The year 2012 isn't meant to be apocalyptic, and with a little forethought it won't be, but it is the year in which we will reopen the International Telecommunications Regulations (ITRs). For many companies this will be bad news for reasons that are already well-understood and for new reasons that countries keep piling onto the agenda: a recent favorite from Russia calls for the treaty to govern and regulate all telecommunications services, "existing, emerging, and future." more
Science, technology, engineering and mathematics (STEM) careers are some of the most challenging, dynamic, and lucrative in the world. STEM fields are crucial to driving innovation and sustained economic prosperity, yet finding the right talent to make businesses sustainable appears to be harder than ever before as 2.4 million STEM jobs will be unfilled by 2018. more
A new study has been released by Center for Strategic and International Studies (CSIS) Commission on Cybersecurity for the 44th President that looks into cybersecurity manpower challenges in the United States. The report titled, "A Human Capital Crisis in Cybersecurity," is produced by CSIS - a bipartisan public and foreign policy think tank in Washington. more
These days in Washington, even the most absurd proposals become the new normal. The announcement yesterday of a new U.S. State Department Cyberspace Bureau is yet another example of setting the nation up as an isolated, belligerent actor on the world stage. In some ways, the reorganization almost seems like a companion to last week's proposal to take over the nation's 5G infrastructure. Most disturbingly, it transforms U.S. diplomacy assets from multilateral cooperation to becoming the world's bilateral cyber-bully nation. more
Negotiations for a U.N. cybercrime convention have reached a critical stage at the fourth round of discussions in Vienna. Delegates from over 150 states have met for over 100 hours to discuss the proposed convention, which has been met with skepticism from some states, nongovernmental organizations, and other stakeholders more
Afghanistan's President Ashraf Ghani has signed into law a cybercrime bill this week targeting online crime and militancy by groups such as the Taliban and Islamic State despite concerns it could limit free speech. more
The other day, I planned to take my 15-year-old son to the movie theatre to see "Hateful Eight" in 70mm film format. The theatre would not allow him in. Under article 240a of the Dutch penal code, it is a felony to show a movie to a minor when that movie is rated 16 or above. Even though I think I am responsible for what my son gets to see, I understand that the rating agency put a 16-year stamp on this politically-incorrect-gun-slinging-gore-and-curse-intense-comedy feature. more
The surest way to screw up future innovative applications would be for ISPs to make constraining assumptions about the future based on existing applications' performance. Discussing P2P behavior as if it were some monolithic, unchanging entity is simply wrong. What is P2P? BitTorrent? Skype? CNN live video feed fan-outs? And what of changes to these existing apps? What of future apps? more
Over the last year I have become deeply involved in the debate in the USA regarding the future of their telecoms sector, which is proceeding very much along the lines of the trans-sector approach towards infrastructure (using it for other sectors such as healthcare, education, energy), open networks and a separation between infrastructure and applications. While many of the issues are universal it was also interesting to observe the specific elements that make the USA so unique. more
Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more
My day job, which includes finishing a book, updating a broadband law treatise, and trying to engage undergraduate students in the challenges of telecommunication and Internet policy, prevents me from weighing in each time I see yet another outrageous claim on such issues as network neutrality, broadband market penetration, and the competitiveness of U.S. telecoms markets. But I have to make time for this one. more
It appears that the FCC will permit exceptions to the standard, plain vanilla best efforts routing standard for Internet traffic, such as the paid peering arrangement recently negotiated between Comcast and Netflix. In both academic and applied papers I have supported this option, with several major conditions... With no opposition that I have seen, companies like Akamai offer better than best efforts routing of "mission critical" traffic from content source to last mile, "retail" Internet Service Providers. more
Having been a member of the Committee for this past year, I'm pleased to share that the US Federal Communications Commission (FCC) "Open Internet Advisory Committee" has published its first annual report... The report is weighty - 98pp if you kill trees to print it. The OIAC was established as part of the US FCC Open Internet activity and Open Internet Report and Order from 2010. The FCC appointed expert committee members from a broad range of commercial, academic, and not-for-profit organizations. more
AT&T got critics' keyboards activated by announcing plans for a Sponsored Data service, enabling websites to pay for their end-users data consumption. The service has been characterized as a type of toll-free or "1-800? style service for mobile data. Does this contravene network neutrality principles? AT&T says the traffic from the sponsoring sites will be treated the same as other traffic on the network. A US public interest group, Public Knowledge, claims this is precisely what a net neutrality violation looks like. more
The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more