Defusing the cybersecurity dilemma game through attribution and network monitoring

States are stuck in a “cybersecurity dilemma”. They can’t reliably distinguish between other states’ offensive and defensive activities. E.g., surveillance or probing being used by a state for defense might look like offensive measures to those states being surveilled or probed. As a result, cyber powers engage in a never...

The flaws and risk in the Kaspersky case

There is a constant drumbeat of Russian threat stories these days, but none is more important to Internet governance than the legal battle between Kaspersky Labs and the United States. It highlights the dangers of nation-states inserting themselves into cybersecurity governance, and shows why the alignment of cybersecurity with nation...

Research Talk: IPv6 Deployment Around the World: A New Digital Divide?

Alain Durand, Principal Technologist at Internet Corporation for Assigned Names and Numbers, visited Georgia Institute of Technology last week for a talk on the global adoption of Internet Protocol version 6 (IPv6). The Internet Governance Project organized the talk in cooperation with Atlanta's Technology Development Center (ATDC) and the Institute...

Year in Review: Normalization of demand for transnational Internet governance

Following the successful completion of the IANA transition in late 2016, those practicing Internet governance had big shoes to fill in 2017. Looking back, there was no similar watershed event defining Internet governance this year. But that doesn't mean there weren't important developments and stories. Whether looking broadly at issues...

Why aren’t we fixing route leaks?

In case you missed it (you probably didn't), the Internet was hit with the Monday blues this week. As operator-focused lists and blogs identified, At 17:47:05 UTC yesterday (6 November 2017), Level 3 (AS3356) began globally announcing thousands of BGP routes that had been learned from customers and peers and...

After Charlottesville: Registrars, content regulation and domain name policy

The Internet governance implications of Charlottesville are becoming clearer. When a white supremacist protest resulted in the murder of Helen Heyer, the Daily Stormer published repugnant, hate-filled content about her on its website. This provoked numerous Internet service providers (domain name registrars, DNS proxy services, a DDoS mitigation service and...

A multistakeholder governance structure for IoT?

The NTIA’s multistakeholder process on Internet of Things (IoT) and cybersecurity is apparently beginning to bear fruit. At this week’s virtual meeting, a draft document, "Communicating IoT Device Security Update Capability to Improve Transparency for Consumers", was determined to be “consensus” output. In this post, we briefly review the process...