August 2012

South Korea Policing the Net

A government critic who called the president a curse word on his Twitter account found it blocked. An activist whose Twitter posting likened officials to pirates for approving a controversial naval base was accused by the navy of criminal defamation. And a judge who wrote that the president (“His Highness”) was out to “screw” Internet users who challenged his authority was fired in what was widely seen as retaliation. Such a crackdown on Internet freedom would be notable, but perhaps not surprising, in China, with its army of vigilant online censors. But the avid policing of social media in these cases took place in South Korea, a thriving democracy and one of the world’s most wired societies. The seeming disconnect is at least partly rooted in South Korea’s struggle to manage the contradictions in eagerly embracing the Web as one way to catch up with the world’s top economies, while clinging to a patriarchal and somewhat puritanical past. In a nation so threatened by Lady Gaga that it barred fans under age 18 from attending a concert, the thought of unlimited opportunities for Internet users to swear in “public,” view illegal pornography and challenge authority has proved profoundly unsettling.

Google to Buy Frommer's Travel Brand

Google is acquiring the Frommer's travel brand from publicly traded John Wiley & Sons for an undisclosed price in order to bolster its offerings of local reviews around the world.

Google sees an opportunity to broaden its consumer offerings outside of restaurant reviews. That Frommer's provides information about hotels and destinations globally made the acquisition that much more attractive. The deal is expected to close shortly. Google hasn't yet decided whether the Frommer's guidebooks will continue to be published in print or whether they will eventually migrate entirely to online. It is also possible that the Frommer's brand could be melded into the Zagat brand. One publisher suggested it was unlikely that the Frommer's sale would generate significant antitrust concerns. "The travel book business is small potatoes even for the Justice Department," said Bill Newlin, publisher of Avalon Travel, an imprint of the Perseus Books Group that publishes travel expert Rick Steves and the Moon branded guides. Newlin isn't worried about Frommer's titles getting an unfair advantage in search, either. "There's only one way to spell Rick Steves," he said.

Frommer's dates back to 1957, when Arthur Frommer, founder of the Frommer's series, with a book that offered travel advice to Americans visiting Europe for those able to spend $5 a day. Wiley acquired the Frommer's brand in 2001.

Running for the presidency, you'd better be on social media

Traditional media took a backseat to the digital domain on August 11 with Mitt Romney's camp announcing the presidential candidate's running mate — Rep Paul Ryan (R-WI) — via Twitter, Facebook and a "VP app" before sharing the news on TV. "Mitt's VP app" updated around 7 a.m. ET with word that Ryan had been selected. At 7:43 a.m., Romney tweeted that Ryan was his choice. Less than an hour later, Ryan sent out his first tweet from a new "PaulRyanVP" Twitter profile saying that he was "honored" to join Romney's team. A fresh Facebook page, under the "Paul Ryan VP" moniker, also appeared early Saturday. A little after 9 a.m., the duo shared their news via a televised event in Norfolk (VA).

Pentagon proposes more robust role for its cyber-specialists

The Pentagon has proposed that military cyber-specialists be given permission to take action outside its computer networks to defend critical U.S. computer systems — a move that officials say would set a significant precedent.

The proposal is part of a pending revision of the military’s standing rules of engagement. The secretary of defense has not decided whether to approve the proposal, but officials said adopting the new rules would be within his authority. “Without a doubt it would be a very big and significant step forward,” said a senior defense official, speaking on the condition of anonymity to discuss a sensitive topic. “It would account for changes in technology that will give more flexibility in defending the nation from cyberattack.” Currently, the military is permitted to take defensive actions or to block malicious software — such as code that can sabotage another computer — only inside or at the boundaries of its own networks. But advances in technology and mounting concern about the potential for a cyberattack to damage power stations, water-treatment plants and other critical systems have prompted senior officials to seek a more robust role for the department’s Cyber Command.

Sen Rockefeller calls on Obama to issue cybersecurity executive order

Sen. Jay Rockefeller (D-WV) urged President Barack Obama to issue an executive order that would establish a program in which companies operating critical infrastructure would take steps to bolster the security of their computer systems from a cyberattack.

He said President Obama could issue an executive order to implement a section of that bill that would have encouraged operators of critical systems to adopt tighter security standards. "[B]ecause it is very unclear whether the Senate will come to agreement on cybersecurity legislation in the near future, I urge you to explore and employ every lever of executive power that you possess to protect this country from the cyber threat," Sen Rockefeller wrote in a letter. "We must act to address our cyber vulnerabilities as soon as possible and many components of the Cybersecurity Act are amenable to implementation via executive order, normal regulatory processes, or other executive action under the authorities of the Homeland Security Act."

Sens Lieberman, Collins split on cyber exec order

The architects of the Senate’s lagging cybersecurity bill don’t exactly see eye to eye on whether the Administration should implement reform by fiat.

Sen. Joe Lieberman (I-CT) said he still hopes Congress can finalize a law this year, but he added: “[If] Congress cannot get its act together to protect our nation from the real, urgent and growing threat of cyber attack, then the president must do everything he can by executive order.” That said, the Senate Homeland Security and Governmental Affairs Committee chairman acknowledged there’s just “some things” an executive order can’t accomplish (potentially including liability protection) that instead “can only be done by statute.” Yet Lieberman’s close ally, Sen. Susan Collins (R-Maine), isn’t so fond of the idea. “Given the threat, I understand the administration’s desire to act, but an executive order should not be a substitute for legislative action,” she said in a statement. “I am deeply disappointed that the Senate failed to pass our bipartisan bill before the August recess, but it remains imperative that this Congress address this issue. An executive order could send the unintended signal that congressional action is not urgently needed.”

How Big Data Became So Big

The Big Data story is the making of a meme. And two vital ingredients seem to be at work here.

The first is that the term itself is not too technical, yet is catchy and vaguely evocative. The second is that behind the term is an evolving set of technologies with great promise, and some pitfalls. Big Data is a shorthand label that typically means applying the tools of artificial intelligence, like machine learning, to vast new troves of data beyond that captured in standard databases. The new data sources include Web-browsing data trails, social network communications, sensor data and surveillance data. The combination of the data deluge and clever software algorithms opens the door to new business opportunities.

Data brokers push back against congressional scrutiny

An advertising trade association dismissed lawmakers' concerns about companies that buy and sell information about consumers.

A bipartisan group of House lawmakers wrote to major data brokers last month and questioned them about their business practices. “By combining data from numerous offline and online sources, data brokers have developed hidden dossiers on almost every U.S. consumer,” the lawmakers wrote. “This large scale aggregation of the personal information of hundreds of millions of American citizens raises a number of serious privacy concerns." But in a response, the Digital Marketing Association said the lawmakers are questioning "legitimate commercial data practices that are essential to America’s job creation, economic growth and global leadership." The group said that targeted advertising is "the fuel on which America’s free market engine runs."

T-Mobile USA Said To Be Target Of Trujillo Buyout Attempt

Apparently, former telecommunications executive Sol Trujillo is trying to drum up interest in a buyout of Deutsche Telekom’s T-Mobile USA unit and has so far been unsuccessful in pitching a deal to private-equity firms including Blackstone Group and KKR & Co.

The former head of phone companies U.S. West Communications, Orange SA and Australia’s Telstra has approached the firms about bidding for all or part of T-Mobile USA, the country’s fourth-largest wireless carrier. The private-equity firms that have held preliminary discussions with Trujillo have reacted with skepticism to the proposal due to its size and cost of financing, the people said. The unit may now be worth $30 billion, with its mobile-phone frequencies the most valuable element, said Atlantic Equities analyst Christopher Watts.

Hackers Steal, Encrypt Health Records and Hold Data for Ransom

As more patient records go digital, a recent hacker attack on a small medical practice shows the big risks involved with electronic files.

The Surgeons of Lake County, located in the affluent northern Illinois suburb of Libertyville, revealed last month that hackers had burrowed deeply into its computer network, infiltrating a server where e-mails and electronic medical records were stored. But unlike many other data breaches, the hackers made no attempt to keep their presence a secret. In fact, they all but fired a flare to announce the break-in, taking the extreme step of encrypting their illicit haul and posting a digital ransom note demanding payment for the password. The doctors turned the server off and notified the authorities, refusing to pay.