Aggregatore di feed
In November 2017, the Internet Society hosted the inaugural Indigenous Connectivity Summit in Santa Fe, New Mexico. The event brought together community network operators, Internet service providers, community members, researchers, policy makers, and Indigenous leadership. One of the participants shared her story.
Denise Williams,Coast Salish from Cowichan Tribes on Vancouver Island, began her career as an ESL teacher, with the idea that she would travel the world teaching English. A chance encounter on a bus – “I’m from a small town so I talk to whoever is in my vicinity,” says Williams – served as an entry point to work as a policy analyst for Indigenous and Northern Affairs Canada, which led to Education Technology work at the First Nations Education Steering Committee. “I learned the way that digital technologies either advance or detract from a community’s ability to nurture curiosity in their youth,” says Williams. “I came from no understanding of networks to it becoming my life’s work. I don’t know if i found it or it found me.”
In 2015, Williams took the reigns of the totally defunded First Nations Technology Council, and through strategic planning and vision, has grown the organization’s programs in talent development, connectivity, information management, and technical services. The success of FNTC’s programs isn’t just based on vision, but also on hard work and attention to detail. “Ideas like let’s go around the province and visit the whole community can seem daunting,” says Williams, “but to me it is simply the only way. We’re going to be doing speed testing. We’re going to interview. We’re going to do training. We’re going to visit all 203 nations in person.”
Participation Indigenous Connectivity Summit is key to Williams’ vision. “I really believe in creating space for people to come together and learn from each other,” Williams explains. “I recognize that in British Columbia there are maybe some specific technological, geographical, and political challenges, but I am convinced they they have been solved in other places in the world. This conference brings together people who are talking about things from the grassroots level to the highest level of implementation of change.”
“Sometimes you’re in the eye of the storm,” Williams concludes. “This is an opportunity to zoom out.”
Mark your calendar! The Indigenous Connectivity Summit 2018 takes place this October in Edmonton and Inuvik, Canada. You can also find ever-growing resources on topics including community networks, cultural preservation, and Indigenous-driven access at the Indigenous Connectivity page. Join us!
Photo ©Minesh Bacrania
The Internet Society and APNIC signed a Memorandum of Understanding (MoU) to cooperate in supporting the MANRS initiative in the Asia Pacific Region. Paul Wilson (APNIC) and Rajnesh Singh (ISOC) signed the MoU in Brisbane, Australia on 13 June 2018.
It’s an exciting moment for everyone who believes that Internet routing security issues can be resolved through collaboration, providing limitless opportunities for good. The MoU formalises the existing long-term relationship between the two organizations to have a global, open, stable and secure Internet.
The MoU focuses on capacity building to undertake initiatives and activities to promote awareness of MANRS in the Asia-Pacific region, to cooperate and render mutual assistance, and to encourage the attendance of APNIC members to meetings, seminars, workshops and/or conferences on routing security.
Both organizations have agreed to exchange research information and training materials (whether printed, audio or visual) related to routing security in general. APNIC has a proven record of delivering hands-on and online quality training and providing analytical research data.
We look forward to welcoming more MANRS members from the Asia Pacific region, and working together with APNIC to improve routing security around the world.
The post Working Together with APNIC on Routing Security and MANRS in Asia Pacific appeared first on Internet Society.
The Internet Society is raising awareness around the issues and challenges with Internet of Things (IoT) devices, and the OTA IoT Trust Framework is promoting best practices in protection of user security and privacy. The importance of this was brought home with the keynote talk at the recent TNC18 Conference, which was given by Marie Moe (SINTEF) who related her experiences with her network-connected heart pacemaker.
Marie is a security researcher (who also formerly worked for NorCERT, the Norwegian National Cybersecurity Centre) who has an implanted pacemaker to monitor and control her heart, and has used the opportunity to investigate the firmware and security issues that have had detrimental and potentially fatal consequences. Quite aside from uncovering misconfigurations that required tweaking (e.g. the maximum heartbeat setting turned out to be set too low for a younger person), and an adverse event that required a firmware upgrade, she was even more concerned to discover that little consideration had gone into the authentication and access aspects that might allow an attacker to take control of the device.
These devices allow their recipients to lead normal lives, and of course being network-connectable has many practical advantages in terms of monitoring and non-intrusive configuration and firmware updates. However, the medical companies who develop them do not necessarily consider the security implications of this type of very personal critical infrastructures, and is why initiatives such as the OTA IoT Trust Framework are important for raising awareness of the need for good security practices, whilst encouraging vendors to take user security seriously and put it at the forefront of their development processes.
This interesting and inspiring talk can be found at https://tnc18.geant.org/core/presentation/184, and we thank Marie for giving us permission to amplify the issues raised in her talk.
- IoT Security & Privacy Trust Framework v2.5
- Online Trust Alliance
- More about the Internet Society’s work at TNC18
The next couple of days will be important for the future of the Internet, as the European Parliament’s Committee on Legal Affairs (JURI) will vote on the proposed Copyright Directive. The Directive, which aims to update and reinforce the rights of rights holders within Europe’s Digital Market, is largely a positive step forward inasmuch as the law needs to be updated in light of modern technologies and the Internet. However, Article 13 of the directive raises serious questions about the implications for free expression, creativity, and the freedom to publish.
Under this article, “information society service providers” will be required to use “content recognition technologies” to scan videos, audio, text, photos, and code to the detriment of open-source software communities, remixers, livestreamers, and meme creators.
Last week, many Internet luminaries penned an open letter to the President of the European Parliament asking for the deletion of Article 13. The Internet Society agrees with the concerns raised in this letter and urges the Parliament to reconsider Article 13 in light of the implications for the open Internet.
In the meantime, civil society and academia, including EFF, EDRI, Creative Commons, and the Max Planck Institute for Innovation and Competition have all raised concerns over the potential negative impact of Article 13 on freedom of expression, the rule of law, market competition, and the Internet architecture as a whole. In their analyses, they additionally note that Article 13 is contradictory to the existing EU legislation and case law.
There are two problems with Article 13.
Firstly, Article 13 turns Internet content sharing platforms of all kinds into the “content police” obliging them to implement surveillance tools in order to carry out this function. According to cryptographer and security expert Bruce Schneier, “Aside from the harm from the provisions of Article 13, this infrastructure can be easily repurposed by government and corporations – and further entrenches ubiquitous surveillance into the fabric of the Internet.”
Secondly, while Article 13 calls for the introduction of, “measures, such as the use of effective content recognition technologies” (our italics), it could be argued that such technologies do not exist. As the Internet Society has written, content-blocking technology is often highly ineffective, overly broad, and even counterproductive. Technologies deployed today often block legal content and do not differentiate between fair use and copyright infringing activity.
We believe that all Internet-related IP discussions should be conducted under a multistakeholder framework that includes technologists and all impacted parties, and in a transparent manner, based on the Rule of Law, without undermining the global Internet architecture and permissionless innovation.
We, therefore, join all the other voices in requesting that Article 13 is removed from the Copyright Directive and we ask European users to visit www.saveyourinternet.eu/ and contact their MEP.
The post Article 13 of the Copyright Directive Raises Serious Questions appeared first on Internet Society.
Currently, 53% of the world’s population is offline due to factors such as high cost of Internet infrastructure and lack of relevant local content. Internet access remains unaffordable in many economies in transition where people have to choose between the Internet and other vital necessities such as food and health. Maybe one day we will look back at this historic moment in which Community Networks were paving the way for equitable and meaningful access to technology.
Community Networks are an emerging complementary and sustainable solution to address the connectivity gap existing in underserved urban and rural areas around the world. Such networks rely on the active participation of local communities in the development and management of shared Internet infrastructure as a common resource. Existing examples provide concrete evidence that community network development can prompt positive effects to help communities leverage on technology for socioeconomic empowerment. We have gained experience from Guifi.Net, Zenzeleni Network, Rhizomatica and Wireless For Communities, all successful projects proving that the technical side of the community network model can be replicated.
What motivated your team to upgrade the existing network?
To help achieve a new goal in Kenya, the Internet Society Beyond the Net Funding Programme, in collaboration with the Internet Society’s Kenya Chapter, is supporting TunapandaNET, a pilot project that aims to upgrade an existing network with an additional 10 nodes and provide digital literacy training in Kibera, Nairobi.
TunapandaNET was developed in 2015 by Tunapanda Institute to provide local youth access to educational content. Tunapanda is located in Kibera, Nairobi, and offers training in technology, design, and business. The Institute can only accommodate 25 trainees per cohort, although it receives over 300 applications every year. So we decided that students whose applications were not successful to join the program, could access Tunapanda e-learning platform to attend courses. In such a way, we reached more students than the center could accommodate. After piloting in 2016, we found that the educational situation in Kibera was getting worse. Local schools were left behind by the government ICT program. This changed our perspective on how our network could fill the “education” gap and have an impact on a larger scale.
At the moment we have four existing nodes (Tunapanda Institute, two Schools with 1500 students, and one Youth Center attended by 300 youngsters). These nodes were developed, last year, in partnership with the Internet Society, the International Centre of Theoretical Physics (Italy), and Rhinotivity (Denmark). As we already have a starting point, we are now working to upgrade the network with an additional 10 nodes and build a digital ecosystem to meet the different needs of education and health in Kenya.
How will the project improve people’s lives in your community?
The project focuses on building a network that will allow access to educational resources. Schools and Youth Centers will have access to:
- Digital educational content
- Affordable access to Internet
- Digital literacy training for teachers, students, and women
What are the first steps in developing the project?
In 2018, we will establish a data center at the Tunapanda Head Offices in Kibera. The data center will host the following services for the community:
- E-learning platform for schools to create and share educational content
- Cloud based school management system that local schools can use for school administration
- Set up the network infrastructure for 3 schools and test the platforms
We also will be actively looking for more donation partners, as the schools need computers and software deployments.
Connecting the Next Billion will be a hard work.
To make it happen it is going to take all of us.
You can be part of it.
We are looking for new ideas from people all over the world on how to make your community better using the Internet. The Internet Society Beyond the Net Funding Programme funds projects up to $30,000.00 USD.Read this report by Carlos Rey-Moreno to get inspired: Supporting the Creation and Scalability of Affordable Access Solutions: Understanding Community Networks in Africa.
The post TunapandaNET Paves the Way for Kenya to Connect the Underserved appeared first on Internet Society.
As you may have noticed, our shiny new website has some speed issues. It is slow for many visitors. Over the past few months we’ve worked on a number of potential changes to improve the site performance. One major change we’re making is to move to a different hosting provider.
That change will happen tomorrow – Tuesday, 19 June 2018 at 13:00 UTC.
Assuming all goes well, you shouldn’t really notice – except that the site should be faster! But if you happen to be browsing the site around 13:00 UTC, you might see some glitches on pages while the DNS magic happens and we change to pointing to the new server.
Once we’ve made this migration, I’ll write more about what we have done and how it has helped our site’s performance. Meanwhile, I just wanted to give a quick alert about this impending change to anyone viewing our site.
The post Alert – Web server host migration on June 19, 2018 appeared first on Internet Society.
The Asia-Pacific Bureau has been producing an annual snapshot of its activities and initiatives for a couple of years now, and we are pleased to present the 2017 edition. While it is not meant to be an exhaustive record of all that we did, it does provide a good overview of our activities in the region.
In addition to the Bureau’s core programmes, our Chapters are also very active in their local communities and, as volunteer-led entities, do amazing work in helping to support and carry out the Internet Society’s mission at the local level. We invited our chapters in the region to submit a summary of their activities, and the submissions that made it before the deadline are included in the report.
As I reflect on 2017, it probably stands out as the year the digital economy began to cement itself in the Asia-Pacific. Across the region, numerous developments, from the emergence (and to some extent, dominance) of local technology firms to new policies designed to facilitate the growth of connected societies all signify that countries in the largest region of the world – both in geography and population – are finally putting their plans into action.
Nowhere is this more evident than in China, the world’s second largest economy. Last year, tech giant Tencent, the parent company of WeChat, became the first Asian firm to break into the 500-billion-dollar league, with Alibaba not far behind. Both made their fortunes cornering a domestic market of 750 million Internet users and earn most of their revenue from mobile users.
These companies, like many in Asia-Pacific, thrive on business models that are different from those that have made their Western counterparts successful: Alibaba charges merchants to advertise on its platform, rather than taking a cut from the sale of goods, as Amazon does. Unlike Facebook, Tencent derives most of its profit from selling virtual items, such as emoticons, to its users. The digital economy in China is now said to constitute 30% of its economy, and the sharing economy is expected to see a 40% increase annually.
The rise of large Internet companies in Asia-Pacific, coupled by the continued expansion of global firms in local markets, has not gone unnoticed by governments, many of which are keen to regulate (and in some cases tax) those that are making money from transactions and engagement with their citizens.
Indonesia, Southeast Asia’s biggest economy, reached a settlement with Google over back taxes, while Viet Nam is facing pressure from local industries to force foreign businesses like Booking.com to pay contractor taxes currently shouldered by domestic partners. China is taking a different tack, pushing for a 1% stake and a direct role in corporate decisions in some of its biggest tech firms, even as these begin to ignite fears of market dominance.
In South Korea, web portal Naver, which occupies 70% of news and media search space, was subjected to parliamentary audit for its monopoly over the country’s Internet ecosystem. Both South Korea and Japan are looking at anti-trust policies to limit technology services companies from having exclusive access to big data.
Notwithstanding hiccups – such as the multiple data breaches that followed the rollout of India’s digital identity system, Aadhar – Asia-Pacific countries remain resolute in laying the groundwork for a more technology-driven economy.
There is also an emphasis on equipping people from all walks of life with specialised skills to prepare them for a digital future – from FinTech courses for university students in Hong Kong, to Singapore’s SkillsFuture for Digital Workspace, which aims to train citizens to maximise ICT use both for personal and business purposes.
While challenges remain – security issues, for instance, are on the rise in many parts of the region – Asia-Pacific on the whole is recognising the benefits that the Internet can bring, propelling societies, industries and economies to advance and develop in ways that could transform the region’s countries and communities into models for the rest of the world to follow.
As we approach the mid-way point of 2018, the Internet Society’s campaigns-based approach on key issues is paying dividends, and we look forward to reporting on another stellar year of developments and achievements in the 2018 edition of The Year That Was.
The post Reflecting on the Internet Society’s 2017 Asia-Pacific Activities appeared first on Internet Society.
Debates regarding net neutrality regulation in the United States have been carried out for over a decade. Rulemakings by the FCC have been passed numerous times, won and lost in court, and been repealed, resulting in years of political back and forth. Now, net neutrality is being argued for and against on Capitol Hill and its regulatory future is unclear.
To address this political limbo, the Internet Society convened experts from the technical community, public interest groups, and academia to discuss how we can create a permanent solution for net neutrality that protect the interests of Internet users while fostering an environment that encourages investment and innovation. During this half-day event, participants began a conversation to define net neutrality, what conduct it should cover, how compliance could be assured, and how to balance consumer and private sector interests.
The discussion was moderated by Larry Stickling, Executive Director of the Collaborative Governance Project at the Internet Society, and included a balanced group of politically left- and right-leaning public interest groups, private sector organizations, and academics. The event was under Chatham House Rule and did not allow tweeting during the meeting in order to encourage participants to freely and respectfully voice their opinions.
Participants began by discussing high-level principles for the open Internet and agreed that Michael Powell’s 2004 ‘Internet Freedoms’ were a good starting point. With a few adjustments, the group reached consensus on the following principles for the open Internet:
- Users should have access to their choice of legal content.
- Users should be able to run and create applications of their choice.
- Users should be permitted to attach any devices they choose to the connection in their homes.
- Users should receive meaningful information regarding their service plans.
The discussion then turned to stakeholder expectations. Participants identified six relevant stakeholder groups that may impact or be impacted by these principles, including Broadband Internet Access Providers (BIAP), users, platforms, content providers, device makers, and the government. They then attempted to reach consensus on what each stakeholder group should reasonably be expected to do to uphold the agreed upon open Internet principles. Though several points were discussed for each, the group agreed that “protect security” and “be transparent” were reasonable expectations for every stakeholder group, though implemented in different ways depending on the stakeholder.
After establishing the principles of the open Internet, relevant stakeholders, and expectations of stakeholders, the group discussed how to define net neutrality. All participants agreed that any rules must include protection against blocking or throttling of content. The group determined that net neutrality must include a degree of transparency and a prohibition against any anticompetitive interference, though there was not consensus on how to define either of those terms. They also agreed that net neutrality must be subject to reasonable network management, though a means of defining “reasonable” was not reached, and that there must be a general conduct standard.
To end the conversation, participants discussed which regulatory agency should be assigned the task of ensuring net neutrality is upheld. Consensus was not reached, but the participants agreed that so long as there is a general conduct standard that they all agree to, either the FCC or the FTC could adequately serve as the net neutrality regulatory body.
Moving forward, this group has agreed to continue to meet in an attempt to reach consensus on what a general conduct standard may look like, whether or not paid prioritization should be included in the definition of net neutrality or whether a general conduct standard could replace it, and how penalties or remedies should be addressed.
The Internet Society was very pleased with the open conversation participants engaged in and the progress that was made as a result. We look forward to hosting additional meetings in the coming months as we attempt to find a multistakeholder solution to the net neutrality regulatory debate in the United States.
AI to get X-ray vision: Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory are getting close to creating AI that can see through walls, Geek.com reported. The research team is using AI to analyze radio signals bouncing off human bodies. The result is a neural network-generated stick figure that moves like the targeted person does.
Dr. AI will see you now: Perhaps more useful that looking through walls, some AI technologies are now being used to identify tuberculosis, pneumonia, upper respiratory infection, and bronchitis based on how a cough sounds, said AdWeek. Several companies are exploring other ways to use AI in healthcare settings.
Encryption wars, part 207: Apple has moved to close a security hole that law enforcement agencies used to defeat encryption on iPhones, according to many news reports, including one in the New York Times. The Apple move set off a new round of debate about encrypted devices and law enforcement access, the Washington Post noted.
It appears that at least one company that builds iPhone cracking tools already has a workaround, however, Motherboard reported.
Meanwhile, an FBI official suggested that each encrypted device that law enforcement agencies cannot crack represents a victim without justice, BusinessInsider.com said.
Blockchain vs. fake news: Two of our favorite topics have merged. The developer of Adblock Plus, the controversial advertising-blocking browser tool, has released a beta version extension for the Chrome browser that plans to use blockchain technology to spot fake news, according to Engadget. The Trusted News extension uses four established fact-checking sites to spot fake news, but developer eyeo plans to decentralize the database using the Ethereum blockchain to manage user feedback on news articles.
The cost of a breach: A Vermont librarian sued consumer credit bureau Equifax and has won $600 in small claims court, reports Krebs on Security. The librarian had asked for $5,000, but the court awarded her enough to cover the cost of up to two years of online identity theft protection services.
The 7th RIPE South-East Europe (SEE 7) meeting is being held on 18-19 June 2018 in Timisoara, Romania, and is focusing on several of the subjects of interest to the Internet Society. It’s also being chaired by our colleague Jan Žorž, whilst I’ll be talking about IoT Security and the OTA IoT Trust Framework.
In Monday, there are talks on BGP monitoring from Paolo Lucente (pmacct), and from Krzysztof Grzegorz Szarkowicz (Juniper Networks) on improvements to routing protocols to suit the centralised data centre-based architectures that are becoming more prevalent on the Internet, and which are the subject of an Internet Draft. Zoran Perovic (SOX) will also talk about paradigm shifts in the implementation of Internet Exchange Points.
On Tuesday, there will be a discussion led by Goran Slavic (SOX) on implementing MANRS in an IXP, which is very relevant to the current MANRS initiative which is increasingly being adopted by IXPs. Our colleague Jan will then be presenting about RIPE-690 which provides recommendations for IPv6 address prefix assignments for end-users. Preceding this, will be an update on IPv6 adoption in the SEE region from Massimiliano Stucchi (RIPE NCC).
Some other highlights are the talk on Quad9DNS by Nishal Goburdhan (PCH) that’s supporting secure DNS queries over TLS between client and resolver, and the road to 400 Gb/s connectivity from Thomas Weible, Flexoptix GmbH. On Monday morning there’s a tutorial on IPv6 Security being led by Massimiliano Stucchi (RIPE NCC), whilst for those with a policy bent, the Tuesday evening session will focus on GDPR.
My own presentation on IoT Security will be on Tuesday afternoon.
The 12th edition of the European Dialogue on Internet Governance or the EuroDIG, as it is commonly known, took place in Tbilisi, Georgia, on 5-6 June. The Internet Society (ISOC) is an institutional partner to EuroDIG and the ISOC European Regional Bureau helped shape the agenda and were involved in several sessions.
This year, a few specific aspects caught my attention and created a lot of debate during the sessions and in the corridors.
Reinforcing the multistakeholder model
While European governments have traditionally been strong supporters of the Internet Governance Fora (IGF) and the multistakeholder model, this support has been to some extent compromised by concerns over national security and other priorities in the recent times. Several core members of the European Internet community have talked about a “fatigue” with the regional and national IGFs.
This year’s EuroDIG offered some fresh food for thought. Larry Strickling, who leads the Internet Society’s Collaborative Governance project, made several interventions during the EuroDIG. Strickling’s extensive experience of driving multistakeholder processes and his practical approach were received with great interest and curiosity. In parallel, high participation from young people injected heaps of new energy and optimism to the event.
Embracing the Internet opportunity for all of Europe
Georgia and Eastern Europe have a thriving Internet community and I applaud EuroDIG’s commitment to organise its meetings in all parts of Europe. The Internet has no borders, and the digital opportunities and challenges are shared and interlinked across the European continent.
Developing Internet access and digital services are top of agenda in many Eastern European countries and this was reflected in the event programme. In the plenary session on bridging the urban-rural digital gap, Raúl Echeberria, the Internet Society’s Vice President Global Engagement, highlighted the importance of innovative connectivity models including community networks. The impact of digitalisation on our economies and society was debated in many sessions.
Getting ready for emerging technologies
The Internet of things (IoT), artificial intelligence (AI), and blockchain are often called emerging technologies, although they have in many cases reached mass deployment. Perhaps it is the complexity of these technologies that sparks the interest of stakeholders and prompts reactions of excitement and concern.
The dedicated sessions on the emerging technologies attracted large audiences with plenty to say. The IoT workshop, moderated by Frédéric Donck, Director of the Internet Society’s European Bureau, focused on device security and user awareness. The discussion had clearly moved on from the “hype stage” to a deeper analysis of the underlying opportunities and challenges.
In her opening remarks, Sandra Höferichter, Secretary General of EuroDIG, said that at the age of 12 the EuroDIG was entering its teenage years. Perhaps we will see some tantrums in the coming years, but I believe that the carefully nurtured community, who stands behind EuroDIG, will keep it on the right path.
The video recordings and key messages from each session will be available in the coming weeks at: https://www.eurodig.org.
The post EuroDIG 2018 Gathers the Internet Community: What’s New appeared first on Internet Society.
The annual Hackathon@AIS, in its second year, is aimed at exposing engineers from the Africa region to open Internet Standards Development. This year, the event was held 9-10 May 2018 in Dakar Senegal at the Radisson Blu Hotel during the Africa Internet Summit (AIS-2018).
The event was attended by more than 75 engineers from 15 countries including 11 fellows who were supported to attend the event. The event featured participants with English and or French-speaking backgrounds encouraging collaboration to work. Organized into 3 tracks, the event allowed participants to choose which track they were interested in participating in. The tracks were as follows:
1. Network Time Protocol Track
- Make NTP more secure (Privacy)
- Using WireShark NTP Plugin to read/analyze NTP traffic
- Code changes to NTP implementations to make them compliant with the draft
- Read and understand Draft RFC
- Loganaden Velvindron (Mauritius)
- Nitin Mutkawoa (Mauritius)
- Serge-Parfait Goma (Congo)
Participants were introduced to NTP and asked to test out an IETF draft and implement it in open source NTP clients.
Participants were able to successfully implement draft and made presentations demonstrating their work and accomplishments.
2. Network Programmability
- Introduce participants to Software Defined Networking (SDN)
- Introduce network programmability, including YANG, NETCONF, and RESTCONF
- Interact programmatically with OpenDaylight and Cisco IOS XE devices
- Charles Eckel (United States)
- Khoudia Gueye (Senegal)
Participants were introduced to the concepts of network programmability and organized into small teams, working together through a series of online learning labs available through Cisco DevNet. They used tools such as Postman, programming languages such as Python, and network and device level YANG models via NETCONF and RESTCONF to interact with Cisco IOS XE devices and OpenDaylight.
Multiple teams presented what they learned and illustrated their knowledge of network programmability with live demos of OpenDaylight controlling networks created using Mininet.
3. IP Wireless in Vehicular Environments (IPWave)
- Analyze an IETF draft
- Test an implementation of the draft using specialized wireless cards
- Prof. Nabil Benamar (Morocco)
Participants got to install the wireless cards on Desktop PCs and try out the communication between two PCs analyze the traffic with Wireshark. In order for the cards to work in OCB mode, they needed to function at 5.9Ghz. After patching the kernel (Ubuntu 16.04) the cards were able to run at 5.8Ghz with some errors reported but still enough for the cards to be in OCB mode.
The participants got to collaborate in teams to patch the Ubuntu kernel, install the cards and reported their work at the end of the event.
Prof. Nabil has also updated the IPv6 list on the outcome of the IPWave track.
The event was a success with engineers getting to work together to implement and test open Internet standards. Several NOGs indicated an interest to organize similar activities in the local communities. It was encouraging to see several women engineers actively participate in the event and present on their findings.
Special thanks to the facilitators who lead the event, AFRINIC for helping with the venue and logistics.
Routing security can be a difficult topic to explain. It’s technical. It’s filled with industry jargon and acronyms. It’s, well, nerdy. But routing security is vital to a stable and secure future Internet, and we here at the Internet Society have been supporting the Mutually Agreed Norms for Routing Security (MANRS) initiative for several years now. To help explain, at a very high level, some of the major routing security issues and how MANRS can help address them, we’re pleased to announce a new explanatory video.
Available with English, French, and Spanish subtitles, this short new video explains three major incidents that can lead to things like denial of service attacks, surveillance, and lost revenue:
- Route Hijacking – when one network operator or attacker impersonates another
- Route Leak – when a network operator unintentionally announces that it has a route to a destination
- IP Address Spoofing – when fake source IP addresses hide a sender’s identity
Network operators of all sizes have a role to play in securing the Internet’s routing infrastructure. By implementing the four simple MANRS Actions, together we can make significant improvements to reduce the most common routing threats. Those four actions are:
- Filtering – making sure your and your customers’ routing announcements are correct
- Anti-spoofing – enabling source address validation to prevent spoofed packets from entering or leaving your network
- Coordination – maintaining globally accessible contact information in common places such as the PeeringDB, RIR whois databases, and your own website.
- Global Validation – publishing your data, including your routing policy and prefixes you intend to advertise, so your routing information can be validated by third parties.
Your security depends on others, and your actions affect the security of others. By implementing these four simple, non-disruptive MANRS actions, together we can protect the core.
The post New Video Explains Routing Security and How MANRS Can Help appeared first on Internet Society.
On June 12, 2018, the Internet Society hosted a briefing for Congressional staff on Considerations Regarding Encryption and Exceptional Access. The briefing offered an opportunity for participants to learn more about the technical aspects of encryption, and the risks associated with creating back doors or other technical means for exceptional access.
Before beginning the conversation, participants were given a primer on encryption, which offered a high-level explanation of different kinds of encryption and issues related to exceptional access. They watched a video on end-to-end encryption, which used colors to explain how it works. Experts, including Christine Runnegar (Senior Director, Internet Trust, Internet Society), Robyn Greene (Policy Counsel and Government Affairs Lead, Open Technology Institute), and Maurice Turner (Senior Technologist, Center for Democracy and Technology), then engaged in a two-hour, in-depth conversation with participants, answering questions and discussing the global debate.
The panelists emphasized that encryption is an important security tool for the economy. Weakening the security of systems by creating technical means for exceptional access puts its users at greater risk. It could create an entry point for bad actors. Panelists referenced the clipper chips a case where exceptional access created security threats.
Several bills have been introduced in recent years that have implications for encryption. As the global debate around encryption and exceptional access continues, it is important to have an understanding of the issues and what is at stake.
The Internet Society recognizes the concerns of law enforcement and remains firm in its conviction that encryption is an important technical solution that all Internet users should use to protect their communications and data. Legal and technical attempts to limit the use of encryption, even if well-intentioned, will negatively impact the security of law-abiding citizens and of the Internet at large.
To read more on this issue, please see the report, Internet Society-Chatham House Roundtable on Encryption and Lawful Access, and our blog, Encryption and Law Enforcement Can Work Together.
The post Considerations Regarding Encryption and Exceptional Access Briefing appeared first on Internet Society.
With a shared vision of putting people at the center of the Internet, the Internet Society and Consumers International have formed a new working partnership aimed at creating a safer, more trusted Internet for everyone.
As stated in a joint letter to G20 leaders, both organizations share the view that the unwritten future of the Internet is full of endless opportunity, but that if we want everyone to benefit from its potential we need to make sure it is fair, open, safe and secure.
Only by prioritizing the needs of people in an increasingly-connected world, can we make this possible. Consumers should be confident in their use of Internet-connected devices, and have the right to know how their personal data is collected, protected, shared and stored.
Our organizations plan to work together on a wide range of initiatives including to make sure individuals have access to secure Internet-connected devices, understand what online privacy and security means for them, and are empowered to make informed choices about the technology they use in their daily lives.
The Internet of Things (or IoT) offers the promise of convenience, efficiency and more personalized services. It’s a phenomenon that’s being seen all around the world. From smart TVs, to wearable fitness trackers and connected teddy bears, from North America to Europe to Japan and beyond into developing regions, the products and services around us are becoming more-and-more connected.
Yet the explosion of connected devices in our day-to-day lives is putting users’ privacy and security in the spotlight like never before, and it’s not always good news. Many IoT products are rushed to market with little consideration for basic security and privacy protections. It’s time for manufacturers to get ahead of the IoT security curve and take actions that will limit risk and instill consumer trust. To do this, we will work with manufacturers, retailers and regulators to make sure safety and privacy are included in the initial design and through the entire product lifecycle. And this is just the beginning.
We will be working with industry and consumer groups to improve the overall security and privacy of IoT offerings, and to make sure consumers have products or services that are secure and privacy-respecting. Consumer confidence is critical for IoT to thrive and to deliver on its promise. We believe the protection of online security and privacy are key pillars in building trust.
Through our passionate and active memberships across the world we understand the national context for consumers living in a connected world as well as the global picture.
We look forward to combining our considerable experience, knowledge and connections in both the consumer and online areas to share information, build our understanding and create more impact across the globe. Our partnership is a way to create real change for people everywhere. Together, we can shape the Internet for tomorrow.Additional reading:
- Internet Society Online Trust Alliance IoT Trust Framework for Manufacturers
- Consumers International Research: “Connecting voices: a role for consumer rights in developing digital society”
The post A Partnership to Tackle Growing Risks in a Connected World appeared first on Internet Society.
Mutually Agreed Norms for Routing Security (MANRS) – which is supported by the Internet Society – aims to help network operators around the world to improve the security and resilience of the global routing system through four actions that include filtering, anti-spoofing, coordination and support for global validation. It currently involves over 85 organisations encompassing nearly 200 Autonomous Systems around the world, including some of the largest ISPs.
The MANRS BCOP offers guidance on how to practically implement each of the MANRS actions, based on the operational experiences of numerous network operators around the world. It’s a must read for those working with the global routing system, as routing security is a shared responsibility and needs commitment to good practices from all its participants.
The RIPE documents are developed and approved by the RIPE community, having been published since 1989. They include technical and operational recommendations, as well as policy, procedural and organisational documents. The publication of RIPE-706 represents community recognition of the MANRS principles and the importance of a commitment to routing security.
The MANRS initiative would like to thank David Freedman, Brian Foust, Barry Greene, Ben Maddison, Andrei Robachevsky, Job Snijders and Sander Steffann who were the primary authors of the document, but also all those who provided comment and feedback, and those who translated it into other languages.
If you’re interested in signing-up to MANRS, more information is available on the MANRS website.
This week is TNC18, the largest European research and education networking conference, which is being held at the Lerkendal Stadium in Trondheim, Norway – the home of current Norwegian Football Champions Rosenborg BK. Of course we’re actually in a conference centre underneath one of the grandstands and not on the pitch, but this is still a premier event that brings together managers, network engineers, and researchers from R&E networks in Europe and the rest of the world.
The Internet Society is not only one of the conference sponsors, but has a significant role in the programme as well. Our colleague Karen O’Donoghue on Monday spoke about NRENs and IoT Security in the ‘What’s Coming Next In Privacy Innovation‘ session, where she’s discussing the security and privacy challenges of burgeoning numbers of IoT devices and how these will impact R&E communities. ISOC is encouraging the development of best practices through the Online Trust Alliance’s IoT Security & Privacy Trust Framework, and this is a good opportunity to discuss how the NREN community can take the lead in adopting good operational practice.
Karen will also be talking about Time and Security during the ‘Security‘ session on Tuesday. Time synchronisation is critical for many Internet applications, and for many years NTP has worked fine without any real consideration for security. However, in recent years there have been an increasing number of attacks on the time synchronisation system in order to create disruption and cause damage, so there has been ongoing work in both the IETF and IEEE to secure the NTP and PTP protocols.
Our other colleague Steve Olshansky will be presenting on Blockchain and Digital Identity during the lightning talks session on Tuesday. He’ll be discussing whether Blockchain can be used for identity and access management, and what the implications are for user privacy and control over their identity.
I was organising the GLIF session on Monday too, which focused on recent developments in the global lightpath space that are used to support large-scale high-bandwidth research applications such as the Square Kilometre Array and Global Research Platform. In particular, networks are increasingly becoming software driven as more services move into the cloud, and whilst this hides the complexity from users, it makes managing networks more complex and requires more sophisticated measurement and monitoring. R&E networks cannot continue to justify higher bandwidth networks on a handful of big data research projects alone, and need to ensure good access to compute and storage clusters for the smaller research projects as well.
In addition, we’re raising awareness of routing security issues by providing some MANRS information in the conference poster session, as well as having some prominent ‘advertising’ around the venue. By offering four simple but concrete actions – namely filtering, anti-spoofing, improved coordination and global validation – network operators can collectively improve the security and reliability of the Internet.
If you’re unable to make it to TNC18 in person, the sessions are being both streamed and recorded.
The full workshop program is now available online and includes sessions on TLS, routing, Internet infrastructure, congestion control, traffic engineering, and anonymous communications. The workshop will conclude with a poster session. Accepted papers will be made available at no charge via the Association for Computing Machinery (ACM) Digital Library in due course.
The ACM, IRTF & Internet Society Applied Networking Research Workshop 2018 is an academic workshop that provides a forum for researchers, vendors, network operators and the Internet standards community to present and discuss emerging results in applied networking research. It is sponsored by ACM SIGCOMM, the IRTF, and the Internet Society. The workshop is also generously supported by Comcast and Akamai.
This academic workshop is open to all; registration is free for IETF attendees and $150 USD otherwise. Registration information is available. Student travel grants are also available and the deadline to apply for these is 15 June 2017.
If you’re already planning to be in Montreal for IETF, check out the workshop program and consider registering for the ANRW 2018 to take in these great research talks. And if you’re a student researcher new to the IETF, please apply for a travel grant if that’s appropriate, come along to the workshop, and take advantage of the low student rate registration to attend the IETF meeting week.
The post Registration Open for Applied Networking Research Workshop: TLS, Routing, Privacy, and More appeared first on Internet Society.
CLIC Québec – L’heure du déclic pour la découverte et l’accès en ligne au contenu culturel québécois
Dans un contexte de renouvellement des politiques culturelles du Québec et du Canada à l’ère du numérique, ISOC Québec a lancé le projet « CLIC Québec » grâce à la subvention Beyond The Net octroyée par l’Internet Society en juillet 2017. Ainsi, depuis bientôt un an, ISOC Québec oeuvre à travers « CLIC Québec » d’une part à sensibiliser les décideurs politiques et les utilisateurs finaux et d’autre part à identifier et valoriser les bonnes pratiques des milieux culturels en matière de diffusion, de promotion et d’accès en ligne aux contenus et produits culturels locaux.
Profitant de la tenue du 1er Forum sur la Gouvernance d’Internet au Québec (FGI Québec), qui coïncidait avec les célébrations des 25 ans de l’Internet Society en septembre 2017, ISOC Québec a organisé un atelier intitulé Cultures en réseaux et découvrabilité des contenus locaux au cours duquel une soixantaine de participants (professionnels de la culture, experts et consultants en politiques culturelles, spécialistes des métadonnées et du Web sémantique, chercheurs/universitaires, citoyens et utilisateurs finaux) ont identifié ensemble dix pistes d’action susceptibles d’accroître la présence et le rayonnement des contenus culturels québécois sur Internet.
Pour mobiliser davantage les acteurs des différents secteurs des industries culturelles québécoises autour des objectifs du projet CLIC Québec, ISOC Québec a rejoint une coalition nationale constituée de 40 organismes signataires d’un Manifeste pour le rayonnement et la pérennité de la culture et des médias nationaux à l’ère numérique («Standing for culture»). En partenariat avec le Centre d’études sur l’intégration et la mondialisation (CEIM) de l’Université du Québec à Montréal (UQAM), 7 séminaires ont été organisés entre novembre 2017 et mai 2018 auxquels ont participé les membres de la Coalition pour la culture et les médias. Ces séminaires ont permis aux acteurs des milieux culturels québécois d’être sensibilisés sur les différents enjeux de gouvernance et de régulation du numérique qui peuvent avoir un impact sur les industries culturelles locales, notamment la neutralité du Net, la fiscalité et la taxation des plateformes numériques, le droit d’auteur à l’ère numérique, le commerce électronique transfrontalier des biens et services culturels, la révision des cadres règlementaires de la radiodiffusion et des télécommunications canadiennes, les algorithmes de recommandation culturelle,…
Les discussions amorcées dans le cadre du projet CLIC Québec ont également permis de nourrir une réflexion plus vaste menée par des chercheurs québécois sur la création d’indicateurs pour mesurer la présence, la visibilité et la découvrabilité des produits culturels québécois en ligne. Les résultats de cette recherche-action devraient permettre aux gouvernements du Canada et du Québec de prendre de nouvelles mesures ou de modifier leur cadre règlementaire afin d’obliger les plateformes transnationales (Netflix, Youtube, Spotify iTunes,…) à augmenter le quota de contenus québécois et canadiens francophones présents dans leur catalogue respectif et de recommander ou de mettre davantage en visibilité ces contenus locaux pour promouvoir la diversité des expressions culturelles.
Par ailleurs, pour mieux étudier l’impact du numérique sur les transformations de la société et des cultures au Québec et au Canada, ISOC Québec et les partenaires du projet CLIC Québec ont soutenu la création d’un Observatoire des Réseaux et Interconnexions de la SOciété Numérique (ORISON), un think-tank multi-acteurs et pluridisciplinaire pour développer la recherche-action concertée autour des différents aspects de la communication interculturelle et internationale en lien avec la gouvernance d’Internet et la promotion/protection de la diversité des expressions culturelles dans l’environnement numérique.
Enfin, la mise en œuvre du projet CLIC Québec a amené ISOC Québec à développer une collaboration avec l’Institut canadien de recherche sur les minorités linguistiques (ICRML) de l’Université de Moncton dans le but de Développer l’écosystème francophone de l’Internet au Québec et au Canada (DÉFI QC). Soutenue par le Secrétariat du Québec aux Relations Canadiennes, cette nouvelle initiative s’est concrétisée par l’organisation des Rencontres numériques Québec/Nouveau-Brunswick (RNQ/NB2018) qui se sont tenues à l’Université de Moncton le 4 avril 2018 sur le thème «La Francophonie canadienne dans un monde numérique».
Avez-vous une idée géniale pour améliorer votre communauté via Internet? Faites une demande pour une subvention Beyond the Net, qui finance des projets jusqu’à 30 000 $ US, et suivez Beyond the Net sur Twitter !
The post CLIC Québec – L’heure du déclic pour la découverte et l’accès en ligne au contenu culturel québécois appeared first on Internet Society.
This is a quick update on the CEO Succession process at the Internet Society (ISOC). For background, please check my previous notes to the community.
As you know, the application window for potential candidates for ISOC’s CEO position closed in early April. Let me update you on where we are in the process.
The process for selecting a new CEO for ISOC is progressing well and is on track. As anticipated, and as a consequence of the broad appeal of the role, the open call for applicants resulted in a significant amount of interest from all around the world. The Board received more than one hundred applications from candidates with a diverse set of backgrounds in business and the private sector, government, the technical community, the global NGO space, and the wider Internet community.
The strength and quality of the applications has been very high and it has been an incredibly tough challenge to identify and evaluate the most suitable candidates for this role from such a large and qualified pool of talent and experience.
Nevertheless, given the importance that the CEO position holds for both ISOC and the Internet as a whole, the deliberation by the Board has been in depth. Over the past two months, trustees have dedicated much time and effort to the careful consideration of each individual application on its own merits. Informed and considered selections have been made every step of the way.
The next round of interviews with shortlisted candidates is scheduled for later this month, as per our original plan. It remains the case that the actual start date for the new CEO will depend on the availability of the candidate ultimately selected. Nonetheless, we expect to be able to share more news soon as we move through this advanced part of the selection process.
The post CEO Succession at Internet Society – Status update (June 2018) appeared first on Internet Society.