Russia’s Unconventional Election IT Strategy

It turns out my post on the digital campaign tools of the two major presidential candidates was a bit incomplete because it didn’t address outsourcing to foreign powers. The tech…

July 28, 2016 1

Apple, FBI Talks Need Engineers

Electrical Engineering Times makes a sage, if somewhat obvious observation about the FBI/Apple dispute about unlocking the iPhone 5s used by dead terrorist Syed Farook: The dispute between Apple and…

February 26, 2016 0

Bennett on cybersecurity: ‘We want networks to compensate for errors in judgment’

[powerpress] In the latest High Tech Forum podcast, Richard Bennett sat down with Shane Tews, chief policy officer at 463 Communications, a firm that advises high-tech organizations on Internet policy….

October 20, 2015 0

New Airline Navigation System Easy Target for Terrorists

When it comes to cyber-security, the most common cause of failure is “security as an afterthought.”  When the security failure affects personal computers and corporate networks, the cost ranges from minor annoyance to…

September 28, 2011 3

The Big Debate on DNS Filtering and DNSSEC

Earlier this week, I participated on a panel debating the use of Domain Name System (DNS) filtering and the Protect Intellectual Property (IP) Act at the third Internet Governance Forum-USA.  Video…

July 21, 2011 10

Complexity of Updating Android Exacerbates Security Problems

I bought a new HTC Nexus One last week, which unfortunately came with a custom ROM (Android Kernel Version: 2.16.405.1 CL223106 release-keys).  Unfortunately, this particular firmware prohibits any “Over The Air” (OTA)…

July 6, 2011 1

DNS Filtering is Essential to the Internet

Executive Summary A group of Internet Engineers sent a letter to the US Senate opposing the DNS filtering aspect of the Protect IP Act on technical grounds.  They argued that…

June 24, 2011 15

99% of Google Android Devices Vulnerable

Google’s ClientLogin Application Programming Interface (API) has been found to be insecure by researchers from Germany’s University of Ulm.  This means that most Google Android phones leak temporary user authentication…

May 18, 2011 6

DARPA Enlists Hackers

It’s no secret that government initiatives around cybersecurity haven’t lived up to expectations. While they succeed in creating controversy – such as the recent hubbub over the so-called “Internet Kill…

February 8, 2011 3

Saving the Internet from its Friends

I’m going to Australia in April to give a keynote on the innovation potential of Next Generation Networks for the Australian Telecom Users Group. As you probably know, Australia has…

January 31, 2011 2