Over fifty experts and expert advocates have released an open letter in support of security research and against efforts to chill or intimidate security researchers. more
Google will be hosting a discussion on the future of cloud computing and technology policy tomorrow, March 20, in Washington, D.C. Participants include Jeffrey Rayport, principal at the Marketspace consulting group and a leading experts on digital strategy and marketing, and Andrew Heyward, former President of CBS News, who will be presenting the findings of their new study. "They will assess the possibilities, risks and returns of cloud computing; the next steps in moving forward; and potential implications for technology policy," says Dorothy Chou, Google's Global Communications and Public Affairs. Those unable to attend are invited to submit questions in advance via Google Moderator. more
Germany is trying to beef up its cyber defense, after the interior minister called for rules that allow nations to attack foreign hackers targeting critical infrastructure. more
"Handover of US internet control to ICANN now officially blocked by Republican policy," Kieren McCarthy reporting today in The Register: "The planned transition of the internet's critical technical functions from the US government to a technical body may come under further attack after the Republican Party officially agreed to block it on Monday. more
ICANN has announced the name of the newly incorporated organization, Public Technical Identifiers (PTI), as a nonprofit entity to begin operation as 'Post-Transition IANA'. more
U.S. Federal Communications Commission (FCC) chairman Ajit Pai declined a top House Democrat's request for an emergency briefing on the wireless industry's data collection practices amid troubling reports about the availability of real-time location information, reports Harper Neidig in The Hill. more
WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more
We could see it as a victory for those advocating changes and adjustments in the system of internet governance. Au contraire... we could consider it as the debacle of the good intentions... all ending up in not knowing if it was worth it. I say and maintain, that the effort and the earned contributions were worth it. The final result is that ICANN should be strengthened to recognize its merits and achievements, not underestimate what this organization has accomplished in fifteen years of hard and continuous work. more
Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. more
On June 3, 2020, EURid, the registry for .EU domains, published its timeline and action plan to withdraw and delete .EU domains registered to entities and individuals located in the U.K. ... Following the .EU regulations that were published on March 29, 2019, registrations of .EU domain names may be held by EU citizens, citizens of Iceland, Liechtenstein, and Norway, independent of their place of residence -- as well as organizations that are established in the EU. more
"Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US," Bruce Schneier writes in his security blog. more
It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more
Today, the Biden Administration released the National Cybersecurity Strategy, which outlines the use of all available resources to protect the United States' security, safety, and economic prosperity. more
The ever-entertaining Fifth Circuit has recently upheld a strange Texas law that forbids most kinds of social media moderation. (Techdirt explains many of the reasons the court is wrong, so I won't try.) This brings us to the trendy question of whether Facebook, Twitter, et al. should be treated as common carriers. You can make a good argument to separate the point-to-point data transport from the ISP and make the former common carriage. more
After some turmoil, Facebook won the war with the Australian Government as the necessary changes were made to the legislation that avoided them needing to change their business model. Those subtleties are lost in the general press. What counts for the popular media is that they were able to spin some great stories around the fact that Australia stood up to the giants. That brought international attention, which boosted the ego of Australian Prime Minister Scott Morrison. more