In what hopefully will be a useful resource as the FCC and Consumer Advisory Committee work to develop a standardized disclosure format for the voluntary safe harbor established by the 2015 Open Internet Order, this document updates the original Broadband Truth-in- Labeling proposal first offered by OTI in 2009. The new format has been redesigned to reflect the FCC’s current rules on ISP transparency. This format also takes into consideration research regarding consumer decision- making, as well as OTI’s unique experience examining ISPs disclosures to collect the information used to inform OTI’s annual Cost of Connectivity reports.
Book: DRONES AND AERIAL OBSERVATION
NEW TECHNOLOGIES FOR PROPERTY RIGHTS, HUMAN RIGHTS, AND GLOBAL DEVELOPMENT:A PRIMER
Consent of the Networked
The Worldwide Struggle For Internet Freedom
Will the Last Reporter Please Turn Out the Lights
The Collapse of Journalism and What Can Be Done to Fix It
New Technologies and the Transformation of Media Audiences
The Master Switch
The Rise and Fall of Information Empires
Beyond the Echo Chamber
How a Networked Progressive media Can Reshape American Politics
Speak Softly and Carry A Big Stick
How Local TV Broadcasters Exert Political Power
At least a fifth of US households do not currently have Internet service, and inequalities between those who have access and those who do not are stark. For example, the most recent data from the Current Population Survey administered by the US Census Bureau (released in 2014) shows that among ...
It’s been a little over a week since massive amounts of data from the popular cheating website, Ashley Madison, were published online. Although public reaction has been a mix of jokes about happy divorce attorneys and betrayal-karma for users, the hack’s effects will likely spread far beyond the site, to affect anonymity and online security throughout the Internet.
Just before they left for the August recess, Congress reached a tentative agreement to proceed on the controversial Cybersecurity Information Sharing Act of 2015. As part of that agreement, a series of 22 amendments were guaranteed to receive a vote when the full bill comes before the floor. We’ve dug through the amendments and put together summaries of the best… and the worst.
Sinclair said it regretted any inconvenience to Dish subscribers. In a statement Wednesday, Michael Calabrese, director of the Wireless Future Project at the New America Foundation's Open Technology Institute, said the FCC "needs to end these consumer blackouts by imposing a system of alternative dispute ...
In two recent proceedings, the FCC adopted "use it or share it" provisions allowing "opportunistic access" to licensed spectrum when it's not being used, said CSMAC member Michael Calabrese, director of the Wireless Future Project at New America Foundation's Open Technology Institute. “You don ...
Time for the FCC to Rescue the Hostages
Nearly 5 million households receiving their paid TV service from DISH Networks lost access to 129 local TV stations in 36 states operated by Sinclair Broadcast Group late yesterday in the largest single TV blackout in history.
On June 18th, 2015, at the 17th annual Allied Media Conference, over 90 people attended the first ever Community Technology Network Gathering. The event was was an unprecedented gathering of people from all over the world working on technology and inclusion issues. It included coders, civic technologists, network engineers, community wireless advocates, youth media practitioners and bloggers.
Clarifies Definitions of Cybersecurity Threat and Cyber Threat Indicator
CISA’s definition for cybersecurity threat is the lynchpin for all of the authorities it creates. Entities may monitor their systems, sharing cyber threat indicators, and deploy defensive measures, in order to protect against a cybersecurity threat. However, CISA’s definition of cybersecurity threat includes any perceived threat, regardless of whether the action or event would be reasonably likely to cause harm.
Reduces Situational Awareness by Incentivizing Decentralized Information Sharing
CISA authorizes companies to share cyber threat indicators with any federal entity. It incentivizes companies to share indicators with DHS by offering liability protection.
Undermines Cybersecurity and Over-Penalizes Vague Legal Violations
The Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is in need of reform. Several of its provisions are vague, and it fails to provide clear exceptions for the work of security researchers.
Ensures DHS Can Apply Effective Privacy Scrub Before Disseminating Indicators
CISA’s provisions requiring real-time dissemination of cyber threat indicators throughout the government, and its restraints on the privacy guidelines are contradictory.
Michael Calabrese, a member of the Open Technology Institute at the New America Foundation, said in an interview that changing the rules so that negotiation breakdowns don’t lead to blackouts would level the playing field.“If consumer blackouts were off the table, broadcasters would have less leverage, but they would still ultimately be able to obtain a fair market value for their content,” he said in an interview.Calabrese, representing the New America Foundation, was part of a coalition that included Time Warner, DirectTV and the American Cable Association that sent a letter to the FCC in 2013 calling on the agency to play a stronger role in negotiations regarding retransmission fee negotiations. He said the FCC is expected to proceed with the rulemaking process on this issue at next month’s meeting.
Click here to download the full comments as a PDF.
The Open Technology Institute at New America (“OTI”) and Public Knowledge (“PK”) – are pleased to submit these Reply Comments in response to parties filing comments concerning the Second Further Notice of Proposed Rulemaking (“Second FNPRM”) adopted by the Federal Communications ...
When it comes to smartphones, we are living in the midst of a criminal epidemic. There were 3.1 million victims of smartphone theft in 2013, nearly double the number in 2012, according to 2014 estimates by Consumer Reports. According to the same report, only one-third of smartphone users bother to require passcodes to access their phones, while another third take no steps at all to secure the data on their phones. In that environment, Apple’s decision to secure our phones for us using default encryption—thereby deterring theft and protecting the data on stolen phones by making them inaccessible to anyone but their users—is not surprising and is indeed deserving of praise rather than condemnation. What is surprising is to hear top law enforcement officials criticizing a technology that could stem the tide of this criminal epidemic that impacts millions of Americans.
Control over access to critical portions of the Internet’s technical infrastructure (such as the Internet’s domain name system, or “DNS”) is increasingly being used as a means to enforce private and public law around the globe. This "Internet-governance-by-infrastructure” is the subject of my new paper on "Internet Infrastructure and IP Censorship."
Strengthens the Requirement for Companies to Remove Personal Information
The most important improvement the Senate can make to CISA during the amendment and debate process it to enhance the front-end protections for communications content and personally identifiable information (PII) by strengthening the requirement to remove that sensitive and unnecessary information. Strengthening this requirement would reduce all other privacy and civil liberties concerns, since there would be less PII to be mishandled or misused by the government or by companies.
The Senate will once again set its sights on the Cybersecurity Information Sharing Act when legislators return from recess in September. Robyn Greene of the Open Technology Institute breaks down how each of the 22 proposed amendments to CISA would impact the controversial legislation.
In many ways, Verizon’s victory laid the groundwork for the current net neutrality regulations, according to Joshua Stager, policy counsel at New America Foundation’s Open Technology Institute.“The D.C. Circuit opened the door, they just walked through it,” he said, referring to the FCC.
Measurement Lab is participating in the Outreachy (formerly Gnome Outreach Program for Women) May-August 2015 round. Read more to find out how to apply!
Tuesday, August 11, 2015: We've received several new requests for information but we do not have open slots for the next round at the moment. If you'd like to contribute to M-Lab independently, please refer to this page for ways you can get involved. But at this time ...
The Federal Communications Commission (FCC) held its monthly Open Meeting this morning and voted on rules governing next year’s incentive auction of TV band spectrum. The impact of the auction rules on public access to unlicensed spectrum (so-called “TV White Spaces”) and on competition among mobile broadband carriers have been the subject of intense debate in recent weeks. The Wireless Future program encouraged the FCC to adopt rules that protect unlicensed spectrum.
Waiting for Amazon to start delivering your groceries via drone or hoping you’ll have drone-delivered internet sometime soon? While delivery by drone – for food or internet – is not yet a reality, it will be someday. And before that time comes, the U.S. must first address the very real privacy, transparency, and accountability issues related to unmanned aircraft vehicles (UAS).