Information Society meeting this week must rebuke those nations that seek top-down, censorial control of the Internet, warns Kathryn Brown, president of the Internet Society. more
New York state is proposing new rules requiring banks and insurance companies to establish cybersecurity programs and designate an internal cybersecurity officer. more
Astronomy & Astrophysics published a research paper recently that looked at "Unintended Electromagnetic Radiation from Starlink Satellites." The study was done in conjunction with the Low-Frequency Array (LOFAR) telescope in the Netherlands. The LOFAR telescope is a network of over forty radio antennas spread across the Netherlands, Germany, and the rest of Europe. more
In an open letter released today, Sir Tim Berners-Lee, Professor Barbara van Schewick, and Professor Larry Lessig are urging citizens, lawmakers and regulators, to speak up. more
Eutelsat Communications and Facebook announced today their partnership on a new initiative that will leverage satellite technologies to get more Africans online. "Under a multi-year agreement with Spacecom, the two companies will utilize the entire broadband payload on the future AMOS-6 satellite and will build a dedicated system comprising satellite capacity, gateways and terminals," according to the official announcement. more
In a perfect world, consumers recognize authentic emails from fake, update their operating system, browser and anti-virus software, and have a healthy skepticism about the safety of the Internet. The bad guys hate perfect, so we should be working with consumers to stop them. ... Organizations like mine are joining forces to recruit consumers -- who are also your customers and employees -- in the fight against cybercrime. more
AFNIC recently conducted a test examining validity of the claim that the number of domain names registered by the end of the 1st day of the public opening of a TLD amounts to 50% of the stock that the TLD will achieve by the end of its 1st month, and that the latter number will represent 50% of the stock at the end of the 1st year. more
The U.S. Federal Communications Commission circulated draft rules to govern the lower 42 GHz spectrum (between 42-42.5 GHz). This is within the range of spectrum referred to as millimeter wave spectrum. This is one of the more unusual FCC spectrum deliberations because this spectrum is totally empty -- there is nobody currently authorized by the FCC to use the spectrum band. The FCC is starting this deliberation with a clean slate. more
According to reports today, hackers have attacked Palestinian servers, cutting off phone and Internet service across the West Bank and Gaza. Foreign governments are accused to be behind the attack. "Since this morning all Palestinian IP addresses have come under attack from places across the world," said the Palestinian communications minister today. Reneys reports these outages are the largest observed all year for this country, which normally has a fairly stable Internet. more
The U.S. government has long had a far-reaching control over the internet's technical center. What will happen now when ICANN's Board puts together a proposal on how to transfer responsibility for certain key functions within the domain name system to the internet community? Last week, ICANN had its 55th conference in Marrakech. The most important result of the meeting is that all parts of the so-called internet community approved that ICANN's Board will send a proposal to the U.S. National Telecommunications and Information Administration (NTIA) which suggests how to transfer responsibility for certain key functions within the domain name system to the internet community... more
The 40-year-old Nigerian national, ringleader of a global network believed to be behind scams totalling more than USD $60 million has been arrested in a joint operation by INTERPOL and the Nigerian Economic and Financial Crime Commission (EFCC). more
You don't always need to dazzle consumers -- but you do need to deliver what they want, when they want it, or else risk being left behind. The crux of service activation is to provide requested services to the subscriber in the shortest possible timeframe. The rise in multi-play service offerings can sometimes make this goal difficult, with service fulfilment involving multiple back-end components, including billing, provisioning, activation, monitoring, and diagnostics, as well as different technology types. more
The security flaw was discovered by the company's own security researchers in WikiLeaks' most recent disclosure of classified information, released last week. more
Or at least majority of 895 technology stakeholders' and critics' that were recently surveyed by the Pew Research Center's Internet & American Life Project and Elon University's Imagining the Internet Center. Some of the quantitative results from the expert group include the following... more
One of the more interesting telecom announcements at the CES electronics show in Vegas was the announcement from the partnership of Qualcomm and Iridium of plans to bring satellite texting capability to many more cell phones and other devices. We've already seen a few other announcements recently of the ability to make emergency text calls when out of reach of cell coverage. more