The Italian Red Cross says residents' home networks can assist with communications during the search for survivors following Wednesday's 6.2 magnitude earthquake which struck central Italy killing over 240 people. more
Last week (29-30 April), Global Partners Digital (GPD) joined other civil society groups, business actors, the technical community and governments in São Paulo, Brazil for NETmundial+10: the ten year follow up to the landmark NETmundial process in 2014, which set out principles for multistakeholder approaches to Internet governance. In the intervening decade, the policy landscape has been transformed by an increase in policy and normative frameworks related to digital technologies, as well the advent of new technologies—particularly AI—and their attendant opportunities and challenges. more
In a blog post on the ICANN website, Joe Abley writes: "Resolvers are servers on the Internet which use the Domain Name System (DNS) protocol to retrieve information from authoritative servers and return answers to end-user applications... So, all in all, how many resolvers are there? Given that anybody can run one, it seems like a difficult thing to measure. It turns out, however, that all resolvers that talk directly to authoritative servers on the Internet leave a trail, and with a little data crunching we can come up with a number." more
Kieren McCarthy reporting in the Register: "Domain name overseer ICANN is likely to go through a radical reorganization if it wants to be given more control of critical internet functions, currently run under contract from the US government. Two recent papers -- one from independent legal experts hired by a group looking into the contract's transitioning, and a second from an internet governance think-tank -- have both highlighted the benefit to making ICANN a true member-led organization, with the internet community given real powers to effect change." more
Google will be hosting a discussion on the future of cloud computing and technology policy tomorrow, March 20, in Washington, D.C. Participants include Jeffrey Rayport, principal at the Marketspace consulting group and a leading experts on digital strategy and marketing, and Andrew Heyward, former President of CBS News, who will be presenting the findings of their new study. "They will assess the possibilities, risks and returns of cloud computing; the next steps in moving forward; and potential implications for technology policy," says Dorothy Chou, Google's Global Communications and Public Affairs. Those unable to attend are invited to submit questions in advance via Google Moderator. more
The Applicant Auction team is getting an increasing number of requests from applicants who are scheduled for ICANN's Last Resort auction and would prefer to participate in the Applicant Auction instead. A common question is: What is my last chance to participate in an Applicant Auction? To be able to give a clear answer for this, we are suggesting a schedule for future Applicant Auctions. more
Google, which through its Postini email security and archiving service processes over 3 billion email connections a day, reports that despite recent series of major botnet takedowns, spam levels during the first quarter of 2010 have held fairly steady. "This suggests that there's no shortage of botnets out there for spammers to use. If one botnet goes offline, spammers simply buy, rent, or deploy another, making it difficult for the anti-spam community to make significant inroads in the fight against spam with individual botnet takedowns." more
WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more
If you read this blog, you've probably heard by now about the massive Twitter hack. Briefly, many high-profile accounts were taken over and used to tweet scam requests to send Bitcoins to a particular wallet, with the promise of double your money back. Because some of the parties hit are sophisticated and security-aware, it seems unlikely that the attack was a straightforward one directly on these accounts. more
The Internet Society today announced funding for 11 community-based Internet projects that will enhance the Internet ecosystem in underserved communities around the world. The Community Grants are awarded twice each year to Internet Society Chapters and Members. Recipients receive up to US$10,000 to implement their projects. more
"Activists and academics are calling on Canada's privacy commissioner to investigate after an executive order from President Donald Trump last week stripped Canadians and other foreigners of the limited digital privacy protections they had enjoyed previously in the U.S," Daniel Tencer reporting in the Huffington Post. more
Tomorrow afternoon at 1pm EST Apple will be giving testimony to the House Judiciary Committee. The session that Apple and others will be taking part in is aptly named, The Encryption Tightrope: Balancing Americans' Security and Privacy In common with other hearings the various witnesses called to speak have already submitted their written testimony, so we can already look at it and analyse it. more
As DDoS attacks become larger, more frequent and complex, being able to stop them is a must. While doing this is part science, a matter of deploying technology, there is also an art to repelling sophisticated attacks. Arbor Networks, Citrix and others make great gear, but there's no magic box that will solve all your problems for you. Human expertise will always be a crucial ingredient. more
Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more
Germany is trying to beef up its cyber defense, after the interior minister called for rules that allow nations to attack foreign hackers targeting critical infrastructure. more