U.S. National Security Agency (NSA) will halt its controversial warrantless surveillance program which collects Americans' emails and texts sent to and from people overseas and that mention a foreigner under surveillance, according to a New York Times report today. more
What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future? As part of the Internet Society's "Internet Futures" project, we'd like your input on recommendations for Internet leaders and policy makers. For more background, please read "Help Shape the Future of the Internet" by my colleague Constance Bommelaer, or browse through the Internet Futures pages. more
I believe in the Internet As an ideal. As a web of human minds. As a wonder of the world, not built through totalitarian control but rather through fierce coopetition. As a technological pillar held up by a newer, better, governance structure. As the facilitator of knowledge sharing and communication on a level so advanced that it would appear supernatural to folks living just a century ago, or less. I worry for the Internet While it has been a major disruptive force, it is also susceptible to the existing paradigm. more
The short history of Internet Governance is full of errors, failures, and - mainly - omissions. Despite the shortcomings, we also must acknowledge the achievements of past and present internet governance efforts. In particular, ICANN and its stakeholder constituencies have delivered on the mandate of a stable, secure and resilient Internet. Working with the IANA, IAB and IETF, the operational functions of IP addresses, and the Protocol Assignment and DNS must be seen as an unqualified success. more
In a speech at the Internet Policy Research Initiative at MIT, British intelligence agency GCHQ director Robert Hannigan said Monday that law enforcement and intelligence officials want only targeted ways to stop what he called "abuse of encryption" by ISIS and other terrorists and criminals. more
There's been a lot of media attention in the last few days to a wonderful research paper on the weakness of 1024-bit Diffie-Hellman and on how the NSA can (and possibly does) exploit this. People seem shocked about the problem and appalled that the NSA would actually exploit it. Neither reaction is right. In the first place, the limitations of 1024-bit Diffie-Hellman have been known for a long time. RFC 3766, published in 2004, noted that a 1228-bit modulus had less than 80 bits of strength. That's clearly too little. more
Major European legislation, the General Data Protection Regulation, evoked substantial change in the way we deal with the visibility of domain name registration information, and understandably those that use that data to solve problems are concerned about these changes, and some have even called for a U.S. legislative fix. However, a more in-depth look at the issue and the policy-making surrounding it will show that there is, in fact, a process already well underway to address the situation. more
Canadian human-rights activists and computer security researchers have released a report on the extensive surveillance system in China that monitors and archives text conversations that include politically charged words. The research group, called Information Warfare Monitor, is a joint project of The SecDev Group, and the Citizen Lab, at the Munk Centre for International Studies, University of Toronto. The following are introductory excerpts from the study... more
Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more
Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more
Experts at a CircleID and Edgemoor Research Institute webinar debated the challenges of domain registration data access in a post-GDPR world. Panelists explored the tension between privacy laws and legitimate data requests, the role of automation in disclosure decisions, and the need for a scalable, trust-based framework to balance compliance, cybersecurity, and enforcement interests. more
Recently I was reminded of the words, "responsibilities and service to the community." To individuals involved in internet governance, these words should be well known. But have we lived by the code exemplified by these words? Have we lived up to the high standards that they represent? I have always been a student of history because it never fails to show me that humanity, on many occasions, tends to repeat the same mistakes. more
Out of the 3 billion users on the Internet, how many can trust that their online communications will not be monitored or censored? How many feel safe that they can express their opinions online and will not be arrested for their ideas? How many feel confident in communicating anonymously online? For us at the Internet Society this is a key element of an Internet of opportunity: Internet access is only meaningful if people can trust that their fundamental rights will be respected and protected online as well as offline. more
There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more
Negotiations for a U.N. cybercrime convention have reached a critical stage at the fourth round of discussions in Vienna. Delegates from over 150 states have met for over 100 hours to discuss the proposed convention, which has been met with skepticism from some states, nongovernmental organizations, and other stakeholders more