Attorney General Eric Holder recently stressed the DOJ’s high priority of resolving the current public safety spectrum dispute, with past statements suggesting his preference to reallocate the spectrum.
Attorney General Eric Holder recently stressed the DOJ’s high priority of resolving the current public safety spectrum dispute, with past statements suggesting his preference to reallocate the spectrum.
As the FCC and Congress struggle to find a workable solution to the growing botnet menace, Japan’s Cyber Clean Center has willingly entered the arena.
GigaOM shares some interesting stats on how internet use has evolved in recent years, complete with pie graphs!
In another instance of technology racing ahead of the law, some petty criminals have allegedly started stealing virtual items from a virtual home, leading to police investigation.
Kelley Currie at the Weekly Standard Blog writes on the State Department’s failure to adequately support the Global Internet Freedom Consortium, despite having ample funding from Congress. Currie suggests complications may be due in part to the Constortium’s connection to the Falun Gong movement.
The article also links to a must-read piece written by Ronald Deibert and Rafal Rohozinski in the Journal of Democracy entitled Liberation vs. Control: The Future of Cyberspace. Check both out.
Eric Schmidt and Jared Cohen have an interesting piece over at Foreign Affairs discussing the dynamic nature of information technology and its effects (both positive and negative) on global political affairs, as well implications for the future. A brief excerpt:
In the decade that followed, technology helped achieve another significant step in reducing the power of intermediaries and in short-circuiting regimes bent on silencing opposition voices. Activists and human rights campaigners in the Soviet Union and Eastern Europe used photocopiers and fax machines to spread their own messages and foment unrest. The technology of today holds even more promise: comparing the uncertain dial tone of the fax machine with the speed of today’s handheld devices is like comparing a ship’s compass to the power of global positioning systems.
Read the full piece here.
When an extremist group shuts down US infrastructure, it’s labeled a terrorist attack, but when the US does it to another country, it’s merely cybersecurity.
What follows are some highlights in the 30-year history of hacking and information warfare.
With Halloween right around the corner, many of us are casting about for creative costume ideas. Here’s a suggestion for a truly frightening option — try being a cyber criminal or a terrorist.