The use of computers and the Internet in conducting warfare in cyberspace.
Cyberwarfare and Cybersecurity
A number of readers have reached out to us at Benton asking for help figuring out where to find all the pools of broadband support appropriated by Congress over the past year. So we've decided to create this placeholder for all the funding we've seen in the CARES Act, the Consolidated Appropriations Act, 2021, and the American Rescue Plan.
With great drama, the Consolidated Appropriations Act, 2021 became law on December 27, 2021. The $2.3 trillion COVID relief and government spending bill extended unemployment benefits and ensured the government can keep running. The $900 billion COVID relief provision includes over $7 billion to help improve connectivity in the U.S.
Millions of records that the Federal Communications Commission’s top lawyer once fought to hold back from state law enforcement officials now serve as key evidence in a year-long probe into cases of Americans being impersonated during the agency’s latest net neutrality proceeding.
Verizon is pledging to stop selling information on phone owners’ locations to data brokers, stepping back from a business practice that has drawn criticism for endangering privacy. The data has allowed outside companies to pinpoint the location of wireless devices without their owners’ knowledge or consent. Verizon said that about 75 companies have been obtaining its customer data from two little-known CA-based brokers that Verizon supplies directly — LocationSmart and Zumigo.
Some White House officials view next-generation 5G wireless service as a “key area of competition,” and they say that the threat from China, in particular, justifies a “moonshot” government effort like the construction of the interstate highway system. A National Security Council memo urges the Trump administration to consider extraordinary efforts to clear the way for the new technology or even to help build it in order to counter the growing economic and political threat from China’s aggressive efforts to develop 5G.
Today we gather during National Supply Chain Integrity Month to discuss ways to strengthen our supply chain against potential bad actors. Policymakers must ensure that small and mid-sized carriers have access to equipment and services that are not only secure but make good business sense.
There can no longer be any question that, when it comes to network security, the threats are real, the stakes are high, and our defenses need to constantly evolve and improve. At the Federal Communications Commission, under my leadership, we are pursuing a proactive, three-pronged strategy to building a more secure, resilient, and next-generation communications supply chain for this 5G future. To start, we are taking direct action to slow down untrusted vendors both at home and abroad. But we are also recognizing that “Just Say No” is not a strategy.
The US government has built robust programs to track terrorists and criminals through warrantless access to commercial data. Many vendors now provide global location information from mobile phones to intelligence, military and law-enforcement organizations.
Around the world, governments are moving simultaneously to limit the power of tech companies with an urgency and breadth that no single industry had experienced before. Their motivation varies.