June 2018

T-Mobile and Sprint Pitch Their Case Before Congress

Last week, T-Mobile and Sprint officially filed their public interest statement on their merger to the Federal Communications Commission (FCC).

You Should Be ‘Significantly Concerned’ There’s No White House Cyber Coordinator, Policy Experts Say

How concerned should Americans be about a White House shuffle that removed the cybersecurity coordinator position? Significantly concerned, according to a collection of top cybersecurity policy experts.  White House National Security Adviser John Bolton eliminated the cybersecurity coordinator position soon after taking office in May.

This attack is just the latest blow against local journalism

[Commentary] The attack on the Capital Gazette in Annapolis (MD) horrified the nation, but especially those of us in journalism. On a personal level, we mourn the loss of five devoted colleagues who were working tirelessly, at modest wages, to provide a vital service to their community. More broadly, though, this attack is merely the latest blow inflicted on local journalism — an institution that, despite its fundamental importance to our democracy, has been experiencing serious decline.

The 17 years since the Microsoft antitrust case taught us that regulation can spur innovation

In June of 2000, a judge in the US district court for the District of Columbia ruled that Microsoft should be broken up into two separate units—one for Microsoft’s operating system and another for its software products. In June of 2001, an appeals court disagreed. The Microsoft case set a precedent for not breaking up big tech companies, but also prohibited Microsoft from tying Internet Explorer to Windows.

LTE wireless connections used by billions aren’t as secure as we thought

The Long Term Evolution (LTE) mobile device standard used by billions of people was designed to fix many of the security shortcomings in the predecessor standard known as Global System for Mobile communications. Mutual authentication between end users and base stations and the use of proven encryption schemes were two of the major overhauls. Now, researchers are publicly identifying weaknesses in LTE that allow attackers to send nearby users to malicious websites and fingerprint the sites they visit.