The "Paris Call for Trust and Security in Cyberspace," announced by French President at the Paris Peace Forum on November 13, has attracted more than 450 signatories. more
In the winter of 2014 I wrote a blogpost under the title 'Luddites of the 21st century unite?' (read here). In the post I wondered where the 21st century Luddites were. ICT, automation, artificial intelligence all threatened jobs, yet all those affected embraced smartphones and the Internet in droves. It seems I found them, but what to do? Brexit and Luddites Fast forward to early summer 2016. more
The FCC voted recently to implement consumer broadband labels. This was required by section 60504 of the Infrastructure Investment and Jobs Act. The new rules will become effective after the Office of Management, and Budget approves the new rules and after the final notice is published in the federal register. ISPs will then generally have six months to implement the labels. The labels look a lot like the nutrition labels that accompany food. more
This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a "partnership" created among all the world's major standards bodies, which over several decades has cooperatively developed and evolved by far the largest and most successful global electronic communications network. more
The Federal Communications Commission yesterday released a Report and Order in the matter of its implementation of Ray Baum's Act Section 503 and international call spoofing. The FCC mostly did the right things in the R&O except in one rather extraordinary assertion of legal ignorance and bravado. It asserted unilaterally that it could exercise "extraterritorial jurisdiction that Congress expressly provided in section 503 of the Ray Baum's Act," and it furthermore knew of no "treaty obligation [contravened],...nor other legal barrier...and...are aware of none." more
In a previous article, I discussed how telecoms is facing a growing complexity crisis. To resolve this crisis, a new approach is required. Here I explore how that complexity can be tamed... 'Invariants' are things that are meant to be 'true' and stay true over time. Some invariants are imposed upon us by the universe... Others are imposed by people. As engineers, we aim to establish these abstract 'truths' about the system. more
While most of the recommendations included in the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) Report are much needed reforms to ICANN's accountability mechanisms, the proposal also contains a fundamental flaw, which jeopardizes its overall acceptance and risks delaying the IANA transition process further: it changes the role of governments from "advisory" to "decisional" over ICANN's governance, and it separately enhances the power of governments over ICANN's board of directors. more
The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. more
There is no doubt that the number of online consumers is on a rise and that this is a trend that will not stop any time soon. Over the last couple of years, the number of digital buyers has grown by a steady 150 million each year. This number is expected to stay stable for a few more years to come. By 2020, about two billion people will be purchasing things online and making online money transactions on a regular basis. more
For the fourth year, the U.S. Securities and Exchange Commission's Office continues to include cybersecurity as one of the top enforcement priorities for 2019. more
Barely a week passes without something in the news that reminds us of the critical role encryption plays in securing our data. It is a technology that protects so much of what we rely on, as individuals protecting our privacy, as companies securing our business assets and transactions, and as governments responsible for critical national infrastructure. ... The request Kathy mentions came after the San Bernardino shootings in California... more
"Pai, a Barack Obama nominee who has served as the senior FCC Republican for more than three years, could take the new role immediately and wouldn't require approval by the Senate because he was already confirmed to serve at the agency," Alex Byers and Tony Romm reporting in Politico. more
ICANN plans to announce the long-anticipated list of applied-for domain names under its new generic Top-Level Domain (gTLD) program tomorrow. The announcement will be made in London at 12:00PM and streamed live on ICANN's website. ICANN has received over 1,900 applications from around the world. more
James Cowie from Renesys reports: "Starting at 3:35 UTC today (6:35am local time), approximately two-thirds of all Syrian networks became unreachable from the global Internet. Over the course of roughly half an hour, the routes to 40 of 59 networks were withdrawn from the global routing table." more
The northern Syrian city of Aleppo is one of the key battlegrounds of that country's on-going civil war as well as the epicenter of the European refugee crisis. The most appropriate United States response to events in Aleppo has become a major foreign policy question among the candidates in this year's U.S. presidential election. Experts are now predicting that forces loyal to President Bashar al-Assad, backed by the Russian military, will take control of rebel-held eastern Aleppo within weeks. more