Sunday, October 28, 2012

10.28 :: "Dont Panic" :: icePhone :: Smear :: Not the Titanic :: Unintended Consequenses :: Harass Me Maybe ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project

Incomprehensible jargon is the hallmark of a profession. – Kingman Brewster, Jr.

Pet Adoption

OECD Study: Internet Thriving without Regulation, USTelecom :: Keyword: [Backbone]
The Internet is thriving in a competitive and largely decentralized environment, according to a new study released by the Organization for Economic Co-operation and D

Store refuses to serve customers talking on cell phones, CNET :: Keyword: [Wireless]
A British store is so fed up with people coming up to the counter and gassing on their cell phones that it has put up signs to say the next person in line will be served instead.

US government agency drops BlackBerry in favor of iPhone, CW :: Keyword: [Wireless]
Over 17,600 users in U.S. Immigration & Customs Enforcement (ICE) are being moved from their BlackBerry devices to Apple's iPhone, after it was found that technology from Research In Motion cannot meet the mobile technology needs of the agency, according to contract documents

Average teenager has never met quarter of Facebook friends, Guardian :: Keyword: [Child]
Girls send more than 220 texts a week, and 12- to 15-year-olds spend 17 hours a week on internet, research shows

FCC Commissioner McDowell Wrong on Net Neutrality and Investment, Free Press :: Keyword: [Neutral]
Washington, D.C., is often referred to as a “bubble,” and for good reason. On any given day there will be some kind of panel at an industry-funded “think tank” that includes regulators or other government officials speaking about the ills of government — and the virtues of unrestrained monopoly. This week we got two of these bubble

Digital Differences, Pew :: Keyword: [Data]
Pew Internet Research Analyst Kathryn Zickuhr discussed differences in how different demographic groups use technology at the WSU Elliott School of Communications’ annual Comm Week conference.

Verisign Reports 13 Percent Year-Over-Year Revenue Growth in Third Quarter 2012, Verisign :: Keyword: [DNS ]
VeriSign, Inc. (NASDAQ: VRSN), the trusted provider of Internet infrastructure services for the networked world, today reported financial results for the third quarter ended Sept. 30, 2012.

ICANN's core principles and the expansion of generic top-level domain names, Intl J of Law & Info Tech :: Keyword: [ICANN]
ICANN is a self-regulatory body that oversees the registration of domain names and coordinates Internet protocol addresses. As a multi-stakeholder body with significant influence over the root of the Internet, ICANN’s role is crucial in order to maintain its stability and interoperability. From January 2012, a call for Expressions of Interest

Is ICANN Stumbling Forward? GAC Advice and Shared Decision Making Procedures, CircleID :: Keyword: [ICANN]
When Bill Clinton addresses the 40th ICANN meeting in San Francisco in March 2010 he described Internet Governance as a process of "stumbling forward". Stumbling is good, he said, as long as it goes forward. Five ICANN meetings later — in the meantime ICANN adopted the new gTLD program, got nearly 2000 applications for Top

Is ICANN Stumbling Forward? GAC Advice and Shared Decision Making Procedures , CircleID :: Keyword: [ICANN]
When Bill Clinton addresses the 40th ICANN meeting in San Francisco in March 2010 he described Internet Governance as a process of "stumbling forward". Stumbling is good, he said, as long as it goes forward. Five ICANN meetings later — in the meantime ICANN adopted the new gTLD program, got nearly 2000 applications for Top

Akamai Reports 460 Times Increase in IPv6 Requests Over Its Platform Since Last Year, CircleID :: Keyword: [IPv6]
In its latest State of the Internet report, Akamai has highlighted industry numbers showing imminent global exhaustion of IPv4 addresses. Report has also identifies 460 times increase in IPv6 requests over Akamai's platform from June 2011 – June 2012. A fair amount of the IPv6 request growth is attributed to the "World IPv6 Launch"

Counting IPv6 over DNS, Potaroo :: Keyword: [IPv6]
At the recent ARIN XXX meeting in October 2012 I listened to a debate on a policy proposal concerning the reservation of a pool of IPv4 addresses to address critical infrastructure. This term is intended to cover a variety of applications, including use by public Internet Exchanges and authoritative nameservers for various top level domains. As far as I can tell,

Re-Counting DNSSEC, Potaroo :: Keyword: [DNSSEC]
This is a followup article to Counting DNSSEC that reflects some further examination of the collected data. This time I'd like to describe some additional thoughts about the experiment, and some revised results in our efforts to count just how much DNSSEC is being used out there.

Blase Ur, Pedro G. Leon, Lorrie Faith Cranor, Richard Shay and Yang Wang, Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising, FPF :: Keyword: [Advertising]
We report results of 48 semi-structured interviews about online behavioral advertising (OBA). We investigate non-technical users’ attitudes about OBA, then explain these attitudes by delving into users’ understanding of its practice. Participants were surprised

Best Buy Tells Time Warner Customers to Ditch VoIP - In Order to Avoid New Modem Fee, DSLReports :: Keyword: [TW]
Time Warner Cable took heavy criticism earlier this month when they announced users would have to pay a new $4 monthly modem rental fee. Time Warner Cable struggled to adequately support users looking to buy their own modems, and then stumbled when asked to justify the price hike on the company's already pricey service. As noted previously

Apple warns of pre-Christmas profit fall, FT :: Keyword: [Apple]
Apple reported earnings broadly in line with recently lowered expectations as it shrugged off fears of supply shortages for its smartphone

Akamai Reports Third Quarter 2012 Financial Results, Akamai :: Keyword: [Backbone]
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere, today reported financial results for the third quarter ended September 30, 2012. Revenue for the third

Google's email security flaw is embarrassing, but no catastrophe, CW :: Keyword: [Google]
It was almost a year ago that a curious mathematician with no real Internet security training was able to walk through a gaping security hole left by Google -- a weak email cryptographic key.

Knowledge Management for eDiplomacy Resources, Brookings :: Keyword: [International]
The third area at State attracting serious ediplomacy resources is knowledge management. This was the first use ediplomacy at State. It is also emerging as one of the most far-reaching applications of ediplomacy, and has garnered the attention of big business as well as other foreign ministries. It is attempting to solve some of the toughest organizational challenges foreign ministries face including:

The History of eDiplomacy at the U.S. Department of State, Brookings :: Keyword: [International]
Despite the United States’ long history of innovation in the field of communications technologies, the State Department’s emergence as the world’s leading user of ediplomacy was not a natural consequence of this. A 2001 book by Wilson Dizard Jr., Digital Diplomacy: U.S. Foreign Policy in the Information Age, tracks a long history of reluctant adaptation to technological innovations at State. In a discussion about the UK and other countries’ adoption of the telegraph, he notes:

China Blocks Web Access to Times, NYT :: Keyword: [China]
The Chinese government began blocking access to The Times after publication of an article describing the wealth accumulated by relatives of Prime Minister Wen Jiabao.

China condemns NY Times 'smear', BBC :: Keyword: [China]
China condemns as a "smear" a New York Times report saying Premier Wen Jiabao's relatives have accumulated billions of dollars.

Proposal for ICT and internet ecosystem: setting new rules on trade order, ITU :: Keyword: [ITU]
Internet usage patterns have evolved from web/text based usage to a high concentration on video. This has led to a sudden spike in traffic and the number of heavy users

WCIT and the tower of Babel, ITU :: Keyword: [ITU]
A key reason for the heated debate in relation to the International Telecommunications Regulations (ITRs) at the next World Conference on International Telecommunications (WCIT) is the problem that different parties are talking about different elements while using the same words.

The Great ITU Internet Heist, CircleID :: Keyword: [ITU]
There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years.

UN: Terrorists Just Love An Open Useful Internet - Thinks ISPs Should Crack Down to Stop Terrorists, DSLReports :: Keyword: [ITU]
CNET directs our attention to a new study (pdf) that effectively complains that the Internet has become too open and useful, and that ISPs need to crack down on anonymity, increase data retention, and even crack down on open Wi-Fi hotspots -- or the terrorists win. The report, recently released at a conference in Vienna by the

UN: The Problem With The Internet Today Is It's Just Too Open & Terrorists Might Use It, Techdirt :: Keyword: [ITU]
Ah, the UN. As highlighted by Declan McCullagh, a new report from the United Nations Counter-Terrorism Implementation Task Force, clocking in at an unwieldy 158 pages (pdf) warns that this old internet of ours is just too damn open, and that means terrorists can use it. Thus, it has to stop the openness. The report really is just

The ITU: How we got here, how PK is involved, and what’s at stake, PK :: Keyword: [ITU]
This December, the 193 countries of the International Telecommunications Union (ITU) will gather in Dubai to revise the International Telecommunication Regulations (ITRs). Before diving into specific issues and proposals, let’s lay out how we got here, how PK is involved, and what’s at stake.

The Internet is not the Titanic, ISOC :: Keyword: [Itu]
In recent months, the question of whether the Internet is sustainable in the face of increasing demand has been a focal point for discussions surrounding the upcoming World Conference on International Telecommunications (WCIT), which is being convened to modify the International Telecommunications Regulations (ITR) treaty

U.N. calls for 'anti-terror' Internet surveillance, CNET :: Keyword: [ITU]
United Nations report calls for Internet surveillance, saying lack of "internationally agreed framework for retention of data" is a problem, as are open Wi-Fi networks in airports, cafes, and libraries.

U.S. Ambassador Terry Kramer Says Leave Well Enough Alone for Regulating Internet, TechZone :: Keyword: [ITU]
While the topics here are about technology today, how technology will be used tomorrow has moved to center stage. The reason is the run up to the International Telecommunication Union’s (ITU’s) convention in December in Dubai

The ETNO Proposal: Unintended Consequences, CircleID :: Keyword: [ITU]
In the run up to the WCIT negotiations in December, the most talked about proposed change to the ITRs (International Telecommunications Regulations) is the ETNO proposal. Most of the discussion centers around the clause;

Japan Was the First to Ratify ACTA. Will They Join TPP Next?, EFF :: Keyword: [Copyright]
Two of the biggest threats to the Internet are two international agreements: the Trans-Pacific Partnership agreement (TPP) and the Anti-Counterfeiting Trade Agreement (ACTA). TPP continues to expand across the Pacific, with Mexico and Canada joining in the next round in New Zealand. With ACTA, it is increasingly doubtful that it was successfully

Internet Providers Begin Rolling Out Warning System To Stop Illegal Downloads, CNN :: Keyword: [Copyright]
It is about to get a bit more difficult to illegally download TV shows, movies or music online.

NTIA 2012 DMCA Letter, NTIA :: Keyword: [DMCA]
NTIA letter to the Register of Copyrights continuing the consultative process required by the Digital Millenium Copyright Act (DMCA). The Copyright Office's Federal Register Notice containing the Librarian's Determination and Final Rule can be found at .

Final Rule Published in Section 1201 Proceeding , LOC :: Keyword: [DMCA]
The Librarian of Congress, upon the recommendation of the Register of Copyrights, has announced the classes of works to be subject to the exemption from the prohibition in 17 U.S.C. section 1201(a)(1) against circumvention of technological measures that control access to copyrighted works. 

United States Copyright Office: Ripping is Illegal, PK :: Keyword: [DMCA]
Today the Register of Copyrights and the Librarian of Congress announced the 1201 exemptions. You may remember that the 1201 review is the triannual process where organizations, communities, and individuals request permission to circumvent Digital Rights Management (DRM) technologies that prevent them from doing otherwise perfectly legal things. This time around, Public Knowledge requested an exemption that would allow people to rip DVDs they already own in order to transfer

Netflix misses subscriber target for third quarter, CNET :: Keyword: [Video]
he video-rental service adds 1.2 million new U.S. subscribers in its third quarter, shy of the nearly 1.8 million it needed to hit its full-year target of 7 million

Privacy and Technology in Balance?, MS :: Keyword: [Privacy]
This week, I had the opportunity to speak in Uruguay at the 34th International Conference of Data Protection and Privacy Commissioners. This conference brings together leading authorities on privacy from more than 50 countries, including many of the key government officials and regulators

Use fake birthdate, official says, BBC :: Keyword: [Privacy]
A government internet security chief sparks anger by advising people not to put accurate personal details on social networking sites to protect their security.

Deirdre Mulligan and Jennifer King, Bridging the Gap Between Privacy and Design, FPF :: Keyword: [Privacy]
This article explores the gap between privacy and design in the context of “lateral privacy”— privacy issues arising among users of a service rather than from the service provider—on social networking sites (SNSs) and other platforms by analyzing the privacy concerns lodged against the

Hey, I’ve Never Met You. And This Is Crazy. But Here’s My Number. Harass Me Maybe., VOA :: Keyword: [Social Networks]
Facebook has never had a stellar reputation when it comes to privacy. Here is the latest annoyance.

Wi-Fi Electricity Meters Helping Burglars? - Easily Hacked, Showing Whether You're Home, DSLReports :: Keyword: [Security]
Add increased home thefts as another potential side-effect of utilities' efforts to deploy electricity meters with embedded Wi-Fi. We've already noted how these meters have a strong tendency to interfere with home routers and WISP equipment, but now concerns are being raised that they're too easy to hack, allowing people to easily

Leveraging the Science and Technology of Internet Mapping for Homeland Security slideset, CAIDA :: Keyword: [Security]
This slideset was presented at the Cyber Security Division 2012 Principal Investigator Meeting in October 2012.

Suspect Named In Devastating Cyberattack On World's Most Valuable Oil Company, NYT :: Keyword: [Security]
On Aug. 15, more than 55,000 Saudi Aramco employees stayed home from work to prepare for one of Islam's holiest nights of the year -- Lailat al Qadr, or the Night of Power -- celebrating the revelation of the Koran to Muhammad.

Peter Swire and Kenesa Ahmad, ‘Going Dark’ Versus a ‘Golden Age for Surveillance’, FPF :: Keyword: [Big Brother]
Law enforcement and national security agencies are worried that they are “going dark” due to new technology. Their fear is that they will not be able to wiretap and decode new forms of Internet and

Cyberattack on Saudi Oil Firm Disquiets U.S., NYT :: Keyword: [Cyberwar]
American officials believe a virus unleashed on an oil giant was a return volley in a conflict begun by the United States and Israel with software that targeted Iran’s centrifuges.

A Decade of DDoS, Arbor Networks :: Keyword: [DOS]
In a little over a decade, DDoS attacks have broken the 100 Gbps barrier, up 1000%. Watch this video to see the evolution of DDoS attacks — from nuisance to menace

Interne2's NSTIC Pilot Plan, SecureID :: Keyword: [NSTIC]
nternet2 has been in the online identity business for more than a decade so its involvement with the National Strategy for Trusted Identities in Cyberspace may seem like a given.

FCC May Consider Whether Unsolicited Email To Text On Mobile Phones Is Legal, Techpresident :: Keyword: [Can Spam Act]
The Federal Communications Commission opened a proceeding on Tuesday to determine whether e-mails sent to phones as texts should be subject to its rules that protect consumers from unsolicited messages on their mobile phones.

South Carolina reveals massive data breach of Social Security Numbers, credit cards, CW :: Keyword: [SC]
Approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers belonging to South Carolina taxpayers were exposed after a server at the state's Department of Revenue was breached by an international hacker, state officials said Friday.

Cyber Security Fails As 3.6 Million Social Security Numbers Breached In South Carolina, Forbes :: Keyword: [SC]
South Carolina has announced that an "international hacker" has compromised the Social Security numbers of more than three-quarters of the State's population. Is South Carolina's cyber security particularly lax, or do we have a national problem?

Uncertified voting equipment, Freedom to tinker :: Keyword: [Vote]
Or, why doing the obvious thing to improve voter throughput in Harris County early voting would exacerbate a serious security vulnerability.

Post a Comment