The preparations of the Brazil Internet Governance Forum (IGF) meeting are well under way. After consulting the wider Internet community and discussing the overarching theme of the 2015 IGF meeting, the Multistakeholder Advisory Group (MAG) decided to retain the title "Evolution of Internet Governance: Empowering Sustainable Development". This theme will be supported by eight sub-themes that will frame the discussions at the Joao Pessoa meeting... more
On many occasions I have written about the dangers of electronic communications in relation to data retention laws, government e-spying and other activities undermining our democracy and our liberty. To date governments still have to come up with evidence that all of this spying on their citizens has prevented any terrorist attacks. Terrorism has been given as the key reason for the government's spying. more
In an ambitious move, Amazon, in collaboration with state officials, has declared its plans to erect a high-tech satellite processing facility at NASA's Kennedy Space Center in Florida. Backed by $120 million budget, this expansive 100,000-square-foot complex will be the keystone of Amazon's Kuiper initiative. more
The Biden administration is ramping up efforts to maintain U.S. leadership in artificial intelligence (AI) with a new initiative aimed at bolstering AI infrastructure while addressing national security and environmental concerns. more
A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more
Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic. more
Hackers breached a Kansas Department of Commerce data system used across multiple states and gained access to more than 5.5 million Social Security Numbers, according to local news sources. more
In my last post, I looked at what happens when a DNS query renders a "negative" response -- i.e., when a domain name doesn't exist. I then examined two cryptographic approaches to handling negative responses: NSEC and NSEC3. In this post, I will examine a third approach, NSEC5, and a related concept that protects client information, tokenized queries. The concepts I discuss below are topics we've studied in our long-term research program as we evaluate new technologies. more
There has been a significant focus over the past two years on the vulnerability and cyber threat risks faced for voting systems at the local level. That focus has typically been on State and local jurisdictions like cities, counties and towns, and resulted in the creation of the DHS Elections Infrastructure Information Sharing and Analysis Center (ISAC) to assist. However, there are other local governance entities at significant risk as well. more
Former U.S. presidential candidate and congressman Rob Paul has filed a complaint with the World Intellectual Property Organization against the registrants of RonPaul.com and RonPaul.org in order to gain control of the domains. more
For over four days, a crucial server within the Internet's domain name system (DNS) experienced an unexplained glitch, causing it to fall out of sync with its 12 peer root servers. The server, operated by Cogent Communications, is one of the 13 essential root servers that manage the Internet's root zone. more
Based on the total number of transactions, Zscaler reports botnets as the biggest security risk on the Internet for the enterprises. "Once a host gets infected, the botnet usually spreads quickly within an enterprise. It also generates a significant amount of traffic to the command and control server, to download additional malware or perform other actions." more
I work with a lot of ISPs that own rural fiber. Some rural network owners have been successful in providing fiber to cell sites near their networks over the last decade. A few sell directly to a cellular carrier, but most of these connections are sold to an intermediate carrier that bundles together cellular connections across a large geographic area. more
Researchers have been able to successfully demonstrate a commercial aircraft can be remotely hacked. more
Measuring the performance of broadband networks is an important area of research, and efforts to characterize the performance of these networks continues to evolve. Measurement efforts to date have largely relied on inĀhome devices and are primarily designed to characterize access network performance. Yet, a user's experience also relies on factors that lie upstream of ISP access networks, which is why measuring interconnection is so important. more