Networking

BBC Interviews Charley Kline and Bill Duvall, Creators of Arpanet (bbc.com) 26

The BBC interviewed scientists Charley Kline and Bill Duvall 55 years after the first communications were made over a system called Arpanet, short for the Advanced Research Projects Agency Network. "Kline and Duvall were early inventors of networking, networks that would ultimately lead to what is today the Internet," writes longtime Slashdot reader dbialac. "Duvall had basic ideas what might come of the networks, but they had no idea of how much of a phenomenon it would turn into." Here's an excerpt from the interview: BBC: What did you expect Arpanet to become?
Duvall: "I saw the work we were doing at SRI as a critical part of a larger vision, that of information workers connected to each other and sharing problems, observations, documents and solutions. What we did not see was the commercial adoption nor did we anticipate the phenomenon of social media and the associated disinformation plague. Although, it should be noted, that in [SRI computer scientist] Douglas Engelbart's 1962 treatise describing the overall vision, he notes that the capabilities we were creating would trigger profound change in our society, and it would be necessary to simultaneously use and adapt the tools we were creating to address the problems which would arise from their use in society."

What aspects of the internet today remind you of Arpanet?
Duvall: Referring to the larger vision which was being created in Engelbart's group (the mouse, full screen editing, links, etc.), the internet today is a logical evolution of those ideas enhanced, of course, by the contributions of many bright and innovative people and organisations.

Kline: The ability to use resources from others. That's what we do when we use a website. We are using the facilities of the website and its programs, features, etc. And, of course, email. The Arpanet pretty much created the concept of routing and multiple paths from one site to another. That got reliability in case a communication line failed. It also allowed increases in communication speeds by using multiple paths simultaneously. Those concepts have carried over to the internet. Today, the site of the first internet transmission at UCLA's Boetler Hally Room 3420 functions as a monument to technology history (Credit: Courtesy of UCLA) As we developed the communications protocols for the Arpanet, we discovered problems, redesigned and improved the protocols and learned many lessons that carried over to the Internet. TCP/IP [the basic standard for internet connection] was developed both to interconnect networks, in particular the Arpanet with other networks, and also to improve performance, reliability and more.

How do you feel about this anniversary?
Kline: That's a mix. Personally, I feel it is important, but a little overblown. The Arpanet and what sprang from it are very important. This particular anniversary to me is just one of many events. I find somewhat more important than this particular anniversary were the decisions by Arpa to build the Network and continue to support its development.

Duvall: It's nice to remember the origin of something like the internet, but the most important thing is the enormous amount of work that has been done since that time to turn it into what is a major part of societies worldwide.

Communications

FCC Chair: Mobile Dead Spots Will End When Space-Based and Ground Comms Merge (theregister.com) 21

Federal Communications Commission Chair Jessica Rosenworcel outlined a vision for universal connectivity last week that merges satellite and ground-based networks. The FCC recently became the first regulator to establish a framework for supplemental coverage from space (SCS). "Satellites may be in our skies, but they are the anchor tenant in our communications future," said Rosenworcel, calling for seamless integration of fiber, cellular, wireless, and satellite infrastructure into a unified network. The vision comes as the FCC's Affordable Connectivity Program recently ended due to funding depletion.
Hardware

The Search for Room-Temperature Superconductivity is Continuing (acm.org) 66

Communications of the ACM checks in on the quest for room-temperature superconductivity. "Time and time again, physicists have announced breakthroughs that were later found to be irreproducible, in error, or even fraudulent."

But "The issue is once again simmering..." In January 2024, a group of researchers from Europe and South America announced they had achieved a milestone in room-temperature ambient-pressure superconductivity. Using Scotch-taped cleaved pyrolytic graphite with surface wrinkles, which formed line defects, they observed a room-temperature superconducting state. Their paper, published in the journal Advanced Quantum Technologies, has gained considerable attention in the scientific world... Although many in the scientific community remain incredulous, if valid, this development could help solve a key piece of the puzzle: how defects and wrinkles in a material such as scotch-taped cleaved pyrolytic graphite (HOPG) affect electrical properties and behavior within superconductive systems...

"We haven't reached a point where there is a clear path to room temperature superconductivity because researchers are either overly enthusiastic or deceptive," said Elie Track, chief technology officer at HYPRES, Inc., an Elmsford, NY, company that develops and commercializes superconductor integrated circuits (ICs) and systems. "People fail to check measurements and others can't reproduce their results. There is a lot of carelessness and sloppy science surrounding the space because people are so eager to achieve success." The team conducting research into scotch-taped cleaved pyrolytic graphite believe their discovery could tilt the search for practically useful room-temperature superconductivity in a favorable direction. They reported they were able to achieve one-dimensional superconductivity in pyrolytic graphite at temperatures as great as 300 degrees Kelvin (26.85 degrees Celsius), and at ambient pressure. Vinokur and physicist Maria Cristina Diamantini described the development as the first "unambiguous experimental evidence" for a global room temperature zero-resistance state. If true, the team's research could illuminate a path to new superconducting materials....

Others remain skeptical, however. For example Alan Kadin [a technical consultant in the field and a former professor of electrical engineering at the University of Rochester] pointed out that one of the key researchers for the project, Yakov Kopelevich, has been working in the field for two decades and, so far, "The results are not reproducible in other labs...Until someone else independently reproduces these results, I think we can safely ignore them," he argued...

Yet as scientists continue to bang away at the superconducting challenge — including the possibility of using generative AI to explore materials and techniques — optimism is growing that a major breakthrough could occur.

Cloud

Researchers Discover Flaws In Five End-to-End Encrypted Cloud Services (scworld.com) 33

SC World reports: Several major end-to-end encrypted cloud storage services contain cryptographic flaws that could lead to loss of confidentiality, file tampering, file injection and more, researchers from ETH Zurich said in a paper published this month.

The five cloud services studied offer end-to-end encryption (E2EE), intended to ensure files can not be read or edited by anyone other than the uploader, meaning not even the cloud storage provider can access the files. However, ETH Zurich researchers Jonas Hofmann and Kien Tuong Truong, who presented their findings at the ACM Conference on Computer and Communications Security (CCS) last week, found serious flaws in four out of the five services that could effectively bypass the security benefits provided by E2EE by enabling an attacker who managed to compromise a cloud server to access, tamper with or inject files.

The E2EE cloud storage services studied were Sync, pCloud, Seafile, Icedrive and Tresorit, which have a collective total of about 22 million users. Tresorit had the fewest vulnerabilities, which could enable some metadata tampering and use of non-authentic keys when sharing files. The other four services were found to have more severe flaws posing a greater risk to file confidentiality and integrity.

BleepingComputer reports that Sync is "fast-tracking fixes," while Seafile "promised to patch the protocol downgrade problem on a future upgrade." And SC World does note that all 10 of the tested exploits "would require the attacker to have already gained control of a server with the ability to read, modify and inject data.

"The authors wrote that they consider this to be a realistic threat model for E2EE services, as these services are meant to protect files even if such a compromise was to occur."

Thanks to Slashdot reader spatwei for sharing the article.
Communications

Boeing-Made Satellite Explodes In Space (cbsnews.com) 95

"Boeing has had a series of issues over the past few years," writes Slashdot reader quonset. "From planes crashing, lost service records, to a recent strike which cost them $6 billion, now comes word a satellite they made has exploded in space." CBS News reports: The Intelsat 33e satellite, which was launched in 2016 and provides communications across Europe, Asia and Africa, experienced "an anomaly" on Saturday, Intelsat said in a news release. Attempts were made to work with Boeing and repair the satellite, but on Monday, the U.S. Space Force confirmed that the satellite had exploded. The satellite's breakup left some customers without power or communications services. Intelsat said it is working with third-party providers to limit service interruptions, and is in communication with customers.

Since the breakup, the U.S. Space Force is now tracking "around 20 associated pieces" of the satellite in space. The agency said that there are "no immediate threats" and routine assessments to ensure safety are ongoing. Russia's space agency, Roscosmos, said it had recorded "more than 80 fragments" of the destroyed satellite. Analysis of the pieces' trajectory determined that the destruction of the satellite was "instantaneous and high-energy," Roscosmos said.

Republicans

Internet Users Ask FCC To Ban Data Caps (arstechnica.com) 41

An anonymous reader quotes a report from Ars Technica: It's been just a week since US telecom regulators announced a formal inquiry into broadband data caps, and the docket is filling up with comments from users who say they shouldn't have to pay overage charges for using their Internet service. The docket has about 190 comments so far, nearly all from individual broadband customers.

Federal Communications Commission dockets are usually populated with filings from telecom companies, advocacy groups, and other organizations, but some attract comments from individual users of telecom services. The data cap docket probably won't break any records given that the FCC has fielded many millions of comments on net neutrality, but it currently tops the agency's list of most active proceedings based on the number of filings in the past 30 days.
"Data caps, especially by providers in markets with no competition, are nothing more than an arbitrary money grab by greedy corporations. They limit and stifle innovation, cause undue stress, and are unnecessary," wrote Lucas Landreth.

"Data caps are as outmoded as long distance telephone fees," wrote Joseph Wilkicki. "At every turn, telecommunications companies seek to extract more revenue from customers for a service that has rapidly become essential to modern life." Pointing to taxpayer subsidies provided to ISPs, Wilkicki wrote that large telecoms "have sought every opportunity to take those funds and not provide the expected broadband rollout that we paid for."

In response to Trump-appointed FCC Commissioner Nathan Simington's coffee refill analogy, internet users "Jonathan Mnemonic" and James Carter wrote, "Coffee is not, in fact, internet service." They added: "Cafes are not able to abuse monopolistic practices based on infrastructural strangleholds. To briefly set aside the niceties: the analogy is absurd, and it is borderline offensive to the discerning layperson."
Businesses

Users Say T-Mobile Must Pay For Killing 'Lifetime' Price Lock (arstechnica.com) 56

An anonymous reader shares a report: T-Mobile promised users who bought certain mobile plans that it would never raise their prices for as long as they lived -- but then raised their prices this year. So it's no surprise that 2,000 T-Mobile customers complained to the government about a price hike on plans that were advertised as having a lifetime price lock. "I am still alive and T-Mobile is increasing the price for service by $5 per line. How is this a lifetime price lock?" one customer in Connecticut asked the Federal Communications Commission in a complaint that we obtained through a public records request.

"I am not dead yet," a customer in New York wrote bluntly, saying they had bought a plan with a "guarantee for life." Both of those customers said they purchased T-Mobile's senior plan marketed to people aged 55 and up. While the price hikes apply to customers on various plans regardless of their age, many of the complaints to the FCC came from people in the 55+ age group. Some pointed out that if T-Mobile simply waits long enough, the carrier won't have to serve 55-and-up customers forever.

Transportation

San Francisco Muni's Rail System Will Spend $212 Million To Upgrade From Floppy Disks (govtech.com) 96

San Francisco's Municipal Transportation Agency approved a $212 million contract with Hitachi Rail to modernize the Muni Metro system's outdated train control system, which currently uses floppy disks and wire loops. Government Technology reports: The software that runs the system is stored on floppy disks that are loaded each morning and an outdated type of communication using wire loops that are easily disrupted. It was expected to last for 20 to 25 years, according to Muni officials. It moves data more slowly than a wireless modem, they said. By late 2027 and into 2028, a new communications-based system, which employs Wi-Fi and cell signals to precisely track the locations of trains, will be installed by Hitachi, which will provide support services for 20 years under the agreement.

While the current train control system operates only on the Market Street subway and Central Subway, the new system will control Metro light rail trains on the system's surface lines as well. The Hitachi system is said to be five generations ahead of the current system, said Muni Director of Transit Julie Kirschbaum, who described it as the best train control system on the market.

Cellphones

T-Mobile, AT&T Oppose Unlocking Rule, Claim Locked Phones Are Good For Users (arstechnica.com) 104

An anonymous reader writes: T-Mobile and AT&T say US regulators should drop a plan to require unlocking of phones within 60 days of activation, claiming that locking phones to a carrier's network makes it possible to provide cheaper handsets to consumers. "If the Commission mandates a uniform unlocking policy, it is consumers -- not providers -- who stand to lose the most," T-Mobile alleged in an October 17 filing with the Federal Communications Commission. The proposed rule has support from consumer advocacy groups who say it will give users more choice and lower their costs.

T-Mobile has been criticized for locking phones for up to a year, which makes it impossible to use a phone on a rival's network. T-Mobile claims that with a 60-day unlocking rule, "consumers risk losing access to the benefits of free or heavily subsidized handsets because the proposal would force providers to reduce the line-up of their most compelling handset offers." If the proposed rule is enacted, "T-Mobile estimates that its prepaid customers, for example, would see subsidies reduced by 40 percent to 70 percent for both its lower and higher-end devices, such as the Moto G, Samsung A15, and iPhone 12," the carrier said. "A handset unlocking mandate would also leave providers little choice but to limit their handset offers to lower cost and often lesser performing handsets."
In July, the FCC approved a Notice of Proposed Rulemaking (NPRM) for the unlocking policy in a 5-0 vote.

The FCC is proposing "to require all mobile wireless service providers to unlock handsets 60 days after a consumer's handset is activated with the provider, unless within the 60-day period the service provider determines the handset was purchased through fraud."
Businesses

Intuit Seeks To Scrub CEO Comments on Tax Lobbying From Tech Podcast (theverge.com) 32

Intuit, the maker of TurboTax software, asked technology news outlet The Verge to delete part of a podcast interview with CEO Sasan Goodarzi, The Verge reported on Monday. The request came after Goodarzi was questioned about Intuit's lobbying efforts against free government tax filing options, a topic that has drawn scrutiny from regulators and lawmakers.

The Verge said it declined to remove the segment, instead choosing to highlight the exchange by playing it at the beginning of the episode. In the interview, Goodarzi disputed claims that Intuit lobbies against free tax filing, stating the company spends "a couple of million dollars fighting for simplified taxes." However, The Verge's editor Nilay Patel pressed Goodarzi on reports of Intuit's lobbying against government-provided tax returns. Patel adds: I got a note from Rick Heineman, the chief communications officer at Intuit, who called the line of questioning and my tone "inappropriate," "egregious," and "disappointing" and demanded that we delete that entire section of the recording. I mean, literally -- he wrote a long email that ended with "at the very least the end portion of your interview should be deleted."
Security

Microsoft's Honeypots Lure Phishers at Scale - to Spy on Them and Waste Their Time (bleepingcomputer.com) 21

A principal security software engineer at Microsoft described how they use their Azure cloud platform "to hunt phishers at scale," in a talk at the information security conference BSides Exeter.

Calling himself Microsoft's "Head of Deception." Ross Bevington described how they'd created a "hybrid high interaction honeypot" on the now retired code.microsoft.com "to collect threat intelligence on actors ranging from both less skilled cybercriminals to nation state groups targeting Microsoft infrastructure," according to a report by BleepingComputer: With the collected data, Microsoft can map malicious infrastructure, gain a deeper understanding of sophisticated phishing operations, disrupt campaigns at scale, identify cybercriminals, and significantly slow down their activity... Bevington and his team fight phishing by leveraging deception techniques using entire Microsoft tenant environments as honeypots with custom domain names, thousands of user accounts, and activity like internal communications and file-sharing...

In his BSides Exeter presentation, the researcher says that the active approach consists in visiting active phishing sites identified by Defender and typing in the credentials from the honeypot tenants. Since the credentials are not protected by two-factor authentication and the tenants are populated with realistic-looking information, attackers have an easy way in and start wasting time looking for signs of a trap. Microsoft says it monitors roughly 25,000 phishing sites every day, feeding about 20% of them with the honeypot credentials; the rest are blocked by CAPTCHA or other anti-bot mechanisms.

Once the attackers log into the fake tenants, which happens in 5% of the cases, it turns on detailed logging to track every action they take, thus learning the threat actors' tactics, techniques, and procedures. Intelligence collected includes IP addresses, browsers, location, behavioral patterns, whether they use VPNs or VPSs, and what phishing kits they rely on... The deception technology currently wastes an attacker 30 days before they realize they breached a fake environment. All along, Microsoft collects actionable data that can be used by other security teams to create more complex profiles and better defenses.

Security

Internet Archive Services Resume as They Promise Stronger, More Secure Return (msn.com) 16

"The Wayback Machine, Archive-It, scanning, and national library crawls have resumed," announced the Internet Archive Thursday, "as well as email, blog, helpdesk, and social media communications. Our team is working around the clock across time zones to bring other services back online."

Founder Brewster Kahle told The Washington Post it's the first time in its almost 30-year history that it's been down more than a few hours. But their article says the Archive is "fighting back." Kahle and his team see the mission of the Internet Archive as a noble one — to build a "library of everything" and ensure records are kept in an online environment where websites change and disappear by the day. "We're all dreamers," said Chris Freeland, the Internet Archive's director of library services. "We believe in the mission of the Internet Archive, and we believe in the promise of the internet." But the site has, at times, courted controversy. The Internet Archive faces lawsuits from book publishers and music labels brought in 2020 and 2023 for digitizing copyrighted books and music, which the organization has argued should be permissible for noncommercial, archival purposes. Kahle said the hundreds of millions of dollars in penalties from the lawsuits could sink the Internet Archive.

Those lawsuits are ongoing. Now, the Internet Archive has also had to turn its attention to fending off cyberattacks. In May, the Internet Archive was hit with a distributed denial-of-service (DDoS) attack, a fairly common type of internet warfare that involves flooding a target site with fake traffic. The archive experienced intermittent outages as a result. Kahle said it was the first time the site had been targeted in its history... [After another attack October 9th], Kahle and his team have spent the week since racing to identify and fix the vulnerabilities that left the Internet Archive open to attack. The organization has "industry standard" security systems, Kahle said, but he added that, until this year, the group had largely stayed out of the crosshairs of cybercriminals. Kahle said he'd opted not to prioritize additional investments in cybersecurity out of the Internet Archive's limited budget of around $20 million to $30 million a year...

[N]o one has reliably claimed the defacement and data breach that forced the Internet Archive to sequester itself, said [cybersecurity researcher] Scott Helmef. He added that the hackers' decision to alert the Internet Archive of their intrusion and send the stolen data to Have I Been Pwned, the monitoring service, could imply they didn't have further intentions with it.... Helme said the episode demonstrates the vulnerability of nonprofit services like the Internet Archive — and of the larger ecosystem of information online that depends on them. "Perhaps they'll find some more funding now that all of these headlines have happened," Helme said. "And people suddenly realize how bad it would be if they were gone."

"Our priority is ensuring the Internet Archive comes online stronger and more secure," the archive said in Thursday's statement. And they noted other recent-past instances of other libraries also being attacked online: As a library community, we are seeing other cyber attacks — for instance the British Library, Seattle Public Library, Toronto Public Library, and now Calgary Public Library. We hope these attacks are not indicative of a trend."

For the latest updates, please check this blog and our official social media accounts: X/Twitter, Bluesky and Mastodon.

Thank you for your patience and ongoing support.

Space

SpaceX Secures New Contracts Worth $733.5 Million For National Security Space Missions (spacenews.com) 39

An anonymous reader quotes a report from Space News: SpaceX has been awarded contracts for eight launches under the National Security Space Launch (NSSL) Phase 3 Lane 1 program, the U.S. Space Force's Space Systems Command announced Oct. 18. The contracts worth $733.5 million span seven missions for the Space Development Agency (SDA) and one for the National Reconnaissance Office (NRO) projected to launch in 2026. These are part of the NSSL Phase 3 procurement of launch services for U.S. defense and intelligence agencies.

The NSSL Phase 3 Lane 1 program is structured as an Indefinite Delivery, Indefinite Quantity (IDIQ) contract, a flexible procurement method often used in government contracting. The total value of the Lane 1 contract is estimated at $5.6 billion over five years, with Blue Origin, SpaceX, and United Launch Alliance (ULA) selected as the primary vendors to compete for individual task orders. The Space Development Agency is utilizing SpaceX's Falcon 9 rocket to launch small satellites into a low-Earth orbit (LEO) constellation, a network of satellites designed to enhance military communications and intelligence capabilities. SpaceX has already completed two successful launches for the Tranche 0 portion of SDA's constellation.

"The Phase 3 Lane 1 construct allows us to execute launch services more quickly for risk-tolerant payloads, putting more capabilities in orbit faster to support national security," said Brig. Gen. Kristin Panzenhagen, program executive officer for Assured Access to Space at the Space Force. Blue Origin's New Glenn rocket has yet to perform its first launch and will need to complete at least two successful flights to qualify for NSSL certification, while ULA's Vulcan Centaur, which has completed two flights, is still awaiting final certification for the program.

Wireless Networking

West Virginia Town of Green Bank Has Become a Refuge For Electrosensitive People (washingtonpost.com) 183

An anonymous reader quotes a report from the Washington Post: Brandon Barrett arrived here two weeks ago, sick but hopeful, like dozens before him. Just a few years back, he could dead lift 660 pounds. After an injury while training to be a professional dirt-bike rider, he opened a motorcycle shop just north of Buffalo. When he wasn't working, he would cleanse his mind through rigorous meditation. In 2019, he began getting sick. And then sicker. Brain fog. Memory issues. Difficulty focusing. Depression. Anxiety. Fatigue. Brandon was pretty sure he knew why: the cell tower a quarter-mile behind his shop and all the electromagnetic radiation it produces, that cellphones produce, that WiFi routers produce, that Bluetooth produces, that the whole damn world produces. He thought about the invisible waves that zip through our airspace -- maybe they pollute our bodies, somehow? [...]

Then Brandon read about Green Bank, an unincorporated speck on the West Virginia map, hidden in the Allegheny Mountains, about a four-hour drive southwest of D.C. There are no cell towers there, by design. He read that other sick people had moved here and gotten better, that the area's electromagnetic quietude is protected by the federal government. Perhaps it could protect Brandon. It's quiet here so that scientists can listen to corners of the universe, billions of light-years away. In the 1950s, the federal government snatched up farmland to build the Green Bank Observatory. It's now home to the Robert C. Byrd Green Bank Radio Telescope, the largest steerable telescope in the world at 7,600 metric tons and a height of 485 feet. Its 2.3-acre dish can study quasars and pulsars, map asteroids and planets, and search for evidence of extraterrestrial life.

The observatory's machines are so sensitive that terrestrial radio waves would interfere with their astronomical exploration, like a shout (a bunch of WiFi signals) drowning out a whisper (signals from the clouds of hydrogen hanging out between galaxies). So in 1958, the Federal Communications Commission created the National Radio Quiet Zone, a 13,000-square-mile area encompassing wedges of both Virginia and West Virginia, where radio transmissions are restricted to varying degrees. At its center is a 10-mile zone around the observatory where WiFi, cellphones and cordless phones -- among many other types of wave-emitting equipment -- are outlawed. Wired internet is okay, as are televisions -- though you must have a cable or satellite provider. It's not a place out of 100 years ago. More like 30. If you want to make plans to meet someone, you make them in person. Some people move here to work at the observatory. Others come because they feel like they have to. These are the 'electrosensitives,' as they often refer to themselves. They are ill, and Green Bank is their Lourdes. The electrosensitives guess that they number at least 75 in Pocahontas County, which has a population of roughly 7,500.
Literary Hub, the BBC, Slate, and the Washingtonian have non-paywalled articles about Green Bank and the "wi-fi refugees" that shelter there.
News

GPS Jamming Is Screwing With Norwegian Planes (wired.com) 156

An anonymous reader shares a report: From the ground, northeastern Norway might look like fjord country, peppered with neat red houses and dissected by snowmobile tours through the winter. But for pilots flying above, the region has become a danger zone for GPS jamming. The jamming in the region of Finnmark is so constant, Norwegian authorities decided last month they would no longer log when and where it happens -- accepting these disturbance signals as the new normal.

Nicolai Gerrard, senior engineer at NKOM, the country's communications authority, says his organization no longer counts the jamming incidents. "It has unfortunately developed into an unwanted normal situation that should not be there. Therefore, the [Norwegian authority in charge of the airports] are not interested in continuous updates on something that is happening all the time." Pilots meanwhile, still have to adapt, usually when they are above 6,000 feet in the air. "We experience this almost every day," says Odd Thomassen, a captain and senior safety adviser at the Norwegian airline Wideroe. He claims jamming typically lasts between six and eight minutes at a time.

Communications

SpaceX Requests Starlink Gen2 Modification, Previews Gigabit-Speeds (satellitetoday.com) 70

Longtime Slashdot reader schwit1 shares a report from Via Satellite: SpaceX submitted a request to the FCC to modify the second generation, Gen2, of its Starlink satellite system with changes that SpaceX said will allow the constellation to deliver gigabit-speed broadband. SpaceX submitted the filing to the FCC on Oct. 11, and it was made public on Tuesday. The operator wants to make changes to the orbital configuration and operational parameters, and requests modifications for its Gen2 frequency authorization.

These modifications "will enable the Gen2 system to deliver gigabit-speed, truly low-latency broadband and ubiquitous mobile connectivity to all Americans and the billions of people globally who still lack access to adequate broadband," Jameson Dempsey, SpaceX director of Satellite Policy said in the filing. For comparison, Starlink's current statement on service speeds is that users typically experience download speeds between 25 and 220 Mbps, and a majority of users experience speeds over 100 Mbps. In 2022, the FCC partially approved SpaceX to deploy a Gen2 Starlink constellation of up to 7,500 satellites for fixed satellite services (FSS) in the Ku- and Ka-bands, then later authorized Gen2 operations using additional frequencies in the E- and V-bands. SpaceX reported that since then, it has deployed more than 3,000 satellites in the Gen2 system and the full Starlink constellation serves more than four million people.

The Courts

Discord Disputes DMCA Subpoena, Rejects Role As 'Anti-Piracy' Partner (torrentfreak.com) 23

An anonymous reader quotes a report from TorrentFreak: Korean game publisher Nexon is using the U.S. legal system to address online copyright infringement. The company obtained a DMCA subpoena that requires Discord to hand over the personal details of suspected pirates. While Discord has shared information in the past, it doesn't plan to cooperate any longer, refusing to play the role of 'anti-piracy police'. [...] The messaging platform wrote that it is prepared to file a motion to quash the subpoena, if needed. It further urged Nexon to withdraw their demands, and cease sending any similar 'defective' subpoenas going forward. To support its stance, Discord made a list of twenty-two general objections and reservations. Among other things, the company wants to protect user privacy and their first amendment right to anonymous speech.

"Discord objects to the Requests as infringing its users' decisions to remain anonymous, an aspect of their freedom of speech protected by the First Amendment. The Requests improperly seek to unmask anonymous speakers and consequently compel disclosure of material protected by the First Amendment," it reads. This strongly-worded letter didn't have the desired result, however. Instead of backing off, Nexon doubled down, filing a motion to compel (PDF) at a Texas federal court late last week. The game company refutes Discord's objections and asks the court to enter an order requiring Discord to produce the requested user data. Nexon says that it needs this information to protect its copyrights. "Discord's failure to cooperate discovery has impeded Nexon's ability to discover relevant, non-privileged information that will support its potential claims against the users who have provided access to the infringing material," Nexon writes. While the court has yet to rule on the matter, Discord is expected to file a formal motion to quash the subpoena in response, as indicated in its earlier communications.

The Internet

FCC Launches Formal Inquiry Into Why Broadband Data Caps Are Terrible (engadget.com) 64

The Federal Communications Commission announced that it will open a renewed investigation into broadband data caps and how they impact both consumer experience and company competition. From a report: The FCC is soliciting stories from consumers about their experiences with capped broadband service. The agency also opened a formal Notice of Inquiry to collect public comment that will further inform its actions around broadband data caps. "Restricting consumers' data can cut off small businesses from their customers, slap fees on low-income families and prevent people with disabilities from using the tools they rely on to communicate," FCC Chairwoman Jessica Rosenworcel said. "As the nation's leading agency on communications, it's our duty to dig deeper into these practices and make sure that consumers are put first."
Communications

India Agrees With Musk in Satellite Spectrum Allocation Row 18

India announced on Tuesday it would allocate spectrum for satellite services through administrative means rather than auction, a decision that aligns with recent comments by Elon Musk and rebuffs lobbying efforts by the country's largest telecom operators. From a report: Jyotiraditya Scindia, India's Communications Minister, stated on Tuesday evening: "Spectrum for satcomm is shared spectrum, and cannot be auctioned. The administrative allocation of satellite spectrum is practised worldwide."

This move favors Musk's Starlink and Amazon's Project Kuiper, who have advocated for shared spectrum allocation. It contradicts Reliance Jio's position, led by India's richest man Mukesh Ambani, which has pushed for auctions to ensure a "level playing field." Musk had warned on Monday that satellite spectrum auctions "would be unprecedented," citing long-standing ITU designations of shared satellite spectrum.
Wireless Networking

AT&T, T-Mobile Prep First RedCap 5G IoT Devices 4

The first 5G Internet of Things (IoT) devices are launching soon. According to Fierce Wireless, T-Mobile plans to launch its first RedCap devices by the end of the year, while AT&T's devices are expected sometime in 2025. From the report: All of this should pave the way for higher performance 5G gadgets to make an impact in the world of IoT. RedCap, which stands for reduced capabilities, was introduced as part of the 3GPP's Release 17 5G standard, which was completed -- or frozen in 3GPP terms -- in mid-2022. The specification, which is also called NR-Light, is the first 5G-specific spec for IoT.

RedCap promises to offer data transfer speeds of between 30 Mbps to 80 Mbps. The RedCap spec greatly reduces the bandwidth needed for 5G, allowing the signal to run in a 20 MHz channel rather than the 100 MHz channel required for full scale 5G communications.

Slashdot Top Deals