http://www.investors.com/NewsAndAnalysis/Article.aspx?id=509810
Not much was said when $7.2 billion was included in the stimulus bill "to accelerate broadband deployment in unserved and underserved areas and to strategic institutions that are likely to create jobs or provide significant public benefits." The administration has big plans for the Internet — like controlling it.
They noted that after only a decade, "roughly two-thirds of Americans connect through high-speed communications that are available to 95% of households."
"Unfortunately, the powerful cable and telecom industry doesn't value the Internet for its public interest benefits," Lloyd wrote. "Instead, these companies too often believe that to safeguard their profits, they must control what content you see and how you get it." Lloyd feels government should be the voice controlling what you see and hear.
The irony here is that it has been the Internet, talk radio and cable news that have provided access to unheard and suppressed voices. News and commentary no longer have to get past the gatekeepers at CBS, ABC, NBC, the Washington Post and the New York Times. And judging from ratings and circulation, they do not deserve to be called mainstream anymore. It is they who are the fringe media.
Bloggers and talk show callers now have a voice. Conservatives have competed in the marketplace of ideas and won. It's not their fault no one wanted to listen to Air America or that Web sites such as FreeRepublic.com and HotAir.com constantly pull back the curtain on the wizards of this administration.
Net neutrality is not designed to liberate, but to suppress. It's the Fairness Doctrine of the Internet that, like diversity in talk radio and the war on Fox News, is designed to marginalize and silence those who disagree with those in power.
Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts
Wednesday, October 21, 2009
Tuesday, October 20, 2009
Mark Lloyd on Net Neutrality
http://www.commondreams.org/archive/2008/02/21/7210
Unfortunately, the powerful cable and telecom industry doesn't value the Internet for its public interest benefits. Instead, these companies too often believe that to safeguard their profits, they must control what content you see and how you get it. Their plans could have dire consequences for those whose voices are often marginalized by our nation's media system.
So does this mean the government will then control what content you have access to?
Unfortunately, the powerful cable and telecom industry doesn't value the Internet for its public interest benefits. Instead, these companies too often believe that to safeguard their profits, they must control what content you see and how you get it. Their plans could have dire consequences for those whose voices are often marginalized by our nation's media system.
So does this mean the government will then control what content you have access to?
Labels:
Czar,
Diversity Czar,
FCC,
internet,
Mark Lloyd,
net neutrality
Friday, August 28, 2009
Bill Would Give President Emergency Control of Internet
http://news.cnet.com/8301-13578_3-10320096-38.html
CNET News has obtained a copy of the 55-page draft (excerpt), which still appears to permit the president to seize temporary control of private-sector networks during a so-called cybersecurity emergency.
Probably the most controversial language begins in Section 201, which permits the president to "direct the national response to the cyber threat" if necessary for "the national defense and security." The White House is supposed to engage in "periodic mapping" of private networks deemed to be critical, and those companies "shall share" requested information with the federal government. ("Cyber" is defined as anything having to do with the Internet, telecommunications, computers, or computer networks.)
CNET News has obtained a copy of the 55-page draft (excerpt), which still appears to permit the president to seize temporary control of private-sector networks during a so-called cybersecurity emergency.
Probably the most controversial language begins in Section 201, which permits the president to "direct the national response to the cyber threat" if necessary for "the national defense and security." The White House is supposed to engage in "periodic mapping" of private networks deemed to be critical, and those companies "shall share" requested information with the federal government. ("Cyber" is defined as anything having to do with the Internet, telecommunications, computers, or computer networks.)
Labels:
government intervention,
internet,
obama,
privacy,
rights
Sunday, July 26, 2009
First round in Internet war goes to Iranian intelligence
http://www.debka.com/article.php?aid=1396
This system is capable of conducting "deep packet inspection" of every type of text and video communication in all parts of Iran on three tracks:
1. Like other advanced electronic spy systems in the world, this one uses such keywords as attack, weapons, cash, data, explosives, meeting, demonstration, resistance, protest, etc. to alert Iran within milliseconds to feeds of interest by computer or phone - mail, signals or visuals.
In a flash, intelligence analysts get a fix on the sender and the electronic addressee which are then placed on a surveillance list for further monitoring. Once identified, the sender or receiver and their connections are closely shadowed by field agents.
2. By "deep packet inspection," the secret controllers can cause delays in online data transfers, which surfers may attribute to glitches connected with their providers. The more targets under surveillance, the more online transfers are slowed down. DEBKAfile's Iranian sources report that the day after the presidential poll and resulting street outbreaks, Iran's Internet control and tracking supervisors took over the 10 leading service providers in the country. Their first action was to slow down incoming and outgoing cyber traffic from 1,500 to 54 kilobytes to make sure that not a single byte by Internet or cell phone to or from protest leaders escaped their notice.
3. Iranian intelligence made cynical use of the large amount of electronic and personal data accumulated on anti-regime elements. Instead of detaining their prey at once, Iranian intelligence invaded their computers and cell phones to plant false leads for smoking unsuspecting activists out in the open and keeping them under inspection. Within a few days of their protest, Mir Hossein Mousavi and the bulk of his supporters, realizing their electronic campaign had been taken over by the regime to hunt them down, disappeared from the streets of Tehran.
This system is capable of conducting "deep packet inspection" of every type of text and video communication in all parts of Iran on three tracks:
1. Like other advanced electronic spy systems in the world, this one uses such keywords as attack, weapons, cash, data, explosives, meeting, demonstration, resistance, protest, etc. to alert Iran within milliseconds to feeds of interest by computer or phone - mail, signals or visuals.
In a flash, intelligence analysts get a fix on the sender and the electronic addressee which are then placed on a surveillance list for further monitoring. Once identified, the sender or receiver and their connections are closely shadowed by field agents.
2. By "deep packet inspection," the secret controllers can cause delays in online data transfers, which surfers may attribute to glitches connected with their providers. The more targets under surveillance, the more online transfers are slowed down. DEBKAfile's Iranian sources report that the day after the presidential poll and resulting street outbreaks, Iran's Internet control and tracking supervisors took over the 10 leading service providers in the country. Their first action was to slow down incoming and outgoing cyber traffic from 1,500 to 54 kilobytes to make sure that not a single byte by Internet or cell phone to or from protest leaders escaped their notice.
3. Iranian intelligence made cynical use of the large amount of electronic and personal data accumulated on anti-regime elements. Instead of detaining their prey at once, Iranian intelligence invaded their computers and cell phones to plant false leads for smoking unsuspecting activists out in the open and keeping them under inspection. Within a few days of their protest, Mir Hossein Mousavi and the bulk of his supporters, realizing their electronic campaign had been taken over by the regime to hunt them down, disappeared from the streets of Tehran.
Subscribe to:
Comments (Atom)