CyberTelecom News Weekly
Federal Internet Law and Policy :: An Educational Project
"Books will soon be obsolete in the schools... Our school system will be completely changed in the next ten years" -Thomas Edison, 1913 speaking about motion pictures
CAIDA "Anonymized Internet Traces 2013 Dataset" dataset available, CAIDA :: Keyword: [Backbone] This dataset contains anonymized passive traffic traces from CAIDA's equinix-chicago and equinix-sanjose monitors on high-speed Internet backbone links. This data is useful for research on the characteristics of Internet traffic, including application breakdown, security events, geographic and topological distribution, and flow volume and duration. Traffic traces in this dataset are anonymized
Two Years and Five Updates for the National Broadband Map, NTIA :: Keyword: [Map] Nearly two years ago, NTIA launched the National Broadband Map, and today we are updating it, as we have every six months since its inception. The map provides the first-ever detailed datasets of broadband availability across the country, and it would not be possible without a unique partnership between the federal government, states, and the voluntary participation of many broadband providers.
AT&T to FCC: “I double dare you to show you’re serious about wireless competition.”, Tales from the Sausage Factory :: Keyword: [Wireless] Rarely do you see companies double-dare the FCC to back up their brave talk about promoting competition. That is, however, what AT&T has just decided to do – with a little help from Verizon. After gobbling a ton of spectrum …
Dial "L" for Liability - Sec. 230 Protects Online Service for Errant Phone Number, CircleID :: Keyword: [Samaritan] The Communications Decency Act has been described as the greatest Internet law. The first major Internet law designed to censor the Internet actually enabled the interactive Internet. While the censorship provisions of the Communications Decency Act went down in unanimous supreme court flames, a separate provision remains standing. The Good
Early Warnings….of Corruption in ICANN’s GAC, IGP :: Keyword: [ICANN] New top level domain (TLD) applications raise high financial stakes for the applicants. Those seeking new TLDs will have invested at least half a million dollars to prepare and submit their proposal, and many of the companies involved have raised millions more in backing from investors or venture capital firms. In aggregate, a
Few ISPs, Companies Deployed DNSSEC Upgrades - Comcast Took The Lead, But Few Followed, dslreports :: Keyword: [DNSSEC] DNSSEC is a flavor of security that allows both sites and providers to validate domain names to make sure they're correct and not tampered with, and is supposed to help combat things like DNS cache "poisoning" and phishing scams. While some ISPs like Comcast have made great efforts to get DNSSEC deployed, most ISPs and companies are lagging far behind. Nearly five years after the "Kaminsky Bug" vulnerability i
Twitter hit by overcapacity issues, CNET :: Keyword: [Twitter] Access may be spotty this morning, with Twitter reporting that some people are unable to connect to its site.
Twitter confirms second outage this month, WAPO :: Keyword: [Twitter] Twitter confirmed that some users were unable to access the service Thursday, marking the second time this month that the micro-blogging service has been hit with an outage.
Walden, Royce Announce Joint Hearing on Internet Freedom, House Commerce Committee :: Keyword: [Internet Freedom] Communications and Technology Subcommittee Chairman Greg Walden (R-OR) and Foreign Affairs Committee Chairman Ed Royce (R-CA) today announced the Subcommittee on Communications and Technology, the Subcommittee on Terrorism, Nonproliferation, and Trade, chaired by Rep. Ted Poe (R-TX), and the Subcommittee on Africa, Global Health,
Chinese Hackers Infiltrate New York Times Computers, NYT :: Keyword: [China] The timing of the attacks coincided with reporting for an investigation that found that the relatives of China’s prime minister had accumulated a fortune worth several billion dollars through business dealings.
ITU: Internet policy still on agenda, CW :: Keyword: [ITU] Public policy formulation in all domains, including the Internet, is the sovereign right of member states, said ITU Secretary General Hamadoun Toure on Wednesday, suggesting that a debate over control of the Internet is far from over at the telecommunications body.
Presse v. Morel, Dist. Court, SD New York 2013, Fed. Court :: Keyword: [Copyright] Posting pictures to twitter does not mean poster loses copyright to pictures
Pirates of the Caribbean: Antigua and Barbuda Turn From Internet Gambling to Legalized Piracy, Forbes :: Keyword: [Copyright] When the Internet first entered the public domain in the early 1990's I consulted with a number of companies as they tried to establish new online business models.
CES tells CNET: You're fired!, Ars Technica :: Keyword: [News] At the 2013 CES convention, CNET's editorial staff loved the Dish Hopper DVR and nominated it "Best in Show." That journalistic decision was quickly tossed out, however, by the legal department at CBS, CNET's corporate parent. CBS is involved in litigation against Dish over the Hopper.
Google’s approach to government requests for user data, Google :: Keyword: [Big Brother] If it’s like most other days, Google—like many companies that provide online services to users—will receive dozens of letters, faxes and emails from government agencies and courts around the world requesting access to our users’ private account information. Typically this happens in connection with government investigations.
Twitter Transparency Report v2, Twitter :: Keyword: [Big Brother] Last July we released our first Twitter Transparency Report (#TTR), publishing six months of data detailing the volume of government requests we receive for user information, government requests to withhold content, and Digital Millennium Copyright Act-related complaints from copyright holders.
New York Times says it was hit by a cyber attack #thecircuit, WAPO :: Keyword: [Cyberwar] he New York Times reported late Wednesday that it had been the victim of a cyber attack for the last four months while working on a story about Chinese prime minister Wen Jiabao and his business connections.
Pentagon to Beef Up Cybersecurity Force to Counter Attacks, NYT :: Keyword: [Cyberwar] The expansion would increase the Defense Department’s Cyber Command by more than 4,000 people, officials said.
Unseen, all-out cyber war on the U.S. has begun, CW :: Keyword: [Cyberwar] Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Does the Stored Communications Act Protect an Email’s Subject Line From Disclosure?, Info Law Group :: Keyword: [ECPA] In other words, is the subject line considered “content” which the SCA says a service provider cannot disclose to a third party?
Time for Change on FCC Voice Rules, USTelecom :: Keyword: [FCC] Voice communications has dramatically changed in the past five to 10 years, thanks to new technologies like VoIP, Skype and Facetime. What hasn’t changed are regulations at the Federal
Five Fundamentals, Values For A New Phone Network, PK :: Keyword: [PSTN] As we wrote back in November, AT&T’s decision to upgrade its network from tradition phone technology (called “TDM”) to an all Internet protocol (IP) system has enormous implications for every aspect of our voice communication system in the country. To provide the right framework for the transition, Public Knowledge submitted to the Federal Communications Commission (FCC) our
Magical IP Pixie Dust, NTCA :: Keyword: [PSTN] Mike Romano, our Sr VP for Policy here at NTCA, had the chance to talk with the trade press at Bloomberg BNA as part of their annual “outlook” for communications policy with the Administration and the new Congress so it was gratifying to see rural telco issues profiled when the BNA review was published this week. As NTCA continues to
Hey Rural Telcos – It’s Time to Call it Quits on POTS, Telecoompetitor :: Keyword: [PSTN] Hey Rural Telcos – It’s Time to Call it Quits on POTS Like all sectors within the telecom industry, the rural telecom industry is in the midst of significant transition. Both the technology and the business models it enables are changing, and rapidly. Telecom carriers of all sizes are rethinking their business and trying to build a roadmap to a sustainable future, built on an IP infrastructure....
:: Cybertelecom Website :: Blog :: Delicious :: Twitter :: Google Group cybertelecom-l :: AUP :: Disclaimer :: G+ Community ::