industryterm:internet traffic

  • Orange’s Sea Cable Repair Fleet Looks Beyond Investment Boom
    https://www.bloomberg.com/news/articles/2019-05-24/orange-s-sea-cable-repair-fleet-looks-beyond-investment-boom


    The Pierre de Fermat ship
    Source : Orange SA

    • Phone carrier assessing opportunities in offshore wind sector
    • France sees strategic interest in marine cable expertise

    For decades, ships owned by French phone carrier Orange SA have traveled the world’s oceans, installing and fixing the undersea cables that carry internet traffic from one continent to another.

    The fleet of six run by Orange Marine is now looking to diversify, even with the biggest investment boom for the infrastructure since the 1990s. Instead of creating more business, the new high-capacity lines being financed by the tech giants are expected to put older cables out of service, meaning less work for the seaborne repairmen.

    One cable that started up last year highlights the issue. The line, running from the U.S. state of Virginia to Sopelana, Spain, accounts for half the capacity of the dozen or so trans-Atlantic cables. Known as Marea, the 6,600-kilometer (4,101-mile) link owned by Facebook Inc., Microsoft Corp. and Telefonica SA’s Telxius offers the fastest data transmission speeds in the world.

    Jean-Luc Vuillemin, who oversees Orange Marine, sees potential opportunities in servicing offshore wind turbines, he said in an interview on the Pierre de Fermat, a 100-meter ship named after the 17th-century mathematician and docked at the Brest port in northwest France.

    The ecosystem is pretty favorable right now but this may change in the future,” Vuillemin said. “You need to diversify when the business is in order, so we’re thinking about the next steps.

    Orange Marine is a small yet profitable business for France’s dominant phone carrier, generating about 100 million euros ($112 million) of annual sales out of Orange’s roughly 41 billion euros of revenue. But it’s considered a strategic asset by the company, whose largest shareholder is the French state.

    Being able to quickly repair cables can be crucial in an emergency, as Algeria experienced in 2015 when a link between Annaba in the country’s northeast and Marseille in southern France was cut by an anchor, disrupting internet service in the North African nation for almost a week.

    Together, Orange Marine and its France-based competitor at Nokia Oyj, Alcatel Submarine Networks, own about one-quarter of the 40 or so ships focused on subsea cables globally, Vuillemin said.

    Our Western economies are increasingly dependent on these subsea cables. Orange Marine provides strategic autonomy. It’s a matter of sovereignty,” he said.

  • KEI letter to US DOJ, opposing IBM acquisition of Red Hat | Knowledge Ecology International
    https://www.keionline.org/30093

    Très intéressant sur les relations Logiciels libres et grandes entreprises. Utiliser le LL comme cheval de Troie pour renforcer des services spécifiques... brisant la confiance et la neutralité du libre. L’inverse de ce que décrit « Des routes et des ponts » sur les partenariats communs-privés.

    The following was sent to US DOJ today, to express KEI’s opposition to the IBM acquisition of Red Hat.

    13 March 2019

    Bindi R. Bhagat
    U.S. Department of Justice
    Antitrust Division
    Technology and Financial Services Section

    Dear Ms. Bhagat,

    Thank you for taking our call today, regarding the International Business Machines Corporation (IBM) effort to buy Red Hat, Inc. As discussed, Knowledge Ecology International (KEI) is opposed to IBM acquiring Red Hat.

    At present, Red Hat controls the most important Linux distribution for Internet and cloud servers.

    The important metrics in this area include, but are not limited to, the share of Internet traffic supported by Red Hat server installations, as well as the revenue that Red Hat realizes for maintaining and customizing Linux server software, compared to other Linux server distribution companies or organizations.

    Red Hat is an important contributor to the Linux kernel and to the code that is used in many elements in the broader GNU/Linux platform of free software programs that are used by server platforms, including the many non-Red Hat Linux distributions.

    IBM is proposing to pay a large premium for Red Hat. Prior to the acquisition offer, Red Hat was valued at approximately $20.5 billion. IBM is proposing to buy Red Hat for $34 billion, a premium of about 67 percent of the previous value.

    IBM could have invested in Red Hat stock at a much lower price, if the objective was simply to share in the expected profits of Red Hat, continuing its current business offerings. What IBM gains from its acquisition of Red Hat is control, and the ability to shape the direction of its software development efforts, to favor IBM’s own cloud services.

    Today Red Hat is considered a neutral partner for many companies offering or developing cloud services. If IBM acquires Red Hat, the trust in Red Hat will be eroded, and IBM will have powerful incentives to influence Red Hat’s software development efforts towards providing special functionality and benefits to IBM and the IBM cloud services, and even to degrade the functionality of services to companies that compete directly with IBM, or fail to buy services from IBM.

    The Department of Justice (DOJ) should consider the impact of the merger on the incentives that Red Hat will have, post merger, to undermine competition and degrade the benefits of a more level playing field, for this critical Internet resource and platform.

    Our concerns are shaped to some degree by the detrimental decision made by the DOJ in approving the Oracle acquisition of Sun Computer’s open source assets, including the MySQL database program. At the time, DOJ viewed the MySQL software as unimportant, because the revenues were small, relative to other database programs. Most users of MySQL did not pay any fees to use the software. Our organization, KEI, used MySQL to support our Joomla, Drupal and WordPress content management systems, and did not pay fees to Sun Computer, along with countless other businesses, non-profit organizations and individuals who also used the free version. We were concerned, at the time, that Oracle would degrade and slow the development of the capacities of MySQL, in order to protect Oracle’s very expensive proprietary database services. We believe that our concerns about Oracle have unfortunately been borne out, by the blunting of the rate of innovation and ambition for MySQL, the fact that Open Office (another program gained in the acquisition of Sun Computers) is no longer an important free software client for office productivity, and Oracle’s aggressive litigation over copyright and patent claims related to Java.

    The DOJ might consider conditions on the merger that would provide greater assurances that Red Hat will not be used to create an unlevel playing field that favors IBM’s own cloud services. We are willing to suggest such conditions, relating to governance, licensing and other issues. For example, the DOJ could require IBM to show how it will ensure the continued policy of ensuring that Red Hat’s patents are only used for defensive purposes. Conditions on this issue should be durable, and avoid predictable loopholes.

    IBM’s competitors and existing customers of Red Hat will have more informed suggestions as to specific conditions that would protect IBM’s competitors. But overall, the best decision would be to reject the merger, on the grounds that is is fundamentally designed to create an unlevel playing field.

    Red Hat is not just another technology company. It is one of the main reasons the Internet functions as well as it does.

    Sincerely,

    James Love
    Knowledge Ecology International (KEI)
    1621 Connecticut Avenue, Suite 500
    Washington, DC 20009
    https://keionline.org

    #Communs #Logiciels_libres #Red_Hat #IBM

  • 9 Ways Videos Build Customer Loyalty and #retention
    https://hackernoon.com/9-ways-videos-build-customer-loyalty-and-retention-7e4e8828516?source=rs

    Guess what? Video advertising is here, and it’s here to stay.In the recent years, the landscape of video marketing has skyrocketed. This year, however, has transformed promotional video from a simple marketing tactic to a full-blown business strategy.What makes videos so increasingly efficient in advertisements? On one hand, video can show your audience, instead of just “tell” them what you are all about. On the other hand, customers want to see products in action.Let’s look at some video stats:80% of all internet traffic will be video by 2019.63% of businesses have started using video content marketing, where as 82% of them view video marketing as an important part of their marketing strategy.50% of consumers want to see videos from brands, more than any other type of content.70% of (...)

    #visualization #sales #video-marketing #marketing-strategies

  • How to start an online video streaming business | 3 profitable ideas for video content creators
    https://hackernoon.com/how-to-start-an-online-video-streaming-business-3-profitable-ideas-for-v

    With the internet in its full-fledged, now seems a good time to start an online video streaming business. When online videos will make up more than 80% of internet traffic by 2022, why would not anyone think of starting a video streaming service like Netflix, Hulu, YouTube, and Amazon Prime?Now, one can ask, if giants like Netflix, Hulu, etc. are already ruling the video streaming market, would it be practical to start your own video streaming business and expect a survival?Indeed, Yes!Considering the latest entry by Disney streaming service (which is yet to be released), it is impractical to think that you cannot claim your share of audience and revenue if these giants are already in the market. Like every other new entrant, if you have some interesting content to show, people will (...)

    #online-business #content-creators #netflixclone #streaming-video #video-streaming-online

  • Can #snmp (Still) Be Used to Detect DDoS Attacks?
    https://hackernoon.com/can-snmp-still-be-used-to-detect-ddos-attacks-32b03aa9df8a?source=rss---

    SNMP is an Internet Standard protocol for collecting information about managed devices on IP networks. SNMP became a vital component in many networks for monitoring the health and resource utilization of devices and connections. For a long time, SNMP was the tool to monitor bandwidth and interface utilization. In this capacity, it is used to detect line saturation events caused by volumetric DDoS attacks on an organization’s internet connection. SNMP is adequate as a sensor for threshold-based volumetric attack detection and allows automated redirection of internet traffic through cloud scrubbing centers when under attack. By automating the process of detection, mitigation time can considerably be reduced and volumetric attacks mitigated through on-demand cloud DDoS services. SNMP (...)

    #detect-ddos-attacks #burst-attacks #ddos-protection #anomaly-detection

  • The Global Internet Phenomena Report
    https://www.sandvine.com/hubfs/downloads/phenomena/2018-phenomena-report.pdf

    The data in this edition of the Global Internet Phenomena Report is drawn from Sandvine’s installed base of over 150 Tier 1 and Tier 2 fixed and mobile operators worldwide. The report does not include significant data from either China or India, but the data represents a portion of Sandvine’s 2.1B subscribers installed base, a statistically significant segment of the internet population.

    This edition combines fixed and mobile data into a single comprehensive view of internet traffic (...)

    #Google #Nest #Amazon #Amazon's_Prime #AWS #BitTorrent #Facebook #cryptage #Alexa #Siri #Nest_Learning_Thermostat #domination #thermostat #cloud #jeu (...)

    ##game

  • The Rise of Netflix Competitors Has Pushed Consumers Back Toward Piracy
    https://motherboard.vice.com/amp/en_us/article/d3q45v/bittorrent-usage-increases-netflix-streaming-sites

    BitTorrent usage has bounced back because there’s too many streaming services, and too much exclusive content

    A new study shows that after years of declines, BitTorrent usage and piracy is on the rise again. The culprit: an increase in exclusivity deals that force subscribers to hunt and peck among a myriad of streaming services to actually find the content they’re looking for.

    Sandvine’s new Global Internet Phenomena report offers some interesting insight into user video habits and the internet, such as the fact that more than 50 percent of internet traffic is now encrypted, video now accounts for 58 percent of all global traffic, and Netflix alone now comprises 15 percent of all internet downstream data consumed.

    But there’s another interesting tidbit buried in the firm’s report: after years of steady decline, BitTorrent usage is once again growing.

    According to Sandvine, file-sharing accounts for 3 percent of global downstream and 22 percent of upstream traffic, with 97% of that traffic in turn being BitTorrent. While BitTorrent is often used to distribute ordinary files, it remains the choice du jour for those looking to distribute and trade copyrighted content online, made easier via media PCs running Kodi and select plugins.

  • 10 Human Rights Organisations v. United Kingdom
    https://privacyinternational.org/legal-action/10-human-rights-organisations-v-united-kingdom

    In March 2015, Privacy International, together with nine other NGOs, filed an application to the European Court of Human Rights (ECtHR), challenging two aspects of the United Kingdom’s surveillance regime revealed by the Snowden disclosures : (1) UK bulk interception of internet traffic transiting undersea fibre optic cables landing in the UK and (2) UK access to the information gathered by the US through its various bulk surveillance programs. Our co-applicants are the American Civil (...)

    #GCHQ #algorithme #spyware #écoutes #web #surveillance #DRIP #ACLU #PrivacyInternational

    /sites/default/files/fav/apple-icon-180x180.png

  • The NSA’s Hidden Spy Hubs in Eight U.S. Cities
    https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs

    The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” It is a collaboration that dates back decades. Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.

    It is an efficient point to conduct internet surveillance, Klein said, “because the peering links, by the nature of the connections, are liable to carry everybody’s traffic at one point or another during the day, or the week, or the year.”

    Christopher Augustine, a spokesperson for the NSA, said in a statement that the agency could “neither confirm nor deny its role in alleged classified intelligence activities.” Augustine declined to answer questions about the AT&T facilities, but said that the NSA “conducts its foreign signals intelligence mission under the legal authorities established by Congress and is bound by both policy and law to protect U.S. persons’ privacy and civil liberties.”

    Jim Greer, an AT&T spokesperson, said that AT&T was “required by law to provide information to government and law enforcement entities by complying with court orders, subpoenas, lawful discovery requests, and other legal requirements.” He added that the company provides “voluntary assistance to law enforcement when a person’s life is in danger and in other immediate, emergency situations. In all cases, we ensure that requests for assistance are valid and that we act in compliance with the law.”

    Dave Schaeffer, CEO of Cogent Communications, told The Intercept that he had no knowledge of the surveillance at the eight AT&T buildings, but said he believed “the core premise that the NSA or some other agency would like to look at traffic … at an AT&T facility.” He said he suspected that the surveillance is likely carried out on “a limited basis,” due to technical and cost constraints. If the NSA were trying to “ubiquitously monitor” data passing across AT&T’s networks, Schaeffer added, he would be “extremely concerned.”

    An estimated 99 percent of the world’s intercontinental internet traffic is transported through hundreds of giant fiber optic cables hidden beneath the world’s oceans. A large portion of the data and communications that pass across the cables is routed at one point through the U.S., partly because of the country’s location – situated between Europe, the Middle East, and Asia – and partly because of the pre-eminence of American internet companies, which provide services to people globally.

    The NSA calls this predicament “home field advantage” – a kind of geographic good fortune. “A target’s phone call, email, or chat will take the cheapest path, not the physically most direct path,” one agency document explains. “Your target’s communications could easily be flowing into and through the U.S.”

    Once the internet traffic arrives on U.S. soil, it is processed by American companies. And that is why, for the NSA, AT&T is so indispensable. The company claims it has one of the world’s most powerful networks, the largest of its kind in the U.S. AT&T routinely handles masses of emails, phone calls, and internet chats. As of March 2018, some 197 petabytes of data – the equivalent of more than 49 trillion pages of text, or 60 billion average-sized mp3 files – traveled across its networks every business day.

    The NSA documents, which come from the trove provided to The Intercept by the whistleblower Edward Snowden, describe AT&T as having been “aggressively involved” in aiding the agency’s surveillance programs. One example of this appears to have taken place at the eight facilities under a classified initiative called SAGUARO.

    In October 2011, the Foreign Intelligence Surveillance Court, which approves the surveillance operations carried out under Section 702 of FISA, found that there were “technological limitations” with the agency’s internet eavesdropping equipment. It was “generally incapable of distinguishing” between some kinds of data, the court stated. As a consequence, Judge John D. Bates ruled, the NSA had been intercepting the communications of “non-target United States persons and persons in the United States,” violating Fourth Amendment protections against unreasonable searches and seizures. The ruling, which was declassified in August 2013, concluded that the agency had acquired some 13 million “internet transactions” during one six-month period, and had unlawfully gathered “tens of thousands of wholly domestic communications” each year.

    The root of the issue was that the NSA’s technology was not only targeting communications sent to and from specific surveillance targets. Instead, the agency was sweeping up people’s emails if they had merely mentioned particular information about surveillance targets.

    A top-secret NSA memo about the court’s ruling, which has not been disclosed before, explained that the agency was collecting people’s messages en masse if a single one were found to contain a “selector” – like an email address or phone number – that featured on a target list.

    Information provided by a second former AT&T employee adds to the evidence linking the Atlanta building to NSA surveillance. Mark Klein, a former AT&T technician, alleged in 2006 that the company had allowed the NSA to install surveillance equipment in some of its network hubs. An AT&T facility in Atlanta was one of the spy sites, according to documents Klein presented in a court case over the alleged spying. The Atlanta facility was equipped with “splitter” equipment, which was used to make copies of internet traffic as AT&T’s networks processed it. The copied data would then be diverted to “SG3” equipment – a reference to “Study Group 3” – which was a code name AT&T used for activities related to NSA surveillance, according to evidence in the Klein case.

    #Surveillance #USA #NSA #AT&T

  • Net neutrality will be repealed Monday unless Congress takes action | Ars Technica
    https://arstechnica.com/tech-policy/2018/06/net-neutrality-will-be-repealed-monday-unless-congress-takes-action

    With net neutrality rules scheduled to be repealed on Monday, Senate Democrats are calling on House Speaker Paul Ryan to schedule a vote that could preserve the broadband regulations.

    The US Senate voted on May 16 to reverse the Federal Communications Commission’s repeal of net neutrality rules, but a House vote—and President Trump’s signature—is still needed. Today, the entire Senate Democratic Caucus wrote a letter to Ryan urging him to allow a vote on the House floor.
    Further Reading
    Senate votes to overturn Ajit Pai’s net neutrality repeal

    “The rules that this resolution would restore were enacted by the FCC in 2015 to prevent broadband providers from blocking, slowing down, prioritizing, or otherwise unfairly discriminating against Internet traffic that flows across their networks,” the letter said. “Without these protections, broadband providers can decide what content gets through to consumers at what speeds and could use this power to discriminate against their competitors or other content.” The letter was spearheaded by Senate Democratic Leader Chuck Schumer (D-N.Y.), Sen. Bill Nelson (D-Fla.), and Sen. Brian Schatz (D-Hawaii).

    FCC Chairman Ajit Pai led a commission vote to repeal the rules in December 2017, but the rules remain on the books because the repeal was contingent on US Office of Management and Budget (OMB) approval of modified information-collection requirements. The OMB approval came last month, allowing Pai to schedule the repeal for Monday, June 11.

    #Neutralité_Internet

  • FCC votes to repeal net neutrality rules, a milestone for Republican deregulation push - LA Times
    http://www.latimes.com/business/la-fi-net-neutrality-fcc-20171214-story.html#nws=mcnewsletter
    http://www.trbimg.com/img-5a33280f/turbine/la-fi-net-neutrality-fcc-20171214

    “As a result of today’s misguided action, our broadband providers will get extraordinary new powers,” said Jessica Rosenworcel, one of two Democrats on the five-member FCC who voted against the repeal.

    “They will have the power to block websites, the power to throttle services and the power to censor online content,” she said. “They will have the right to discriminate and favor the internet traffic of those companies with whom they have a pay-for-play arrangement and the right to consign all others to a slow and bumpy road.”
    Protestors Rally At FCC Against Repeal Of Net Neutrality Rules
    Demonstrators rally outside the Federal Communication Commission building Thursday to protest the repeal of net nutrality rules. (Chip Somodevilla / Getty Images)

    The FCC’s net neutrality rules prohibited AT&T Inc., Charter Communications Inc., Verizon Communications Inc. and other broadband and wireless internet service providers from selling faster delivery of certain data, slowing speeds for specific video streams and other content, and blocking or otherwise discriminating against any legal online material.

    To enforce the rules, the FCC classified broadband as a more highly regulated utility-like service under Title 2 of federal telecommunications law.

    Telecom companies praised the repeal, while saying they are committed to the principles of net neutrality and have no plans to change their practices.

    The FCC vote “does not mark the ‘end of the Internet as we know it;’ rather it heralds in a new era of light regulation that will benefit consumers,” said David L. Cohen, Comcast’s senior executive vice president.

    But the companies have hedged on whether they would start charging additional fees to transport video streams or other content at a higher speed through their network in a practice known as paid prioritization.

    Pai has said paid prioritization could accelerate the development of autonomous vehicles and home health monitoring, which would need reliably fast service.

    But net neutrality supporters worry telecom companies will set up toll lanes on the internet, cutting deals with some websites to deliver their content faster and squeezing out start-ups and small companies that lack the money to pay for faster service.

    #Neutralité_internet

  • The Geopolitical Economy of the Global Internet Infrastructure on JSTOR
    https://www.jstor.org/stable/10.5325/jinfopoli.7.2017.0228

    Article très intéressant qui repositionne les Etats dans la gestion de l’infrastructure globale de l’internet. En fait, une infrastructure globale pour le déploiement du capital (une autre approche de la géopolitique, issue de David Harvey).

    According to many observers, economic globalization and the liberalization of telecoms/internet policy have remade the world in the image of the United States. The dominant roles of Amazon, Apple, Facebook, and Google have also led to charges of US internet imperialism. This article, however, argues that while these internet giants dominate some of the most popular internet services, the ownership and control of core elements of the internet infrastructure—submarine cables, internet exchange points, autonomous system numbers, datacenters, and so on—are tilting increasingly toward the EU and BRICS (i.e., Brazil, Russia, India, China, and South Africa) countries and the rest of the world, complicating views of hegemonic US control of the internet and what Susan Strange calls the knowledge structure.

    This article takes a different tack. It argues that while US-based internet giants do dominate some of the middle and top layers of the internet—for example, operating systems (iOS, Windows, Android), search engines (Google), social networks (Facebook), online retailing (Amazon), over-the-top TV (Netflix), browsers (Google Chrome, Apple Safari, Microsoft Explorer), and domain names (ICANN)—they do not rule the hardware, or material infrastructure, upon which the internet and daily life, business, governments, society, and war increasingly depend. In fact, as the article shows, ownership and control of many core elements of the global internet infrastructure—for example, fiber optic submarine cables, content delivery networks (CDNs), autonomous system numbers (ASN), and internet exchange points (IXPs)—are tilting toward the rest of the world, especially Europe and the BRICS (i.e., Brazil, Russia, India, China, and South Africa). This reflects the fact that the United States’ standing in the world is slipping while an ever more multipolar world is arising.

    International internet backbone providers, internet content companies, and CDNs interconnect with local ISPs and at one or more of the nearly 2000 IXPs around the world. The largest IXPs are in New York, London, Amsterdam, Frankfurt, Seattle, Chicago, Moscow, Sao Paulo, Tokyo, and Hong Kong. They are core elements of the internet that switch traffic between all the various networks that comprise the internet system, and help to establish accessible, affordable, fast, and secure internet service.

    In developed markets, internet companies such as Google, Baidu, Facebook, Netflix, Youku, and Yandex use IXPs to interconnect with local ISPs such as Deutsche Telecoms in Germany, BT or Virgin Media in Britain, or Comcast in the United States to gain last-mile access to their customers—and vice versa, back up the chain. Indeed, 99 percent of internet traffic handled by peering arrangements among such parties occurs without any money changing hands or a formal contract.50 Where IXPs do not exist or are rare, as in Africa, or run poorly, as in India, the cost of bandwidth is far more expensive. This is a key factor that helps to explain why internet service is so expensive in areas of the world that can least afford it. It is also why the OECD and EU encourage developing countries to make IXPs a cornerstone of economic development and telecoms policy work.

    The network of networks that make up the internet constitute a sprawling, general purpose platform upon which financial markets, business, and trade, as well as diplomacy, spying, national security, and war depend. The world’s largest electronic payments system operator, the Society for Worldwide Interbank Financial Telecommunications’ (SWIFT) secure messaging network carries over 25 million messages a day involving payments that are believed to be worth over $7 trillion USD.59 Likewise, the world’s biggest foreign currency settlement system, the CLS Bank, executes upward of a million trades a day worth between $1.5 and $2.5 trillion over the global cable systems—although that is down by half from its high point in 2008.60 As Stephen Malphrus, former chief of staff to the US Federal Reserve Chairman Ben Bernanke, observed, when “communications networks go down, the financial services sector does not grind to a halt, rather it snaps to a halt.”61

    Governments and militaries also account for a significant portion of internet traffic. Indeed, 90 to 95 percent of US government traffic, including sensitive diplomatic and military orders, travels over privately owned cables to reach officials in the field.62 “A major portion of DoD data traveling on undersea cables is unmanned aerial vehicle video,” notes a study done for the Department of Homeland Security by MIT scholar Michael Sechrist.63 Indeed, the Department of Defense’s entire Global Information Grid shares space in these cables with the general public internet.64

    The 3.6 billion people as of early 2016 who use the internet to communicate, share music, ideas and knowledge, browse, upload videos, tweet, blog, organize social events and political protests, watch pornography, read sacred texts, and sell stuff are having the greatest influence on the current phase of internet infrastructure development. Video currently makes up an estimated two-thirds of all internet traffic, and is expected to grow to 80 percent in the next five years,69 with US firms leading the way. Netflix single-handedly accounts for a third of all internet traffic. YouTube is the second largest source of internet traffic on fixed and mobile networks alike the world over. Altogether, the big five internet giants account for roughly half of all “prime-time” internet traffic, a phrasing that deliberately reflects the fact that internet usage swells and peaks at the same time as the classic prime-time television period, that is, 7 p.m. to 11 p.m.

    Importance des investissements des compagnies de l’internet dans les projets de câbles.

    Several things stand out from this analysis. First, in less than a decade, Google has carved out a very large place for itself through its ownership role in four of the six projects (the SJC, Faster, Unity, and Pacific Cable Light initiatives), while Facebook has stakes in two of them (APG and PLCN) and Microsoft in the PLCN project. This is a relatively new trend and one that should be watched in the years ahead.

    A preliminary view based on the publicly available information is that the US internet companies are important but subordinate players in consortia dominated by state-owned national carriers and a few relatively new competitors. Keen to wrest control of core elements of the internet infrastructure that they perceive to have been excessively dominated by United States interests in the past, Asian governments and private investors have joined forces to change things in their favor. In terms of the geopolitical economy of the internet, there is both a shift toward the Asia-Pacific region and an increased role for national governments.

    Return of the State as Regulator of Concentrated Markets

    In addition to the expanded role of the state as market builder, regulator, and information infrastructure policy maker, many regulators have also rediscovered the reality of significant market concentration in the telecom-internet and media industries. Indeed, the US government has rejected several high-profile telecoms mergers in recent years, such as AT&T’s proposal to take over T-Mobile in 2011, T-Mobile’s bid for Sprint in 2014, and Comcast’s attempt to acquire Time Warner Cable last year. Even the approval of Comcast’s blockbuster takeover of NBC Universal in 2011, and Charter Communications acquisition of Time Warner Cable last year, respectively, came with important strings attached and ongoing conduct regulation designed to constrain the companies’ ability to abuse their dominant market power.87 The FCC’s landmark 2016 ruling to reclassify broadband internet access as a common carrier further indicated that US regulators have been alert to the realities of market concentration and telecoms-internet access providers’ capacity to abuse that power, and the need to maintain a vigilant eye to ensure that their practices do not swamp people’s rights to freely express themselves, maintain control over the collection, retention, use, and disclosure of their personal information, and to access a diverse range of services over the internet.88 The 28 members of the European Union, along with Norway, India, and Chile, have adopted similar “common carriage/network neutrality/open network”89 rules to offset the reality that concentration in core elements of these industries is “astonishingly high”90 on the basis of commonly used indicators (e.g., concentration ratios and the Herfindahl–Hirschman Index).

    These developments indicate a new phase in internet governance and control. In the first phase, circa the 1990s, technical experts and organizations such as the Internet Engineers Task Force played a large role, while the state sat relatively passively on the sidelines. In the second phase, circa the early to mid-2000s, commercial forces surged to the fore, while internet governance revolved around the ICANN and the multi-stakeholder model. Finally, the revelations of mass internet surveillance by many states and ongoing disputes over the multi-stakeholder, “internet freedom” agenda on the one side, versus the national sovereignty, multilateral model where the ITU and UN system would play a larger role in internet governance all indicate that significant moves are afoot where the relationship between states and markets is now in a heightened state of flux.

    Such claims, however, are overdrawn. They rely too heavily on the same old “realist,” “struggle for control” model where conflict between nation-states has loomed large and business interests and communication technologies served mainly as “weapons of politics” and the handmaidens of national interests from the telegraph in the nineteenth century to the internet today. Yet, nation-states and private business interests, then and now, not only compete with one another but also cooperate extensively to cultivate a common global space of economic accumulation. Communication technologies and business interests, moreover, often act independent of the nation-state and via “private structures of cooperation,” that is, cartels and consortia, as the history and contemporary state of the undersea cable networks illustrate. In fact, the internet infrastructure of the twenty-first century, much like that of the industrial information infrastructure of the past 150 years, is still primarily financed, owned, and operated by many multinational consortia, although more than a few submarine communications cables are now owned by a relatively new roster of competitive players, such as Tata, Level 3, Global Cloud Xchange, and so forth. They have arisen mostly in the last 20 years and from new quarters, such as India in the case of Tata, for example.

    #Economie_numérique #Géopolitique #Câbles_sous_marins

  • We’re Halfway to Encrypting the Entire Web
    https://www.eff.org/deeplinks/2017/02/were-halfway-encrypting-entire-web

    The movement to encrypt the web has reached a milestone. As of earlier this month, approximately half of Internet traffic is now protected by HTTPS. In other words, we are halfway to a web safer from the eavesdropping, content hijacking, cookie stealing, and censorship that HTTPS can protect against.

  • ISP, DDoS, Net Neutrality

    http://www.infosecurity-magazine.com/opinions/the-changing-role-of-the-isp

    In a recent survey conducted by Corero, the majority of IT security professionals (53%) believe that ISPs are hiding behind net neutrality laws as a way to dodge their responsibilities when it comes to protecting their customers from DDoS attacks. Defending against these types of attacks is an important area of focus for service providers, given their bandwidth capacity and volume of customers – and the fact that they are uniquely positioned to eliminate bad traffic upstream from appropriate peering points, before it even reaches their customers’ networks, is beginning to create customer demand for them to do more.

    In the same survey, the majority of respondents (59%) worry that their ISP does not provide enough protection against DDoS attacks, and almost a quarter (24%) would go as far as to blame their ISP in the event of a DDoS attack affecting their business. This has potentially serious consequences, because over a fifth of those surveyed (21%) said that they would leave their service provider if they did not offer adequate protection against DDoS attacks.

    Customers have clearly come to expect their telcos to do something about the decaying mélange of internet traffic and increasingly sophisticated attack vectors. They expect to be able to pay for a ‘clean pipe’ of good traffic, where the threats have been proactively removed.

    So why are some ISPs reluctant to deliver this?

    #ISP
    #DDoS
    #Net_neutrality #neutralité_du_net

  • Internet laws a time-bomb | Bangkok Post: opinion
    http://www.bangkokpost.com/opinion/opinion/993937/internet-laws-a-time-bomb

    The military regime continues to create deeper digital confusion. It refuses to jettison its campaign for a single internet gateway that would out-firewall the “great firewall of China”. Now it seeks official authorisation to legally and secretly intercept all internet traffic. This amendment to the military’s poorly conceived Computer Crime Act (CCA) is sailing through the appointed National Legislative Assembly (NLA).

    The revelation about this bill is a huge disappointment, and not just to those who are intensely focused on civil rights. The proposed changes to the CCA are important on several levels: they will authorise any state security agency to gather details like the login and password of every citizen who does online banking. It will allow them to intercept the business dealings of every company with an online presence, even their in-house emails.

    The planned amendments, slated to become law next month, do not stop there. They specifically require ISPs to allow the state security apparatus full access to the internet traffic of their clients. Further, the ISPs will be gagged, with heavy penalties for any who blow the whistle on the state’s prying. Even if an ISP knows that state officials are intercepting highly personal details, such as online ATM transactions or business secrets, they are forbidden from revealing this rights abuse.

    #Thailande #censure #internet

  • Internet Monitoring
    https://www.privacyinternational.org/node/12

    Internet monitoring is the act of capturing data as it travels across the internet towards its intended destination. The units being monitored or captured are often referred to as ‘packets’. Packets are the broken up parts of the data sent (messages, emails, images, web pages, files) over Internet Protocol which computers break into small chunks, rout through a network of computers and then reassemble at their destination to become the message, web page, image or file presented to you on your (...)

    #surveillance #Privacy_International

  • Ah ben ils ne sont toujours pas morts : Anonabox sort 3 nouvelles boîtes lors du #CES 2016, nommés Fawkes, Tunneler et Pro.

    Fawkes et Pro ont un client Tor incorporé.
    Tunneler sert comme service VPN en utilisant HideMyAss !

    http://www.prnewswire.com/news-releases/anonabox-to-debut-three-new-privacy-devices-at-the-2016-consumer-electro

    Anonabox is a pocket-sized privacy device that uses VPN services (Virtual Private Network) or the Tor network to help keep online browsing private, bypass censorship, deter hackers and access the deep web. The Anonabox Original routed Internet traffic through the Tor network, cloaking users’ IP address and location, while ensuring online activity was anonymous.

    The new generation of Anonabox devices features an advanced user interface, as well as the option of using the Tor network or a VPN (featuring HideMyAss! Pro services). Earlier this year, Anonabox agreed to terms with tech distributor Ingram Micro, paving the way for the devices to reach retail locations.

    Pour les soucis qu’avait rencontré l’Anonabox précédemment, voir http://seenthis.net/messages/303261

    #TOR
    #VPN
    #privacy
    #anonymity #anonymité

  • Kazakhstan Considers a Plan to Snoop on all Internet Traffic
    https://www.eff.org/deeplinks/2015/12/kazakhstan-considers-plan-snoop-all-internet-traffic

    In an unusually direct attack on online privacy and free speech, the ruling regime of Kazakhstan appears to have mandated the country’s telecommunications operators to intercept citizens’ Internet traffic using a government-issued certificate starting on January 1, 2016. The press release announcing the new measure was published last week by Kazakhtelecom JSC, the nation’s largest telecommunications company, but appears to have been taken down days later—the link above comes courtesy of the (...) #Hacking-Team #malware #surveillance #Kazakhstan

  • EU-Latin America submarine fibre-optic cable: it’s getting there

    The €134 million (US$185 million) cable between Europe (Lisbon, Portugal) and Latin America (Fortaleza, Brazil) will be built by a private consortium led by Brazilian state-owned telecom provider Telebras and Spanish cable operator Islalink.
    The EULALINK Joint Venture agreement between them has just been signed.
    https://ec.europa.eu/digital-agenda/en/news/planned-new-submarine-cable-between-europe-and-latin-america-joint-venture

    Even though in an other context than purely R&E, nothing excludes Brazil’s Dilma Rousseff is probably genuinely pleased:

    Brazil presses EU for progress on undersea cable to circumvent US spying
    http://rt.com/news/brazil-eu-cable-spying-504

    Brazil has been routing its internet traffic through Miami, Florida’s network access point. However, last month [January 2014], Brazilian state-owned telecom provider Telebras announced that it would be entering a joint venture with Spain’s IslaLink’s Submarine Cables in order to connect the two continents, bypassing the US.

    [...]

    “As far as cyber is concerned, we share a common interest in a right balance between privacy and openness on the Internet,” European Council President Herman Van Rompuy stated [in February 2014]. However, he did not make any direct references to the undersea cable project.

    [...]

    Telebras would have a 35 percent share, while IslaLink would have a 45 percent stake. Pension funds from both Europe and Brazil would make up the rest. However, Brazil is expected to put up more for the project in total, so Brazil will be contributing more funds, according an official who spoke to Reuters.

    https://euobserver.com/justice/123260

    “We welcomed the plans for the future installation of a fibre-optic submarine cable linking Brazil and Europe, which will improve communications between the two continents,” said the EU Council, representing member states, in a statement.

    Another view:
    Brazil’s New Underwater Data Cable to Portugal Is Still Likely Not NSA-Proof
    https://news.vice.com/article/brazils-new-underwater-data-cable-to-portugal-is-still-likely-not-nsa-pro

    #BELLA: Building Europe Link to Latin America
    #submarine_cable
    #cable

  • Internal Internet traffic routed outside Russia by a Chinese operator

    The Russian Internet traffic in several circumstances has been re-routed outside the country, the incidents seem to be caused by routing errors made by China Telecom.

    The news has been published by the Internet monitoring service Dyn in a blog post, which also reports that domestic traffic was re-routed apparently due to a networking fault caused by a weakness in the Border gateway protocol (#BGP).

    However, as can often happen with these [peering] relationships, one party can leak the routes received from the other and effectively insert itself into the path of the other party’s Internet communications. This happened over a dozen times in the past year between these two providers. This is a general phenomenon that occurs with some regularity but isn’t often discussed in BGP security literature. In this blog post, we’ll explore the issue via the lens of this single example. In a follow-on blog, we’ll explore several additional examples.

    The original article below gives a fairly comprehensive explanation of peering and what can go wrong. It also explains the #Vimpelcom and #China_Telecom peering agreement and shows how it went wrong on several occasions. (eg China Telecom announcing full tables)
    http://research.dyn.com/2014/11/chinese-routing-errors-redirect-russian-traffic

    The above article also references the following very good and self-explanatory read that explains BGP prefix hijacking, and available security measures:

    Why Is It Taking So Long to Secure Internet Routing?

    People have been aware of BGP’s security issues for almost two decades and have proposed a number of solutions, most of which apply simple and well-understood cryptography or whitelisting techniques. Yet, many of these solutions remain undeployed (or incompletely deployed) in the global Internet, and the vulnerabilities persist. Why is it taking so long to secure BGP?

    http://queue.acm.org/detail.cfm?id=2668966

    Thus, while we continue to make progress toward protocol-based defenses for routing security, the next frontier in routing security could very well be hardening the software and hardware used in Internet routers.

    #RPKI
    #BGPSEC
    #routing #security

  • We are rate limiting the FCC to dialup modem speeds until they pay us for bandwidth
    https://neocities.org/blog/the-fcc-is-now-rate-limited

    The Federal Communications Commission is planning to vote for a proposal on May 15th to scrap Net Neutrality. Instead of all sites being given fair and equal access to consumers, this proposal will allow for your ISP to create special internet speed lanes for ultra-rich corporations, and force their own customers wanting to access your site into an internet traffic jam lane that’s slower. The bonehead responsible for this idiotic and insane proposal is no less than the chairman of the FCC, Tom Wheeler, a cable industry hand-picked lobbyist.

    #neutrality #fcc

    • The Ferengi plan is a special FCC-only plan that costs $1000 per year, and removes the 28.8kbps modem throttle to the FCC. We will happily take Credit Cards, Bitcoin, and Dogecoin from crooked FCC executives that probably have plenty of money from bribes on our Donations page (sorry, we don’t accept Latinum yet).

      If it bothers you that I’m doing this, I want to point out that everyone is going to be doing crap like this after the FCC rips apart Net Neutrality. It’s time for the web to organize and stand up against these thugs before they ruin everything that the web stands for.

      Update 8:19PM PST - want to make your own FCC Ferengi Plan? Here’s the code we’re using on our nginx server.