Tuesday, November 27, 2012

11.27 :: So Whose Gonna be in Dubai Next Week? :: Lawsuits Are Stupid :: Flawed :: Mantra :: Who Pays? :: Take Over the Internet :: Panic, Chaos :: Dark Warnings ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project

"It is foolish to see any other person as the cause of our own misery or happiness". Buddha 

My Third Post on IP Interconnection – Innovation in Networks, Verizon :: Keyword: [Internet Interconnection] Innovation happens throughout the Internet ecosystem, from the physical networks and broadband connections, to computers and devices, to software. While innovation in some aspects of the Internet is readily visible – such as new web applications or content sites (think Facebook or Netflix) – innovation in how the physical

Broadband in America Report Updated, CITI :: Keyword: [Plan] Professor Robert Atkinson has released an update to his Broadband in America report which was used as the basis for the National Broadband Plan

ICANN Security Team Members Appointed to Lead Roles in Global Community Initiatives, ICANN :: Keyword: [ICANN] Two senior members of ICANN’s Security Team have been appointed to lead roles on global cybersecurity and DNS security initiatives. John Crain has been appointed by the root server operators to a seat on Board of Directors for the Domain Name System Operations Analysis and Research Center (DNS-OARC), and Dave Piscitello has been nominated by the Commonwealth Cybercrime

Huge Traffic Volumes on Black Friday, Akamai :: Keyword: [Ecom] It was a strong Black Friday online by all accounts. IBM is reporting that sales on the day grew nearly 20% over last year. Black Friday also drove huge volumes of traffic, averaging over 6.3 million page views from 10AM Eastern through to the end of the night. As expected, peak traffic levels hit at approximately 11am ET, but there

Cyber Monday 9PM Purchasing Peak 104% Above Black Friday, Akamai :: Keyword: [Ecommerce] Morning show broadcasts reported on the hottest Cyber Monday deals at the 9AM EST hour along with many online publications doing the same yesterday morning. But most online consumers didn't need any encouragement to get shopping - most continued with their clicking exercises right through the morning commute. Early browsing behaviors mirrored those of

Cyber Monday Breaks New Traffic Records, Akamai :: Keyword: [ECOM] Before we call it a night after a long but exciting day watching the Retail Net Usage Index, I owe you the final details. Cyber Monday traffic first began to climb early this morning, at 6:00 AM ET, and steadily grew to an early record peak at 11:00 AM. Traffic held steady at these levels until about 2:00 PM - a much stronger midday than in

Yet Another Ruling That Competitive Keyword Ad Lawsuits Are Stupid--Louisiana Pacific v. James Hardie, Forbes :: Keyword: [Advertising] It's been surreal watching plaintiff-side trademark lawyers lament that the Rosetta Stone v. Google settlement means we won't get clearer precedent on keyword advertising's legitimacy under trademark law. See, e.g., this paywalled BNA article, Attorneys Lament Lost Chance for Clarity On Lawfulness of Marks' Sale as Keywords. Those lawyers and I are living in parallel universes. The

EU Parliament Resolution on WCIT flawed, ITU :: Keyword: [ITU] As a citizen of Italy and as a person who is familiar with the upcoming World Conference on International Telecommunications (WCIT-12) and the proposals presented to that body, I must express my deep disappointment at parts of the Resolution on this topic that was adopted by the European Parliament.

The Google campaign – An ITU view, ITU :: Keyword: [ITU] ITU notes the recent comments made by Google in relation to the upcoming World Conference on International Telecommunications (WCIT-12) in Dubai.

US Internet Stakeholders United on ITU Treaty Negotiations, US Telecom :: Keyword: [ITU] With member countries of the International Telecommunications Union (ITU) set to renegotiate a 24-year-old treaty on international telecommunication regulations at the

As the WCIT Nears, US Resists Global Internet Regulation, Broadband for America :: Keyword: [ITU] Don’t fix what isn’t broken: an important mantra delegates would do well to remember as they gather in Dubai in December for the World Conference on International Telecommunications (WCIT).

UN Internet Meeting About Who Pays, Not Who Rules, Geist :: Keyword: [ITU] Should the Internet be treated like traditional phone services when it comes to regulation and pricing? That is the contentious question as the International Telecommunications Union, a United Nations agency with roots dating back to 1865 and the interconnection of telegraph services, meets in Dubai next week for the World Conference on International Telecommunications (WCIT). The WCIT is a

'Don't Let The UN Take Over The Internet', Huffpo :: Keyword: [ITU] The United Nations should not be allowed to 'take over the Internet', European MPs have urged.

UN Agency's Leaked Playbook: Panic, Chaos over Anti-Internet Treaty, Forbes :: Keyword: [ITU] The International Telecommunications Union, the UN agency at the center of a firestorm over new efforts to regulate the Internet, is preparing a social media campaign to target what it expects will be fierce opposition to a revised telephone treaty being decided next month at a secret conference in Dubai.

Dark Warnings About Future of Internet Access, NYT :: Keyword: [ITU] With envoys from more than 100 nations convening in Dubai to discuss telecommunications, diverse groups are warning of plans to censor the Internet. But analysts say the real debate is about business.

Should UN regulate the Internet? Summit courts controversy, Globe :: Keyword: [ITU] International Telecommunications Union poised to assert authority over Internet; debate pits revenue-seeking nations and authoritarian regimes against open Internet champions

Feds scoop up 132 websites in annual Cyber Monday ritual, Gigaom :: Keyword: [Copyright] The Department of Homeland Security celebrated a holiday tradition of its own today by announcing the seizure of dozens of domain names that were allegedly used to sell fake consumer swag like jerseys and jewelry.

ICE Clearly Didn't Need SOPA to Cripple Websites - As Agency Proudly Announces 132 Downed Websites, dslreports :: Keyword: [copyright] Apparently the government didn't need SOPA to shut down foreign websites afterall. One of the largest justifications for the immensely-unpopular SOPA was that U.S. Immigration and Customs Enforcement (ICE) simply didn't have the power to shut down foreign websites that violate copyright. However, Techdirt notes, a new announcement by ICE clearly states that they seized and

Nominations Hearing, Senate Commerce Committee :: Keyword: [FCC] The U.S. Senate Committee on Commerce, Science, and Transportation announced a hearing on the nominations of Dr. Mark Doms, to be Under Secretary of Commerce for Economic Affairs, Department of Commerce; Ms. Polly Ellen Trottenberg, to be Under Secretary of Transportation for Policy, Department of Transportation; Ms. Mignon L. Clyburn, to be a

Student Suspended for Refusing to Wear a School-Issued RFID Tracker, Wired :: Keyword: [Privacy] A Texas high school student is being suspended for refusing to wear a radio-frequency identification chip implanted on student ID cards. Northside Independent School District in San Antonio began issuing the RFID-chip-laden student-body cards when the semester began in the fall. The ID badge has a barcode associated with a

EPIC Appeals NSA's Withholding of Cybersecurity Directive, EPIC :: Keyword: [Security] EPIC has appealed a decision by the National Security Agency to deny EPIC's Freedom of Information Act Request for the public release of Presidential Policy Directive 20. The Policy Directive expands the NSA's cybersecurity authority and has raised concerns about government surveillance of the Internet. EPIC's FOIA appeal points to numerous substantive and procedural defects in the

Pace of US Cyber-Preparedness Accelerating, Forbes :: Keyword: [Security] Three recent moves by the Pentagon, State Department and White House indicate that the pace of preparation for engaging in offensive cyber attacks is increasing. The first was the speech given by Leon Panetta, Secretary of Defense on October 12 where he used the term cyber Pearl Harbor. Of course to anyone who follows these developments the term is not at all new as Jason Healey of the

When can police search a cell phone?, MTTLR :: Keyword: [Big Brother] How does the Fourth Amendment apply to the contents of technological devices, particularly in the context of inventory searches pursuant to a lawful arrest? In March 2012, headlines such as "Police can now search cell phones without warrant" warned Americans of the possibility of police committing severe violations of privacy by

How likely is a DDoS Armageddon attack?, Arbor Networks :: Keyword: [DOS] The recent DDoS attacks against many of the North American financial firms had some unique characteristics that put a strain on the defenses in place and resulted in a number of well publicized service outages. The escalating threat is not new. It’s been steadily building up over the last few years as botnet command and control has

Leahy Reaffirms Strong Support of Warrants for Content, CDT :: Keyword: [ECPA] Senator Leahy, chairman of the Senate Judiciary Committee, has released a manager’s amendment that reaffirms the underlying premise of the legislation that the Judiciary Committee will mark up on Thursday: Law enforcement officials need a warrant in order to access the contents of electronic communications. (A section-by-section summary of the manager’s amendment is here.) If the

Leahy pledges no warrantless e-mail access for feds, CNET :: Keyword: [ECPA] Privacy groups cautiously applaud, but are concerned about a requirement that would force Internet companies to notify police before letting customers know they're under surveillance

NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain, NIST :: Keyword: [NIST] The National Institute of Standards and Technology (NIST) has published the final version of Notional Supply Chain Risk Management Practices for Federal Information Systems. This guide offers an array of supply chain assurance methods to ...

Protect Your Data From Fire And Floods, Forbes :: Keyword: [Reliability] Taking time out from furiously stuffing turkey into my mouth to answer a quick question from the mailbox.

69% of Mobile Phone Users Get Text Spam, Pew :: Keyword: [Can Spam Act] You hear the text message alert ping, scramble to find your phone, only to find that the message is from an unknown number and the message is asking you to click on a link or text back.

No comments: