I often think there are only two types of stories about the Internet. One is a continuing story of prodigious technology that continues to shrink in physical size and at the same time continue to dazzle and amaze us... The other is a darker evolving story of the associated vulnerabilities of this technology where we've seen "hacking" turn into organised crime and from there into a scale of sophistication that is sometimes termed "cyber warfare". And in this same darker theme one could add the current set of stories about various forms of state sponsored surveillance and espionage on the net. more
Deep Blue Cable is planning a Caribbean cable - phase one, the solid line shown on the map, bypasses Cuba but phase two shows two Cuban landing points. The phase two cities are not shown, but one appears to be near Havana and the other near Playa Girón. The phase one route survey is underway. Cable installation will begin in September 2018, and it is scheduled to be ready for service in December 2019. more
The last few weeks have reinforced the importance of modern communication networks to societies. Health care providers, schools, governments, and businesses all rely on networks that enable us to connect and collaborate remotely. Had we encountered a similar pandemic ten years ago, we would not have been able to continue our activities on the level that is possible today. more
Listed below is correspondence that I have submitted to ICANN's general counsel in connection with the organization's stated documentary information disclosure policy. more
There was a period of time not long ago in which signature-based threat detection was cutting-edge. Antivirus, intrusion detection systems (IDS), data leakage prevention (DLP), content filtering and even anomaly detection systems (ADS) all continue to rely heavily upon static signatures. In recent years vendors have shied away from discussing their dependence on such signatures -- instead extolling supplemental "non-signature-based" detection technologies. more
The IANA -- Internet Assigned Numbers Authority -- is, functionally, the boiler room of the Internet. Every protocol in use to shovel data from Tallahassee to Timbuktu? Listed there. IP addresses? They are the root from which all addresses flow. Domain names? They are the Source. The entire operation is chock-full of magic numbers, numbers that form and fuel the digital world we use daily. But there are other, lesser-known numbers... It is of PENs that I write today... more
If only I had been able to predict the new gTLD future, but alas my crystal ball (well, really it's a Magic 8 Ball ®) did little to help me. And I really doubt that 5+ years ago, when this new gTLD journey began, that anyone could have predicted where we are now. All that said, back in 2008, I wish I could have known that... more
As I predicted more than three months ago, 2016 turned out to be a record year for domain name disputes, including under the Uniform Domain Name Dispute Resolution Policy (UDRP). That's according to statistics from the World Intellectual Property Organization (WIPO), the only UDRP service provider that publishes real-time data on domain name disputes. WIPO's statistics show 3,022 cases in 2016 -- an increase of almost 10 percent from 2015. The previous most-active year for domain name disputes was 2012... more
VoIP remains a hot topic in the IP communications world, but it's definitely evolving. The following is my most recent article for a column that I write for TMCnet, and it's a year-end review on VoIP as well as my outlook for how it's changing for 2009. Colleague Alec Saunders posted his response to my article yesterday, and it's a good read. If you're interested in where VoIP is headed, then my article should help keep that dialog moving along within the CircleID community. Here we go... more
Once we decide that Network Neutrality is a good thing to (re)enshrine in law, then we need to ask how to do that effectively. One way would be to pass a law saying, "Thou shalt not discriminate." That's the current approach. But network operators will say that they must manage their network, and if, in the course of network management, they were to disadvantage some source, destination, application, service or content, they might be accused of violating the law. So any Network Neutrality law must have a Network Management Exception... more
As industries from agriculture to banking increasingly depend on space-based capabilities, safeguarding satellites from cyber threats has become paramount. In a groundbreaking move to address this, the U.S. military will stage Hack-A-Sat 4, a competition at the famed DEFCON hacker convention, inviting white-hat hacker teams to attempt to infiltrate and control computer systems on a satellite in orbit. more
With so much traffic on the global internet day after day, it's not always easy to spot the occasional irregularity. After all, there are numerous layers of complexity that go into the serving of webpages, with multiple companies, agencies and organizations each playing a role. That's why when something does catch our attention, it's important that the various entities work together to explore the cause and, more importantly... more
On January 27th the Executive Multistakeholder Committee (EMC) held its first meeting to plan the "Global Multistakeholder Meeting on the Future of the Internet Governance" scheduled to be held in Sao Paulo on April 23rd-24th. A review of that planning session's results indicates a Sao Paulo meeting with downsized attendance and, most likely, accompanying expectations. more
Zoom - one of the hottest companies on the planet right now, as businesses, schools, and individuals switch to various forms of teleconferencing due to the pandemic - has come in for much criticism due to assorted security and privacy flaws. Some of the problems are real but easily fixable, some are due to a mismatch between what Zoom was intended for and how it's being used now - and some are worrisome. more
In October 2020, I went on a two-week tour into Queensland's Outback, traveling through various landscapes from pastoral and agricultural lands to savanna and the desert. Leaving Brisbane, past Toowoomba, you enter the Darling Downs. This is one of the richest agricultural areas in Australia. British Botanist Alan Cunningham first explored it in 1827. However, only after the penal colony of Moreton Bay (now Brisbane) was closed, free settlers were allowed in the area. more