House Passes HR 1104 |
3/27. The House amended and passed
HR 1104,
the Child Abduction Prevention Act, by a vote of 410-14. See,
Roll Call No. 89. This bill includes the Amber Alert communications network
provisions, a ban on certain misleading domain names, and amendments the Child Pormography
Prevention Act of 1996 (CPPA) regarding the banning certain computer generated images.
The House Judiciary Committee
amended and approved the bill on March 18. See,
Committee version of bill
[25 pages in PDF]. The full House approved several amendments to the Committee
version.
First,
the House approved by voice vote an
amendment [2 page PDF scan]
offered by
Rep. Mike Pence (R-IN) (at right) regarding
misleading domain names. It provides that "Whoever knowingly uses a misleading
domain name with the intent to deceive a person into viewing obscenity on the
Internet shall be fined under this title or imprisoned not more than 2 years, or
both." Rep. Pence had previously introduced a stand alone bill,
HR 939,
the "Truth in Domain Names Act".
Second, the House approved by a vote of 406-15 an
amendment [28 page PDF scan]
offered by Rep. Lamar Smith
(R-TX) pertaining to computer generated images. See,
Roll Call No. 88.
It is essentially
HR 1161,
the "Child Obscenity and Pormography Prevention Act of 2003", which addresses
the Supreme Court's April 16, 2002,
opinion [PDF] in Ashcroft v. Free Speech Coalition, in which the Court held
unconstitutional on First Amendment and overbreadth grounds provisions of the
Child Pormography Prevention Act of 1996 (CPPA) banning computer generated
images depicting minors engaging in sexually explicit conduct. See, story titled
"House Subcommittee Holds Hearing on HR 1161", TLJ Daily E-Mail Alert No. 621,
March 12, 2003. See also, March 27
release
of Rep. Smith.
President Bush stated in a
release that "I commend the House for acting today on legislation that will
help expand, enhance, and coordinate the successful Amber Alert system across
our nation. I look forward to legislation reaching my desk as quickly as
possible so that I may sign it into law."
|
|
|
5th Circuit Rules in Texas Coalition v. FCC |
3/27. The U.S.
Court of Appeals (5thCir) issued its
opinion
[15 pages in PDF] in Texas
Coalition v. FCC, denying a
petition for review of a Federal Communications
Commission (FCC) order that cable system
operators may pass through to cable subscribers the full amount of the franchise
fees imposed on them by local franchising authorities (LFA) and to identify the
amount passed through on subscribers' bills.
The Texas
Coalition of Cities for Utility Issues (TCCFUI) and the
National Association of Telecommunications
Officers and Advisors (NATOA), which represent LFAs, object to this practice.
Some LFAs, including the City of Pasadena, requested that the FCC prohibit the
practice. The FCC adopted its Memorandum Opinion and Order (MOO) on October 4,
2001 denying the request. See, October 4, 2001
FCC release [MS Word]
announcing the MOO. See also, FCC 01-289, and 16 FCC Rcd. 18,192.
This petition for review of the MOO followed. The Court of Appeals denied the
petition. It rejected the arguments of the TCCFUI and
NATOA that 47 U.S.C. §§
542 and 543
prevent the pass through of the entire franchise fee, and that the order was
arbitrary and capricious.
|
|
|
Powell Addresses Media Concentration |
3/27. Federal Communications Commission
(FCC) Chairman Michael Powell
gave a speech to the Media Institute
regarding the FCC's pending proceedings pertaining to media ownership rules.
The Telecommunications Act of 1996 relaxed ownership rules, and required the
FCC to conduct a review every two years of its rules. The Court of Appeals has
ruled against the FCC in several recent petitions for review of its rules.
Powell stated that "Preserving a diverse media that is competitive and
serves our global and local community remains as vital today as it has ever been.
Broadcast ownership policies have long been an important tool in promoting
these goals."
He continued that "Ownership restraints serve as a useful, though not
precise, proxy for
promoting diverse viewpoints among the electronic media. Preserving an adequate
number of independent owners/editors increases the probability of a wider range
of viewpoints in the coverage and treatment of issues of significant public
importance."
Powell
(at right) continued that because of the statutory requirement, and the Court of
Appeals' rulings, "The stark result is this: Any hope we have of preserving the
use of ownership rules as a way of promoting our diversity goals, will rest on
the FCC’s ability to offer significantly more compelling explanations of the
rules it employs. If we fail, the rules will be gone in a year. In making our
choices, we cannot ignore the new breadth and depth of the media marketplace
when placing limits on broadcast owners. Ignoring other sources of viewpoints
in a market is hazardous to the health of a reasonable broadcast regulatory
regime. If we resort to passion, histrionics, intuition and the cries of Chicken
Little to keep the current regime as it is, the rules will not stand for long."
However, he said that the rules will have to change. He articulated several
reasons. He first said that "It is important for us to rebuild our media
regulatory regime in order to get a coherent and internally consistent set of
rules that more correctly reflect the media landscape and the rich and varied
ways consumers and citizens get there information. If we adopt rules that do
not peer through the eyes and listen through the ears of consumers and see how
they obtain news and information, then it is questionable whether we are truly
acting in their stead, or merely using their name in vein to promote some other
agenda."
He also argued that "scale and efficiency are becoming more vital to
delivering quality news and public affairs. The world is getting smaller. We are
all part of a global community as well as a local community. ... This complex
world requires ever more sophisticated news gathering and delivery
capability. The scale and resources necessary to do it are increasing."
He also argued that "Media is itself changing as a new digital world unfolds.
Voice, video and data can now travel effectively on many more platforms and will
begin to accelerate the proliferation of information. As this becomes possible
the consumer is demanding greater personalization and control of his programming
choices, using the computer tools integrated in his watching and listening
devices. We see the internet itself becoming an essential source of important
content."
He concluded his speech with a warning about potential violation of First
Amendment rights. He said that "My warning is this, while we are right to
concern ourselves with Citizen Kane, we should not use that concern to justify
the resurrection of King George. Our founding fathers said little about
commercial owners of news and print, but they reserved the top spot on the bill
of rights to condemn the government from foisting its values, preferences,
viewpoints or tastes on a free people. This is where the gravest constitutional
danger lies."
|
|
|
FCC Reports on Consumer
Complaints and Inquiries |
3/27. The Federal Communications Commission
(FCC) released a
report
[19 pages in PDF] titled "Report on Informal Consumer Inquiries and Complaints: 4th
Quarter Calendar Year 2002".
The data contained in this report shows that consumers are concerned about
financial items (rates, billing, slamming and
cramming) and annoying phone calls and faxes. While the FCC method of
aggregating data makes analysis difficult, there is little data in the report to
suggest that there is much
consumer concern over some of the issues that concern policy makers in
Washington DC. For example, the data in the report does not reflect consumer
concern about broadband services or issues pertaining to media concentration.
This report tracks consumer inquiries and complaints processed
by the FCC's Consumer & Governmental Affairs
Bureau (CGAB) during the fourth quarter of
calendar year 2002. However, the CGAB obtained some of its data from other FCC
components. The report contains summary data on the total number of complaints and
inquiries for wireless communications, wireline communications, broadcast
television and radio and cable services. See, table below.
|
Complaints |
Inquiries |
Wireline |
11,625 |
56,592 |
Wireless |
4,059 |
15,223 |
Broadcast |
253 |
4,112 |
Cable |
156 |
4,354 |
The report also provides some breakdown
data for each of these four industry sectors.
Broadband Services. The report contains little data on complaints and
inquiries about broadband services provided by cable and phone companies.
However, the data that is in the report suggests that there are far lower levels
of consumer concern over broadband services than over phone line and cell
phone services.
The report states that there were a total of 15 complaints about cable modem
broadband service
in the fourth quarter. The report does not state the total number of consumer
inquiries. For DSL service, the report contains no data on consumer complaints,
but does state that there were a total of 361 inquiries.
The report contains no data on complaints or inquiries to state public utilities
commissions or to local cable franchising authorities.
Wireline and Wireless. The number of broadband related complaints and
inquiries is far less that the number of complaints and inquiries regarding
plain old fashioned wireline phone service. There were 4,853 billing complaints, 1,127
cramming complaints, and 1,895 slamming complaints, and 3,009 TCPA complaints.
These Telephone Consumer Protection Act complaints pertained to calls between
9PM and 8AM, junk faxes, commercial solicitations.
Similarly, the report shows 2,598 complaints about wireless billing and
rates, and a total of 4,059 complaints for all wireless subcategories.
Broadcast and Media Concentration. The broadcast complaint data reflects
some statistical manipulation by the
FCC. For example, the FCC report states that there were 253 total broadcast
related complaints, and that there were a total of 97 obscenity or indecency
related complaints. However, a footnote states that "The Commission received at
least 6,900 correspondences regarding one specific program, and the Enforcement
Bureau has accounted for these correspondences as one consolidated complaint in
its complaint counts this quarter." The report does not state how many other
multiple complaints were counted as a single complaint for the purposes of this
report.
The report does not give a breakdown of complaints or inquiries that are
related to media concentration. However, there could not have been many. There
were only 253 total complaints about radio and TV broadcasting, and only 156 about
cable service.
Moreover, many of the 4,112 inquiries about broadcast media pertained to low
power FM, or how to start a radio station. Also, 179 communications pertained to famous atheist
Madalyn Murray
O'Hair. The FCC denied a petition to deny licenses for noncommercial
educational broadcast stations to religious entities on August 1, 1975. O'Hair
has been dead since 1995.
The FCC has no subcategory for complaints about rates, billing, slamming or
cramming by broadcasters. This is because it is free. All of the complaints related to
programming (218) or disability issues (35). Of the programming complaints, 97
related to obscenity or indecency, and 4 related to religious programs, leaving
only 57 for "general criticism" and 60 for "other programming
issues". The FCC
does not state how many of these complaints related to the effect of media
concentration upon programming, such as diversity or local programming. However,
117 is the maximum that it could possibly have been.
|
|
|
Tether States that DARPA's Total Information
Awareness Project Does Not Data Mine |
3/27. The House Armed Services
Committee's (HASC) Subcommittee on Terrorism, Unconventional Threats and
Capabilities held a hearing on the
Department of Defense (DOD) science and technology policy and programs for
fiscal year 2004.
Anthony Tether,
Director of the Defense Advanced Research
Project Agency (DARPA), testified in support of the DARPA's
Total
Information Awareness (TIA) project. He rebutted characterizations of the
project as "data mining".
Tether provided
prepared testimony regarding the TIA project. He did not cover the program
in his oral testimony. However, he was questioned about it by members of the
Subcommittee. Rep. James Saxton (R-NJ), the
Chairman of the Subcommittee, repeatedly stated that the DOD is not doing, or
spending, enough on counter terrorism. He raised both bio technology and
information technology issues.
Saxton argued that the U.S. is far superior to all foes in convention
capabilities, but lacking in counter terrorism capabilities. He said that "We
have got a different enemy. We need a small force to meet this enemy. But we
need a huge collection system to know where he is so we can go get him. How much
of our budget are we using using on information, are we using trying to develop
new ways to collect information on our enemies?"
Tether responded, "We, you know, we have a program called TIA." Saxton
elicited laughter when he interjected, "We know that." Tether went on to state
that TIA project accounts for about 5% of DARPA's budget.
Tether also elaborated on the TIA project in response to questions. "Well,
TIA, is in a research stage. It doesn't -- regardless of what you may
have read in the papers -- it really is not a collection program. We are not
collecting any data. We are not spying on U.S. citizens. Basically, what TIA is
doing is providing tools to allow agencies to better collaborate with each
other. I have been involved in the business for a long time, and every time I
have seen an intelligence failure, it was never because we didn't have the data.
We always ended up being able, in the forensics, to show that we had the data.
It was just that the data was distributed. CIA had some. NSA had some. DIA had
some. But the problem was that there was no technology which allowed them to
collaborate with each other so that they could bring their data forward to solve
a problem. And that is all that TIA, the research in TIA, is all about, is really
to do that, to allow agencies to communicate with each other and to collaborate,
and yet maintain the privacy of their sources and methods. It is in an
experimental phase, so that we have, we are doing a spiral development. INSCOM
is a major node. Now, INSCOM is not just a single place. INSCOM is worldwide.
And, basically, we are learning how to use these tools. It will be many years
before it, you know, it really is to the point where it needs to be."
Editor's Notes: The CIA is the Central
Intelligence Agency. The NSA is the National
Security Agency. The DIA is the Defense
Intelligence Agency. The INSCOM is the U.S. Army's
Intelligence and Security Command.
Tether was also asked, "Is the research project active and aggressive in
regard to TIA?" Tether responded, "Yes it is. It is very active and aggressive.
In all fronts, in language translation, in being able to create models. Another
misunderstanding of TIA is that some people thought it was a data mining thing,
that we went out and went into databases to look for patterns. Actually, it is
the reverse. There is two major technologies. One is the collaboration
technology. But, the other is to make things from a hypothesis based, or a model
based, where you create a hypothesis, and you say, if this hypothesis is true,
what are all of the observables that have to be true. And, then you take that
pattern to the database to see if they exist."
He was also asked, "Have we gotten past the public relations problem?" Tether
responded, "I am getting less letters."
Earlier this year the Congress passed HJRes 2, which provides further
appropriations for FY 2003. It also included an amendment offered by
Sen. Ron
Wyden (D-OR) regarding the TIA program. See, item titled "Limitation on Use of Funds
for Research and Development on Total Information Awareness Program", at
Division M, Section 111.
See also, stories titled "House and Senate Pass FY 2003 Appropriation Package
With TIA Amendment",
TLJ Daily E-Mail
Alert No. 604, February 14, 2003; "Senate Approves Total Information
Awareness Amendment",
TLJ Daily E-Mail
Alert No. 590, January 24, 2003; "DARPA States FBI Is Involved in Total
Information Awareness Program",
TLJ Daily E-Mail
Alert No. 588, January 22, 2003; and "Sen. Feingold Introduces Data Mining
Moratorium Bill",
TLJ Daily E-Mail Alert No. 586, January 20, 2003.
|
|
|
Tether Addresses TIA and Other
Defense Info Tech Projects |
3/27. Anthony Tether,
Director of the Defense Advanced Research
Project Agency (DARPA), who testified before the House
Armed Services
Committee's (HASC) Subcommittee on Terrorism, Unconventional Threats and
Capabilities on March 27, provided details about the DARPA's
Total
Information Awareness (TIA), and other defense information technology
programs, including cognitive computing, microsystems, self forming networks,
and networked manned and unmanned systems, in his
prepared testimony to the Subcommittee.
Total Information Awareness. He wrote that "The goal of our
Information Awareness programs is to create information technology that
America’s national security community can use to detect and defeat terrorist
networks before they can attack us."
"It includes research in technologies to identify
people at a distance, translate written and spoken languages into English,
vastly increase the size and searchability of databases, improve decision-making
by policy makers, find patterns in scattered data, and predict the behavior of
terrorist groups."
"One of our Information Awareness programs is
Total Information Awareness (TIA), around which there has been much
controversy. If I knew only
what I read in the press about TIA, I would be concerned too. So I’d like to
briefly address some of the main concerns."
"No American’s privacy has changed in any way
as a result of DARPA’s Information Awareness programs, including TIA. The
Department of Defense is not developing technology so it can maintain dossiers
on every American citizen. The Department of Defense is not assembling a giant
database on Americans."
"Instead, the TIA
program is designed as an experimental, multi-agency prototype network that
participating agencies can use to better share,
analyze, understand, and make decisions based on whatever data to which they
currently have legal access. TIA will
integrate three broad categories of information technologies from DARPA and
elsewhere: advanced collaboration and decision support tools, language
translation, and data search and pattern recognition."
"The ultimate goal is an interagency network
to collaborate, ``connect the dots,´´ and prevent terrorist attacks. While the
research to date is promising, TIA is, today, a series of experiments. We want
to be clear that the DARPA program is an R&D project only. The Omnibus
Appropriations Act of Fiscal Year 2003 (P.L. 108-007) requires that before we
make major investments in preparation for deployment of a working system, we
will need to make our case for deployment and Congress must permit such
deployment."
"TIA is a program to make new tools. It does
not permit any agency access to data that they don't already have, and it in no
way alters the authority or responsibilities of those agencies in that regard.
Policymakers, particularly Congress, will ultimately determine how TIA tools may
be used and on what data."
Finally, Tether wrote that "On
February 7, 2003, the DoD announced the establishment of two boards to oversee
TIA. These boards, an internal oversight board and an outside advisory
committee, will work with DARPA as we continue our research. They will help
ensure that TIA develops and disseminates its tools to track terrorists in a
manner consistent with U.S. constitutional law, U.S. statutory law, and American
values."
Cognitive Computing. Tether addressed DARPA's work on cognitive
computing. He wrote that "While current information systems are critical to U.S.
national defense, they remain exceedingly complex, expensive to create and
debug, hard to integrate with each other, insecure, and prone to failure. And,
they still require the user to adapt to them, rather than the other way around.
Computers have grown ever faster, but they remain fundamentally unintelligent
and difficult to use. Something dramatically different is needed."
"In response,
DARPA's Information Processing Technology
Office (IPTO) is returning to its
roots to take on Licklider's vision again in a strategic thrust called
``cognitive computing.´´ Cognitive computers can be thought of as systems that
know what they are doing."
He added that "Cognitive
computing systems will have the ability to reason about their environment
(including other systems), their goals, and their own capabilities. They will
be able to learn both from experience and by being taught. They will be capable
of natural interactions with users and will be able to explain their reasoning
in natural terms. They will be robust in the face of surprises and avoid the
brittleness and fragility of previous expert systems." (Parentheses in
original.)
Microsystems. Tether wrote that "Microelectronics,
photonics, and microelectromechanical systems (MEMS) are three core technologies
for the U.S. military, enabling it to see farther, with greater clarity, and
better communicate information in a timely manner. DARPA is building
on these accomplishments by shrinking ever more complex systems into chip-scale
packages -- integrating the three core hardware technologies of the information age
into systems on a chip. It is at the intersection of microelectronics,
photonics, and MEMS that some of the greatest challenges and opportunities for
DoD arise."
He continued that the Molecular Electronics program is seeking to replace
today's computer switches, which are CMOS (complementary metal oxide semiconductor)
transistors, with
molecular switches. He stated that "in FY 2004, DARPA expects to demonstrate the
first 16-kilobit memory based on molecular switches."
Self Forming Networks and Spectrum Utilization. Tether wrote that the
DOD "is in the middle of a transformation to what is often termed ``network
centric warfare.´´ In simplest terms, the promise of network centric warfare is
that military organizations and systems can be seamlessly networked to change
the terms of any conflict to favor U.S. and coalition forces. It will allow the
United States and our allies to go beyond a correlation of local forces by
providing them better information and letting them plan and coordinate attacks
far more quickly and effectively than our adversaries."
He elaborated that "DARPA is
conducting research in areas including self-forming, ad hoc networks;
high capacity, multiband, multimode communications systems; ultra-wideband
communications; spectrum sharing; information assurance; and low probability of
detection/intercept/exploitation communications."
After reviewing several programs, he concluded that "Borne out of the
need for rapid and efficient utilization of the shrinking military bandwidth,
the neXt Generation (XG) Communications program will make 10 to 20 times more
radio frequency communication spectrum available to the U.S.
military by dynamically sharing unused spectrum across frequency, time, and
space. It turns out that, on average, only a small portion of the commercial
spectrum is actively used at any given moment, even though most of the spectrum
is licensed for assumed 100 percent use. The key technology question becomes
whether an XG system can exploit underutilized spectrum without interfering with
the original licensee."
More DARPA Technology. Tether also addressed
networked manned and unmanned systems. He wrote that "The idea is not simply to
replace people with machines, but to team people with robots to create a more
capable, agile, and cost-effective force that lowers the risk of U.S.
casualties."
He also addressed DARPA's
Mobile Autonomous Robot
Software (MARS).
Finally, he touched on DARPA's
Augmented Cognition project.
He wrote that this will "measure the mental effort (``cognitive load´´) of the
human user using advanced, near-infrared optical sensors to measure brain
activity. The computational system will know and support the actual state of the
user, rather than just infer the user’s state or intentions. This information
will allow us to manipulate
or vary the load so information can be presented to the warfighter in ways that
reduce information overload and will take advantage of spare mental processing
power."
|
|
|
Treasury Official Addresses Anti Money
Laundering Compliance and Information Technologies |
3/27. David Aufhauser, General Counsel of the
Department of the Treasury, gave a
speech to the
Securities Industry Association's (SIA) Anti-Money Laundering
Compliance Conference. He raised, but rejected, the possibility of relying upon
computer databases with financial transactions data to catch
terrorists.
He said that "There is, I suppose, an alternative that would remove the burden of all
compliance. Let me be more specific. After a long and trying day, a colleague
who assists in the terrorist financing campaign said to me that we were going
about things all wrong. We were looking for needles in haystacks -- the trick,
he said, was in removing the hay."
"He explained. We have the technological capability today to take thousands
of photographs a second over hostile territory -- every second, of every minute,
of every day. That is a large amount of digital photographic data. Stored in a
high-speed computer, married to algorithms invented by the smartest
of people, the computer can be trained to think and to extrapolate from the data
supplied to it. So, on any single day of the week, you can approach a computer
screen and ask to be shown the anomalies -- i.e., what is different about this
second, this minute and this day from any other day of the year. If it were
photography of relevant quadrant in Afghanistan, the screen before you will go
blank, all but for a tire tread that leads to what was once thought to be solid
rock, but is now identified to be a cave and target for assault."
Aufhauser continued that "The analogy in the financial world is the real
time production of electronic
commerce to a central storage facility. If we joined all such information, and
challenged it with formulas intended to detect anomalies, it is conceivable that
the two wire transfers to Dubai from a small town in the U.S. in Maryland by
Mohammed Atta days before the September 11 attacks would have set off a blinking
yellow light that said something is amiss -- check it out before people lose
their lives."
However, he concluded that "Even if it were doable, I do not recommend
this tack. It would forfeit the
intellectual capital and professional judgment of each of you and that is too
high a price."
|
|
|
|
Chairman and Members of Cyber Security
Subcommittee Named |
3/28. Rep. Chris Cox (R-CA) and
Rep.
Jim Turner (D-TX), the Chairman and ranking Democrat on the
House Homeland Security Committee,
announced the Chairman and members of the Subcommittee on Cybersecurity,
Science, and Research & Development.
The Chairman will be Rep. Mac
Thornberry (R-TX). The ranking Democrat will be
Rep. Zoe Lofgren (D-CA). The other
members will be Rep. Pete Sessions (TX),
Rep. Sherwood Boehlert (R-NY),
Rep. Lamar Smith
(R-TX), Rep. Curt Weldon (R-PA),
Rep. Dave Camp (R-MI),
Rep. Bob Goodlatte (R-VA),
Rep. Pete King (R-NY),
Rep. John Linder (R-GA),
Rep. Mark Souder (R-IN),
Rep. Jim Gibbons (R-NV),
Rep. Kay Granger (R-TX),
Rep. Loretta
Sanchez (D-CA), Rep. Robert Andrews (D-NJ),
Rep. Sheila Lee (D-TX), Del.
Donna Christensen (D-VI), Rep. Bob
Etheridge (D-NC), Rep. Charlie
Gonzalez (D-TX),
Rep. Ken Lucas (D-KY),
Rep. Jim Langevin (D-RI), and Rep.
Carrier Meek
(D-FL).
Rep. Thornberry
(at right) represents a district that includes much of the
panhandle of Texas, including the cities of Amarillo and Wichita Falls. It is
not a tech district. The
economy is based upon cattle, cotton and oil. It is also the site of
Sheppard Air Force Base and the
Pantex Plant, a nuclear weapons assembly and
disassembly facility. He also holds a seat on the
House Armed Services Committee.
Rep. Thornberry stated in a
release that "It is very important that we create a new partnership between
government and industry to protect our infrastructure from cyber-attacks. One of
the missions of this Subcommittee will be to work with the Department of
Homeland Security and the private sector in figuring out the best ways to defend
ourselves."
Rep. Lofgren represents a Silicon Valley district. She also is a member of
the House Judiciary Committee, and its Courts, the Internet and Intellectual
Property Subcommittee.
The Subcommittee membership also includes other members with a record of involvement in
technology related issues.
Rep. Goodlatte is a co-chair of the Congressional Internet Caucus, and a
member of the House Judiciary Committee, and its Courts, the Internet and
Intellectual Property Subcommittee. He has long been active in technology
related legislative issues. For example, he and Rep. Lofgren for many
years cosponsored legislation to liberalize encryption export controls.
Rep. Smith represents a district that includes some technology companies. He
has also sponsored several technology related bills, including the "Cyber
Security Enhancement Act of 2002", which was enacted as part of a larger
Department of Justice authorization bill, and
HR 1161,
the "Child Obscenity and Pormography Prevention Act of 2003", which
addresses computer generated images. The House passed this bill on March 27 as
an amendment to
HR 1104,
the Child Abduction Prevention Act.
Rep. Boehlert is the Chairman of the House
Science Committee, and has
recently sponsored legislation pertaining to cyber security and nanotechnology.
The full Committee is scheduled to meet at 3:00 PM on Monday, March 31 to
formally approve subcommittee assignments and Chairmen. The Committee is also
scheduled to mark up
HR 1416,
the Homeland Security Technical Corrections Act of 2003.
|
|
|
|
|
Monday, March 31 |
The House will meet at 12:30 PM for morning hour, and at 2:00 PM for
legislative business. The House will consider several non tech related items
under suspension of the rules; votes will be postponed until 6:30 PM. The
Senate will meet at 3:00 PM for morning business; at 6:00 PM it will take up
the nomination of Theresa Springmann to be a Judge of the U.S. District Court
for the Northern District of Indiana.
9:45 AM. Commerce Secretary
Don Evans will
speak at a conference titled "Quest for Excellence XV", which is the
conference of the Malcolm Baldrige
National Quality Award. For more information, contact Connie Correll at
connie.correll@ta.doc.gov or
202 482-1065. Location: Marriott Wardman Park Hotel, 2660 Woodley Road, NW.
TIME CHANGE. 2:00 PM.
Rep. Chris Cox (R-CA) and
Rep. Ron Wyden (D-OR) will hold a press
conference to discuss the Internet Tax
Non-Discrimination Act,
HR 49
and S 52.
Press contact: Kate Whitman (Cox) at 202 225-5611 or Carol Guthrie (Wyden) at
202 224-1063. Location: Room SC-4, U.S. Capitol.
3:00 PM. The House Homeland Security
Committee will meet to mark up
HR 1416,
the Homeland Security Technical Corrections Act of 2003. Press contact:
Kate Whitman 202 225-5611.
The Federal Trade Commission's (FTC)
amended final Telemarketing Sales Rule (TSR) takes effect. See,
notice in the Federal Register containing the final amended TSR, and the
Statement of Basis and Purpose. However, full compliance with the caller
identification transmission provision is required by January 29, 2004. Also, the
FTC will announce later the date by which full compliance with the
``do-not-call´´ registry provision, will be required. See, Federal Register,
January 29, 2003, Vol. 68, No. 19, at Pages 4579-4679. See also,
FTC
release.
POSTPONED. Day one of a two
day event hosted by the
Association for Competitive Technology
(ACT) titled "Member Fly-In". For more information, contact Catherine Parsons
at 202 331-2130 x106.
Deadline to submit comments to the The
National Telecommunications and Information
Administration (NTIA) regarding the utility service cancellation notice
exception to the Electronic Signatures in Global and National Commerce
(E-SIGN) Act. The Act provides, at §101, for the acceptance of electronic
signatures in interstate commerce, with certain enumerated exceptions. §103 of
the Act provides that the provisions of section 101 shall not apply to "any notice of
... the cancellation or termination of utility services (including water, heat, and
power)". (Parentheses in original.) The Act also
requires the NTIA to review, evaluate and report to Congress on each of the
exceptions. The E-SIGN Act is codified at
15 U.S.C. § 7001,
et seq. The exceptions are codified at
15 U.S.C. § 7003.
See, NTIA
notice and
notice in the Federal Register, January 28, 2003, Vol. 68, No. 18, at
Pages 4179-4181.
Deadline to submit comments to the Federal
Communications Commission (FCC) regarding its staff study relating to
alternative methodologies for calculating contributions to the federal
universal service support mechanisms. See,
notice in the Federal Register, March 6, 2003, Vol. 68, No. 44, at Pages
10724 - 10725.
|
|
|
Tuesday, April 1 |
The House will meet at 10:30 AM for morning hour, and at 12:00 NOON for
legislative business. The House will consider several non tech related items
under suspension of the rules.
9:00 AM. The Senate Judiciary
Committee will hold a hearing on several judicial nominations: Carolyn
Kuhl (to be a Judge of the U.S.
Court of Appeals for the 9th Circuit), Cecilia
Altonaga (Southern District of Florida), and Patricia Minaldi (Western
District of Louisiana). Location: Room 226, Dirksen Building.
10:00 AM. The Senate
Appropriations Committee's Subcommittee on
Commerce, Justice, State, and the Judiciary will hold a hearing on the FY 2004
budget for the Department of Justice.
Location: Room 192, Dirksen Building.
10:30 AM. Secretary of Homeland Security
Tom Ridge
and U.K. Home Secretary
David Blunkett
will hold a press conference. This will follow a meeting between the two are
scheduled to discuss security of cyber and physical infrastructures,
information and intelligence sharing, the sharing of best practices, joint
training exercises, border and transportation security, biometrics, research
and development, and science and technology. The
Department of Homeland Security (DHS) further announced that "media
... must arrive at the Back Gate at the Department of
Homeland Security before 10:15 AM to attend the event." Location: DHS,
Massachusetts and Nebraska Aves., NW.
POSTPONED. Day two of a two
day event hosted by the
Association for Competitive Technology
(ACT) titled "Member Fly-In". For more information, contact Catherine Parsons
at 202 331-2130 x106.
Deadline to file
Form 499A [34
pages in PDF], the Annual Telecommunications Reporting Worksheet, with the
Universal Service Administrative
Company's (USAC).
|
|
|
Wednesday, April 2 |
The House will meet at 10:00 PM for legislative business.
9:30 AM. The Senate Commerce
Committee's
Communications Subcommittee will hold a hearing
on universal service subsidies, and policies that may ensure future
stability and sufficiency. The scheduled witnesses include
Federal Communications Commission (FCC)
Commissioner Kathleen
Abernathy, Carson Hughes (Telepax), Joel Lubin (AT&T), Matthew Dosch (Comporium
Communications), Robert Orent (Hiawatha Communication), William Gillis (Center
to Bridge the Digital Divide, Washington State University), Charles Robinson
(Alaska Commnuications System), Jack Rhyner (TelAlaska), and Dana Tindall
(General Communications, Inc.). Location: Room 253, Russell Building.
10:00 AM. The Senate
Governmental Affairs Committee will hold a hearing on several pending
nominees, including that of Clay Johnson to be
Deputy Director for Management at the Office
of Management and Budget (OMB). Location: Room 342, Dirksen Building.
11:30 AM - 2:00 PM.
Anne Mulcahy, Ch/CEO of Xerox,
will speak at the U.S. Chamber of Commerce
program titled "From Survival to Success: Leading in Turbulent Times".
See, notice.
Location: U.S. Chamber of Commerce, 1615 H Street, NW.
1:00 - 3:00 PM. The President's
National Security
Telecommunications Advisory Committee (NSTAC) will hold a meeting via
conference call. The meeting is closed to the public. See,
notice in the Federal Register, March 21, 2003, Vol. 68, No. 55, at Page
13967.
The Supreme Court will hear oral argument in Dastar Corporation v.
Twentieth Century Fox Film, a case involving whether Section 43(a) of the
Lanham Act, codified at 15
U.S.C. § 1125(a), requires an independent showing that consumers will likely be
confused by a defendant's false designation of origin or false or misleading
description or representation of fact. Dastar made a video that copied
extensively from a TV program (that had entered the public domain) without
crediting the source. Twentieth Century Fox prevailed in the courts below on a
Lanham Act claim.
|
|
|
Thursday, April 3 |
The House will meet at 10:00 PM for legislative business.
10:00 AM. The Senate
Appropriations
Committee's VA, HUD, and Independent Agencies Subcommittee will hold a
hearing on the FY 2004 budget for the National
Science Foundation and the Office of Science
Technology Policy (OSTP). Location: Room 138, Dirksen Building.
11:00 AM- 12:00 NOON.
Charles
McQueary, Under Secretary for Science and Technology, at the
Department of Homeland Security (DHS), will
speak at a program titled "Homeland Security Business Forum: Science and
Technology Under DHS". See,
notice and
registration
pages. The price to attend is $35 for members and $100 for non members.
Location: U.S. Chamber of Commerce,
1615 H Street, NW.
12:00 NOON. John Muleta, Chief of the
Federal Communications Commission's (FCC)
Wireless Telecommunications Bureau will speak at the Land Mobile
Communications Council's annual meeting. Location: Loews L'Enfant Plaza Hotel.
? 3:00 PM. The House Judiciary
Committee's Subcommittee on Courts, the Internet and Intellectual Property
will hold a hearing on the U.S. Patent and
Trademark Office's (USPTO)
21st Century
Strategic Plan and the USPTO's proposed fee schedule.
3:30 PM. Pamela Samuelson
(Professor, UC Berkeley) will give a lecture titled "Freedom to Tinker,
Freedom to Learn: A Constitutional Interest in Reverse Engineering".
For more information, contact Julie Cohen at
jec@law.georgetown.edu. Location:
Georgetown University Law Center,
Faculty Lounge, 600 New Jersey Ave., NW.
Day one of a two day conference hosted by the University of Maryland's
Center for Intellectual Property titled "Copyright in the Digital Age:
Challenges Facing the Academy". The
agenda
includes sessions on the TEACH Act, peer to peer file copying, and the DMCA.
Location: Greenbelt Marriott, Maryland.
|
|
|
Friday, April 4 |
The House will meet at 10:00 PM for legislative business.
Day one of a two day conference hosted by the University of Maryland's
Center for Intellectual Property titled "Copyright in the Digital Age:
Challenges Facing the Academy". The
agenda
includes sessions on the TEACH Act, peer to peer file copying, and the DMCA.
Location: Greenbelt Marriott, Maryland.
8:00 AM. Phil Bond,
Under Secretary of Commerce for the
Technology Administration (TA), will deliver a speech titled "Growth
and Policy Implications of Nanotechnology" at the National Nanotechnology
Initiative 2003 Conference. For more information, contact Connie Correll at
connie.correll@ta.doc.gov or
202 482-1065. Location: Omni Shoreham Hotel, 2500 Calvert St, NW.
9:30 AM. The U.S. Court of Appeals
(DCCir) will hear oral argument in Sprint Corp v. FCC, No.
02-1129. Judges Sentelle, Rogers and Garland will preside. Location: 333
Constitution Ave., NW.
12:15 - 1:30 PM. The Federal Communications
Bar Association's (FCBA) Wireless Telecommunications Committee will host a
luncheon. The speaker will be John Muleta, Chief of the
Federal Communications Commission's (FCC)
Wireless Telecommunications Bureau. The
price to attend is $15. Cancellations and/or RSVPs are due by 5:00 PM on
Tuesday, April 1. RSVP to Wendy Parish at
wendy@fcba.org. Location: Sidley Austin,
1501 K Street, NW, Conference Room 6E.
6:00 PM. Deadline to submit applications to the
National Telecommunications and Information
Administration (NTIA) for planning and construction grants for public
radio and nonbroadcast
facilities under the Public
Telecommunications Facilities Program (PTFP). See,
notice in the Federal Register, March 5, 2003, Vol. 68, No. 43, at Pages
10609 - 10615.
|
|
|
Intellectual Property News |
3/27. The House Judiciary
Committee's Subcommittee on Courts, the Internet, and Intellectual
Property postponed its hearing previously scheduled for March 27 on
HR 1417,
the Copyright Royalty and Distribution Act.
3/24. The U.S.
District Court (SDCal) issued an
order
[PDF scan] in CBS
v. EchoStar
granting CBS summary judgment on most of
EchoStar's
counterclaims. In 1998, CBS and others
filed a complaint against EchoStar alleging copyright infringement for
EchoStar's transmittal of television programs to ineligible households. EchoStar
filed a counterclaim. Count II alleged tortious interference; Count III alleged
unfair competition; Count IV alleged conspiracy to tortiously interfere with
business relationships; and, Count V alleged conspiracy to engage in acts of
unfair competition. The order is titled "Order Granting Plaintiffs' Motion for
Summary on Counts II-V of Counterclaim".
3/28. The U.S. Patent and Trademark Office
(USPTO) published a
notice in the Federal Register regarding its notice of proposed rulemaking (NPRM)
to amend its regulations to implement the Madrid Protocol Implementation Act of
2002 (MPIA). This Act was passed as a part of the larger
HR 2215
(107th), the 21st Century Department of Justice Appropriations Authorization
Act, which President Bush signed into law on November 2, 2002. Comments are due
by May 27, 2003. The USPTO will hold a public
hearing at 10:00 AM on Friday, May 30, 2003 in the Patent Theater, 2121 Crystal
Drive, Room 200, Arlington, Virginia. Requests to present oral testimony are due
by May 20, 2003. See, Federal Register, March 28, 2003, Vol. 68, No. 60, at
Pages 15119 - 15138. See also, copy of
notice in USPTO
web site.
3/26. The U.S. Patent and Trademark Office
(USPTO) announced that, effective May 1, 2003, the general address for the Under
Secretary of Commerce for Intellectual Property and Director of the United
States Patent and Trademark Office, as well as for the Commissioner for Patents
will be PO Box 1450, Alexandria, VA 22313-1450. The address for the Commissioner
for Trademarks and other trademark related correspondence will not change. The
USPTO has separate mailing addresses for other subject specific correspondence.
These are provided in the USPTO web site.
|
|
|
Antitrust News |
3/26. The Consumer Federation of
America (CFA) and Consumers Union
(CU) requested that the Federal Trade Commission
(FTC) and the Department of Justice's (DOJ)
Antitrust Division investigate "whether cable companies are violating
antitrust law by charging Internet customers higher prices unless they sign up
for the companies' television services". The CFA and CU asserted in a
release that
"the pricing and tying arrangements involve such steep discounts that they
constitute anti-competitive tying and possibly predatory pricing schemes."
3/27. The U.S. Court of Appeals
(DCCir) granted the request of the
Computer & Communications Industry Association (CCIA) and the
Software and Information Industry Association
(SIIA) to appeal the District Court's decision the antitrust case, U.S. v.
Microsoft. The Court of Appeals previously granted the request of
the states of Massachusetts and West Virginia to appeal the District Court decision in
New York v. Microsoft. These are D.C. Nos. 98-1232 and
98-1233. The District Court has approved settlements negotiated by
Microsoft, the Department of Justice, and the settling states. See,
CCIA release.
3/27. The Department of Justice's (DOJ)
Antitrust Division published a
notice
in the Federal Register regarding the Proposed Final Judgment and Competitive
Impact Statement in U.S. v. Gemstar-TV Guide International and TV Guide.
See, Federal Register, March 27, 2003, Vol. 68, No. 59, at Pages 14996 - 15004.
|
|
|
Tech Crimes |
3/25. The U.S. District Court (CDCal)
sentenced Bret McDanel to 16 months in federal prison for maliciously bombarding
the computer system of a computer messaging company with thousands of email
messages, in violation of the Computer Fraud and Abuse Act. See,
USAO release and
CCIPS release.
3/25. The U.S. District Court (NDTex)
sentenced Demeshia Rachel Davis to 41 months in prison, and ordered her to pay
$1,776,137.92 in restitution, for violation one count of mail fraud in violation
of 18 U.S.C. § 1341, and one count of tax evasion in violation of 26 U.S.C. § 7201. She
used the U.S. Mail to steal from Lucent Technologies,
and then failed to report the proceeds as income to the IRS. See,
USAO
release.
|
|
|
More News |
3/27. The House Government Reform
Committee held a hearing titled "Point, Click, Self-Medicate: A Review of
Consumer Safeguards on Internet Pharmacy Sites". See,
prepared
testimony [15 pages in PDF] of Howard Beales,
Director of the Federal Trade Commission's
(FTC) Bureau of Consumer Protection, and
prepared testimony
of William Hubbard, Associate Commissioner for Policy and Planning at the
Food and Drug Administration (FDA).
3/28. Qwest Communications filed a
Section 271
application with the Federal
Communications Commission (FCC) to provide in region interLATA services in
the state of Minnesota. See,
Qwest release.
3/28. The General Accounting Office (GAO)
sent a letter [10 pages
in PDF] to Sen. John Ensign (R-NV) and
Sen. Daniel Akaka (D-HI) regarding
"Information Technology: Observations on Department of Defense’s Draft
Enterprise Architecture". The two Senators are the Chairman and ranking Democrat
on the Senate Armed Services Committee's
Subcommittee on Readiness and Management Support.
3/28. Federal Reserve Board
Chairman Alan
Greenspan gave a
speech titled "Community Economic Development" at an Federal Reserve
conference in Washington DC on sustainable community development. He
addressed many topics, including the role of information technology in community development
financing. He stated that "community developers have
also sought to broaden their financing strategies" from debt financing to
"community development venture capital funds and secondary markets ..." He
elaborated that "Advances in technology have significantly improved the
identification and development of new financing strategies. With increased
information processing capacity, loan portfolio managers can better assess risk
and monitor credit performance. Additionally, the ever increasing availability
of data facilitates the development of neighborhood profiles that can be useful
in understanding and tracking community socioeconomic trends. For example, the
cross referencing of data sets on mortgage lending patterns, business start-ups,
and employment figures against crime statistics and property values can provide
a valuable perspective."
3/28. The Federal Communications Commission
(FCC) published a
notice in the Federal Register of its adoption of rule amendments pertaining
to telling the truth to the FCC. The amendments provides that persons
covered by the rule may not, in proceedings covered by the rule, make written or
oral statements of fact that are, in material respects, intentionally incorrect
or misleading or make written statements of fact without a reasonable basis for
believing that the statement is correct and not misleading. The rule amendments
are effective on March 28, 2003. See, Federal Register, March 28,
2003, Vol. 68, No. 60, at Pages 15096 - 15098.
3/28. The National Telecommunications and
Information Administration (NTIA) published a
notice in the Federal Register regarding the availability of funds for
grants awarded under the Public
Telecommunications Facilities Program (PTFP). See, Federal Register, March
28, 2003, Vol. 68, No. 60, Page 15154.
3/27. Lucent stated in a
release that it "reached
an agreement to settle all pending shareowner and related litigation against the
company, its current and former officers and directors, and certain other
defendants. The company did not admit any wrongdoing as part of the settlement,
which is subject to final court approval. The agreement is a global settlement
of what were 54 separate lawsuits, including the consolidated shareowner
securities class action lawsuit in the U.S. District Court in Newark, N.J., and
all related ERISA, bondholder, derivative and state securities cases. The
lawsuits alleged that the company violated federal securities laws and related
state laws."
3/26. The Information Technology Association
of America (ITAA) hosted a conference titled "Securing Cyberspace: A
Government Industry Partnership for the Future". Rep. Sherwood Boehlert
(R-NY), Chairman of the
House Science Committee, gave a
speech titled "Securing Cyberspace: A Government Industry Partnership for
the Future".
3/27. The European Union announced its "100 Best Workplaces in the EU".
Three U.S. technology companies made the list -- Microsoft, Cisco and Intel.
Microsoft also made the top 10 list. The criteria used to evaluate these
companies were credibility/integrity, respect for employees, fairness/equality,
pride, and camaraderie. See,
EU release [PDF], the EU's 100 Best Workplaces
website, and
Microsoft release.
|
|
|
About Tech Law Journal |
Tech Law Journal publishes a free access web site and
subscription e-mail alert. The basic rate for a subscription
to the TLJ Daily E-Mail Alert is $250 per year. However, there
are discounts for subscribers with multiple recipients. Free one
month trial subscriptions are available. Also, free
subscriptions are available for journalists,
federal elected officials, and employees of the Congress, courts, and
executive branch. The TLJ web site is
free access. However, copies of the TLJ Daily E-Mail Alert are not
published in the web site until one month after writing. See, subscription
information page.
Contact: 202-364-8882; E-mail.
P.O. Box 4851, Washington DC, 20008.
Privacy
Policy
Notices
& Disclaimers
Copyright 1998 - 2003 David Carney, dba Tech Law Journal. All
rights reserved. |
|
|