December 2010

New FCC rules take slow route on net neutrality

[Commentary] This has been a big week for the Internet - and we're not talking about online shopping. After years of agitation from public interest groups, companies that build Web applications (including Google, Netflix and Skype), and Internet service providers, the Federal Communications Commission has approved rules designed to preserve open traffic flow online.

"Net neutrality" is an effort to ensure that the public has open access to websites and services. The FCC's new guidelines will shape the Web for years, and maybe decades, to come. As such, the FCC took the mildest possible approach to regulation. The order instructs network carriers (such as Comcast) not to block any sites, applications or devices, even if such content is in direct economic competition with the network carrier. But the carriers are allowed to experiment with measures like differential pricing for content providers that have heavy usage, or controls on the traffic of said content providers. There's also an enormous loophole for carriers to tinker with access to mobile Internet services, which are newer, more competitive, and projected for huge growth. No one is happy with the new guidelines.

Is Your Internet Disaster Plan in Place?

[Commentary] On Dec 22, both Skype and Twitter were down for periods of time. The incidents may be unrelated, but they highlight our growing reliance on web communication tools to keep in touch.

As we move our exchanges to the cloud, we are increasingly vulnerable to these kinds of outages. The lesson here isn't that we should abandon online communications tools. Those are here to stay. We need to just keep our options open and be prepared to roll with the punches. Outages are going to be with us for many years to come, especially as these services scale up. The key thing is to have multiple channels ready if and when the next Skypefail or Twitter outage occurs. Think of it like an emergency back-up plan, much like families have rally points to meet up in case of disaster. For example: Meet on Twitter if Gmail fails. It may sound extreme, but with more and more companies and start-ups relying on these tools, it doesn't hurt to prepare for the worst.

NITRD Seeks Comment on Designing a Digital Future

This document is a request for comments on strategies for meeting the goals and recommendations of the recently released President’s Council of Advisors on Science and Technology (PCAST) report "Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology."

NITRD seeks comment on the questions below. Comments on other aspects of the PCAST report are also welcome.

1. The PCAST report calls for national, long-term, multi-agency research initiatives on networking and information technologies (NIT) for the health, energy, transportation, and cyberinfrastructure sectors.
a. What are the most important NIT R&D challenges in each of these sectors?
b. What NIT R&D challenges are common across all of these sectors?
c. What emerging innovations in these or other sectors could be used to achieve a leap forward in progress?

2. The PCAST report recommends collaborative programs to support high risk/high reward R&D in the following frontier areas: Fundamentals of privacy protection and protected disclosure of confidential data; human-machine and social collaboration and problem-solving in networked, on-line environments where large numbers of people participate in common activities; data collection, storage, management, and automated large-scale data analysis; and advanced domain-specific sensors, integration of NIT into physical systems, and innovative robotics.
a. What are some high-risk concepts that carry the potential for fundamentally changing the landscape in these frontier areas?
b. What limitations in NIT hold back progress today in these frontier areas? How might these limitations be overcome?
c. What efforts currently underway in these areas could be accelerated through collaboration, cooperation, and coordination?

3. The PCAST report calls for fundamental changes in K-12 STEM education in the United States, including the incorporation of computer science (CS) as an essential component.
a. What CS concepts and approaches are most important to effective elementary, secondary, and postsecondary curricula? Among these, which are commonly found in curricula today? Which are missing?
b. What do teachers need (including preparation and training, tools, and resources) to be able to deliver CS education effectively?
c. What factors are important in promoting student interest in CS?

To be assured consideration, comments must be received at one of the addresses provided below, no later than 5 p.m. on January 31, 2011.

Lawmakers say cybersecurity is a top priority in 2011

Cybersecurity will be a top priority for the Republican-led House in 2011, but it is unknown when Congress will act on legislation to revamp an outdated federal cyber law, say aides to incoming GOP leaders. Details likely will emerge when Rep Mac Thornberry (R-TX), the new vice chairman of the Armed Services Committee, speaks early in the next Congress about defending cyberspace, say information security experts. On Dec. 15, Speaker-designate John Boehner (R-OH) tapped Rep Thornberry "to lead an initiative on cybersecurity that cuts across committee lines." Thornberry aides declined to comment on his agenda this week.

Politics goes mobile

More than a quarter of American adults – 26% – used their cell phones to learn about or participate in the 2010 mid-term election campaign. In a post-election nationwide survey of adults, the Pew Research Center’s Internet & American Life Project found that 82% of adults have cell phones. Of those cell owners, 71% use their phone for texting and 39% use the phone for accessing the Internet. With that as context, the Pew Internet survey found that:

  • 14% of all American adults used their cell phones to tell others that they had voted.
  • 12% of adults used their cell phones to keep up with news about the election or politics.
  • 10% of adults sent text messages relating to the election to friends, family members and others.
  • 6% of adults used their cells to let others know about conditions at their local voting stations on election day, including insights about delays, long lines, low turnout, or other issues.
  • 4% of adults used their phones to monitor results of the election as they occurred.
  • 3% of adults used their cells to shoot and share photos or videos related to the election.
  • 1% of adults used a cell-phone app that provided updates from a candidate or group about election news.
  • 1% of adults contributed money by text message to a candidate or group connected to the election like a party or interest group.

President Obama signs bill to fund government until March

President Barack Obama signed a bill funding the government until March, the White House said, postponing a struggle among lawmakers over spending and the deficit until next year.

Coalition Cautions Against Action That Undermines Net Freedoms

A coalition of public interest, privacy and civil liberties groups released an open letter to the Obama Administration and lawmakers urging them not to push legislation that might weaken free expression or hamper online freedoms in response to the release of classified documents by WikiLeaks. In the letter, the groups noted that some critics of the whistleblower website have suggested that the Espionage Act be extended to WikiLeaks for releasing sensitive government documents to the public, which most recently included a batch of U.S. diplomatic cables. "We urge caution against any legislation that could weaken the principles of free expression vital to a democratic society or hamper online freedoms," according to the letter signed by the American Civil Liberties Union, American Library Association, the Electronic Frontier Foundation, the Center for Democracy and Technology and others.

CIA launches task force to assess impact of U.S. cables' exposure by WikiLeaks

The Central intelligence Agency (CIA) has launched a task force to assess the impact of the exposure of thousands of US diplomatic cables and military files by WikiLeaks.

Officially, the panel is called the WikiLeaks Task Force. But at CIA headquarters, it's mainly known by its all-too-apt acronym: WTF. The irreverence is perhaps understandable for an agency that has been relatively unscathed by WikiLeaks. Only a handful of CIA files have surfaced on the WikiLeaks Web site, and records from other agencies posted online reveal remarkably little about CIA employees or operations. Even so, CIA officials said the agency is conducting an extensive inventory of the classified information, which is routinely distributed on a dozen or more networks that connect agency employees around the world. And the task force is focused on the immediate impact of the most recently released files. One issue is whether the agency's ability to recruit informants could be damaged by declining confidence in the U.S. government's ability to keep secrets.

Network Neutrality Rules May Signal A Change in Wireless Pricing

[Commentary] The Federal Communications Commission implementation of rules around network neutrality may open up a change in the way carriers price mobile broadband -- and it’s not going to get cheaper. For U.S. operators the question of whether or not charging someone for a Facebook plan, or for prioritized access to online video would run afoul of FCC regulations was always an issue. So while I don't expect Verizon to change its pricing tomorrow, the fact that there are a set of rules out (or almost out since the full text of the order still isn't available) will make it far easier for operators to plan for pricing changes that won't run afoul of the FCC or will intentionally run afoul of the FCC in order to test its authority.

Europe seen needing regulation on Internet access

Europe's confidence that it need not follow the United States in adopting rules to ensure fair Internet access may be short-lived, as competition between mobile operators and service providers like Skype intensifies.

A debate over network neutrality -- the principle that all Internet traffic be treated equally -- has been heating up in the United States for years but has so far generated little public concern in Europe. At stake is the ability of Internet service providers (ISPs) to ration access to their networks, allowing them to manage congestion but running the risk they will favor their own services or those who pay more, restricting consumer choice. In Europe, telecoms operators such as Deutsche Telekom, France Telecom or Telefonica -- former state monopolies which typically have close relationships with national governments -- still have the upper hand. The European Commission has so far refrained from legislating to avert a looming conflict with the likes of Skype, Google or Facebook, which offer virtually free voice communications and messaging, striking at the heart of the carriers' business. But Internet service providers (ISPs) -- mainly telcos in Europe -- already actively manage traffic to make it more efficient, and the potential to do more to protect their own services or earn extra revenues may be too much to resist.