AG Wants to Settle Future of D-Block

Attorney General Eric Holder recently stressed the DOJ’s high priority of resolving the current public safety spectrum dispute, with past statements suggesting his preference to reallocate the spectrum.

Fighting Botnets, Japanese Style

As the FCC and Congress struggle to find a workable solution to the growing botnet menace, Japan’s Cyber Clean Center has willingly entered the arena.

Interesting Stats on Internet Use

GigaOM shares some interesting stats on how internet use has evolved in recent years, complete with pie graphs!

Virtual Burglaries Highlight Brave New World

In another instance of technology racing ahead of the law, some petty criminals have allegedly started stealing virtual items from a virtual home, leading to police investigation.

Complications in Promoting Internet Freedom

Kelley Currie at the Weekly Standard Blog writes on the State Department’s failure to adequately support the Global Internet Freedom Consortium, despite having ample funding from Congress.  Currie suggests complications may be due in part to the Constortium’s connection to the Falun Gong movement.

The article also links to a must-read piece written by Ronald Deibert and Rafal Rohozinski in the Journal of Democracy entitled Liberation vs. Control: The Future of Cyberspace.  Check both out.

Connectivity and the Diffusion of Power

Eric Schmidt and Jared Cohen have an interesting piece over at Foreign Affairs discussing the dynamic nature of information technology and its effects (both positive and negative) on global political affairs, as well implications for the future.  A brief excerpt:

In the decade that followed, technology helped achieve another significant step in reducing the power of intermediaries and in short-circuiting regimes bent on silencing opposition voices. Activists and human rights campaigners in the Soviet Union and Eastern Europe used photocopiers and fax machines to spread their own messages and foment unrest. The technology of today holds even more promise: comparing the uncertain dial tone of the fax machine with the speed of today’s handheld devices is like comparing a ship’s compass to the power of global positioning systems.

Read the full piece here.

Cyberwarfare: US Seeks To Shut Down Enemy Power Grids

When an extremist group shuts down US infrastructure, it’s labeled a terrorist attack, but when the US does it to another country, it’s merely cybersecurity.

Cyber Crime and Information Warfare: A 30-Year History

What follows are some highlights in the 30-year history of hacking and information warfare.

The Scary Reality of Our Cyber Vulnerability

With Halloween right around the corner, many of us are casting about for creative costume ideas. Here’s a suggestion for a truly frightening option — try being a cyber criminal or a terrorist.