All posts by Anthony Rutkowski

Anthony Rutkowski
About Anthony Rutkowski

Anthony has over 45 years of experience in Industry and regulatory affairs with focus on global cybersecurity, lawful interception, retained data, identity management and network forensics. Anthony has held key positions at VeriSign, SAIC, General Magic. Sprint International and GE. Additionally, he has held important posts and positions at FCC, ITU, ETSI, and OASIS.

DMCA Compliance Becomes a Serious Obligation for ISPs

With a virtual stroke of the pen on 1st February, 2018 the U.S. Court of Appeals for the Fourth Circuit brought a new reality to the world of Internet Service Providers. In the watershed 37-page decision in BMG Rights Management v. Cox Communications case, the court held that providers of internet access can indeed be held “contributorily liable” for infringement of copyrights by their service subscribers. And with Cox facing a judgment of $25 million, the obligations were indeed real and the consequence of ignoring them was severe.

House Encryption Working Group Report: Falls Short

On December 20, 2016, the House Energy and Commerce Committee’s Encryption Working Group released its Year-End Report. Although, the topic invites politics and rhetoric by its nature, and its conclusions of more “exploration” are certainly appropriate, the report also falls short in several areas.

NFV Plenary #16 wraps up 2016 in Shenzhen

The industry’s principal Network Functions Virtualization (NFV) standards venue wrapped up the year in the world’s powerhouse electronics capital, Shenzhen, December 12-15, hosted by Huawei Technologies. 176 participants under the leadership of newly elected plenary chair Diego Lopez of Telefónica, fielded 80 input documents. The event included multiple NFV sub-group meetings, a joint meeting with the MEC (Mobile Edge Computing) standards group, a Huawei workshop, and a special 5G session. ETSI also provided an update on the first NFV plugtests for interoperability among almost every vendor being held in Madrid for the week beginning January 23.

Implementing the Cybersecurity Act of 2015: A Public-Private Specifications Approach

Arguably the most significant cybersecurity development of 2015 was a stunner. On Friday, 18 December 2015 – with everyone leaving on the holidays – the U.S. Congress unexpectedly passed the Cybersecurity Act of 2015 and it was immediately signed by the President. It became the organic law of the United States, including far reaching amendments to the Homeland Security Act of 2002.

The Apple Encryption Case

Almost every day, the press carries some latest assertion by Apple or assorted self-proclaimed encryption experts that smartphone devices must be unalterably encrypted. A virtual army of bloggers and lobbying groups have joined the fray to ramp up anti-government paranoia and convince users and the public that highly encrypted smartphones are good for the world. Never mind that the capability primarily benefits terrorists and criminals.

ISAO Challenges

Earlier this week on 9 November at a public location outside Washington DC, a U.S. Department of Homeland Security sponsored Initial Public Meeting was held for establishing Information Sharing and Analysis Organization (ISAO) Standards. After some initial speeches by DHS officials, the contractor host of the meeting described the efforts and sought to gather information and ideas from the approximately 50+ attendees.

Oral Argument of the Microsoft eMail Appeal

In the world of Retained Data and forensics law, perhaps the most significant case on appeal is being argued this coming week at 10:00 A.M. on Wednesday, 9 September at the Thurgood Marshall U.S. Courthouse in New York City. In the rarefied world of LI law, it doesn’t get any better than this. To make the event even more interesting and historic, this past Tuesday, Microsoft’s appellate counsel requested the presence of a Court Reporter to capture an entire record of the oral argument. The counsel for the United States consented, and the court on Thursday granted the request.

DFAX – Digital Forensic Analysis eXpression

For some years, we’ve been observing the convergence among the various LI and CYBER realms. A posting yesterday to the hyperactive new OASIS CTI (Cyber Threat Intelligence) Technical Committee list underscores that evolution. It described a surprisingly mature new protocol dubbed DFAX – Digital Forensic Analysis eXpression.