China is moving forward towards implementing a controversial cybersecurity law that could have significant implications for foreign businesses operating in that lucrative market, reports Katie Bo Williams in The Hill. more
"Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US," Bruce Schneier writes in his security blog. more
For some years I hear people discuss that education needs to transform and adapt to the Digital Age. In one way education has: I am told that so called MOOCs, Massive Open Online Courses, are a huge success. Classes from lecturers at (top) universities are freely available online. But this is traditional education distributed and made accessible in a modern form. The debate ought to focus on education for the jobs and skills of the future. more
Reading up on COVID-19 and Zoom/Boris Johnson outcry yesterday, an analogy struck me between the two: the lack of testing. In both cases, to truly know how safe and secure we are, testing needs to be stepped up considerably. This post focuses on cybersecurity. Over the past days and weeks, more and more organisations have switched to digital products and services to sustain working from home, to keep productivity up and to be connected. more
Organizations who fail to implement effective cybersecurity measures could be fined as much as £17 million or 4% of global turnover, as part of Britain's plan to prevent cyberattacks. more
People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more
Hans-Georg Maassen, Germany's head of the German Federal Office for the Protection of the Constitution says large amounts of data were seized during the May 20015 cyberattack on lower house of parliament (Bundestag). more
Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. more
The Aspen Institute released the IDEA Common Statement and Principles as a do no harm Hippocratic Oath for Internet governance. The Aspen report describes the present moment as an inflection point for "the most robust medium of information exchange in history". Reed Hundt outlined the risks associated with Internet governance changes favored by China and a group of developing nations through the ITU. more
WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more
Technical management of the Internet was delegated to ICANN by the U.S. government because it was believed that the private sector would be more agile and responsive to the needs of globally distributed stakeholders. However, this optimism and the faith it has produced has proven to be misplaced since ICANN's multi-stakeholder governance continues falling far short of the basic expectations set when it was created. more
The Regional Internet Registry (RIR) for the Asia-Pacific region (APNIC) recently held its 55th meeting in conjunction with APRICOT, from 20 February to 2 March 2023, in Manila, USA. One of the critical discussions at the conference was centered on the APNIC policy that does not accept IP leasing and has a questionable understanding of its necessity. According to the APNIC policy manual, which was referenced during the meeting, APNIC allocates and assigns resources based on need, and 'leasing is not allowed' nor does it form a basis for further need. more
It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more
In order for the Internet to function properly, there has to be "trust". Trust in "online" is something that has ebbed and flowed over the years, but over the past two decades more and more of our daily lives are linked closely to "digital". Our banks encourage us to use online banking and their mobile apps. Government agencies share (and collect) information from private citizens and businesses online. And of course we all do more and more of our shopping online... more
"Human Rights in a Digital Age" is the theme of this year's RightsCon conference in Toronto. An essential human right is access to safe, affordable prescription medications. The Internet makes this possible, our organization has proven it's achievable and sustainable over an extended period of time, and our proposed "Brussels Principles" provide the framework to take our proven success internationally. Across the Globe, to people everywhere. more