The October Senate Commerce, Science, and Transportation Committee hearing on the commercial satellite industry provides a current example of effective government support of new communication technology. The hearing focused on broadband access, primarily from low-Earth orbit (LEO) satellites. Witnesses from four companies - Intelsat, OneWeb, ViaSat and SpaceX - testified and the tone of the hearing was set by the opening statements of Committee Chairman John Thune and Ranking Member Bill Nelson. more
For decades, academics and technologists have sparred with the government over access to crypographic technology. In the 1970s, when crypto started to become an academic discipline, the NSA was worried, fearing that they'd lose the ability to read other countries' traffic. And they acted. For example, they exerted pressure to weaken DES... The Second Crypto War, in the 1990s, is better known today, with the battles over the Clipper Chip, export rules, etc. more
Every couple of years there's a new "hot threat" in security for which vendors abruptly tout newfangled protection and potential customers clamor for additional defense options. Once upon a time it was spyware, a few years ago it was data leakage, and today it's mobile malware. It's a reoccurring cycle, analogous to the "blue is the new black" in fashion -- if you fancy adopting a certain cynical tone. more
I've said it before, and I'll say it again. The biggest threat to the Internet innovation ecosystem from network operators is not discrimination but terms of interconnection. Metered billing, bandwidth caps, and wholesale transit fees can all be implemented consistently with net neutrality rules. And in practice, net neutrality will be limited to "legal" content... more
The Wall Street Journal is reporting the terms of a yet unannounced deal which will finance a massive rollout of WiMax by a Sprint-Clearwire joint venture. Outside funding is to be provided by Intel, Google, Comcast, and Time Warner Cable as well as Bright House, a small cable company. Assuming the deal is for real, this is good news for US users of broadband and, indirectly, other users around the world. more
As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and alliance-based cooperation, challenging longstanding institutions and reshaping global norms through enforcement rather than consensus. more
Maybe you saw this story: A Chinese man (whose name is not given) has been sentenced to serve three years in prison for extorting "virtual items and currency" from a "fellow Internet café user." The currency was worth 100,000 yuan or $14,700. The man who's sentenced to three years and the three friends who helped him also "extorted virtual equipment for online games" from their victim. The friends only seem to have been given a fine; the primary extortionist got both a fine and a jail time. The virtual currency was QQ coins... As I'm sure all of us know, there's a thriving market in virtual goods and currency... more
The members of the ICANN community engaged in the work of the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-ACCT, or just plain "CCWG" for this article) has been engaged since late 2014 in designing an enhanced ICANN accountability plan to accompany the transition of oversight of the IANA root zone functions from the National Telecommunications and Information Administration (NTIA) to the global multistakeholder community. On August 3rd the CCWG released its 2nd Draft Report (Work Stream 1) for a public comment period that closed on September 12th. more
The penny dropped when I started looking at cloud computing as a service rather than a new technology. In that respect it is more like Google search and a DotCom development than a set of software and hardware tools. That was what I needed to get a better strategic grip on this new concept. As with all services, business strategies are key here, rather than technologies. As soon as it is seen as a technology customer issues often come in second, which then leads to a technology looking for a market... more
The North American Network Operators Group (NANOG) continues to be one of the major gatherings on network operators and admins, together with the folk who work to meet the various needs of this community. Their program committee produces a program that never fails to provide thought provoking interest. Here are my reactions to some of the presentations I heard at NANOG 66, held in San Diego in February. more
Last September, I asked what had happened to the proposal for a branch connecting the ARCOS undersea cable, which has a landing point in North Miami Beach, to Cojimar, Cuba. The consortium that operates the cable had applied for permission to connect Cuba in July 2018, and the FCC granted a request for streamlined processing, which should have taken less than 45 days, but nothing happened until September 2020 when the application was referred to a Justice Department committee... more
Yesterday, the Asia-Pacific registry got the last two blocks in the central IPv4 pool. The IANA has been sitting on five /8s (one per regional registry), and these will be handed out (along with the fragments from the legacy class B space), one to each registry. The IANA IPv4 registry doesn't yet reflect this. more
Two weeks ago I wrote about Yahoo's unfortunate mail security actions. Now it's AOL's turn, and the story, as best as I can piece it together, is not pretty. Yahoo used an emerging system called DMARC, which was intended to fight phishing of often forged domains like paypal.com. A domain owner can publish a DMARC "reject" policy which, oversimplifying a little, tells the world that if mail with their name on the 'From:' line didn't come from their servers, it's not from them so you should reject it. more
A cybersecurity company recently attempted reverse domain name hijacking for an exact match domain name of its brand, and in so doing, failed in both its bid to take ownership of the domain and potentially damaged their reputation by using this somewhat nefarious tactic and abusing the Uniform Domain Name Dispute Resolution Policy (UDRP) process. more
On my flight back from Washington, DC last night, I prepared much of what follows, minus references. Today, while looking for references, I uncovered a very recent (6 June 2012) posting to the ITU blog that seemed entirely appropriate to mention here. It is fascinating reading, and I especially like one snippet "we are not about to take over the Internet - that suggestion is frankly ridiculous". I quite agree and hope that the ITU is genuinely interested in working with others to ensure that nothing of the sort happens. Now on to what I had prepared. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign