Anthony Rutkowski

Anthony Rutkowski

Principal, Netmagic Associates LLC
Joined on August 15, 2012
Total Post Views: 1,471,258

About

Tony Rutkowski is an engineer-lawyer with an extremely diverse, sixty-year professional career spanning the telecommunication, mobile, internet, satellite, and broadcasting fields in the U.S. and Europe where he has shaped major technical and legal developments in senior governmental, company, and academic leadership positions at international, national, and local levels.  Over the past two decades, his roles have been focused on significant international and U.S. Federal network security initiatives relating to cybersecurity, infrastructure protection, extraterritorial security law, and lawful interception for new networks and services.
Currently, as the CEO of Netmagic Associates LLC, he provides technical and regulatory analytical and consulting services to the Center for Internet Security.  He engages actively in a broad array of governmental and industry security forums – largely internationally.  Over the past several years, he has assumed rapporteur responsibilities in the ETSI Cyber Security Technical Committee for a many major specifications and reports and served as an ENISA consultant. 

Except where otherwise noted, all postings by Anthony Rutkowski on CircleID are licensed under a Creative Commons License.

Featured Blogs

A Landmark Standards Human Rights Judgment

On 5 March 2024, the Grand Chamber of the Court of Justice of the European Union handed down a landmark judgment that was years in the making. The case is formally known as C 588/21 P, Public.Resource.Org and Right to Know v Commission. The Judgment of the Court is identified as ECLI:EU:C:2024:201. more

The IoT Cyber Seal Fog

For four days in Southern France, cybersecurity experts from a broad array of different countries and sectors gathered for the annual ETSI Security Conference. The event undertaken by one of the world's major industry information-communication (ICT) standards organisations was intended to take stock of the state of cybersecurity and trends. more

The FCC Cyber Trust Label Gambit

Several weeks ago, the Federal Communications Commission (FCC) embarked on one of the most far-reaching regulatory gambits in its 90-year history. It is formally known as a Notice of Proposed Rulemaking in the matter of Cybersecurity Labeling for Internet of Things, Docket 23 -- 239. The FCC offers ICT product developers the use of its FCC trademarked cyber trust mark placed on their products in exchange for accepting open-ended Commission cybersecurity jurisdiction... more

The Standards Paywalls Fall: Everyone Benefits

Yesterday -- in a unanimous decision of the US Federal Court of Appeals for the DC Circuit (CADC) in ASTM v. Public.Resource.Org --- some of the worst standards paywalls came tumbling down. The court definitively determined that where governmental authorities incorporate private organisation technical standards into law by reference, non-commercial dissemination of those standards "constitutes fair use and cannot support liability for copyright infringement." more

EU CRA: Regulatory Extremism and Exceptionalism

European Union (EU) legislators, like most of the world, are troubled about the increasing number and severity of cybersecurity incidents. However, unlike most of the world, which is taking a flexible, adaptive Zero Trust Model approach of continuous controls for cyberdefense, the EU government is pursuing a vastly expanded version of the failed Common Criteria certification model coupled with regulatory extremism and exceptionalism strategies. more

The Standards Myth That Does Not Stop

The latest iteration of the most expansive, omnipotential cybersecurity legal regime ever drafted appeared a few days ago. The European Union (EU) Cyber Resilience Act (CRA) is attempting to assert jurisdiction and control over all "products with digital elements" defined as "any software or hardware product and its remote data processing solutions, including software or hardware components to be placed on the market." more

The EU AI Act: A Critical Assessment

The proposed new European Union (EU) Artificial Intelligence Act has been extolled in the media as a bold action by a major legislative body against the perceived dangers of emerging new computer technology. The action presently consists of an initial proposal for a Regulation with annexes from 2021, plus recent Amendments adopted on 14 June. This regulatory behemoth exists entwined among a multitude of other recent EU major regulations... more

EU Standards Must Be Freely Available

In 2019, two organisations - Public.Resource.org of Sebastopol, California, and the Right to Know GLC of Dublin - brought suit against the European Commission for violating the fundamental rights of citizens to access the standards they are required by law to know, and attempting to protect intellectual property by copyright which lacked originality because it was, inter alia, provided by public governmental and industry sources. more

NIST as a Cyber Threat Actor

On 24 May, NIST published recommendations that are a key component of the U.S. cybersecurity ecosystem -- known as vulnerability disclosure guidelines. NIST (National Institute of Standards and Technology) is an agency of the Department of Commerce whose mission includes "developing cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U.S. industry, federal agencies and the broader public." more

Global Standards Collaboration: Is It Possible?

On 24-27 April, a 33-year-old international organisation of ICT organisations will convene a meeting at London under ETSI auspices after a four-year hiatus. Known today as the GSC or Global Standards Collaboration organisation, it began its existence in the Spring of 1990 at Fredericksburg, Virginia, as an umbrella mechanism for all of the world's ICT standards bodies to collaborate on "high interest subjects." more

Toward an ITU Renaissance

For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more

ITU Secretary-General Elect Doreen Bogdan-Martin

This morning in Bucharest, Doreen Bogdan-Martin was elected by the member nations of the International Telecommunication Union (ITU) as its 12th Secretary-General. Of the 164 votes cast, she received 139 -- an overwhelming majority of 85 percent. Only 15 countries voted for her opponent, Rashid Ismailov of Russia, who sought to implement a divisive techno-political agenda. more

Cyber Diplomacy History at Foggy Bottom: The Latest Chapter

Foggy Bottom is the local affectionate name for the U.S. State Department -- because of its location near a former low-lying Potomac River lagoon in Washington DC. It recently announced the appointment of Nate Fick as the head of its "Bureau of Cyberspace and Digital Policy," pending Congressional approval because it is wrapped up with ambassadorial status. The term "cyber" in this international diplomacy context has come to include all manner of electronic communication and information systems and services, i.e., ICT. more

NIS2: A New Cyber Jurisdiction Paradigm

The approval on 13 May by the European Council and Parliament of a near-final draft Directive on European Cybersecurity (NIS2) brings the world's most far-reaching cyber regime closer to realization. What is generally unknown, however, is the broad scope and global extraterritorial jurisdiction reach of the Directive. It applies to almost every online service and network capability that exists as infrastructure or "offered" anywhere in Europe. more

Monumental Cybersecurity Blunders

Two recent celebrated cybersecurity standards history events brought together sets of people who were intimately involved with some of the most significant network security standards work ever undertaken. These included the X.509 digital certificate standards at ITU X.509 Day, and the Secure Digital Network System (SDNS) standards at the NSA Cryptologic History Symposium 2022. more

ICANN, RIPE, and ISP War Crime Complicity Exposure

The recent horrific actions undertaken by Vladimir V. Putin and complicit Russian actors against the sovereign nation of Ukraine and its people are widely regarded as war crimes on a profound scale not seen in Europe since World War II. The costs in lives and property are enormous. It has recently resulted in a condemning UN Resolution. At some point, there will be reckoning for Putin and those who aided and abetted his actions through our domestic and international legal systems. more

Creating a Russian No-Cyber Zone

In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more

Initiative for the Future of the Global Internet

When reading some of the nonsense constituting this initiative occurring in Washington, one wonders what planet the proponents live on. It is like peering through some perverse wormhole back to a 1990s Washington view of the world that saw “the internet” as some salvation for all the problems of humankind. For a world now focused on rolling out 5G virtualization infrastructure and content-based services and meshed devices, the challenges of cybersecurity and network-based harm to society, the initiative makes the U.S. Administration seem utterly out of touch with reality. Simply goofy. more

Remembering the Cybersecurity Treaty That Never Happened

The cybercrime legal community from around the globe is meeting under the aegis of the Council of Europe (COE) to hold the annual Cooperation against Cybercrime conference dubbed Octopus 2021. It is also celebrating the 20th anniversary of the Cybercrime Convention treaty signed in November 2001 in Budapest. Not celebrated and little known, however, is the Stanford Draft -- A Proposal for an International Convention on Cyber Crime and Terrorism -- and the initiative begun in 1997 which brought about that draft treaty instrument. more

The ITU Strategic Plan: Time to Terminate

In recent times, groups of people gather at the ITU in Geneva and write a "strategic plan" covering the next few years. Indeed, there is a current questionnaire to that effect. It is frozen in a world that existed 30 years ago, and by any measure, surreal and absurd. It needs to be terminated. Here is why. The International Telecommunication Union (ITU) has existed in various forms since 1850 to perform two basic functions. more

Capping Broadband Internet by Design

FIOS by Verizon, is a bundled Internet access, telephone, and television service that operates over a fiber-optic communications network with over 5 million customers in nine U.S. states -- providing Fiber to the Home (FTTH). One of the first service areas was a Northern Virginia community known as Ashburn -- which is also is the cloud data center capital of the world. It literally sits on top of the most massive mesh of high bandwidth, low latency fiber in existence. more

The IETF Evolution

The Internet Engineering Task Force (IETF) is a collaborative body that has developed internetworking specifications for more than five decades, successfully shaping the global marketplace of digital network equipment and services. Beginning as a kind of distributed think tank among network researchers in 1969, it evolved to become one of the world's most influential standards bodies. more

NSA Takes a Leadership Seat at the Global 5G Security Table

It has been a long time coming. In the world of global 5G security, there is only one principal forum. The somewhat cryptically named 3GPP SA3 is dedicated to 5G security and holding its 103rd meeting electronically next week from 17 to 28 May with 772 submitted documents and 189 participants registered. SA3 meets every 60 days and exists at the security center of an ecosystem of numerous technical groups encompassing many hundreds of companies, industry organizations, and government agencies worldwide. more

Keep Politics Out of 5G International Standardization

For the past hundred years or so, the world's vendors of communication networks and services have collaborated -- largely among themselves -- with great success. That paradigm continues today for 5G with the 3rd Generation Partnership Project (3GPP) and an ecosystem cluster of related organizations where industry and affected government agencies worldwide successfully work on a massive scale. more

Reality Check on the 5G Security MAGAverse

As chance has it, the attempt by NTIA to create a fake Trump Open 5G Security Framework MAGAverse as they headed out the door on 15 January is being followed this week by the global meeting of 3GPP SA3 (Security) to advance the industry's real open 5G security Framework. Designated TSGS3-102e (the 102nd meeting, occurring electronically), it continues the practice of assembling companies, organisations, and agencies from around the world every 8 to 12 weeks to focus on 5G security for current and future releases of 5G infrastructure. more

One More Trump 5G Minefield

As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more

Trump’s Parting NTIA 5G Debacle

As Trump's horrific Administration of non-stop debacles and self-serving gambits headed toward the exit over the past few weeks, one last regulatory grab after another has been pushed out the door while the toddler-in-chief rants. Sure enough, the last of the 5G debacles just appeared in the Federal Register courtesy of the President's policy instrument, the National Telecommunication and Information Administration (NTIA). It was titled the 5G Challenge Notice of Inquiry. more

New Nails in the Crypto-Anarchism Containment Coffin

Crypto-anarchism (or crypto-anarchy) is a form of anarchy accomplished through computer technology. Crypto-anarchists develop and employ their own cryptographic techniques to prevent knowledge of the information or even the identity of parties communicating over networks. The motivations vary - from just having fun and causing turmoil, to achieving perceived status within a crypto-anarchy community, to furthering socio-economic views about information availability, absolute privacy, political advocacy and spreading anti-government paranoia. more

Remediating U.S. 5G Global Supply Chain Security Engagement

For nearly the past four years, the Trump Administration has purported to treat 5G supply chain security through empty political gestures such as network equipment banning. The disinformation reached its absurd zenith subsequent to the election with the Q-Anon myth of the Kraken. (The Myth advanced by Trump attorneys asserted the long-deceased Hugo Chavez working with China was corrupting voting machine software to deprive Trump of another term.) more

A Winning Biden 5G Strategy: Flatten the Curve

No, not the COVID curve - the curve of U.S. engagement in global industry 5G activities. Let me explain. What is known as 5G actually consists of a broad array of fundamentally revolutionary virtualization platforms that are constantly, collectively developed by industry in several dozen open global bodies. These bodies meet every few weeks, and several score companies around the world process scores to hundreds of input documents to produce many hundreds of effectively mandatory... more

5G/F5G Cloud Announcements: NFV Game-Changing Confirmations

Over the past few days, Microsoft made two major announcements. One was a "playbook [for] providing a carrier-grade platform for edge and cloud computing to help network operators realize the full potential of 5G technology" using its it Azure cloud data centres. The second announcement was a new platform that enables satellite-based access to those same cloud data centres designated Azure Orbital. Coupled with these announcements was another one by Samsung... more

How the First White House Website Came to Be

In doing a recent search, there it was: the first White House website archived at the U.S. Archives. It ended up changing the direction of markets and network development, if not world politics. How it came to be is known only to the few people involved. It is a great example of individual initiative, collective whimsy, serendipity, and unintended consequences... When Bill Clinton arrived at the White House on 20 January 1993, he brought with him a kind of rag-tag team who had helped him get there.  more

Holding Trump Accountable Under Public International Law

Trump and his enablers are well known to disrespect if not disdain legal systems, including public international law. He has effectively abrogated every treaty instrument relating to international communications at the whim of a tweet. His behavior has dishonoured the USA in a way that will take years to remedy. Trump's actions to ban access to Android Operating System updates on Chinese products have significantly harmed cybersecurity worldwide. more

The Internet Is for All

Over the past fifty years, participants in what began as the DARPA internet community have been turning out diverse technical specifications for TCP/IP network architectures and services. The first twenty years under government agency sponsorship were marked by rather free-wheeling sharing of ideas and collegial accommodation of divergent views typically found in most professional, academic activities. more

2020’s New Internet Success – Rejoinder

The posting with a similar name seems a bit contrived by anonymous in some strange attempt to enhance its significance. Many others, including myself, have been discussing this subject for some time. Indeed, a concerted lobbying effort and anti-competitive efforts by legacy TCP/IP internet stakeholders have been really ramped up over the past year to mischaracterize what is occurring. more

Washington’s 5G Mania Endpoint – Global CyberBalkanisation

Over the past two years, governments and foreign intelligence agencies around the world have tried to understand the inexplicable, chaotic, irrational, indeed maniacal 5G policies of the Trump Administration. Revelations by former Trump administration officials and most recently Trump's niece confirm that there is no rational basis for Trumpian positions and policies and that the best response is to recognize that Washington is no longer capable of playing a meaningful role... more

Senate Report on 5G: Recipe for Disaster

The Democratic Staff Report Prepared for the use of the Committee on Foreign Relations United States Senate, July 21, 2020, entitled "The New Big Brother," is actually all about 5G technology. The report jumps on the runaway anti-China train chaotically flailing around Washington these days to "out-Trump, Trump." It characterizes 5G technology, longstanding international collaboration, and COVID-19 tracking as all part of a global conspiracy for "digital authoritarianism" run out of Beijing. more

Addressing Anticompetitive Behavior in Internet Standards Bodies

A significant focus is emerging today on the anticompetitive behaviour of Silicon Valley companies directed at dominating critical sectors of the on-line marketplace, and a U.S. Congressional hearing is scheduled. Such practices can be pursued in many ways. One of the more elusive, but very effective anticompetitive playbooks - known legally as the "antitrust conspiracy" - can occur in internet standards bodies. more

Marking the 30th Anniversary of the Internet and Cybersecurity Treaty

Next week on 1 July 2020 marks the 30th anniversary of one of the most significant treaty instruments in modern times. On 1 July 1990, the Melbourne Treaty came into force as the first and only global treaty that enabled worldwide internets and mobile networks to exist, together with the cybersecurity provisions designed to protect those infrastructures. The achievement remains as an enduring tribute to Richard Edmund Butler of Australia who was one of the most influential, and best-loved Secretaries-General of the ITU. more

Unintended Benefits of Trump’s Twitter Tantrum

Four years ago, progressive intergovernmental organizations like the European Union became increasingly concerned about the proliferation of hate speech on social media. They adopted legal mechanisms for removing Twitter accounts like Donald Trump's. The provisions were directed at Facebook, Twitter, and YouTube. In June of 2016, a "deconstruction" of these mechanisms was presented to one of the principal global industry standards bodies with a proposal to develop new protocols to rapidly remove such accounts. more

The Costs of Trump’s 5G Wall

Over the past three years, Trump and his followers around Washington have begun to erect the equivalent of his Southern Border Wall around the nation's information network infrastructure - especially for 5G. The tactics are similar - keep out foreign invaders who are virtually sneaking across the borders to steal the nation's information resources and controlling our internet things. The tactics and mantras are almost identical. more

International Pandemic Contact Tracing Standards Group Formed

The formation of an international pandemic contact tracing standards group was announced yesterday. Designated E4P, it is being established as an open public-private initiative under ETSI to "develop a framework and consistent set of specifications for proximity tracing systems, to enable the development of applications and platforms, and to facilitate international interoperability" that also provide for privacy protection. more

Reflections on the .ORG Domain Registry Sale

For all the many reasons raised by thousands of petitioners by prominent members of the U.S. Congress, and the California Attorney General's office, this "sale" plainly should not be occurring. However, in a very real way, it is déjà vu. For me, as one of the handful of people who were members of the original InterNIC public advisory committee which oversaw the spinout of the registry activity from its DARPA government instantiation to a private enterprise business... more

5G Security – Metrics of the Engaged

This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a "partnership" created among all the world's major standards bodies, which over several decades has cooperatively developed and evolved by far the largest and most successful global electronic communications network. more

A Short History of Internet Protocol Intellectual Property

A little over 25 years ago, the Internet Society proposed that they assume responsibility for the DARPA Internet Protocol (IP) specifications Intellectual Property Rights (IPR) that were being evolved by the Internet Engineering Task Force (IETF) to facilitate their use by the mainstream network communication standards bodies and providers. Last week, the IETF, in an attempt to fend off alternative Internet Protocols emerging in the 5G ecosystem and create a standards monopoly, asserted... more

The Secure 5G and Beyond Act – U.S. Credibility and Legal Requirements at Stake

The Secure 5G and Beyond Act of 2020 has been submitted by the U.S. Congress to the White House for signing into law. It has been sitting there for several days now, but there are obviously more important developments demanding attention than a law compelling the Executive Branch to develop a 5G security strategy within 180 days through public and Federal agency consultations that will be implemented by the NTIA. more

Cyberspace Solarium Commission Report

The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more

5G Dementia at the FCC

Like the Coronavirus, 5G Dementia seems to be spreading around Washington. The latest manifestation has appeared at the FCC -- which is trying its best to make U.S. 5G infrastructure as insecure and primitive as possible. But first, an explanation of how 5G Dementia begins at the top and spreads in the U.S. capitol. 5G Dementia begins with "The Genius" who lounges around White House quarters and emits spontaneous tweets on whatever motivates him at the moment. more

5G Reality Check: February 2020

Given all the clueless, nonsensical assertions coming out of Washington these days about 5G and purported leadership, it seemed time to do another reality check. It was timely at the moment because, with the Coronavirus concerns, the massive 3GPP 5G industry collaboration engine switched to virtual meeting mode for February. Thus – with travel barriers to participation completely absent – the participation metrics represent a real litmus test for even nominal engagement in global 5G industry collaboration and technology development. more

WTSA-2020: Reflecting on a Contemporary ITU-T Role

Every four years – as it has done for nearly a hundred years – the ITU-T as the world's only global intergovernmental standards body for all telecommunication, invites its 196 sovereign state members to a meeting where they examine their work and set the stage for the next four years. There is no treaty prepared, but they do examine major developments and decide needed standardization work, priorities and structure of the organization itself – including their leadership. more

Truth in Web Digital Identity?

Most of us, when we go to a website and see the little lock at the top of the browser, don't think twice and trust that we are communicating with the right company or organization. However, this is no longer the case because of a rather radical development that has largely occurred without notice or intervention by almost everyone. The web now has its own rapidly spreading version of CallerID spoofing that is about to get worse. more

5G Leadership Reality Check: January 2020

As we embark on a new year and decade, it seemed worthwhile to take a peek at the principal forums for global 5G industry technical collaboration and do a quick assessment of what is occurring and who are the "leaders." The leadership dimension is especially relevant in Washington these days – which is suffering from a peculiar 5G dementia. As the year ended, there were no less than 35 current 5G related Congressional legislative actions, several of which actually passed one of the chambers. more

The 5G Race in Reno

The past week in the 5G world was notable because of some major events in Reno in the 5G race to roll out the full 5G specifications known as Release 16. A set of seven major concurrent industry standards meetings were hosted there over five days last week. The metrics are indicative of who really participates in and shapes the rapidly emerging 5G platforms. more

Cybersecurity Standards Practices as Cyber Threats

One of the most embarrassing and pernicious realities in the world of cybersecurity is the stark reality that some industry cybersecurity standards practices are themselves cyber threats. How so? Most industry and intergovernmental standards bodies serve as means for assembling the constantly evolving collective knowledge of participant experts and package the resulting specifications and best practices as freely available online documents to a vast, diverse universe of users. more

Trump’s Strange WRC-19 Letter

The 2019 World Radiocommunication Conference (WRC-19) is underway. It is the latest in a continuum of treaty-making gatherings that began in 1903 and is devoted to the now 116-year-old art of globally carving up the radio spectrum among designated uses that is instantiated in the Radio Regulations treaty agreement. Not unexpectedly, the event includes designation of 5G spectrum that flows from the requirements long set in 3GPP and GSMA. more

Lessons From an E-Voting Debacle

There has been a significant focus over the past two years on the vulnerability and cyber threat risks faced for voting systems at the local level. That focus has typically been on State and local jurisdictions like cities, counties and towns, and resulted in the creation of the DHS Elections Infrastructure Information Sharing and Analysis Center (ISAC) to assist. However, there are other local governance entities at significant risk as well. more

The Director

On Thursday, Stephen J. Lukasik passed away peacefully at the age of 88. He was the legend in a field with no peer. For nearly half a century, he shaped the development of national security and network technology developments at a level and extent that is unlikely ever to be matched. For a great many of us in that arena from the 1960s past the Millennium, he was the demanding visionary leader who set the policies and directions, framed the challenges, approved and funded the projects, and questioned the results. more

Call Spoofing: Congress Calls on FCC, Russia and China Answer

It is both amusing and dismaying. Last year, Congress passed Ray Baum's Act telling the FCC to do something about those pesky incoming foreign SPAM calls and texts with the fake callerIDs. The FCC a couple of weeks ago responded with a chest thumping Report and Order claiming it has "extraterritorial jurisdiction" that is does not have, and promising it will do something. Don't hold your breath on that one. more

FCC’s Ignorant Extraterritorial Jurisdiction Bravado

The Federal Communications Commission yesterday released a Report and Order in the matter of its implementation of Ray Baum's Act Section 503 and international call spoofing. The FCC mostly did the right things in the R&O except in one rather extraordinary assertion of legal ignorance and bravado. It asserted unilaterally that it could exercise "extraterritorial jurisdiction that Congress expressly provided in section 503 of the Ray Baum's Act," and it furthermore knew of no "treaty obligation [contravened],...nor other legal barrier...and...are aware of none." more

The Untold History of the First Cyber Moonshot

A dialogue between Michael Warner (Historian, United States Cyber Command) and Tony Rutkowski (Cybersecurity engineer, lawyer and historian). Michael is chairing a cyber history panel at the October biennial Symposium on Cryptologic History hosted by the National Security Agency; his panel will include discussion of the almost unknown key role of cryptologist Ruth Nelson leading a team in the 1980s in a major initiative to secure public internet infrastructure. more

Trump’s Assault on 5G Standards Bodies

Over the past 30 months, since Trump was installed in the White House, he has systematically abrogated US treaty responsibilities and diminished the nation's engagement in international collaborative activities. More recently, his gambits have expanded to market entry, chip component, and software restrictions on Chinese telecommunication equipment vendors, especially Huawei. more

State Department Should Return to Its Knitting

Having researched and written about the 100 year history of U.S. State Department's institutional machinations in the telecom/cyber sector, taught law school graduate courses, and worked with its bureaus and staff over the past 45 years, the latest twists and turns seem to repeat past mistakes. The fundamental problem is that the U.S. is the only country whose Foreign Ministry is given a significant role and engaged in telecom and cyber matters in global venues. more

Trump Orders Cyberattacks by US Companies

It is supremely ironic. A rogue national leader with the stroke of a pen, dictates that its companies will expose a foreign company's end users to cyberattacks. This is the net effect of denying security patches or operating system updates pursuant to Trump's order. In the US Great Rogue Leader's bizarro world, this is the very behavior that he claims makes his actions necessary. In fact, this Trump malware attack is worse because of the mass exposure to exploits. more

Understanding 5G: A Basic Primer

The initial, essential step toward understanding 5G is to perform an intellectual body purge of the endless disgorging of cluelessness and disinformation that emerges from the Washington White House and radiates out around that city and then to the outside world that it infects. The institutes, pundits, self-professed experts, summits, and even the U.S. press all pretty much feed out of the same trough of 5G political slop that gets passed around as incantations of ignorance, spin, and K-street lobbying. more

Collaboration to Prevent International Call Spoofing: Will the FCC Comply With Ray Baum’s Act?

As a former FCC senior staff member, the Commission's increasing disengagement in international telecommunication technology forums over the past two decades has been dismaying. One of the adverse effects of this obliviousness-by-design approach has been felt by American consumers in the massive, exponentially increasing volume of spoofed calling numbers and CallerIDs on communications from outside the United States. more

Banning 5G Equipment is a Foolish Strategy

It has become popular today around Washington and the venues of its coerced allies to issue threats to ban telecommunications equipment from certain countries - especially equipment intended for 5G use. The guise is vague assertions of "national security." It is an old tactic dating back to the turn of the last century and recurrent for decades. A combination of treaty instruments and collaborative industry standards activity several decades ago largely put an end to the banning tactic - significantly benefitting the entire world. more

Creating TLS: The Pioneering Role of Ruth Nelson

As often occurs in networking and cryptographic history, anecdotes and insularity conspire to mask how developments actually occurred, and seminal roles undertaken by women are forgotten or ignored. One of the notable examples of this proclivity occurred in the cybersecurity cryptology arena as it involves a critical platform known as the Transport Layer Security Protocol (TLS) and the pioneering role of Ruth Nelson. more

ITU-T Takes Lead on Drone IoT Identification in 2019

In today's fast-paced world of IoT, perhaps one of the most significant involves the rapid identification of civilian drones -- more formally known as an Unmanned Aerial Vehicle (UAV). The identification of civilian UAVs has become a critical public safety concern today. Establishing a flexible, trusted global means for identifying these objects through worldwide supply chains and resolving the identifier tags to a responsible party rapidly via a network-based resolver is a high priority. more

5G Security Transparency

There is considerable rhetoric propagated today about 5G security. Some of the more blatant assertions border on xenophobia with vague assertions that the 5G vendors from some countries cannot be trusted and wholesale government banning is required. Existing treaty obligations are being summarily abrogated in favour of bilateral trade bullying. These are practices that the late President George H.W. Bush sought to eliminate a quarter century ago through intergovernmental organization initiatives... more

America Will Not Win the Global Race to 5G

Several weeks ago, the White House published a document asserting that "America Will Win the Global Race to 5G." The White House should get over it. This is not about America winning any global race to 5G, but the world working together on fundamentally different, complex, new communication networks and services. There are four important points, however. more

Stop Using the Term “Open Internet”

Over the past few years, the term "open internet" has become popular among politicians in Washington and Europe. It is bandied about in political pronouncements that assert that everyone needs to somehow support the open internet without ever actually defining it. It is sometimes used as a synonym for Net Neutrality. In fact, it is a bogus public relations term that is rather like saying you believe in the Tooth Fairy. more

A Less Than Candid PP-2018 OTT Resolution

As the ITU-T 2018 Plenipotentiary Conference rolls toward a close this week, its most controversial and contentious subject appeared baked into a new treaty instrument resolution that has apparently reached a kind of steady-state. After distilling the many input proposals through ten revisions and a corrigendum, the tasked drafting committee has produced a new resolution with the simple title of "OTTs." more

Cyber Security Word Salad

Two months ago, the Trump White House published its National Cyber Strategy. It was followed a few days ago with the release of its draft NSTAC Cybersecurity "moonshot." The Strategy document was basically a highly nationalistic America-First exhortation that ironically bore a resemblance to China's more global two-year-old National Cybersecurity Strategy. more

Over the Top Services at the ITU PP-2018: Considering the Pittsburgh Massacre

This past Saturday, a self-professed neo-Nazi massacred eleven worshipers at synagogue services in Pittsburgh. The killer was reported to have lived on and was incented by an "Over the Top (OTT)" service purposely established to facilitate extremist activities known as Gab. Within hours, the cloud service providers hosting their services announced they would no longer provide hosting services. Presumably, the threat of both potential civil litigation liability among other penalties, as well as adverse publicity, provided the motivation. more

The ITU 2018 Plenipotentiary Conference: An Analyst’s Long-Arc Perspective

Next Monday, 29 October, most of the formal representatives of the world's nations will convene for three weeks to collectively consider the most significant developments in global network communications networks and services, and make multilateral adjustments in a treaty instrument signed by almost every country at the end. They will also elect heads of the various International Telecommunication Union (ITU) secretariats and permanent bodies for the next four years. more

Trump’s Outrageous ITU Elections Gambit

Every four years, the 168-year-old, Geneva-based treaty organization that provides the legal basis for worldwide network communications, radio spectrum management, and satellite placements holds a "plenipotentiary" conference among its 193 sovereign nation members. The next plenipotentiary begins on 29 October for three weeks. In addition to potentially altering treaty provisions and resolutions, and constituting its Council as an interim governing body, it elects 17 individuals to its five permanent bodies... more

FCC Commissioner O’Rielly’s Appalling Op-Ed on the ITU

The FCC Commissioner Michael O'Reilly's recently contributed opinion on the ITU in "The Hill" is beyond bizarre. It also sadly displays an appalling lack of knowledge of the organization and its history. I find it disturbing - as someone who held senior positions at both the FCC and the ITU and wrote the organization's history - how fundamentally ignorant an FCC Commissioner could be today of the global telecommunications ecosystem. more

Internet as Non-Kinetic WMD

With each passing day, a new public opinion article appears or U.S. government official pronounces how the open internet is abetting some discovered catastrophic effects on our societal institutions. In just one week, the examples include increased information on FSB & GRU attacks on electoral systems and infrastructure, Trump's obliging tactical destruction of societal norms and propagation of the QAnon cult, U.S government agency officials playing "cyber security spin-the-bottle" at press conferences... more

ITU’s Critical Cybersecurity Role and the 2018 Plenipotentiary

In the rather unique world of public international law for cybersecurity, the treaty provisions of the International Telecommunication Union (ITU) stand alone. They form the multilateral basis for the existence of all communication networks, internets, and services worldwide and have obtained the assent by every nation in the world. They also contain the only meaningful multilateral cybersecurity provisions that have endured over a century and a half through all manner of technological change. more

Trump’s Tweets Flouting the Cybercrime Treaty Curbs on Racist and Xenophobic Incitement

The existence of the 2001 Cybercrime Convention is generally well known. The treaty has now been ratified/acceded to by 60 countries worldwide, including the United States. Less well known is the existence of the Additional Protocol to the Convention "concerning the criminalization of acts of a racist and xenophobic nature committed through computer systems." more

U.S. Complaint to WTO on China VPNs Is Itself Troubling

On 23 February, the U.S. Administration had the chutzpah to file a formal communication to the World Trade Organization (WTO) complaining about "measures adopted and under development by China relating to its cybersecurity law." However, it is the U.S. complaint that is most troubling. Here is why. The gist of the U.S. complaint is that China's newly promulgated directive on the use of VPN (Virtual Private Network) encrypted circuits from foreign nations runs afoul of... more

Humming an Open Internet Demise in London?

In mid-March, the group dubbed by Wired Magazine 20 years ago as Crypto-Rebels and Anarchists - the IETF - is meeting in London. With what is likely some loud humming, the activists will likely seek to rain mayhem upon the world of network and societal security using extreme end-to-end encryption, and collaterally diminish some remaining vestiges of an "open internet." Ironically, the IETF uses what has become known as the "NRA defence": extreme encryption doesn't cause harm, criminals and terrorists do. more

Foggy Bottom’s New Cyberspace Bureau “Lines of Effort”: Dumb and Dumber

The release of the Tillerson letter to the House Committee on Foreign Affairs describes the State Department's new "Cyber Bureau" together with its "primary lines of effort." The proposal is said to be designed to "lead high-level diplomatic engagements around the world." Two of those "efforts" deserve special note and provide an entirely new spin on the affectionate local term for the Department -- Foggy Bottom. more

The New State Department Cyberspace Bureau: from Multilateral Diplomacy to Bilateral Cyber-Bullying

These days in Washington, even the most absurd proposals become the new normal. The announcement yesterday of a new U.S. State Department Cyberspace Bureau is yet another example of setting the nation up as an isolated, belligerent actor on the world stage. In some ways, the reorganization almost seems like a companion to last week's proposal to take over the nation's 5G infrastructure. Most disturbingly, it transforms U.S. diplomacy assets from multilateral cooperation to becoming the world's bilateral cyber-bully nation. more

Wow, a U.S. Ministry of 5G

This seemed to be the reaction this morning worldwide to the leaked alleged PowerPoint slides detailing the White House strategic options for a U.S. national 5G infrastructure. The gist of the slides has apparently been confirmed to Reuters by unnamed "Trump security team members." The options apparently range between creating a U.S. Ministry of 5G resembling the old world of government Post, Telegraph and Telecommunication (PTT) agencies of bygone years, and sawing off the U.S. ICT infrastructures and services from the rest of the world. more

Extraterritoriality

Black's Law Dictionary defines it as "the extraterritorial operation of laws; that is, their operation upon persons, rights or jural relations, existing beyond the limits of the enacting state, but still amenable to its laws. The term is used to indicate jurisdiction exercised by a nation in other countries, by treaty..." Extraterritoriality is also the most significant emerging development today in the law shaping virtual network architectures and services that includes OTT and NFV-SDN. more

The Meeting That Changed the DARPA Datagram Internet

The National Science Foundation awarded a small contract to the IEEE to host a small two-day meeting on 30 Sept 1994 of selected invitees at the IEEE's Washington DC 18th Street offices on "Name Registration For The '.COM' Domain." Being part of the InterNIC contract oversight committee, I was one of the eight invitees. It turned out in many ways to be the single most important meeting in the long, checkered history of what is today referred to as "the internet," that made an extraordinarily bad decision. more

China’s Pursuit of Public International Cybersecurity Law Leadership

There are relatively few venues today for the development of public international cybersecurity law among Nation States. One was the United Nations Group of Governmental Experts (UNGGE) at which the U.S. several months ago announced its de facto withdrawal with some concern expressed. A much older, well-established venue is newly assuming considerable significance - the Expert Group on the International Telecommunication Regulations (EG-ITRs). more

The Net Neutrality Reversal Order: Why the FCC Will Prevail

It is now out -- all 539 pages entitled "Declaratory Ruling, Report and Order, and Order" (Reversal Order). As someone who has dealt with this subject matter at a working level over the past 40+ years, it seems clear that the FCC will readily prevail here and the protagonists need to move on. (Admittedly that is wishful thinking given the appellate revenue to be made and press blather opportunities.) The document from a Federal Administrative Law perspective is very thorough and well-crafted. more

The Digital Geneva Convention Exists: Just Use It

It is one of those surreal, ironic moments in time. This coming week, an event called the Internet Governance Forum (IGF) 2017 will be held at Geneva in the old League of Nations headquarters now known as the Palais des Nations. On its agenda is a workshop to discuss "A Digital Geneva Convention to protect cyberspace." If the IGF participants, as they enter the Palais grounds, simply look in the opposite direction south across the Place des Nations, they would see 100 meters away, a glass cube building provided by the Republic and Canton of Geneva. more

Innovation Today is IN the Network

The largest and most important global information infrastructure today by any measure is clearly the global mobile network and all of its gateways, services, and connected devices. That network is standardized, managed, and energized by a combination of the 3GPP and GSMA. The level of 3GPP industry involvement and collaboration today probably exceeds all other telecom, internet, and assorted other bodies put together... and then some. more

Internet Religious Wars: Net Neutrality Episode

Turning network technical protocols into religion seems like an inherently bad idea -- transient and unstable at best. However, it happens. More than 40 years ago, the world of legacy telecommunications and network design formalism started the tendency with OSI (Open Systems Interconnection) and ISDN (Integrated Services Digital Networks). A few years later, the academic research community did it with their myriad host-to-host datagram protocols -- eventually calling one "the Internet." more

The FCC is Taking the Right Step

Today's announcement from the Commission that it intends to roll back the exercise of Title II utility-style regulation over "any person engaged in the provision of broadband internet access service" at its 14 December meeting is the right step. As a veteran of 40 years of internet related regulatory wars in the FCC and numerous other venues, the Commission's decision and the actual Rules promulgated in the February 2015 Report & Order stand among the most ill-considered application of authority and regulatory gerrymandering ever witnessed. more

Weaponizing the Internet Using the “End-to-end Principle” Myth

At the outset of the Internet Engineering Task Force (IETF) 100th meeting, a decidedly non-technical initial "Guide for human rights protocol considerations" was just published. Although the IETF has always remained true to its DARPA origins as a tool for developing disruptive new technical ideas, it launches into bizarre territory when dealing with non-technical matters. more

The FCC Robocall Proceeding: International Insularity

In March of this year, the Federal Communications Commission (FCC) adopted an initial Notice of Inquiry (CG No. 17-59) to mitigate robocalls. In July, it adopted a Second Notice. Mitigating spoofed telephone calls is a global problem which every country in the world has been addressing as part of a global ecosystem for many years in intergovernmental and industry bodies, in academic R&D and patent filings, and industry products with ongoing activity continuing today. more

Legal Controls on Extreme End-to-End Encryption (ee2ee)

One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more

Celebrating 167 Years of Public International Law for Cyber Security

On 30 September 1850 at Dresden, the first international treaty was issued among the first sovereign nations to internet their national electronic communication networks. It was known as the Dresden Convention, and culminated several weeks hammering out basic requirements and techniques to implement an internet spanning the Austro-German European continent at the time, and established a continuing "Union" of signatories to evolve the provisions of the treaty. more

Kelly’s Case Updated: A Need for Further DNS Registrar Industry (Self-)Regulation

After ten hectic days, the young Clemson civil engineer turned MBA entrepreneur -- who turned a passion for helping equestrians care for their horses into a website enterprise -- had the HorseDVM.com domain, and its IPR returned to HorseDVM LLC. Ultimately, however, it was the registrant who realized the registrar had wrongfully sold him the domain and the unfairness of what had occurred, who facilitated the return. The culpable registrar ultimately did nothing but unfailingly support its auction subsidiary's sale... more

A Case for Further DNS Registrar Industry Self-Regulation

In most industries, businesses that blatantly act against the interests of their customers to favor their own internal profit centers would either not be allowed or else subject to controls and oversight by the government. It is universally regarded as an unfair and deceptive business practice. In the domain name registrar business, however, the normal practices of legitimate business dealings and customer protection seem woefully wanting. Kelly's Case described here illustrates the point... more

Use STIX to Block Robocalls

It is one of those oddities that occurs around Washington from time to time. During the same hour today, the Federal Communications Commission (FCC) was meeting at its downtown headquarters trying to stop robocalls, while a large gathering of government and industry cybersecurity experts were meeting a few miles away at Johns Hopkins Applied Physics Lab advancing the principal means for threat information sharing known as STIX. more

The Internet as Weapon

One of the most striking and enduring dichotomies in the conceptualization of electronic communication networks is summed up in the phrase "the Internet as weapon." With each passing day, it seems that the strident divergence plays in the press -- the latest being Tim's lament about his "web" vision being somehow perverted. The irony is that the three challenges he identified would have been better met if he had instead pursued a career at the Little Theatre of Geneva and let SGML proceed to be implemented on OSI internets rather than refactoring it as HTML to run on DARPA internets. more

Blockchain of Things Goes Global at ITU-T Dubai Meeting

Today, one of the world's largest Internet companies, Alibaba, together with a compelling array of other providers, vendors, and government bodies for the first time called for a visionary multilateral technical and operational "framework for a Blockchain of Things." The exceptionally thorough and comprehensive 23-page document, SG20-C.008, was submitted into the upcoming ITU-T SG20 Internet of Things (IoT) Study Group meeting at Dubai, 13j23 March -- the first group gathering in the organization's new 2017-2020 study period. more

Swiss Sanctuary for “International Organization Refugees”

Over the past year as the impending doom of a potential Trump installation in the U.S. WhiteHouse pervaded the international organization community, my former chief-of-staff at the ITU found consolation in Swiss history. Now retired with his wife formerly with the World Health Organization in the mountains near the tranquil Canton Vaud municipality of Château-d'Oex, he pointed his old friends to its heritage site. more

Nuking Silicon Valley

The new head of the U.S. Executive Branch took several actions this week that have profound collateral consequences for Silicon Valley as well as its scientific and technical communities. Presumably, he thought it was payback time for not supporting him. Perhaps he thought that producing automobiles domestically for non-Muslim U.S. citizens to drive around a walled nation is the way to future economic success. No matter, the effects of actions taken this week are the equivalent of nuking Silicon Valley. more

The International Telecommunication Union and the Trump Administration

The question is not uncommon these days for someone who has been the principal historian on the ITU over the past 40 years. The short answer is that the institution should do just fine. Indeed, the appearance of bizarre phenomena like Trump, enhance the value and trustworthiness of a stable, globally inclusive intergovernmental venue dealing with matters that by their nature require worldwide cooperation and is buttressed by one of the most highly regarded Secretary-Generals in its history. more

FAKE45: Trump Administration Illegitimacy Under International Law

The FAKE45 sign in the photo lower right corner appearing on the front page of today's Washington Post -- ironically in front of the Department of Justice headquarters -- captures a result of yesterday's events that may have far-reaching consequences. About 4.5 million people -- including a million in Washington DC alone -- spontaneously came together from every corner of the nation and world to question the legitimacy of a Trump Administration, express disdain for its actions, and assert the repugnancy of its positions. I was there. more

Will Harding’s Mistakes in International Telecommunication Cooperation be Repeated?

The International Telecommunication Union recently began a well-deserved celebration of one of the real success stories in international cooperation -- the 110th anniversary of the Radio Regulations as a treaty instrument. An ITU publication describes the historical highlights. Global cooperation among governments in managing radio spectrum via the Radio Regulations has been generally regarded as essential from the outset in the early years of the 20th Century and remains so today. more

The Internet (and ICANN) After the Trump Apocalypse

Three months ago, I pondered the question Would the Internet Survive a Trump Apocalypse? As improbable as that outcome was in August, enough of the American electorate has "pulled the pin" to bring it on. It is a brave new world -- distinctly darker and more uncertain. At the moment, the Trump team is trying to figure out how to manifest their vacuous invectives masquerading as policy. The world is watching, and Washington looks like the scene in Ghostbusters where the containment grid has just been turned off, and the demonic ghosts are rising from the underbelly of K-Street. The result here is a Washington lobbying dream -- a result rather different than that promised to naïve Trump devotees. more

ITU’s Wise WTSA DOA Decision

The venerable old International Telecommunication Union (ITU) tradition finished up yesterday. Indeed, very late yesterday. The 568 representatives from 92 National Administrations met in a Tunisian town on the Mediterranean to make some key decisions about intergovernmental standards meetings for the next four years -- a body known as the WTSA (World Telecommunications Standardization Assembly). In the end, they avoided what could have been a dreadful mistake and emerged a better organization. more

Selling DONA Snake Oil at the ITU

A venerable old ITU tradition got underway today. Its Telecommunication Standardization body, known as the ITU-T, gathered, as it has done every four years for much of the past 100 years in a conclave of nations, to contemplate what they should be doing at their Geneva intergovernmental standards meetings for the next four years. The gathering is called the WTSA... Old intergovernmental institutional habits still continue, so the participants are gathered in a remote location in Tunisia called Hammamet. more

A Journey Into the Surreal: The GOP Protecting “Internet Freedom” With 25 Friends

Few people would suggest that much of the life in the U.S. national political scene these days has any nexus to the real world. At national election time, the disconnect and hyperbole in Washington get worse. "Unhinged" seems to be a common term. The recently released GOP platform on "protecting internet freedom" followed up by the "twenty-five advocacy groups" letter to Congressional leaders is definitely an unhinged a journey into the land of the clueless. more

Would the Internet Survive a Trump Apocalypse?

Presidential nominee Donald J. Trump and his supporters are pursuing platforms to create an altered America in a different world that is profoundly different in almost every respect from what has existed until now -- it is a new world best described as the Trump Apocalypse. Would the Internet as we have known it continue to exist? The short answer is probably not. Here is why. more

How the Clinton “Village” Transformed Internet Paradigms: Together Making a Difference

U.S. Presidential elections and the resulting Administrations can make an enormous difference on many levels and become profound points of inflection. This reality is certainly starkly visible today. Perhaps for the Internet community as well as the general public, some of the largely unknown events and actions surrounding the Internet and the Clinton team from 25 years ago can provide a basis for engagement over the coming months. more

Can Trump’s Twitter Account be Deleted Under the New EU Hate Speech Code?

On 31 May 2016, The Commission together with Facebook, Twitter, YouTube and Microsoft unveiled a code of conduct that includes a series of commitments to combat the spread of illegal hate speech online in Europe. These IT Companies support the European Commission and EU Member States in the effort to respond to the challenge of ensuring that online platforms do not offer opportunities for illegal online hate speech to spread virally. more

IETF’s Descent Into the Political Rabbit Hole

The Internet Engineering Task Force (IETF) has a curious, non-linear history as a "non-organization" of technical innovators now approaching 47 years. As it approaches a landmark 100th official meeting, it has become embroiled in a controversy that takes it further down the political rabbit hole it has been deepening in recent years. The IETF is considering cancelling its 100th meeting now scheduled in Singapore in November 2017... because "concerns were raised about anti-LGBT laws." more

ITU-T - Still Living in 1924

Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more

Celebrating the ITU’s Anniversary with “Abandonment”

The ITU is attempting to puff up some vestige of a value proposition this year by celebrating what its PR material purports to be the 150th anniversary. In reality, it has actually only existed as the ITU since 1934, and the pieces prior to that point stretch back 165 years to 1850. It was at that point that nations operating electric telegraph systems met at the first international meeting in Dresden to cobble together all the basic intergovernmental provisions that still exist today... more

The ITU Plenipotentiary: Member States Decrease Financial Contributions

The ongoing ITU Plenipotentiary Conference wraps up at the end of the week. The more than 2000 people present in Busan Korea from 171 countries -- overwhelmingly government bureaucrats -- have been busily polishing nearly a hundred resolutions on everything that ails them. The good news is that some sanity seems to have prevailed and most of the really extreme provisions apparently disappeared during the ensuing dialogue. One of the reasons for the change of heart is the realization that the ITU emperor's budget for clothes is disappearing. more

The ITU Busan Plenipotentiary

The ongoing ITU Plenipotentiary Conference in Busan South Korea is the quadrennial gathering where its Nation State Members gather to elect new leadership of its four permanent secretariats and populate a few other of its assorted bodies. The next two weeks are spent in endless sessions where several regional blocs of Members still enamored with pre-liberalization telecom models complain about the new world of telecommunications that they did not invent -- while engaging in copious use of their new smart phones and online services. more

The East Asia Telecommunication Union

That's what Europeans are now calling the venerable old International Telecommunication Union -- EATU for short. In fact, based on current metrics, this transformation is exactly what has occurred. The shift began occurring almost a decade ago, and has dramatically accelerated in recent years. At the ITU-T's key Study Group 17 meeting on security now underway, fully 90% of the input contributions and more than half of those participating are from only three countries -- China, Japan, and Korea. Indeed, there has long been a semi-formal organization known as CJK that has been manifested here. more

Return of the WCIT

The title looks like a horror show advertisement; or, maybe a recurrent plague. It is actually a combination of both, and last inflicted itself on the world two years ago in Dubai. It could be visiting us again in the years to come... The World Conference on International Telecommunications (WCIT) and formerly known as Administrative Conferences have been around for the past 150 years. There have been 31 of them held under the aegis of a U.N. agency known as the International Telecommunication Union (ITU) and its precursors. more

Saving the ITU-T in Three Steps

In yet another committee meeting among the many over the past thirty years, the ITU-T is holding a Review Committee session in Geneva in two weeks in an attempt to save the organization. There aren't many people left these days interested in these noble efforts - largely from the only two remaining entities who participate significantly - Korea's government ETRI institute, and entities clustered around China's MIIT ministry. As someone who has participated in and written about the organization over the past forty years in many different capacities, I have some suggestions - in the spirit of recognizing that there is still something worth saving. more

A Hospice Strategy for the ITU-T

After the Dubai World Conference on International Telecommunications (WCIT) debacle last year, the exit of almost everyone out of the ITU-T was accelerated. The ongoing meeting of its former "crown jewel" Study Group 13 that claims to be the global coordinator of all things Internet, Cloud Computing, SDN, IoT, and Future Networks, attracted only 80 people - mostly from three countries plus the host. Only a single person from the Americas attended. more

Minding the Gap at the ITU-T

In 1992, Theo Irmer who had served as the organization's director for the previous eight years during its glory days, wrote that if there was any hope of saving what was left of the body, it must be privatised. That never occurred. Everyone pretty much left and migrated to dozens of other venues where all the world's information and communication technology standards have long been created and evolved. Essentially every major nation moved to competitive, private, marketplace-driven provisioning of communication products and services. more

ITU Staff Gone Wild

In virtually all governmental legislative bodies, the staff is there to provide secretariat services for the government representatives. The staff role does not include telling the representatives what decisions they should be making. The stricture is supposed to be the same at the International Telecommunication Union (ITU) for its treaty making activities. It is with some amazement that last week, the ITU secretariat staff showed up at a seminar in Bangkok they helped schedule... more

Russia Restricts U.S. Fiscal Sovereignty Using an ITU Treaty?

It seems outlandish. However, as incredible as it may seem - especially in these times of sequestration and dire Federal budget cuts - the U.S. has potentially fallen prey to a ploy hatched by Russia and allies artfully carried out at a 2010 ITU treaty conference to relinquish the nation's sovereign right to choose its own ITU membership contributions. Here is how it happened and what can be done about it. more

The Continuing ITU Meltdown

It is rather like watching the episodes in the new season of a soap opera. When we last left the ITU at its WCIT treaty conference in Dubai in December, fifty-five nations got up and left, refusing to sign a profoundly broken scheme to regulate anything and everything related to telecommunications, information systems, and the Internet. Eighty-nine nations signed - notably Russia, China, Korea, and most of the Middle East and African countries. This G55 versus G89 split fundamentally fractured the legal basis of the ITU and the role of its standards making body. more

After Saying No in Dubai: What Next

What occurred in Dubai on 14 December was unprecedented in the history of the ITU. It was unprecedented in the history of international telecommunication law. Most of the major nations of the telecommunication world rejected a profoundly broken treaty instrument that had no reason to even exist. A large number of "minor" networking nations accepted the obligations of the treaty instrument, although almost all of them entered significant reservations. In the long history of telecommunication law and intergovernmental organizations since 1850, this has never occurred. more

Saying No to the ITRs

The afternoon of 13 December in Dubai is notable for one important deadline -- "declaration" if a Nation State is willing to accept the obligations of the resulting treaty instrument and if so, subject to what conditions. It is worth emphasizing that multilateral treaty instruments are serious constraints on a Sovereign's powers, and most nations even if they do sign, make general declarations that provide escape routes to the obligations. more

The Dubai Debacle: Does It Matter?

The second phase of the Dubai Debacle is now well underway. The first of the ITU-T bodies, the World Telecommunication Standardization Assembly (WTSA) finished its ten day meeting. The second body, the World Conference on International Communication (WCIT) completed its second day. WTSA shapes the ITU T organization and detailed agenda, while the WCIT gives it a treaty-based construct with regulatory mandates. WTSAs occur every four years; WCITs every twenty-five - although there is a proposal to hold them more frequently. more

The Only Winning Game at the WCIT

With Russia flipping its far reaching Internet takeover proposals into the WCIT pile this morning, it became apparent to WCITeers heading to Dubai in a couple of weeks that the entire show was on a fast trajectory into the wild blue yonder. Indeed, the event may provide an opportunity for Hollywood to film a sequel to One Flew Over the Cuckoo's Nest. Unfortunately, the Russian proposals are only one of many wake-up indicators that this event may not be the exercise in rational, intelligent discourse that some in the preparatory process apparently believed. more

The Great ITU Internet Heist

There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years. more

A Short History of ITU Network Security Activity

Since the inception of ITU precursors in 1850, its various bodies have treated the subject of telecommunication network security as both an obligation of signatories to the treaty instruments as well as an ongoing collaborative activity. However, what it actually did in those activities was constrained by its jurisdiction and participant competency -- which encompassed international public telecommunication services provided primarily by designated government agency service providers known as PTTs. more

Metrics of Major Standards Bodies

In a recent CircleID posting related to the ITU-T, the demise of that body over the years and the underlying causes were described. Among other questions, it raises the question of where has the industry technical collaborative activity gone. The short answer is just about everywhere else. This was exemplified by a recently compiled spreadsheet of some 200 different cloud forums prepared by the ITU-T's own cloud coordination group. more

Privatizing the ITU-T: Back to the Future

The awkwardly named International Telecommunication Union Telecommunication Standardization Sector (ITU-T) by any measure is a highly unusual body. It is the only global intergovernmental organization where Nation States produce detailed technical standards for telecommunications. Even more amazing is that it produces these standards for a field that is so dynamic and globally competitive as telecommunications. What is not well known is that the ITU-T was once a private standards body... more