At the ninth Internet Governance Forum (IGF) in Istanbul, the International Chamber of Commerce (ICC) and the Business Action to Support the Information Society (BASIS) have welcomed the reaffirmation of the IGF's relevance and continued importance as well as the opportunity to work collaboratively with other stakeholders to further improve it. more
The release on websites this week of what appears to be top-secret computer code that the National Security Agency has used to break into the networks of foreign governments and other espionage targets has caused deep concern inside American intelligence agencies, raising the question of whether America's own elite operatives have been hacked and their methods revealed. more
I just heard about a U.S. County that is using its American Rescue Plan Act (ARPA) funds to build fixed wireless broadband. This is a traditional fixed wireless broadband technology that will probably deliver speeds of 100 Mbps to those close to the towers, slower speeds to homes further away, and which will not reach all homes in the County. more
The first joint cyber security exercise between the EU and US is being held today in Brussels, with the support of the EU's cyber security Agency ENISA and the US Department of Homeland Security. The day-long table-top exercise, named "Cyber Atlantic 2011", is using simulated cyber-crisis scenarios to explore how the EU and US would engage each other and cooperate in the event of cyber-attacks on their critical information infrastructures. more
resident Obama announced today that he has reached a "common understanding" with Chinese President Xi Jinping on curbing economic cyber espionage, but threatened to impose U.S. sanctions on Chinese hackers who persist with cyber crimes. more
The Anti-Phishing Working Group (APWG) recently reported that the number of sites infecting PCs with password-stealing crimeware reached an all time high of 31,173 in December 2008 - an 827 percent increase from January. And according to a report just released by Trend Micro's Focus Report, 93 percent of data-stealing malware have been identified as Trojans in the first quarter of 2009. more
The United Nations has announced that the membership of the Multistakeholder Advisory Group of the Internet Governance Forum has been renewed. A total of 56 members, 33 among them new, have been appointed. The Advisory Group members are from all stakeholder groups and all regions, representing Governments, the private sector, civil society, academia and technical communities. more
The recent Cisco Annual Internet Report for 2018–2023 had one chart that I found intriguing. The purpose of Cisco's report is to look at the future of broadband usage, and the report included a chart showing the amount of bandwidth needed for various web functions. To me, this list was reminiscent of the list that the FCC made in 2015 when they set the definition of broadband at 25/3 Mbps -- except that all of the items on this list require more bandwidth than the functions the FCC foresaw just five years ago. more
There have been a number of occasions when the Internet Engineering Task Force (IETF) has made a principled decision upholding users' expectations of privacy in their use of IETF-standardised technologies. (Either that, or they were applying their own somewhat liberal collective bias and to the technologies they were working on!) The first major such incident that I can recall is the IETF's response to the US CALEA measures. more
Around the world, digital technology is seen as vital for economic development. In the U.S. alone, the Internet accounts for about six percent of the entire economy. Digital technology has expanded its role in the global economy in recent years, as both developed and developing nations have become increasingly reliant on the Internet. more
According to a new update on Facebook's Internet.org website on Monday, a service called "Express Wifi" has gone live and plans are in place to expand to other regions soon. more
The FBI and international partners dismantled a China-backed botnet run by the Integrity Technology Group, a company linked to Chinese government espionage. more
The internet activity of everyone in UK will have to be stored for one year by Internet service providers, under the new surveillance law plans. "This duty would include forcing firms to hold a schedule of which websites someone visits and the apps they connect to through computers, smartphones, tablets and other devices. Police and other agencies would be then able to access these records in pursuit of criminals -- but also seek to retrieve data in a wider range of inquiries, such as missing people." more
Google Search is rolling out a new feature that allows users to access historical versions of websites directly through The Internet Archive's Wayback Machine. more
Domain name monitoring - that is, the detection of domains with names containing a brand-term (or other string) of interest - is a very well-established element of brand protection services. Branded domain names are of key importance to brand owners (as the basis for business-critical infrastructure (i.e. 'core' domain names), and as part of a 'tactical' portfolio of strategic and defensive registrations), but also to infringers, who can utilise domains as a means of impersonation, passing off, claimed affiliation, or traffic direction and monetisation. more