/ Most Viewed

Will 5G Implementation Lead to an Increase in Ransomware Attacks?

5G has arrived and is poised to supercharge our lives with ultra-fast download speeds and better than ever connectivity. It may not be ready to replace WiFi just yet, but AT&T has already deployed 5G networks in various cities across the US. 5G tech was the hottest commodity at CES 2019. According to some estimates, 5G will bring $12 trillion into the global economy by 2035, connecting everything from our toasters to our pet's collars and a range of other IoT devices. more

Internet Control Without “Firewalls”

Open Society Fellow Evgeny Morozov and I have written an Op-Ed for Project Syndicate about how the future of Internet control is not "firewall" censorship but more subtle forms of manipulation and pressure. Recognizing that censorship is too heavy handed and imperfect to be successful on its own, the Chinese government's Internet strategy is placing increasing emphasis on corporate self-censorship... more

Internet Challenges Need Win-Win Solutions

The current internet versus telcos debate that is going to be played out at the WCIT conference in Dubai later this year is still following the old confrontational pattern. The telco industry, for all the right reasons, started off as a monopolistic one. With the limited technology and knowledge of that time this system has been able to deliver telephone networks to all the countries in the world, and the industry can be proud of that achievement... However technology and knowledge have progressed... more

Spotlight on TD-LTE Technology and Spectrum

As handheld devices grow ever more sophisticated and demand for content-rich services such as mobile video increases, mobile data traffic is likely to continue growing at an explosive rate. This represents good news for the industry, but next-generation wireless technologies will need to be ready to meet the challenge and able to cope with these increased demands on bandwidth. A recent TD-LTE spectrum workshop looked at the potential of TD-LTE technology to take us on to the next stage of wireless communication. more

Electronic Frontier Foundation Tells ICANN to Delete URS from .Travel

The Electronic Frontier Foundation (EFF) has just told ICANN to drop the notion of applying the Uniform Rapid Suspension (URS) dispute resolution system to .Travel and other legacy gTLDs without undertaking a full Policy Development Process (PDP). In a June 12 letter, EFF stated: ICANN should not apply URS to the .travel domain, or to any additional domains, by the unaccountable means of staff inserting new conditions into the renewal of the registry operator's contract. Rather, the public policy implications of such a move demand that a full PDP be undertaken first.  more

Analysis of Wireless Broadband Plan in 2nd Stimulus Package

While it was good to see that the Administration included telecoms in its new stimulus package - which was launched in September 2011 - the concerns expressed when the project was announced last year still persist. Wireless is not a solution to the significant broadband problems the USA is facing. ... The new plan seems to be driven more by the failed attempts in previous initiatives to roll out more broadband infrastructure. more

‘Avalanche’ Network Dismantled in an International Cyber Operation Including Europol and the FBI

After over four years of investigation, the international criminal infrastructure platform known as 'Avalanche' is reported to have been dismantled via a collaborative effort involving Public Prosecutor's Office Verden and the Lüneburg Police (Germany) in close cooperation with the United States Attorney's Office for the Western District of Pennsylvania, the Department of Justice and the FBI, Europol, Eurojust and global partners. more

Opinion: UK Moving Quickly Down the Slippery Slope…

Admittedly, I'm a not Johnny-come-lately with regards to surveillance, intelligence, telecommunications, network security, law enforcement, and a cross-pollination of all-of-the-above. I actually have a very colorful background of working within all of the aforementioned disciplines - at one time or another - either through the U.S. Military, U.S Government contractors, private industry, etc. ... And unfortunately, I am not generally "shocked" very often by much of the abuses being perpetrated on unwitting Internet users, both by supposedly "trusted" entities (e.g. Democratic Governments, ISPs, etc.) more

Integrating the GAC More Effectively

We all may have breathed a sigh of relief when the ICANN Governmental Advisory Committee (GAC) and the Board concluded their eleventh-hour negotiations on new generic Top-Level Domains (gTLDs) with some measure of success, but we can all agree that panicked policymaking is, at best, less than optimal. ICANN needs to integrate GAC input more effectively. The Final Report recently issued by the Joint Working Group (JWG) of the ICANN Board and the GAC contains several thoughtful and productive recommendations. more

Photos of Google’s Latest $600 Million Data Center

Earlier this month, Google officially opened its new data center in South Carolina which was first reported during April of 2007 when the company announced its plans to invest $600 million in the project. This data center is one of the four new data center projects announced by Google last year with other locations being Lenoir, North Carolina; Council Bluffs, Iowa and Pryor, Oklahoma. more

When is a Typo Not a Typo?

I was reading about the Nieman Marcus lawsuit and on a phone call related to the "Working Group on Mechanisms to Protect Rights of Others", when suddenly it occurred to me that this whole rush to rid the world of typos could eventually head in a messy direction... How far can this go? Let me take you back to that phone call I was on where representatives of Yahoo indicated they would try to secure Flicker.XXX as a TYPO of Flickr.com (their made up brand name) during a potential new TLD sunrise period. How backward is that? A Typo that became a brand, trying to call the generic name a variant of their trademark! more

How Digital Asset Management May Change Due to COVID-19

One of the "fathers of the internet," Vint Cerf, in a September 2019 article he published, said: "Today, hackers routinely break into online accounts and divert users to fake or compromised websites. We constantly need to create new security measures to address them. To date, much of the internet security innovation we've seen revolves around verifying and securing the identities of people and organizations online. more

Building a Case for Cybersquatting Under the UDRP

A number of recent UDRP decisions remind trademark owners (and counsel) that cybersquatting cases have to be built from the ground up. Each stage has its evidentiary demands. The first two demand either/or proof; the third, the most demanding, requires proof of unified or conjunctive bad faith registration and bad faith use of the accused domain name. Priority, which intuitively would be thought a factor under the first stage (as it is under the ACPA) is actually a factor under the third stage. more

Once Begun is ONLY Half Done

In the brief history of Internet governance, few initiatives have been greeted with wider support than the recently signed Affirmation of Commitments between the U.S. Department of Commerce and the Internet Corporation for Assigned Names and Numbers (ICANN). The praise is well deserved, but now it's time to remind ICANN of the problems that the AOC did not solve, most importantly ICANN's ongoing accountability gap. more

IoT From a Network Perspective: Learning to Navigate the New Realms

Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. more