The FCC proposal in its recently launched National Broadband Plan to share infrastructure is a very smart initiative indeed. Sharing infrastructure makes a lot of sense. Without it the business model for universal high-speed broadband will not stack up -- the costs of infrastructure is one of the most critical elements in any national broadband plan. Australia is following an identical course with the rollout of their National Broadband Network. In all six current rollout sites utilities are either already involved or are negotiating to become involved. more
In 2012 I wrote a blog on CircleID called State hacking: Do's and don'ts, pros and cons. In this post I give some thoughts to the concept of a government "hacking back" at criminals. The reason for this was an announcement by the Dutch government that it contemplated law along these lines. The proposed law is now here: the Act Computer Criminality III. more
Apple Computer has received high praise for the diversity of applications available for the iPhone. The company shows great willingness to accept third party software innovations. But Apple also solely decides whether to accept and make available any application. Rejected software vendors for the most part do not exist if they do not have shelf space at the Apple store. more
The study report analyzes the distribution and the trends of IP address allocation in 238 countries for 2007. From the data analysis (see Table 1 & Chart 1), the United States tops the allocation list by holding 37.73% of the IP addresses worldwide. It follows by United Kingdom (12.83%), Japan (7.64%), China (5.74%), Germany (3.81%), France (3.65%), Canada (2.81%), Korea (2.74%), Netherlands (2.00%) and Italy (1.67%). These Top 11 countries in the list occupied more than 80% of total allocated IP address ranges in the world in 2007. more
This post was co-authored by Yixin Sun, Annie Edmundson, Henry Birge-Lee, Jennifer Rexford, and Prateek Mittal. In this post, we discuss a recent thread of research that highlights the insecurity of Internet services due to the underlying insecurity of Internet routing. We hope that this thread facilitates important dialog in the networking, security, and Internet policy communities to drive change and adoption of secure mechanisms for Internet routing. more
In the wake of increasingly lenient bring your own device (BYOD) policies within large corporations, there's been a growing emphasis upon restricting access to business applications (and data) to specific geographic locations. Over the last 18 months more than a dozen start-ups in North America alone have sprung up seeking to offer novel security solutions in this space - essentially looking to provide mechanisms for locking application usage to a specific location or distance from an office, and ensuring that key data or functionality becomes inaccessible outside these prescribed zones. more
After ten hectic days, the young Clemson civil engineer turned MBA entrepreneur -- who turned a passion for helping equestrians care for their horses into a website enterprise -- had the HorseDVM.com domain, and its IPR returned to HorseDVM LLC. Ultimately, however, it was the registrant who realized the registrar had wrongfully sold him the domain and the unfairness of what had occurred, who facilitated the return. The culpable registrar ultimately did nothing but unfailingly support its auction subsidiary's sale... more
It is one thing to bring broadband internet to the masses, but how do we make them drink from the fountain of knowledge? One of the challenges, of course, is that the industry has not yet sold turn-key applications that capture the imaginations of the unconnected. Surprising as it seems, email, Facebook, file swapping and web surfing have not yet attracted 100% of the population. Are there some applications that might lend themselves to a toll-free model in order to reach the rest of the market? more
GDPR. It's the four-letter "word" everyone is talking about, and there are lots of questions still swirling around the topic. We wanted to provide a summary of where we are and what we believe the next ten days will bring... GDPR enforcement will begin May 25, 2018. After this date, those found in violation of the regulation can be fined up to 4% of annual global turnover or 20 Million Euros, whichever is greater. more
Interested in learning more about routing security? How it can affect your connectivity supply chain? What are best practices for enterprises and organizations? What is the role of CSIRTs in securing routing? What are governments doing now, and planning to do in the future around routing security? more
The dividing line between developers and IT operations used to be distinct. Developers were responsible for adding new features securely, but it was IT operations who had responsibility for infrastructure and network security. For the most part, developers didn't have to think too much about the wider security context. With the advent of the cloud, and of devops, things changed radically. more
Today the Internet Technical Advisory Committee (ITAC) to the OECD published the fifth edition of its newsletter. The ITAC was created in 2009 following the OECD's Seoul Ministerial with the objective to provide Internet technical and policy expertise to the work of the OECD on Internet-related issues. This informal group is coordinated by the Internet Society and currently counts 28 members active in domains such as open Internet/Web standards development, interconnection, IP addressing, security or privacy. more
A key element of the World Conference on International Telecommunications (WCIT) is to connect the people around the world who are not yet connected. These are people in developing economies, but also people in rural areas within developed economies, as well as the 650 million people with disabilities. The question is whether the International Telecommunications Regulations (ITRs) that are being discussed at WCIT can assist in this. If we go back to 1988, when the current ITRs were first established, the focus was on access and interoperability. more
The recently completed ICANN Conference in Seoul, Korea will be remembered for a unique accomplishment -- the first definitive step towards the addition of Internationalized Domain Names (IDNs) to the Internet root... As the announcement states, the applicants, at this time, are limited to nations and territories; the first IDNs will be in country code top level domains (ccTLDs). The generic TLDs, (the gTLDs, e.g., .org, .com and .info) will have to wait for their opportunity to apply for IDNs... more
After every major hurricane, like the category 4 Ida that recently hit Louisiana, there is talk in the telecom and power industries about better protecting our essential power and communication grids. There was major damage to grids and networks in Louisiana from hurricane winds and storm surges and massive flooding in the mid-Atlantic from Western Maryland to New York City. One thing that we've learned over time is that there is no way to stop storm damage. more