Anthony Rutkowski

Anthony Rutkowski

Principal, Netmagic Associates LLC
Joined on August 15, 2012
Total Post Views: 1,488,570

About

Tony Rutkowski is an engineer-lawyer with an extremely diverse, sixty-year professional career spanning the telecommunication, mobile, internet, satellite, and broadcasting fields in the U.S. and Europe where he has shaped major technical and legal developments in senior governmental, company, and academic leadership positions at international, national, and local levels.  Over the past two decades, his roles have been focused on significant international and U.S. Federal network security initiatives relating to cybersecurity, infrastructure protection, extraterritorial security law, and lawful interception for new networks and services.
Currently, as the CEO of Netmagic Associates LLC, he provides technical and regulatory analytical and consulting services to the Center for Internet Security.  He engages actively in a broad array of governmental and industry security forums – largely internationally.  Over the past several years, he has assumed rapporteur responsibilities in the ETSI Cyber Security Technical Committee for a many major specifications and reports and served as an ENISA consultant. 

Except where otherwise noted, all postings by Anthony Rutkowski on CircleID are licensed under a Creative Commons License.

Comments

2024 - Mar 05 on Digital Sovereignty and Internet Standards
2023 - Sep 14 on The Standards Paywalls Fall: Everyone Benefits
2023 - May 27 on NIST as a Cyber Threat Actor
2022 - May 24 on Monumental Cybersecurity Blunders
2022 - May 20 on NIS2: A New Cyber Jurisdiction Paradigm
2022 - Mar 07 on How Not to Take Russia Off the Internet
2022 - Mar 07 on ICANN, RIPE, and ISP War Crime Complicity Exposure
2022 - Mar 07 on Why Over Compliance With Sanctions at Internet Infrastructure Level Can Have Devastating Effects on Ordinary People
2022 - Mar 07 on How Not to Take Russia Off the Internet
2021 - Nov 20 on Notes from NANOG 83
2021 - Sep 28 on Senator Cotton: Extraordinary Expansion of Huawei Cloud
2021 - Aug 08 on The ITU Strategic Plan: Time to Terminate
2021 - Aug 08 on The ITU Strategic Plan: Time to Terminate
2021 - May 11 on Facebook's "Supreme Court" Has Implications for International Law
2020 - Oct 02 on A New Chinese Broadband Satellite Constellation
2020 - Aug 26 on The TikTok Ban in Context
2020 - Aug 11 on Holding Trump Accountable Under Public International Law
2020 - Jul 30 on Addressing Anticompetitive Behavior in Internet Standards Bodies
2020 - Jul 30 on Addressing Anticompetitive Behavior in Internet Standards Bodies
2020 - Jul 23 on Senate Report on 5G: Recipe for Disaster
2020 - May 22 on China Will Remember the U.S. Huawei War for a Generation
2020 - May 12 on The Internet Turbocharged Globalization
2020 - May 09 on The Evolution of 5G
2020 - Apr 30 on ICANN and Attorneys General: Ends, Means and Unintended Ends
2020 - Apr 28 on ICANN Independence and Non-Profits on the Net – Get it Right and Go Forward
2020 - Apr 28 on Reflections on the .ORG Domain Registry Sale
2020 - Apr 28 on ICANN and Attorneys General: Ends, Means and Unintended Ends
2020 - Apr 27 on ICANN and Attorneys General: Ends, Means and Unintended Ends
2020 - Apr 22 on A Short History of Internet Protocol Intellectual Property
2020 - Apr 05 on Dear U.S.A. – Observations on the Cyber Solarium Commission Report
2020 - Mar 31 on Dear U.S.A. – Observations on the Cyber Solarium Commission Report
2020 - Mar 13 on Why Are Internet Security Standards Badly Deployed and What to Do About It?
2020 - Mar 12 on Why Are Internet Security Standards Badly Deployed and What to Do About It?
2020 - Feb 20 on Truth in Web Digital Identity?
2020 - Feb 17 on Truth in Web Digital Identity?
2020 - Feb 10 on Truth in Web Digital Identity?
2019 - Oct 22 on Let's Have an Honest Conversation About Huawei
2019 - Aug 07 on Not So Private Thoughts at IETF 105
2019 - Jul 01 on Trump's Assault on 5G Standards Bodies
2019 - May 26 on 5G Security Transparency
2019 - May 25 on Trump Orders Cyberattacks by US Companies
2019 - May 25 on Making Voting Easy is Scaring the Life Out of Security Experts
2019 - Feb 26 on Researchers Demonstrate Serious Privacy Attacks on 4G and 5G Protocols
2019 - Feb 18 on Banning 5G Equipment is a Foolish Strategy
2019 - Feb 17 on Banning 5G Equipment is a Foolish Strategy
2019 - Feb 16 on Banning 5G Equipment is a Foolish Strategy
2019 - Feb 11 on Banning 5G Equipment is a Foolish Strategy
2019 - Jan 25 on Creating TLS: The Pioneering Role of Ruth Nelson
2018 - Nov 29 on Stop Using the Term "Open Internet"
2018 - Nov 28 on America Will Not Win the Global Race to 5G
2018 - Nov 26 on America Will Not Win the Global Race to 5G
2018 - Nov 13 on Protecting Privacy Differently
2018 - Nov 08 on Cyber Security Word Salad
2018 - Oct 31 on Over the Top Services at the ITU PP-2018: Considering the Pittsburgh Massacre
2018 - Oct 27 on Has Internet Governance Become Irrelevant?
2018 - Oct 16 on ICANN's Rocky Beginning - When Friends Were Scarce
2018 - Sep 03 on Trump's Outrageous ITU Elections Gambit
2018 - Jul 25 on The Impact of Rising Sea Level on Internet Infrastructure
2018 - Mar 08 on IETF and Crypto Zealots
2018 - Mar 06 on U.S. Complaint to WTO on China VPNs Is Itself Troubling
2018 - Mar 06 on U.S. Complaint to WTO on China VPNs Is Itself Troubling
2018 - Feb 28 on Humming an Open Internet Demise in London?
2018 - Feb 28 on Humming an Open Internet Demise in London?
2018 - Feb 26 on Humming an Open Internet Demise in London?
2018 - Feb 26 on Humming an Open Internet Demise in London?
2018 - Jan 24 on Extraterritoriality
2018 - Jan 24 on Extraterritoriality
2018 - Jan 23 on Extraterritoriality
2018 - Jan 23 on Montana Becomes First State to Require ISPs to Abide by Net Neutrality Principles Despite FCC Repeal
2018 - Jan 16 on The Meeting That Changed the DARPA Datagram Internet
2018 - Jan 16 on The Meeting That Changed the DARPA Datagram Internet
2018 - Jan 14 on A Tipping Point for the Internet: 10 Predictions for 2018
2018 - Jan 09 on Internet Governance Outlook 2018: Preparing for Cyberwar or Promoting Cyber Détente?
2018 - Jan 07 on Internet Governance Outlook 2018: Preparing for Cyberwar or Promoting Cyber Détente?
2017 - Dec 20 on A Closer Look at Why Russia Wants an Independent Internet
2017 - Dec 20 on The Digital Geneva Convention Exists: Just Use It
2017 - Dec 19 on The Digital Geneva Convention Exists: Just Use It
2017 - Dec 15 on A Closer Look at Why Russia Wants an Independent Internet
2017 - Dec 12 on FCC Doesn't Understand How the Internet Works, Say Internet Pioneers in Open Letter
2017 - Dec 05 on Voluntary Reporting of Cybersecurity Incidents
2017 - Nov 30 on New gTLDs and Concept of a Universal Directory
2017 - Nov 29 on New gTLDs and Concept of a Universal Directory
2017 - Nov 23 on Transparency: The Internet's Only Currency
2017 - Nov 21 on Berners-Lee Talks Net Neutrality in Washington, "ISPs Should be Treated More Like Utilities"
2017 - Nov 14 on Google Now a Target for Regulation
2017 - Nov 13 on Google Now a Target for Regulation
2017 - Nov 13 on Weaponizing the Internet Using the "End-to-end Principle" Myth
2017 - Nov 13 on Weaponizing the Internet Using the "End-to-end Principle" Myth
2017 - Nov 13 on Weaponizing the Internet Using the "End-to-end Principle" Myth
2017 - Nov 13 on Weaponizing the Internet Using the "End-to-end Principle" Myth
2017 - Nov 13 on Weaponizing the Internet Using the "End-to-end Principle" Myth
2017 - Nov 06 on Enabling Privacy Is Not Harmful
2017 - Nov 04 on Enabling Privacy Is Not Harmful
2017 - Oct 31 on The FCC Robocall Proceeding: International Insularity
2017 - Oct 30 on Net Neutrality 101: Why 'Title II' Doesn't Apply to Internet Transmissions
2017 - Oct 25 on Legal Controls on Extreme End-to-End Encryption (ee2ee)
2017 - Oct 25 on Legal Controls on Extreme End-to-End Encryption (ee2ee)
2017 - Oct 24 on Legal Controls on Extreme End-to-End Encryption (ee2ee)
2017 - Oct 24 on Legal Controls on Extreme End-to-End Encryption (ee2ee)
2017 - Oct 11 on Celebrating 167 Years of Public International Law for Cyber Security
2017 - May 11 on Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption
2017 - May 11 on Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption
2017 - May 10 on Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption
2017 - May 10 on Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption
2017 - May 10 on Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption
2017 - May 09 on Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption
2017 - May 09 on Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption
2017 - Apr 18 on While Cyberspace Is Entering an Era of Warring States, There Remains a Chance to Make a Difference
2017 - Apr 13 on Mend, Don't End, the IETF
2017 - Apr 13 on The IETF's Job Is Complete - Should It Now Scale Up, Down or Out?
2017 - Apr 11 on U.S. Expresses Concerns Over China's Internet Regulatory Regime, In New Report
2017 - Apr 08 on Encryption and Securing Our Digital Economy
2017 - Apr 07 on New Products, Old Regulations: The Example of HTS
2017 - Apr 04 on Blockchain of Things Goes Global at ITU-T Dubai Meeting
2017 - Mar 28 on A Case for Further DNS Registrar Industry Self-Regulation
2017 - Mar 27 on A Case for Further DNS Registrar Industry Self-Regulation
2017 - Mar 27 on A Case for Further DNS Registrar Industry Self-Regulation
2017 - Mar 27 on A Case for Further DNS Registrar Industry Self-Regulation
2017 - Mar 27 on A Case for Further DNS Registrar Industry Self-Regulation
2017 - Mar 08 on Digital Geneva Convention: Multilateral Treaty, Multistakeholder Implementation
2017 - Mar 08 on Three Layers of China's International Strategy on Cyberspace
2017 - Mar 07 on Digital Geneva Convention: Multilateral Treaty, Multistakeholder Implementation
2017 - Feb 24 on CFR Report: Reversing IANA Transition by Trump Administration Would Be a Grave Mistake
2017 - Jan 31 on Trump, Tides, and the US Tech Sector
2017 - Jan 31 on Must IETF, ICANN Stop Meeting in the U.S.?
2017 - Jan 26 on The International Telecommunication Union and the Trump Administration
2017 - Jan 25 on China Sets Up $14.6 Billion Internet Investment Fund
2017 - Jan 25 on An Ethnographic Study - What are Cubans Doing Online?
2017 - Jan 23 on Help Us Answer: What Will the Internet Look Like in 10 Years?
2017 - Jan 23 on China Sets Up $14.6 Billion Internet Investment Fund
2016 - Nov 16 on How Bubbles Decide Elections
2016 - Nov 14 on The FCC Under Trump - A Long Shot
2016 - Nov 07 on ITU's Wise WTSA DOA Decision
2016 - Nov 01 on Selling DONA Snake Oil at the ITU
2016 - Oct 31 on Selling DONA Snake Oil at the ITU
2016 - Oct 27 on Selling DONA Snake Oil at the ITU
2016 - Oct 27 on Selling DONA Snake Oil at the ITU
2016 - Oct 26 on Selling DONA Snake Oil at the ITU
2016 - Oct 26 on Selling DONA Snake Oil at the ITU
2016 - Aug 15 on ICANN the Machine...
2016 - Aug 15 on A Journey Into the Surreal: The GOP Protecting "Internet Freedom" With 25 Friends
2016 - Aug 04 on How the Clinton "Village" Transformed Internet Paradigms: Together Making a Difference
2016 - Jun 12 on Can Trump's Twitter Account be Deleted Under the New EU Hate Speech Code?
2016 - Jun 02 on IETF's Descent Into the Political Rabbit Hole
2016 - May 28 on IETF's Descent Into the Political Rabbit Hole
2016 - May 28 on IETF's Descent Into the Political Rabbit Hole
2016 - May 28 on IETF's Descent Into the Political Rabbit Hole
2016 - May 28 on IETF's Descent Into the Political Rabbit Hole
2016 - May 27 on IETF's Descent Into the Political Rabbit Hole
2016 - May 27 on IETF's Descent Into the Political Rabbit Hole
2016 - May 27 on IETF's Descent Into the Political Rabbit Hole
2016 - May 27 on IETF's Descent Into the Political Rabbit Hole
2016 - May 27 on IETF's Descent Into the Political Rabbit Hole
2016 - May 27 on IETF's Descent Into the Political Rabbit Hole
2016 - May 26 on IETF's Descent Into the Political Rabbit Hole
2016 - May 26 on IETF's Descent Into the Political Rabbit Hole
2016 - Mar 15 on Head of UK Intelligence Agency Says Tech Companies Should Provide a Way Around Encryption
2015 - May 14 on Celebrating the ITU's Anniversary with "Abandonment"
2013 - Nov 12 on We Have a Paradigm for Surveillance That's Broken, Fit Only for the Analogue Past
2013 - Nov 07 on IETF Looking at Technical Changes to Raise the Bar for Monitoring
2013 - Nov 07 on Google DNS to Be Discontinued in Brazil Ahead of New Law
2013 - Oct 16 on Core Internet Institutions Abandon the US Government
2013 - Oct 01 on 23 Countries Ahead of U.S. in Internet Usage According to ITU Broadband Report
2013 - Jul 23 on The Importance of Contributing to the ITU CWG-Internet Open Consultation by 1 August 2013
2013 - Jul 23 on The Importance of Contributing to the ITU CWG-Internet Open Consultation by 1 August 2013
2013 - Jul 22 on The Importance of Contributing to the ITU CWG-Internet Open Consultation by 1 August 2013
2012 - Dec 28 on Calling Stumps at WCIT: Win, Lose or Draw?
2012 - Dec 23 on WCIT-12 Disappoints, More Work to Be Done
2012 - Dec 18 on WCIT-12 Disappoints, More Work to Be Done
2012 - Dec 17 on WCIT-12 Disappoints, More Work to Be Done
2012 - Dec 17 on WCIT-12 Disappoints, More Work to Be Done
2012 - Dec 04 on WCIT Off to a Flying Start
2012 - Dec 04 on WCIT Off to a Flying Start
2012 - Dec 04 on WCIT Off to a Flying Start
2012 - Dec 04 on WCIT Off to a Flying Start
2012 - Nov 21 on The Only Winning Game at the WCIT
2012 - Nov 18 on The Only Winning Game at the WCIT
2012 - Oct 30 on The Great ITU Internet Heist
2012 - Oct 26 on The London Process Arrived in Budapest: Another Travel Circus for the Internet Community?
2012 - Oct 01 on Is the WCIT Indeed Wicked?
2012 - Sep 28 on What to Say About the Treaty on the ITRs: Crib Notes
2012 - Sep 26 on RIPE NCC is Reaching the Last /8 of IPv4
2012 - Aug 31 on Metrics of Major Standards Bodies
2012 - Aug 21 on Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?
2012 - Aug 18 on Privatizing the ITU-T: Back to the Future

Topic Interests

Access ProvidersPolicy & RegulationInternet GovernanceNet NeutralityLawTelecomCybersecurityNetworksICANNPrivacyInternet of ThingsBlockchainCyberattackThreat IntelligenceDomain NamesRegistry ServicesData CenterWirelessCybercrimeInternet ProtocolMobile InternetSpamWebBroadbandCoronavirusDNSCloud ComputingArtificial IntelligenceNew TLDsRegional RegistriesIPv6 Transition IPv4 MarketsCensorshipDNS Security

Recent Blogs

The FCC Cyber Trust Label Gambit: Part II

A Landmark Standards Human Rights Judgment

The IoT Cyber Seal Fog

The FCC Cyber Trust Label Gambit

The Standards Paywalls Fall: Everyone Benefits

Popular Posts

Humming an Open Internet Demise in London?

NIS2: A New Cyber Jurisdiction Paradigm

Legal Controls on Extreme End-to-End Encryption (ee2ee)

Understanding 5G: A Basic Primer

NIST as a Cyber Threat Actor