Clearwire’s Dynamic Network Management System

Clearwire has recently enhanced its network management system to selectively throttle speeds for its heaviest users during peak times.

Fannie Mae Logic Bomber Convicted

Former UNIX engineer for Fannie Mae was convicted for the logic bomb he placed in the company’s network. The logic bomb, which was targeted to erase all financial, securities, and mortgage data, was discovered before it was scheduled to execute.

HTML 5 Spurs Privacy Concerns

HTML 5, the language from which much of the web will soon operate, contains a number of new capabilities that raise privacy concerns for users.

Cyberwarfare Works on Same Premises as Nuclear War

Proliferation is a real problem, and no country is prepared to deal with it,” said Melissa Hathaway, a former United States national cybersecurity coordinator.

Progress is slow on cybersecurity goals, GAO reports

The White House’s failure to assign agencies cybersecurity roles and responsibilities has slowed efforts to implement President Obama’s plan for protecting computer networks, according to a new report from the Government Accountability Office.

Map Of Online Communities: 2010 vs. 2007

A map of online communities in 2010.  Much has changed since the days of only email and sms.

FBI Director Pushes To Expand Telecom Wiretap Laws

FBI Director Robert Mueller  called for changes in federal law to help his agents with surveillance of communications in anti-terrorism and other criminal investigations.

Bruce Schneier: On Stuxnet

Bruce has a thoughtful post about the Stuxnet worm .  Worth reading.

US heavily preparing for cyberwarfare

CNBC has a good piece from Reuters discussing US  efforts in preparing for cyberwarfare and some of the issues that remain paramount today, including fostering partnership between the public and private sectors, the question of segregating portions of networks into secure zones (including who makes those determinations and how), as well as the development and deployment of “cyber arms” in future conflicts.

ACTA Lite?

Nate Anderson over at ARS Technica reports on the release of the ACTA treaty text and how the US largely failed to secure enough support for many of its positions.  Anderson noted the following Internet related developments:

Internet piracy. In earlier drafts, ISPs were told that they must have a policy for disconnecting repeat infringers (something already in the DMCA) in order to steer clear of liability, and disconnecting users after “three strikes” was held up as a model. All of this is gone, reduced to a mere footnote saying that countries can do what they want to limit ISP liability.

IP lookups. Each country does need to provide some way for rightsholders to turn an IP address into a name. Many countries have this already; in the US, it’s a subpoena, while a “Norwich Pharmacal Order” in the UK accomplishes the same thing.

You can visit this link for the ACTA text itself.