"The 2016 presidential election is likely to have a major impact on how the US government tries to expand broadband deployment and how it regulates Internet service providers," writes Jon Brodkin in Ars Technica. more
Today X-Force, IBM's security research and development arm, released its 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. more
Recent statistics from the Bureau of Labor Statistics' Consumer Expenditure Survey has shown that American have been increasingly spending on mobile phones from 2001 through 2007. BLS data indicates cellular phone expenditures surpassed spending on residential landline phone services beginning in 2007. From the report: "In 2001, the ratio of spending on residential phone services to spending on cellular phone services was greater than 3 to 1. In 2007, cellular phone expenditures accounted for 55 percent of total telephone expenditures compared to 43 percent for residential phone expenditures. The distribution of telephone service expenditures between residential telephone/pay phone services and cellular phone services changed significantly in all age groups since 2001." more
In an earlier post, I looked at the use of the Internet by anti-government protesters last month and the government's attempt to block them. Now, a few weeks later, let's see how the Internet changed after my July 18 post. The protesters used messaging and social media services, which the government tried to block, and posted images and videos of protests around the island. more
The instruction, issued by the Cyberspace Administration of China, came only a few days after Xu Lin, formerly the deputy head of the organization, replaced his boss, Lu Wei, as the top gatekeeper of Chinese internet affairs. more
Production at a Honda domestic vehicle plant was halted for a day this week as a result of the discovery of WannaCry ransomware in the computer network, the company reports. more
Google yesterday dove deep into its Chrome notebook project at its annual Google I/O conference. The company has had the notebook operating system in beta for almost two years now. Google announced the first market-ready Chromebooks from partners Samsung and Acer. The Chrome OS is dependent on the cloud for storage and various web-based applications. The result is a machine that boots in a matter of seconds and carries very little in the line of native hardware. more
On August 16 of 2016, the US Government announced its intention to transit the stewardship of the Internet Assigned Numbers Authority (IANA) function to the multistakeholder community upon the expiration of the IANA function Contract as of October 1 of 2016, barring any significant impediment... This announcement attracts the close attention of Internet community around the world and also in China. more
If it feels like the work of the latest group addressing registration data within ICANN has been going on forever, try participating in it! Since the summer of 2018, the team has regularly been meeting for several hours each week, participating in numerous face-to-face meetings and exchanging thousands of emails. Last week in Los Angeles, the team got together once again to continue our Phase 2 work creating policy that will (among other issues) govern the disclosure of non-public registration data to third parties. more
I just heard about a U.S. County that is using its American Rescue Plan Act (ARPA) funds to build fixed wireless broadband. This is a traditional fixed wireless broadband technology that will probably deliver speeds of 100 Mbps to those close to the towers, slower speeds to homes further away, and which will not reach all homes in the County. more
The Internet Association today released a policy roadmap detailing a roadmap for the incoming administration and Congress. more
State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more
A report released over the weekend by Information Warfare Monitor along with an exclusive story by the New York Times, revealed a 10-month investigation of a suspected cyber espionage network (dubbed GhostNet) of over 1,295 infected computers in 103 countries. 30% of the infected computers are labeled as high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. Greg Walton, editor of Information Warfare Monitor and a member of the Toronto academic research team that is reporting on the spying operation, writes... more
Early action now on possible performance issues will "flatten the curve" of customer problems in the coming weeks and months. Here are three things technology and software vendors can do right now to get ahead of problems that may appear (if they are not already) with services such as development, implementation and support... Check your contracts to see whether there are any "material assumptions" that have failed or will fail - perhaps because of some governmental action or unavailability of personnel... more
As artificial intelligence integrates into public infrastructure, it introduces new layers of systemic risk. Policymakers must shift focus from AI's potential to its exposure, applying governance models that reflect these emerging, compound vulnerabilities. more