February 2013

Legal and Regulatory Framework For Next Generation 911 Services

This Report to Congress is submitted by the Chairman, Federal Communications Commission, pursuant to Section 6509 of the Next Generation 9-1-1 Advancement Act of 2012 (NG911 Act), enacted as part of the Middle Class Tax Relief and Job Creation Act of 2012.

Prepared by Commission staff in the Public Safety and Homeland Security Bureau, this report contains recommendations for the legal and statutory framework for Next Generation 911 (NG911) services. In this Report, the identifies potential steps for Congress to take to create a legal and regulatory environment that will assist states, PSAPs, service providers and other stakeholders in accelerating the nationwide transition from legacy 911 to NG911. These recommendations focus on three areas identified by the statute.

Fight over cyber information-sharing bill revived at RSA

Congress will soon make an historic decision over whether a military or civilian agency should head up intelligence-sharing efforts about cyber threats, argued Jim Dempsey, vice president for public policy at the Center for Democracy and Technology, during a panel at the RSA cybersecurity conference in San Francisco.

"In democratic society, do you want the military to have this center of gravity kind of control over what could potentially be very, very large flows of information about private to private communications?” Dempsey asked. "You can talk about creating a lot of checks and balances, [but] one of the fundamental checks and balances is you put that authority on the civilian side." Dempsey's comments come as Congress is weighing a controversial cybersecurity bill that aims to remove the legal barriers that hinder government agencies and private companies from sharing information about malicious source code and other cyber threats with one another in real time. Reps. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD), leaders of the House Intelligence Committee, re-introduced the Cyber Intelligence Sharing and Protection Act, known as CISPA, earlier this month.

Researchers discover new global cyber-espionage campaign

Security researchers have identified an ongoing cyber-espionage campaign that compromised 59 computers belonging to government organizations, research institutes, think tanks, and private companies from 23 countries in the past 10 days.

The attack campaign was discovered and analyzed by researchers from security firm Kaspersky Lab and the Laboratory of Cryptography and System Security (CrySyS) of the Budapest University of Technology and Economics. Dubbed MiniDuke, the attack campaign used targeted email messages -- a technique known as spear phishing -- that carried malicious PDF files rigged with a recently patched exploit for Adobe Reader 9, 10, and 11. The exploit was originally discovered in active attacks earlier this month by security researchers from FireEye and is capable of bypassing the sandbox protection in Adobe Reader 10 and 11. Adobe released security patches for the vulnerabilities targeted by the exploit on Feb. 20. The new MiniDuke attacks use the same exploit identified by FireEye, but with some advanced modifications, said Costin Raiu, director of Kaspersky Lab's global research and analysis team, on Wednesday. This could suggest that the attackers had access to the toolkit that was used to create the original exploit. The malicious PDF files are rogue copies of reports with content relevant to the targeted organizations and include a report on the informal ASEM (Asia-Europe Meeting) seminar on human rights, a report on Ukraine's NATO membership action plan, a report on Ukraine's regional foreign policy, and a report on the 2013 Armenian Economic Association, and more.

Internet Sleuths Add Evidence to Chinese Military Hacking Accusations

Regular users of the Internet have been busy in the week since The New York Times reported that Mandiant, a computer security firm, had tied a prolific Chinese hacking group to a specific People’s Liberation Army unit in Shanghai. Chinese-speaking users and amateur hackers have scoured the Internet for traces of the online personas of those who Mandiant claims work on behalf of China’s P.L.A. Unit 61398.

The new evidence, while circumstantial, adds to the signs suggesting Chinese military efforts to hack into American corporate computer systems. Mandiant said that in one case, people were able to trace one of the P.L.A.’s hackers to an apartment building located 600 meters from the military unit’s headquarters. In another, they were able to trace one hacker back to the P.L.A.’s Information Engineering University, described by American computer security researchers as one of the Chinese military’s top training schools for computer hacking. They also found recruitment notices for Unit 61398, suggesting the group has been active since at least 2004, despite the fact that the unit’s headquarters were not built until later.

Cyber Warriors Will Be Embedded in Military Commands

Troops fighting in the growing combat area of cyberspace will operate from keyboards situated within each geographic military command, Cyber Command officials said.

The 900-member Maryland-based organization that is subordinate to the Nebraska-headquartered Strategic Command could mushroom from 900 to 4,900 cybersecurity professionals, sequester permitting. While the locations of the personnel have been decided, the size and composition of the workforce have not. Each military service has distinct cyber support needs, officials said, and Cyber Command, like many information technology outfits, is suffering from a talent shortage. There also is the wild factor of looming budget cuts that begin on March 1 unless lawmakers compromise on deficit-reduction legislation. The cyberfighters, responsible for attacking the computers of adversaries and protecting Pentagon networks, are geographically embedded, "actually out there with all the other commands," Maj. Gen. Jennifer Napper, Cyber Command director of plans and policy, told Nextgov. "We work with every single one of the other CoComs." She was interviewed offstage after a Feb. 22 discussion on cyber defense teamwork hosted by the Armed Forces Communications and Electronics Association.

Copyright's Impact on Free Expression Rights

[Commentary] Exclusive rights conferred by intellectual property laws can conflict with human rights. Yet policy makers rarely acknowledge this possibility and continue to make IP rules that increase the scope of exclusive rights.

In a recent decision the European Court of Human Rights (ECHR) disagreed, recognizing that copyright laws can have an adverse impact on the freedom of expression. Scholars point out that the court is likely to hear more such cases in future. The case in question is Ashby Donald and Others v. France. The case concerned three photographers who had taken photos at fashion shows in Paris and posted them on the Internet site, Viewfinder. It appears that under French law, the photographers required the fashion house’s permission to post these photos. Because that permission was not obtained, the French courts ruled that the posting amounted to copyright infringement. The photographers were ordered to pay fines totaling 250,000 euros. They appealed to the European Court of Human Rights (ECHR) arguing that their conviction violated their free expression rights guaranteed under Article 10 of the European Convention.

FCC Announces the Opening of Public Testing for Google's TV Band Database System

The Federal Communications Commission’s Office of Engineering and Technology (OET) announces that on March, 4 2013, it will commence a 45-day public trial of Google’s TV band database system.

This is a limited trial that is intended to allow the public to access and test Google’s database system to ensure that it correctly identifies channels that are available for unlicensed radio transmitting devices that operate in the TV band (unlicensed TV band devices), properly registers radio transmitting facilities entitled to protection, and provides protection to authorized services and registered facilities as specified in the rules. We encourage all interested parties to test the database and provide appropriate feedback to Google.

[ET Docket No. 04-186]

Low-Income Patients Interested in Digital Health Communication

Many lower-income patients say they would like to communicate electronically with their health care providers but are unable to do so because of insufficient technology at the clinics where they receive care, according to a new study published in the Journal of General Internal Medicine. For the study, researchers from the University of California-San Francisco surveyed 416 patients at six San Francisco Department of Public Health community clinics that primarily serve uninsured or publically insured individuals.

The study found that:

  • 78% of the study participants expressed interest in electronic communication with their health care providers;
  • 60% said they use email;
  • 54% said they obtain information from the Internet; and
  • 17% said they already use email to communicate informally with their health care providers.

According
to the researchers, many safety-net clinics do not offer the patient portals or secure messaging systems necessary to support electronic communication with doctors.

Governor Mifflin School District and Filtering of LGBT Online Content

The American Civil Liberties Union and the ACLU of Pennsylvania have sent a letter requesting that school officials at Governor Mifflin School District in Berks County stop using Internet filters that violate students' First Amendment free speech rights. The district uses a "sexuality" filter that blocks sites that express support of lesbian, gay, bisexual, and transgender (LGBT) people, and an "intolerance" filter that blocks political advocacy sites that are labeled as intolerant.

US Cellular divested some of its problems, too

Here's why U.S. Cellular is getting out of the Chicago and St. Louis markets.