Friday, November 19, 2010

11.19 :: Will It Be Worth Much? :: I'm The Mayor of a Chinese Prison! :: SpaceBook :: DROP TABLE ::

============================================
CyberTelecom News
Federal Internet Law and Policy
http://cybertelecomclips.blogspot.com/
============================================
Death is not the biggest fear we have; our biggest fear is taking the
risk to be alive -- the risk to be alive and express what we really
are. -- Don Miguel Ruiz

Telework legislation is good news for budgets and workers, WAPO
At last. After tons of paper, vats of ink and who knows how many
meetings and conferences on a seemingly simple subject, Congress has
given final approval to legislation promoting telework for federal
employees. Some employees already work away from their offices, though
less than 10 percent. The...
http://feeds.washingtonpost.com/click.phdo?i=ea982ab05484d3a94441a099a42b4b37
More Info: http://www.cybertelecom.org/broadband/

FCC Still Working On Neutrality Proposal - But will it be worth much?,
dslreports
According to Politico, the FCC is still putting together a net
neutrality proposal and plans to take action on the controversial
issue as early as next month. As we noted in September, a push for any
real network neutrality rules is all but dead, given the waffling by
key players like Google
http://www.dslreports.com/shownews/FCC-Still-Working-On-Neutrality-Proposal-111454
More Info: http://www.cybertelecom.org/ci/neutral.htm

Sources: FCC chief to move on net neutrality proposal, Politico
Federal Communications Commission Chairman Julius Genachowski is
putting together a net neutrality proposal and plans to take action on
the controversial issue as early as next month, according to several
sources with knowledge of the situation.
http://www.politico.com/news/stories/1110/45371.html
More Info: http://www.cybertelecom.org/ci/neutral.htm

Net Neutrality Seen Waning Lawmakers Tell Politico Forum, USTelecom
Net neutrality isn't likely to emerge in the 112th Congress, said a
bipartisan panel of lawmakers at a forum sponsored by Politico this
morning. In fact, there's a good chance Republicans and Democrats
could work together on technology legislation, said Sen. John Ensign
(R-Nev.), ranking member on the U.S. Senate's Subcommittee on
Communications, Technology, and the Internet.
http://www.ustelecom.org/Video_Blogs/Blog/index.php/2010/11/18/net-neutrality-seen-waning-lawmakers-tell-politico-forum/
More Info: http://www.cybertelecom.org/ci/neutral.htm

Free Press Cheers FCC Chairman for Finally Speaking Out Against
Verizon-Google Pact, Free Press
Federal Communications Commission Chairman Julius Genachowski
expressed displeasure with the Internet pact struck between Verizon
and Google last summer, saying he wished they "didn't do exactly what
they did, when they did."
http://www.freepress.net/press-release/2010/11/18/free-press-cheers-fcc-chairman-finally-speaking-out-against-verizon-google-
More Info: http://www.cybertelecom.org/ci/neutral.htm

Google's wi-fi data to be deleted, BBC
The search giant has agreed to delete all the UK data that it
accidentally captured via Street View cars.
http://www.bbc.co.uk/go/rss/int/news/-/news/technology-11797907
More Info: http://www.cybertelecom.org/industry/google.htm

Chinese Woman Imprisoned for Twitter Message, NYT
A woman was sentenced to a year in a labor camp for forwarding a
satirical post on Twitter.
http://feeds.nytimes.com/click.phdo?i=9f0ee10083f715b926973821f393c75c
More Info: http://www.cybertelecom.org/intl/china.htm

Worm Was Perfect for Sabotaging Centrifuges, NYT
Experts reached the conclusion by dissecting the program suspected of
being aimed at Iran's nuclear program.
http://feeds.nytimes.com/click.phdo?i=816d520fe72e688d4750626ecf79b830
More Info: http://www.cybertelecom.org/intl/me.htm

Web Censorship Bill Sails Through Senate Committee, Wired
The Senate Judiciary Committee unanimously approves a bill that would
give the attorney general the right to shut down a website with a
court order if copyright infringement is deemed "central to the
activity" of the site -- regardless if the website has actually
committed a crime.
http://feeds.wired.com/~r/wired/politics/~3/j8am9TI-dYI/
More Info: http://www.cybertelecom.org/ip/copyright.htm

The 19 Senators Who Voted To Censor The Internet, Techdirt
This is hardly a surprise but, this morning (as previously announced),
the lame duck Senate Judiciary Committee unanimously voted to move
forward with censoring the internet via the COICA bill -- despite a
bunch of law professors explaining to them how this law is a clear
violation of the First Amendment. What's really amazing is that many
of the same Senators have been speaking out against internet
censorship in other
http://www.techdirt.com/articles/20101118/10291211924/the-19-senators-who-voted-to-censor-the-internet.shtml
More Info: http://www.cybertelecom.org/ip/copyright.htm

Doctor Sues Patients Over Bad Yelp Reviews, Techdirt
We've seen all sorts of business owners get upset about Yelp, but it
seems to be ratcheting up a notch. For example, take Denver chef,
Scott Parker, who lashed out at Yelp reviewers in a recent interview
(sent in by visual77). After being asked what he'd like to see less
of, he stated:
http://www.techdirt.com/articles/20101110/19053611809/doctor-sues-patients-over-bad-yelp-reviews.shtml
More Info: http://www.cybertelecom.org/media/

Republican Threat to Defund NPR Fails, Free Press
House Minority Whip Eric Cantor (R-Va.) tried to cut off federal
funding for NPR by bringing a vote to the House floor today. While the
measure failed, this political stunt is part of a larger though
unpopular effort to undermine one of America's most consistently
trusted sources of news and information.
http://www.freepress.net/press-release/2010/11/18/republican-threat-defund-npr-fails
More Info: http://www.cybertelecom.org/media/news.htm

An Internet Self-Regulation Tool for Consumer Privacy, Nextgenweb
A good deal of progress is being made to balance the needs for
consumer privacy, behavioral advertising, and internet innovation.
Today, USTelecom hosted a panel event discussing important ways to
balance a consumer's right to online privacy while still enabling
advertisers to gather data to target consumer buying needs and wants.
The discussion began with an overview of online
http://www.nextgenweb.org/news-and-blog-clips/an-internet-self-regulation-tool-for-consumer-privacy
More Info: http://www.cybertelecom.org/privacy/

Rep. Ron Paul Introduces Bill to Halt Body Scanner Program, EPIC
Representative Ron Paul introduced a bill that would hold TSA agents
legally accountable for airline screening procedures. Rep. Paul cited
abusive screening procedures as the reason for the legislation, titled
the American Traveler Dignity Act. In a floor speech, Representative
Paul also endorsed National Opt-Out Day, a grassroots movement of
passengers who plan to refuse the devices on November 24th. EPIC is
suing
http://epic.org/2010/11/rep-ron-paul-introduces-bill-t.html
More Info: http://www.cybertelecom.org/privacy/

Myspace Cries Uncle, Hands Lunch Money to Facebook, Gigaom
Sometimes it just doesn't pay to fight the inevitable. In the case of
Myspace, that means admitting the unpleasant — but at the same time
undeniable — fact that it has lost the social-networking race to
Facebook. The News Corp. subsidiary has been doing that gradually over
the past few months, and the latest move in that direction came today,
with the launch of a new feature that Myspace CEO Mike Jones called
http://feedproxy.google.com/~r/OmMalik/~3/S39ypSqhEHU/
More Info: http://www.cybertelecom.org/privacy/socialnetworks.htm

The economic implications of surveillance-enhancing design, Crawford
This term I've been focused on the law of surveillance. The students
are writing excellent papers (go, students - that second draft is due
today!) and there's a lot going on in the world on this topic.
http://scrawford.net/blog/the-economic-implications-of-surveillance-enhancing-design/1417/
More Info: http://www.cybertelecom.org/security/bigbrother.htm

50 ISPs Harbor Half Of All Infected Machines - OECD Issues Study On
Botnets And ISP reactions, dslreports
Slashdot directs our attention to a new study by Delft University of
Technology and Michigan State University on botnets and how ISPs deal
with them. The study analyzed 90 billion spam messages from 170
million unique IP addresses captured between 2005 and 2009, and found
that just fifty (out of tens of thousands) of global ISPs are
responsible for about half of all infected machines. If those ISPs did
a better job of
http://www.dslreports.com/shownews/50-ISPs-Harbor-Half-Of-All-Infected-Machines-111428
More Info: http://www.cybertelecom.org/security/worms.htm

Stuxnet attacks could move beyond Iranian nuclear plants, Ars Technica
The Stuxnet worm, a complicated piece of malware apparently engineered
to disrupt Iranian uranium enrichment, could be modified to attack
more industries, according to experts speaking to the Senate Homeland
Security and Governmental Affairs Committee.
http://arstechnica.com/tech-policy/news/2010/11/stuxnet-attacks-could-move-beyond-iranian-nuclear-plants.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
More Info: http://www.cybertelecom.org/security/worms.htm

Hacking Sweden's election with pen and paper, Wired
In Sweden's recent election, a small collection of crafty programmers
appear to have attempted to hack the voting database with a
pen-and-paper attack.
http://www.wired.co.uk/news/archive/2010-09/24/sweden-election-hack?ref=nf
More Info: http://www.cybertelecom.org/vote/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
RSS Feeds : Fed Notices : Blog : Clips :
http://www.cybertelecom.org/news.htm

Delicious http://del.icio.us/rcannon100/zxc
Twitter & Facebook: Cybertelecom

To [un]subscribe to Cybertelecom-l, visit
http://groups.google.com/group/cybertelecom-l.
Announce only list information available at www.lawlists.net/mailman/listinfo

AUP :: www.cybertelecom.org/cybert.htm#aup

Cybertelecom is Off-the-Record. Otherwise play nicely.

Link to us! www.cybertelecom.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Wednesday, November 17, 2010

11.17 :: 70 Years of Decisions :: Good Spectrum is Hard to Find :: Well Now that We All Agree :: 11 /8s :: Opt Out Invasive Body Scanners Nov. 24 ::

============================================
CyberTelecom News
Federal Internet Law and Policy
http://cybertelecomclips.blogspot.com/
============================================
These capitalists generally act harmoniously and in concert, to fleece
the people. – Abraham Lincoln

Transformative Choices: A Review of 70 Years of FCC Decisions
Sherille Ismail, OSP, October 2010, fcc
The paper presents a historical review of a series of pivotal
FCC decisions that helped shape today's communications landscape. It
finds that there have been a
number of successful efforts by the FCC, before and after the 1970s,
to promote new entrants, especially
in the markets for commercial radio, cable television, telephone
equipment, and direct broadcast satellites
http://www.fcc.gov/Daily_Releases/Daily_Business/2010/db1029/DOC-302496A1.pdf
More Info: http://www.cybertelecom.org/broadband/

my first FCC TAC meeting, CAIDA
I recently attended my first FCC Technological Advisory Council
meeting (video archives). A week before the meeting we received a memo
from the chairman of the committee (Tom Wheeler) notifying the
committee of a "clear and challenging mandate from Chairman
Genachowski: to generate ideas and spur actions that lead to job
creation and economic growth in the ICT [information and communication
technologies]
http://blog.caida.org/best_available_data/2010/11/15/my-first-fcc-tac-meeting/
More Info: http://www.cybertelecom.org/broadband/tac.html

NTIA Releases New Spectrum Report: Concludes Finding New Spectrum Is Hard., PK
When the Federal Communications Commission (FCC) released its National
Broadband Plan (NBP) back in March, it focused very heavily on making
500 MHz of new spectrum available for broadband ove the next ten
years. The Obama Administration endorsed this goal back in May, and
ordered the relevant federal agency — Department of Commerce National
Telecommunications Information Administration (NTIA) — to do a study
on how to make this happen on the Federal side.
http://feeds.publicknowledge.org/~r/publicknowledge-main/~3/ML3T2jH3Gvk/ntia-releases-new-spectrum-report-concludes-f
More Info: http://www.cybertelecom.org/broadband/wireless.htm

New Research Study to Examine Teens' Online Behavior, Pew
Pew Research Center and Family Online Safety Institute will conduct
research focused on teenagers' online activities and digital
citizenship.
http://www.pewinternet.org/Press-Releases/2010/FOSI.aspx
More Info: http://www.cybertelecom.org/cda/child.htm

Federal Register Notice: Reopening of Comment Period, NTIA
The Department of Commerce's Internet Policy Task Force announces that
the closing deadline for submission of comments responsive to the
September 29, 2010 notice of inquiry on the global free flow of
information on the Internet has been reopened and will extend until
December 6, 2010
http://www.ntia.doc.gov/frnotices/2010/FR_FreeFlowsCommentExtension_11152010_FILED.pdf
More Info: http://www.cybertelecom.org/cda/firsta.htm

Wireless Firms Count On The Future Of The Internet, NPR
The Internet has been an economic bonanza for innovators and
entrepreneurs. The world wide web allowed start-ups to thrive at the
expense of established companies. But as the Internet age matures,
there are concerns big business is trying to exert more control.
http://www.npr.org/2010/11/17/131378404/big-business-exerts-more-control-on-wireless-industry?ft=1&f=1019
More Info: http://www.cybertelecom.org/ci/neutral.htm

Who Should Govern the Internet?, COMCAST
Later today, I'll deliver a speech at an event hosted by the Center
for Technology Innovation at the Brookings Institution. The new Center
is committed to "developing data-driven scholarship to enhance
understanding of technology's legal, economic, social, and governance
ramifications." I'm grateful for their invitation to discuss a timely
and important topic: the right role for government, and for other
institutions, in governing the Internet.
http://blog.comcast.com/2010/11/who-should-govern-the-internet.html
More Info: http://www.cybertelecom.org/ci/neutral.htm

The IETF and an Evolving Internet, Cable
Last week, the Internet Engineering Task Force (i.e. the "IETF") held
their meeting in Beijing, China. The IETF's mission is "to make the
Internet work better by producing high quality, relevant technical
documents that influence the way people design, use, and manage the
Internet." As the Internet is global, the IETF meets three times a
http://www.cabletechtalk.com/broadband/2010/11/16/the-ietf-and-an-evolving-internet/
More Info: http://www.cybertelecom.org/ci/neutral.htm

With Consensus at Hand on Net Neutrality, Time to "Check the Box", COMCAST
At yesterday's Brookings forum on "Internet Governance and Regulation:
What Should Be Government's Role?" Comcast's David Cohen delivered a
keynote calling for a greater reliance on the role of engineers and
the importance of transparent and consensus-based processes for
governing the Internet. He noted that long-standing engineering fora
such as the Internet Engineering Task Force have provided global
http://blog.comcast.com/2010/11/with-consensus-at-hand-on-net-neutrality-time-to-check-the-box.html
More Info: http://www.cybertelecom.org/ci/neutral.htm

Our Innovation Infrastructure: Opportunities and Challenges, FCC
Earlier today, Chairman Genachowski spoke at the annaul meeting of the
National Association of Regulatory Utility Commissioners in Atlanta.
In concert with the conference's "Keeping the Focus" theme, the
Chairman spoke to the primary focus of the FCC: the economy and jobs.
We're serving this mission through harnessing the opportunities of
communications technology and putting an emphasis on innovation.
http://blog.broadband.gov/?entryId=988365
More Info: http://www.cybertelecom.org/ci/neutral.htm

IPv6 Task Force Guiding Agencies on Next-Generation IP, Exec Gov
The federal IPv6 Task Force, led by Chairman Peter Tseronis, will
begin meeting with federal agencies today to provide guidance about
the switch to the next-generation IPv6, according to a report on
Government Computer News.
http://www.executivegov.com/2010/11/ipv6-task-force-guiding-agencies-on-next-generation-ip/
More Info: http://www.cybertelecom.org/dns/ipv6.htm

105/8 Allocated to AfriNIC - 11 /8s Remain at IANA, ARIN
No description
https://www.arin.net/announcements/2010/20101112.html
More Info: http://www.cybertelecom.org/dns/ipv6.htm

IPv6 Inside Everything and Everybody, Circleid
With the market for connected humans reaching saturation in advanced
economies, mobile operators now see connected devices as the next
growth opportunity. 'Everything that can benefit from being connected
will be connected', according to Ericsson's CTO (source). In the
meantime, Intel dreams of embedding processors into everything that
can gain something from communicating. Intel is quoted as counting on
http://www.circleid.com/posts/20101115_ipv6_inside_everything_and_everybody/
More Info: http://www.cybertelecom.org/dns/ipv6.htm

Public hangs up on printed phone books, Globe and Mail
Campaign presses Yellow Pages Group to stop mailing out heavy paper
tomes 'without permission' as contact information migrates online
http://feedproxy.google.com/~r/TheGlobeAndMail-Technology/~3/WTUhCrgI1JU/
More Info: http://www.cybertelecom.org/environment.htm

As Netflix bears down, Hulu Plus cuts price, CNET
Hulu Plus is playing catchup with rival Web video service Netflix and
has apparently realized that the best way to compete is to offer a
discount.
http://news.cnet.com/8301-31001_3-20023039-261.html?part=rss&subj=news&tag=2547-1_3-0-20
More Info: http://www.cybertelecom.org/media/video.htm

Hulu opens premium service in U.S., Globe and Mail
Hulu Plus, which offers streaming TV content, launches with price cut,
but it's unavailable in Canada
http://feedproxy.google.com/~r/TheGlobeAndMail-Technology/~3/L6LJTQ-R9Bk/
More Info: http://www.cybertelecom.org/media/video.htm

Paul Lanois, Caught in the Clouds: The Web 2.0, Cloud Computing, and
Privacy? NW J. Tech and Intel Prop 2010, NW J Tech & IP
A
ccording to a recent study by The Nielsen Company, the average
American Internet user spends over fifty-five hours per month online.1
However, despite the wide range of possibilities offered by the
Internet, Americans spend about half of their online
http://www.law.northwestern.edu/journals/njtip/v9/n2/2/Lanois.pdf
More Info: http://www.cybertelecom.org/notes/cloud.htm

From AM radio to satellite TV: seven decades of FCC regulation, Ars Technica
It was 1926. Broadcast radio was all the rage. But most stations
barely resembled the kind of outlets we listen to today. The majority
were run by colleges, civic organizations, and in some instances,
labor unions. Only 4.3 percent could be classified as "commercial
broadcasters."
http://arstechnica.com/tech-policy/news/2010/11/from-am-radio-to-satellite-tv-seven-decades-of-fcc-regulation.ars?asid=46948fec
More Info: http://www.cybertelecom.org/notes/fcc.htm

Report: Obama administration to appoint Web privacy czar, Ars Technica
The US government is preparing to appoint a privacy czar and introduce
legislation to address growing concerns over Internet privacy. The
announcement is expected to come within weeks along with a report from
the US Commerce Department, though at this point, the details are
apparently far from being hammered out.
http://arstechnica.com/tech-policy/news/2010/11/report-obama-administration-to-appoint-web-privacy-czar.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
More Info: http://www.cybertelecom.org/privacy/

M. Blane Michael, Reading the Fourth Amendment: Guidance from the
Mischief that Gave it Birth, NYLR Vol. 85 Num. 4 Oct. 2010, NYLR Vol.
85 Num. 4
The Supreme Court begins the twenty-first century with increasing use of a
cramped approach to Fourth Amendment interpretation. That approach, championed
by Justice Scalia, gives determinative weight to outdated common law rules
https://law.nyu.edu/ecm_dlv1/groups/public/@nyu_law_website__journals__law_review/documents/documents/ecm_pro_067219.pdf
More Info: http://www.cybertelecom.org/security/bigbrother.htm

Opt-Out Day Called Against Invasive Body Scanners, Wired
In the wake of a pilots' group calling on members to boycott body
scanners, an activist has launched a public movement to designate Nov.
24 as National Opt-Out day to encourage airline passengers to protest
the use of invasive body scanners and "enhanced pat-downs."
http://feeds.wired.com/~r/wired/politics/~3/bNrV3GnxbOU/
More Info: http://www.cybertelecom.org/security/bigbrother.htm

100 Naked Citizens: 100 Leaked Body Scans, Wired
At the heart of the controversy over "body scanners" is a promise: The
images of our naked bodies will never be public. U.S. Marshals in a
Florida Federal courthouse saved 35,000 images on their scanner. These
are those images.
http://feeds.wired.com/~r/wired/politics/~3/rfbJgu2EMdE/
More Info: http://www.cybertelecom.org/security/bigbrother.htm

Website Publishes 100 Pictures Of Federal Security Body Scans, NPR
The images were among the 35,000 that U.S. Marshals at an Orlando
courthouse admitted to saving. Their release intensifies the debate
over how private those images remain.
http://www.npr.org/blogs/thetwo-way/2010/11/16/131361057/website-publishes-100-pictures-of-federal-security-body-scans?ft=1&f=1019
More Info: http://www.cybertelecom.org/security/bigbrother.htm

TSA Investigating 'Don't Touch My Junk' Passenger, Wired
The TSA has launched an investigation of a passenger in San Diego who
left the airport after opting out of an invasive body scan and
criticizing the proposed alternative pat-down. He also faces an
$11,000 fine.
http://feeds.wired.com/~r/wired/politics/~3/5fSujKGo_IM/
More Info: http://www.cybertelecom.org/security/bigbrother.htm

F.B.I. Seeks Wider Wiretap Law for Web, NYT
The agency's director, in meeting with Silicon Valley executives, says
it is necessary for a 1994 law to be freshened to cover Internet
companies.
http://feeds.nytimes.com/click.phdo?i=fd329a1c2ce6cf51c362db8460a512c0
More Info: http://www.cybertelecom.org/security/ecpa.htm

Clues suggest Stuxnet Virus was built for subtle nuclear sabotage, Ars Technica
New and important evidence found in the sophisticated "Stuxnet"
malware targeting industrial control systems provides strong hints
that the code was designed to sabotage nuclear plants, and that it
employs a subtle sabotage strategy that involves briefly speeding up
and slowing down physical machinery at a plant over a span of weeks.
http://arstechnica.com/tech-policy/news/2010/11/clues-suggest-stuxnet-virus-was-built-for-subtle-nuclear-sabotage.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
More Info: http://www.cybertelecom.org/security/worms.htm

Thierer Joining Mercatus Center's Technology Policy Program, TLF
I'm very pleased to announce that I am today joining the Mercatus
Center at George Mason University as a Senior Research Fellow. I will
be working in the Mercatus Center's Technology Policy Program and
covering many of the same issues I have been active on for many years
now, including: free speech and child safety issues; privacy and
advertising policy; communications and media law; Internet governance;
online taxation and e-commerce regulation; and much more.
http://feedproxy.google.com/~r/techliberation/~3/XHIzdo6WmJI/
More Info: http://www.cybertelecom.org/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
RSS Feeds : Fed Notices : Blog : Clips :
http://www.cybertelecom.org/news.htm

Delicious http://del.icio.us/rcannon100/zxc
Twitter & Facebook: Cybertelecom

To [un]subscribe to Cybertelecom-l, visit
http://groups.google.com/group/cybertelecom-l.
Announce only list information available at www.lawlists.net/mailman/listinfo

AUP :: www.cybertelecom.org/cybert.htm#aup

Cybertelecom is Off-the-Record. Otherwise play nicely.

Link to us! www.cybertelecom.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Friday, November 12, 2010

11.12.10 :: Washington Has Its Head Up Its Rear End :: Cybersquatting Bad! :: But Google Maps Said We Could Invade :: Carriage ::

============================================
CyberTelecom News
Federal Internet Law and Policy
http://cybertelecomclips.blogspot.com/
============================================
Most folks are as happy as they make up their minds to be. – Abraham Lincoln

Secure a PC, Website From Firesheep Session Hijacking, CW
A couple of weeks ago, a tricky new Firefox plug-in called Firesheep
made hijacking someone's Web browsing session point-and-click simple.
You should take extra precautions to ensure that nobody hacks into
your online accounts when you surf on public Wi-Fi networks.
http://www.computerworld.com/s/article/9195618/Secure_a_PC_Website_From_Firesheep_Session_Hijacking?source=rss_news
More Info: http://www.cybertelecom.org/broadband/wifisecurity.htm

Ad Networks Can't Get 47 USC 230 Defense on Motion to Dismiss--Swift
v. Zynga, Tech Marketing Law
Swift v. Zynga Game Network, Inc., 2010 U.S. Dist. LEXIS 117355 (N.D.
Cal. Nov. 3, 2010). Wendy...
http://blog.ericgoldman.org/archives/2010/11/ad_networks_can.htm
More Info: http://www.cybertelecom.org/cda/samaritan.htm

The "Neutrality" of Things, GC
In an article titled, 'Will Netflix Doom Net Neutrality?' a very
interesting argument is being made - along the lines of "to stay
neutral or not". It's not an easy topic to find oneself solidly on
one side or the other as both arguments have merit, At the same time,
it's a highly volitile subject. One that can make peace-loving geeks
turn rabid and start throwing their office chairs.
http://blogs.globalcrossing.com/?q=content/net-neutrality-things
More Info: http://www.cybertelecom.org/ci/neutral.htm

Sorry, Net Neutrality Simply Was Not An Important Issue In This Year's
Election, Techdirt
This one is just amusing. Scott Cleland, who works for the big
broadband companies as a professional propagandist, and has a long
history of making absolutely ridiculous claims in order to support
their positions, apparently got a bit of traction from the
non-thinking press, after he started pushing the message that all of
the Democrats who signed a "pledge" to support
http://www.techdirt.com/articles/20101105/02472511738/sorry-net-neutrality-simply-was-not-an-important-issue-in-this-year-s-election.shtml
More Info: http://www.cybertelecom.org/ci/neutral.htm

Did You Know This Election Turned On Network Neutrality? Why
Washington Has Its Head Up Its Rear End., Tales from the Sausage
Factory
Apparently, the election results last Tuesday were a "national
referendum" on network neutrality. I'm not sure how I missed this, but
the constant repetition of this idea in the blogosphere and on Twitter
has now utterly convinced me and everyone…
http://tales-of-the-sausage-factory.wetmachine.com/content/did-you-know-this-election-turned-on-network-neutrality-why-washington-has-its-head-up-its-rear-end
More Info: http://www.cybertelecom.org/ci/neutral.htm

US Broadband Speed Jumps to 16th Worldwide, bandwidth reports
The US has improved its broadband speed rankings from 22nd to 16th
worldwide, according to an Akamai broadband survey. Delaware enjoys
the fastest connections in the US, and California continues to
dominate the top US cities for fast broadband. We also show the
slowest countries and US states.
http://www.websiteoptimization.com/bw/1010/
More Info: http://www.cybertelecom.org/data/broadband.htm

Cowboys fire coach, forget to renew Web domain, CNET
When the Dallas Cowboys fired their coach, Wade Phillips,
DallasCowboys.com was full of no news at all. The team had forgotten
to renew the domain name and site showed a picture of two kids playing
soccer.
http://news.cnet.com/8301-17852_3-20022316-71.html?part=rss&subj=news&tag=2547-1_3-0-20
More Info: http://www.cybertelecom.org/dns/

Cybersquatting Bad!, Cybertelecom
This is the first of a series of posts on the Anti-Cybersquatting
Consumer Protection Act (ACPA). This first post reviews the ACPA's
legislative history.On-line extortion in any form is unacceptable and
outrageous. Whether it's people extorting companies by registering
company names, misdirecting Internet users to inappropriate sites, or
otherwise attempting to damage a trademark that a
http://cybertelecom.blogspot.com/2010/11/cybersquatting-bad.html
More Info: http://www.cybertelecom.org/dns/acpa.htm

Surprising Cybersquatting Domain Name Dispute in the Ninth Circuit,
Infl Law Group
A panel of the Ninth Circuit last week released an opinion in DSPT
Int'l, Inc. v. Nahum, 2010 WL 4227883, (CV-06-00308-ODW)(Oct. 27,
2010), opinion here, that's worth a brief review for its various
holdings in a "cybersquatting" trademark and domain name dispute.
What's interesting about this case? For starters the result the Court
reached under the
http://feeds.lexblog.com/~r/InfoLawGroup/~3/C-57WUArLB8/
More Info: http://www.cybertelecom.org/dns/acpa.htm

Vint Cerf urges ISPs to deploy IPv6 - Inquirer, Inquirer
INTERNET PIONEER Vinton Cerf raised the spectre of Internet islands in
urging businesses to move towards IP version 6 (IPv6).
http://www.theinquirer.net/inquirer/news/1895850/vint-cerf-urges-isps-deploy-ipv6
More Info: http://www.cybertelecom.org/dns/ipv6.htm

AfriNIC gets 105/8, IPv4 Depletion
Today AfriNIC got the 105/8 block allocated from IANA. This is
surprisingly early, I was expecting AfriNIC to request more space in
April of next year. This is moving the IANA depletion date much
earlier (February of next year instead of April).
http://www.ipv4depletion.com/?p=497
More Info: http://www.cybertelecom.org/dns/ipv6.htm

FCC looks at Google's Street View data grab, Globe and Mail
Google faces multiple probes over Street View cars while U.S.
government prepares plans to address Internet privacy
http://feedproxy.google.com/~r/TheGlobeAndMail-Technology/~3/lmF5xVeRro0/
More Info: http://www.cybertelecom.org/industry/google.htm

Troops Move To Latin American Border. Google Maps Cited As The Reason., NPR
Nicaraguan troops have landed on an Island that Costa Rica claims as
its territory. A long disputed area, Nicaraguan forces point to Google
Maps saying it is their land. Google says, oops, our bad.
http://www.npr.org/blogs/thetwo-way/2010/11/08/131161323/troops-move-to-latin-american-border-google-maps-cited-as-the-reason?ft=1&f=1019
More Info: http://www.cybertelecom.org/intl/

Photographer Sues State Of Texas For Using Image From His Photograph
On Auto Inspection Stickers, Techdirt
Jon Snow points us to the story of a photographer who discovered that
a photograph he took of a cowboy hoisting a saddle is being used as
the background image on approximately 4.5 million inspection stickers
http://www.techdirt.com/articles/20101102/10500211691/photographer-sues-state-of-texas-for-using-image-from-his-photograph-on-auto-inspection-stickers.shtml
More Info: http://www.cybertelecom.org/ip/copyright.htm

Court Blocks Furniture Seller From Sending More DMCA Takedowns To eBay
Over Competitor's Furniture, Techdirt
It's no secret that the DMCA can be used as a form of censorship and
anti-competitive practices. Thankfully, at least some judges are
catching on. Evan Brown has the story of how Zen Path, a company that
sells furniture online, had been sending DMCA takedowns to eBay, after
noticing competitor Design Furnishings selling very similar wicker
furniture on eBay. I
http://www.techdirt.com/articles/20101110/18594111801/court-blocks-furniture-seller-from-sending-more-dmca-takedowns-to-ebay-over-competitor-s-furniture.shtml
More Info: http://www.cybertelecom.org/ip/dmca.htm

Did Jammie Thomas case backfire on file sharers?, CNET
Jammie Thomas-Rasset was supposed to become the Joan of Arc of file
sharing. Instead, copyright owners appear to be the ones benefiting
most from her legal challenge.
http://news.cnet.com/8301-31001_3-20021947-261.html?part=rss&subj=news&tag=2547-1_3-0-20
More Info: http://www.cybertelecom.org/ip/p2p.htm

Internet TV battles come to a head at FCC, WAPO
Changes in the television marketplace have been fast and furious in
recent months, and soon more tumult may come by way of the Federal
Communications Commission.
http://feeds.washingtonpost.com/click.phdo?i=5b66495daa51810744f63c279830a983
More Info: http://www.cybertelecom.org/media/video.htm

Fox now blocking Google TV, Lost Remote
Fox has joined ABC, CBS and NBC in blocking Google TV viewers from
watching video, reports GTVHub.com. Google TV allows you to punch up a
web browser on your TV set, but when you visit Fox.com and click to
watch a clip, a message says, "This content is not compatible with
your device." When we visited NBC.com a few days ago, it gave a
similar error message (right).
http://www.lostremote.com/2010/11/11/fox-now-blocking-google-tv/
More Info: http://www.cybertelecom.org/media/video.htm

Cable Subscribers Flee, But Is Internet To Blame?, NPR
TV subscribers are ditching their cable companies at an ever faster
rate in the past few months. It could be a sign that Internet services
such as Netflix and Hulu are finally starting to entice people to
cancel cable, though company executives cite the weak economy.
http://www.npr.org/templates/story/story.php?storyId=131096343&ft=1&f=1019
More Info: http://www.cybertelecom.org/media/video.htm

Carriage, Crawford
As I left a hotel recently, I walked towards the first cab on the cab
stand. The driver had a phone to his ear. "I'm on a call," he said.
"Go to the next cab."
http://scrawford.net/blog/carriage/1413/
More Info: http://www.cybertelecom.org/notes/common_carrier.htm

F.C.C. Investigates Google Street View, NYT
Google's acquisition of passwords, e-mails and other personal data
from unsuspecting people may have violated the Communications Act.
http://feeds.nytimes.com/click.phdo?i=2ff62da6e060af5a3049f6aef94accc3
More Info: http://www.cybertelecom.org/privacy/fcc.htm

The Role of Internet Services Providers in Botnet Mitigation, OECD
Botnets – networks of computers infected by malware – are critical
security threats. Based on the analysis of 109 billion spam messages,
this report considers whether ISPs can be critical control points for
botnet mitigation, how the number of infected machines varies across
ISPs and why.
http://www.oecd.org/topic/0,3373,en_2649_37441_1_1_1_1_37441,00.html?rssChId=37441#46397080
More Info: http://www.cybertelecom.org/security/

Report: Exploring the Digital Nation: Home Broadband Internet Adoption
in the United States, NTIA
A Report Prepared by the Economics and Statistics Administration and
the National Telecommunications and Information Administration in the
U.S. Department of Commerce. The report analyzes data collected
through an Internet Usage Survey of 54,000 households conducted by the
U.S. Census Bureau in October 2009.
http://www.ntia.doc.gov/reports.html
More Info: http://www.cybertelecom.org/usf/dd.htm

HP TO PAY $16.25 MILLION TO SETTLE DOJ-FCC E-RATE FRAUD INVESTIGATION., FCC
News Release. News Media Contact: Mark Wigfield
http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-302764A1.pdf
More Info: http://www.cybertelecom.org/usf/erate.htm

VoIP Providers must now pay USF funds, WISPA
From Phone+ article Nomadic VoIP providers such as Vonage Holdings
Corp. and 8×8 Inc. now must pay into states' Universal Service funds.
Late last week, the FCC ruled that states may require the likes of
Vonage and 8×8 to contribute to their individual USF subsidies from
here on out; the decision was expected. VoIP operators
http://www.wispa.org/?p=3359
More Info: http://www.cybertelecom.org/usf/voip.htm

Report: Obama Readying 'Stepped-Up' Internet Policing, NPR
The Commerce Department is working on a plan, for release in the next
several weeks, that would call for "new laws and the creation of a new
position to oversee the effort," The Wall Street Journal reports.
http://www.npr.org/blogs/thetwo-way/2010/11/12/131265621/report-obama-readying-stepped-up-internet-policing?ft=1&f=1019
More Info: http://www.cybertelecom.org/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
RSS Feeds : Fed Notices : Blog : Clips :
http://www.cybertelecom.org/news.htm

Delicious http://del.icio.us/rcannon100/zxc
Twitter & Facebook: Cybertelecom

To [un]subscribe to Cybertelecom-l, visit
http://groups.google.com/group/cybertelecom-l.
Announce only list information available at www.lawlists.net/mailman/listinfo

AUP :: www.cybertelecom.org/cybert.htm#aup

Cybertelecom is Off-the-Record. Otherwise play nicely.

Link to us! www.cybertelecom.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Monday, November 08, 2010

[REPORT] New Commerce Dept Report Shows Broadband Adoption Rises While Cap Persists

Note: This follows a long line of reports during the Clinton/Gore administration on the Digital Divide. Under Clinton/Gore, NTIA set up a website dedicated to this at digitaldivide.gov. When the Bush/Cheney administration came in, one of the first things they did was pull down digitaldivide.gov explaining how it was not part of their policy. NTIA under Bush/Cheney did continue to issue these reports, but the message changed to a more positive, everything's fine conclusion.

----------------
NEW COMMERCE DEPARTMENT REPORT SHOWS BROADBAND ADOPTION RISES WHILE 'GAP' PERSISTS

Data Show Digital Divide Not Simply Due to Socio-Economic Status

FOR IMMEDIATE RELEASE
Monday, November 8, 2010
News Media Contacts:
Jane Callen, ESA, (202) 482-2235 jcallen@doc.gov
Moira Vahey, NTIA (202) 482-0147 mvahey@ntia.gov

WASHINGTON – The Department of Commerce's Economics and Statistics Administration (ESA) and National Telecommunications and Information Administration (NTIA) today released a new report, “Digital Nation II,” that analyzes broadband Internet access and adoption across the United States. The study – the most comprehensive of its kind -- finds that socio-economic factors such as income and education levels, although strongly associated with broadband Internet use, are not the sole determinants of use; even after accounting for socioeconomic differences, significant gaps persist along racial, ethnic, and geographic lines. The report analyzes data collected through an Internet Usage Survey of 54,000 households conducted by the U.S. Census Bureau in October 2009. Earlier this year, NTIA released initial findings from the survey, showing that while virtually all demographic groups have experienced rising broadband Internet adoption at home, and 64 percent of households overall have broadband at home, historic disparities among demographic groups have persisted over time.

"In order to narrow the digital divide and help more Americans compete in the 21st century economy, we need to better understand the causes of the broadband gap,” said Under Secretary for Economic Affairs Rebecca Blank. “Today's report identifies various factors that drive and inhibit broadband adoption. It is the most comprehensive, data-driven analysis of broadband adoption that has been conducted. The bedrock of sound policymaking is statistical measurement and analysis of the data and underlying issues.”

"Americans who lack broadband Internet access are cut off from many educational and employment opportunities," said Assistant Secretary for Communications and Information and NTIA Administrator Lawrence E. Strickling. "The learning from today's report is that there is no simple ‘one size fits all’ solution to closing the digital divide. A combination of approaches makes sense, including targeted outreach programs to rural and minority populations emphasizing the benefits of broadband. NTIA's Broadband Technology Opportunities Program is helping to address this challenge, but we are hopeful today's report will be useful to the larger community working to close the gap."

The principal findings of the report are:

Overall

  • Seven out of ten American households used the Internet in 2009. The majority of these households used broadband to access the Internet at home. Almost one-fourth of all households, however, did not have an Internet user.

Determinants of Household Broadband Adoption

  • Income and education are strongly associated with broadband Internet use at home but are not the sole determinants.
  • Broadband Internet adoption was higher among White households than among Black and Hispanic households. Differences in socio-economic attributes do not explain the entire gap associated with race and ethnicity.
  • A similar pattern holds for urban and rural locations. Urban residents were more likely than their rural counterparts to adopt broadband Internet, even after accounting for socio-economic differences.
  • In contrast, differences in socio-economic and geographic characteristics do explain a substantial portion of the broadband adoption lag among people with disabilities.
  • Broadband adoption also varies with age, with the elderly population much less likely than their younger counterparts to use home broadband Internet services.
  • Lack of need or interest, lack of affordability, lack of an adequate computer, and lack of availability were all stated as the main reasons for not having home broadband Internet access. The significance of these factors, however, varied across non-users, with affordability and demand generally dominating.
  • Internet non-users reported lack of need or interest as their primary reason for not having broadband at home. This group accounted for two-thirds of those who don't have broadband at home. In contrast, households that did not use the Internet specifically at home but did use the Internet elsewhere ranked affordability as the primary deterrent to home broadband adoption. This group represented almost one-fourth of those who don't have broadband at home.
  • Households that use dial-up service cited affordability as the main reason for not adopting broadband at home. For rural residents using dial-up service, lack of broadband availability was reported as a significant factor.

Long-term trends in broadband Internet use

  • Between 2001 and 2009, broadband Internet use among households rose sevenfold, from 9 percent to 64 percent of American households.
  • Some of the demographic groups that had lower-than-average adoption rates in 2001 have since shown impressive gains, but sizable gaps remain among demographic groups defined by income, education, race, and ethnicity. Similarly, despite gains in adoption rates within geographic areas, significant gaps in adoption still persist among the states, some regions, and between urban and rural locations.

NTIA and the Department of Agriculture’s Rural Utilities Service are administering a nearly $7 billion Recovery Act initiative to expand access to and adoption of broadband services. NTIA is utilizing approximately $4 billion of that funding for the Broadband Technology Opportunities Program (BTOP), which provided grants to support the deployment of broadband infrastructure, enhance and expand public computer centers, and encourage sustainable adoption of broadband service.

The full report is available at http://www.esa.doc.gov/DN/

Sunday, November 07, 2010

Cybersquatting Bad!

This is the first of a series of posts on the Anti-Cybersquatting Consumer Protection Act (ACPA). This first post reviews the ACPA's legislative history.

On-line extortion in any form is unacceptable and outrageous. Whether it's people extorting companies by registering company names, misdirecting Internet users to inappropriate sites, or otherwise attempting to damage a trademark that a business has spent decades building into a recognizable brand, anyone engaging in cyber-squatting activity should be held accountable for their actions. --Sen. Abraham, Sponsor of the ACPA
"Cybersquatting is the Internet version of an unlawful land grab. Cybersquatters register well-known brand names as Internet domain names in order to force the rightful owners of the marks to come forward and pay for the right to engage in electronic commerce under their own name." Interstellar Starship Servs., Ltd. v. Epix, Inc., 304 F.3d 936, 946 (9th Cir. 2002) .

In the late 1990s, in the cacophony of disagreement over domain names and Internet governance, there was one issue over which there was rough consensus: cybersquatters bad! Back in the late 1990s, the White House singled out cybersquatting as bad in a DNS White Paper; Federal Courts have had a disdain for Cybersquatters; and the 106th Congress, a Congress which was gridlocked, found rough consensus to pass the AntiCybersquatting Consumer Protection Act (ACPA).

Purpose: "The purpose of the bill is to protect consumers and American businesses, to promote the growth of online commerce, and to provide clarity in the law for trademark owners by prohibiting the bad-faith and abusive registration of distinctive marks as Internet domain names with the intent to profit from the goodwill associated with such marks-a practice commonly referred to as ''cybersquatting.'" [Senate Report Leg His]

Discussion Derived From: The AntiCybersquatting Consumer Protection Act, Report 106-140, 106 th Cong., 1 st Sess. (Aug. 5, 1999) (Legislative History):

Trademark owners are facing a new form of piracy on the Internet caused by acts of ''cybersquatting,'' which refers to the deliberate, bad-faith, and abusive registration of Internet domain names in violation of the rights of trademark owners. For example, when Mobil and Exxon announced their proposed merger in December, 1998, a speculator registered every variation of the possible resulting domain name, i.e., mobil-exxon.com, exxon-mobil.com, mobilexxon.com, etc., ad infinitum. In another example of bad-faith abuses of the domain name registration system, Network Solutions- the domain name registry that administers the Internet's ''.com,'' ''.net,'' ''.org,'' and ''.edu'' top level domains-pulled on a London computer club in May, 1999, that had registered over 75,000 domain names using an automated computer program.1 Their aim was to lock up all available four letter domains by systematically reserving every possible combination of letters, starting with aaaa.com, then aaab.com, aaac.com, up to zzzz.com, until every available combination had been reserved.

The practice of cybersquatting harms consumers, electronic commerce, and the goodwill equity of valuable U.S. brand names, upon which consumers increasingly rely to locate the true source of genuine goods and services on the Internet. Online consumers have a difficult time distinguishing a genuine site from a pirate site, given that often the only indications of source and authenticity of the site, or the goods and services made available thereon, are the graphical interface on the site itself and the Internet address at which it resides. As a result, consumers have come to rely heavily on familiar brand names when engaging in online commerce. But if someone is operating a web site under another brand owner's trademark, such as a site called ''cocacola.com'' or ''levis.com,'' consumers bear a significant risk of being deceived and defrauded, or at a minimum, confused. The costs associated with these risks are increasingly burdensome as more people begin selling pharmaceuticals, financial services, and even groceries over the Internet. Regardless of what is being sold, the result of online brand name abuse, as with other forms of trademark violations, is the erosion of consumer confidence in brand name identifiers and in electronic commerce generally.

Cybersquatters target distinctive marks for a variety of reasons. Some register well-known brand names as Internet domain names in order to extract payment from the rightful owners of the marks, who find their trademarks ''locked up'' and are forced to pay for the right to engage in electronic commerce under their own brand name. For example, several years ago a small Canadian company with a single shareholder and a couple of dozen domain names demanded that Umbro International, Inc., which markets and distributes soccer equipment, pay $50,000 to its sole shareholder, $50,000 to an Internet charity, and provide a free lifetime supply of soccer equipment in order for it to relinquish the ''umbro.com'' name. The Committee also heard testimony that Warner Bros. was reportedly asked to pay $350,000 for the rights to the names ''warnerrecords. com'', ''warner-bros-records.com'', ''warner-pictures.com'', ''warner-bros-pictures'', and ''warnerpictures.com''.

Others register well-known marks as domain names and warehouse those marks with the hope of selling them to the highest bidder, whether it be the trademark owner or someone else. For example, the Committee heard testimony regarding an Australian company operating on the Internet under the name ''The Best Domains,'' which was offering such domain names as ''911porsche.com,'' at asking prices of up to $60,911, with a caption that reads ''PORSCHE: DO I NEED TO SAY ANYTHING?'' The Committee also heard testimony regarding a similarly enterprising cybersquatter whose partial inventory of domain names-the listing of which was limited by the fact that Network Solutions will only display the first 50 records of a given registrant-includes names such as Coca-Cola, Pepsi, Burger King, KFC, McDonalds, Subway, Taco Bell, Wendy's, BMW, Chrysler, Dodge, General Motors, Honda, Hyundai, Jaguar, Mazda, Mercedes, Nissan, Porsche, Rolls-Royce, Saab, Saturn, Toyota, and Volvo, all of which are available to the highest bidder through an online offer sheet.

In addition, cybersquatters often register well-known marks to prey on consumer confusion by misusing the domain name to divert customers from the mark owner's site to the cybersquatter's own site, many of which are pornography sites that derive advertising revenue based on the number of visits, or ''hits,'' the site receives. For example, the Committee was informed of a parent whose child mistakenly typed in the domain name for ''dosney.com,'' expecting to access the family-oriented content of the Walt Disney home page, only to end up staring at a screen of hardcore pornography because a cybersquatter had registered that domain name in anticipation that consumers would make that exact mistake. Other instances of diverting unsuspecting consumers to pornographic web sites involve malicious attempts to tarnish a trademark owner's mark or to extort money from the trademark owner, such as the case where a cybersquatter placed pornographic images of celebrities on a site under the name ''pentium3.com'' and announced that it would sell the domain name to the highest bidder. Others attempt to divert unsuspecting consumers to their sites in order to engage in unfair competition. For example, the business operating under the domain name ''disneytransportation.com'' greets online consumers at its site with a picture of Mickey Mouse and offers shuttle services in the Orlando area and reservations at Disney hotels, although the company is in no way affiliated with the Walt Disney Company and such fact is not clearly indicated on the site. Similarly, the domain name address ''wwwcarpoint.com,'' without a period following ''www'', was used by a cybersquatter to offer a competing service to Microsoft's popular Carpoint car buying service.

Finally, and most importantly, cybersquatters target distinctive marks to defraud consumers, including to engage in counterfeiting activities. For example, the Committee heard testimony regarding a cybersquatter who registered the domain names ''attphonecard.com'' and ''attcallingcard.com'' and used those names to establish sites purporting to sell calling cards and soliciting personally identifying information, including credit card numbers. We also heard the account of a cybersquatter purporting to sell Dell Computer products under the name ''dellspares.com'', when in fact Dell does not authorize online resellers to market its products, and a similar account of someone using the name ''levis501warehouse.com'' to sell Levis jeans despite the fact that Levis is the only authorized online reseller of its jeans.8 Of even greater concern was the example of an online drug store selling pharmaceuticals under the name ''propeciasales.com'' without any way for online consumers to tell whether what they are buying is a legitimate product, a placebo, or a dangerous counterfeit.

Congress viewed the legal remedies available for trademark owners before the passage of the ACPA as "expensive and uncertain." The ACPA was designed to thwart cybersquatters "who register numerous domain names containing American trademarks or tradenames only to hold them ransom in exchange for money." [Virtual Works Sec. II.A.1 ("The ACPA was enacted in 1999 in response to concerns over the proliferation of cybersquatting-the Internet version of a land grab.")]

Next Post: The Elements of an ACPA cause of action.

Thursday, November 04, 2010

FTC Names Edward W. Felten as Agency's Chief Technologist; Eileen Harrington as Executive Director

FTC Names Edward W. Felten as Agency's Chief Technologist; Eileen
Harrington as Executive Director

http://www.ftc.gov/opa/2010/11/cted.shtm

Federal Trade Commission Chairman Jon Leibowitz today announced the
appointment of Edward W. Felten as the agency's first Chief
Technologist. In his new position, Dr. Felten will advise the agency
on evolving technology and policy issues.

Dr. Felten is a professor of computer science and public affairs and
founding director of the Center for Information Technology Policy at
Princeton University. He has served as a consultant to federal
agencies, including the FTC, and departments of Justice and Defense,
and has testified before Congress on a range of technology, computer
security, and privacy issues. He is a fellow of the Association of
Computing Machinery and recipient of the Scientific American 50 Award.
Felten holds a Ph.D. in computer science and engineering from the
University of Washington.

Dr. Felten's research has focused on areas including computer security
and privacy, especially relating to consumer products; technology law
and policy; Internet software; intellectual property policy; and using
technology to improve government.

"Ed is extraordinarily respected in the technology community, and his
background and knowledge make him an outstanding choice to serve as
the agency's first Chief Technologist," Leibowitz said. "He's going to
add unparalleled expertise on high-technology markets and computer
security. And he also will provide invaluable input into the
recommendations we'll be making soon for online privacy, as well as
the enforcement actions we'll soon bring to protect consumer privacy.
We're thrilled to have him on board."

Dr. Felten currently is a part-time consultant for the FTC. He will
start full time as Chief Technologist in January.

Chairman Leibowitz also announced that Eileen Harrington has been
named the agency's Executive Director. Harrington comes to the FTC
from a 15-month stint as Chief Operating Officer at the U.S. Small
Business Administration. Previously, she served for 25 years at the
FTC, starting as a staff attorney and assuming a variety of senior
management positions in the Bureau of Consumer Protection, including
Associate Director for Marketing Practices, Deputy Director, and
Acting Director. Harrington has a long list of accomplishments from
her tenure at the FTC. Perhaps most notably, she received the
prestigious Service to America Medal for leading the team that created
the National Do Not Call Registry.

"This is a very happy homecoming," said Leibowitz. "Eileen has made an
invaluable contribution to the FTC in the past, and her strong
management skills, enthusiasm, and creativity will once again be put
to use for the betterment of the agency and for American consumers. We
are delighted to have her back."

The Federal Trade Commission works for consumers to prevent
fraudulent, deceptive, and unfair business practices and to provide
information to help spot, stop, and avoid them. To file a complaint in
English or Spanish, visit the FTC's online Complaint Assistant or call
1-877-FTC-HELP (1-877-382-4357). The FTC enters complaints into
Consumer Sentinel, a secure, online database available to more than
1,800 civil and criminal law enforcement agencies in the U.S. and
abroad. The FTC's website provides free information on a variety of
consumer topics.

MEDIA CONTACT:
Office of Public Affairs
202-326-2180

--

Tuesday, October 12, 2010

In Which We Learn That an Email Stored on a Laptop is not in "Electronic Storage"

What is it about former-boyfriends or girlfriends and hacking into the ex's email account? There is a growing litany of caselaw developing in this area (would make a good law review article somebody!).

Today we review Thompson v. Kaczmarek, No. 2:10-cv-479 (Sept. 30, 2010). In the words of the court, the relationship between the Plaintiff and the Defendant "deteriorated." Defendant got her hands on Plaintiff's laptop and "became intent on embarrassing [Plaintiff] in revenge." Defendant allegedly turned over the alleged laptop to nefarious dudes with the skill to hack into the hard drive and retrieve allegedly embarrassing emails. Plaintiff sued them all.

As per normal, we are particularly interested in the causes of action based on federal law; in this case Plaintiff claimed that Defendants violated the Stored Communications Act (SCA).

I always struggle with the SCA and ECPA –doesn’t the SCA apply to email somehow magically in transit – and once you have downloaded the email to your own machine, whatever happens to that email is of no concern of ECPA/SCA? If accessing stuff on the Plaintiff's machine caused some type of consternation, wouldn’t that be more of a Computer Fraud and Abuse Act claim?

Let's go to the video tape and find out.

Before the Court is Defendant's Rule 12(b)(6) Motion to Dismiss for failure to state an SCA claim upon which relief can be granted. "[T]he question before the Court is whether the unauthorized access of previously received electronic mail messages ("e-mail") that had been downloaded by the recipient and saved to the hard drive of his personal laptop computer violates the Stored Communications Act." For purposes of this motion, Defendants assume "that Plaintiff did not provide them with authority to access the data saved to the laptop hard drive." The problem, Defendants argue, is that even if the access were unauthorized, this is not a situation covered by the SCA.

The relevant portion of the SCA 18 U.S.C. § 2701 states

whoever—

(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or

(2) intentionally exceeds an authorization to access that facility;

and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.

Once an email has been downloaded and saved to a person's laptop, the electronic communication (the email) is no longer in electronic storage at the electronic communications service.

Okay, a few definitions.

"The SCA defines electronic storage as either a) 'any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof', and b) 'any storage of such communication by an electronic communications service for purposes of backup protection of such communication.' 18 U.S.C. § 2510(17); see also 18 U.S.C. § 2711(1) (providing that terms defined in § 2510 apply to Title II of ECPA)." The SCA is anticipating the brief, temporary, temporal storage that is involved in electronic, store-and-forward communications. It is when the email is stored on the email server. It is when the email is stored in transit. It is not after it has been received, read, and saved. It is not when the email is on Plaintiff's laptop.

Next, “'electronic communications system' means any wire, radio, electromagnetic, photooptical or photoelectronic facilities for the transmission of wire or electronic communications, and any computer facilities or related electronic equipment for the electronic storage of such communications." 18 U.S.C. § 2510(14). In other word, this is a service in the business of communications – not an end user. Even if Plaintiff wants to claim that the act of backing up his email makes him a "facility," it does not, concludes the court, make him an "electronic communications service."

Defendants' Motion to Dismiss Plaintiff's SCA Cause of Action is granted.

This time the allegedly hacking romantic ex-partner wins. See Global Policy Partners, Inc. v. Yessin, (EDVa Nov. 24, 2009) where the hacking-ex-partner loses. Plaintiff did not apparently raise a Computer Fraud and Abuse Act cause of action. Would the outcome have been different under the CFAA?

[Disclaimer]

Wednesday, September 22, 2010

Senate Considers Banning Dial Phones

This came to light from a recent Techdirt blog post.....  Now if they
would only ban Cell Phones while Driving.....

June 25, 1930
Senate Considers Banning Dial Phones
http://www.senate.gov/artandhistory/history/minute/Senate_Considers_Banning_Dial_Phones.htm

Senator Carter Glass of Virginia
Carter Glass (D-VA)

In the spring of 1930, the Senate considered the following resolution:

    Whereas dial telephones are more difficult to operate than are
manual telephones; and Whereas Senators are required, since the
installation of dial phones in the Capitol, to perform the duties of
telephone operators in order to enjoy the benefits of telephone
service; and Whereas dial telephones have failed to expedite telephone
service; Therefore be it resolved that the Sergeant at Arms of the
Senate is authorized and directed to order the Chesapeake and Potomac
Telephone Co. to replace with manual phones within 30 days after the
adoption of this resolution, all dial telephones in the Senate wing of
the United States Capitol and in the Senate office building.

Sponsored by Virginia's Carter Glass, the resolution passed without
objection when first considered on May 22, 1930. Arizona's Henry
Ashurst praised its sponsor for his restrained language. The
Congressional Record would not be mailable, he said, "if it contained
in print what Senators think of the dial telephone system." When
Washington Senator Clarence Dill asked why the resolution did not also
ban the dial system from the District of Columbia, Glass said he hoped
the phone company would take the hint.

One day before the scheduled removal of all dial phones, Maryland
Senator Millard Tydings offered a resolution to give senators a
choice. It appeared that some of the younger senators actually
preferred the dial phones. This angered the anti-dial senators, who
immediately blocked the measure's consideration.

Finally, technology offered a solution. Although the telephone company
had pressed for the installation of an all-dial system, it
acknowledged that it could provide the Senate with phones that worked
both ways. But Senator Dill was not ready to give up. In his
experience, the dial phone "could not be more awkward than it is. One
has to use both hands to dial; he must be in a position where there is
good light, day or night, in order to see the number; and if he
happens to turn the dial not quite far enough, then he gets a wrong
connection."

Senator Glass, the original sponsor, had the last word before the
Senate agreed to the compromise plan. "Mr. President, so long as I am
not pestered with the dial and may have the manual telephone, while
those who want to be pestered with [the dial] may have it, all right."


--
=~=~=
Cybertelecom :: Federal Internet Law & Policy :: www.cybertelecom.org

bobArlington :: Bunkum Blog from bArlington :: http://barlington.blogspot.com

Twitter & Facebook: rcannon100
=~=~=

Telecommunications Policy Research Conference Oct 1 - 3 in Arlington VA

http://www.tprcweb.com/

TPRC, one of the very best academic telecom policy conferences out there, will be the upcoming weekend of Oct 1 - 3 in Arlington VA

By way of sampling, below is Saturday's agenda


8:00 am Registration and Continental Breakfast
9:00 am Sessions
Network Management and Innovation
Broadband Investment 1
Media Policy
Privacy Policy
Spectrum Control
10:40 am Coffee Break
11:10 am Sessions
Regulatory Design 1
Residential Broadband
Policymaking Processes
Universal Access Policy
Spectrum Auctions
12:50 pm Lunch
Student Awards

2:00 pm Sessions
Comparative Network Neutrality
Broadband Investment 2
Regulatory Lessons from Virtual Space
Privacy Policy 2
Comparative Telecom Evolutions
3:40 pm Coffee Break
4:10 pm Sessions
Network Neutrality Regulation
Broadband in Europe
OSP Liability
Privacy Policy 3
Public Safety and Emergency
6:00 pm Reception
7:00 pm DinnerPanel: The Rise of the Wireless Industry

Wednesday, August 11, 2010

In Which We Learn the Cost of Letting a Domain Name Expire During a Litigation

Lesson of the day: Just because you have won a court case does not mean you get to collect valuable prizes. It can be easier to win the case than to collect damages. Many losing parties when confronted with a piece of paper that says fork over property or cash, will respond with that legal defense, "yeah, you and what army?!?!?"

Today's case is one of those situations. Skydive Arizona, Inc. v Cary Quattrocchi, (D Arizona July 28, 2010). This is an Anti Cybersquatter Consumer Protect Act (ACPA) case where plaintiff had prevailed against defendant regarding six different domain names. The original Court ordered defendant to transfer the domain names in question to Plaintiff. The Defendant transferred five of the six domains to Plaintiff, but a funny thing happened on the way to compliance; apparently the sixth domain name expired before defendant could transfer it.

"Bummer," said Defendant. "Since I am no longer the domain name owner, and as the domain name is now held by someone else, it is quite impossible for me to comply."

According to the Court, the facts are like these: while the litigation was pending, the domain expired. It was picked by a domain registrar. When the court went to the website associated with the domain name (intelligently the court never actually names the domain name in question), the court saw a page indicating that the domain name was available for purchase (go look at cybertelecom.com as an example of one of these).

Before the Court was Plaintiff's Motion to Require Defendants to Perform Renewal Requirements to Effectuate Transfer of the Domain Name. In response to defendant's argument was that this would be impossible, the Court' said "too bad."

[] Defendants had an obligation to maintain the status quo with respect to their ownership of [The Domain Name that Must Not be Named] during the pendency of this action…Were it otherwise, litigation and arbitration decisions concerning proper ownership of domain names could easily be thwarted by defendants who allowed their domain name registrations to expire, then claimed they did so by mistake. Additionally, prior to the entry of the permanent injunction, Defendants had every opportunity to inform this Court that their ownership of [The Domain Name that Must Not be Named] had lapsed, but failed to do so. Consequently, the Court has little sympathy for the predicament in which Defendants now find themselves; in non-compliance with the permanent injunction.

Pursuant to Federal Rule of Civil Procedure 70, "'a district court may direct a party to complete a specific act where the district court previously directed the same party to perform the same act in its final judgment and that party has failed to comply.' Additionally, Rule 70 allows courts to hold the disobedient party in contempt." While impossibility may be a legitimate defense to compliance, it's not a legitimate defense, says the court, where the impossibility is your own dumb fault for letting the domain name expire in the first place.

In the end, the Court gives defendant two choices. Behind Door Number One: Defendant will reacquire the [The Domain Name that Must Not be Named] and effectuate the transfer; or behind Door Number Two: Defendant will be sanctioned $10k for failure to comply with the injunction.

Monday, August 09, 2010

[RFC] FCC re National Broadband Plan Recommendation To Create A Cybersecurity Roadmap

"By this Public Notice, the Federal Communications Commission's (FCC or Commission) Public Safety and Homeland Security Bureau (PSHSB) seeks public comment on the creation of a Cybersecurity Roadmap to identify vulnerabilities to communications networks or end-users and to develop countermeasures and solutions in preparation for, and response to, cyber threats and attacks in coordination with federal partners. The FCC's Cybersecurity Roadmap was recommended as an initial step forward in the area of cybersecurity as part of the Commission's National Broadband Plan (NBP). Specifically, the NBP recommended that the FCC issue, in coordination with the Executive Branch, a plan to address cybersecurity. The NBP further stated that the roadmap should identify the five most critical cybersecurity threats to the communications infrastructure and its end users and establish a two-year plan, including milestones, for the FCC to address these threats. In making this recommendation, the NBP stated that "[t]he country needs a clear strategy for securing the vital communications networks upon which critical infrastructure and public safety communications rely."

"The Cybersecurity Roadmap will establish a plan for the FCC to address vulnerabilities to core Internet protocols and technologies and threats to end-users, including consumers, business enterprises, including small businesses, public safety and all levels of government. Cybersecurity is a vital topic for the Commission because end-user lack of trust in online experiences will quell demand for broadband services, and unchecked vulnerabilities in the communications infrastructure could threaten life, safety and privacy. The NBP originally called for completion of the Cybersecurity Roadmap within 180 days (e.g., September 13, 2010). In order to ensure a complete and robust record in response to this Public Notice, we anticipate completion of the Cybersecurity Roadmap by November 2010.

"We welcome public input on these matters and the overall roadmap from interested parties. For example, commenters could offer responses to: What are the most vital cybersecurity vulnerabilities for communications networks or users? How can these vulnerabilities be addressed? What role should the Commission play in addressing them? What steps should the Commission take, if any, to remediate them? If the FCC does not play a role in addressing these vulnerabilities and problems, what agency or entity would fulfill that role? How should the Commission coordinate its efforts with other agencies of government?

. . . . .

8/9/10 FCC Seeks Public Comment on National Broadband Plan Recommendation to Create a Cybersecurity Roadmap.
Public Notice: Word | Acrobat

PS Docket No. 10-146

GN Docket No. 09-51

Comments Due: September 23, 2010

[RFC] FCC Seeks Public Input for Next Broadband Deployment Report

1. In this Notice of Inquiry (Inquiry), we solicit data and information that will help the Commission complete its annual task under section 706 of the Telecommunications Act of 1996, as amended, of determining whether broadband is being deployed to all Americans in a reasonable and timely fashion.  Specifically, section 706 requires the Commission annually to "initiate a notice of inquiry concerning the availability of advanced telecommunications capability to all Americans (including, in particular, elementary and secondary schools and classrooms)."  In conducting this Inquiry, the Commission must "determine whether advanced telecommunications capability is being deployed to all Americans in a reasonable and timely fashion."  Section 706 also requires the Commission to provide "demographic information for unserved areas" and complete an international comparison of broadband service capability.  The Commission also must conduct a consumer survey to evaluate "the national characteristics of the use of broadband" and make the results of the survey public at least once per year.  If the Commission finds that broadband is not being deployed to all Americans in a reasonable and timely fashion, then the Commission "shall take immediate action to accelerate deployment of such capability by removing barriers to infrastructure investment and by promoting competition in the telecommunications market." 

2. The purpose of this Inquiry then is to initiate the process that will allow the Commission to fulfill these statutory responsibilities.  We encourage companies, policy institutes, governmental entities, analysts, consumer groups, individual broadband consumers, individuals who live or work in unserved areas, and others to provide whatever objective, empirical data and evidence might be useful to help us complete the tasks identified above.  To facilitate the process, we ask a number of questions related to interpreting section 706 and measuring the availability and deployment of broadband.  We also encourage commenters to bring new issues to our attention, and to submit data and evidence to the extent reasonably related to the scope of section 706. 

3. Ensuring universal broadband availability is the great infrastructure challenge of our time.  The ultimate purpose of this Inquiry is to inform ourselves about the state of broadband deployment and its progress so that we can consider what additional actions, if any, should or should not be taken by the Commission to bring broadband to all Americans to ensure that "every American has a meaningful opportunity to benefit from the broadband communications era."


. . . . . 

8/6/10 FCC Seeks Public Input for Next Broadband Deployment Report
Order:Word | Acrobat
http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-10-148A1.pdf

Genachowski Statement: Word | Acrobat
McDowell Statement: Word | Acrobat

Comment Date:           September 7, 2010

Reply Comment Date:   October 5, 2010


Tuesday, July 27, 2010

[RFC] DOC NOI Cybersecurity, Innovation and the Internet Economy

Federal Register Notice: Cybersecurity, Innovation and the Internet Economy: The Department of Commerce’s Internet Policy Task Force is conducting a comprehensive review of the nexus between cybersecurity challenges in the commercial sector and innovation in the Internet economy. The Department seeks comments on measures to improve cybersecurity while sustaining innovation. The Department intends to issue a report that will contribute to the Administration’s domestic and international policies and activities in advancing both cybersecurity and the Internet economy. (455 KB PDF file)
Posted July 26, 2010

Friday, July 16, 2010

[Event] Internet Governance Forum

http://www.igf-usa.us/page/agenda-1

AGENDA

When: Wednesday, July 21, 2010

Where: Georgetown Law Center

600 New Jersey Ave., N.W., Washington, DC

The IGF-USA is a multi-stakeholder national event to bring together
business, civil society, government, technologists/researchers, and
academia in discussions about topics that are being deliberated at a
global level regarding governance of the Internet, including
management of critical Internet resources, privacy, cyber-security,
access, openness/freedom of expression, child online safety, capacity
building and development. The IGF USA will also provide a report into
the global IGF, being held in Vilnius, Lithuania, in September.

8:15 Registration and Continental Breakfast

9:00 –9:45 Welcome and Introduction of Programme

Plenary Speakers:

Markus Kummer, Executive Coordinator, Internet Governance Forum

Ambassador Phillip Verveer, US State Department

10:15 –11:45 Workshops and Scenario Stories:

1) Cyber Security 2)
Internet Islands

3) Global governance of the Internet 4) Users Reign

11:45- 1:00 Networking Lunch is provided.

1:15—3:00 Concurrent Workshops:

5) Cloud Computing
6) Critical Internet Resources

7) e-Crime and Malicious Conduct in the DNS 8) Best Practice Forum:
Child Safety in an always switched on world

3:00-3:15 Break

3:15 –5:15 Afternoon Plenary Session

3:15 Speaker: Andrew McLaughlin, Deputy Chief Technology
Officer, Internet Policy, White House

3:45 Outcomes of Scenario Stories – Implications for the
Internet Governance Debate and for the IGF

Presentations of Scenarios and Observations for Internet Governance:

"Internet Islands"; "Global Governance for the Internet"; "Users Reign"

Panel of Respondents and Audience Participation

5 -5:20 Closing Session

Markus Kummer, Executive Secretariat, IGF

Remarks: Larry Strickling, Assistant Secretary for Communications and
Information and Administrator, National Telecommunications and
Information Administration (NTIA, U.S. Department of Commerce)

Invitation - IGF 2010 in Vilnius, Lithuania

Invitation - Brian Cute, ISOC DC Chapter

5:30-7:00 Reception for participants and invited guests

For more information visit http://igf-usa.ning.com or send email to
igfusa@hotmail.com