In my last post we talked about the value of introducing new generic Top-Level Domains (gTLDs) to Tribes. We discussed what a Tribe was and how communities of people sharing knowledge and experiences can benefit from new TLDs. In the next three posts from my blog we'll discuss how brand owners can either benefit from creating a tribal home and/or come together with other tribes for the benefit of their members. more
The newly released handbook applies the practice of international law with respect to electronic warfare. The Tallinn Manual on the International Law Applicable to Cyber Warfare -- named for the Estonian capital where it was compiled -- was created at the behest of the NATO Co-operative Cyber Defence Centre of Excellence, a NATO think tank. It takes current rules on battlefield behaviour, such as the 1868 St Petersburg Declaration and the 1949 Geneva Convention, to the internet, occasionally in unexpected ways. more
Google today announced the addition of U.S Cellular, a leading mobile networks in the U.S., as its newest partner network for its Project Fi program. more
For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more
Top British officials have given the green light to the Chinese technology giant Huawei to participate in the development of the 5G wireless network in the United Kingdom, reports the Washington Post. more
"Beijing vowed on Tuesday to use all necessary means, including military ones, to wipe out subversion and attempts to undermine its sovereignty in cyberspace," Zhuang Pinghui reporting in South China Morning Post. more
People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more
The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... more
The team behind the free networking software Samba has issued and emergency patch for a remote code execution vulnerability. more
When ICANN announced the nTLD program, thousands of applicants threw their hats in the ring. It seemed pretty straight forward; the existing TLDs were running out of short meaningful options, all that was needed was to create newer options that would be more relevant for specific sets of customers. Years later, the process is well underway; hundreds of nTLDs have hit the market, yet less than 10% of those that have gone live seem to have found success. more
The Biden administration has announced an executive order that would ban U.S. federal agencies from using commercially developed spyware that poses threats to human rights and national security. more
As artificial intelligence integrates into public infrastructure, it introduces new layers of systemic risk. Policymakers must shift focus from AI's potential to its exposure, applying governance models that reflect these emerging, compound vulnerabilities. more
Recent research conducted by the Independent Advisor reveals that a significant number of accounts, exceeding 340 million, have been compromised due to business data breaches within the first four months of 2023. Notably, Twitter experienced the largest breach this year, impacting approximately 235 million user accounts. more
France has put an end to its most extreme measure of its notorious "three strikes" anti-piracy law. "Getting rid of the cut-offs and those damned winged elephants is a good thing. They're very costly," Joe McNamee, of European Digital Rights. more
Every time there is a tragic attack on people or property, there is a cry from various authorities or politicians for law enforcement to get unfettered access to all kinds of communication tools. But that would cause far more harm than good, and is a really bad idea. The argument goes something like this: 'These bad actors hide behind encrypted communications to plan their evil deeds...' more