Today, Yaana Technologies, LLC filed ex partecomments in the FCC’s new Ray Baum’s Act Sec. 503 proceeding being instituted by Commission as part of its 14 February 2019 agenda. This note explains what the Ray Baum’s Act section and new proceeding are about, who Yaana is, what the company said to the FCC Commissioners, and the larger context of spoofing internationally.
There is considerable rhetoric propagated today about 5G security. Some of the more blatant assertions border on xenophobia with vague assertions that the 5G vendors from some countries cannot be trusted and wholesale government banning is required. Existing treaty obligations are being summarily abrogated in favor of bilateral trade bullying. These are practices that the […]
Broadband Consumer Privacy Changes and Implications for Internet Service Providers for Business Intelligence
On March 23, 2017, the Senate approved a resolution to undo Obama administration Federal Communications Commission (FCC) rules relating to internet privacy and Internet Service Provider (ISP) ability to collect, use, and share this information which puts ISPs on equal footing with over-the-top (OTT) service providers like Google and Facebook under Federal Trade Commission (FTC) requirements.
On December 20, 2016, the House Energy and Commerce Committee’s Encryption Working Group released its Year-End Report. Although, the topic invites politics and rhetoric by its nature, and its conclusions of more “exploration” are certainly appropriate, the report also falls short in several areas.
The industry’s principal Network Functions Virtualization (NFV) standards venue wrapped up the year in the world’s powerhouse electronics capital, Shenzhen, December 12-15, hosted by Huawei Technologies. 176 participants under the leadership of newly elected plenary chair Diego Lopez of Telefónica, fielded 80 input documents. The event included multiple NFV sub-group meetings, a joint meeting with the MEC (Mobile Edge Computing) standards group, a Huawei workshop, and a special 5G session. ETSI also provided an update on the first NFV plugtests for interoperability among almost every vendor being held in Madrid for the week beginning January 23.
The advent of digital telephony has revolutionized office communications. Now, instead of a single office number and extension numbers, each office desk phone could have its own direct dial number. Now, when somebody calls you, their desk number can be displayed and you know exactly who is calling you.
Arguably the most significant cybersecurity development of 2015 was a stunner. On Friday, 18 December 2015 – with everyone leaving on the holidays – the U.S. Congress unexpectedly passed the Cybersecurity Act of 2015 and it was immediately signed by the President. It became the organic law of the United States, including far reaching amendments to the Homeland Security Act of 2002.
Wireless infrastructure networks are constantly evolving. Often mobile service providers must maintain multiple generations in order to support new and legacy services. Unfortunately we don’t see this getting any easier anytime soon with the emergence of VoLTE and 5G on the horizon.
It seems a fortuitous coincidence with the publication now occurring of the eWarrant Technical Standard ETSI TS103120, that a kind of legal landmark is occurring on December 1st in the U.S.
Almost every day, the press carries some latest assertion by Apple or assorted self-proclaimed encryption experts that smartphone devices must be unalterably encrypted. A virtual army of bloggers and lobbying groups have joined the fray to ramp up anti-government paranoia and convince users and the public that highly encrypted smartphones are good for the world. Never mind that the capability primarily benefits terrorists and criminals.