I have a hypothesis: The Bush administration came to power in December 2000. American telcos were on the precipice about to go into Free fall. We have seen how Bush politicized the Justice Department and are much more aware thanks to John Dean's Broken Government and Charlie Savage's Take Over of the intense desire to aggregate executive power to feed the Addingtons belief in the Unitary Executive. We now know that Cheney was meeting with the energy industry in early 2001 promising them whatever they wanted. We may begin to ask what the domestic telecoms industry was being promised? more
When reading some of the nonsense constituting this initiative occurring in Washington, one wonders what planet the proponents live on. It is like peering through some perverse wormhole back to a 1990s Washington view of the world that saw “the internet” as some salvation for all the problems of humankind. For a world now focused on rolling out 5G virtualization infrastructure and content-based services and meshed devices, the challenges of cybersecurity and network-based harm to society, the initiative makes the U.S. Administration seem utterly out of touch with reality. Simply goofy. more
The market has failed to secure cyberspace. A ten-year experiment in faith-based cybersecurity has proven this beyond question. The market has failed and the failure of U.S. policies to recognize this explains why we are in crisis. The former chairman of the Security and Exchange Commission, Christopher Cox, a longtime proponent of deregulation, provided a useful summary of the issue when he said, "The last six months have made it abundantly clear that voluntary regulation does not work."... more
So I heard about this ridiculous news the other day that now Australian customs officers have been given new powers to search incoming travelers' laptops and mobile phones for pornography, according to The Age. Really? Come on. Really? First the Internet filtering, a la porn wall, and now this? more
Transparency and accountability are embedded in ICANN's core values. Indeed, ICANN's Bylaws mandate that "ICANN and its constituent bodies shall operate to the maximum extent feasible in an open and transparent manner ...". Public Interest Registry believes that a dedication to transparency is fundamental to the strength and continued effectiveness of ICANN's multistakeholder model. more
It is one of those oddities that occurs around Washington from time to time. During the same hour today, the Federal Communications Commission (FCC) was meeting at its downtown headquarters trying to stop robocalls, while a large gathering of government and industry cybersecurity experts were meeting a few miles away at Johns Hopkins Applied Physics Lab advancing the principal means for threat information sharing known as STIX. more
With the strong possibility of a new Netmundial-style event being organized under the stewardship of CGI.br in 2024, the Internet governance community ought to reflect upon the benefits that this could bring to all stakeholders. In a scenario of uncertainty over the several processes affecting the future of the global network, there is value in taking another look at the original event's collaborative outcomes document, which summarized much of what was then understood to be core principles of Internet governance. more
The Cuba Internet Task Force (CITF) held their inaugural meeting last week. Deputy Assistant Secretary for Western Hemisphere Affairs John S. Creamer will chair the CITF, and there are government representatives from the Department of State, Office of Cuba Broadcasting, Federal Communications Commission, National Telecommunications and Information Administration and Agency for International Development. Freedom House will represent NGOs and the Information Technology Industry Council will represent the IT industry. more
Earlier this week, Facebook expanded the roll-out of its facial recognition software to tag people in photos uploaded to the social networking site. Many observers and regulators responded with privacy concerns; EFF offered a video showing users how to opt-out. Tim O'Reilly, however, takes a different tack... O'Reilly's point - and face-recognition technology - is bigger than Facebook. more
Over the last year the world has been virtually buried under news items describing hacks, insecure websites, servers and scada systems, etc. Each and every time people seem to be amazed and exclaim "How is this possible?" Politicians ask questions, there is a short lived uproar and soon after the world continues its business as usual. Till the next incident. In this blog post I take a step back and try to look at the cyber security issue from this angle... more
Internet freedom is under threat from governments around the world, including the United States, warned Vint Cerf on Monday. Andrew Feinberg reporting in the Hill: "Cerf, a computer scientist who was instrumental in the Internet's creation, now employed by Google as its 'Internet evangelist,' said officials in the United States, United Kingdom and Europe are using intellectual property and cybersecurity issues 'as an excuse for constraining what we can and can't do on the 'net.' 'Political structures ... are often scared by the possibility that the general public might figure out that they don't want them in power,' he said." more
In the debate over government "exceptional access" to encrypted communications, opponents with a technical bent (and that includes me) have said that it won't work: that such a scheme would inevitably lead to security problems. The response -- from the policy side, not from technical folk - has been to assert that perhaps more effort would suffice. FBI Director James Comey has said, "But my reaction to that is: I'm not sure they've really tried." Hillary Clinton wants a "Manhattan-like project, something that would bring the government and the tech communities together". More effort won't solve the problem - but the misunderstanding lies at the heart of why exceptional access is so hard. more
Reports on Friday said Google has indicated that the Huawei ban poses security risks for US consumers and is asking the Trump administration for an exception. According to a report by the Financial Times, Google executives are warning the ban will force China to develop its own Android software independent from Google and thus leading to security flaws and bugs. more
Tim Berners-Lee is in Washington urging lawmakers to reconsider the rollback of net neutrality laws. more
CAUCE just posted a blog entry about C-27; we will be speaking to the Industry, Science, and Technology committee reviewing the bill this afternoon. The meeting will be webcast starting at 15:30 eastern... more