Anthony Rutkowski

Anthony Rutkowski

Principal, Netmagic Associates LLC
Joined on August 15, 2012 – United States
Total Post Views: 1,024,241


Tony Rutkowski is a Distinguished Senior Research Fellow at the Georgia Institute of Technology’s Center for International Strategy, Technology, and Policy (CISTP) at the Sam Nunn School of International Affairs.  As Executive Vice President for Yaana Technologies, he has served as rapporteur for cybersecurity in ITU-T since 2009 and served as the counselor for two ITU Secretaries-General between 1988 and 1992, co-authored a published ITU history, and led development and authored many regulatory provisions, laws, briefs, treaties, standards, books, and articles as an engineer-lawyer over many years in multiple positions in industry, government and academic institutions.  At one time, he did real engineering - being responsible for the communications and command & control systems as part of the Apollo Launch Teams at KSC Launch Complex 39.


A New Chinese Broadband Satellite Constellation

The TikTok Ban in Context

Holding Trump Accountable Under Public International Law

Addressing Anticompetitive Behavior in Internet Standards Bodies

Senate Report on 5G: Recipe for Disaster

China Will Remember the U.S. Huawei War for a Generation

The Internet Turbocharged Globalization

The Evolution of 5G

ICANN and Attorneys General: Ends, Means and Unintended Ends

ICANN Independence and Non-Profits on the Net – Get it Right and Go Forward

Reflections on the .ORG Domain Registry Sale

ICANN and Attorneys General: Ends, Means and Unintended Ends

A Short History of Internet Protocol Intellectual Property

Dear U.S.A. – Observations on the Cyber Solarium Commission Report

Why Are Internet Security Standards Badly Deployed and What to Do About It?

Truth in Web Digital Identity?

Let's Have an Honest Conversation About Huawei

Not So Private Thoughts at IETF 105

  • Comment posted Aug 07, 2019 2:45 pm PDT — by Anthony Rutkowski
    thanks, tony r

Trump's Assault on 5G Standards Bodies

5G Security Transparency

Trump Orders Cyberattacks by US Companies

Making Voting Easy is Scaring the Life Out of Security Experts

Researchers Demonstrate Serious Privacy Attacks on 4G and 5G Protocols

Banning 5G Equipment is a Foolish Strategy

Creating TLS: The Pioneering Role of Ruth Nelson

Stop Using the Term "Open Internet"

America Will Not Win the Global Race to 5G

Protecting Privacy Differently

Cyber Security Word Salad

Over the Top Services at the ITU PP-2018: Considering the Pittsburgh Massacre

Has Internet Governance Become Irrelevant?

ICANN's Rocky Beginning - When Friends Were Scarce

Trump's Outrageous ITU Elections Gambit

The Impact of Rising Sea Level on Internet Infrastructure

IETF and Crypto Zealots

U.S. Complaint to WTO on China VPNs Is Itself Troubling

Humming an Open Internet Demise in London?


Montana Becomes First State to Require ISPs to Abide by Net Neutrality Principles Despite FCC Repeal

The Meeting That Changed the DARPA Datagram Internet

A Tipping Point for the Internet: 10 Predictions for 2018

Internet Governance Outlook 2018: Preparing for Cyberwar or Promoting Cyber Détente?

A Closer Look at Why Russia Wants an Independent Internet

The Digital Geneva Convention Exists: Just Use It

A Closer Look at Why Russia Wants an Independent Internet

FCC Doesn't Understand How the Internet Works, Say Internet Pioneers in Open Letter

Voluntary Reporting of Cybersecurity Incidents

New gTLDs and Concept of a Universal Directory

Transparency: The Internet's Only Currency

Berners-Lee Talks Net Neutrality in Washington, "ISPs Should be Treated More Like Utilities"

Google Now a Target for Regulation

Weaponizing the Internet Using the "End-to-end Principle" Myth

Enabling Privacy Is Not Harmful

The FCC Robocall Proceeding: International Insularity

Net Neutrality 101: Why 'Title II' Doesn't Apply to Internet Transmissions

Legal Controls on Extreme End-to-End Encryption (ee2ee)

  • Comment posted Oct 25, 2017 8:15 pm PDT — by Anthony Rutkowski

Celebrating 167 Years of Public International Law for Cyber Security

Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption

While Cyberspace Is Entering an Era of Warring States, There Remains a Chance to Make a Difference

Mend, Don't End, the IETF

The IETF's Job Is Complete - Should It Now Scale Up, Down or Out?

U.S. Expresses Concerns Over China's Internet Regulatory Regime, In New Report

Encryption and Securing Our Digital Economy

New Products, Old Regulations: The Example of HTS

Blockchain of Things Goes Global at ITU-T Dubai Meeting

A Case for Further DNS Registrar Industry Self-Regulation

Digital Geneva Convention: Multilateral Treaty, Multistakeholder Implementation

Three Layers of China's International Strategy on Cyberspace

Digital Geneva Convention: Multilateral Treaty, Multistakeholder Implementation

CFR Report: Reversing IANA Transition by Trump Administration Would Be a Grave Mistake

Trump, Tides, and the US Tech Sector

Must IETF, ICANN Stop Meeting in the U.S.?

The International Telecommunication Union and the Trump Administration

China Sets Up $14.6 Billion Internet Investment Fund

An Ethnographic Study - What are Cubans Doing Online?

Help Us Answer: What Will the Internet Look Like in 10 Years?

China Sets Up $14.6 Billion Internet Investment Fund

How Bubbles Decide Elections

The FCC Under Trump - A Long Shot

ITU's Wise WTSA DOA Decision

Selling DONA Snake Oil at the ITU

ICANN the Machine...

A Journey Into the Surreal: The GOP Protecting "Internet Freedom" With 25 Friends

How the Clinton "Village" Transformed Internet Paradigms: Together Making a Difference

Can Trump's Twitter Account be Deleted Under the New EU Hate Speech Code?

IETF's Descent Into the Political Rabbit Hole

Head of UK Intelligence Agency Says Tech Companies Should Provide a Way Around Encryption

Celebrating the ITU's Anniversary with "Abandonment"

We Have a Paradigm for Surveillance That's Broken, Fit Only for the Analogue Past

IETF Looking at Technical Changes to Raise the Bar for Monitoring

Google DNS to Be Discontinued in Brazil Ahead of New Law

Brazil Pushing Plans for Local Internet Data Storage Amid U.S. Spying

Core Internet Institutions Abandon the US Government

23 Countries Ahead of U.S. in Internet Usage According to ITU Broadband Report

The Importance of Contributing to the ITU CWG-Internet Open Consultation by 1 August 2013

Calling Stumps at WCIT: Win, Lose or Draw?

WCIT-12 Disappoints, More Work to Be Done

WCIT Off to a Flying Start

The Only Winning Game at the WCIT

The Great ITU Internet Heist

The London Process Arrived in Budapest: Another Travel Circus for the Internet Community?

Is the WCIT Indeed Wicked?

What to Say About the Treaty on the ITRs: Crib Notes

RIPE NCC is Reaching the Last /8 of IPv4

Metrics of Major Standards Bodies

Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?

Privatizing the ITU-T: Back to the Future

Topic Interests

Access ProvidersPolicy & RegulationInternet GovernanceNet NeutralityLawTelecomCybersecurityNetworksICANNPrivacyInternet of ThingsBlockchainCyberattackThreat IntelligenceRegistry ServicesDomain NamesData CenterWirelessCybercrimeInternet ProtocolMobile InternetSpamWebBroadbandCoronavirusDNSCloud ComputingNew TLDsRegional RegistriesIPv6IP AddressingCensorshipDNS Security

Recent Blogs

Reality Check on the 5G Security MAGAverse

One More Trump 5G Minefield

Trump's Parting NTIA 5G Debacle

New Nails in the Crypto-Anarchism Containment Coffin

Remediating U.S. 5G Global Supply Chain Security Engagement

Popular Posts

Humming an Open Internet Demise in London?

Legal Controls on Extreme End-to-End Encryption (ee2ee)

Understanding 5G: A Basic Primer

The Continuing ITU Meltdown

Privatizing the ITU-T: Back to the Future