The first part of this blog exposed some of the hidden assumptions underlying the Solarium Commission recommendations and provided a general overview of the report. Now we will take a closer look at other recommendations of the report, specifically those dealing with information sharing and centralization of authority in CISA....
Late February this year, Brazil published its first national cybersecurity strategy. With more than 100 countries worldwide having released their strategies and considering that Brazil is the biggest economy in Latin America, one might ask: why has it taken so long for Brazil to take that step? What does a...
The Cyberspace Solarium Commission is the creation of two Congressmen, Senator Angus King of Maine, and Representative Mike Gallagher of Wisconsin. Its goal was to develop consensus among DC elites about cybersecurity policy. For better or worse, its main focus is on the military and foreign policy aspects of cybersecurity....
The past years have been turbulent for trade and the digital economy. While protectionist agendas are affecting trade generally, the problem is compounded when national cyber security concerns are linked to trade in digital products and services. This has led to the rise of a phenomenon known as tech nationalism....
In a little under two weeks, at the upcoming Internet Governance Forum-Berlin, the Internet Governance Project (IGP) and ICT4Peace Foundation will be holding an open work meeting about the ongoing effort to form a global network of cybersecurity researchers who want to cooperate to develop attribution capabilities and perform cyber-attributions...
A presentation at the recent RIPE79 gives us some initial insight into the recursive resolution of Domain Name System (DNS) queries. Who performs recursive resolution and therefore has access to DNS query data is at the center the DNS over HTTPS (DoH) debate. But as we’ll explain below, the data...
In the first section of this piece I argued that the anti-Huawei litany only makes sense when one realizes that the Chinese state, not a global telecommunication equipment manufacturer based in China, is the target of this attack. China, in this view, is an integrated monolith and any Chinese firm...
On May 29, I attended an AEI event on “International economics and securing next-generation 5G wireless networks,” with Ambassador Robert Strayer, who heads the US State Department’s CIP team. But the focus of the talk was not really on 5G security, international trade or 5G development. In fact, there was no constructive agenda at all. The talk was an extended attack on China and the Chinese-based telecommunications...
DNS over HTTPS (DoH) is a new IETF standard that modifies DNS to encrypt its queries. The stated objective of the new standard is to improve the security and confidentiality of DNS queries and reduce latency. Ever since we did our first study on the use of PKI in routing,...
The Swiss-based advocacy organization ICT4Peace held a workshop late last month to discuss ongoing efforts to build an independent network of organizations engaged in attribution activities. There were approximately two dozen attendees, from US and European universities (including Georgia Tech’s IGP), industry, a handful of European government agencies, and a...
“In characteristically rigorous fashion, Mueller’s outstanding book punctures the alarmist myth of Internet fragmentation and helps us to understand what is really at stake as nations and other groups vie for power over the Internet.”