Google today announced the addition of U.S Cellular, a leading mobile networks in the U.S., as its newest partner network for its Project Fi program. more
For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more
People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more
"Beijing vowed on Tuesday to use all necessary means, including military ones, to wipe out subversion and attempts to undermine its sovereignty in cyberspace," Zhuang Pinghui reporting in South China Morning Post. more
When ICANN announced the nTLD program, thousands of applicants threw their hats in the ring. It seemed pretty straight forward; the existing TLDs were running out of short meaningful options, all that was needed was to create newer options that would be more relevant for specific sets of customers. Years later, the process is well underway; hundreds of nTLDs have hit the market, yet less than 10% of those that have gone live seem to have found success. more
The team behind the free networking software Samba has issued and emergency patch for a remote code execution vulnerability. more
The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... more
What began as an emergency response evolved into critical wartime infrastructure. Ukraine's experience with Starlink reveals the strategic risks and benefits of relying on privately operated networks for national resilience and defence. more
Every time there is a tragic attack on people or property, there is a cry from various authorities or politicians for law enforcement to get unfettered access to all kinds of communication tools. But that would cause far more harm than good, and is a really bad idea. The argument goes something like this: 'These bad actors hide behind encrypted communications to plan their evil deeds...' more
Kevin Murphy reporting in Domain Incite: The National Telecommunications and Information Administration said today that all new gTLD applicants, even those that have not already been hit by government warnings, should submit Public Interest Commitments to ICANN. In a rare comment sent to an ICANN public forum today, the NTIA suggested that applicants should use the process to help combat counterfeiting and piracy. ... NTIA said that applicants should pay special attention in their PICs to helping out the "creative sector". more
A recent study reveals a browser history detection method, largely dismissed as an issue with minimal impact, can in fact be used against a vast majority of Internet users with significant malicious potential. Researchers, Artur Janc and Lukasz Olejnik, analyzed real-world results obtained from 271,576 Internet users and have reported the results in a paper titled, "Feasibility and Real-World Implications of Web Browser History Detection". more
IT disasters can strike anywhere, anytime. In 1983, a faulty Soviet warning system nearly precipitated World War III -- the system claimed five missiles were en route from the U.S. Only quick thinking by Lt. Col. Stanislav Petrov saved the day when he realized the United States would never launch so few warheads. And in 2004, a private contractor working with the British Child Support Agency (CSA) suffered a glitch that overpaid 1.9 million people and underpaid 700,000. more
France has put an end to its most extreme measure of its notorious "three strikes" anti-piracy law. "Getting rid of the cut-offs and those damned winged elephants is a good thing. They're very costly," Joe McNamee, of European Digital Rights. more
A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more
In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more