/ Most Viewed

New Report About Internet Routing With MANRS

I find myself reading, frequently, about "interesting" exploits of IP routing. Recent history includes the redirection of Telegram traffic to Iran, Google traffic to China, and Cloudflare traffic to Nigeria -- and, per bgpstream.com, 64 events this month, 18 of them on one day. Is this expensive? You bet, both in money and in mindshare. Imagine the impact of discovering your company's name in the press. more

Return of the WCIT

The title looks like a horror show advertisement; or, maybe a recurrent plague. It is actually a combination of both, and last inflicted itself on the world two years ago in Dubai. It could be visiting us again in the years to come... The World Conference on International Telecommunications (WCIT) and formerly known as Administrative Conferences have been around for the past 150 years. There have been 31 of them held under the aegis of a U.N. agency known as the International Telecommunication Union (ITU) and its precursors. more

Selecting ICANN’s Next CEO: A Letter to the Chair of the Board

Since ICANN's CEO announced (on Twitter) that he would be leaving in July 2012, the Internet has been abuzz with details on what happened and why. Rod Beckstrom's tenure so far has earned praise and criticism, much of the latter dwelling on his management style, and on the rate of turnover in ICANN's staff since his appointment. As for the praise, it was implicit in the official announcement put out by ICANN on 16 September, with a link to a list of the outgoing CEO's achievements. Many in our community have a vivid recollection of the criticism leveled at Beckstrom, during a plenary session in an ICANN international meeting, by Maria Farrell, a former staff member. more

European Union Wants to Fix the GDPR

The General Data Protection Regulation (GDPR) was adopted in 2016 and has since become the global standard for privacy regulation. The GDPR has been a watershed moment in tech regulation, requiring companies to ask for consent to collect data online and threatening hefty fines if they don't comply. more

Fadi Chehadé Announces His Departure - What’s Next for Businesses at ICANN?

Last week, the CEO of ICANN, Fadi Chehadé, announced his intention to leave his position in March 2016, after almost four years as head of the organization. He plans to take a position in private industry, outside of the domain name space. Although the impact to the business community is unclear at this point, Chehadé's departure throws a spotlight on how important ICANN leadership can be in ensuring that business and brand interests maintain their voice in the Internet governance sphere. more

Hiding in the Firmware?

The most interesting feature of the newly-described "Equation Group" attacks has been the ability to hide malware in disk drive firmware. The threat is ghastly: you can wipe the disk and reinstall the operating system, but the modified firmware in the disk controller can reinstall nasties. A common response has been to suggest that firmware shouldn't be modifiable, unless a physical switch is activated. more

Two Years Later WannaCry Continues to Spread to Vulnerable Devices, Nearly 5M Devices Affected

Two years after the initial wave of WannaCry attack in May of 2017, security researchers say the ransomware continues to spread to vulnerable devices. WannaCry infection has affected close to 5 million devices to date. more

Australia’s Gigabit: Cheapest Upgrade in History

Australian Minister Stephen Conroy announced the National Broadband Network would offer speeds of 1 gigabit without spending a penny more of capex. Sounds like the usual politician's promise. The NBN is a huge issue in the election in 8 days. The opposition wants to kill the $43B project as too expensive; the government warns that a vote against them will condemn Australians to a second rate Internet for a decade or more. Both are right. more

A Modest Proposal for ICANN

When it comes to accountability, ICANN would rather be compared to other U.S. nonprofit companies than to the regulatory bodies it more closely resembles. If they truly wish to be treated like a nonprofit, rather than a regulator, there is a very simple solution: make all contributions strictly voluntary. more

Opinion: IP Leasing Should Become a Market Standard

The Regional Internet Registry (RIR) for the Asia-Pacific region (APNIC) recently held its 55th meeting in conjunction with APRICOT, from 20 February to 2 March 2023, in Manila, USA. One of the critical discussions at the conference was centered on the APNIC policy that does not accept IP leasing and has a questionable understanding of its necessity. According to the APNIC policy manual, which was referenced during the meeting, APNIC allocates and assigns resources based on need, and 'leasing is not allowed' nor does it form a basis for further need. more

X-Force Report: Corporations Becoming No. 1 Security Threat to Their Own Customers

With the alarming increase in cyberattacks, criminals are literally turning businesses against their own customers in order to steal consumer's personal data, warns the latest annual X-Force Trend and Risk report from IBM. "The security industry puts a lot of effort into the technical evaluation of security threats, examining, sometimes at great length, the potential threat that each issue might present to corporations and consumers. Criminal attackers out for profit, however, have considerations that the security industry does not always take into account, such as monetization cost and overall profitability." more

Macro Musings for Digital Strategies Using Unstructured Data

When Doug Dawson wrote his article in February on Artificial Intelligence, he felt that #ai is saddled with too much hype as is its current counterpart, 5G. Certainly, there is a great deal of technology out there that deserves the hype and others that do not. After receiving a certification (Intro to AI) from IBM (while using Watson), I'm here to share that artificial intelligence, and its subsets of machine learning and deep learning definitely deserve a soundbite. more

Accidentally Importing Censorship

With advancements in hardware and software, sophisticated filtering technologies are increasingly being applied to restrict access to the Internet. This happens at the level of both governments and corporations. .. given the open nature of the trust-based Internet, one country's restrictions, if not handled very carefully, can easily foul the global Internet nest we all live in. This blog is about one such story of Internet restrictions in China becoming visible (seemingly at random) from other parts of the world and going undetected for 3 weeks. more

The Great Inevitable: From Broadband Internet to Cloud Application Access

Some inevitable changes are hard to see in prospect, yet are 'obvious' in retrospect. The next communications revolution is 'made for cloud' access. A colleague pointed me to a Forbes article "For Today's Telecoms Companies, Customer Experience Is Just As Important As Download Speeds". It was written by Huawei's global president of assurance and managed services. Well, I told you so! more

Internet Society’s New Policy Brief Series Provides Concise Information On Critical Internet Issues

Have you ever wanted to quickly find out information on key Internet policy issues from an Internet Society perspective? Have you wished you could more easily understand topics such as net neutrality or Internet privacy? This year, the Internet Society has taken on a number of initiatives to help fill a need identified by our community to make Internet Governance easier to understand and to have more information available that can be used to inform policymakers and other stakeholders about key Internet issues. more