With the strong possibility of a new Netmundial-style event being organized under the stewardship of CGI.br in 2024, the Internet governance community ought to reflect upon the benefits that this could bring to all stakeholders. In a scenario of uncertainty over the several processes affecting the future of the global network, there is value in taking another look at the original event's collaborative outcomes document, which summarized much of what was then understood to be core principles of Internet governance. more
A years-long cyberespionage campaign by a Chinese state-sponsored group known as Salt Typhoon has revealed a striking escalation in both scale and technical sophistication. more
It is interesting to observe the changes in the telecommunications environment over the last few decades. Before videotex (the predecessor of the internet) arrived in the late 1970s early 1980s, 90% of telecommunications revolved around telephone calls. And at that time telephony was still a luxury for many, as making calls were expensive. I remember that in 1972 a telephone call between London and Amsterdam cost one pound per minute. Local telephone calls were timed... more
In an interesting move the FCC's Technical Advisory Council has outlined the need for setting a 'sunset' date for the closure of the circuit switched network. This is a first step that eventually could lead to the replacement of the PSTN in the USA, rather than letting the network slowly fade into oblivion the FCC proposes the bring the issue in the open so that it can be properly evaluated and discussed. more
One of the longstanding goals of network security design is to be able to prove that a system -- any system -- is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. more
This has been a busy week in the race to deploy constellations of low-earth orbit (LEO) Internet-service satellites. In their quarterly report, Telesat mentioned progress in two, disparate markets. As I noted earlier, they have signed their first LEO customer - Omniaccess a provider of connectivity to the superyacht market. more
In a counter-intuitive move for a Republican free marketeer, FCC Chairman Kevin Martin has sought to impose substantial additional regulations on cable television. Chairman Martin ostensibly can retain his credentials by claiming that a 1984 law requires the FCC to act when cable television systems serve 70% or more of the U.S. population and 70% who can subscribe do so. more
When in the Fall of 1999 the Internet Corporation for Assigned Names and Numbers (ICANN) implemented the Uniform Domain Name Dispute Resolution Policy, it did not come with a fully formed jurisprudence. Panelists were essentially on their own in creating it. They had some guidance from a lengthy and detailed report published by the World Intellectual Property Organization ... and a basket of principles derived from trademark law, but panelists had to build the jurisprudence from scratch. more
British Telecom has announced its plan to transform the UK broadband landscape from superfast to ultrafast. The company says it plans to deliver much faster broadband for homes and small businesses via a widespread deployment of “G.fast” -- a technology the company will test in two pilot locations starting this Summer. G.fast is aimed to help BT deliver ultrafast speeds of up to 500Mbps to most of the UK within a decade. Deployment will start in 2016–2017, subject to the pilots being successful, BT says. more
The researchers at Cybereason Nocturnus have identified an advanced, persistent attack targeting global telecommunications providers carried out by a threat actor using tools and techniques commonly associated with the Chinese-affiliated threat actor APT10. This multi-wave attack is reported to have sought to steal communications data of specific individuals in various countries. more
Security experts and privacy advocates see the rollout of the new 5G wireless network as a possible solution to eliminate surveillance vulnerabilities that allow spying on nearby phone calls. more
For a number of years, there have been many different high profile incidents where major websites were defaced, taken offline, or crippled due to issues related to their domain registration. Last night, there was an incident where several high profile domains went offline due to issues at their registrar, and they are now coming back online after what I am sure was a few crazy hours for their operations teams and management. more
Elon Musk recently announced that he was going to be providing cellular backhaul from the Starlink constellation of satellites. This makes a lot of sense from a financial perspective in that it avoids the costly wired fiber networks needed to reach rural cell sites. This is clearly a shot across the bow for companies that currently bring fiber connectivity to rural cell sites. more
The threshold for an actionable claim under the Uniform Domain Name Dispute Resolution Policy (UDRP) is a trademark in which complainant has rights. "Rights" means a trademark that could have been newly minted a moment before filing the complaint. This is different from the Anticybersquatting Consumer Protection Act (ACPA) in which trademark owners must have a "mark that is distinctive at the time of registration of the domain name." The difference is important... more
The Australian has a good article describing the efforts some of their ISPs are making in an attempt to clean up their act: the government is encouraging ISPs to detect computers on their network that are infected and part of botnets, and to communicate to the customer that their system is compromised... Unless the customer feels a little bit of pain they will not change their ways. more