DeepSeek Says “Xi Jinping is a Dictator”

In last week’s blog post, The Frontier Illusion: Rethinking DeepSeek’s AI Threat, I discussed Cisco’s safety test on DeepSeek R1, which revealed the model’s inability to filter out socially unacceptable content, including cybercrime, harassment (bullying), chemical and biological weapons, and other illegal activities. During my data collection process last month,...

The Frontier Illusion: Rethinking DeepSeek’s AI Threat

The Frontier Illusion: Rethinking DeepSeek’s AI Threat Following the release of DeepSeek-V3 on December 26, 2024, Western nations, led by the United States, have found themselves caught between astonishment at China's AI advancement and deep concerns over potential threats to privacy, safety, and national security. This tension has sparked a...

Embarrassing the Future: TikTok Decision Turns on Data Collection

Today the U.S. Supreme Court issued a unanimous ruling upholding the TikTok ban. The Justices clearly did not understand the full implications of this decision, and admitted as much in the opening paragraphs of the decision:   “...we are conscious that the cases before us involve new technologies with transformative...

IGP at AoIR 2024

From October 30 to November 2nd, the 2024 Association of Internet Researchers (AoIR) conference was held at the University of Sheffield in Sheffield, United Kingdom. This year marked the 25th anniversary of the AoIR conference, which set a record as the largest in its history, drawing approximately 700 attendees from...

Encryption Under Siege in India: National Security & the Erosion of Digital Privacy

Today (October 21, 2024) is Global Encryption Day. IGP participates in this worldwide event as Saumya Jain and Jyoti Panday examine India’s evolving assaults on private communications. End-to-end (E2E) encryption ensures that only the sender’s and recipient’s devices have access to the keys needed for encryption and decryption. This setup...

The Justice Department Sues Georgia Tech: A Teachable Moment in Cybersecurity Management

Georgia Tech, a world leader in cybersecurity research and education, is now in the news for not complying with federal cybersecurity contractual obligations. This sounds funny and embarrassing until you look deeper into the story and understand what this case is really about. It’s not about security. It’s about compliance....

Mandated Interoperability/ Cybersecurity: The Fateful Tradeoff Underlying the Crowdstrike Incident

We’ve learned a lot in the last ten days about the software update from Crowdstrike that crashed approximately 8.5 million Windows-based PCs. In retrospect, 8.5 million is a fairly small portion of the global Windows environment, 7 or 8% (according to MSFT less than 1% of Windows machines were impacted),...

The U.S. FCC’s intrusion into routing security: A comment

The Internet Governance Project (IGP) has submitted comments in response to the Federal Communications Commission (FCC) Notice of Proposed Rulemaking (NPRM) in the Matter of Reporting on Border Gateway Protocol Risk Mitigation Progress, FCC 24-146 and Secure Internet Routing, FCC-24-62. Internet routing was for many years left network operators to...