Tech Law Journal Daily E-Mail Alert
Monday, October 15, 2012, Alert No. 2,461.
Home Page | Calendar | Subscribe | Back Issues | Reference
House and Senate Republicans Write Obama Opposing Regulation of Internet by Executive Order

10/11. Eleven Republican members of the House and Senate sent a letter to President Obama urging him "not to issue an executive order exerting regulatory influence over the Internet in the name of cybersecurity".

They argued that "Doing so will lend further arguments to nations such as Russia, China, and Iran that are currently seeking to upend the non-regulatory, multistakeholder governance model that has allowed the Internet to flourish. Their goal is to give the United Nations unprecedented power over the Internet infrastructure and content at an International conference in Dubai this December, and to regulate it within their borders under the guise of combating cyber threats."

They also noted that the House has already passed a cyber security bill, HR 3523 [LOC | WW], the "Cyber Intelligence Sharing and Protection Act of 2011" or "CISPA". Moreover, they wrote that the President's preferred approach of giving the Department of Homeland Security (DHS) regulatory authority over "critical infrastructure" is "the wrong approach".

The House bill would incent cyber threat information sharing. In contrast, the cyber security bill favored by the President, S 3414 [LOC | WW | PDF], the "Cybersecurity Act of 2012" or "CSA", would create a regulatory regime. It has not been passed by the full Senate, or any Senate Committee.

They also wrote that "creating a top-down, one-size fits all bureaucracy to address cybersecurity will slow our response and impose unnecessary costs on our economy", and could "provide a road map to those that wish to do us harm".

The eleven who signed this letter are Rep. Fred Upton (R-MI), Rep. Greg Walden (R-OR), Rep. Mary Mack (R-CA), Rep. Lee Terry (R-NE), Rep. Bob Latta (R-OH), Rep. Adam Kinzinger, Sen. Jim DeMint (R-SC), Sen. Pat Toomey (R-PA), Sen. Kelly Ayotte (R-NH), Sen. Marco Rubio (R-FL), and Sen. Mike Lee (R-UT).

Defense Secretary Panetta Discusses Cyber Security

10/11. Secretary of Defense Leon Panetta gave a speech in New York City in which he addressed cyber security, pending legislation, and recent cyber attacks.

He urged that Congress to pass legislation, and added that President Obama is "considering issuing an Executive Order".

Leon Panetta Panetta (at right) He stated that "It's no secret that Russia and China have advanced cyber capabilities. Iran has also undertaken a concerted effort to use cyberspace to its advantage."

"In recent weeks, as many of you know, some large U.S. financial institutions were hit by so-called Distributed Denial of Service attacks. These attacks delayed or disrupted services on customer websites. While this kind of tactic isn't new, the scale and speed with which it happened was unprecedented."

"But even more alarming is an attack that happened two months ago when a very sophisticated virus called Shamoon infected computers in the Saudi Arabian State Oil Company Aramco. Shamoon included a routine called a ‘wiper’, coded to self-execute." He continued that "More than 30,000 computers that it infected were rendered useless and had to be replaced. It virtually destroyed 30,000 computers."

"Then just days after this incident, there was a similar attack on RasGas of Qatar, a major energy company in the region. All told, the Shamoon virus was probably the most destructive attack that the private sector has seen to date."

In this speech, he stopped short of attributing these attacks to Iran.

Panetta said that "These attacks mark a significant escalation of the cyber threat and they have renewed concerns about still more destructive scenarios that could unfold. For example, we know that foreign cyber actors are probing America's critical infrastructure networks. They are targeting the computer control systems that operate chemical, electricity and water plants and those that guide transportation throughout this country. We know of specific instances where intruders have successfully gained access to these control systems. We also know that they are seeking to create advanced tools to attack these systems and cause panic and destruction and even the loss of life."

He said that "An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could, for example, derail passenger trains or even more dangerous, derail trains loaded with lethal chemicals. They could contaminate the water supply in major cities or shutdown the power grid across large parts of the country."

Panetta continued that the Department of Homeland Security (DHS) "has the lead for domestic cybersecurity, the FBI also has a key part to play and investigating and preventing cyber-attacks. And our intelligence agencies, of course, are focused on this potential threat as well. The State Department is trying to forge international consensus on the roles and responsibilities of nations to help secure cyberspace."

He said that the Department of Defense (DOD) also "has a role. It is a supporting role but it is an essential role.  And tonight I want to explain what that means. But first let me make clear what it does not mean. It does not mean that the Department of Defense will monitor citizens' personal computers. We're not interested in personal communication or in e-mails or in providing the day to day security of private and commercial networks. 

"If a crippling cyber attack were launched against our nation, the American people must be protected. And if the Commander in Chief orders a response, the Defense Department must be ready to obey that order and to act."

He also discussed private sector businesses, "Particularly those who operate the critical networks that we must help defend. To defend those networks more effectively, we must share information between the government and the private sector about threats in cyberspace. We've made real progress in sharing information with the private sector. But very frankly, we need Congress to act to ensure that this sharing is timely and comprehensive."

"Companies should be able to share specific threat information with the government, without the prospect of lawsuits hanging over their head. And a key principle must be to protect the fundamental liberties and privacy in cyberspace that we are all duty bound to uphold."

This is a loose description of the content of HR 3523 [LOC | WW], the "Cyber Intelligence Sharing and Protection Act of 2011" or "CISPA", which the Republican controlled House passed earlier this year. Yet, Panetta did not name this bill by number or title.

However, he then proceeded to urge passage of S 3414 [LOC | WW | PDF], the "Cybersecurity Act of 2012", the largely Democratic bill which the full Senate rejected just before its August recess.

Panetta said that "Information sharing alone is not sufficient. We've got to work with the business community to develop baseline standards for our most critical private-sector infrastructure, our power plants, our water treatment facilities, our gas pipelines. This would help ensure that companies take proactive measures to secure themselves against sophisticated threats, but also take common sense steps against basic threats. Although awareness is growing, the reality is that too few companies have invested in even basic cybersecurity."

He said that "cybersecurity legislation must be passed by the Congress", and "Congress must act and it must act now on a comprehensive bill such as the bipartisan Cybersecurity Act of 2012".

House Intelligence Committee Report Finds Huawei and ZTE Could Undermine US National Security

10/8. Rep. Mike Rogers (R-MI) and Rep. Dutch Ruppersburger (D-MD), the Chairman and ranking Democrat of the House Intelligence Committee (HIC) released a part of a report [60 pages in PDF] titled "Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE". The HIC did not release a "classified annex" to the report.

This report finds that "the risks associated with Huawei's and ZTE's provision of equipment to U.S. critical infrastructure could undermine core U.S. national-security interests".

It recommends that "Private-sector entities in the United States are strongly encouraged to consider the long-term security risks associated with doing business with either ZTE or Huawei for equipment or services. U.S. network providers and systems developers are strongly encouraged to seek other vendors for their projects."

Huawei responded in a release that the HIC report "failed to provide clear information or evidence to substantiate the legitimacy of the Committee's concerns". The report "employs many rumors and speculations to prove non-existent accusations".

Huawei also wrote that "We have to suspect that the only purpose of such a report is to impede competition and obstruct Chinese ICT companies from entering the US market."

This report recommends that the US intelligence community "should actively seek to keep cleared private sector actors as informed of the threat as possible".

This report recommends that the Committee on Foreign Investment in the United States (CFIUS) "must block acquisitions, takeovers, or mergers involving Huawei and ZTE".

The report recommends that proposals to give the CFIUS authority to review "purchasing agreements should receive thorough consideration by relevant Congressional committees". However, the report cites no pending bills.

The CFIUS was created by Section 721 of the "Defense Production Act of 1950", which is codified at 50 U.S.C. App. 2170. This section was significantly revised by HR 556 (110th Congress), the "Foreign Investment and National Security Act of 2007". President Bush signed it into law on July 26, 2007. It is now Public Law No. 110-49.

Neither the CISPA, SECURE IT Act, nor CSA would expand CFIUS authority to include purchasing agreements. See, HR 3523 [LOC | WW], the "Cyber Intelligence Sharing and Protection Act of 2011" or "CISPA", S 2151 [LOC | WW], the "SECURE IT Act", and S 3414 [LOC | WW | PDF], the "Cybersecurity Act of 2012" or "CSA".

This report recommends that "U.S. government systems, particularly sensitive systems, should not include Huawei or ZTE equipment, including component parts. Similarly, government contractors -- particularly those working on contracts for sensitive U.S. programs -- should exclude ZTE or Huawei equipment in their systems."

It also states that "Committees of jurisdiction within the U.S. Congress and enforcement agencies within the Executive Branch should investigate the unfair trade practices of the Chinese telecommunications sector, paying particular attention to China’s continued financial support for key companies."

In addition, "Committees of jurisdiction in the U.S. Congress should consider potential legislation to better address the risk posed by telecommunications companies with nation-state ties or otherwise not clearly trusted to build critical infrastructure. Such legislation could include increasing information sharing among private sector entities, and an expanded role for the CFIUS process to include purchasing agreements."

The report is silent as to whether antitrust regulators in the US should leverage their power to block mergers to impose supply chain conditions.

For example, both the Department of Justice's (DOJ) Antitrust Division and the Federal Communications Commission (FCC) will stand in judgment of the proposed T-Mobile USA MetroPCS combination. See, story titled "T-Mobile USA and MetroPCS to Merge" in TLJ Daily E-Mail Alert No. 2,457, October 3, 2012.

Both companies do business with PRC companies. For example, on September 21, MetroPCS and ZTE announced in a release that MetroPCS will sell the ZTE Anthem 4G. See also, March 16 release.

TLJ spoke during the Bush administration with then DOJ Assistant Attorney General Thomas Barnett regarding the role of national security in DOJ telecom antitrust merger reviews during a recess of a House Judiciary Committee (HJC) hearing. He explained that the DOJ conducts economic analysis and applies federal antitrust law. However, he used words such a "primary", rather than "only", to describe the DOJ's concern for antitrust law and economics. He also passed up the opportunity to state that national security concerns never influence DOJ antitrust merger reviews. (Also, the questions did not reference foreign supply chain concerns.)

The HIC investigated Huawei and ZTE. This included requests records, asking questions, traveling to the PRC, and conducting a hearing.

The HIC held a hearing on September 13 titled "National Security Threats Posed by Chinese Telecom Companies Working in the U.S." Charles Ding (Corporate SVP of Huawei) and Zhu Jinyun (SVP for North America and Europe, ZTE) argued that their companies are independent of the government and military of the People's Republic of China (PRC) and do not present security threats to the US or US businesses. See, story titled "House Intelligence Committee Holds Hearing on PRC Telecoms" in TLJ Daily E-Mail Alert No. 2,451, September 19, 2012.

The report is notable for its lack of factual allegations that identify specific acts by either Huawei or ZTE that constitute support for cyber espionage, and cyber warfare activities  by PRC companies, government or military. However, the report does not disclose classified information that the HIC received from US intelligence agencies.

The report emphasizes the lack of cooperation provided by the two companies during the HIC's investigation, and the extensive record or cyber espionage, and theft of trade secrets and intellectual property,  by PRC companies and government. 

This report concludes that the HIC "remains unsatisfied with the level of cooperation and candor provided by" Huawei and ZTE.

"Neither company was forthcoming with detailed information about its formal relationships or regulatory interaction with Chinese authorities. Neither company provided specific details about the precise role of each company’s Chinese Communist Party Committee. Furthermore, neither company provided detailed information about its operations in the United States. Huawei, in particular, failed to provide thorough information about its corporate structure, history, ownership, operations, financial arrangements, or management. Most importantly, neither company provided sufficient internal documentation or other evidence to support the limited answers they did provide to Committee investigators."

This report was prepared by Rep. Roger and Rep. Ruppersburger. It was not subjected to consideration and vote by the full Committee. However, other members of the HIC announced their support.

For example, Rep. Adam Schiff (D-CA) stated in a release that "At a time when Chinese collection intelligence efforts against the United States are significant, and Chinese theft of American trade secrets is rampant, handing critical telecommunications infrastructure to Huawei and ZTE poses too great a threat to our security and economy."

He added that "until the Chinese government takes real steps to curtail Chinese cyber intrusions and the theft of trade secrets, and these firms become far more transparent, the U.S. government and private sector entities must view the provision of critical infrastructure by these two companies as a risky proposition."

See also, stories titled:

Sen. Grassley States Cyber Security Should Be Addressed by Legislation Rather Than Presidential Order

10/5. The Executive Office of the President has not yet released are final or draft executive order that attempts to impose a regulatory regime upon US companies for the purpose of promoting cyber security.

Sen. Charles Grassley (R-IA) issued a release on October 5 that states that "the White House called a meeting with Senate staff about the President's upcoming executive order on cybersecurity."

Sen. Grassley stated that "The Senate staff meeting with representatives from the Obama Administration made clear that cybersecurity is a complex topic that should be addressed by the legislative process, rather than by administrative fiat via an Executive Order."

He continued that "The executive branch does not have the legal authority to implement a comprehensive cybersecurity policy. Consequently, an Executive Order could potentially result in intrusive regulation, confusion, gaps in coverage, and uneven application of policy, thus causing more harm than good. The Administration should work constructively with Congress to carefully craft legislation to improve our nation's cybersecurity."

Sen. Grassley is a co-author of S 2151 [LOC | WW], the "SECURE IT Act". Sen. John McCain (R-AZ) is the lead sponsor.

Sen. Rockefeller Sends Interrogatories to 500 CEOs

9/19. Sen. John Rockefeller (D-WV) sent a letter [PDF] to the Chief Executive Officers (CEOs) of every one of the Fortune 500 companies regarding S 3414 [LOC | WW | PDF], the "Cybersecurity Act of 2012" or "CSA". He is a cosponsor.

Sen. John RockefellerThe Senate Democratic leadership released the latest version of this bill just before bringing it to the Senate floor for a vote, without committee hearings, committee mark ups, or opportunity for debate and amendment in the full Senate.

Sen. Rockefeller (at right) stated that he "was profoundly disappointed" that the Senate did not pass this bill. This letter contains numerous written interrogatories, which Sen. Rockefeller wants answered by 500 CEOs.

He explains that he sends these letters because "business lobbying groups and trade associations, most notably the United States Chamber of Commerce" opposed the bill.

It is unusual for a Committee Chairman to write such a letter to such a large number of people. Committees sometimes write letters soliciting information from companies, groups or individuals, but these are limited in number, and narrowly targeted. For example, Committees often send letters to people or entities when the Committee is investigating potential wrongdoing by persons or entities regulated by an executive branch agency over which the Committee exercises oversight jurisdiction. But, that is not the case here.

Moreover, Sen. Rockefeller sent most of these letters to companies that provide no equipment, software, or services related to the internet or information technologies. Most of these letters went to companies that do not provide any critical infrastructure that would be targeted in cyber attacks.

Indeed, Sen. Rockefeller sent letters to companies that make and/or sell candy, soft drinks, women's make up, children's toys, shoes, movies, junk food, coffee, gambling services and other things that are not on the cyber target lists of America's enemies.

In addition, the some of the questions are polemic, and inaccurately describe the contents of this bill. For example, the bill would authorize the government to impose mandates. However, one question presumes that the bill would merely create a "voluntary program".

The letter states that it asks for recipients' "views on cybersecurity". However, the letter asks no questions about other competing bills in the House and Senate. There are also no questions about developing cyber warfare capability, the defense authorization bill, or the defense appropriations bill.

These 500 letters may constitute an angry retaliatory harangue by a frustrated legislator.

In This Issue
This issue contains the following items, all of which are related to cyber security:
 • House and Senate Republicans Write Obama Opposing Regulation of Internet by Executive Order
 • Defense Secretary Panetta Discusses Cyber Security
 • House Intelligence Committee Report Finds Huawei and ZTE Could Undermine US National Security
 • Sen. Grassley States Cyber Security Should Be Addressed by Legislation Rather Than Presidential Order
 • Sen. Rockefeller Sends Interrogatories to 500 CEOs
 • Commentary: Governmental Process in Regulating Cyber Security
 • More Cyber Security News
Washington Tech Calendar
New items are highlighted in red.
Monday, October 15

The House will not meet. It is in recess, except for pro forma sessions, until after the November elections.

The Senate will not meet. It is in recess, except for pro forma sessions, until November 13, 2012.

Day one of a two day workshop hosted by the National Institute of Standards and Technology's (NIST) Computer Security Division (CSD) titled "Supply Chain Risk Management". The price to attend is $56. See, notice and registration page. Location: NIST, Gaithersburg, MD.

9:30 AM - 4:00 PM. The Office of the U.S. Trade Representative's (OUSTR) Industry Trade Advisory Committee on Small and Minority Business will hold a partially closed meeting. See, notice in the Federal Register, Vol. 77, No. 194, October 5, 2012, Pages 61046-61047. Location: Ronald Reagan International Trade Center.

EXTENDED TO OCTOBER 22. Deadline to submit comments to the U.S. Patent and Trademark Office (USPTO) in response to its notice of inquiry regarding changing its trademark application filing fees. See, original notice in the Federal Register (FR), Vol. 77, No. 159, August 16, 2012, at Pages 49426-49427. See also, extension notice in the FR, Vol. 77, No. 182, September 19, 2012, at Page 58097.

Deadline to submit reply comments to the Federal Communications Commission's (FCC) Public Safety and Homeland Security Bureau (PSHSB) in response to its Fourth Further Notice of Proposed Rulemaking regarding establishing and implementing a reconfigured 800 MHz channel plan along the U.S. Mexico border. The PSHSB released its Public Notice [31 pages in PDF] on August 17, 2012. It is DA 12-1343 in WT Docket No. 02-55. See also, August 31 Public Notice, and notice in the Federal Register, Vol. 77, No. 169, August 30, 2012, at Pages 52633-52636.

Tuesday, October 16

The House will meet at 2:00 PM in pro forma session.

The Senate will meet at 10:00 AM in pro forma session.

Day two of a two day workshop hosted by the National Institute of Standards and Technology's (NIST) Computer Security Division (CSD) titled "Supply Chain Risk Management". The price to attend is $56. See, notice and registration page. Location: NIST, Gaithersburg, MD.

8:00 - 10:00 AM. Broadband Census News LLC will host a panel discussion titled "Reforming the Universal Service Fund: What's Changing?". The speakers will be Jeffrey Lanning (CenturyLink), Jennifer McKee (NCTA), Michael Romano (National Telecommunications Cooperative Association), Mike Wilson (CostQuest Associates), and Eliza Krigman (Politico). Breakfast will be served. This event is open to the public. The price to attend is $47.12. See, notice and registration page. This event is also sponsored by Comcast, Google, ICF Intl., NCTA TIA, and US Telecom. Location: Clyde's of Gallery Place, 707 7th St., NW.

11:00 AM - 2:00 PM. The National Science Foundation's (NSF) Networking and Information Technology Research and Development National Coordination Office's Large Scale Networking Coordinating Group's Joint Engineering Team will meet. See, notice in the Federal Register, Vol. 77, No. 183, September 20, 2012, at Pages 58415-58416. Location: NSF, 4201 Wilson Boulevard, Arlington, Virginia.

12:15 PM The Federal Communications Bar Association's (FCBA) Wireless and Young Lawyers Committees will host a brown bag lunch titled "The Spectrum Screen and Competitive Analysis of the Wireless Industry". The speakers will be __. No CLE credits. For more information, contact Justin Faulb at JFaulb at eckertseamans dot com or Trey Hanbury at Trey dot Hanbury at sprint dot com. Location: __.

6:30 - 7:45 PM. The New America Foundation (NAF) will host a panel discussion titled "Planning for Technology". The speakers will be Rosanne Ferruggia (University of Maryland), Patrick Lucey (NAF), Greta Byrum (NAF), and Preston Rhea  (NAF). See, notice. Location: NAF, Suite 400, 1899 L St., NW.

7:00 - 9:00 PM. The South Asian Bar Association of Washington DC, Asian Pacific American Bar Association of the Greater Washington DC, and DC Bar Association will host an on site and webcast panel discussion titled "Best Practices for In-House Management of Patent Litigation at the International Trade Commission". The speakers will be Vaishali Upupa (Hewlett Packard), Aarti Shah (Investigative Attorney, U.S. International Trade Commission), and Probir Mehta (Deputy Assistant U.S. Trade Representative). No CLE credits. Register by e-mail at vthompson at bakerlaw dot com. For more information, contact A.J. Dhaliwal at 202-461-2932. See, notice. The DC Bar has a history of barring reporters from its events. Location: Baker Hostetler, 1050 Connecticut Ave., NW.

EXTENDED TO OCTOBER 23. Deadline to submit reply comments to the Federal Communications Commission (FCC) in response to its Notice of Proposed Rulemaking (NPRM) regarding proposed changes to the FCC's policies and procedures for assessing and collecting regulatory fees. The FCC adopted this NPRM on July 13, 2012, and released it on July 17, 2012. It is FCC 12-77 in MD Docket No. 12-201. See, original notice in the Federal Register (FR), Vol. 77, No. 160, August 17, 2012, at Pages 49749-49773, and extension notice in the FR, Vol. 77, No. 193, October 4, 2012, at Pages 60666-60667.

Wednesday, October 17

7:45 AM - 5:30 PM. Day one of a two day meeting of the National Science Foundation's (NSF) Advisory Committee for Engineering. See, notice in the Federal Register Vol. 77, No. 189, September 28, 2012, at Pages 59674-59675. Location: NSF, 4201 Wilson Boulevard, Suite 1235, Arlington, VA.

9:00 AM - 3:00 PM. The Department of Health and Human Services' (DHHS) Office of the National Coordinator for Health Information Technology's (ONCHIT) HIT Standards Committee will meet. See, notice in the Federal Register, Vol. 77, No. 192, October 3, 2012, at Pages 60438-60439. Location: Omni Shoreham Hotel, 2500 Calvert St., NW.

12:00 NOON. The World Wide Web Consortium's (W3C) Tracking Protection Working Group will meet by teleconference. The call in number is 1-617-761-6200. The passcode is TRACK (87225).

12:00 NOON - 2:00 PM. The National Science Foundation's (NSF) Advisory Committee for Cyberinfrastructure will meet online and on site. See, notice in the Federal Register, Vol. 77, No. 185, September 24, 2012, at Page 58871. Location: NSF, 4201 Wilson Blvd., Room 1295, Arlington, VA.

12:15 - 1:30 PM. The Federal Communications Bar Association's (FCBA) Wireline Committee will host a brown bag lunch titled "The PSTN to IP Transition. What Comes Next After Intercarrier Compensation Reform?". The speakers will be __. No CLE credits. Location: Wiley Rein, 1750 K St., NW.

1:00 - 2:30 PM. The American Bar Association (ABA) will host a webcast and teleconferenced panel discussion titled "Strategic and Effective Litigation Before the Trademark Trial and Appeal Board". The speakers will be Cheryl Butler (Interlocutory Attorney, TTAB), Mary Kevlin (Cowan Liebowitz & Latman), Angela Lykos (Administrative Trademark Judge, TTAB), and Jonathan Hudis (Oblon Spivak). Prices vary. CLE credits. See, notice.

5:30 - 7:30 PM. The American Bar Association (ABA) will host an event titled "Mixing Antitrust and IP: A Social Mixer". The speakers will be Maureen Ohlhausen (FTC Commissioner), Renata Hesse (Deputy Assistant Attorney General), and Gail Levine (Verizon). No CLE credits. See, notice. Location: Wilson Sonsini, 5th floor, 1700 K St., NW.

Thursday, October 18

7:45 AM - 12:45 PM. Day one of a two day meeting of the National Science Foundation's (NSF) Advisory Committee for Engineering. See, notice in the Federal Register Vol. 77, No. 189, September 28, 2012, at Pages 59674-59675. Location: NSF, 4201 Wilson Boulevard, Suite 1235, Arlington, VA.

9:00 AM - 5:00 PM. The Federal Trade Commission (FTC) will host an event titled "FTC Robocall Summit". Free. Open to the public. See, notice and agenda. Location: FTC Conference Center, 601 New Jersey Ave., NW.

9:00 - 10:00 AM. The American Bar Association (ABA) will host a webcast and teleconferenced panel discussion titled "Cartel Enforcement Around the World: Chapter 6: Taiwan, Singapore & India". The speakers will be Mark Rosman (Wilson Sonsini), Liehling Wu (Taiwan Fair Trade Commission), Ng Ee Kia (Drew & Napier), and Vinod Dhall (Dhall Law Chambers). Free. No CLE credits. See, notice.

9:30 AM. The U.S. Court of Appeals (DCCir) will hear oral argument in PMCM TV v. FCC, App. Ct. No. 11-1330. This is an appeal from an order of the FCC denying applications to reallocate VHF TV licenses under 47 U.S.C. § 331(a). See, FCC brief [89 pages in PDF]. Judges Garland, Tatel, and Kavanaugh will preside. This is the third item on the Court's agenda. Location: Courtroom 11, 4th floor, Prettyman Courthouse, 333 Constitution Ave., NW.

11:45 AM - 2:30 PM. The Free State Foundation (FSF) will host an event titled "Ideas for Communications Law and Policy Reform for 2013". The speakers will include FCC Commissioner Robert McDowell, Randolph May (FSF), Robert Atkinson (Information Technology & Innovation Foundation), James Gattuso (Heritage Foundation), David Honig (Minority Media & Telecommunications Council), and Adam Thierer (Mercatus Center). Open to the public. Registration required: send e-mail to kbaker at freestatefoundation dot org. Lunch will be served. Location. National Press Club, 13th Floor, 529 14th St., NW.

1:00 - 5:00 PM. The Department of State's (DOS) Advisory Committee on Private International Law's (ACPIL) Online Dispute Resolution (ODR) Study Group will meet. The purpose is to prepare for November 5-9, 2012 meeting of the United Nations Commission on International Trade Law Working Group III  regarding online dispute resolution pertaining to cross border electronic commerce transactions. See, notice in the Federal Register, Vol. 77, No. 184, September 21, 2012, at Page 58607. Location: DOS, Navy Hill, Room 240, South Building, 2430 E St., NW.

3:00 - 4:30 PM. The Information Technology and Innovation Foundation (ITIF) will host an event titled "A Debate: Is the American Economy in Decline?". The speakers will be Robert Atkinson (ITIF, author of the book titled "Innovation Economics: The Race for Global Advantage"), Edward Luce (Financial Times, author of the book titled "Time to Start Thinking: America in the Age of Descent"), and Daniel Gross (author of the book titled "Better Stronger Faster: The Myth of American Decline ... and the Rise of a New Economy") . See, notice. Location: Woodrow Wilson Center for International Scholars, 5th Floor Conference Room, 1300 Pennsylvania Ave., NW.

6:00 - 8:00 PM. The Federal Communications Bar Association (FCBA) will host an event titled "Meet the Bureau and Office Chiefs Reception". Prices vary. See, notice and registration form. Location: Capital Hilton, 1001 16th St., NW.

Deadline to submit to the Federal Communications Commission (FCC) oppositions to the three robocallers' petitions for reconsideration of the FCC's order [48 pages in PDF] regarding implementation of the Telephone Consumer Protection Act (TCPA) and telemarketing robocalling. The FCC adopted and released this order on February 15, 2012. It is FCC 12-21 in CG Docket No. 02-278. See, petition [23 pages in PDF] of the Professional Association for Customer Engagement, petition [2 pages in PDF] of Marketlink, Inc., and petition [5 pages in PDF] of SatCom Marketing LLC. They object to, among other things, the abandoned call opt-out provision. See also, notice in the Federal Register, Vol. 77, No. 192, October 3, 2012, at Page 60343.

Friday, October 19

The Senate will meet at 11:00 AM in pro forma session.

Day one of a two day event titled "2012 National Trademark Expo". Free. Open to the public. See, notice. Location: U.S. Patent and Trademark Office (USPTO), Alexandria, VA.

12:00 NOON - 1:30 PM. The American Bar Association (ABA) will host a webcast and teleconferenced panel discussion titled "America Invents Act: Understanding the New Post-Grant and Inter Partes Review Proceedings". The speakers will be __. Prices vary. CLE credits. See, notice.

Extended deadline to submit comments to the Copyright Office (CO) in response to its Notice of Inquiry (NOI) regarding creating a small copyright claims process. See, original notice in the Federal Register (FR), Vol. 77, No. 164, August 23, 2012, at Pages 51068-51071, which contains the NOI. See also, extension notice in the FR, Vol. 77, No. 179, September 14, 2012, at Pages 56874-56875, which extends the deadline from September 26 to October 19. See also, stories titled "Copyright Office Seeks Comments on Creating a Process for Adjudicating Small Copyright Claims", "Orphan Works Legislation and Adjudicating Small Copyright Claims", and "Summary of First Round of Comments on Creating a Process for Adjudicating Small Copyright Claims" in TLJ Daily E-Mail Alert No. 2,445, September 11, 2012.

Saturday, October 20

Day two of a two day event titled "2012 National Trademark Expo". Free. Open to the public. See, notice. Location: U.S. Patent and Trademark Office (USPTO), Alexandria, VA.

Monday, October 22

10:30 AM - 1:00 PM. The Heritage Foundation (HF) will host an event titled "The Economic and Security Direction of the New Chinese Government". There will be two panels. The first is titled "Politics and Security". The speakers will be Cheng Li (Brookings Institution), Chris Yung (National Defense University), Dean Cheng (HF), and Walter Lohman (HF). The second panel is titled "Economics". The speakers will be Arvind Subramanian (Peterson Institute for International Economics), Melanie Hart (Center for American Progress), Derek Scissors (HF), and Terry Miller (HF). Free. Open to the public. Live webcast. See, notice. Location: HF, 214 Massachusetts Ave., NE.

1:00 - 2:30 PM. The American Bar Association (ABA) will host a webcast and teleconferenced panel discussion titled "Taking the RAND Case to Trial". The speakers will be Eric Benisek and Richard Vasquez (both of Vasquez Benisek & Lindgren). Prices vary. CLE credits. See, notice.

Deadline to submit comments to the Department of Justice's (DOJ) Antitrust Division regarding the proposed final judgment in US v. Verizon, D.C. No. Case 1:12-cv-01354. See, notice in the Federal Register, Vol. 77, No. 164, August 23, 2012, at Pages 51048-51064. See also, story titled "DOJ Approves Verizon Cable Deals" in TLJ Daily E-Mail Alert No. 2,429, August 15, 2012.

Extended deadline to submit comments to the U.S. Patent and Trademark Office (USPTO) in response to its notice of inquiry regarding changing its trademark application filing fees. See, original notice in the Federal Register (FR), Vol. 77, No. 159, August 16, 2012, at Pages 49426-49427, and extension notice in the FR, Vol. 77, No. 182, September 19, 2012, at Page 58097.

Commentary: Governmental Process in Regulating Cyber Security

11/15. Many in federal government are not following ordinary procedure, as specified by the Constitution and the rules of the House and Senate, to address cyber security.

For example, the Congress has not enacted any legislation that gives the President or any executive agency or commission authority to regulate private companies' business practices related to cyber security. There are pending bills, but none has been enacted.

The Constitution provides that "All legislative Powers herein granted shall be vested in a Congress ...". The Constitution gives the President "executive Power", and authority to "take Care that the Laws be faithfully executed".

Yet, if the President were to issue an executive order, as members of his administration have said he might do, directing the Department of Homeland Security (DHS) to regulate the cyber security practices of critical infrastructure providers, this would be an exercise of legislative authority which he does not have.

Second, the action by Rep. Mike Rogers (R-MI) and Rep. Dutch Ruppersburger (D-MD), the Chairman and ranking Democrat of the House Intelligence Committee (HIC) regarding Huawei, ZTE and the regulation of US companies' acquisitions and supply chain processes is also extraordinary.

The HIC and its Senate counterpart were created by the House and Senate to exercise oversight over federal intelligence agencies and operations, and occasionally enact laws that specify the authorities and activities of these agencies.

First, it should be noted that even the concept of executive branch oversight is conspicuously absent from the Constitution's enumeration of Congressional powers. But, what Rep. Rogers and Rep. Ruppersburger are essentially attempting is oversight over non-governmental private sector companies, a power which they do not have. Moreover, their report [60 pages in PDF] is not an action of the Congress, or even the HIC. It is an action of only two members.

Third, while Senate Democratic leaders have taken steps related to legislating, they have not followed Senate procedure.

S 3414 [LOC | WW | PDF], the "Cybersecurity Act of 2012" or "CSA" is the bill backed by Senate Majority Leader Harry Reid (D-NV). It is also President Obama's favored bill. However, this is a hastily drafted bill, vast swaths of which read like a first discussion draft. Key terms remain undefined. Some powers are vaguely stated and would fail to put regulators and companies on notice of their meaning. Critical issues are left unaddressed.

Ordinary Senate procedure would be to assign the bill to committees with jurisdiction (which has not yet occurred), conduct committee hearings (which has not yet occurred), hold committee mark ups to amend and clarify the bill (which has not yet occurred), and then bring an amended bill to the floor under a process that allows further amendment.

Sen. Reid skipped the entire committee process, and then brought a premature bill to the floor without opportunity for full debate and amendment, just before the August recess. Not surprisingly, the Senate did not pass any bill.

More Cyber Security News

Catherine Ashton10/4. Catherine Ashton (at right), a senior European Commission official, gave a speech in Budapest, Hungary, titled "Cyber security: an open, free and secure Internet". Her title is "High Representative of the Union for Foreign Affairs and Security Policy and Vice-President of the European Commission"

10/1. President Obama issued a proclamation that proclaims that October is "National Cyber Security Awareness Month". See, notice in the Federal Register, Vol. 77, No. 193,  October 4, 2012, Pages 60607-60608. See also, Department of Homeland Security (DHS) release and National Cyber Security Alliance release.

About Tech Law Journal

Tech Law Journal publishes a free access web site and a subscription e-mail alert. The basic rate for a subscription to the TLJ Daily E-Mail Alert is $250 per year for a single recipient. There are discounts for subscribers with multiple recipients.

Free one month trial subscriptions are available. Also, free subscriptions are available for federal elected officials, and employees of the Congress, courts, and executive branch. The TLJ web site is free access. However, copies of the TLJ Daily E-Mail Alert are not published in the web site until two months after writing.

For information about subscriptions, see subscription information page.

Tech Law Journal now accepts credit card payments. See, TLJ credit card payments page.

Solution Graphics

TLJ is published by David Carney
Contact: 202-364-8882.
carney at techlawjournal dot com
3034 Newark St. NW, Washington DC, 20008.

Privacy Policy
Notices & Disclaimers
Copyright 1998-2012 David Carney. All rights reserved.