage, BBC :: Keyword: [China]
A leaked report into the activities of Huawei found no evidence that the firm was in league with the Chinese government.

Rise In U.S. Hacker Attacks Against China, Forbes :: Keyword: [China]
News last week that a U.S. government report alleged Chinese telecom companies were likely spying on U.S. firms comes at a time when Chinese companies are getting hacked into like never before. Including from computer systems in the U.S.

U.S. Says Iran Is Behind Cyberattacks, WSJ :: Keyword: [Iran]
Iranian hackers with government ties have mounted cyberattacks against American targets in recent months, escalating a low-grade cyberwar.

ETNO response to the Commission Public Consultation on specific aspects of transparency, traffic management and switching in an open Internet, ETNO :: Keyword: [ITU]
ETNO does not call for regulation of IP-Interconnection, be it at global, EU or national level. IP-Interconnection should be covered by commercial agreements, including on the provision of enhanced quality of service, allowing the development of new sustainable models of traffic and payment flows in the internet value chain, and supporting sustained investment in network infrastructure.

WCIT Civil Society Briefing Leaves Many Questions Unanswered, CDT :: Keyword: [ITU]
Earlier this week, the ITU Secretariat hosted a briefing for civil society organizations interested in the ITU's upcoming World Conference on International Telecommunications. Although the Secretariat's official aim was to "provide an overview of the conference, the preparatory process, and some of the main principles and

Internet is not broken, Bangkok Post :: Keyword: [ITU]
A conference sponsored by the United Nations in Dubai this week bears careful watching. The good news is that Thai representatives at the ITU Telecom World 2012 are well aware of the hidden agenda of the conference. The bad news is that some influential governments and self-interested groups want to use the meeting to undermine the freedom of the internet.

Study Finds File Sharers Buy 30% More Music Than Non-File Sharers, Michael Geist :: Keyword: [Copyright]
A new study by the American Assembly finds that file-sharers buy 30 percent more music than non-file sharers. The study is consistent with many other studies that confirm that file sharers spend more on music and cultural products than those that do not. Study author Joe Karaganis has a follow-up post responding to criticisms from NPD, which has done survey work for the RIAA.

AT&T's Version of Six Strikes Launches November 28 - Will Include Walled Garden and 'Education' Campaign, DSLReports :: Keyword: [Copyright]
Leaked documents suggest that AT&T will begin their "six strikes" entertainment-industry anti-piracy campaign starting on November 28. Efforts to tame user piracy will vary slightly by ISP (ranging from filters and throttle to potentially severed connectivity) and will be spearheaded by the Center for Copyright Information (CCI). Leaked

"Six strikes" system goes live this fall, appeals to cost $35, Ars Technica :: Keyword: [Copyright]
The Center for Copyright Information has revealed more details about its "six strikes" system, which it calls the Copyright Alert System (CAS). In a blog post published Thursday morning, the program’s head, Jill Lesser, announced that the CAS “will begin in the coming weeks.”

Why It's Almost Impossible To Get Punished For A Bogus DMCA Takedown, Techdirt :: Keyword: [DMCA]
Yesterday, we wrote about the latest in the long running saga that is Stephanie Lenz's battle (with the help of the EFF) over whether or not Universal Music was right to issue a DMCA takedown for her 29 second video of her toddler son dancing to a (barely audible) Prince song. Once again, here's the video.

How a single DMCA notice took down 1.45 million education blogs, Ars Technica :: Keyword: [DMCA]
Web hosting firm ServerBeach recently received a Digital Millennium Copyright Act (DMCA) violation notice from Pearson, the well-known educational publishing company. The notice pertained to Edublogs, which hosts 1.45 million education-related blogs with ServerBeach, and it focused on a single Edublogs page from 2007 that

Here comes Boxee TV: A $99 box with over-the-air TV and cloud DVR, Gigaom :: Keyword: [Video]
Boxee plans to announce a new device dubbed Boxee TV Tuesday that aims to combine over-the-air broadcast content with a cloud DVR and streaming services like Netflix and Vudu. Boxee TV will allow consumers to record two shows at a time, and upload each and every recording to the cloud, where it will offer unlimited storage for

Will Consumers Cut the Pay TV Cord?, IPLJ :: Keyword: [Video]
In the debate over the future of pay TV, Bernstein Research analysts Todd Jeunger and Craig Moffet have opposing outlooks on the solvency of cable and satellite in their current forms, leaving a great deal of room for speculation over whether consumers will continue to subscribe despite rising costs or simply cut the cord

Alan Turing Remembered As LGBT Icon, Huffpo :: Keyword: [History]
June 23, 2012 marked the 100 year anniversary of mathematician and logician Alan Turing's birth. It was celebrated around the world in his honor. Alan Turing was a genius, a visionary, and a war hero. He developed a machine that cracked the German Enigma code during World War II, helping to end the war early, saving millions

Christopher S. Yoo , When Antitrust Met Facebook, SSRN :: Keyword: [Social Networks]
Social networks are among the most dynamic forces on the Internet, increasingly displacing search engines as the primary way that end users find content and garnering headlines for their controversial stock offerings. In what may be considered 

Cyberthieves steal $400,000 from Bank of America, CNET :: Keyword: [Security]
The account -- now frozen -- is used to pay city government workers in Burlington, Wash., via direct deposit.

The Fourth Amendment in the Digital Age, Columbia Sci & Tech L R :: Keyword: [4th Amendment]
In the old days – and even now, as Occupy Wall Street exemplifies – people took to the streets to protest. But as technology evolved, new forms of demonstrations appeared. One such form is hacking to pursue political ends – hack-activism, or hactivism. A famous example of a hactivist group is Anonymous, whose attacks on

Panetta Warns of Dire Threat of Cyberattack: Why the US is Losing the Cyberwar, Forbes :: Keyword: [Cyberwar]
Several hours ago, Defense Secretary Leon Panetta issued a warning that the United States is vulnerable to a ?Cyber Pearl Harbor,? and revealed that digital attackers intent on causing "panic, destruction and loss of life" have already breached highly sensitive infrastructure including computers that run chemical, electric, and water systems.

US readies cyber-attack forces, BBC :: Keyword: [Cyberwar]
The US is preparing military forces skilled at conducting operations via computer networks to counter imminent cyber-attacks, says US secretary of defense.

Recent Cyber Attacks, Forbes :: Keyword: [Cyberwar]
William Banks, The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War, SSRN :: Keyword: [Cyberwar]
Most cyber-intrusions now and in the foreseeable future will take place outside the traditional consensus normative framework for uses of force supplied by international law. For the myriad, multi-layered and multi-faceted cyber-attacks that 

VOIP Outage Reporting Requirements to Take Effect December 16, 2012, Telecom Law Monitor :: Keyword: [Outage]
In several earlier posts, we informed you the FCC had adopted mandatory outage reporting regulations for both facilities-based and non-facilities-based interconnected Voice over Internet Protocol (VoIP) service providers. The FCC has now established those rules will take effect before the end of the year. 

Twitter at the Town Hall Debate, Twitter :: Keyword: [Vote]
As the presidential candidates met at Hofstra University tonight to answer questions from a group of self-declared undecided voters, viewers around the country came to Twitter to participate in the debate exchanges and offer their own commentary. Th

The Obama And Romney Campaigns Know If You've Visited Porn Sites. Why 'Do Not Track' Matters., Forbes :: Keyword: [Vote]
The New York Times published two articles on Sunday that perfectly book-end the increasingly fractious debate over online tracking and data aggregation.

Google 'completely wrong' = Romney, CNN :: Keyword: [Vote]
To the amusement of Mitt Romney's critics, a Google Image search for the phrase "completely wrong" on Wednesday returned a page nearly full of images of the Republican presidential candidate

Thursday, October 18, 2012

Flashcards for Internet Interconnection

Playing with a new toy on the Cybertelecom website:  Flashcards! Now available in Scatter game, Flashcards, or Learn Mode!

Tuesday, October 16, 2012

[Event] FTC Workshop Privacy Implications of Comprehensive Internet User Data Collection

The FTC will be holding another in its series of privacy workshops.  Note that this announcement includes a Request for Participants.

FTC to Host Workshop to Explore Practices and Privacy Implications of Comprehensive Collection of Internet Users’ Data

The Federal Trade Commission will host a workshop on December 6, 2012, to explore the practices and privacy implications of comprehensive collection of data about consumers’ online activities. Entities such as Internet Service Providers (ISPs), operating systems, browsers, social media, and mobile carriers have the capability to collect data about computer users across the Internet, beyond direct interactions between consumers and these entities.  The workshop will bring together consumer protection organizations, academics, business and industry representatives, privacy professionals, and others to examine the collection and use of such data, its potential benefits, privacy concerns, and related issues.  The workshop is free and open to the public.

The comprehensive data collection workshop follows up on the FTC’s March 2012 report, Protecting Consumer Privacy in an Era of Rapid Change, which called on companies handling consumer data to implement recommendations for protecting consumers’ privacy, including privacy by design, providing simplified privacy choices to consumers, and greater transparency to consumers about data collection and use.  The report also set forth five action items that FTC staff would pursue in the following year, including this workshop to discuss the privacy issues raised by the collection and use of comprehensive data about consumers’ online activities by a range of entities, such as ISPs, operating systems, browsers, search engines, and social media. 

ISPs serve as a gateway to the Internet for their customers and have access to large amounts of unencrypted data that their customers send and receive.  Browsers, operating systems, and social media also may be in the position to develop highly detailed and comprehensive profiles of their customers – and to do so in a manner that may be completely invisible to consumers.  This workshop will cover issues concerning comprehensive data collection beyond those discussed in previous FTC workshops on online behavioral advertising.
The workshop will explore topics including:
  • What methods are used to collect data about consumers’ activities across the Internet?
  • What are the benefits of comprehensive data collection and what are the possible privacy challenges?
  • Which entities are capable of comprehensive data collection, and which of them are doing so?
  • How aware are consumers of comprehensive data collection, and what are their attitudes toward it?
  • If companies implement comprehensive data collection, how can they effectively inform consumers about the collection and provide meaningful choice to consumers?
  • What privacy risks are created by serving as a host for third-party applications?
  • Are there sufficient choices among online products and services to give consumers meaningful options should they wish to avoid products or services that use comprehensive data collection?
  • What legal protections currently exist in this area?
  • What legal protections should be provided?
Individuals and organizations may submit requests to participate as panelists and may recommend topics for inclusion on the agenda.  The requests and recommendations can be submitted electronically to  Paper comments should be mailed or delivered to: 600 Pennsylvania Avenue N.W., Room H-113 (Annex B), Washington, DC 20580. Prospective panelists should submit a statement detailing their expertise on the issues to be addressed and contact information no later than November 2, 2012.  Panelists will be selected based on expertise and the need to include a broad range of views.

The workshop will be held at the FTC's satellite building conference center, 601 New Jersey Avenue, N.W., Washington, D.C. 

Reasonable accommodations for people with disabilities are available upon request. Requests should be submitted via email to or by calling Samantha Konstandt at 202-326-3348. Requests should be made in advance. Please include a detailed description of the accommodation needed, and provide contact information.
The Federal Trade Commission works for consumers to prevent fraudulent, deceptive, and unfair business practices and to provide information to help spot, stop, and avoid them. To file a complaint in English or Spanish, visit the FTC's online Complaint Assistant or call
1-877-FTC-HELP (1-877-382-4357). The FTC enters complaints into Consumer Sentinel, a secure, online database available to more than 2,000 civil and criminal law enforcement agencies in the U.S. and abroad. The FTC’s website provides free information on a variety of consumer topics.  Like the FTC on Facebook, follow us on Twitter, and subscribe to press releases for the latest FTC news and resources.

Claudia Bourne Farrell
Office of Public Affairs

David Lincicum
Bureau of Consumer Protection


Saturday, October 13, 2012

10:13 :: No NATs; No Birds :: Quadrillion :: Groundless :: Many Questions Unanswered :: Trail of Illegality :: How Regs Can Go Awry :: De-Spinning ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project

"The weakest link in the security chain is the human element." "I obtained confidential information in the same way government employees did, and I did it all without even touching a computer . . . . I was so successful with this line of attack that I rarely had to go towards a technical attack." - Kevin Mitnick

Pet Adoption

Netflix will add closed captions to all of its videos within two years, Gigaom :: Keyword: [ADA]
Netflix has settled a court case brought against it by the National Association for the Deaf and other disability rights advocates, agreeing to a consent decree that will require it to have closed captions for all of its videos by October 2014.

Groups Express Concern at FCC Speedtest Data Collection - Argue There's No Checks and Balances for FCC Data Use, DSLReports :: Keyword: [Broadband]
Several groups have sent the FCC a letter (pdf) expressing concern at the amount of data collected by the agency's speed tests. The last few years the FCC realized that actually having some real-world data might help inform policy decisions (go figure!) -- so they introduced their own speed test, and launched a program using

FCC Tests Wired Broadband Performance Among Large ISPs, Part I, The Bandwidth Report :: Keyword: [Broadband]
Although the gap between advertised and actual broadband speeds is closing among US ISPs, there is still a 25-33 percentage point difference between the fastest and slowest providers at identical speed tiers,

FCC's U-NII Advisory and Enforcement Actions Underscore Potential Growing Pains of Spectrum Sharing by Unlicensed Devices, Telecom Law Monitor :: Keyword: [WIFI]
One of the central issues in any spectrum sharing environment is the ability to enforce compliance with the regulations governing operation of the devices in the band, particularly the operation of secondary devices sharing spectrum on a non-interference basis with primary services. This is equally the case when new categories of

Mani Potnuru, Limits of the Federal Wiretap Act’s Ability to Protect Against Wi-Fi Sniffing, Michigan Law Review :: Keyword: [Wifi Security]
Adoption of Wi-Fi wireless technology continues to see explosive growth. However, many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured

ITIF Challenges Conclusions in UN Report on State of Global Broadband, USTelecom :: Keyword: [Broadband Data]
A recent report on the global state of broadband which ranks the United States at 23rd place in the number of citizens using broadband and 18th in broadband subscription

De-Spinning the UN Broadband Report, ITIF :: Keyword: [Broadband Data]
What the public and policymakers do not need is another poorly constructed report claiming that the United States lags behind in broadband, which advocates are already holding up as yet more evidence of America's failed broadband policy.

ICANN’s core principles and the expansion of generic top-level domain names, Intl J of Law & Info Tech :: Keyword: [ICANN]
ICANN is a self-regulatory body that oversees the registration of domain names and coordinates Internet protocol addresses. As a multi-stakeholder body with significant influence over the root of the Internet,

Woman Slammed With QUADRILLION Dollar Phone Bill, Huffpo :: Keyword: [Industry]
There are large phone bills and then there are insane phone bills. Solenne San Jose, a woman from Pessac, in the Bordeaux region of France, received an utterly insane one.

Huawei to US: "Butt out of our business", Forbes :: Keyword: [China]
Among all the condemnations in yesterday's report on Huawei Technologies from US Congress intelligence committee investigators, one of them stands out above all others: the company’s maddening failure to adopt a Western-friendly culture of transparency while seeking business with Western countries, including a number of national governments.

China Calls Huawei Report 'Groundless', WSJ :: Keyword: [China]
Beijing said a U.S. congressional report urging U.S. business to spurn Chinese telecoms Huawei Technologies and ZTE could hurt relations between the countries.

WCIT Civil Society Briefing Leaves Many Questions Unanswered, CDT :: Keyword: [ITU]
Earlier this week, the ITU Secretariat hosted a briefing for civil society organizations interested in the ITU's upcoming World Conference on International Telecommunications. Although the Secretariat's official aim was to "provide an overview of the conference, the preparatory process, and some of the main principles and issues being discussed," concrete answers to these questions were few and far between. 

US says will oppose major revisions of global telecom rules, :: Keyword: [ITU]
Pedestrians walk past a computer and its reflection showing the login page for Facebook in traditional Chinese characters in Hong Kong on May 14, 2012. The United

Kim Dotcom’s lawyer: “There has been a trail of illegality”, Gigaom :: Keyword: [Copyright]
Police violated numerous laws in New Zealand when pursuing their case against Kim Dotcom and MegaUpload, Dotcom’s lawyer Ira P. Rothken said during a panel at the SF Musictech Summit in San Francisco Tuesday, which is why he is hoping that the case will soon be dismissed in its entirety. There has been a trail of illegality

ICE Reluctantly Releases A Small Number Of Heavily Redacted Domain Seizure Docs, Holds The Rest Hostage, Techdirt :: Keyword: [IP DNS]
Back in December of 2010, Aaron Swartz filed a Freedom of Information Act request regarding the Immigrations and Customs Enforcement (ICE) efforts to seize, without any notification or adversarial hearings, domain names which ICE claimed were facilitating copyright and/or trademark infringement. After nearly two years of

Ripoff Report and Topix Postings Protected by California's Anti-SLAPP Law--Chaker v. Mateo, Tech & Marketing Law Blog :: Keyword: [News]
Chaker v. Mateo, 2012 WL 4711885 (Cal. App. Ct. Oct. 4, 2012) Chaker and Nicole Mateo had...

The Proposed "Cloud Computing Act of 2012," and How Internet Regulation Can Go Awry (Forbes Cross-Post), Tech & Marketing Law Blog :: Keyword: [Cloud]
Sen. Amy Klobuchar has introduced a new bill, the "Cloud Computing Act of 2012" (S.3569), that purports...

Chris Jay Hoofnagle , Jennifer M. Urban and Su Li , Privacy and Modern Advertising: Most US Internet Users Want 'Do Not Track' to Stop Collection of Data about their Online Activities, SSRN :: Keyword: [Privacy]
Most Americans have not heard of 'Do Not Track,' a proposal to allow Internet users to exercise more control over online advertising. However, when probed, most prefer that Do Not Track block advertisers from collecting data about their online 

Rockefeller Urges Senate Action on Cybersecurity, Senate Commerce Committee :: Keyword: [Security]
Chairman John D. (Jay) Rockefeller IV today issued the following statement after Secretary of Defense Leon Panetta warned of the threats facing the nation's critical infrastructure in a speech Thursday night.

New Senate Report: Counterterrorism "Fusion Centers" Invade Innocent Americans’ Privacy and Don’t Stop Terrorism, EFF :: Keyword: [Big Brother]
The Department of Homeland Security’s 70 counterterrrorism "fusion centers" produce "predominantly useless information," "a bunch of crap," while "running afoul of departmental guidelines meant to guard against civil liberties" and are "possibly in violation of the Privacy Act."

U.S. Supreme Court won't hear NSA, AT&T wiretapping case, CW :: Keyword: [Big Brother]
The U.S. Supreme Court has refused to overturn legal immunity for telecom carriers that allegedly participated with a U.S. National Security Agency surveillance program during the last decade.

No Computer Fraud and Abuse Act violation for taking over former employee’s LinkedIn account, Internet Cases :: Keyword: [CFAA]
After plaintiff was fired as an executive, her former employer (using the password known by another employee) took over plaintiff’s LinkedIn account. It kept all of plaintiff’s contacts and recommendations but switched out plaintiff’s name and photo with those of the new CEO.

Obama Beats Romney in Internet Savvy & Social Media, Forbes :: Keyword: [Vote]
According to a Google survey, President Obama beat out Republican contender Mitt Romney in a poll over which of the two is more adept at social media and online persuasion. According to the report by IT News Online, 64% of a polled group of 2,500 internet users throughout the United States felt the president was better in that category.

Obama Actually Won The First Presidential Debate According To Online Gamers, Forbes :: Keyword: [Vote]
While what seemed like a majority of political pundits, members of the media and average Americans felt that Mitt Romney won the first presidential debate; Barack Obama scored a victory with online gamers. Nexon America has been conducting polls with players of its popular online game, Maplestory. Overall, 11,867 votes were

Friday, October 12, 2012

[Event] Copyright Exceptions for Libraries in the Digital Age: Section 108 Reform - Nov. 2

"On November 2, 2012, the Kernochan Center for Law, Media and the Arts at Columbia Law School, in cooperation with the U.S. Copyright Office, will present a public symposium on reform of Section 108 of the Copyright Act. A variety of speakers will discuss legal issues relating to the preservation and digitization activities of libraries in the digital age, as well as appropriate standards for securing and making available copyrighted works. Maria Pallante, Register of Copyrights; Jane Ginsburg, Columbia Professor of Law; Shira Perlmutter, Chief Policy Officer at the U.S. Patent and Trademark Office; and Dick Rudick, Co-Chair of the independent Section 108 Study Group, will join representatives from the library and publishing sectors for the daylong program at Columbia Law School. The symposium is part of the Copyright Office's ongoing efforts to review and update copyright exceptions for libraries and archives and to work in partnership with academic institutions. Please visit the Kernochan Center website to register: "

US Copyright Office: NewsNet Issue 468 - October 4, 2012

ISOC-DC Event - Fragmenting the Internet: The WCIT & What’s At Stake

From: The Washington DC Chapter of the Internet Society <>
Subject: ISOC-DC Event - Fragmenting the Internet: The WCIT & What's At Stake

Date: Friday, October 12, 2012, 5:29 AM

Is this email not displaying correctly?
View it in your browser.

You are invited to attend:

Fragmenting the Internet: The WCIT & What's At Stake

Wednesday, October 31, 2012 from 8:30 AM - 10:00 AM

Eventbrite registration required:

In December the ITU (International Telecommunications Union) and 193 member states will convene theWorld Conference on International Telecommunications (WCIT) in Dubai with the agenda of updating the International Telecommunications Regulations (ITRs), the treaty that deals international telecommunications to which all member states are signatory.

There is grave concern in many circles about proposals to expand the scope of the ITRs in ways that would affect the include the Internet. This could disrupt Internet operations and fragment the Internet,increasing costs, decreasing consumer choice, and hindering innovation.

Please join the Washington DC Chapter of the Internet Society (ISOC-DC) to examine what's at stake at the WCIT with a distinguished panel of thought leaders on the subjects of:

  • What is motivating certain Member States to include aspects of the Internet in the ITRs?
  • Some in the technical community have said that certain proposals could lead to fragmentation of the global Internet.   What does this mean and how could that happen at WCIT?  What would be the impact on the global Internet infrastructure?
  • For countries with concerns about security or fraud or connectivity costs, what are the alternatives to solving these challenges besides the WCIT?
  • What should be the role of groups like the Internet Society in this discussion?


The Honorable Terry Kramer – U.S. Ambassador, Head of Delegation, World Conference on International Telecommunications at U.S. Department of State

Gigi Sohn – President & CEO, Public Knowledge

Danny McPherson – Chief Security Officer, Verisign


Sally Wentworth – Senior Manager of Public Policy, The Internet Society

Breakfast served
Free parking (passes to follow)

Atrium of the Battelle-Tompkins Building on the main campus of American University
4400 Massachusetts Ave NW
Washington, DC 20016

Events powered by EventBrite
Copyright © 2012 The Greater Washington DC Chapter of the Internet Society, All rights reserved.
You are receiving this email because you have signed up for the ISOC-DC email list, or you are a member of the DC Chapter.
Our mailing address is:
The Greater Washington DC Chapter of the Internet Society
1775 Wiehle Avenue
reston, VA 20190-5108

Add us to your address book
Email Marketing Powered by MailChimp