China has pursued a strategy of competition among government-owned organizations, and it initiated two government-owned constellation projects, Hongyun and Hongyan, in 2018. In April 2020, China's National Development and Reform Commission included "satellite internet" on its "new infrastructures" list, and China applied to the ITU for a new constellation, called GW. more
Support for the European Union's contentious Chat Control legislation - designed to combat child sexual abuse material (CSAM) - remains strong, yet a rising chorus of opposition now threatens to complicate its path to adoption. more
A new report has shed light on how advanced artificial intelligence is reshaping the cybercriminal landscape. The latest threat intelligence assessment by Anthropic details how its AI model, Claude, was misused in a string of global cyberattacks that mark a sharp escalation in both scale and sophistication. more
In a striking admonition issued on August 21st, Andrew Ferguson, chairman of the Federal Trade Commission (FTC), cautioned over a dozen major technology firms against bowing to foreign demands that compromise American users' data security or freedom of speech. more
OpenVault recently published its Broadband Insights Report for the end of the second quarter of 2025. OpenVault is documenting the continued growth in broadband usage by U.S. households. One of the most useful statistics from OpenVault is the average monthly broadband usage per household in gigabytes. Below is the trend in average monthly U.S. download and upload volumes since the first quarter of 2021. more
The Edgemoor Research Institute (ERI) and Taiwan's .TW Registry (TWNIC) have announced a three-year strategic partnership to enhance Domain Name System (DNS) data management and internet security. The collaboration focuses on joint research, data sharing, and capacity building, aiming to strengthen global internet infrastructure and governance. more
China briefly disconnected from much of the global internet for over an hour on Wednesday, following a disruption traced to the country's "Great Firewall." According to activist group Great Firewall Report, the outage began at 12:34 a.m. Beijing time and lasted until 1:48 a.m. on August 20. more
Authorities across 18 African nations, aided by the United Kingdom and INTERPOL, have arrested 1,209 suspects and dismantled over 11,000 illicit cyber infrastructures. more
A surge in AI-generated deepfake scams is reshaping the cybersecurity threat landscape, with fraudsters now impersonating company executives to deceive employees and siphon off millions. more
The credibility of ICANN's much-vaunted programme to expand internet domains is under strain. Governments and user representatives have warned that the Applicant Support Program (ASP) - a scheme offering fee discounts to poorer or non-profit applicants for new top-level domains (gTLDs) - is failing to reach its intended beneficiaries. more
As digital technologies intertwine ever more closely, new vulnerabilities are surfacing in unexpected places. A recent UK government report highlights how the convergence of emerging technologies - such as artificial intelligence (AI), blockchain, quantum computing, and the Internet of Things (IoT) - is generating complex cybersecurity risks across critical sectors. more
There was a recent article in the Wall Street Journal that noted that the business world still uses a lot of landline telephones. Landline telephones have been steadily disappearing from homes, but are still not gone. I see ISPs still selling a telephone line to 10% or more of passings, and surveys show that the average residential landline penetration rate is still somewhere between 15% and 20%. more
Eighty years ago, in August 1945, the world saw hope and horror. On August 1, 1945, just weeks after the adoption of the UN Charter, the leaders of the United States, the United Kingdom and the Soviet Union signed the Potsdam Agreement, which produced hope for a peaceful post-war world. Only some days later, the world saw the horror of nuclear bombs in Hiroshima and Nagasaki. A cold war followed. more
Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors. more
On Wednesday, 9 July, I attended the WSIS+20 HLE Overall Review multistakeholder consultation with co-facilitators H.E. Mr Ekitela Locale from the Republic of Kenya, and H.E. Ms Suela Janina from the Republic of Albania with my UNU-CRIS hat and had the opportunity to talk with them together with my fellow youth IGF colleagues Dana Cramer and Jasmine Ko. We discussed youth participation in Internet governance, and I raised my concerns about the future of youth IGFs. more