October 2013

What's your Internet privacy personality?

Why are some of us content to share more online while others are more comfortable keeping a low profile? It has everything to do with personality, according to a recent study from MasterCard that found that traditional demographics such as age, gender and race are actually poor indicators of individual attitudes toward online privacy.

Theodore Iacobuzio, MasterCard’s vice president in charge of “global insights,” said that demographics are really secondary in gauging how people feel about online privacy and that the main indicator lies in users’ motivations for going online. Based on MasterCard’s research, Iacobuzio and his team defined five privacy online personality types: passive users, proactive protectors, solely shoppers, open sharers and simply interactors. For merchants, he said, there’s also value in identifying certain types of people based on their activity, such as “open sharers” or “solely shoppers.” Those two personality types alone make up around 40 percent of all online shoppers, he said, and if companies can identify those users, then they can make their ads more focused and efficient.

Sen. Wyden vows to battle 'skin deep' NSA reforms

Sen. Ron Wyden (D-OR) vowed to battle legislative proposals that would institute only superficial reforms to National Security Agency surveillance. He warned that the goal of senior intelligence officials and their allies in Congress is to ensure that any reforms in the wake of leaks by Edward Snowden are only "skin deep."

"They will pull out all the stops to try to hold off real reforms," Sen. Wyden said. He argued that proposals that would ratify the NSA's programs would actually empower the agency's ability to peer into people's private lives. The Foreign Intelligence Surveillance Court approved the collection of US phone data in secret and has imposed certain restrictions on the NSA's handling of the phone data. For example, analysts must have a “reasonable articulable suspicion” that a phone number is associated with terrorism before searching the database. Senate Intelligence Committee Chairwoman Dianne Feinstein’s (D-CA) bill would codify many of those existing restrictions into law. But Sen. Wyden warned that such legislation would make the "constitutionally-flawed" NSA program more permanent. He argued that the framers intended the Fourth Amendment to prohibit the kind of indiscriminate record collection the NSA is now conducting.

ISS urges vote against Murdoch at Fox's shareholder meeting

Proxy advisory group Institutional Shareholder Services (ISS) has urged Twenty-First Century Fox shareholders to vote against the reelection of Chairman Rupert Murdoch and some other board members at an annual shareholders meeting, criticizing the company's adoption of a poison pill.

News Corp in May 2013 put in place a poison pill provision for one year after the splitting off its media and entertainment businesses, seeking to prevent hostile takeovers. It will be triggered if someone acquires more than 15 percent of the stock of either company. Saying the company should have put the plan to a shareholder vote, ISS called for an independent board chairman to replace Murdoch.

Comcast-Backed Cell Tower Firm Lands Financing, Buys Five Towers

CTI Towers, a wireless tower operator formed by Comcast Ventures in 2011, has secured $30 million in debt financing to fuel future merger and acquisition activity and has wrapped up its first third-party acquisition -- the purchase of five towers from a “major wireless carrier.”

CTI Towers declined to identify the seller, but the newly acquired towers are located in North Carolina, South Carolina, Ohio, Mississippi and Pennsylvania. The company has leased space to all the big names in US cellular -- AT&T, Verizon Wireless , Sprint Nextel, T-Mobile, Leap Wireless, and MetroPCS -- as well as “many broadcasters,” according to the CTI Towers Web site. CTI Towers said it has already received carrier inquiries for leasing the towers since the acquisition. The company noted that it has acquired 230 towers so far, adding that it will use the financing “to accelerate its acquisition pipeline as it continues to enhance its position as one of the top 10 largest wireless tower operators in the US.”

For-Profits Dominate Market for Online Teacher Prep

Online teacher education is probably the fastest-growing sector of teacher preparation. For-profit online institutions are now being joined by brick-and-mortar universities, and startups, both public and private. Online teacher preparation has typically served practicing teachers seeking recertification or master's degrees to help them move up the salary scale. Only since the early 2000s has initial preparation online begun to make a mark.

The provider marketplace remains dominated by for-profit institutions -- some operating wholly online -- but the competition has been impossible for brick-and-mortar institutions to ignore. Of the 674 institutions responding to queries about online teacher preparation in a data-collection effort conducted by the American Association of Colleges for Teacher Education, 36 offered at least one wholly online undergraduate education program as of the 2009-10 academic year, and 140 offered at least one online-only master's program for initial certification. A whopping 74 percent of the institutions surveyed offered some courses online.

The upside of PRISM: At least we’re talking about data privacy — or the lack thereof

Some shrug off the notion of government data collection as the price we pay for security; others worry about how much we still don’t know about what happens with our data. Thanks to National Security Agency whistleblowers up to and including Edward Snowden and his PRISM revelations, government data mining of personal information is the topic of cocktail party chit chat. And it’s not just the government. Recent research shows that consumers distrust Facebook more than the NSA. Different perp, same problem. So how worried is the public? Well, it’s not panic time, but concern is growing as evidenced by Pew Internet Research and other studies, according to Kate Crawford, principal researcher with Microsoft Research. Ari Gesher, senior engineer with Palantir Technologies, said the upside of all this PRISM drama is it brings the topic to a broader audience.

CPB appropriation arrives despite federal shutdown

Public broadcasting’s federal subsidies were not caught up in the political stalemate that forced closure of the federal government Oct. 1. The US Treasury delivered the Corporation for Public Broadcasting’s $445 million fiscal 2014 appropriation that same day, as scheduled, while political leaders in Congress and the White House wrangled over tea party Republicans’ push to repeal the Affordable Health Care for America Act. The federal budget that has been held up by a faction of GOP lawmakers will determine CPB’s funding for 2016.

3 essential techniques to protect your online privacy

The Web is a wild place, with more than the National Security Agency potentially out to get you. With the so-called six strikes antipiracy initiative in full effect, you never know if Hollywood is monitoring your peer-to-peer activity. Then there are the malicious hackers trying to reset e-mail, Facebook, and Twitter passwords. No security regimen short of complete hermitage can keep you 100 percent secure. Nevertheless, you can take a few simple precautions to maintain your privacy online and deter all but the most determined bad guys.

  1. Secure the line: One of the worst online security mistakes you can make is to connect to an email, bank, or other sensitive account over public Wi-Fi. Use VPN instead.
  2. Stop leaving private data in the cloud: You can build one yourself by encrypting data on your PC before sending it to Dropbox, using free software such as BoxCryptor or the open-source TrueCrypt. A far simpler method, though, is to find a file-syncing service that offers built-in storage encryption.
  3. Secure your online services with two-factor authentication: requires you to enter a short numeric code in addition to your password before you can gain access to your account. The code usually comes from a physical fob or from a smartphone application. The good news is that you can get most of your two-factor authentication codes from Google's Authenticator app for Android and iOS.

New America Foundation's Open Technology Institute and the Time Warner Cable Research Program on Digital Communications
Wednesday, October 23, 2013
8:30 - 10:00 a.m.
http://newamerica.net/events/2013/solving_the_spectrum_crunch

The New America Foundation's Open Technology Institute and the Time Warner Cable Research Program on Digital Communications invite you to attend the release and discussion of a policy paper, by Michael Calabrese, that describes how Wi-Fi and unlicensed band sharing is transforming spectrum "scarcity" into abundance.

The most encouraging contradiction in telecom policy today is the gap between claims of a "looming spectrum crisis" and the reality that consumers rely increasingly on unlicensed spectrum to satisfy their exploding demand for video, music and other apps on mobile devices.

Cable and other wireline ISPs will soon offload the vast majority of mobile traffic over tens of millions of consumer- and carrier-provisioned Wi-Fi hotspots. This is already happening in Europe. It will happen in the U.S. as well - but only if more underutilized bands are opened for shared access.

The paper is available here: http://www.twcresearchprogram.com/pdf/TWC_Calabrese.pdf

Featured Speakers
Michael Calabrese
Director, Wireless Future Project, New America Foundation

Rob Alderfer
Senior Strategic Analyst, Cable Labs

Mike Roudi
Senior Vice President, Time Warner Cable

Moderator:
Fernando Laguarda
Vice President, External Affairs and Policy Counselor at Time Warner Cable

Breakfast will be served.



New America Foundation
Thursday, October 17, 2013
2:00 p.m. - 3:30 p.m.
http://newamerica.net/events/2013/obama_and_the_press

In an upcoming report, the Committee to Protect Journalists investigates the chilling effect of the Obama administration's war on leaks and other efforts to control information. The report -"The Obama Administration and the Press: Leak investigations and surveillance in post-9/11 America," which is written by Leonard Downie Jr., former Washington Post executive editor and now the Weil Family Professor of Journalism at Arizona State University's Walter Cronkite School of Journalism and Mass Communication - will be released on Thursday, October 10. The report is CPJ's first comprehensive report on press freedom conditions in the United States.

Featured Speakers
Joel Simon
Executive Director, Committee to Protect Journalists

Leonard Downie Jr.
Weil Family Professor of Journalism, Walter Cronkite School of Journalism and Mass Communication, Arizona State University

Rajiv Chandrasekaran
Senior Correspondent and Associate Editor, The Washington Post

Moderator
Kurt Wimmer
Chair, Privacy and Data Security, Covington & Burling LLP

Introduction
Fuzz Hogan
Managing Editor, New America Foundation

Join the conversation online by tweeting @NewAmerica with the hashtag #ObamaAndThePress