Wednesday, December 26, 2012

12.26 :: The Xmas without Netflix :: Incognito :: Watching Those Who Watch :: Under Seige ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project


The nice thing about standards is that there are so many to choose from. - Andrew S. Tannenbaum



John Chuang (UC Berkeley), Loci of Competition, Market Power, and the Evolving Internet Industry Structure, WIE 2012 :: Keyword: [Backbone]

The 3rd Workshop on Internet Economics (WIE 2012): Definitions and Data , WIE 2012 :: Keyword: [Backbone] Presentations

Will the internet end up controlled by big business and politicians?, Guardian :: Keyword: [Neutral] Its birth heralded a new age of intellectual freedom. Now the internet is under seige

Congress Poised To Pass Bill That Would Increase Funds To Fight Hackers, Huffpo :: Keyword: [Hacker] In a bill barreling towards passing both houses of Congress before the Christmas break, lawmakers are earmarking millions to make life more difficult for hackers in American cyberspace. The new National Defense Authorization Act is said to provide millions for maintaining the Department of Defense's Cyber Command, and for research and development programs to help keep hackers at bay.

PEER 1 Bought by Cogeco in $635 Million Deal, Data Center Knowledge :: Keyword: [Industry] PEER 1 Hosting has been acquired by Cogeco Cable in a $635 million deal that will combine two Canadian service providers. The transaction is the latest example of a telecommunications company acquiring a data center service provider in hopes to boosting its revenue from cloud computing and other..

Verizon Denies Hacker Leaked 300,000 Customers' Data - UPDATE, Forbes :: Keyword: [Verizon] Earlier today, ZDNet reported that a hacker had leaked 300,000 Verizon Wireless customers' data. The hacker, who goes by the name "TibitXimer", announced this leak via Twitter, then clarified that this data was actually Verizon FiOS fiber customers' information. ZDNet wrote that while the information was leaked today, "the hack was carried out earlier this

China set to surpass U.S. in R&D spending in 10 years, C&W :: Keyword: [China] China is on trackto overtake the U.S. in spending on research and development in about 10 years, as federal R&D spending either declines or remains flat.

Iran 'fends off new cyber attack', BBC :: Keyword: [Iran] A power plant in southern Iran is targeted by the Stuxnet computer worm but the cyber attack is rebuffed, an Iranian official says.

IGF-USA Post WCIT Roundtable (ISOC), YouTube :: Keyword: [ITU] IGF-USA Post-WCIT Roundtable Discussion at the Carnegie Endowment for International Peace in Washington DC on December 21 2012.

ISOC-DC WCIT Postmortem , Youtube :: Keyword: [ITU] On Wednesday, December 19, 2012 the Washington DC Chapter of the Internet Society (ISOC-DC) presented a WCIT Post Mortem at the American University, Washington DC, Ambassador Terry Kramer and a distinguished panel contemplated the recent World

Federal Cloud Credential Exchange (FCCX), Fed Biz Opps :: Keyword: [Cloud] The internet continues to transform how we do business and communicate with one another, and citizens are increasingly looking to the Federal Government to provide services online. This need is often addressed by agencies offering citizens access to applications by means of usernames

DRAFT NISTIR 7904, Trusted Geolocation in the Cloud: Proof of Concept Implementation, NIST :: Keyword: [Cloud] NIST requests comments on Draft IR 7904 by Thursday, January 31, 2013. Please send comments to ir7904-comments@nist.gov, with the subject "IR 7904 Comments"

Christmas Eve AWS outage stings Netflix but not Amazon Prime, Gigaom :: Keyword: [Cloud] If you’re not a Netflix subscriber, you may not yet know that issues at Amazon’s US-East data center facility took down Netflix’ streaming service on Christmas Eve — arguably the worst possible time. Starting at 1:50 p.m. PST, as GigaOM’s Janko Roettgers reported, Amazon’s US east facility reported issues with its Elastic Load Balancing service that carried

Who Could Be Watching You Watching Your Figure? Your Boss, NPR :: Keyword: [Privacy] Those of us trying to get in shape after overindulging this holiday season can get help from a slew of new devices that monitor steps climbed, calories burned and heart rate. But companies and venture capitalists in new startups hope to make money in a new way: by selling the data right back to the people tracking their activity — and to their employers.

Rise of the incognito internet, FT :: Keyword: [Privacy] Increasingly aware of how online activities are monitored, consumers are using technology to hide their tracks, writes Duncan Robinson

New rules for kids and Internet privacy (LA Times), Youtube :: Keyword: [COPPA] Technology has changed a lot in 15 years. It's been nearly that long since the Federal Trade Commission has updated rules protecting kids' online privacy.

Federal Trade Commission Updates Online Privacy Rules For Pre-Teens, ACM :: Keyword: [COPPA] On Wednesday the Federal Trade Commission (FTC) announced the final updated rules for implementing the Children’s Online Privacy Protection Act (COPPA). Passed in 1998, COPPA rules had not been updated to reflect changes in technology, most notably the rise of mobile internet access and mobile applications. The final rules will take e

Police Dept. to Use Internet to Try to Stop Shootings, NYT :: Keyword: [Big Brother] Intelligence officials with the New York police are examining ways to identify potential gunmen before they strike, in ways similar to those used to spot terrorists’ chatter online.

Data and Text on Cell Phone Not Protected by Stored Communications Act #ECPA, CT :: Keyword: [SCA] Are data and text stored on a personal cell phone protected by the Stored Communications Act?

Stabuniq malware found on servers at U.S. financial institutions, CW :: Keyword: [Worms] Security researchers from Symantec have identified an information-stealing Trojan program that was used to infect computer servers belonging to various U.S. financial institutions.

Stuxnet attacks Iran again, reports say, CNET :: Keyword: [Worm] The worm apparently was aimed at a power plant and other sites in southern Iran but was thwarted.

Over half of American homes don’t have or use their landline, Gigaom :: Keyword: [PSTN] It’s not really surprising but over half of Americans don’t have or use a land line, according to data published late last week by the Centers for Disease Control. The study tracks the demographics of land line telephone use and was designed to help the CDC adapt its data collection programs, which relied heavily on calling land lines. While the pitfalls of relying





Monday, December 24, 2012

Data and Text on Cell Phone Not Protected by Stored Communications Act #ECPA

Case: Garcia v. City of Laredo, Court of Appeals, 5th Circuit 2012

Issue:  Are data and text stored on a personal cell phone protected by the Stored Communications Act?

Rule:
18 USC § 2701 Access: (a) Offense.- Except as provided in subsection (c) of this section whoever-
(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or
(2) intentionally exceeds an authorization to access that facility;
and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.
Question:  Is a cell phone a "facility" as defined under the SCA?

Discussion:
The Eleventh Circuit's decision in United States v. Steiger provides useful guidance. 318 F.3d 1039, 1049 (11th Cir. 2003). In Steiger, when a hacker accessed an individual's computer and obtained information saved to his hard drive, the court held such conduct was beyond the reach of the SCA. Id. The court found that "the SCA clearly applies . . . to information stored with a phone company, Internet Service Provider (ISP), or electronic bulletin board system," but does not, however, "appear to apply to the source's hacking into Steiger's computer to download images and identifying information stored on his hard-drive." Id. It noted that "the SCA may apply to the extent the source accessed and retrieved any information stored with Steiger's Internet service provider." Id. (emphasis added).
A number of district courts that have considered this question have also concluded that "the relevant `facilities' that the SCA is designed to protect are not computers that enable the use of an electronic communication service, but instead are facilities that are operated by electronic communication service providers and used to store and maintain electronic storage." Freedom Banc Mortg. Servs., Inc. v. O'Harra, No. 2:11-cv-01073, 2012 WL 3862209, at *9 (S. D. Ohio Sept. 5, 2012) (emphasis added). Recently, the Northern District of California held that a class of iPhone plaintiffs had no claim under the SCA because their iPhones did not "constitute `facilit[ies] through which an electronic communication service is provided.'" In re iPhone Application Litig., 844 F. Supp. 2d 1040, 1057-58 (N.D. Cal. 2012).[5]
Thus these courts agree that a "home computer of an end user is not protected by the SCA." Kerr, supra, at 1215 (footnote omitted). As explained by Orin Kerr in his widely cited law review article, the words of the statute were carefully chosen: "[T]he statute envisions a provider (the ISP or other network service provider) and a user (the individual with an account with the provider), with the user's communications in the possession of the provider." Id. at 1215 n.47 (emphasis added) (citation omitted).
This reading of the statute is consistent with legislative history, as "Sen. Rep. No. 99-541 (1986)'s entire discussion of [the SCA] deals only with facilities operated by electronic communications services such as `electronic bulletin boards' and `computer mail facilit[ies],' and the risk that communications temporarily stored in these facilities could be accessed by hackers. It makes no mention of individual users' computers . . . ." In re DoubleClick Inc. Privacy Litig., 154 F. Supp. 2d 497, 512 (S.D.N.Y. 2001) (quoting S. REP. No. 99-541, at 36, reprinted in 1986 U.S.C.C.A.N. 3555, 3590).

Tuesday, December 18, 2012

12.18 :: Captive Audience :: Telegraph & Privacy :: The Ghost of Theodore Vail :: It Was Fun While it Lasted :: Internet Cold War :: Whimper ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project


"It's a great invention but who would want to use it anyway?"     President Rutherford B. Hayes after a demonstration of Bell's telephone



Full Video, The Evolving Internet: Patterns in Usage and Pricing, Cabletechtalk :: Keyword: [Cable] For those who missed last Friday’s NCTA Connects, here’s a full video of the event.

Parents, Teens, and Online Privacy, Pew Internet :: Keyword: [Child] Parents have a range of concerns about how their children’s online activities might affect their privacy and many have taken steps to monitor their children and encourage online safety

EM Laird, The Internet and the Fall of the Miller Obscenity Standard: Reexamining the Problem of Applying Local Community Standards in Light of a Recent Circuit Split, Santa Clara L Rev :: Keyword: [Obsenity] In 1942, the United States Supreme Court declared that obscene material is one of the few narrow and well-defined categories of speech outside the protection of the First Amendment of the United States Constitution.

CDA 230 Success Cases: WordPress.com, EFF :: Keyword: [47 U.S.C. § 230] This is the second part in a series of posts about the importance of Section 230 of the Communications Decency Act (CDA 230). CDA 230 limits the liability of a number of Internet services that host user-generated content.

An assessment of IP interconnection in the context of Net Neutrality, BEREC :: Keyword: [Neutral] An assessment of IP interconnection in the context of Net Neutrality

Susan Crawford on Captive Audience: The Telecom Industry & Monopoly Power (Berkman Center), Youtube :: Keyword: [Net Neutrality] In the Internet era, a very few companies control our information destiny. In this talk, and in her new book "Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age," Susan Crawford—a professor at the Benjamin N. Cardozo School of Law and a former special assistant to President Obama for

New top-level internet domains to launch in 2013, Guardian :: Keyword: [ICANN] Domain names such as .christmas and .search will rival .com and .co.uk when launched in the spring of 2013

Five-Day U.S. Online Spending Total for Most Recent Workweek Surpasses $5 Billion as Four Individual Days Surpass $1 Billion in Sales, Comscore :: Keyword: [Ecom] holiday season retail e-commerce spending for the first 44 days of the November–December 2012 holiday season. For the holiday season-to-date $33.8 billion has been spent online, marking a 13-percent increase versus the corresponding days last year. The most recent workweek saw four individual days eclipse $1 billion in spending, led by Green Monday with $1.275 billion.

The Benefits of a Regulated Monopoly (AT&T), Youtube :: Keyword: [ATT] Note that this film is presented for historical interest only, and does not reflect in any way current AT&T policy or positions.

Gloves come off in Google v Germany, FT :: Keyword: [Google] A parliamentary hearing over plans to allow print media to charge internet search engines for displaying links to newspaper articles raises tensions

Zayo to Acquire Litecast, Zayo :: Keyword: [Zayo] Zayo announces that it has executed a definitive agreement to purchase Litecast/Balticore, LLC (“Litecast”), a provider of metro Bandwidth Infrastructure services in Baltimore, Maryland, for a price of $22 million.

Zayo Completes Purchase of First Telecom Services, Zayo :: Keyword: [Zayo] Zayo Group, LLC announced today that it has completed its previously announced purchase of First Telecom Services, LLC (FTS), a provider of bandwidth infrastructure services throughout the Northeastern and Midwestern United States, for a price of $110 million. Zayo purchase.

STATEMENT FROM FCC CHAIRMAN JULIUS GENACHOWSKI ON U.S. ACTIONS AT THE WORLD CONFERENCE ON INTERNATIONAL TELECOMMUNICATIONS (WCIT), FCC :: Keyword: [ITU] “Our global policies must ensure a virtuous cycle of innovation and investment, driven by a free and open Internet. The Internet has thrived over the past two decades thanks to the free flow of data and information, and the multi-stakeholder model of Internet governance.

WCIT…In Conclusion, ICANN :: Keyword: [WCIT] Today marks the end of the lengthy WCIT conference in Dubai. I am sure you along with most of our community have been watching events carefully.

Post-WCIT civil society statement: A way forward, APC :: Keyword: [WCIT] At a recent civil society workshop in Rio de Janeiro, Brazil, co-organised by APC with Global Partners, NUPEF Institute and the Fundação Getulio Vargas, groups from the region looked beyond the World Conference on International Telecommunications in Dubai (WCIT) and outlined the following positive principles for constructive multi-stakeholder dialogue.

Authoritarians Win, Internet Loses in Dubai, ITIF :: Keyword: [WCIT] The WCIT summit in Dubai result in a lack of consensus telecom treaty for the first time in more than a century.

Who Signed The ITU WCIT Treaty... And Who Didn't, Techdirt :: Keyword: [WCIT] We already noted this morning that the US, a bunch of European countries, and a sprinkling of other nations around the globe have refused to sign the new ITR agreement put together at the ITU's World Conference on International Telecommunications (WCIT), even as ITU officials congratulate themselves on a job well done

WCIT-12 Disappoints, More Work to Be Done, Circleid :: Keyword: [WCIT] In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at the ITU World Conference on International Telecommunications (WCIT-12) was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign).

ITU Phobia: Why WCIT was derailed, IGP :: Keyword: [ITU] We now know more about what led to the impasse at the WCIT, and the scope of the fissure that it created. It is clear that nations will split 2 to 1 in favor of signing the ITR treaty. The majority of the signatories are the developing countries in Africa, Asia (including China), the Middle East, Latin America, and of course Russia. The refuseniks are primarily

U.S. refuses to back U.N. treaty, WAPO :: Keyword: [WCIT] The Obama administration said Thursday that the United States will not sign a U.N. treaty being considered at the International Telecommunications Union conference

WCIT conference ends with a whimper, CW :: Keyword: [WCIT] Free Internet campaigners are hailing as a victory the news that more than 80 countries have refused to sign new ITRs International Telecommunication Regulations at a global conference in Dubai.

The UN and your Business: Why ITU Dubai Loss is your Gain, Forbes :: Keyword: [WCIT] Do you want bureaucrats to be able to read every text, image, tune, text, spreadsheet, or whatever you send or receive? Do you want your business communications snooped on by unknown entities?

After WCIT: Some observers fear content proposals, WC :: Keyword: [WCIT] Expect no major changes to the functioning of the Internet after a controversial ending to the International Telecommunication Union's World Conference on International Telecommunications (WCIT), but an agreement hammered out there may encourage countries to censor Web content in the longer term, participants and observers said.

U.N. summit's meltdown ignites new Internet Cold War, CNET :: Keyword: [WCIT] New geopolitical rift isn't east-west or north-south: it roughly tracks commitment to free expression. The U.S., Canada, Europe, Japan, and their allies are now facing off against the likes of China, Russia, Libya, Nigeria, and dozens of other nations.

US to UN: Hands Off The Internet, VOA :: Keyword: [WCIT] Negotiations to create a consensus for new standards for Internet oversight and privacy collapsed in Dubai Friday when several nations, lead by the United States, refused to sign on to any agreement.

Instagram apologizes to users: We won't sell your photos, CNET :: Keyword: [Copyright] Facebook breaks its silence, pledging to "remove" language that sparked a revolt among Instagram users concerned their photos would be sold for advertising or marketing purposes.

Goodbye, Instagram, It Was Fun While It Lasted, Forbes :: Keyword: [Copyright] Well, Instagram, it was fun. Back when you first started up you offered Twitter a unique way to integrate images with tweets and we all loved you.

The Day Instagram Almost Lost Its Innocence, NPR :: Keyword: [Copyright] The wildly popular photo-sharing site Instagram nearly caused a user revolt when it revamped its terms of service and privacy policy to suggest it could allow uploaded photos to be used in ads without users' permission. Instagram later clarified its position in an effort to quell concerns.

Blogging is bringing new voices to the online world, Pew Internet :: Keyword: [Media] Most bloggers focus on personal experiences, not politics

Two More Cases Hold That Anti-SLAPP Laws Protect Consumer Reviews, Tech & Marketing Law Blog :: Keyword: [SLAPP] Every anti-SLAPP law is worded differently, but some statutes protect statements on "matters of public interest," "issues...

AT&T ~1970 Video - The Benefits of a Regulated Monopoly, Cybertelecom :: Keyword: [AT&T] A marvelous video prior to divestiture, and at the historical moment when MCI is being allowed into the long distance market, and customers were allowed to attach their own equipment to the network. You can hear the ghost of Theodore Vail saying that "competition is inefficient."
NOTE:  It appears that this video has been pulled down

Edward H. Freeman, The Telegraph and Personal Privacy: A Historical and Legal Perspective, EDPACS :: Keyword: [Telegraph] After its development in the 1840s, the telegraph allowed individuals to communicate virtually anywhere in a matter of minutes. This article examines the development of the technology and its effect on personal privacy, both from a historical and legal perspective. It discusses how business, the courts, government and individuals responded to the threat of eavesdropping and free transfer of personal information to unknown parties brought on by the telegraph. Comparisons are made between the issues brought up by the telegraph and more modern issues related to the Internet

FTC puts data brokers in spotlight, FT :: Keyword: [Privacy] US regulator launches probe into multibillion-dollar industry with nine groups subpoenaed for details about sources of information and how they use it

Press Conference on New COPPA Rule, Senate Commerce Committee :: Keyword: [COPPA] Chairman John D. (Jay) Rockefeller IV today announced that he will host Federal Trade Commission (FTC) Chairman Jon Leibowitz to announce the update and modernization of the regulations implementing the Children’s Online Privacy Protection Act (COPPA), also known as the COPPA Rule, to address new commercial practices and technological advances in the past decade.

Senator Rockefeller, FTC Chairman Leibowitz to Announce Updated COPPA Rule That Strengthens Kids’ Privacy Protections, FTC :: Keyword: [COPPA] At a press conference hosted by Senate Commerce Committee Chairman John D. (Jay) Rockefeller IV, Federal Trade Commission Chairman Jon Leibowitz will announce final amendments to the Children’s Online Privacy Protection Rule that strengthen kids' privacy protections and give parents greater control over the personal information that websites and online services may collect from children under 13

Frequently Asked Questions for Solicitation NSF 13-500 - Cyber-Enabled Sustainability Science and Engineering (CyberSEES), NSF :: Keyword: [Security] Public Comment: Please see the solicitation NSF 13-500 associated with these FAQs.



AT&T ~1970 Video - The Benefits of a Regulated Monopoly


A marvelous video prior to divestiture, and at the historical moment when MCI is being allowed into the long distance market, and customers were allowed to attach their own equipment to the network. You can hear the ghost of Theodore Vail saying that "competition is inefficient."

Tuesday, December 11, 2012

12.11 :: CT is now a G+ Community :: Google Wins :: Loves Google :: Embarrasses Google :: oh yeah and WCIT ::

CyberTelecom News  Weekly
Federal Internet Law and Policy :: An Educational Project


I find television very educating. Every time somebody turns on the set, I go into the other room and read a book. - Groucho Marx



Netflix ranks ISPs by streaming performance, Google Fiber wins, CNET :: Keyword: [FIBER] Netflix uses its copious streaming-video data to rank ISP performance in November, with Google Fiber easily taking the top spot

CDA 230 Success Cases: Yelp, EFF :: Keyword: [230] This is the first part in a series of posts about the importance of Section 230 of the Communications Decency Act (CDA 230). CDA 230 provides websites, blogs, and social networks that host speech with protection against a wide range of laws that might otherwise hold them

Mary Meekr, 2012 Internet Trends Year-End Update, KPCP :: Keyword: [Data] KPCB’s Mary Meeker and Liang Wu provide an update to the 2012 Internet Trends report with a focus on Asset-Light Generation and discuss new areas of re-imagination — from Data, Wallet, Education and Healthcare.

Zayo Announces 100G National Network Expansion, Zayo :: Keyword: [Backbone] Zayo Group announces its implementation of 100G wavelength services across major markets in the US. The 100G wavelength platform is already operational in some locations and will continue to be deployed during the rest of 2012 and into the first half of 2013.

Netflix loves Google Fiber, thinks Uverse is too slow for its own good, Gigaom :: Keyword: [Google] It’s official: Google Fiber is Netflix’s favorite ISP. The video service published the first in what it promises will be monthly ISP rankings, revealing the average speed of Netflix speeds for each service provider. Google Fiber unsurprisingly captured the first spot, with viewers

Gmail Outage Embarrasses Internet Giant -- Cause Was a Software Update, Forbes :: Keyword: [Google] What would life be like if Google crashed? People got an unexpected opportunity to experience Google withdrawal on Monday morning, when a configuration change to piece of infrastructure known as a "load balancer" knocked Gmail offline for total of 18 harrowing minutes.

Huawei to Open Research Center in Finland, NYT :: Keyword: [Huawei] The planned center, which will work on smartphone development, is the latest move in the Chinese telecommunications company's rapid expansion into Europe.

Data deluge motivates ITU standard on deep packet inspection, ITU :: Keyword: [ITU] ITU-T members have approved a new ITU standard on Deep Packet Inspection (DPI) which will enable Internet Service Providers (ISPs) to manage network traffic more efficiently and thereby heighten users’ quality of service and quality of experience (QoS and QoE).

WCIT-12: New Resolution to make ICT’s accessible to people with disabilities, ITU :: Keyword: [ITU] Approximately six-hundred and fifty million people around the world live with some form of disability – including both physical and cognitive – with a high percentage of these individuals living in developing countries. This also

US Ambassador on the importance of multi-lateral engagement, ITU :: Keyword: [ITU] His Excellency Ambassador Terry D. Kramer – appointed by President Barack Obama as Ambassador and Head of the U.S. Delegation for the #WCIT12 – took the opportunity to articulate his thoughts in a video interview with ITU on the discussions currently underway at the conference in Dubai.

Russia abandons proposal for U.N. governance of Internet, CNET :: Keyword: [WCIT] Opposed by Western governments, the proposal would have allowed member states to seize control of key Internet engineering assets.

Russia, China withdraw controversial proposal at treaty conference, CW :: Keyword: [ITU] Russia, China and other countries withdrew a proposal at the World Conference on International Telecommunications that according to some accounts aimed to bring the Internet under the control of the International Telecommunication Union.

Tough internet regulation plan dropped, FT :: Keyword: [ITU] Telecommunications conference left scrambling to find a compromise deal after Russia and China dropped their support for the proposal

Syria disappears from the Internet, CAIDA :: Keyword: [Syria] On the 29th of November, shortly after 10am UTC (12pm Damascus time), the Syrian state telecom (AS29386) withdrew the majority of BGP routes to Syrian networks (see reports from Renesys, Arbor, CloudFlare, BGPmon). Five prefixes allocated to Syrian organizations remained reachable for another several hours, served by Tata

Netflix signs unprecedented movie deal with Disney, CNET :: Keyword: [Video] The deal will let Netflix subscribers stream films from Walt Disney Animation Studios, Pixar Animation Marvel and Disneynature. Starting in 2016, that is. You knew there was a catch.

FTC to Announce Latest Kids’ App Report, FTC :: Keyword: [Coppa] On Monday, Dec. 10, 2012, the FTC will hold a press call to announce a follow-up report to an earlier FTC staff report on mobile apps for kids.

FTC: Many kids' apps don't disclose what info they share, CW :: Keyword: [Coppa] Many mobile apps aimed at children collect and share personal data without notifying parents, potentially violating U.S. law, the Federal Trade Commission said in a report released Monday.

Tackling State Surveillance And Protecting Human Rights, EFF :: Keyword: [4th Amendment] December 10 m a r k e d H u m a n R i g h t s D a y , t h e 6 4 t h a n n i v e r s a r y o f t h e U n i t e d N a t i o n s a d o p t i o n o f t h e U n i v e r s a l D e c l a r a t i o n o f H u m a n R i g h t s ( U D H R ) . A s w e a p p r o a c h 2 0 1 3 ,

The Calm Before (and After) the Storm, Sidera :: Keyword: [Hurricanes] It’s no secret what Hurricane Sandy taught us just a few weeks ago. The flooding and power outages that overwhelmed much of low-lying New York and New Jersey had a dramatic impact on connectivity throughout the region. Preparation, strategy, and expecting the

Safe Web Act extended until 2020, Cybertelecom :: Keyword: [Safe Web Act] On Dec. 4th, President Obama signed into law HR 6131 extending the Safe Web Act until 2020. The Safe Web Act was set to expire in 2013. The Safe Web Act authorizes the Federal Trade Commission to engage in international enforcement efforts and information sharing.

Walden Statement on FCC’s “Technology Transitions Policy Task Force”, Commerce Committee :: Keyword: [VoIP] Communications and Technology Subcommittee Chairman Greg Walden (R-OR) today issued the following statement on the Federal Communications Commission’s newly created “Technology Transitions Policy Task Force”:

AT&T Statement on FCC’s Technology Transitions Policy Task Force, AT&T :: Keyword: [VoIP] “Today’s announcement by the FCC to appoint a Technology Task Force to modernize its rules for the transition of traditionally regulated services to applications that ride on an IP broadband infrastructure is welcome news. As AT&T pointed out in our recent filing, that

FCC Task Force is Timely Move, USTelecom :: Keyword: [VoIP] The Federal Communications Commission has made a timely decision to deploy a special task force to study the vast changes that have occurred across communications industries, reshaping competition

NARUC 'Applauds' New FCC Task Force on Technology, NARUC :: Keyword: [VoIP] The National Association of Regulatory Utility Commissioners issued the following statements after the Federal Communications Commission announced the creation of its Technology Transitions Policy Task Force:

FCC Task Force to Address Critical IP Transition, Telecompetitor :: Keyword: [VoIP] FCC Task Force to Address Critical IP Transition The move to an all IP communications network is well underway. Most everyone in the telecommunications industry ecosystem recognizes this, yet there is disagreement on how best to manage the transition from the legacy




Monday, December 10, 2012

Safe Web Act extended until 2020

On Dec. 4th, President Obama signed into law HR 6131 extending the Safe Web Act until 2020.  The Safe Web Act was set to expire in 2013.  The Safe Web Act authorizes the Federal Trade Commission to engage in international enforcement efforts and information sharing.  Testifying before Congress in July, the FTC testified that
the agency has conducted more than 100 investigations with international components, such as foreign targets, evidence, or assets, and has filed more than 50 cases involving cross-border aspects since the Act's passage. The FTC has used the Act's provisions in many of these matters, and in related actions brought by other U.S. and foreign enforcement agencies. With these tools, the testimony states, the agency has stopped frauds costing American consumers hundreds of millions of dollars.
As the Internet is a global phenomenon, so is Internet fraud and crime.  In order to keep pace and enable international investigations and forensics, the Safe Web Act was necessary to authorize FTC activity.  Rep. Mary Bono Mack, sponsor of HR 6131, explained the origins of the Safe Web Act:
About a decade ago, the FTC began to highlight the growing problems it encountered in effectively combating Internet scams and fraud directed at American citizens by foreign operators, often times involving organized crime rings. By 2005, an estimated 20 percent of consumer complaints the FTC received involved fraud originating outside of the United States, costing American consumers hundreds of millions of dollars a year. In order to expand its ability to effectively fight online fraud, the FTC sent Congress legislative recommendations in 2005 seeking additional authorities.

As summarized by the FTC, the Safe Web Act achieves the following:
  • Broadening Reciprocal Information Sharing. (US SAFE WEB Act §§ 4(a), 6(a)) Allows the FTC to share confidential information in its files in consumer protection matters with foreign law enforcers, subject to appropriate confidentiality assurances. Similar to longstanding SEC, CFTC, and federal banking agency authority. Needed to allow the FTC to share information with foreign agencies to help them halt fraud, deception, spam, spyware and other consumer protection law violations targeting U.S. consumers. Also needed for the FTC to obtain, in return, foreign information required to halt such illegal practices.
  • Expanding Investigative Cooperation. (US SAFE WEB Act § 4(b) (adding FTC Act § 6(j))) Allows the FTC to conduct investigations and discovery to help foreign law enforcers in appropriate cases. Similar to longstanding SEC, CFTC, and federal banking agency authority. Needed to allow the FTC to obtain information for foreign agencies' actions to halt fraud, deception, spam, spyware, and other consumer protection law violations targeting U.S. consumers. Also needed to help the FTC to obtain, in return, foreign investigative assistance in FTC cases.
  • Obtaining More Information from Foreign Sources. (US SAFE WEB Act § 6(b)) Protects information provided by foreign enforcers from public disclosure if confidentiality is a condition of providing it. Similar to longstanding SEC and CFTC authority. Needed because, without it, some foreign law enforcers will not give the FTC information needed to halt fraud, deception, spam, and spyware.
  • Protecting the Confidentiality of FTC Investigations. (US SAFE WEB Act § 7) Safeguards FTC investigations in a defined range of cases by (1) generally protecting recipients of Commission CIDs from possible liability for keeping those CIDs confidential; (2) authorizing the Commission to seek a court order in appropriate cases to preclude notice by the CID recipient to the investigative target for a limited time; and (3) tailoring the mechanisms available to the Commission to seek delay of notification currently required by the Right to Financial Privacy Act ("RFPA") or the Electronic Communications Privacy Act ("ECPA"), to better fit FTC cases. Similar to longstanding RFPA, ECPA, and securities law provisions. Needed to prevent notice to investigative targets that are likely to destroy evidence or to move assets offshore or otherwise conceal them, precluding redress to consumer victims.
  • Protecting Certain Entities Reporting Suspected Violations of Law. (US SAFE WEB Act § 8) Protects a limited category of appropriate entities from liability for voluntary disclosures to the FTC about suspected fraud or deception, or about recovery of assets for consumer redress. Similar to longstanding protections for financial institutions making disclosures of suspected wrongdoing to federal agencies. Needed because liability concerns discourage third-party businesses from alerting the FTC to suspected law violations or recoverable assets.
  • Allowing Information Sharing with Federal Financial and Market Regulators. (US SAFE WEB Act § 10) Adds the FTC to RFPA's list of financial and market regulators allowed to readily share appropriate information. The list already includes the SEC and the CFTC. Needed to help the FTC track proceeds of fraud, deception, or other illegal practices sent through U.S. banks to foreign jurisdictions, so they can be recovered and returned to consumer victims.
  • Confirming the FTC's Remedial Authority in Cross-Border Cases. (US SAFE WEB Act § 3) Expressly confirms: 1) the FTC's authority to redress harm in the United States caused by foreign wrongdoers and harm abroad caused by U.S. wrongdoers; and 2) the availability in cross-border cases of all remedies available to the FTC, including restitution. Needed to avoid spurious challenges to jurisdiction in FTC cases and to encourage the full range of remedies for U.S. consumer victims in foreign courts
  • Enhancing Cooperation Between the FTC and DOJ in Foreign Litigation. (US SAFE WEB Act § 5) Permits the FTC to cooperate with DOJ in using additional staff and financial resources for foreign litigation of FTC matters. Needed because, without additional resources to freeze foreign assets and enforce U.S. court judgments abroad, fraudsters targeting U.S. consumers can more readily use the border as a shield against law enforcement.
  • Clarifying FTC Authority to Make Criminal Referrals. (US SAFE WEB Act § 4(b) (adding FTC Act § 6(k))) Expressly authorizes the FTC to make criminal referrals for prosecution when violations of FTC law also violate U.S. criminal laws. Similar to existing FTC authority to provide information to criminal authorities, a narrow express criminal referral provision in the FTC Act, and an SEC provision. Needed because foreign agencies that address consumer fraud and deception as a criminal (not civil) law enforcement issue would be more willing to share information if FTC has express authority to share information with criminal authorities.
  • Providing for Foreign Staff Exchange Programs. (US SAFE WEB Act § 9) Provides for foreign staff exchange arrangements between the FTC and foreign government authorities, and permits the FTC to accept reimbursement for its costs in these arrangements. Needed to improve international law enforcement cooperation in crossborder matters.
  • Authorizing Expenditure of Funds on Joint Projects. (US SAFE WEB Act § 4(b) (adding FTC Act § 6(l)), 4(c)) Authorizes the FTC to expend appropriated funds, not to exceed $100,000 annually, toward operating expenses and other costs of cooperative cross-border law enforcement projects and bilateral and multilateral meetings. Similar to SEC authority. Needed to allow the FTC to help support valuable international cooperative organizations and projects such as the website or consumer education programs of the International Consumer Protection and Enforcement Network (ICPEN) that foster the FTC's mission.
  • Leveraging FTC's Resources Through Reimbursement, Gift Acceptance, and Voluntary and Uncompensated Services (US SAFE WEB Act § 11) Authorizes the FTC to accept reimbursement for providing assistance to law enforcement agencies in the U.S. or abroad, and to accept gifts and voluntary services in aid of the agency's mission and consistent with ethical constraints. Similar to the authority of numerous regulatory agencies, including the SEC and the CFTC, and of the FTC and DOJ in the antitrust context, to accept reimbursements from foreign counterparts. Needed to assure that in appropriate circumstances a foreign agency bears the costs of FTC efforts on their behalf, and to enable the FTC to employ volunteers as our Canadian counterparts have done successfully for years.

Thursday, December 06, 2012

CfP AoIR 14.0 Resistance and Appropriation

Call for Papers
Internet Research 14.0: Resistance and Appropriation
24-27 October 2013
Denver, USA

http://ir14.aoir.org/

Internet Research 14.0 will focus on the theme of Resistance and Appropriation. Many people think of the internet and related technologies as basic infrastructure — a field for everyday life. But this ignores the processes through which we decide to use the internet, and the complex relationships between social practices and technologies. We invite contributions that help us to understand these processes and relationships. The conference organizers particularly invite explorations of how people, alone or together, choose to use these technologies in ways other than their most commonly accepted uses.

To this end, we call for papers, panel and pre-conference workshop proposals from any discipline, methodology, community or a combination of them that address the conference themes, including, but not limited to, papers that intersect and/or interconnect with the following:

* The internet, technology and social movements
* Appropriation of content and infrastructure
* Reconfiguring meaning
* Reconfiguring participation
* The political economy of social-technical practice
* User-centered/originated design
* User appropriation and repurposing
* Contention, cooperation and organization
* Digital media artists

Sessions at the conference will be established that specifically address the conference themes, and we welcome innovative, exciting, and unexpected takes on those themes. We also welcome submissions on topics that address social, cultural, political, legal, aesthetic, economic, and/or philosophical aspects of the internet beyond the conference themes. In all cases, we welcome disciplinary and interdisciplinary submissions as well as international collaborations from both AoIR and non-AoIR members.

SUBMISSIONS

We seek proposals for several different kinds of contributions. As in the past, we welcome proposals for traditional academic conference PAPERS, organized PANEL PROPOSALS that present a coherent group of papers on a single theme, as well as PRE-CONFERENCE WORKSHOPS which focus on a particular topic. We also invite proposals that will focus on discussion and interaction among conference delegates. A common form of this type is the ROUNDTABLE SESSION, but we would also like to encourage other formats, such as OPEN FISHBOWL SESSIONS. (See the Wikipedia entry under ìFishbowl (conversation)î for a description of this format. Fishbowl sessions should cover broad topics of interest to a wide segment of the AoIR community.)

DEADLINES

Submissions Due: March 1, 2013 (Papers, Panels and Pre-Workshops. Details below)

Notification: May 31, 2013

SUBMISSION REQUIREMENTS

All papers and presentations will be evaluated in a standard double-blind peer review, with the exception of Roundtable/Fishbowl, Ignite, and Preconferences, which will include the names of presenters and organizers as part of the refereeing process.

Format

SHORT PAPERS (individual or multi-author) – Minimum 1000 words, 1200 word maximum not including bibliography. Papers should include:

- Description/summary of the workís intellectual merit with respect to its findings, its relation to extant research and its broader impacts.

- A description of the methodological approach or the theoretical underpinnings informing the research inquiry.

- Conclusions or discussion of findings.

- Bibliography of work cited.

PANEL PROPOSALS – submit a description of 600-800 words on the panel theme, plus the SHORT PAPER for each presentation. The panel organizer must assemble these materials for submission.

ROUNDTABLE and FISHBOWL PROPOSALS – submit a statement indicating the nature of the discussion and form of interaction, and listing initial participants. (In the case of a fishbowl proposal, this will include the name of the moderator, and the names of the first four speakers for the fishbowl.)

PRE-CONFERENCE WORKSHOPS – please submit all workshop proposals via email to Lynn Schofield Clark: ir14sitechair@aoir.org Workshop proposals should include names of presenters, and a 1,000-word description.

IGNITE-IR presentation: Ignite is a high-energy five-minute plenary presentation format (see http://igniteshow.com/). Please submit a proposal via http://bit.ly/ignite-ir14 no later than August 1, 2013.

Papers, presentations and panels will be selected from the submitted proposals on the basis of multiple blind peer review, coordinated and overseen by the Program Chair. Each individual may present only one paper during the conference, though they may be listed as a co-author on multiple papers. In addition to this one presentation, they may also appear on a panel, roundtable, or performance.

PUBLICATION OF SHORT AND EXTENDED PAPERS

All Short Papers accepted for presentation will be published in the Selected Papers of Internet Research(http://spir.aoir.org). In addition, selected extended papers from the conference will be invited to appear in a special annual AoIR issue of Information, Communication & Society (http://www.tandfonline.com/toc/rics20/current). Authors selected for submission for this issue will be contacted prior to the conference.

PRE-CONFERENCE WORKSHOPS

On October 23, 2013, there will be a limited number of pre-conference workshops and symposia that will provide participants with in-depth, hands-on and/or creative opportunities. We invite proposals for these pre-conference workshops. Local presenters are encouraged to propose workshops that will invite visiting researchers into their labs or studios or locales. Proposals should be no more than 1000 words, and should clearly outline the purpose, methodology, structure, costs, equipment and minimal attendance required, as well as explaining its relevance to the conference as a whole. Proposals will be accepted if they demonstrate that the workshop will add significantly to the overall program in terms of thematic depth, hands on experience, or local opportunities for scholarly or artistic connections. These proposals and all inquiries regarding pre-conference proposals should be submitted as soon as possible to both the Conference Chair and Program Chair and no later than March 1, 2013.

CONTACT INFORMATION

Program Chair: Hector Postigo, Media Studies and Production, School of Media and Communication, Temple University. ir14programchair@aoir.org

Conference Chair: Lynn Schofield Clark, School of Communication, University of Denver. ir14sitechair@aoir.org

Help Wanted: FBI Hiring Cyber Agents

https://www.fbijobs.gov/cybercareers/index.html

Cyber Special Agent

FBI Cyber Special Agents combat global cyber threats, partner with international law enforcement, and protect the nation's critical cyber infrastructure.
Cyber Special Agents Minimum Requirements:
  • Be between the ages of 23 and 36
  • Bachelor's degree from a U.S accredited college/university
  • Three (3) years of full-time work experience, and one (1) year of experience in the areas listed below**
  • Be available for assignment anywhere in the FBI's jurisdiction
  • Be in excellent physical condition with the ability to pass a rigorous physical fitness test
  • All other Special Agent requirements still apply
**Only applicants who possess a degree and/or at least one year of work experience in one of the following disciplines will be eligible to apply to the "Cyber Only" Special Agent posting.
Preferred degrees and experiences include: Computer Science, Computer Forensics, Cyber Investigations, Information Assurance, Information Technology, Ethical Hacking, Cyber Security, Computer Engineering, Electrical Engineering, Mathematics, and/or Network Administration.
Click here to learn more and apply
Special Agent Applicants with Cyber Backgrounds Only.
Application Opens Dec. 5, 2012 - Jan. 14, 2013

FBI CYBER BACKGROUNDS CHART
Preferred Degrees and Work Experience

Preferred Degrees:
Applied & Computational Mathematics
Computer & Digital Forensics
Computer and Information Security
Computer Forensics and/or Digital Investigations
Computer Information Systems
Computer Information Technology Education
Computer Security
Computer Science
Computer, Electrical, or Software Engineering
Computer Technician
Cyber Security
Database Development
Digital Investigations Management
Enterprise Computing
Information Assurance and Security
Information Science
Information Management
Information Security
Information Technology Management
Management Information Systems
Mathematics
Network and Telecommunications Management
Programming/Networking
Web Development
Preferred Work Experiences:
Computer Programming
Computer Network Design
Computer or Network Penetration Testing
Computer Security
Computer Software Development
Cyber Investigations
Database Development
Digital Forensics
Ethical Hacking
Internetworking Technologies (Routers/
   Bridges/Gateways/Firewalls/Hubs/LANS/
   WANS)
Malware Analysis
Network Administration
Network Security Auditing
Network Traffic Analysis
Operating Systems Enterprise Administration
Working with SCADA/ICS Systems
Non-introductory teaching of the aforementioned
   at the college level or industry


Cyber Intelligence Analyst

Cyber Intelligence Analyst develops global insight into emerging cyber threats through an analytical, proactive, and product-driven environment.
Cyber IA's Preferred Experience:
  • Similar degrees and/or experience as noted for all Cyber positions with a heavy emphasis on analytical skills as well as oral and written communications.
More info on Intelligence Analyst qualifications and requirements.

Apply to Cyber Intelligence Analyst - GS 7/9 (External)
Apply to Cyber Intelligence Analyst - GS 7/9 (Internal - FBI Employees Only)

Computer Scientist

Acts as the technical expert on all investigations, works in a high-speed, dynamic, and sophisticated environment, and utilizes cutting edge technology.
Minimum Requirements:
  • Bachelor's degree in Computer Science
  • or any degree with 30 semester hours in a combination of mathematics, statistics, and computer science. Fifteen of those hours must include differential and integral calculus.
Apply to Computer Scientist - GS 13 (External)
Apply to Computer Scientist - GS 13 (Internal - FBI Employees Only)

Apply to Computer Scientist - GS 11/12 (External)
Apply to Computer Scientist - GS 11/12 (Internal - FBI Employees Only)

Apply to Computer Scientist - GS 7/9 (External)
Apply to Computer Scientist - GS 7/9 (Internal - FBI Employees Only)

Information Technology Forensic Examiner (ITFE)

Is a subject matter expert on digital evidence that works as an integral member of the investigative team responsible for digital evidence analysis and crime scene searches.
Minimum Requirements:
  • Bachelor's degree with at least 20 hours in one or more of the disciplines related to computers (see detailed information on the vacancy announcement).
Apply to IT Specialist (FE) - GS 11/12 (External)
Apply to IT Specialist (FE) - GS 11/12 (Internal - FBI Employees Only)

Apply to IT Specialist (FE) - GS 7/9 (External)
Apply to IT Specialist (FE) - GS 7/9 (Internal - FBI Employees Only)

Cyber Internship

A great first step to a cyber career with the FBI. Receive on-the-job training and exposure to national and international cyber investigations.
Internship Requirements:
  • Enrolled full-time in an accredited school or university
  • Currently a college junior, senior or graduate student at the time of hire (A participant cannot be graduating before the program begins)
  • 3.0 GPA
Preferred Degrees: Computer Forensics, Computer Science, Computer Engineering, Computer Security, Information Security, Information Systems, Information Technology, Information Science, Information Assurance, Network Administration, & Software Engineering.
Cyber Internship Application
Opens Dec. 5, 2012 - Jan. 11, 2013.

Wednesday, December 05, 2012

Help Wanted: FCC CIO

QUOTE:
Announcement Number SES-2013-0002 Promotion Potential ES-00
Position Title Chief Information Officer Hiring Agency Federal Communications Commission
Open Period 12/03/2012 - 01/03/2013 Duty Locations 1 Vacancies in Washington, DC, US
Series/Grade ES - 0301O 00 For More Info Noelle Green
202-418-1133
Noelle.Green@fcc.gov
Salary $119554 - $177500

Who May Apply
All Qualified Applicants
Duration Appointment
Permanent
Marketing Statement
The FCC is an independent United States government agency, directly responsible to Congress. The FCC was established by the Communications Act of 1934 and is charged with regulating interstate and international communications by radio, television, wire, satellite and cable. The FCC's jurisdiction covers the 50 states, the District of Columbia, and U.S. possessions.
Summary

This position serves as the Chief Information Officer (CIO) in the Information Technology Center within the Office of the Managing Director (OMD/ITC).



The incumbent is the senior executive responsible for the direction and development of the FCC's IT strategy, management of IT investments, and leadership of key technology initiatives.



The CIO has broad responsibility for providing strategic leadership in planning, budgeting, and managing information technology (IT). The incumbent is assigned overall managerial responsibility for technical information technology specialty areas such as policy and planning, IT security, application software, operating systems, network service, data management, systems administration, and customer support.  



Relocation expenses will not be paid.



Salary is dependent upon certification of the Commisison's SES performance system.
Key Requirements
Suitable for employment as determined by a background investigation. Must submit a financial disclosure statement upon assuming the position Serve a probationary period of one year, if applicable Males born after 12/31/59 must be registered with Selective Service Security Clearance and Drug Testing Required
Major Duties

Serves as senior advisor to the Managing Director, Chairman and Commission on matters pertaining to the Information Technology Center (Office of the Chief Information Officer), information systems and technology and related programs.




  • Consults with and advises Bureau and Office heads on information management and technology.

  • Advises on the direction and development of the FCC's IT strategy, management of IT investments, and leadership for key technology initiatives.

  • Develops, implements and oversees integrated policies, objectives and programs to effectively and efficiently plan for, manage and control the Commission's information technology, resources and related programs. This includes managing the long range planning and budgeting process to ensure both cost-effectiveness and alignment with the IT strategic plan and the FCC's goals; reviewing and approving proposed IT acquisitions; and conducting reviews of systems and technologies to assure conformance with FCC standards. Organizing high performance, agile technology teams to support mission and daily activities of FCC.

  • Develop and allocate appropriately skilled technology teams to support both legacy systems and new initiatives and needs to adjust to rapid changes in technology. Keep the FCC near the cutting edge of effective, cost-saving and productivity increasing tools and be able to flexible enough to rapidly adjust to new FCC or Congressional initiatives to deliver working product.

  • Ensures the highest level of customer service. Monitors and evaluates customer feedback to identify areas for improvement in the delivery of services and in the performance of core systems. Creating an environment of technological, engineering, and consumer experience excellence.

  • Recruit, develop, and nurture world-class technological, engineering, and customer experience from government and private sector excellence. We seek a work environment and IT work force that attracts talent and is recognized for innovation and contributions to the communications field.

  • Continuously improving contracting efficiency, timeliness, transparency, and monitoring.

  • Moving from reports to real-time dashboards and analytics.

  • Developing forward-thinking IT policy and governance and that compatible with an inter-connected, web-centric and federal compliance requirements. Liaison with Federal CIO and CTO, other governmental authorities, and industry on infrastructure and policy matters for information management. as interface between agency and broader federal technology investment policy and requirements.

  • Interact with Administration Federal CIO, CIO Council, and Federal Chief Technology Officer to make FCC part of larger information management reforms.

  • Insure FCC is addressed Federal requirements for: -Insuring continuation of operations and disaster recovery.  -Modernizing and virtualizing agency technology infrastructure. - Providing a robust, platform infrastructure offering a "services cloud" for Agency, Bureaus and Offices, individuals and groups directly requisition, configure, customize, and use technology as they might with credit cards from cloud-bases services on the web.

  • Create a platform that facilitates innovation and asset sharing among individuals and groups.

  • Establishing and managing technology teams to oversee equipment, software and configuration, desktop support, connectivity, virtualized data center, major applications, contracting/purchasing assistance, compliance.

  • Accreditation and Compliance and accreditation and compliance automation.

  • Manage and improve the process of maintaining compliance with a broad range of federal statutes and rules.

  • Examine and pursue automation and new efficiencies to streamline the process.

  • Supporting initiatives and daily activities of Agency, Bureaus, and Offices.

  • Creating a model of excellence for distributing technological expertise and use of technology smoothly with the activities of the Agency and individual units. Assist in creating multi-year budgeting and investment plans.

  • Successfully communicating plans and their values to agency management, Bureaus and Offices, staff and vendors. Design and help implement multi-year contract vehicles and aggregation of purchasing and contracting without overly centralizing contract management.
Education

Requirements
Unless you are currently serving under a Career Senior Executive Service appointment, are eligible for reinstatement into the Senior Executive Service, or have successfully completed a Senior Executive Service Candidate Development Program approved by OPM, you must submit a narrative statement covering each of the Executive Core Qualifications.
Evaluations
Your application will be evaluated to determine if you meet the minimum qualification requirements for this position. A panel may be convened to determine "best qualified" candidates. The rating and ranking will be based upon consideration of the degree to which you meet the Executive Core Qualifications, Selective Factor (if applicable) and Technical Qualifications. Interviews and qualifications inquiries may be required.
Qualifications

Applicants must provide detailed evidence of possession of each of the Technical and Executive Core Qualifications listed below to assist reviewing officials in determining the best qualified candidates to be referred to the selecting official. FAILURE TO MEET OR ADDRESS ANY ONE OF THE MANDATORY TECHNICAL OR EXECUTIVE CORE QUALIFICATION STANDARDS WILL ELIMINATE A CANDIDATE FROM FURTHER CONSIDERATION. Fundamental Competencies are cross-cutting and should be addressed over the course of your ECQ narratives. For more information, refer to the OPM Guide to Senior Executive Service (SES) Executive Core Qualifications available on-line at: http://www.opm.gov/ses/recruitment/ecq.asp



Fundamental Competencies: The following competencies are the foundation for success in each of the ECQs below: Interpersonal Skills; Oral Communication; Integrity/Honesty; Written Communication; Continual Learning; and Public Service Motivation.



ECQ 1 - Leading Change: Ability to bring about strategic change, both within and outside the organization, to meet organizational goals. Inherent to this ECQ is the ability to establish an organizational vision and to implement it in a continuously changing environment. Leadership Competencies: Creativity and Innovation; External Awareness; Flexibility; Resilience; Strategic Thinking; Vision



ECQ 2 - Leading People: Ability to lead people toward meeting the organization's vision, mission, and goals. Inherent to this ECQ is the ability to provide an inclusive workplace that fosters the development of others, facilitates cooperation and teamwork, and supports constructive resolution of conflicts. Leadership Competencies: Conflict Management; Leveraging Diversity; Developing Others; Team Building



ECQ 3 - Results Driven: Ability to meet organizational goals and customer expectations. Inherent to this ECQ is the ability to make decisions that produce high-quality results by applying technical knowledge, analyzing problems, and calculating risks. Leadership Competencies: Accountability; Customer Service; Decisiveness; Problem Solving; Technical Credibility



ECQ 4 - Business Acumen: Ability to manage human, financial, and information resources strategically. Leadership Competencies: Financial Management; Human Capital Management; Technology Management;



ECQ 5 - Building Coalitions/Communication: Ability to build coalitions internally and with other Federal agencies, State and local governments, nonprofit and private sector organizations, foreign governments, or international organizations to achieve common goals. Leadership Competencies: Partnering; Political Savvy; Influencing/Negotiating



Your examples should be clear and concise, and emphasize your level of responsibilities, scope and complexity of programs managed, program accomplishments with results of your actions, policy initiatives and level of contacts. We recommend that you limit your narrative to two pages per Qualification.



Candidates must have had at least one year of experience equivalent to the GS-15 level in the Federal Service. MANDATORY TECHNICAL COMPETENCIES: All candidates must submit a narrative statement addressing each of the following Technical Competencies.



1. Demonstrated leadership and experience in successfully managing agency and/or corporate level information technology (IT) and information management functions in areas such as IT policy and governance, IT security and critical infrastructure protection, IT capital planning and investment control, IT performance assessment, process/change management, application software, operating systems, network service, data management, systems administration, program management, acquisitions planning, and customer support.



2. Demonstrated leadership in team and organizational management, including areas such as: Matching technical infrastructure to support decision-making, Matching individual skills to IT needs, Customer facing, building and running High Performance teams, managing research and development, ensuring Vision and Goal Setting maps to resources and tactics.



3. Demonstrated leadership at the agency and/or corporate level including influencing senior officials to use information technology as a driver to improve performance; building partnerships among senior executives; and developing and implementing strategies that show how information technology can add value while also transforming or supporting operations.



4. Demonstrated experience in ensuring that information technology resources are planned for, acquired and managed in a manner that achieves strategic objectives of a large organization while conforming at policies of a legislative or other governing body.



5. Demonstrated experience in transitioning from legacy systems to new state of the art forms of computing and networking, and the resolution of key technical issues involving state-of-the-art IT systems and audit and security requirements. This includes managing the development and execution of multi-million dollar IT budgets and projects.
How to Apply

Apply on-line using the Commission's automated recruitment system FCCJobs.

IN ORDER TO RECEIVE FULL CONSIDERATION, YOU MUST PROVIDE THE FOLLOWING:

Your application, including resume, all registration information and NARRATIVE STATEMENT ADDRESSING THE FUNDAMENTAL COMPETENCIES,
EXECUTIVE CORE QUALIFICATIONS, SELECTIVE FACTOR AND THE TECHNICAL COMPETENCIES.  All documents must be received no later than midnight U.S. Eastern Standard Time of the closing date, or it will not be considered.  Requests for extensions will not be granted.

Resumes should include the following information:
 
- Vacancy announcement number SES-2013-0002
- Full name, mailing address, and day and evening phone numbers
- Educational information, including name, city and state of colleges or universities you attended, as well as the type and year of any degrees received including bar membership for attorney positions
- Information about your paid and nonpaid work experience related to this position including:
- Job title (include series and grade if Federal job)
- Duties and accomplishments
- Employer's name and address
- Supervisor's name and phone number
- Starting and ending dates of employment (month and year)
- Salary
- Indicate if we may contact your supervisor
- Information about honors, awards, and special accomplishments

If applying online poses a hardship, please contact the Federal Communications Commission's Human Resources Office at (202) 418-1133 during business hours (8:30 a.m. to 5:00 p.m. U.S. Eastern Standard Time) prior to the closing date of the vacancy announcement to speak with an HR representative who can provide assistance for online
applications.

For more information, please click on How to Apply, Applying for Jobs, and Inputting Resumes.  If you have question or problems with password or logging in, please click on Passwords, IDs, and Logging In.
Required Documents
A NARRATIVE STATEMENT ADDRESSING THE FUNDAMENTAL COMPETENCIES, EXECUTIVE CORE QUALIFICATIONS AND THE TECHNICAL COMPETENCIES. If you are currently serving under a career Senior Executive Service appointment, are eligible for reinstatement into the Senior Executive Service, or have successfully completed a Senior Executive Service Candidate Development Program approved by OPM, you must address the Technical Competencies but do not have to address the Executive Core Qualifications. Current Federal employees should submit a copy of your most recent annual performance appraisal and SF-50, Notification of Personnel Action.
What to Expect Next
Once your complete application is received, we will conduct an evaluation of your qualifications to determine your ranking. The best-qualified candidates will be referred to the hiring official for further consideration and possible interview. You will be notified of the outcome.
Benefits
The FCC offers a wide range of employee benefits, including:

Health Insurance
Life Insurance
Dental & Vision Insurance
Flexible Spending Accounts
Long-Term Care Insurance
Holidays and Leave
Retirement
Thrift Savings Plan
Transit Benefit
Alternative Work Schedule
Telecommuting

Other Information



EEO Policy Statement

Reasonable Accommodation Policy Statement