Was Google Fiber Not Able to Cut Deals with Time Warner, Fox or Disney?


Google's much-discussed big fiber project in Kansas City officially launched today and will no doubt be endlessly analyzed in the tech media and closely watched for innovations as the weeks and months progress. The big selling point of the search giant's experiment is the gigabit broadband service, which Google is touting as 100 times faster than what most Americans receive and is priced at a remarkably competitive $70/month.

The second biggest selling point is the "free" Internet 5 Mbps/download broadband service, available for a one-time fee of $300.  But the third biggest selling point, and the worst kept secret in the world, is Google's package of 159 cable channels, which is bundled together with the gigabit broadband service for a still-competitive $120/month.

But a closer look at those 159 cable channels reveals something interesting:  not a single one is owned by top cable program network owners Time Warner, News Corp. or Disney-ABC Networks.  Time Warner owns CNN, HBO, Cartoon Network and a number of popular and, some would say, mandatory networks.  Disney-ABC Networks owns the Disney Channel and another mandatory cable network, ESPN (along with a host of ESPN-affiliated networks), plus a number of other popular cable channels.  News Corp. owns a host of channels under the Fox brand name, including a number of sports channels (Big Ten Network, Fox College Sports and more), FX Networks, Fox Reality Channel, the National Geographic Channel and the arguably mandatory channel, Fox News.

So why did Google launch a video programming package that is missing CNN, ESPN, HBO and Fox News?  In all likelihood, Google was unable to cut a deal with any of the three programming giants by the time of today's announcement.

Although Time Warner was obligated (until this very weekend in fact) to make its programming available to competitive multichannel video programming providers under program access requirements enacted by the Congress in 1992 and subsequently adopted by rulemaking at the FCC, those obligations no longer stand because Time Warner Cable, the operator in Kansas City, no longer has ownership ties with the programmer.  Neither News Corp. or Disney-ABC ever had any obligations to sell its programming to competitive providers.

The only cable programmer under the program access requirements (which apply only to vertically integrated programmers - i.e. companies that own both cable networks and cable systems) obligated to sell to Google is Comcast-NBC Universal and Google is carrying most of Comcast-NBC Universal's channels, including E! Entertainment, MLB Channel (jointly owned by Comcast-NBCU, MLB and others) and the Golf Channel.

Google is telling the world to stay tuned and watch for new announcements over the coming weeks.  Maybe some of those announcements will include the addition of new channels from Time Warner, News Corp. or Disney-ABC.

Information Sharing, Flexibility Are Key to Utility Cyber Security, Officials Tell Senate



Mechanisms should be put into place that allow for adequate, actionable information sharing among utility cyber security specialists and government agencies charged with monitoring security threats, a group of government and industry self-regulatory officials said today during a hearing held by the Senate Committee on Energy and Natural Resources.”There should be a mechanism in place for sharing that [cyber threat] information in a timely and effective manner,” Gregory Wilshusen, Director of Information and Technology at the General Accounting Office (GAO) said during his testimony.

The widely recognized problem in sharing information about cyber threats was documented in a GAO study, which found that sensitive national security-related cyber threat information wasn't being filtered down to electric utilities. “The information that DHS provided was not meeting the expectation of their private partners. The information was not actionable and timely,” Wilshusen said.

“The information is ad hoc across agencies,” Gerry Cauley, President and CEO of the North American Electric Reliablity Corporation (NERC) testified. “We have very limited access to clearances within the industry, particularly on the top secret side.”

“We hear from our utilities that it is a one-way information street,” Todd Snitchler, Chairman of the Ohio Public Utilities Commission said, referring to the frustration utilities experience in not gaining early knowledge about threats well-know among federal security organizations.  Also hindering the flow of two-way information is fear of liability or exposure when they do report threats to state or federal authorities. “Anonymous sharing would help,” Snitchler added.

Although minimum technical standards, such as those developed by NERC or under development by the National Institutes of Standards and Technology (NIST) are essential for maintaining adequate cyber security, flexibility to respond to unique threats in fluid situations is equally essential.

“Individual entities have to have the latitude to have the directive but not be so prescriptive as to tie them into a certain response,” Joseph McClelland, Director of the Office of Electric Reliability at the Federal Energy Regulatory Commission said. “The standard needs to compel action but provide latitude.”

Multiple layers of standards and instructions are needed to provide that flexibility, Wilshusen said. “You don't want to have to change the standard when a new threat comes along.”

Committee Chair Jeff Bingaman (D-NM) pressed the witnesses to address the threat of electromagnetic pulses (EMP) to the power grid from enemy attack or solar flares, an issue raised last week by former Republican Speaker of the House Newt Gingrich in a widely published op-ed piece following the Northeast storm-induced power outages. McClelland said that coordinated studies need to be done and standards need to be developed to address EMP threats. 

Bingaman was not, however, satisfied with this reponse. “I get this feeling we might be studying this issue while the electric grid collapses,” he said.

Senator Al Franken (D-MN) probed the issue of supply chain threats given that many of the components, such as semiconductors, that make up the new digital grid are manufactured in countries, such as China or North Korea, which may have a vested interested in monitoring or controlling the U.S. Grid. Wilshusen conceded that supply chain threats are real. “IT supply chain is a vulnerability. We looked at several agencies, DHS, Energy and Department of Defense and we found that agencies haven't adequately developed mechanism to address that vulnerability.”

The hearing took place in advance of a compromise cyber security bill that the Senate will likely begin considering by the end of next week. Championed by Joseph Lieberman (I-CT), the legislation will focus on information sharing among critical infrastructure industries and federal agencies. Lieberman and the Obama Administration have been pushing for legislation that allows the Department of Homeland Security to impose minimum, mandated security requirements on critical infrastructure, including utilities.

What Smart Meter Activists Lack in Science, They Make Up for in Effectiveness




Today's pace of increasingly rapid technological change fosters all kinds of psychological and social dislocations and nowhere is this more true than with the advent of the smart grid, which requires digital smart meters to be installed at every customer's location. The worries spawned by the devices, which feature two-way radio or RF communication features, seem to be growing, with dozens of campaigns underway to block or at the minimum allow customers to opt-out out of the meter installations.

Over the past month, developments have pushed the issue of smart meter threats more clearly onto the national radar screen. Last week, Maine's highest court ruled that the state's public utility commission failed to adequately address potential health risks associated with the meters and urged the regulatory authority to give smart meter detractors an opportunity to air their concerns.

At the end of June, staff at the Michigan Public Service Commission issued a report concluding that although they believe smart meters do not pose health risks, ratepayers should be given the right to opt-out of the devices. And from Vermont to Texas to Maryland to Hawaii, anti-smart meter groups are pushing to get mandatory smart meter installations overturned or modified to allow for opt-outs.

Three fears are fueling the smart meter fire: fear over purported health risks, fear over potential privacy invasion and fear of increased cyber security threats. While everyone agrees that smart meters do in fact raise legitimate privacy concerns due to the increased data generated by the devices, and no one doubts that the nation's electrical infrastructure is more vulnerable to cyber threats now that digital technology is part of the power grid, the issue of health risks caused by meters is hopelessly muddled.


Scientific Researchers Can Find No Evidence of RF Risks But Won't Rule Them Out

On the one hand, industry groups, engineers and mainstream scientists make a solid case that no scientific evidence exists that smart meters cause any of the health problems attributable to RF “radiation,” from cancer to neurological conditions such as depression to heart disease to ocular burning. Virtually all of the commonly accepted scientific research cited by anti-smart meter advocates ties back to research on cell phones and the potential of these mobile devices to cause electromagnetic illnesses.

But even here the evidence is weak and can't be applied to smart meters. The amount of RF radiation from cell phones dwarfs any possible exposure from smart meters and can't be used as a comparison, experts say, adding that few people plan to hold their smart meters against their heads or near their bodies anyway, as they do with cell phones.  Virtually all generally accepted scientific research on cell phone radiation concludes that insufficient evidence exists to link electromagnetic illnesses with the devices.

However, a few generally accepted scientific studies have been unable to rule out the adverse effects of cell phones, using careful and qualifying language that anti-smart meter advocates have pointed to as “proof” of the potential problems that could be caused by smart meters. A widely reported and respected study conducted by the World Health Organization concluded that no evidence exists that mobile phones cause certain kinds of brain cancer, as has been alleged. But, this same study did conclude that there were “suggestions” that the incidence of a particular kind of brain tumor, glioma, increases with mobile phone use. “The possible effects of long-term, heavy use of mobile phones require further investigation,” the report concluded.

The couched, careful language of science, which rarely wanders far from the evidence, doesn't help quell fears when it comes to proving that smart meters pose no health risks. As another example, in a presentation to the Michigan PSC earlier this year, researchers at the Lawrence Berkeley National Laboratory kicked off their talk with the following double-edged conclusion:
While scientific evidence overwhelmingly concludes there are no problems related to smart meter RF exposure, health science cannot conclude that individuals will not experience negative side effects.


Smart Meter Opponents Don't Necessarily Have Science on Their Side...But They're Effective

Smart meter opponents often rely on research, or sometimes just arguments and assertions, that don't hold water among traditional scientists. A frequent source of substantiation on the adverse effects of smart meters is the American Academy of Environmental Medicine (AAEM), an organization backed by doctors concerned about environmental illnesses.

In April, The AAEM released a position paper, one of many, that called for “immediate caution regarding smart meter installations,” saying that “significant harmful biological effects occur from non‐thermal RF exposure.” Although impressive sounding, the AAEM is not recognized by traditional medicine organizations and has been labeled a “questionable” organization by Quackwatch for often venturing into unchartered alternative therapy territory.

What smart meter opponents lack in hard science, however, they make up for in energy and passion. And thus far they have been very effective in changing how smart meters get deployed.

Smart meter opponents were a driving force behind the California' PUC's decision earlier this year to give PG&E customers opt-out rights, which has sparked a chain reaction of opt-out requirements throughout the state. In May, Vermont took the issue a step forward and eliminated utility-requested fees that customers had to pay in order to opt out. The Maine court decision last week stemmed from appeal efforts mounted by smart meter opponents.

From Arizona to Wisconsin, there are 48 separate and active stop-metering groups bird-dogging smart meter roll-outs. Anti-smart meter organizations are in Canada, Australia, Europe and Japan. There are anti-smart metering consultants, experts (many of whom have scientific credentials), websites, videos and even feature films. Including independent groups that are concerned about "electrosmog" problems generally, at least 70 active groups are writing, advocating against or organizing against smart meters globally.

For reasons having to do more with privacy and cyber security than health risks, Tea Party activists are taking up the anti-smart meter flag in many areas of the country, applying the political skills learned during the heyday of that movement to advance another agenda.  Aggressive Tea Party efforts have stoked such fervent concerns in Nevada that the Public Utility Commission felt it had to hire armed guards for a smart meter hearing.

Even if some of the smart meter opponents have political smarts, most seem to be genuinely concerned about the ramifications of having so many electromagnetic waves buzzing around us and through us, particularly those among us who are “electromagnetically sensitive.” They intuitively and strongly believe that the smart meter is very much an unwelcome visitor into their homes, and are even concerned about being surrounding by homes served by smart meters.

Utilities, which seem surprised by the fervor of the anti-meter groups, worry that if too many people opt out of smart meters, the scale economics dictate higher deployment costs, and potentially higher costs for manually reading the old analog meters. Opt-out rates in California were initially below 1%, although PG&E believes that ultimately 150,000 of its 5 million customers, or around 3%, may opt out of the meters.

Utilities are trying to hold back the tide of concern through various individual consumer outreach efforts. The industry-backed Smart Grid Consumer Collaborative is trying to serve as a broader clearinghouse for listening to consumer and advocate issues and disseminating what information it can.

But at this point, the passion of smart meter opponents is unwavering and unresponsive to the somewhat traditional, rational responses these industry efforts put forth.  In a way it almost resembles the irresolvable debate between faith and science, with one side rooted in passionate belief and the other reliant on cold, hard scientific facts, baffled by the believers.

DHS: Most Critical Infrastructure Orgs We Respond to Lack Adequate Cyber Security Detection

The Department of Homeland Security's Industrial Control Systems Computer Emergency Readiness Team (ICS-CERT), issued a report last week documenting how the number of cyber threats involving protected critical infrastructure control systems has skyrocketed over the past two years, from 9 reported incidents in 2009 to 198 in 2011.  The report, which summarizes and offers intriguing but vague details on cyber incidents and onsite investigations it has been involved with since the founding of ICS-CERT in 2009, concludes that most of the organizations to which ICS-CERT responded over the time period "were not prepared with adequate detection techniques."

In fact, the report notes that in 3 of the 17 onsite visits it made, the asset owners had to be notified by outside parties that an intrusion had taken place at their facilities.  In two additional cases, the cyber incident had been discovered by a hired third party, an outside consultant or integrator.

The failure by these asset owners (which could be energy -- utilities or oil and gas companies, for example -- water, nuclear, government or cross-sector organizations) to put into place adequate cyber detection programs is crucial because, as the report notes, "properly developed and implemented detection methods are the best strategy to quickly identify intrusions and implement mitigation and recovery procedures."

The protection methods needed appear to be simple ones.  The report says that "ten organizations could have detected the intrusion by using ingress/egress filtering of known bad IP addresses or domain names."

Another simple cyber security risk mitigation technique, keeping external thumb drives away from protected control systems, popped up in the report regarding an intrusion that took place on the enterprise network of an unnamed nuclear sector organizations.  In that situation, which required an onsite visit from the ICS-CERT team, an employee uploaded from a USB drive onto the organization's computer presentations from an industry event.  

The drive was infected by the Mariposa botnet, a piece of malware used in cyberscamming and denial of service attacks.  The virus ultimately infected 100 computers on the network.  (Interestingly, the instructor involved in that particular industry event refused to give ICS-CERT the names of the event's attendees or their companies so that DHS could follow up, vowing to instead contact the attendees himself or herself. "Unfortunately, ICS-CERT was not able to verify if the companies were ever contacted and to what extent they may have been impacted.")

The report is also notable for documenting the first verified instance of a U.S. control system being infected with the Stuxnet virus, a cyber weapon said to be developed by the U.S. to interfere with Iran's nuclear program.  Although the report offers few details about this Stuxnet infection, it does say a critical manufacturing facility was involved.
ICS-CERT deployed an incident response and analysis team to a critical manufacturing facility infected with the Stuxnet malware. ICS-CERT deployed a team of analysts to the facility and confirmed the presence of Stuxnet on all their engineering workstations as well as several other machines connected to their manufacturing control systems network.

Twitter Delicious Facebook Digg Stumbleupon Favorites More