Cyber Security

And Now the Second Battle of the Internet

Cyber Security
The Verizon or PRISM or Snowden affair marks a turning point in the history -- a very young history -- of the Internet and its governance within the international law landscape. With the facts as overwhelming as they are frightening, they show above all the mighty power of the United States over the Internet and its users. This issue not only concerns the information of American citizens, but also all 'foreigners' who have a Google account and other Internet industry heavyweights. We are talking about the very core of Internet governance currently under American domination.   The rules in question, such as respect of personal information, net neutrality or digital public policies whether national, regional or international, are at the heart of an ongoing 15-year battle. During t...

Edward Snowden: the whistleblower behind the NSA surveillance revelations

Cyber Security, Governance
The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. More

Kenya: CCK Secures Cyberspace for Progressive Development

Cyber Security
The combination of telecommunication and information systems has come into one product, ICTs that dictates the direction of our lives. At this point in time, Kenya considers ICT as a bubble because the Jubilee government has adopted it as one of the engines of economic development. If this has to facilitate the government idea to see that ICT trickles down to all Kenyans and who use them in what has previously been referred to as a knowledge economy, then regulators for instance, the Communication Commission of Kenya (CCK) and information disseminators have a responsibility of drawing synergies from each other in order to coherence and provide the right direction for this services to be utilized by Kenyans. more
Why We Won’t Get International Cyberwarfare Standards

Why We Won’t Get International Cyberwarfare Standards

Cyber Security
ASA Risk Consultants added its voice this week to the slowly growing chorus of voices demanding a coordinated international response to cyberattacks. In a research note circulated by IDG, ASA asserts that "nations will need to come to an agreement on how cyber warfare should be handled." Nations should establish lasting peace and end world poverty, too. There's always something new for the to-do list. Don't hold your breath on any of these. Lurking in the background is a strategy issued by the White House in February on "Mitigating the Theft of U.S. Trade Secrets," which noted that "the pace of economic espionage and trade secret theft against U.S. corporations is accelerating" and announced "diplomatic engagements and meetings by senior Administration officials with governments of c...

Verisign: New gTLD Security and Stability Considerations

Cyber Security, Domains
Verisign have sent a letter to ICANN concerning New gTLD Security and Stability Considerations according to their Labs Technical Report   —The introduction of multitudes of new generic Top Level Domains (gTLDs) into the DNS (the Internet’s de facto name mapping system) will have far-reaching effects. Any party concerned with the issues of privacy, trust, confidence, or the overall security of the DNS after the addition of new gTLDs (either from the consumer or the operator perspective) is implic- itly depending on the Internet Corporation for Assigned Names and Numbers (ICANN) and the broader DNS community to appropriately address these issues before delegating any new gTLDs.   The risk of a misstep during the process of introducing new gTLDs to the global DNS could have