Russian hackers believed to be affiliated with the Russian government continued to have access to Democratic Party computers for months during the critical phase in the U.S. presidential campaign, the sources have said. more
"Vladimir Putin on Sunday shrugged off new US threats to retaliate against alleged Russian hackers, saying such statements only confirmed that Washington used cyber-attacks for political ends," Reuters reports. more
Members of the European Parliament have taken stock of the lack of action taken to safeguard citizens' fundamental rights following revelations of electronic mass surveillance. more
Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more
The Foreign Ministry in Moscow says U.S. accusations that Russia was responsible for cyber attacks against Democratic Party organizations lack any proof and are an attempt by Washington to fan "unprecedented anti-Russian hysteria". more
Obama administration is ramping up its efforts to fight terrorism -- "How the US is working to defeat ISIS online" Kristina Wong reprots today in the Hill: "Driving the effort is the recently set up Global Engagement Center, housed at the State Department but led by retired Navy SEAL Cmdr. Michael Lumpkin, a former top Pentagon official." more
The International Chamber of Commerce (ICC) has announced that greater efforts to bring about better, more consultative global policy-making are needed to maximize the potential of the Internet to power future economic growth. ICC BASIS (Business Action to Support the Information Society) plans to use its presence at the 8th annual Internet Governance Forum (IGF), taking place in Bali, Indonesia, between 22-25 October, to call for attention to a greater collaboration between stakeholder groups and stronger pro-growth international policies in order to help the Internet retain its place as the world’s primary economic enabler. more
Britain's finance minister on Tuesday announced government's new five year National Cyber Security Strategy, almost doubling the funding from its 2011 plan to 1.9 billion-pound ($2.3 billion). more
Fiber manufacturers are always trying to make it easier to deploy fiber. One of the most interesting trends is the increasing migration from 250-micron fiber to 200-micron fiber. For those not familiar with the metric system, a micron is one-thousands of a millimeter. A 250-micron fiber has a diameter of 0.25 millimeters, while a 200-micron fiber has a diameter of 0.2 millimeters. more
Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more
Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more
The former chairman, chief of staff and general counsel of the agency were all infiltrated. more
Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more
According to a recent study, broadband Internet access is now considered by many US households a necessity and they turn to broadband Internet during recession. The study released by Jonathan Orszag, Robert Willig, and Mark Dutz suggests that with $32 billion gains in 2008, consumers increasingly benefit from using broadband at home. "Once people get a taste of the entertainment, educational opportunities, social networking and everyday services that broadband access facilitates, they grasp the immense value it can add to their lives as a powerful tool, regardless of where they come from," said Co-Chairman of the Internet Innovation Alliance Bruce Mehlman. "Once a broadband user, always a broadband user." more
"Britain's banks are not reporting the full extent of cyber attacks to regulators for fear of punishment or bad publicity, bank executives and providers of security systems say," reports Lawrence White in Reuters today. more