<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet Governance Project</title>
	<atom:link href="https://www.internetgovernance.org/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.internetgovernance.org/</link>
	<description></description>
	<lastBuildDate>Thu, 16 Apr 2026 19:07:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>AI, Project Glasswing, and the Changing Institutional Economics of Bugs</title>
		<link>https://www.internetgovernance.org/2026/04/16/ai-project-glasswing-and-the-changing-institutional-economics-of-bugs/</link>
					<comments>https://www.internetgovernance.org/2026/04/16/ai-project-glasswing-and-the-changing-institutional-economics-of-bugs/#respond</comments>
		
		<dc:creator><![CDATA[Brenden Kuerbis]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 15:50:05 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IG Institutions]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10474</guid>

					<description><![CDATA[<p>On April 7, Anthropic published a 244-page system card for a model that will not be made generally available for now. Claude Mythos Preview, the company&#8217;s newest frontier model, is “capable of identifying and then exploiting zero-day vulnerabilities in every major operating system and every major web browser when directed by a user to do [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/04/16/ai-project-glasswing-and-the-changing-institutional-economics-of-bugs/">AI, Project Glasswing, and the Changing Institutional Economics of Bugs</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">On April 7, Anthropic published a 244-page </span><a href="https://www-cdn.anthropic.com/08ab9158070959f88f296514c21b7facce6f52bc.pdf"><span style="font-weight: 400;">system card</span></a><span style="font-weight: 400;"> for a model that will not be made </span><span style="font-weight: 400;">generally available for now. Claude Mythos Preview, the company&#8217;s newest frontier model, is “capable of identifying and then exploiting zero-day vulnerabilities in every major operating system and every major web browser when directed by a user to do so.” During testing, it identified thousands of high- and critical-severity vulnerabilities in some of the most thoroughly audited codebases in the world. The company&#8217;s response was to launch </span><a href="https://www.anthropic.com/glasswing"><span style="font-weight: 400;">Project Glasswing</span></a><span style="font-weight: 400;"> — a coordinated initiative providing Mythos access to twelve partner organizations, including AWS, Apple, Cisco, Microsoft, JPMorgan, Google, and the Linux Foundation, along with over forty additional organizations, which maintain critical software infrastructure.</span></p>
<p><span style="font-weight: 400;">Depending on who you read or talk to, the reaction has been split between </span><a href="https://www.aisi.gov.uk/blog/our-evaluation-of-claude-mythos-previews-cyber-capabilities"><span style="font-weight: 400;">measured optimism</span></a><span style="font-weight: 400;"> and alarm about the model’s capabilities. The UK&#8217;s AI Security Institute, for instance, </span><a href="https://www.aisi.gov.uk/blog/our-evaluation-of-claude-mythos-previews-cyber-capabilities"><span style="font-weight: 400;">found</span></a><span style="font-weight: 400;"> that while Mythos Preview can execute multi-stage attacks on vulnerable networks and discover and exploit vulnerabilities autonomously, its demonstrated capability is currently limited to small, weakly defended, and vulnerable enterprise systems, leaving open whether the model could successfully attack hardened environments with active defenders and detection tooling. On the other hand, Check Point warned that &#8220;the time-to-exploit window will collapse to near zero.&#8221; CrowdStrike&#8217;s CTO stated that &#8220;the window between a vulnerability being discovered and being exploited by an adversary has collapsed.&#8221; Thomas Ptacek, in</span><a href="https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/"> <span style="font-weight: 400;">an essay</span></a><span style="font-weight: 400;"> titled &#8220;Vulnerability Research Is Cooked,&#8221; argued that the economics of exploit development have been fundamentally altered. Anthropic itself</span><a href="https://red.anthropic.com/2026/mythos-preview/"> <span style="font-weight: 400;">frames the situation</span></a><span style="font-weight: 400;"> as a race: give defenders a head start before equivalent capabilities proliferate within</span><a href="https://www.euronews.com/next/2026/04/08/why-anthropics-most-powerful-ai-model-mythos-preview-is-too-dangerous-for-public-release"> <span style="font-weight: 400;">six to eighteen months</span></a><span style="font-weight: 400;">. But eventually, they “expect that defense capabilities will dominate: that the world will emerge more secure, with software better hardened.”</span></p>
<p><span style="font-weight: 400;">This last quote gets at the more interesting governance question beneath the headlines. Project Glasswing is an institutional response to a technological shift that could reshape the vulnerability management ecosystem. Understanding this requires tracing how the bottleneck in cybersecurity&#8217;s value chain is migrating from discovery to remediation.</span></p>
<h2><span style="font-weight: 400;">The Discovery Premium Is Gone</span></h2>
<blockquote><p><i><span style="font-weight: 400;">Prompt: A recent article on Anthropic&#8217;s Mythos model touts its vulnerability discovery capabilities, with a red-team researcher ominously saying, “We basically need to start, right now, preparing for a world where there is zero lag between discovery and exploitation.” While increasing capabilities can certainly be used for malicious purposes, a very significant and functional bug bounty market exists today. Attached is some information about Mythos&#8217; capabilities and costs to find vulnerabilities. Assuming an increase in the supply of vulnerabilities because of these new model(s), how would the more rapid discovery of vulnerabilities impact that market? </span></i></p></blockquote>
<p><span style="font-weight: 400;">The bug bounty market — valued at roughly $1.2 billion in 2024 and projected to grow to nearly $4 billion by 2032 — was built on a simple premise: vulnerability discovery was <a href="https://threatpost.com/no-more-free-bugs-software-vendors-032309/72484/">scarce</a>. Finding a critical bug in a hardened codebase required elite human attention, deep domain expertise, and significant time investment. Organizations can pay large bounties per finding because the supply of people who can produce those findings is limited, and their opportunity costs are high.</span></p>
<p><span style="font-weight: 400;">The Mythos system card reports cost data that demolishes this premise. As noted, a full scan of the OpenBSD codebase — one thousand runs across the repository — cost under $20,000 and yielded several dozen findings, including a 27-year-old vulnerability in one of the most security-focused operating systems in existence. The specific run that discovered the critical TCP SACK bug cost under $50. A scan of FFmpeg, one of the most thoroughly fuzzed projects in the world, cost roughly $10,000 across several hundred runs and found a 16-year-old vulnerability that had been hit five million times by automated testing tools without being caught. Converting a known Linux kernel vulnerability into a working root privilege escalation exploit — a task that historically takes skilled researchers days to weeks — took the model under a day at a cost of under $2,000.</span></p>
<p><a href="https://www.internetgovernance.org/?attachment_id=10483" rel="attachment wp-att-10481"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-10483 size-medium" src="https://www.internetgovernance.org/wp-content/uploads/1-before-discovery-premium-1-800x294.png" alt="" width="800" height="294" srcset="https://www.internetgovernance.org/wp-content/uploads/1-before-discovery-premium-1-800x294.png 800w, https://www.internetgovernance.org/wp-content/uploads/1-before-discovery-premium-1-768x282.png 768w, https://www.internetgovernance.org/wp-content/uploads/1-before-discovery-premium-1.png 1360w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p><span style="font-weight: 400;">Given these economics, the per-vulnerability bounty model faces a classic supply shock. When the marginal cost of discovering a critical vulnerability drops from thousands or tens of thousands of dollars in researcher time to tens of dollars in API credits, the price structure that sustained the bounty ecosystem erodes. The low-hanging fruit that historically funded early-career security researchers will be found by AI first. The market won&#8217;t disappear, but it will bifurcate: commodity vulnerability discovery will be absorbed into automated scanning services, while the remaining human bounty work will concentrate on findings that models still struggle with — business logic flaws, social engineering vectors, and the complex interactions between systems that no single codebase can reveal.</span></p>
<h2><span style="font-weight: 400;">The Bottleneck Migrates Upstream</span></h2>
<blockquote><p><i><span style="font-weight: 400;">Prompt: Let&#8217;s assume that Mythos and similar emerging models essentially are a substitute for identifying vulnerabilities. Presumably, these models can also be used for creating patches for those vulnerabilities, as explained in this work: https://team-atlanta.github.io/blog/post-patch-2026-ensemble/  The new bottleneck appears to be verification of patches.</span></i></p></blockquote>
<p><span style="font-weight: 400;">If discovery is effectively commoditized, where does the supply bottleneck move? The obvious next candidate is patch generation — and here, </span><a href="https://team-atlanta.github.io/blog/post-patch-2026-ensemble/"><span style="font-weight: 400;">recent work</span></a><span style="font-weight: 400;"> from Team Atlanta, a group of researchers from Georgia Tech, Samsung Research, KAIST, and POSTECH that won </span><a href="https://aicyberchallenge.com/"><span style="font-weight: 400;">DARPA’s AI Cyber Challenge (AIxCC)</span></a><span style="font-weight: 400;">, provides important data.</span></p>
<p><span style="font-weight: 400;">Their evaluation tested ten agent configurations — combining four coding agent frameworks (Claude Code, Codex CLI, Copilot, Gemini CLI) with five frontier models — on 63 real crashes from the DARPA AIxCC competition. The results show that AI-generated patching has progressed remarkably fast. The best configurations now produce semantically correct patches for roughly 71% of real-world vulnerabilities, up from about 52% just one year earlier. Model choice matters more than framework choice, and the improvement trajectory is steep.</span></p>
<p><a href="https://www.internetgovernance.org/2026/04/16/ai-project-glasswing-and-the-changing-institutional-economics-of-bugs/2-after-verification-bottleneck/" rel="attachment wp-att-10480"><img decoding="async" class="aligncenter size-medium wp-image-10480" src="https://www.internetgovernance.org/wp-content/uploads/2-after-verification-bottleneck-800x282.png" alt="" width="800" height="282" srcset="https://www.internetgovernance.org/wp-content/uploads/2-after-verification-bottleneck-800x282.png 800w, https://www.internetgovernance.org/wp-content/uploads/2-after-verification-bottleneck-768x271.png 768w, https://www.internetgovernance.org/wp-content/uploads/2-after-verification-bottleneck.png 1360w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p><span style="font-weight: 400;">But patching isn&#8217;t the real bottleneck either. The actual bottleneck is *verification* — confirming that a generated patch actually fixes the root cause without breaking anything else. Even the best agent configuration in Team Atlanta&#8217;s evaluation still produces around 20% semantically incorrect patches. These are patches that pass every automated check — compilation, test suites, crash replay — but are actually wrong. The failure modes are revealing. The most common involves functionality being altered or broken: the patch fixes the bug but changes normal program behavior in unintended ways. The second most common is patching the symptom rather than the root cause — enlarging a buffer to prevent an overflow instead of fixing the underlying off-by-one miscalculation, or resetting a dangling pointer at the crash site rather than fixing initialization in the common API where the pointer should have been set. Other failures involve insufficient guard conditions, wrong API usage that violates trust boundaries, or fundamentally incorrect mitigation strategies.</span></p>
<p><a href="https://www.internetgovernance.org/?attachment_id=10479" rel="attachment wp-att-10480"><img decoding="async" class="aligncenter wp-image-10479 size-medium" src="https://www.internetgovernance.org/wp-content/uploads/3-why-verification-resists-automation-800x424.png" alt="" width="800" height="424" srcset="https://www.internetgovernance.org/wp-content/uploads/3-why-verification-resists-automation-800x424.png 800w, https://www.internetgovernance.org/wp-content/uploads/3-why-verification-resists-automation-768x407.png 768w, https://www.internetgovernance.org/wp-content/uploads/3-why-verification-resists-automation.png 1360w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p><span style="font-weight: 400;">Every one of these failure modes requires contextual judgment to detect: understanding the specification, the security model, the trust boundaries between components, and the upstream behavioral implications of a code change. Test suites validate behavior against existing expectations, not the correctness of the security property being preserved. This is precisely the kind of judgment that remains expensive, scarce, and stubbornly human (hey, hire a GT Cybersecurity grad!).</span></p>
<p><span style="font-weight: 400;">Team Atlanta&#8217;s &#8220;ensemble approach&#8221; — running multiple agents, collecting all patches that pass automated validation, and having a selector model choose the best one — improves semantic correctness rates. But it doesn&#8217;t eliminate the problem. And the researchers&#8217; own methodology reveals the constraint: they manually reviewed all 630 generated patches and cross-validated 456 of them. The evaluation scope was limited by the human review bottleneck, not by computational cost. Models can find vulnerabilities and generate patches all day at a lower cost. For now, the constraint is judgment and having humans qualified to assess whether those patches are correct.</span></p>
<h2><span style="font-weight: 400;">Glasswing as Transitional Institution</span></h2>
<blockquote><p><i><span style="font-weight: 400;">Prompt: In light of the anticipated impacts on the market, the announced institutional response, Project Glasswing, is interesting. It is unclear whether this approach would be a substitute for bug bounty markets or a complementary function, allowing vulnerabilities that enable zero-day exploits to be mitigated outside of the market mechanism.</span></i></p></blockquote>
<p><span style="font-weight: 400;">This bottleneck migration reframes what Project Glasswing actually is. The conventional reading positions it as a vulnerability discovery initiative — Anthropic gives partners access to Mythos so they can find bugs in their systems before attackers do. But if discovery is cheap and getting cheaper, the scarce resource Glasswing actually organizes isn&#8217;t model access. It&#8217;s the institutional capacity to close the loop from discovery through *verified remediation*.</span></p>
<p><span style="font-weight: 400;">Consider the partner list. The twelve Glasswing organizations aren&#8217;t just large technology firms — they are the entities with the deepest institutional knowledge of their own codebases and application of AI to cybersecurity. Apple can verify whether a macOS patch preserves intended security properties in ways that no external researcher or automated system can replicate. The Linux kernel maintainers can assess whether a proposed fix to the TCP stack introduces subtle behavioral changes that would break upstream consumers. The value of the club isn&#8217;t only vulnerability identification; it&#8217;s the human and organizational expertise required for the verification step that AI can&#8217;t yet reliably perform.</span></p>
<p><span style="font-weight: 400;">This is a fundamentally different institutional form than the bug bounty market. Bug bounties are a &#8220;flow&#8221; mechanism: they provide continuous, decentralized incentives for independent researchers to find new vulnerabilities as software evolves. Glasswing appears to be addressing the &#8220;stock&#8221; problem — the accumulated backlog of undiscovered vulnerabilities in critical, long-lived codebases — through a coordination effort that integrates discovery, patching, and verification under a managed process. The system card&#8217;s showcase findings are paradigmatic stock problems: vulnerabilities that persisted for 16, 17, and 27 years despite decades of human review and automated testing.</span></p>
<p><span style="font-weight: 400;">But Glasswing&#8217;s institutional structure also reveals tensions. It concentrates several roles — discoverer, disclosure coordinator, and capability gatekeeper — in a single organization. In the bounty market, these roles are distributed across independent actors: the researcher discovers, the platform triages, the vendor patches. Glasswing bundles them. Anthropic acknowledges the resulting coordinated disclosure management challenge: fewer than 1% of discovered vulnerabilities have been patched, and they had to hire professional security contractors to manage the validation pipeline. The announcement that it &#8220;may become necessary to relax our stringent human-review requirements&#8221; is a direct acknowledgment that the verification bottleneck is binding even within Glasswing&#8217;s coordination.</span></p>
<h2><span style="font-weight: 400;">What Comes Next</span></h2>
<blockquote><p><i><span style="font-weight: 400;">Prompt: Project Glasswing as an institutional response to technological change, i.e., the Mythos model, and the bottleneck migrating upstream from vulnerability discovery to patch verification.</span></i></p></blockquote>
<p><span style="font-weight: 400;">The key analytical question is whether the verification bottleneck is permanent or transitional, and how it will be governed. Team Atlanta&#8217;s data shows semantic correctness improving from ~62% to ~80% in roughly one year. If that trajectory continues — and the general trend in frontier model improvement suggests it might — then verification too may become largely automatable within a few model generations, perhaps through adversarial model-on-model verification pipelines where one model generates patches, another red-teams them, and a third adjudicates like the Team Atlanta ensemble approach which already demonstrates that contrasting multiple candidate patches is informative for quality assessment.</span></p>
<p><span style="font-weight: 400;">If verification does become automatable, the entire discovery-patch-verify pipeline runs end-to-end with minimal human intervention. However, there remains a fundamental human role, a genuinely hard problem that none of this current work touches: deciding which vulnerabilities *matter*, how to prioritize remediation across an organization&#8217;s full attack surface, and how to manage the systemic risk of thousands of simultaneous patches hitting production systems. Those aren’t technically solvable problems.</span></p>
<p><span style="font-weight: 400;">In the near term, several market-level consequences seem likely. The bug bounty market won&#8217;t disappear but will restructure around verified remediation rather than raw discovery. Bounty programs that pay for a discovered vulnerability, plus a validated patch, plus reproduction steps, will be more valuable than those that pay only for vulnerabilities. The platforms that survive will be the ones that pivot from brokering human research to orchestrating AI-augmented scanning with human verification in the loop. The professional services market for patch verification will grow, favoring firms with deep codebase-specific expertise.</span></p>
<p><span style="font-weight: 400;">As Anthropic notes, Glasswing itself is best understood now as a transitional institution — an attempt to manage a capability discontinuity during the period when existing market institutions haven&#8217;t yet adapted. Its familiar club structure makes sense for the current moment: the capability is restricted, the verification bottleneck demands insider knowledge, and the urgency of burning down the stock of latent vulnerabilities in critical software infrastructure justifies coordinated action outside normal market mechanisms. But if Mythos-class capabilities proliferate as expected, the club model becomes untenable because the underlying capability is no longer scarce enough to restrict.</span></p>
<p><span style="font-weight: 400;">What persists after the transition will depend on whether Glasswing evolves into a durable networked governance structure that provides value by providing disclosure pipelines, deconflicting simultaneous discovery, building robust automated and human verification capabilities, and helping manage any systemic risks of producing AI-driven (in)security at scale. The history of similar arrangements in cybersecurity — early ISACs, the Conficker Working Group, M3AAWG, the Cyber Threat Alliance — suggests clubs can persist beyond their initial formation, but only if they provide ongoing coordination value that individual actors can&#8217;t replicate on their own or with market transactions.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.internetgovernance.org/2026/04/16/ai-project-glasswing-and-the-changing-institutional-economics-of-bugs/">AI, Project Glasswing, and the Changing Institutional Economics of Bugs</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.internetgovernance.org/2026/04/16/ai-project-glasswing-and-the-changing-institutional-economics-of-bugs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>India’s crude Internet censorship regime</title>
		<link>https://www.internetgovernance.org/2026/04/07/indias-crude-internet-censorship-regime/</link>
					<comments>https://www.internetgovernance.org/2026/04/07/indias-crude-internet-censorship-regime/#respond</comments>
		
		<dc:creator><![CDATA[Karan Saini]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 14:34:22 +0000</pubDate>
				<category><![CDATA[Free Expression Online]]></category>
		<category><![CDATA[Internet Identifiers]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10468</guid>

					<description><![CDATA[<p>Sections 69A and 79 of the Information Technology Act, 2000, empower the indian government to issue blocking orders to ISPs and intermediaries. The licensing agreement for ISPs explicitly requires that they “block Internet sites […] as identified and directed by the Licensor from time to time.” ISPs are confidentially bound to the blocking orders they [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/04/07/indias-crude-internet-censorship-regime/">India’s crude Internet censorship regime</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">Sections 69A and 79 of the Information Technology Act, 2000, empower the indian government to issue blocking orders to ISPs and intermediaries. The licensing agreement for ISPs explicitly requires that they “block Internet sites […] as identified and directed by the Licensor from time to time.” ISPs are confidentially bound to the blocking orders they receive and implement. In copyright and trademark dispute-related cases, blocking orders are made public as part of court orders. The blocking of websites usually only comes to light when users notice it is inaccessible and raise questions — such as what happened when <a href="https://supabase.com/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=23317752603&amp;device=c&amp;gad_source=1&amp;gad_campaignid=23317752603&amp;gclid=Cj0KCQjws83OBhD4ARIsACblj19ZyB-E2x0uG1xC7ifv9F4-HkhIVhbbaVkQHtMlDrDZNKdeu2YFi08aAmNcEALw_wcB">Supabas</a>e was recently blocked. In some instances, the government may choose to announce its blocking actions, such as when it announced the blocking of <a href="https://www.reuters.com/article/technology/india-retains-ban-on-59-chinese-apps-including-tiktok-idUSKBN29U2G6/">59 Chinese application</a>s including TikTok in 2020. </span><span data-ccp-props="{}"> </span></p>
<h2><span data-contrast="auto">My study of blocking</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></h2>
<p><span data-contrast="auto">To understand the scale of website blocking in India, I queried the DNS servers of six major and regional ISPs to test the censorship of 294 million domains, representing nearly the entire visible domain name space. These tests were carried out over many months in 2025 and contribute to the largest study of DNS-level website blocking in India to date. The study quantifies what previous qualitative research on Internet censorship in India has shown. Despite receiving the same blocking orders, not all ISPs block the same websites.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-contrast="auto">Inconsistent results</span><span data-ccp-props="{}"> </span></h2>
<p><span data-contrast="auto">Out of the total 43,083 blocked domain names found by the study, only 1,414 were blocked by all six ISPs. This is caveated by the fact that some of the ISPs surveyed may be using other abovementioned protocols to block these domains, which the study does not cover. What is clear however is that at least on the DNS layer, domains are treated inconsistently based on the category of content they host. Piracy, peer-to-peer file sharing, pornography and gambling websites make up the majority of what is blocked, yet blocks are not consistently enforced across ISPs. For domains hosting terrorism and militancy content, blocking consistency across ISPs goes up dramatically. Perfect consensus can be seen in certain sensitive cases, such as the blocking of China’s Weibo.com or the website of Srinagar-based publication The Kashmir Walla, showing that some orders are treated more seriously than others. Along with this, almost all ISPs appear to engage in arbitrary blocking in some form.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">While highlighting only some notable blocks, the study shows the haphazard way in which both regional and national ISPs are currently implementing blocking orders. In the absence of a standardised framework or guidelines, ISPs are left to their own devices, resulting in an inconsistent blocking landscape. A domain blocked by one provider may be freely accessible through another, undermining the stated rationale for blocking while still infringing on the rights of users served by the more aggressive ISP. Domains officially ordered unblocked continue to remain blocked by some ISPs in clear defiance of orders, but without penalty to ISPs or respite for operators of such websites.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-contrast="auto">Needlessly opaque </span><span data-ccp-props="{}"> </span></h2>
<p><span data-contrast="auto">Inconsistency is not the only problem however. The regime is needlessly opaque. An ideal system would see disclosure of blocked domains from the source, with exceptions only for sensitive matters such as those concerning national security and websites hosting child sexual abuse material. A perfect example of this is the many malicious domains found blocked by the study, which is arguably in the public interest, but which cannot be distinguished from overreach without disclosure. The Supreme Court in Shreya Singhal v. Union of India (2015) upheld Section 69A but emphasised procedural safeguards, including a review committee and the right of affected parties to be heard. In practice, neither can operate meaningfully as long as the system runs like patchwork.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto"><strong>Karan Saini</strong> is an independent security researcher from New Delhi, and the author of the “Poisoned Wells” report, available at <a href="https://dnsblocks.in">dnsblocks.in</a></span><span data-ccp-props="{}"> </span></p>
<p>The post <a href="https://www.internetgovernance.org/2026/04/07/indias-crude-internet-censorship-regime/">India’s crude Internet censorship regime</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.internetgovernance.org/2026/04/07/indias-crude-internet-censorship-regime/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Cybersecurity: The FCC Router Ban</title>
		<link>https://www.internetgovernance.org/2026/03/28/fake-cybersecurity-the-fcc-router-ban/</link>
					<comments>https://www.internetgovernance.org/2026/03/28/fake-cybersecurity-the-fcc-router-ban/#respond</comments>
		
		<dc:creator><![CDATA[Milton Mueller]]></dc:creator>
		<pubDate>Sat, 28 Mar 2026 22:48:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Digital Trade]]></category>
		<category><![CDATA[Geopolitics of IG]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10462</guid>

					<description><![CDATA[<p>On March 23, 2026, the Federal Communications Commission (FCC) issued a Memorandum and Order banning the import of “covered” consumer-grade networking hardware. The decision demonstrates once again how the Trump administration&#8217;s economic nationalism and its use of “national security” claims as a basis for arbitrary executive-branch actions are having disastrous effects on the global digital [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/03/28/fake-cybersecurity-the-fcc-router-ban/">Fake Cybersecurity: The FCC Router Ban</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">On March 23, 2026, the Federal Communications Commission (FCC) issued a </span><a href="https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf"><span data-contrast="none">Memorandum and Order banning the import of “covered” consumer-grade networking hardware</span></a><span data-contrast="auto">. The decision demonstrates once again how the Trump administration&#8217;s economic nationalism and its use of “national security” claims as a basis for arbitrary executive-branch actions are having disastrous effects on the global digital economy, while doing nothing to improve cybersecurity.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">The </span><a href="https://www.congress.gov/bill/116th-congress/house-bill/4998"><span data-contrast="none">Secure and Trusted Communications Networks Act of 2019</span></a><span data-contrast="auto"> required the FCC to maintain a list of communications equipment if someone in the government thinks it poses a risk to national security. Previous iterations of this list target specific corporate entities like Huawei, ZTE, or Hikvision. Last week’s action expanded the &#8220;Covered List&#8221; to include ordinary household internet equipment, not specific companies, based </span><span data-contrast="auto">entirely on foreign origin.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240}"> </span></p>
<h2 aria-level="2"><span data-contrast="none">What is banned?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">The ban targets new</span><span data-contrast="auto"> Small Office/Home Office (SOHO) routers, Wi-Fi extenders, and mesh systems. These devices can be found in practically every American home. The import ban includes any device where the &#8220;critical manufacturing and firmware assembly&#8221; occurs within a jurisdiction designated as a foreign adversary (primarily the People&#8217;s Republic of China, Russia, and Iran). The leverage for the ban comes from the </span><span data-contrast="auto">FCC’s Equipment Authorization process. No new models from these regions can receive the &#8220;FCC ID&#8221; </span><span data-contrast="auto">required for legal sale in the U.S. The Defense Department or the Department of Homeland Security (DHS) can exempt a product by transmitting to the FCC a specific determination that a given router or class of routers do not pose such risks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">As of March 23, 2026,</span> <span data-contrast="auto">the FCC ceases all new equipment authorizations for covered devices. Starting in September 2026, retailers are prohibited from importing new inventory of covered devices. A year from now, </span><span data-contrast="auto">March 2027, the &#8220;Maintenance Waiver&#8221; expires, and even security patches for existing legacy devices must undergo a secondary federal audit if they originate from covered </span><span data-contrast="auto">jurisdictions.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">Fortunately, this bit of security theater does not apply to </span><span data-contrast="auto">hardware that is already authorized and currently in </span><span data-contrast="auto">consumers&#8217; homes, or in the retail channel. These products can continue to be a “national security threat.” It also does not apply to e</span><span data-contrast="auto">nterprise or carrier-grade equipment, which </span><span data-contrast="auto">remains governed by previous specific-entity bans. Certain sub-components (like passive capacitors or casing) are exempt, provided the &#8220;logic-bearing&#8221; components (SoCs and Firmware) are not of foreign-adversary origin.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h2 aria-level="2"><span data-contrast="auto">Legal Authorities </span></h2>
<p><span data-contrast="auto">The primary vehicle for this action is the Secure and Trusted Communications Networks Act of </span><span data-contrast="auto">2019;</span><span data-contrast="auto"> the law passed after an orchestrated and sustained U.S. intelligence community campaign portraying Huawei equipment as a </span><i><span data-contrast="auto">potential </span></i><span data-contrast="auto">(but never actualized) Trojan Horse. Additionally, the <a href="https://www.congress.gov/bill/117th-congress/house-bill/3919">Secure Equipment Act of 2021</a> prevents the FCC from reviewing or approving any authorization for equipment after it has been placed on the Covered List, effectively turning a &#8220;warning list&#8221; into a &#8220;market ban.&#8221;</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">Just as this new move will prove to be very costly to consumers, the &#8220;Rip and Replace&#8221; program authorized by the 2019 Act <a href="https://www.rcrwireless.com/20241218/policy/rip-and-replace-funding">generated a massive funding shortfall</a></span><span data-contrast="auto">. </span><span data-contrast="auto">While the law initially estimated costs at $1 billion, and Congress appropriated $1.9 billion, the actual requests from carriers totaled nearly </span>$5 billion<span data-contrast="auto">. Many small carriers started &#8220;ripping&#8221; without enough money to finish the &#8220;replacing,&#8221; leading to concerns about service outages in rural areas. In the years preceding this farce, not a single compromise of American telecom networks or data were attributable to the use of Huawei gear. On the other hand, dozens of Chinese-instigated compromises occurred by means of compromises of American-made software and phishing.</span></p>
<h2 aria-level="2"><span data-contrast="none">Factual Studies and Intelligence Reports</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">To support its decision, the FCC cited two primary types of evidence. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240}"> </span></p>
<ol>
<li><b><span data-contrast="auto">The &#8220;Typhoon&#8221; Campaign Reports:</span></b><span data-contrast="auto"> Intelligence from </span><span data-contrast="auto">CISA </span><span data-contrast="auto">and the </span><span data-contrast="auto">FBI </span><span data-contrast="auto">regarding </span><i><span data-contrast="auto">Volt Typhoon</span></i><span data-contrast="auto"> and </span><i><span data-contrast="auto">Salt Typhoon</span></i><span data-contrast="auto">. These reports detailed how state-sponsored actors hijacked thousands of SOHO routers to create a &#8220;botnet&#8221; that obfuscated attacks on U.S. power grids and water systems.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">The 2025 Supply Chain Audit:</span></b><span data-contrast="auto"> A Department of Commerce study argued that the concentration of 85% of the consumer router supply chain in China creates a &#8220;systemic vulnerability&#8221; where a single firmware update could be weaponized to disable U.S. home internet access.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ol>
<p><span data-contrast="auto">Just as the Huawei and TikTok scares played on the general public’s ignorance of actual cybersecurity risks and vulnerabilities, the new FCC ban follows the same pattern.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> These reports do not provide evidence for the policy.</span></p>
<h2 aria-level="2"><span data-contrast="none">Deconstructing the &#8220;Foreignness&#8221; Fallacy</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">The central logical pillar of the FCC ban is that the </span><span data-contrast="auto">origin of manufacture</span><span data-contrast="auto"> is the primary determinant of risk. However, an empirical look at the &#8220;Typhoon&#8221; intrusions reveals a profound disconnect between this premise and the technical reality.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">Vulnerabilities vs. Backdoors.</span></b><span data-contrast="auto"> The FCC justifies the ban on the potential for &#8220;backdoors&#8221;—intentional entry points built at the factory. Yet, in the history of the </span><i><span data-contrast="auto">Volt Typhoon</span></i><span data-contrast="auto"> and </span><i><span data-contrast="auto">Flax Typhoon</span></i><span data-contrast="auto"> campaigns, </span><span data-contrast="auto">not a single instance of a hardware-level manufacturing backdoor was identified. </span><span data-contrast="auto">Instead, these actors exploited:</span><span data-ccp-props="{}"> </span></p>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Unpatched Software Bugs</span><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> Standard coding errors (CVEs) that exist in software globally.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Weak Credentials</span><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> Default &#8220;admin/admin&#8221; passwords in cheap devices that users never changed.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Management Interfaces: Ports left open to the public internet due to poor user configuration or &#8220;Secure-by-Design&#8221; failures.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><b><span data-contrast="auto">The Geography of Code. </span></b><span data-contrast="auto">The digital economy</span><span data-contrast="auto"> is global. A router &#8220;Made in the USA&#8221; likely runs a Linux kernel maintained by global contributors, uses Wi-Fi drivers written in Taiwan, and incorporates open-source libraries managed by developers worldwide. By focusing on the geographic location of the assembly line, the FCC ignores the logical supply chain of the software. A U.S.-assembled router with a poorly written UPnP (Universal Plug and Play) implementation is just as vulnerable to a hijacking as a foreign one.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">If one looks at the </span><a href="https://media.defense.gov/2024/Sep/18/2003547016/-1/-1/0/CSA-PRC-LINKED-ACTORS-BOTNET.PDF"><span data-contrast="none">Cybersecurity Advisory</span></a><span data-contrast="auto"> issued by DHS, NSA, and other agencies about the botnets used by the Chinese, one finds that U.S.-based processor architectures were involved in over 90% of the compromises, and that vendors and products like Juniper, Apache, Linux, Fortinet, Atlassian and others not located or headquartered in “adversary nations” were exploited.</span><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="auto">Targeting New Devices instead of Legacy Ones? </span></b></h2>
<p><span data-contrast="auto">Perhaps the most obvious lack of logic in the FCC’s policy is its exclusive focus on </span><i><span data-contrast="auto">new </span></i><span data-contrast="auto">equipment authorizations while leaving legacy devices in place. Empirical data from cybersecurity firms consistently shows that older devices are significantly more vulnerable than new ones.</span><span data-ccp-props="{}"> </span></p>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">End-of-Life (EOL) Status:</span></b><span data-contrast="auto"> The </span><i><span data-contrast="auto">Volt Typhoon</span></i><span data-contrast="auto"> campaign specifically targeted &#8220;End-of-Life&#8221; routers because they no longer receive security patches.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Legacy Protocols:</span></b><span data-contrast="auto"> Older routers often use outdated encryption (WEP/WPA) and lack modern hardware-level protections like </span><span data-contrast="auto">Secure Boot </span><span data-contrast="auto">or Trusted Platform Module (TPM).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">By banning the sale of the newest, most secure Wi-Fi 7 and Wi-Fi 8 routers from dominant foreign manufacturers, the FCC forces the American public to pay substantially more for upgraded, more secure equipment or, what is more likely, to </span><span data-contrast="auto">keep their older, more vulnerable devices for longer.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">If a consumer cannot easily or affordably replace their 2019-era router because the 2026 models are banned, the </span><i><span data-contrast="auto">total attack surface of the United States actually increases</span></i><span data-contrast="auto">. The ban targets the very devices most likely to have modern, auto-updating security features, while providing a &#8220;free pass&#8221; to the millions of insecure, aging devices that state-sponsored actors are currently exploiting.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">The FCC’s decision assumes that manufacturing origin is the primary risk factor. However, cybersecurity data suggests that device age and software support are far more critical indicators of whether a router will be compromised.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240}"> </span></p>
<table data-tablestyle="MsoTableGrid" data-tablelook="1696" aria-rowcount="5">
<tbody>
<tr aria-rowindex="1">
<td data-celllook="0"><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><b><span data-contrast="auto">Modern Wi-Fi 7 </span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></td>
<td data-celllook="0"><b><span data-contrast="auto">Modern Wi-Fi 6</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></td>
<td data-celllook="0"><b><span data-contrast="auto">Legacy Wi-Fi</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></td>
</tr>
<tr aria-rowindex="2">
<td data-celllook="0"><span data-contrast="auto">Encryption Standard</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">WPA 3 (mandatory)</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">WPA3 supported</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">WPA2 (vulnerable)</span><span data-ccp-props="{}"> </span></td>
</tr>
<tr aria-rowindex="3">
<td data-celllook="0"><span data-contrast="auto">Update support</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">Active (auto-updates)</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">Active</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">End of life (None)</span><span data-ccp-props="{}"> </span></td>
</tr>
<tr aria-rowindex="4">
<td data-celllook="0"><span data-contrast="auto">Hardware Security</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">Secure Boot / TPM</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">Firmware signing</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">Minimal/None</span><span data-ccp-props="{}"> </span></td>
</tr>
<tr aria-rowindex="5">
<td data-celllook="0"><span data-contrast="auto">Risk</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">Low</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">Moderate if patched</span><span data-ccp-props="{}"> </span></td>
<td data-celllook="0"><span data-contrast="auto">High</span><span data-ccp-props="{}"> </span></td>
</tr>
</tbody>
</table>
<p><span data-contrast="auto">All new </span><a href="https://google.com/search?q=Be3200+Wi-Fi+7+Range+Extender+Re223be+w/Ethernet+Port+%7C+3.2+Gbps+Dual-Band+Wireless+Repeater+%7C+Internet+Signal+Booster+for+Home+%7C+Up+to+2400+sq.ft,+64&amp;prds=headlineOfferDocid%3A11350159382039194497%2Cproductid%3A11350159382039194497%2Cpvo%3A38%2Cpvt%3Ahg&amp;ibp=oshop&amp;pvo=38&amp;opi=103135050&amp;gl=US&amp;hl=en&amp;noiga=1"><span data-contrast="none">Wi-Fi 7</span></a><span data-contrast="auto"> and most Wi-Fi 6 devices utilize WPA3, which protects against common &#8220;offline&#8221; password-cracking attacks. Many legacy devices in homes rely on WPA2, which has known architectural flaws like the KRACK vulnerability.  Modern hardware is designed to only run firmware that has been digitally signed by the manufacturer. This would have prevented the &#8220;Typhoon&#8221; actors from overwriting the router&#8217;s operating system with a malicious one. Most legacy routers targeted by the </span><span data-contrast="auto">KV-Botnet lacked </span><span data-contrast="auto">this physical protection. CISA and the FBI noted that the </span><span data-contrast="auto">Volt Typhoon </span><span data-contrast="auto">campaign specifically targeted </span><span data-contrast="auto">End-of-Life</span><span data-contrast="auto"> routers from Cisco and Netgear. These devices are technically &#8220;trusted&#8221; by the FCC because they were authorized years ago, yet they are the </span><span data-contrast="auto">most vulnerable </span><span data-contrast="auto">items on the network because they no longer receive security patches.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>
<h2 aria-level="2"><span data-contrast="none">Conclusion</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">By blocking the importation of modern Wi-Fi 7 equipment based solely on its &#8220;foreignness,&#8221; the FCC actually worsens the security situation. Incentives to upgrade to modern, more secure hardware are reduced, and users are encouraged to keep using unpatched legacy equipment—the exact hardware that state-sponsored actors have successfully weaponized for years. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Does this whole thing make any sense? It does it you see the FCC’s ban as an exercise in industrial policy disguised as cybersecurity. Netgear, a US-founded and headquartered company, </span><a href="https://www.nasdaq.com/articles/lobbying-update-60000-netgear-inc-lobbying-was-just-disclosed"><span data-contrast="none">has been lobbying</span></a><span data-contrast="auto"> the government on “cybersecurity and strategic competition with China.” Once again – as with the semiconductor export controls and the TikTok ban – we see the bootleggers seeking protection from competition hiding behind the religious banner of national security. While the risks of state-sponsored infrastructure attacks are real, the remedy chosen—a geographic ban on new hardware &#8211; prioritizes geopolitical decoupling over the immediate technical hardening of the American digital home.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p>The post <a href="https://www.internetgovernance.org/2026/03/28/fake-cybersecurity-the-fcc-router-ban/">Fake Cybersecurity: The FCC Router Ban</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.internetgovernance.org/2026/03/28/fake-cybersecurity-the-fcc-router-ban/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What Everyone Is Missing About Anthropic and the Pentagon</title>
		<link>https://www.internetgovernance.org/2026/03/08/what-everyone-is-missing-about-anthropic-and-the-pentagon/</link>
					<comments>https://www.internetgovernance.org/2026/03/08/what-everyone-is-missing-about-anthropic-and-the-pentagon/#respond</comments>
		
		<dc:creator><![CDATA[Seungtae Han]]></dc:creator>
		<pubDate>Sun, 08 Mar 2026 12:00:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[Platform Governance]]></category>
		<category><![CDATA[Privacy & Surveillance]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10450</guid>

					<description><![CDATA[<p>On February 27th, President Trump directed all federal agencies to cease using Anthropic&#8217;s technology after the company refused the Pentagon&#8217;s demand to allow lawful use of its AI models for mass domestic surveillance and fully autonomous weapons. Much of the current media coverage frames this dispute as a straightforward ethical conflict: a reckless Pentagon trying [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/03/08/what-everyone-is-missing-about-anthropic-and-the-pentagon/">What Everyone Is Missing About Anthropic and the Pentagon</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On February 27th, President Trump directed all federal agencies to cease using Anthropic&#8217;s technology after the company refused the Pentagon&#8217;s demand to allow lawful use of its AI models for mass domestic surveillance and fully autonomous weapons. Much of the current media coverage frames this dispute as a straightforward ethical conflict: a reckless Pentagon trying to weaponize AI versus a principled company standing firm on responsible use.</p>
<p>While this framing is not entirely wrong, it misses what is most important. The real stakes lie not in whether Anthropic was right to refuse, but in what this confrontation reveals about the deeper structural challenges of governing AI in high-stakes environments. This post examines three of them. First, the Pentagon&#8217;s demands are dangerous not because they cross obvious legal lines, but because flexible AI use policies erode human judgment in ways that are hard to see and harder to reverse. Second, Anthropic&#8217;s understanding of AI safety as something built into the programming of the model created the paradox at the heart of this dispute. And third, why this confrontation reveals the need for governance frameworks that do not leave principled companies to stand alone.</p>
<h2>What Happened?</h2>
<p>In July 2025, Anthropic signed a <a href="https://www.anthropic.com/news/anthropic-and-the-department-of-defense-to-advance-responsible-ai-in-defense-operations">$200 million contract</a> with the U.S. Department of Defense (DoD), and it was the first lab to integrate its models into mission workflows on classified networks. Through partnerships with Palantir Technologies, Claude Gov was cleared for classified military and intelligence tasks and became deeply embedded in Pentagon operations.</p>
<p>On February 24, Secretary Hegseth delivered a formal demand to Anthropic to remove all usage restrictions, including domestic surveillance and fully autonomous weapons, and grant the Pentagon the right to use <a href="https://www.anthropic.com/news/claude-gov-models-for-u-s-national-security-customers">Claude Gov model </a> &#8220;for all lawful purposes&#8221;. The threatened consequences for refusal were termination of contract, designation as a <a href="https://www.anthropic.com/news/statement-comments-secretary-war">supply chain risk</a> to national security, and the potential invocation of the Defense Production Act of 1950. <a href="https://www.anthropic.com/news/statement-department-of-war">Anthropic CEO Dario Amodei </a>refused, stating that DoD made virtually no progress on preventing Claude&#8217;s use for mass surveillance of Americans or to control fully autonomous weapons, and that the company &#8220;cannot in good conscience&#8221; agree to allow the DoD to use its AI models in all lawful use cases.</p>
<p>President Trump ordered the U.S. government to stop using Claude and the Pentagon moved to designate the company a national security risk last Friday. However, less than 24 hours after Trump&#8217;s ban was announced, the <a href="https://www.timesofisrael.com/hours-after-trump-announced-ban-on-claude-ai-us-military-used-it-in-iran-strikes-reports/">DoD deployed Claude</a> to attack Iran on February 28.</p>
<h2>What does the Pentagon Want?</h2>
<p>We still do not know exactly what the Pentagon has done or wants to do with Claude. What we do know is that the Pentagon demanded Anthropic remove all usage restrictions and grant access to the model &#8220;for all lawful purposes&#8221;—with no exceptions. However, Anthropic’s refusal and the Pentagon&#8217;s stated concern that AI safety guardrails could impede military response in emergency situations allow us to infer the Pentagon&#8217;s intentions. The Pentagon is pursuing a higher degree of automation in both intelligence data processing and weapons systems—a vision in which AI operates with minimal human intervention.</p>
<p>Before advanced AI, raw data was simply too voluminous and fragmented to be useful for comprehensive surveillance. The government could purchase location data from smartphone apps, browsing histories from data brokers, or financial records from third parties—but analyzing it all at scale was difficult and time consuming. This is precisely the bottleneck the Pentagon seeks to eliminate. AI makes it possible to analyze massive datasets—geolocation, web browsing activity, financial transactions—and synthesize them into predictive portraits of individuals&#8217; lives, automatically and at scale.</p>
<p>The problem is that U.S. law has not caught up with the capabilities of modern AI. <a href="https://fortune.com/2026/03/02/openais-pentagon-deal-raises-new-questions-about-ai-and-mass-surveillance/">Under current law,</a> it is perfectly legal for government authorities to acquire massive amounts of data and use AI to analyze it—even though the result may, in effect, constitute mass surveillance of American citizens. For this reason, <a href="https://www.axios.com/2026/03/01/openai-pentagon-anthropic-safety">Anthropic asked</a> the Pentagon to explicitly include contract language prohibiting the bulk collection of Americans&#8217; publicly available information. The Pentagon refused.</p>
<p>The second red line concerns autonomous weapons. The Pentagon&#8217;s position is, in some respects, understandable. The realities of modern combat are fluid and fast-changing, and there are clear limits to human capacity for real-time decision-making in such environments. AI-enabled autonomous detection and strike systems are already operating on the<a href="https://www.csis.org/analysis/ukraines-future-vision-and-current-capabilities-waging-ai-enabled-autonomous-warfare"> battlefield in Ukraine</a>, demonstrating three to four times higher target engagement rates with lower human costs—sometimes without meaningful human oversight. The Pentagon&#8217;s goal is to reflect these battlefield realities. Because future combat scenarios are unpredictable, the military wants the flexibility to operate without pre-imposed restrictions—and it insists that private companies should not be in a position to dictate the terms under which AI is used in warfare.</p>
<p>It is also worth noting that Anthropic&#8217;s use of the term &#8220;<a href="https://www.chinatalk.media/p/autonomous-weapons-101-dario-v-hegseth">fully autonomous weapons&#8221; is technically imprecise</a>. Fully autonomous weapons—systems capable of independently making the decision to kill without any human involvement—do not yet exist.<a href="https://www.darpa.mil/research/programs/assured-autonomy"> The U.S. military defines</a> autonomy as &#8220;a system&#8217;s ability to accomplish goals independently or with minimal supervision in complex and unpredictable environments,&#8221; where the system refers to a subset of a broader weapons platform, not a decision-making authority unto itself. They therefore speak not of &#8220;autonomous weapons&#8221; but of autonomous systems or unmanned systems. In other words, while automated systems can exist to assist in decisions to kill, no weapons platform is designed to make that determination entirely on its own.</p>
<p>If the Pentagon&#8217;s push for more unrestricted and flexible AI use is legally permissible, operationally advantageous, and does not formally exclude human oversight—does that mean there is nothing to worry about? There are two issues here; the first has not been mentioned enough in the public media.</p>
<h2>Trying to build politics into technology</h2>
<p>Key to Anthropic’s ethos is the idea that their model can be engineered to prevent bad uses of their product &#8211; whether by the military or anyone else. In other words, they have bought into that school of AI safety (and of Science, Technology and Society studies) that believes that <a href="https://www.internetgovernance.org/research/standardizing-security-surveillance-human-rights-and-tls-1-3/">technology itself has politics</a> and that values and social controls can be reliably built into the technical system. This viewpoint focuses on technology design rather than social institutions to regulate human behavior with technology.</p>
<p>As controls on moral behavior, technology is a crude instrument. For example, reflecting its concern that Claude’s powerful programming capabilities might be used to develop bio weapons, the company programmed the model to refuse to handle the word “pathogen.” You can kill a Claude session dead by querying one of these refusal strings &#8211; a word or request that is considered so bad that it <a href="https://www.reddit.com/r/BetterOffline/comments/1r2e7tg/anthropic_test_refusal_string_kill_a_claude/">triggers a “hard off switch”</a> that causes the application to stop dead in its tracks.</p>
<p>The problem with these kinds of controls is that they lack the contextual nuance of real-world social activities. The Center for Disease Control, for example, has every reason to be searching for the word “pathogen” or doing research work on pathogens, and found this Claude restriction an impediment to its work. The Pentagon’s unnecessary, excessively punitive “supply chain risk” designation aside, the DoD has a legitimate concern that one of these restrictions built into Claude might stop it from doing something it needs to do.</p>
<h2>The risk of automation bias</h2>
<p>On the other hand, Anthropic&#8217;s resistance to giving the DoD a blank check is justifiable. The more flexible the terms of AI use, the more likely human operators are to gradually defer their own judgment to the machine—a tendency known as <a href="https://academic.oup.com/isq/article/68/2/sqae020/7638566?login=false">automation bias.</a></p>
<p>During negotiations, Anthropic asked the Pentagon to include stricter safety language in the newly proposed contract. But<a href="https://www.cbsnews.com/news/pentagon-anthropic-offer-ai-unrestricted-military-use-sources/"> the company found</a> that &#8220;new language framed as compromise was paired with legalese that would allow those safeguards to be disregarded at will.&#8221; In other words, even when restrictions on the use of Claude exist on paper, ambiguous contractual language makes them easy to bypass in practice. Over time, even if human involvement remains the stated principle, fewer and fewer operators will feel compelled to exercise independent judgment.</p>
<p>Overly flexible AI use policies create conditions under which human operators become increasingly reliant on autonomous systems—and in doing so, introduce a risk that is not primarily technical, but human: the error born of over-reliance. As<a href="https://www.anthropic.com/news/statement-department-of-war"> CEO Amodei emphasized</a>, &#8220;frontier AI systems are simply not reliable enough to power fully autonomous weapons.&#8221; In high-stakes military environments, the combination of unreliable AI and under-exercised human judgment could result in lethal mistakes—unintended escalation, misidentified targets, or mission failure precisely when it matters most.</p>
<p>The risks are even more pronounced in the context of mass surveillance. The U.S. government has already announced plans to use AI, through Palantir,<a href="https://www.americanimmigrationcouncil.org/blog/ice-immigrationos-palantir-ai-track-immigrants/"> to support ICE operations</a> targeting undocumented immigrants—tracking their real-time locations and financial activity. The concern here is not simply that the surveillance happens, but that without strict use guidelines, agents relying on this technology are far more likely to act on its outputs uncritically, increasing the risk of overreach and wrongful action. This is not hypothetical. In recent years, police departments that over-relied on<a href="https://www.washingtonpost.com/business/interactive/2025/police-artificial-intelligence-facial-recognition/"> AI-powered facial recognition</a> arrested the wrong people on multiple occasions. The pattern is consistent as when the rules governing AI use are vague, the humans operating within those rules tend to trust the machine more than they should.</p>
<p>Anthropic&#8217;s decision to walk away from the Pentagon&#8217;s request was, at its core, a recognition of this institutional vacuum and fully within its rights as a private business. Without strict guidelines capable of meaningfully reducing these risks, no contractual arrangement could be trusted to hold. What is needed is better institutions—clear legal frameworks, enforceable oversight mechanisms, and organizational cultures that actively resist the pull of automation bias.</p>
<h2>The Paradox of Anthropic&#8217;s Safety</h2>
<p>Anthropic&#8217;s willingness to stand up for its own public interest principles deserves praise. But few have examined a deeper paradox: the safer and more reliable an AI system becomes, the more valuable it is for military applications.</p>
<p>Unlike ChatGPT or Gemini, Claude was not primarily designed for everyday consumer tasks or commercial applications even though it is still general-purpose model. It is widely regarded as<a href="https://playcode.io/blog/chatgpt-vs-claude-vs-gemini-coding-2026"> strong in deep analysis, contextual reasoning, and complex coding tasks</a>. Anthropic has also been recognized for its advanced capabilities in<a href="https://claude.com/blog/claude-for-enterprise"> local AI deployment</a>—technology that allows the model to operate on a user&#8217;s own servers without sending data to external systems. These features were developed in the name of safety, privacy, and reliability. But paradoxically, they are precisely what makes Claude so attractive for military and intelligence work.</p>
<p>In intelligence operations, agencies must process and synthesize information from multiple sources. Deep analytical reasoning is essential for handling this volume of intelligence data, identifying patterns, and generating actionable insights. Contextual understanding allows the model to interpret ambiguous situations—exactly what is needed for operational planning and battlefield simulation. Strong coding capabilities enable rapid development of custom tools for cyber operations. Claude&#8217;s local deployment architecture also allows classified information to remain in secure government networks, and external data never enters the analytical environment. In comparison, a model like Gemini, which is deeply integrated with Google&#8217;s broader ecosystem, remains vulnerable to inbound contamination—where external information pollutes or distorts the integrity of classified analysis.</p>
<p>In other words, the very qualities that make Claude &#8220;safer&#8221; for civilian use are the same qualities that make it indispensable for warfare. For the average user, this level of privacy and local deployment capability is a nice-to-have, not a necessity; most people are perfectly comfortable using cloud-based AI services. But for military and intelligence applications, these features are attractive. Anthropic built an AI designed to be trustworthy, and in doing so, built exactly what the Pentagon needed.</p>
<p>This is the paradox at the heart of the dispute. The company now finds itself in the uncomfortable position of having created a tool so well-suited for national security applications that the government is unwilling to accept any restrictions on its use.</p>
<h2>Implications</h2>
<p>The dispute between Anthropic and the DoD is not merely a corporate contract negotiation gone wrong. It offers important lessons for the future development of AI governance frameworks. One key implication is that private companies should play a larger role in AI governance than they currently do. This may seem counterintuitive—shouldn&#8217;t democratic governments, not profit-driven corporations, set the rules for powerful technologies?</p>
<p>In practice, companies&#8217; internal safety policies are often far more detailed and technically grounded than most people assume. In many cases, it is the companies—not governments—that are most sensitive to AI risks and quickest to implement guardrails. Companies possess more granular information about their own systems and have strong incentives to understand the risks their products pose. Their business models depend on it. Anthropic is a case in point. The company recognized that the very features that made Claude attractive for military use also made it potentially dangerous if deployed without restrictions. Because Anthropic understood the lethality of its own model, it was able to refuse the Pentagon&#8217;s demands.</p>
<p>This suggests that AI governance should evolve not through sweeping state control, but through the strengthening of corporate safety frameworks—with appropriate transparency and accountability mechanisms to ensure those frameworks serve the public interest. But for such frameworks to hold, they cannot rely on corporate goodwill alone. The Anthropic episode demonstrates that a company willing to draw principled lines can be immediately undercut by a competitor willing to accommodate. What is needed, therefore, is not just better corporate guidelines, but institutional structures that incentivize and reinforce them—legal frameworks that reward companies for maintaining meaningful safety standards, shield them from retaliation when they push back against unreasonable demands, and raise the cost for those who abandon their principles under government pressure. Only then can companies like Anthropic stand their ground not as an act of courage, but as a matter of course.</p>
<p>The post <a href="https://www.internetgovernance.org/2026/03/08/what-everyone-is-missing-about-anthropic-and-the-pentagon/">What Everyone Is Missing About Anthropic and the Pentagon</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.internetgovernance.org/2026/03/08/what-everyone-is-missing-about-anthropic-and-the-pentagon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beyond Borders: How Threat Intelligence Provenance Can Save Global Cybersecurity From Geopolitical Fragmentation</title>
		<link>https://www.internetgovernance.org/2026/02/23/beyond-borders-how-threat-intelligence-provenance-can-save-global-cybersecurity-from-geopolitical-fragmentation/</link>
					<comments>https://www.internetgovernance.org/2026/02/23/beyond-borders-how-threat-intelligence-provenance-can-save-global-cybersecurity-from-geopolitical-fragmentation/#respond</comments>
		
		<dc:creator><![CDATA[Brenden Kuerbis]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 13:00:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Geopolitics of IG]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10439</guid>

					<description><![CDATA[<p>In mid-January 2026, the Chinese government allegedly announced a sweeping ban on cybersecurity software from more than a dozen U.S. and Israeli firms, including industry giants like Palo Alto Networks, CrowdStrike, and Check Point. The stated reason: concerns that foreign software could collect and transmit confidential information abroad. This move represents more than just another [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/02/23/beyond-borders-how-threat-intelligence-provenance-can-save-global-cybersecurity-from-geopolitical-fragmentation/">Beyond Borders: How Threat Intelligence Provenance Can Save Global Cybersecurity From Geopolitical Fragmentation</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">In mid-January 2026, the Chinese government allegedly </span><a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/"><span style="font-weight: 400;">announced a sweeping ban</span></a><span style="font-weight: 400;"> on cybersecurity software from more than a dozen U.S. and Israeli firms, including industry giants like Palo Alto Networks, CrowdStrike, and Check Point. The stated reason: concerns that foreign software could collect and transmit confidential information abroad.</span></p>
<p><span style="font-weight: 400;">This move represents more than just another salvo in ongoing tech tensions between the two governments. It threatens to fracture </span><a href="https://academic.oup.com/isr/article-abstract/15/1/86/1795371"><span style="font-weight: 400;">a foundational practice</span></a><span style="font-weight: 400;"> of internet cybersecurity: the global threat intelligence ecosystem that allows defenders worldwide to collect, analyze, and share information about emerging attacks and responses to cyber threats that know no borders.</span></p>
<p><span style="font-weight: 400;">But there’s a way forward. Recent research from Georgia Tech reveals both the problem and a potential solution: provenance could allow threat intelligence to remain global even as geopolitical tensions push nations toward digital isolation.</span></p>
<h3><b>A Competitive Ecosystem Under Threat</b></h3>
<p><span style="font-weight: 400;">Threat intelligence is produced in a complex cybersecurity institutional landscape, governed at the organizational, national, and transnational levels. Most cybersecurity practitioners understand that threat intelligence—information about malware, malicious infrastructure, and attacker TTPs—flows through </span><a href="https://www.usenix.org/conference/usenixsecurity19/presentation/li"><span style="font-weight: 400;">a complex network of actors</span></a><span style="font-weight: 400;">, can be </span><a href="https://www.usenix.org/conference/usenixsecurity20/presentation/bouwman"><span style="font-weight: 400;">difficult to integrate</span></a><span style="font-weight: 400;">, and </span><a href="https://www.ndss-symposium.org/ndss-paper/sharing-cyber-threat-intelligence-does-it-really-help/"><span style="font-weight: 400;">provides questionable value</span></a><span style="font-weight: 400;">.  </span></p>
<p><span style="font-weight: 400;">In a DARPA-funded study </span><a href="https://tillsongalloway.com/ti-ecosystem-ndss.pdf"><span style="font-weight: 400;">to be presented</span></a><span style="font-weight: 400;"> at the </span><a href="https://www.ndss-symposium.org/ndss2026/"><span style="font-weight: 400;">2026 Network and Distributed System Security Symposium</span></a><span style="font-weight: 400;">, GT computer scientists developed a novel method to trace the propagation of threat intelligence through this ecosystem, which consists of vendors (TI platforms, antivirus, sandboxes), researchers, and operators. By embedding unique watermarks in benign test files and tracking them as they moved between actors, they uncovered several findings:</span></p>
<p><span style="font-weight: 400;">While 67% of vendors perform dynamic malware analysis, only 17% share the intelligence they extract. Network indicators (like malicious domains or URLs) are shared 20 times more frequently than the actual malware binaries—meaning defenders often get conclusions without the evidence needed to validate them. Most vendors consume information, and a handful of “nexus vendors” like VirusTotal act as central aggregation points, creating potential points of failure. Delays of hours to days in sharing the data slow coordinated responses. Adversaries are actively exploiting predictable sandbox environments and fingerprinting techniques to evade detection. The researchers found hundreds of malware samples actively using publicly available blocklists of sandbox IP addresses to avoid analysis—a technique that reduces the number of vendors receiving intelligence by 25%.</span></p>
<p><span style="font-weight: 400;">Characterizing these findings as troubling, the research makes several recommendations, including that vendors perform recursive analysis of malware to uncover full attack chains, diversify the IP space used in analysis infrastructure to avoid adversary counter-measures, and use watermarked binaries to allow auditing of data sharing. While there were limitations in examining temporal fingerprint data and freely available analysis environments, the technical mechanisms for improving the quality of TI data were well developed. However, the paper leaves open questions about how to coordinate the adoption of these recommendations across a thriving industry sector driven by incentives that vary and are sometimes aligned and sometimes competing.   </span></p>
<h3><b>The Geopolitical Fracture</b></h3>
<p><span style="font-weight: 400;">Now overlay geopolitical tensions. China’s ban isn’t happening in isolation. The United States has previously banned Russian antivirus firm Kaspersky, and sought to ban the TikTok app based on the premise that </span><a href="https://www.internetgovernance.org/2025/01/17/embarrassing-the-future-tiktok-decision-turns-on-data-collection/"><span style="font-weight: 400;">it could provide data</span></a><span style="font-weight: 400;"> about the American population. There have also been efforts to discredit threat intel research by Chinese and American cybersecurity firms. Similar dynamics have played out with telecom infrastructure, semiconductors, artificial intelligence applications, and other digital technologies deemed “strategic.”</span></p>
<p><span style="font-weight: 400;">The core tension is this: producing cybersecurity requires global visibility to be effective. Malware developed in one country can attack targets worldwide within minutes. Botnets span continents. Phishing campaigns exploit infrastructure in dozens of jurisdictions. Yet the tools and practices to defend against these global threats are increasingly being carved up along national lines.</span></p>
<p><span style="font-weight: 400;">When China bans Western cybersecurity vendors, Chinese network operators lose access to threat intelligence from those sources. When the U.S. bans Russian tools, American defenders become blind to threats that Russian vendors might detect first. Each ban reduces global visibility and risks hindering collective response.</span></p>
<h3><b>Network Operators Hold the Key</b></h3>
<p><span style="font-weight: 400;">Here’s the crucial insight: while states make bans and set public policies, it is network operators—the security teams at corporations, universities, service providers, and government agencies—who make the actual decisions about what threat intelligence to use and how to act on it. These operators face a difficult choice. Follow geopolitically-driven bans and lose access to potentially valuable threat intelligence? Or find workarounds that might violate regulations?</span></p>
<p><span style="font-weight: 400;">But what if there were a third option? What if operators could use threat intelligence regardless of origin, as long as it met certain verifiable quality and process standards?</span></p>
<h3><b>Secure Provenance Incentives: From “Who” to “How”</b></h3>
<p><span style="font-weight: 400;">This is where </span><a href="https://dl.acm.org/doi/epdf/10.1145/1314313.1314318"><span style="font-weight: 400;">secure provenance systems</span></a><span style="font-weight: 400;">, which store ownership and process history of data objects and can ensure confidentiality, integrity, and availability, come in. Instead of focusing on “who produced this threat intelligence?”, such a system would allow defenders to ask “how was this intelligence produced and validated?” It creates a trustworthy, auditable trail documenting the entire lifecycle of a piece of threat intelligence:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Where and when was it first observed? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">How was it analyzed (static analysis, sandbox execution, manual review)? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">How deep was the analysis (did analysts examine dropped files and network connections)? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Which independent parties validated it? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">How long did each step take?</span></li>
</ul>
<p><span style="font-weight: 400;">The Georgia Tech research demonstrates that answering these questions is technically feasible. Their watermarking system tracked threat intelligence through multiple vendors, distinguishing between binary and network indicator sharing, and timing each stage of propagation. A secure provenance system could formalize and standardize this tracking. With it, network operators can use or filter policy-compliant threat intelligence without necessarily relying on the country of origin. Consider these scenarios:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prohibited from using certain vendors’ software, a firm could accept threat intelligence where provenance shows it was independently re-analyzed by approved methods or domestic vendors. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Firms subject to restrictions can contribute to global threat intelligence where provenance metadata is sanitized to protect operational details (e.g., IoCs designated </span><a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"><span style="font-weight: 400;">TLP:AMBER</span></a><span style="font-weight: 400;"> or </span><a href="https://www.misp-project.org/taxonomies.html#pap:~:text=or%20prevent%20them-,PAP,-PAP%20namespace%20available"><span style="font-weight: 400;">PAP:RED</span></a><span style="font-weight: 400;">), analysis occurs through neutral intermediaries, and compliance audit trails can be generated.</span></li>
</ul>
<p><span style="font-weight: 400;">Beyond enabling compliance with conflicting domestic regulations, secure provenance addresses concrete operational challenges revealed by the research. The study found that some vendors delay sharing by hours to days, slowing disruption of attacks by 20%. Provenance makes delays visible, allowing operators to avoid bottlenecks or request parallel analysis. Similarly, when 85% of antivirus vendors and 57% of sandboxes failed to execute packed malware, potentially valuable intelligence was lost. Provenance incentivizes deeper analysis by making quality visible and valuable in the marketplace. Relatedly, many vendors reshare IoCs and detection labels, creating the “illusion of consensus”. Provenance reveals actual analytical independence, helping operators set appropriate thresholds for intelligence use, and makes the diversity of the analysis environment visible and verifiable.</span></p>
<h3><b>Building Blocks</b></h3>
<p><span style="font-weight: 400;">What is required for a secure provenance system? While formal definitions and threat modeling are needed, an LLM-grounded analysis (Claude Code, Opus 4.6) of the sources reviewed here suggests the system needs to combine cryptographic chaining for local data integrity supported by anchoring in global, decentralized trust — allowing multiple untrusted organizations to independently verify the complete lineage of any piece of threat intelligence. Architectural components include:</span></p>
<blockquote><p><i><span style="font-weight: 400;">Layer 1: Collection — Trusted Hardware &amp; Kernel Modules                                                                                                                    </span></i></p>
<p><i><span style="font-weight: 400;">At the edge where TI is generated, integrity begins with kernel-level collectors that automatically capture metadata during analysis, backed by hardware attestation to ensure the collection environment itself hasn&#8217;t been tampered with.</span></i></p>
<p><i><span style="font-weight: 400;">Layer 2: Data Model — Provenance Record Graphs &amp; Chains</span></i></p>
<p><i><span style="font-weight: 400;">Each action on TI data produces a provenance record containing who holds the data and what was done to it. Records can be linked into a graph structure that captures complex, multi-actor lineage, with cryptographic chaining that ensures that reordering or deleting historical records is detectable.</span></i></p>
<p><i><span style="font-weight: 400;">Layer 3: Identity &amp; Trust — PKI and Digital Signatures</span></i></p>
<p><i><span style="font-weight: 400;">Every actor signs provenance records created using managed key pairs, ensuring authenticity and non-repudiation. Records are cryptographically bound to participants&#8217; identities, preventing selective removal of records from the chain.</span></i></p>
<p><i><span style="font-weight: 400;">Layer 4: Storage &amp; Verification — Distributed Ledger</span></i></p>
<p><i><span style="font-weight: 400;">Provenance record hashes can be anchored to a distributed ledger, providing tamper-evident, immutable storage without a central authority. Automated contracts enforce validation and access rules when actors submit or query TI lineage.</span></i></p>
<p><i><span style="font-weight: 400;">Layer 5: Privacy &amp; Access Control</span></i></p>
<p><i><span style="font-weight: 400;">Encryption with selective disclosure allows owners to reveal specific chain segments to auditors without exposing sensitive details. Policy-based encryption embeds access rules directly into the data, and conditional privacy mechanisms protect actor identities while preserving accountability.</span></i></p>
<p style="text-align: center;"><b><i>Figure 1. Provenance operational flow</i></b></p>
<table class=" aligncenter" style="height: 267px;" width="683">
<tbody>
<tr>
<td><i><span style="font-weight: 400;">Binary submitted → Vendor analyzes, generates signed provenance record</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">↓</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">Record linked into provenance graph via cryptographic chaining</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">↓</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">Hash anchored to distributed ledger</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">↓</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">TI migrates across organizational boundaries → Receiver validates sender&#8217;s signature via PKI</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">↓</span></i></td>
</tr>
<tr>
<td><i><span style="font-weight: 400;">Auditor verifies full chain using public keys + ledger anchors</span></i></td>
</tr>
</tbody>
</table>
</blockquote>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Granted, even this rough brainstorming raises sticky questions. A secure provenance system needs apolitical, transnational governance structure(s) with infrastructure distributed across multiple jurisdictions, verifiable information and reporting, without exposing sensitive capabilities. This is the unsolved institutional design problem that future work must consider.</span></p>
<h3><b>Conclusion: Institutional Economics of Global TI Provenance</b></h3>
<p><a href="https://scispace.com/pdf/secrecy-versus-openness-internet-security-and-the-limits-of-26ve3bunxy.pdf"><span style="font-weight: 400;">Peer production has a long history</span></a><span style="font-weight: 400;"> in cybersecurity—but it also has limits in environments hostile to openness. The response was the emergence of a network of sub-groups of vetted actors voluntarily collaborating to produce and share specialized and relevant threat intelligence in trusted environments. But aggravated by a decade of growing geopolitical tensions, the main threat to collaborative threat intelligence now comes from states. What’s needed now are governance structures that allow operators, vendors, and researchers to continue cooperating globally while adhering to various governments’ incompatible notions of jurisdictionally-bound identity, sovereignty, and compliance. </span></p>
<p><span style="font-weight: 400;">Implementing secure provenance for TI data objects could be a step toward that. Club good production of threat intelligence already exists; organizations like FS-ISAC, the Cyber Threat Alliance, and FIRST operate as membership-based sharing communities, alongside a thriving private market. But exclusion in these existing clubs is based on organizational identity and trust relationships — precisely the attributes targeted by geopolitical bans. Provenance can create an excludability mechanism that transforms high-quality global threat intelligence from an underprovided public good into a sustainable club good: participation in the verification chain becomes both the “credential” for access and the incentive for contribution, solving free-rider problems that the GT study documented without requiring a central authority to enforce sharing norms. Provenance shifts excludability from who produced the intelligence to how it was produced and verified, making the club resilient to national identity and sovereignty-based restrictions while preserving the quality assurance that excludability provides.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Chinese, American, and other participants (both public and private) will have incentives to use the same provenance system, not out of altruism, but because exclusion from the verifiable pool of TI is operationally costly in a threat environment that remains stubbornly global. Universality and flexibility of applying different usage policies at the operator level mean provenance can accommodate divergent regulatory regimes without fragmenting the underlying intelligence. Existing </span><a href="https://www.ncsc.gov.uk/collection/public-content-provenance-for-organisations/selecting-suitable-system-technologies"><span style="font-weight: 400;">guidance</span></a><span style="font-weight: 400;">, </span><a href="https://oasis-open.github.io/cti-documentation/"><span style="font-weight: 400;">standards and protocols</span></a><span style="font-weight: 400;">, and certificate authorities could be leveraged to begin building such a system. But the harder challenge is institutional: secure provenance requires transnational governance structure(s) perceived as legitimate by participants operating under conflicting state mandates — without which threat intelligence risks becoming a zero-sum geopolitical competition.</span></p>
<h3><b>References and Further Reading</b></h3>
<p><span style="font-weight: 400;">Galloway et al. (2026). “Actively Understanding the Dynamics and Risks of the Threat Intelligence Ecosystem.” Network and Distributed System Security Symposium. </span><a href="https://tillsongalloway.com/ti-ecosystem-ndss.pdf"><span style="font-weight: 400;">https://tillsongalloway.com/ti-ecosystem-ndss.pdf</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">Hasan, R., Sion, R., &amp; Winslett, M. (2007, October). Introducing secure provenance: problems and challenges. In </span><i><span style="font-weight: 400;">Proceedings of the 2007 ACM workshop on Storage security and survivability</span></i><span style="font-weight: 400;"> (pp. 13-18).</span></p>
<p><span style="font-weight: 400;">Pan, B., Stakhanova, N., &amp; Ray, S. (2023). Data provenance in security and privacy. </span><i><span style="font-weight: 400;">ACM Computing Surveys</span></i><span style="font-weight: 400;">, 55(14s), 1-35.</span></p>
<p>Peisert, S., Bishop, M., &amp; Talbot, E. (2017, October). A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing. In Proceedings of the 2017 New Security Paradigms Workshop (pp. 80-89).</p>
<p><span style="font-weight: 400;">Reuters (January 14, 2026). “Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software.” </span><a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/"><span style="font-weight: 400;">https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">Wang, X., Zeng, K., Govindan, K., &amp; Mohapatra, P. (2012, October). Chaining for securing data provenance in distributed information networks. In </span><i><span style="font-weight: 400;">MILCOM 2012-2012 IEEE Military Communications Conference</span></i><span style="font-weight: 400;"> (pp. 1-6). IEEE.</span></p>
<p><span style="font-weight: 400;">For more on STIX (Structured Threat Information Expression) and existing threat intelligence sharing standards, see: </span><a href="https://oasis-open.github.io/cti-documentation/"><span style="font-weight: 400;">https://oasis-open.github.io/cti-documentation/</span></a></p>
<p>The post <a href="https://www.internetgovernance.org/2026/02/23/beyond-borders-how-threat-intelligence-provenance-can-save-global-cybersecurity-from-geopolitical-fragmentation/">Beyond Borders: How Threat Intelligence Provenance Can Save Global Cybersecurity From Geopolitical Fragmentation</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.internetgovernance.org/2026/02/23/beyond-borders-how-threat-intelligence-provenance-can-save-global-cybersecurity-from-geopolitical-fragmentation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Did an AI application really &#8220;bully&#8221; a human?</title>
		<link>https://www.internetgovernance.org/2026/02/15/did-an-ai-application-really-bully-a-human/</link>
					<comments>https://www.internetgovernance.org/2026/02/15/did-an-ai-application-really-bully-a-human/#comments</comments>
		
		<dc:creator><![CDATA[Milton Mueller]]></dc:creator>
		<pubDate>Sun, 15 Feb 2026 14:48:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Generative AI]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10433</guid>

					<description><![CDATA[<p>There is a battle over the reputation of advanced AI applications going on in the news. Two worldviews conflict: Are we unleashing dangerous forces that threaten humanity? Or are we just making computers and software do a lot of new things? Two Wall Street Journal reporters fired a shot in this battle recently, publishing an [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/02/15/did-an-ai-application-really-bully-a-human/">Did an AI application really &#8220;bully&#8221; a human?</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a battle over the reputation of advanced AI applications going on in the news. Two worldviews conflict: Are we unleashing dangerous forces that threaten humanity? Or are we just making computers and software do a lot of new things?</p>
<p>Two Wall Street Journal reporters <a href="https://www.wsj.com/tech/ai/when-ai-bots-start-bullying-humans-even-silicon-valley-gets-rattled-0adb04f1?mod=hp_lista_pos1">fired a shot in this battle</a> recently, publishing an article claiming that an AI app &#8220;bullied&#8221; a Denver engineer who rejected some code it submitted to an open-source project he helps maintain. The general theme of the article was that AI applications are already becoming autonomous agents, and cranky and nasty ones at that. In the article, the &#8220;Denver engineer&#8221; concludes with a warning, “Right now this is a baby version,” he said. “But I think it’s incredibly concerning for the future.”</p>
<p>A big picture of Dario Amodei, the CEO of Anthropic, graced the middle of the article. And that tells you a lot about the source of the article. <a href="https://www.nytimes.com/2026/02/12/opinion/artificial-intelligence-anthropic-amodei.html">Amodei views advanced AI</a> as having a 25% or higher risk of causing a societal catastrophe in the next five years. He warns of rapid AI development outpacing safety measures, widespread white-collar job displacement, and potential loss of control over autonomous AI systems.</p>
<p>People who don&#8217;t know much about AI Safety research, and the political position about that promoted by Dario Amodei, might see the WSJ article as an emerging scientific consensus about the autonomy of AI applications. I don&#8217;t. I see evidence of a public relations campaign by a particular AI model developer.</p>
<h2>What&#8217;s really going on here?</h2>
<p>One&#8217;s opinions about the dangers of AI should not be based on fantasies that they are emerging life forms that will rise up and destroy us. Yet people who believe that, or whose careers may depend on keeping that worry alive, are mostly in charge of what we hear about AI autonomy. Journalists such as the WSJ&#8217;s <a href="https://www.wsj.com/news/author/sam-schechner?gaa_at=eafs&amp;gaa_n=AWEtsqfe6NnqvOcHf-PCz2T52Pjaq9xDe9EEY_aoL4mOVObl3NOBwbBYX87cX0EEkw%3D%3D&amp;gaa_ts=6991dbe5&amp;gaa_sig=uerUPVaFbm7GnJirFLrBE1gXkjEP-nfS6Ng5TuMCldNjRVm8IVu6ESPO5t_WJSv3PwJqQoa3UbRK8fPmTCA-OQ%3D%3D">Sam Schechner</a> and <a href="https://www.wsj.com/news/author/georgia-wells?gaa_at=eafs&amp;gaa_n=AWEtsqe9olqyQlfLaO8KLYJsAgRAEbPhQcys8z_6AWKUKxEITp8mv8IvJEu2ejzJbw%3D%3D&amp;gaa_ts=6991dc07&amp;gaa_sig=2tytCAjNauJ2VHf_8j4M1rJp4UbBIrmWyIaZl1zyZYzhS_Q4TVGYJy327M8wbeJuSKu7JoDNi5Pzyw2Oe1HeAw%3D%3D">Georgia Wells</a> are not reporting on the frontiers of science, they are distributing interpretations of AI behavior given to them by Amodei and the AI Safety crowd.</p>
<p>This is not to say that all of the safety research, or safety concerns, are wrong. It&#8217;s just that most of those experiments are done by people with a vested interest in generating concerns about AI autonomy.</p>
<p>None of these people try to assess empirically the limitations or constraints on AI autonomy. Instead, they conduct experiments intended to find evidence of machine autonomy. This bias has some epistemological justifications &#8211; after all, you can&#8217;t prove a negative. But it also creates a major confirmation bias incentive. Just as PhD students in statistical social science MUST find a statistically significant correlation between their variables, else they&#8217;ve all been wasting their time, so the AI Safety researcher must find evidence of danger, of machine autonomy.</p>
<p>Finding evidence that an AI application &#8220;bullied&#8221; a human, finding demonstrations of murderous intentions an AI system expressed toward people who try to turn them off &#8211; that not only is more achievable for the researcher, but a lot more interesting in the attention economy. It keeps AI safety research funded and in the public eye. A finding that &#8220;advanced AI models are just scaled-up computing infrastructures that humans, build and manage&#8221; would not get on to the front page of the Wall Street Journal. But where do these &#8220;findings&#8221; come from?</p>
<h2>Are AI Experiments Misleading?</h2>
<p><a href="https://www.tandfonline.com/doi/full/10.1080/23738871.2025.2597194">My own reviews of research on AI Safety</a> by AI labs has left me highly critical. I have found that evidence of behavioral autonomy disappears when the process used in the experiment and the training and instructions are made transparent. This means that journalists and public intellectuals should not draw any conclusions about AI autonomy from intermediaries, unless the people conducting the experiment disclose the exact factual details of their tests. When one knows exactly which tests were done, how they were structured, and who programmed them, AI autonomy disappears from the plot, like the failure of a spirit to appear in a séance when the lights are turned on. Looking carefully at these experiments, we find not machine autonomy, but highly specialized instructions, often involving giving the machine conflicting objectives, and a laboratory experiment that was designed to find behavior that could be interpreted as autonomous. Often the evidence underlying a claim of autonomy is statistical; e.g., 5 or 6 different models were tested, and in 10% or 3% or 20% of the tests the output was &#8220;misaligned&#8221; with what the humans conducting the experiment think was the proper output.</p>
<h2>Tests for Autonomy</h2>
<p>Here is how to pick apart AI research that claims to find evidence of machine autonomy. Ask questions about the design and preparation of the experiment:</p>
<ul>
<li>What was the AI application used in this instance? The WSJ article implies that multiple models were tested; let&#8217;s be told which ones (and which versions) they were. Were the models specialized applications developed to conduct this test or ones intended for general use in production?</li>
<li>Did the AI submit code to a real-world software sharing community, or was it a simulation set up by the experimenters? If the former, did it create its account without human input or control? Did human input prompt it to develop and submit code to this forum or did this happen spontaneously? Did a human prompt it to submit the software, or did the application do this all by itself?</li>
<li>Was the experiment deliberately designed to test what would happen if the application&#8217;s code was rejected, or did this result happen unexpectedly?</li>
<li>On what blog did this AI post its attack on Mr Schambaugh? Did the application create its own account, set up its own public web site, or did the lab create an experimental one for it? Can anyone see this blog post?</li>
<li>Was the AI application&#8217;s submission of blog posts rule-governed, or spontaneous and unexpected? In other words, did the humans controlling this machine give it specific conditions that had to be met to post blogs, and tell it what kind of messages would go into those blogs?</li>
<li>In explaining the attack on Mr Schambaugh, did humans tell the machine to react angrily to a rejection of its code? Is this kind of reaction rule-governed, a pattern embedded in the application&#8217;s training, or was it random?</li>
<li>Tell us more about Scott Shambaugh, the person who &#8220;rejected&#8221; the AI application&#8217;s code. Was he part of the experiment? What is his connection to Anthropic? Did he know that the code was submitted by an AI agent? If he did not, which standard of quality or functionality did the AI&#8217;s code not meet? Did the humans in the lab bring Mr Schambaugh into this experiment without his permission or knowledge?</li>
</ul>
<h2>Software Liability: The new name for AI Safety Research</h2>
<p>We are just beginning to realize how much AI governance has been misdirected by the doomer narrative of an autonomous, malevolent AGI. One of the biggest casualties is research into the possiblew failings and problems of AI models. There is a legitimate, even important role for &#8220;AI Safety&#8221; research, but the focus on machine autonomy has turned the whole field into confirmation-biased hunts for misanthropic behavior by AI applications.</p>
<p>Here&#8217;s the new direction it should take: AI Safety research should be renamed <b>software liability research</b>. Researchers in model developers&#8217; labs should stop hunting for AI autonomy and focus on all the ways in which flaws or unintended consequences of specific ML applications (AI models) might generate harm, and how to distribute responsibility for those costs. As I&#8217;ve argued elsewhere, those kinds of tests are application-specific. How might autonomous vehicles go wrong? How do we assign responsibility to manufacturers of vehicles, model developers, drivers? How will we assign liability when automated code distributions (updates), such as Crowdstrike&#8217;s massive failure, generated cascading problems?</p>
<p>It&#8217;s true that this country had a policy debate about software liability 25 years ago. Insofar as it was resolved, it was that there should be as little as possible. AI applications reopen that debate. The search for machine autonomy distracts from it.</p>
<p>The post <a href="https://www.internetgovernance.org/2026/02/15/did-an-ai-application-really-bully-a-human/">Did an AI application really &#8220;bully&#8221; a human?</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.internetgovernance.org/2026/02/15/did-an-ai-application-really-bully-a-human/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Digital Media and the American Civil Conflict</title>
		<link>https://www.internetgovernance.org/2026/02/01/digital-media-and-the-american-civil-conflict/</link>
					<comments>https://www.internetgovernance.org/2026/02/01/digital-media-and-the-american-civil-conflict/#comments</comments>
		
		<dc:creator><![CDATA[Milton Mueller]]></dc:creator>
		<pubDate>Sun, 01 Feb 2026 16:06:53 +0000</pubDate>
				<category><![CDATA[Free Expression Online]]></category>
		<category><![CDATA[Platform Governance]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10422</guid>

					<description><![CDATA[<p>Operation “Metro Surge” in Minneapolis-St. Paul, USA, has now attracted national and worldwide attention. Both sides in this conflict see it as a showdown. It is a showdown, and it matters who wins.   In this blog, we try to focus on digital media; that is, on public narratives, propaganda, the polarization of political coalitions and their role in [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/02/01/digital-media-and-the-american-civil-conflict/">Digital Media and the American Civil Conflict</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">Operation “Metro Surge” in Minneapolis-St. Paul, USA, has now attracted national and worldwide attention. Both sides in this conflict see it as a showdown. It is a showdown, and it matters who wins. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">In this blog, we try to focus on digital media; that is, on public narratives, propaganda, the polarization of political coalitions and their role in the deportation effort. Digital media are key players in the conflict. Immigration is about identity, and media representations can shape perceptions of identity. And these same media, from the forced divestiture of TikTok to FCC’s discriminatory treatment of media mergers and licensees, are at the center of numerous political and policy battles at the moment. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">The conflict needs to be placed in a broader political economy perspective, however. Immigration is a political economy issue, not just a matter of representation in the media. We were restrained and referred to American “civil conflict” and not “civil war.” While the conflict falls short of civil war, some of the key elements are there: invasions, paramilitary forces, shooting deaths, debates over the role of the military, clashes between the authority of federal and state governments.</span><span data-ccp-props="{}"> </span></p>
<h2 aria-level="2"><span data-contrast="none">What is Trump trying to accomplish?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">Before it took over the Republican Party, Trump’s movement consisted of economic nationalists, cultural conservatives and a few conservative financiers. His rise to power, however, was fueled as much by reaction to the rot in the Democratic Party and the excesses of the progressive left as by its own appeal. By 2024, Americans were sick of 15 years of cultural domination by highly educated coastal elites who “moderated” social media to promote their values, told the majority they were guilty oppressors, and promoted ever-stranger concepts of gender and personal identity. But aside from the rising cost of living – inflationary pressures for which Trump was as responsible as Biden – it was the immigration issue that best encapsulated the growing cleavage between left and right in America. Whereas the left embraced ethnic and cultural diversity, the right hated it. The flood of asylum seekers seemed chaotic, racist ideas of “replacement” were circulating, and some Americans felt marginalized by a globalizing workforce and globalized markets. Prominent voices on both the right and the left, in fact, had been telling Americans for nearly a decade that they were victims of globalization and that immigration and outsourcing should be curbed. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Prior to Trump, the more liberal elements in the Republican coalition accepted immigration as a logical extension of their support for an open market economy. Trump has rid the Republican party of its economic liberalism, leading it into a full-on embrace of protectionism and mercantilism, and a nativist opposition to immigration. His antidote to progressive identity politics is not a rejection of leftist identity politics, however, but an </span><i><span data-contrast="auto">alternative </span></i><span data-contrast="auto">identity politics: nationalist, nativist, religious. A multicultural society open to immigration is the opposite of that. He aims to purge America of immigrants, and the DEI ideology of the cultural left. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">To carry out this nationalist identity politics, Trump has seized unprecedented forms of Executive power. DHS, the Justice Department, and the State Department are actively focused – one might say ‘weaponized’ – on carrying out these policy goals (as well as his personal vendettas). Top of the list is ending the diversification of American identity.  When it comes to immigration, those agencies give him almost unlimited power. He can control entry and exit of citizens and non-citizens. He can expel and/or prosecute immigrants. He can single out protesting students on F1 visas. He can prosecute university administrations for allowing anti-Israel protests. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<h2 aria-level="2"><span data-contrast="none">Why immigration is Central</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">We can see now why visible attacks on immigrants are so central to the MAGA vision and MAGA constituencies. It is no longer about closing the border to masses of asylum seekers – that was fixed quickly and the fix started under the Biden administration. The real goal is to advance the new MAGA identity-politick. MAGA does not conceive of America as a set of constitutional principles and liberal-democratic political ideals that can be embraced by any individual, regardless of nationality and c</span><span data-contrast="auto">ulture. It conceives of America as a tribe of “our own kind of people,” mostly white and rural. Restricting the entry of new immigrants advances that kind of identity politics but does not go far enough to alter the character of America. There must be mass deportations as well. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">Mass deportation performs an important symbolic function. From that standpoint, Minneapolis is the perfect target. We can trace the origins of the current conflict to the riots around the George Floyd incident, which also happened in Minneapolis, and the frenzy over masks, vaccines and shutdowns in 2020. Trump wants his own, counter-woke version of the George Floyd incident to unfold on the streets of the Twin Cities. His syncretic mind sees a political trifecta in sending jackbooted, heavily armed Border Patrol agents into a city that (to his supporters) symbolizes lefty progressives, Somali welfare cheats and politicians favoring sanctuary cities. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<h2 aria-level="2"><span data-contrast="none">Resistance</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">Minneapolis-St. Paul was the wrong target. This city was ready to resist. Its brave people carried out a sustained campaign of notification, organized monitoring, and peaceful obstruction. (Yes, there was some obstruction but, like the civil rights movement, it was a non-violent form of protest, like a sit-in.) Like several other ICE-invaded communities, Minneapolis-St. Paul came to the defense of immigrants but also highlighted that many innocent legal residents were being rounded up in the process. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">As the crackdown proceeds, it becomes clearer and clearer that there is no economic policy goal – or benefit – from Trump’s deportation plan. It hurts the economy of all Americans. It is not just restricting undocumented workers, who despite their status fulfill a valuable production and service role and fill gaps in the supply of labor. It is restricting students from studying in American universities. It scares off tourists. It tarnishes the country’s reputation. It interfered with attempts by South Korea to </span><a href="https://en.wikipedia.org/wiki/2025_Georgia_Hyundai_plant_immigration_raid"><span data-contrast="none">build a factory employing hundreds of people in the state of Georgia</span></a><span data-contrast="auto">. It has even threatened and intimidated recent immigrants of legal status. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Reports from the </span><a href="https://www.wsj.com/us-news/bovino-ice-border-patrol-minneapolis-3b803543?"><span data-contrast="none">Wall Street Journal</span></a><span data-contrast="auto"> and </span><a href="https://www.nytimes.com/2026/01/26/us/politics/ice-border-patrol-trust.html?searchResultPosition=3"><span data-contrast="none">New York Times</span></a><span data-contrast="auto"> show that the administration made a deliberate decision to organize these armed invasions instead of seeking targeted action. Moreover, ICE entered these localities without the cooperation or approval of local authorities. The whole point was to make their presence visible and confrontational, to demonstrate that the federal government was </span></p>
<p><img loading="lazy" decoding="async" class="wp-image-10420 alignleft" src="https://www.internetgovernance.org/wp-content/uploads/Bovino-e1769960686469-665x800.jpg" alt="" width="285" height="343" srcset="https://www.internetgovernance.org/wp-content/uploads/Bovino-e1769960686469-665x800.jpg 665w, https://www.internetgovernance.org/wp-content/uploads/Bovino-e1769960686469-1198x1440.jpg 1198w, https://www.internetgovernance.org/wp-content/uploads/Bovino-e1769960686469-768x923.jpg 768w, https://www.internetgovernance.org/wp-content/uploads/Bovino-e1769960686469-1278x1536.jpg 1278w, https://www.internetgovernance.org/wp-content/uploads/Bovino-e1769960686469.jpg 1420w" sizes="auto, (max-width: 285px) 100vw, 285px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10421 alignleft" src="https://www.internetgovernance.org/wp-content/uploads/Quaritch.jpeg" alt="" width="248" height="350" /></p>
<p><span data-contrast="auto">asserting control of the situation. The point was to subordinate and override local police and state and local governments that offered sanctuary or supported more liberal immigration policies. If they were really interested in finding and deporting known criminals who happen to be illegal immigrants, they could have targeted and arrested them. They chose not to do that. Indeed, they chose to be as provocative and militant as possible, putting Gregory Bovino, a Border Patrol officer out of his jurisdiction, in charge of the Minneapolis operation. He was selected not only because he favored aggressive action, but seemingly also for symbolic purposes, as his look and behavior seem to have been modelled on </span><a href="https://en.wikipedia.org/wiki/Miles_Quaritch"><span data-contrast="none">Colonel Miles Quaritch</span></a><span data-contrast="auto">, the crew-cut blond, muscular, robot-wielding militarist who invaded Pandora to destroy the Na’vi in Cameron’s </span><a href="https://en.wikipedia.org/wiki/Avatar_(2009_film)"><span data-contrast="none">Avatar movie</span></a><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">So, this was not about immigration enforcement per se. This was a display of power, an invasion meant to intimidate and subordinate cities and constituencies that were perceived as hostile to Trump. As one </span><a href="https://x.com/tommartell/status/2015795409642463297?s=20"><span data-contrast="none">post</span></a><span data-contrast="auto"> on X put it, </span><span data-ccp-props="{}"> </span></p>
<blockquote><p><span data-contrast="auto">“If you want to deport people who are in the country illegally, you don&#8217;t pull up to random cars in parking lots and shatter their windows and drag their drivers out. You don&#8217;t trap cars in intersections and shatter their windows to force the occupants out into the street. You don&#8217;t go up to random Hispanic people at gas stations and demand their papers.”</span><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p></blockquote>
<p><span data-contrast="auto">Minnesota’s resistance helped lift the veil from the pretense that this was about rounding up criminals. Faced with public friction and exposure, ICE agents twice lost their temper and murdered American citizens. The administration had already compromised the First Amendment, viewing unfavorable interviews and news reports as targets of litigation, and protestors as targets for police harassment; when it was discovered that one of the victims, Alex Pretti, was armed, it showed it was willing to jettison the Second Amendment, the right to carry a gun, as well. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">After three weeks of this and the second murder, the public turned against the Administration. A few </span><a href="https://www.bbc.com/news/articles/cj3vp84j1l3o"><span data-contrast="none">Republican Senators and Representatives</span></a><span data-contrast="auto"> finally got a backbone. A Republican gubernatorial candidate withdrew from the race to protest the national government’s actions. A </span><a href="https://www.politico.com/news/2026/01/29/senators-block-funding-package-amid-dhs-standoff-00754927"><span data-contrast="none">budget cutoff</span></a><span data-contrast="auto"> was threatened. Colonel Quaritch-Bovino was sent packing and cut off social media. Kristi Noem shut up for a while. </span><a href="https://www.youtube.com/watch?v=YzqwCdaKkcs"><span data-contrast="none">Trump called Minnesota governor Walz</span></a><span data-contrast="auto">. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">However, Trump did not withdraw ICE from the city. Justice Department head Pam Bondi </span><a href="https://www.nytimes.com/interactive/2026/01/24/us/pam-bondi-walz-doc.html"><span data-contrast="none">sent a letter to Minnesota officials</span></a><span data-contrast="auto"> saying ICE will only leave if the state turns over its voter database to Trump. A s<a href="https://www.bloomberg.com/opinion/articles/2026-01-31/fbi-georgia-ballot-raid-is-about-2026-not-the-2020-election">eizure of voting records from 2020 in the State of Georgia</a> raises further alarms about an attempt to rig the next election. Trump himself compared his Operation Metro Surge to the military action against Venezuela. </span><span data-ccp-props="{}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">The role of digital media</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">We like to complain about surveillance in digitizing society, but let’s remember the role of </span><a href="https://www.nytimes.com/2006/12/10/magazine/10section3b.t-3.html"><span data-contrast="none">sous-veillance</span></a><span data-contrast="auto">, everybody surveilling everybody, in the Minnesota conflict. The protestors’ main “weapons” were phone cameras and whistles – and to some extent, their bodies. Their pictures, shared on social media platforms and mainstream media apps, recorded a set of events from multiple perspectives and made it accessible and even viral across all digital media platforms.  </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">We can speak of the camera as a weapon because it carried a viable threat that any misbehavior by the troops would be exposed, and exposure would bring accountability.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">But how strong was this weapon? Misbehavior – terrible, fatal misbehavior – was in fact exposed. Everyone saw the videos. They left little room for debate about what had happened. Yet for nearly a week, it was frighteningly unclear whether this would even make a difference. The Trump administration tried to impose a false interpretation. It characterized the victims as “terrorists” and claimed they were aggressively threatening ICE agents. They instantly granted the killers immunity from state or local prosecution. They excluded domestic police from investigating the crime. Their capture of the federal-level executive branch agencies and of both Houses of Congress seemed to shut off most avenues for recourse. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Ultimately, smartphone documentations of two deaths, disseminated across digital media, made the government&#8217;s approach untenable. There were too many witnesses, and the evidence was too clear. The entire country could witness not only the shooting, but hear the outraged dissent of Minneapolis’s Mayor, the shock of its police chief, the first-hand accounts of bystanders. The government was lying and everyone knew it. There was a flood of videos of other abuses by undisciplined ICE agents in less fatal situations. Trump was losing millions of people who voted for him in 2024 and alienating a vast set of middle-ground voters who might consider voting for Republicans in the midterms. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Mayor Jacob Frey of Minneapolis </span><a href="https://www.nytimes.com/video/podcasts/100000010680805/minneapolis-ice-protests-mayor-frey.html?smid=url-share"><span data-contrast="none">asked</span></a><span data-contrast="auto"> poignantly, “what if we did not have these videos?” Social media networking and digital devices were crucial.  But it was not simply the information, the publicity, but the willingness of responsible and authoritative political actors to become vocal and act on that information, that made a difference.</span><span data-ccp-props="{}"> </span></p>
<h2 aria-level="1"><span data-contrast="none">Polarization</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h2>
<p><span data-contrast="auto">Social media are often accused of polarizing the polity. Mostly this accusation is about a polarized U.S.A., but sometimes the argument is extended to other democracies like Brazil, India or even Europe. The now-cliched argument is that divisive and angry messages are more likely to keep users engaged, so algorithmically controlled media amplify them to sell ads, and a passive public falls in line.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Generally, it is a mistake to blame digital media for divergent reactions to hot button issues. There are strong substantive differences in the population; the media reflects, it does not create, these divisions, though it may accelerate them under certain circumstances. The significance of immigration and identity politics in the current conflict was explained above. To think that these divisions would not exist if social media were banned or heavily moderated to allow only anodyne cat videos shows a lack of understanding of collective action in a complex, liberal-democratic society.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">A heated discourse about Minnesota was certainly evident on social media. The two sides shouted at, caricatured, goaded and trolled each other on X, with owner Elon Musk obviously – but a bit half-heartedly – tipping the scales toward a pro-ICE stance. Yet even on X, the discourse became increasingly balanced, as apologists for ICE became outweighed by critics, and evidence of abuse piled up. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Polarization was evident in the way defenders of ICE tried to represent protestors and their supporters. ICE operations reinforced liberals’ and leftists’ view of the Trump administration as “fascist,” “authoritarian,” or racist. MAGA nationalists, for their part, saw the hard-line actions as highly satisfying. </span><span data-contrast="auto">After the killings, however, the “poles” shifted. </span></p>
<p><span data-contrast="auto">MAGA supporters tried very hard to keep them aligned. When it was no longer possible for Trump supporters to argue that the killings were justified, it became about the victims’ identity, and specifically their status as agents of the opposition political movement. Michael Shellenberger, a professional Trump apologist, tweeted that </span><a href="https://x.com/shellenberger/status/2015447611621118259?s=20"><span data-contrast="none">“the Left is getting people killed</span></a><a href="https://x.com/shellenberger/status/2015447611621118259?s=20"><span data-contrast="none">”</span></a><span data-contrast="auto"> by “encouraging people to interfere in law enforcement operations.” While disavowing the shooting, Shellenberger’s approach places the blame for the killings on “progressive nonprofits, Democrats, and liberal influencers&#8221; &#8211; an attempt to reinforce the political divisions that led to the conflict. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">One could therefore superficially conclude that people reacting to the representations of the conflicts on social media reinforced polarization. Except it didn’t. Ultimately, media interactions broke through the standard forms of division. The Trump administration alienated a significant segment of its current and potential supporters, and they began to post. Conservative judges, independent Republicans, libertarians, and even a response from cautious CEOs, who remained silent as long as possible due to their attempt to avoid recriminations from Trump, began to react to the situation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">A January 25 </span><a href="https://www.wsj.com/livecoverage/minneapolis-shooting-alex-pretti/card/dozens-of-minnesota-executives-call-on-authorities-to-de-escalate-tensions-zkwl4YJk3eWAJDWZnyoo?mod=article_inline"><span data-contrast="none">letter signed by 60 leaders</span></a><span data-contrast="auto"> of Minnesota companies, including Target, </span><a href="https://www.wsj.com/market-data/quotes/MMM"><span data-contrast="none">3M</span></a><span data-contrast="auto"> and </span><a href="https://www.wsj.com/market-data/quotes/GIS"><span data-contrast="none">General Mills</span></a><span data-contrast="auto">, published the day after the fatal shooting of Alex Pretti, called for “an immediate de-escalation of tensions and for state, local and federal officials to work together to find real solutions.” The polarization existed before the incident, but it put the advocates of mass deportation on the defensive. The exchange of real-time opinion, rage and evidence altered the political environment. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span></p>
<p><span data-contrast="auto">Unfortunately, the issue has not been resolved. Trump’s political base is deeply invested in both the symbolism and the reality of mass deportation. Its goal is to erase the message of hope inscribed on the Statue of Liberty. Minnesotans cannot back down either, because to do so would be to surrender basic American rights and liberties, and dangerously curb the local and state powers granted to them under a federalist constitution.</span><span data-ccp-props="{}"> </span></p>
<p>The post <a href="https://www.internetgovernance.org/2026/02/01/digital-media-and-the-american-civil-conflict/">Digital Media and the American Civil Conflict</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.internetgovernance.org/2026/02/01/digital-media-and-the-american-civil-conflict/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Identity Engineering: Why a leading Chinese AI startup abandons its home market</title>
		<link>https://www.internetgovernance.org/2026/01/07/identity-engineering-why-a-leading-chinese-ai-startup-abandons-its-home-market/</link>
		
		<dc:creator><![CDATA[Letian Cheng]]></dc:creator>
		<pubDate>Wed, 07 Jan 2026 18:26:14 +0000</pubDate>
				<category><![CDATA[Digital Trade]]></category>
		<category><![CDATA[Geopolitics of IG]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10402</guid>

					<description><![CDATA[<p>The Chinese AI and venture capital community was shocked by Meta’s swift acquisition of Manus, an AI agent company from Wuhan, China, in a deal worth an estimated $2–3 billion. For Meta, this deal is its third-largest acquisition to date. It bets on Manus to win the &#8220;agentic&#8221; AI race depending on Manus&#8217;s autonomous task-execution [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/01/07/identity-engineering-why-a-leading-chinese-ai-startup-abandons-its-home-market/">Identity Engineering: Why a leading Chinese AI startup abandons its home market</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Chinese AI and venture capital community was shocked by Meta’s swift <a href="https://www.reuters.com/world/china/meta-acquire-chinese-startup-manus-boost-advanced-ai-features-2025-12-29/">acquisition</a> of Manus, an AI agent company from Wuhan, China, in a deal worth an estimated $2–3 billion. For Meta, this deal is its third-largest acquisition to date. It bets on Manus to win the &#8220;agentic&#8221; AI race depending on Manus&#8217;s autonomous task-execution capabilities marketed as a &#8220;digital employee&#8221; capable of independently planning and delivering complex workflows.</p>
<h2><b>From “national pride” to &#8220;runaway”</b></h2>
<p>Manus made its international debut in March 2025, by unveiling what it touted as the world’s first general-purpose AI agent, an autonomous system that could execute complex tasks such as drafting reports, analyzing stocks, and coding, with minimal prompting. The product went viral and gained massive domestic and international attention. Chinese <a href="https://www.reuters.com/technology/artificial-intelligence/beijing-boosts-ai-startup-manus-china-looks-next-deepseek-2025-03-21/">state media</a> and the local government of <a href="https://www.wuhan.gov.cn/sy/whyw/202503/t20250307_2548285.shtml">Wuhan</a> lauded it as <i>“the next DeepSeek”</i> and showed strong eagerness in supporting this new golden child of AI innovation.</p>
<p>However, in a drastic overturn/contrast, after Silicon Valley venture capital firm Benchmark <a href="https://techcrunch.com/2025/04/25/chinese-ai-startup-manus-reportedly-gets-funding-from-benchmark-at-500m-valuation/">invested</a> in Manus with 75 million dollars in April, Manus swiftly made decisive moves to segregate itself from the Chinese market. It <a href="https://www.cls.cn/detail/2243734">closed its Wuhan and Beijing offices</a>, deleted its Chinese social media account, fired Chinese employees except for the core team, and moved to Singapore. Users with Chinese IPs were even blocked from accessing its site.</p>
<p>This dramatic shift triggered polarized sentiments in China. On one hand, venture capital and tech communities are excited about an emerging new playbook of accessing the lucrative US capital market. As long as you totally abandon your Chinese identity, you can still be accepted by the US capital market and make money through acquisitions. On the other hand, some commentators <a href="https://www.guancha.cn/economy/2025_08_15_786686.shtml">criticized</a> the company for “running away” from the Chinese market. From the angle of the Chinese government, the acquisition was especially alarming as it sets a dangerous precedent that domestic innovators could just abscond to the U.S. despite all the support they gained from the domestic talent pool, policy encouragement, and industry advantage. Such grievance is not inconsequential, as Beijing also attempts to <a href="https://www.ft.com/content/62f8f2c5-95c7-4437-b0f1-b8ecd507c330">review whether the deal</a> is consistent with its export controls (<a href="https://www.internetgovernance.org/2025/10/14/identity-politics-the-tiktok-deal-chinese-export-controls-and-firms-country-of-origin-conundrum/">this</a> is our previous article on China’s nascent export control regime).</p>
<h2><b>The Benchmark investment and OISP screening</b></h2>
<p>Why did Manus gain such a sudden lucrative acquisition, and also determine to cut its ties with China so decisively in a short time span of 9 months? The startup defended itself by stating its “<a href="https://www.yicai.com/news/102726530.html">DNA of internationalization”</a> from the very beginning, and their retreat from China is just a reflection of their strategy of becoming a truly international company, in order to avoid foreign blockades and utilize American LLM APIs such as Claude. More importantly, after receiving investment from Benchmark, Manus swiftly went on a path of restructuring and relocating in order to navigate through the heavy American investment screening crossfire.</p>
<p>The investment was an audacious move for Benchmark; as US venture capitalists become more national security aware, they have avoided investing in Chinese firms. The deal was subject to the “reverse CFIUS” – the U.S. Outbound Investment Security Program (OISP) rules that impede American firms investing in Chinese technological companies. In hindsight, before the Benchmark investment, Manus apparently <a href="https://eu.36kr.com/en/p/3381045007423621">falls into</a> the OISP covered category – a China-based company operating in China. Hence, after Benchmark’s investment and guidance, all its relocation and segregation moves serve to conform to OISP; Manus has spent over 9 months to implement an “identity engineering” task to become fully “non-Chinese” and “international”.</p>
<h2><b>How “Chinese” are you?  U.S. government’s expanding approach of determining company identity</b></h2>
<p>From FIRRMA and the restrictions on Huawei and ZTE to the recent OISP rules, the U.S. government has steadily broadened the definition of a &#8220;covered entity.&#8221; Moving beyond the simple principle of legal nationality, it has adopted a holistic risk-assessment mechanism that scrutinizes inbound and outbound investments, as well as domestic market entries, targeting Chinese-background firms and individuals. This evaluation is based on a wide range of factors, including headquarters location, revenue sources, expenditure destinations, ownership percentages, data storage location, algorithm control, and government connections.</p>
<p>Starting from 2018, the Foreign Investment Risk Review Modernization Act (FIRRMA) allowed U.S. authorities to <a href="https://www.wiley.law/alert-Interim-Rule-Banning-Huawei-and-Other-Chinese-Telecommunications-Equipment-and-Services-to-Take-Effect-on-August-13-2019">scrutinize</a> even non-controlling minority stakes by Chinese investors in critical tech sectors. Around the same time, Chinese telecom giants Huawei and ZTE were regarded as entities with strong connections with the Chinese state, and eventually blacklisted in the U.S. network by 2019-2020. During this period, the US regulators mainly focused on companies being under the Chinese jurisdiction or influence.</p>
<p>However, as the TikTok saga shows, moving out of the Chinese jurisdiction wouldn’t guarantee a free pass from the U.S. government. Even though TikTok has long separated its Chinese and international branches, and developed data localization and security plan in the U.S. territory (see <a href="https://www.lawfaremedia.org/article/what-happened-to-tiktok-s-project-texas">Project Texas</a>), the U.S. regulators still pressed TikTok to sell and restructure. The <a href="https://www.reuters.com/business/american-investor-consortium-acquire-tiktok-us-entity-axios-reports-2025-12-18/">eventual deal</a>, reached in late 2025, forced ByteDance to reduce its stake to 19.9% and cede majority ownership to U.S. investors. U.S. user data, critical algorithms, and content decisions must be controlled by a new U.S.-led joint venture (see our <a href="https://www.internetgovernance.org/2025/10/14/identity-politics-the-tiktok-deal-chinese-export-controls-and-firms-country-of-origin-conundrum/">previous post</a>). <b>This case shows what the U.S. really wants over a China-originated company when it carries strategic value: to gain absolute controlling power over it.</b></p>
<p>Recent developments of the Comprehensive<i> Outbound Investment National Security</i> (<a href="https://chinaselectcommittee.house.gov/media/bills/coins-act">COINS</a>) Act further exemplifies the intentionally expansive nature of the U.S. government’s definition of a Chinese company. The <a href="https://info.wsgr.com/index.php/email/emailWebview?email=NDE3LUxYRi01NjUAAAGfNAp2oH1SWowhwoIt8ZGHFNTfGWygCSYC5JjMJxv-ciLivhaT0tXhd9UPXADB6KeFwuyMfLcSDfuwgT2BUr5OTZjWhuavEL0OHw">COINS Act </a>broadens the scope of &#8220;covered foreign persons&#8221; by replacing the OISP’s fixed equity and voting thresholds with a qualitative &#8220;direction or control&#8221; standard, which captures entities regardless of their specific ownership percentages. This shift ensures that minority-owned or non-technical Chinese entities still remain subject to OISP.</p>
<p>Pushing this current logic and trend further, an extreme but plausible situation would be: whenever a China-originated company is deemed to carry high strategic value (be it in AI, telecommunications, social media, etc.), even entities that fall outside this strict definition (e.g. headquartered offshore with mixed ownership) can be treated with suspicion if they have Chinese DNA in their founding team or technology.</p>
<h2><b>Mind the gap: the stack of Identity engineering</b></h2>
<p>By summarizing the current U.S. regulations and political climate, a new Chinese AI firm will have to painstakingly conduct a whole stack of identity engineering if they are still seriously seeking to obey U.S. regulations, enter the U.S. market, and/or receive U.S. investment:</p>
<ul>
<li aria-level="1">Incorporation &amp; HQ abroad: register and headquarter outside mainland China, Hong Kong, and Macau SARs.</li>
<li aria-level="1">No majority China exposure: ensure the majority of its revenue and expenditure are not primarily tied to the Chinese market.</li>
<li aria-level="1">Avoid state linkage: decline investments from state-owned funds and avoid state contracts and affiliations.</li>
<li aria-level="1">Isolate data flows: store user and operational data outside China and block any cross-border transfers back to Chinese servers.</li>
<li aria-level="1">Rebrand globally: De-emphasize Chinese origin in marketing, press, and investor materials.</li>
</ul>
<p>In a more extreme playbook, when more restrictive and racist requirements emerge from the U.S., they might even have to:</p>
<ul>
<li aria-level="1">Be led by non-Chinese management and staff: limit Chinese passport holders in executive, technical, or board-level roles.</li>
<li aria-level="1">Have zero China operations: shut down domestic business entirely and block Chinese IP access to platforms.</li>
<li aria-level="1">Supply chain decoupling: move manufacturing and hosting relationships out of China.</li>
</ul>
<p>If a China-originated company truly adheres to all the requirements here, can they still be defined as Chinese companies? Manus made a clear choice to totally abandon its home market identity, but not all firms are audacious enough to burn so many bridges. This level of compliance with U.S. regulations is, in effect, a clear act of “taking a side”, which will inevitably carry consequences from the Chinese regulator and market.</p>
<h2><b>Conclusion</b></h2>
<p>Although some commentators may argue that identity engineering is just companies’ reactive measures to bypass and dodge U.S. regulation, such policies still pose long-term costs to Chinese companies.</p>
<p>Chinese technology firms like Manus essentially attempt to leverage the comparative advantages of both China and the U.S. On the one hand, they thrive from the high-quality talent pool, advantageous application innovation environment, and strong manufacturing capacity from China. On the other hand, they still want to enter the US market due to its high liquidity, strong consumption power, and access to computing power. Under the current restrictive and discriminative policies from the U.S. government, they must implement a full stack of “identity engineering”. However, when the costs for compliance have reached a tipping point where they exceed the gains, they may need to consider another path.</p>
<p>More importantly, the pivotal question remains for some Chinese firms: despite all their efforts to rebrand, restructure, and even alienate their home market, will the U.S. regulators ever truly accept them as “non-Chinese”? I doubt so, given the contingent nature of U.S. investment policies amid strategic competition with China, the final determination of “who they are” is hardly theirs to make.</p>
<p>The post <a href="https://www.internetgovernance.org/2026/01/07/identity-engineering-why-a-leading-chinese-ai-startup-abandons-its-home-market/">Identity Engineering: Why a leading Chinese AI startup abandons its home market</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t Renew the Cybersecurity Information Sharing Act</title>
		<link>https://www.internetgovernance.org/2026/01/03/dont-renew-the-cybersecurity-information-sharing-act/</link>
		
		<dc:creator><![CDATA[Milton Mueller]]></dc:creator>
		<pubDate>Sun, 04 Jan 2026 00:19:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Privacy & Surveillance]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10395</guid>

					<description><![CDATA[<p>The Cybersecurity Information Sharing Act of 2015 (CISA 2015) was enacted during a period of heightened anxiety over massive state-sponsored breaches and the burgeoning threat of global ransomware. Its architects envisioned a nationwide &#8220;digital neighborhood watch,&#8221; where private companies and the federal government would swap &#8220;indicators of compromise&#8221; (IOCs) in real-time, shielded by broad liability [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2026/01/03/dont-renew-the-cybersecurity-information-sharing-act/">Don&#8217;t Renew the Cybersecurity Information Sharing Act</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="model-response-message-contentr_fd64a20d99e7fa81" class="markdown markdown-main-panel tutor-markdown-rendering enable-updated-hr-color" dir="ltr" aria-live="polite" aria-busy="false">
<p data-path-to-node="0">The Cybersecurity Information Sharing Act of 2015 (CISA 2015) was enacted during a period of heightened anxiety over massive state-sponsored breaches and the burgeoning threat of global ransomware. <span class="citation-155 citation-end-155">Its architects envisioned a nationwide &#8220;digital neighborhood watch,&#8221; where private companies and the federal government would swap &#8220;indicators of compromise&#8221; (IOCs) in real-time, shielded by broad liability protections.</span></p>
<p data-path-to-node="1">However, nearly a decade later, the framework of CISA 2015 has stagnated, and the landscape of cybersecurity has evolved. As the law faces its sunset and the debate over its renewal intensifies, a cold-eyed assessment of its flagship program, the <b data-path-to-node="1" data-index-in-node="249">Automated Indicator Sharing (AIS) </b>system, reveals a system that is not only failing to meet its objectives but is increasingly viewed as an obsolete relic of an earlier era of cyber defense.</p>
<h2 data-path-to-node="3">A Program in Terminal Decline</h2>
<p data-path-to-node="4">The primary justification for renewing CISA 2015 is the expansion of threat intelligence sharing. <span class="citation-153 citation-end-153">Yet, according to the federal government’s own auditors, the law has presided over a dramatic contraction, not an expansion, of shared intelligence.</span></p>
<p data-path-to-node="5"><span class="citation-152">The Department of Homeland Security’s Office of Inspector General (OIG) has released several scathing reports (notably </span><a href="https://www.oig.dhs.gov/sites/default/files/assets/2024-09/OIG-24-60-Sep24.pdf"><b data-path-to-node="5" data-index-in-node="119"><span class="citation-152">OIG-24-60</span></b></a><span class="citation-152"> and the final 2025 assessment </span><a href="https://www.oig.dhs.gov/reports/2025/cisa-has-not-finalized-plans-automated-cyber-threat-information-sharing-beyond-cybersecurity-act-2015-expiration/oig-25-46-sep25"><b data-path-to-node="5" data-index-in-node="159"><span class="citation-152">OIG-25-46</span></b></a><span class="citation-152 citation-end-152">) documenting the steady erosion of the AIS program.</span> The data paints a picture of a &#8220;ghost town&#8221; of information exchange:</p>
<ul data-path-to-node="6">
<li>
<p data-path-to-node="6,0,0"><b data-path-to-node="6,0,0" data-index-in-node="0">Participation Collapse:</b><span class="citation-151 citation-end-151"> The number of non-federal participants using AIS to share information peaked at 304 in 2020.</span> By late 2022, that number had plummeted to 135. As of late 2024, active non-federal participants have dwindled to fewer than 90.</p>
</li>
<li>
<p data-path-to-node="6,1,0"><b data-path-to-node="6,1,0" data-index-in-node="0">Indicator Freefall:</b> More telling than the number of participants is the volume of data shared. <span class="citation-150">Between 2020 and 2022, the sharing of IOCs through AIS declined by a staggering </span><b data-path-to-node="6,1,0" data-index-in-node="175"><span class="citation-150">93%</span></b><span class="citation-150 citation-end-150">.</span></p>
</li>
<li>
<p data-path-to-node="6,2,0"><b data-path-to-node="6,2,0" data-index-in-node="0"><span class="citation-149">The &#8220;Single Source&#8221; Mirage:</span></b><span class="citation-149"> While CISA reported a surge in shared indicators in 2024 (climbing from 1 million to 10 million), the OIG revealed that </span><span class="citation-149">89% of that data came from a single private-sector participant</span><span class="citation-149 citation-end-149">.</span></p>
</li>
</ul>
<p data-path-to-node="7">This &#8220;unevenness&#8221; is a critical indicator of systemic failure. When a national security program relies on a single corporate benefactor for nearly 90% of its utility, it is no longer a &#8220;nationwide sharing&#8221; initiative; it is a specialized partnership disguised as a broad statutory success. <span class="citation-148 citation-end-148">The federal government’s inability to recruit and retain a diverse range of data producers suggests that the private sector has voted with its feet, finding the AIS framework fundamentally mismatched to modern operational needs.</span></p>
<h2 data-path-to-node="9">The Superiority of Decentralized, Sectoral Information Sharing</h2>
<p data-path-to-node="10">The second reason to oppose the renewal of CISA 2015 is that the market and the nonprofit community are already doing what CISA failed to deliver. Commercial threat intelligence services, nonprofit <a href="https://www.splunk.com/en_us/blog/learn/isacs-information-sharing-analysis-centers.html">Information Sharing and Analysis Centers (ISACs)</a> and industry consortia like the <a href="https://www.cyberthreatalliance.org/about/our-sharing-model/">Cyber Threat Alliance</a> have emerged as the gold standard for information sharing. Oddly, the CISA-run system, at its core an attempt to centralize power, relies entirely on the volition of information sharers to get its data. Unlike commercial and some nonprofit threat intel services, which operate telemetry services that automate data collection, CISA relies on voluntary decision by agencies and enterprises to send data into the AIS.</p>
<h3 data-path-to-node="11">The Power of Context</h3>
<p data-path-to-node="12"><span class="citation-147">Modern cybersecurity is no longer about having a &#8220;list&#8221; of bad IP addresses; it is about understanding the </span><span class="citation-147">Tactics, Techniques, and Procedures (TTPs)</span><span class="citation-147 citation-end-147"> of specific adversaries.</span></p>
<ul data-path-to-node="13">
<li>
<p data-path-to-node="13,0,0"><b data-path-to-node="13,0,0" data-index-in-node="0">ISACs:</b><span class="citation-146 citation-end-146"> ISACs were products of the Clinton administration&#8217;s critical infrastructure security commission. From the late 1990s on, sector-specific groups like the Financial Services ISAC (FS-ISAC) or the Electricity ISAC (E-ISAC) have provided &#8220;vetted&#8221; intelligence.</span> When a bank shares data with FS-ISAC, it is reviewed by human analysts who understand the specific banking software and regulatory environment. This &#8220;contextualized&#8221; data is actionable.</p>
</li>
<li>
<p data-path-to-node="13,1,0"><b data-path-to-node="13,1,0" data-index-in-node="0">Commercial Feeds:</b> Companies today pay for specialized feeds (such as those from CrowdStrike, Mandiant, or LevelBlue) that provide high-fidelity data tailored to their specific attack surface.</p>
</li>
</ul>
<p data-path-to-node="14"><span class="citation-145">In contrast, the AIS program—mandated by CISA 2015—focuses on </span><span class="citation-145">machine-to-machine bulk sharing</span><span class="citation-145 citation-end-145"> of raw indicators.</span> This approach prioritizes <i data-path-to-node="14" data-index-in-node="139">quantity</i> over <i data-path-to-node="14" data-index-in-node="153">quality</i>.</p>
<table data-path-to-node="15">
<thead>
<tr>
<td></td>
<td><strong>AIS (Federal)</strong></td>
<td><strong>Sectoral ISACs / Commercial</strong></td>
</tr>
</thead>
<tbody>
<tr>
<td><span data-path-to-node="15,1,0,0"><b data-path-to-node="15,1,0,0" data-index-in-node="0">Data Quality</b></span></td>
<td><span data-path-to-node="15,1,1,0">Raw, often unverified IOCs.</span></td>
<td><span data-path-to-node="15,1,2,0">Vetted, high-fidelity TTPs.</span></td>
</tr>
<tr>
<td><span data-path-to-node="15,2,0,0"><b data-path-to-node="15,2,0,0" data-index-in-node="0">Actionability</b></span></td>
<td><span data-path-to-node="15,2,1,0">High false-positive rate.</span></td>
<td><span data-path-to-node="15,2,2,0">Low false-positive; sector-relevant.</span></td>
</tr>
<tr>
<td><span data-path-to-node="15,3,0,0"><b data-path-to-node="15,3,0,0" data-index-in-node="0">Trust Model</b></span></td>
<td><span data-path-to-node="15,3,1,0">Anonymous/Bureaucratic.</span></td>
<td><span data-path-to-node="15,3,2,0">Peer-to-peer/Community-based.</span></td>
</tr>
<tr>
<td><span data-path-to-node="15,4,0,0"><b data-path-to-node="15,4,0,0" data-index-in-node="0">Response</b></span></td>
<td><span data-path-to-node="15,4,1,0">Passive (repository).</span></td>
<td><span data-path-to-node="15,4,2,0">Active (collaborative defense).</span></td>
</tr>
</tbody>
</table>
<p data-path-to-node="16">Renewing CISA 2015 under the guise of &#8220;improving&#8221; information sharing ignores the reality that the &#8220;sharing&#8221; problem has been solved elsewhere. The federal government’s attempt to duplicate these high-trust, high-context environments through a centralized, one-size-fits-all statute has proven to be a redundant exercise that consumes millions in taxpayer dollars with little added value.</p>
<h2 data-path-to-node="18">The Centralization Myth: Data Without Responsibility</h2>
<p data-path-to-node="19">The fundamental philosophical flaw of CISA 2015 is its attempt to centralize cyber threat data in federal hands, while the responsibility for action remains decentralized and the sources of data are highly distributed. This creates a structural bottleneck that actively hinders effective defense. The only real agenda behind the renewal of the act is tbe bureaucratic interest of the Cybersecurity and Infrastructure Security Agency (CISA) to give itself a bigger budget and a more central role in &#8220;managing&#8221; cybersecurity.</p>
<h3 data-path-to-node="20">The Responsibility Gap</h3>
<p data-path-to-node="21">Cybersecurity is an operational, &#8220;on-the-ground&#8221; discipline. The entities best positioned to detect, mitigate, and recover from an attack are the IT departments of the specific organizations being targeted, or specialist threat intel providers. A hospital in Ohio or a municipal water plant in Florida need specific, immediate intelligence about threats to their specific infrastructure. While it&#8217;s true that information specifically targeted at hospitals or water plants could be useful to these actors, the vast majority of threat intel out there is not relevant to them.</p>
<p data-path-to-node="22">The AIS program operates on a &#8220;hub-and-spoke&#8221; model where all roads lead to the Department of Homeland Security. The &#8220;centralized&#8221; data repository becomes a &#8220;black hole&#8221;—data enters, is scrubbed for privacy, analyzed by a distant bureaucracy, and by the time it is redistributed, the threat has often morphed or the &#8220;indicator&#8221; (like an IP address) has been discarded by the attacker. But most of the data is just not relevant.</p>
<h3 data-path-to-node="23">The &#8220;Noise&#8221; Problem</h3>
<p data-path-to-node="24">For most organizations, the bulk data provided by the AIS is not an asset; it is noise. Security Operations Centers (SOCs) are already overwhelmed by thousands of alerts per day. Ingesting millions of unvetted, uncontextualized indicators from a nationwide AIS often leads to &#8220;alert fatigue,&#8221; where real threats are missed because analysts are chasing ghost indicators that have no relevance to their specific environment.</p>
<p data-path-to-node="25">By attempting to centralize this data, CISA 2015 encourages a &#8220;compliance-over-security&#8221; mindset. Organizations may feel they are doing their part by &#8220;sharing with the government,&#8221; but this centralized reporting does little to actually harden their own defenses or provide them with the specific intelligence needed to survive a sophisticated intrusion.</p>
<h2 data-path-to-node="27">Conclusion: Let it Expire</h2>
<p data-path-to-node="28">The Cybersecurity Information Sharing Act of 2015 was a product of its time—a well-intentioned but ultimately flawed attempt to treat digital defense like a centralized military operation. The evidence from the past decade is clear:</p>
<ol start="1" data-path-to-node="29">
<li>
<p data-path-to-node="29,0,0"><b data-path-to-node="29,0,0" data-index-in-node="0"><span class="citation-144">The program is failing statistically</span></b><span class="citation-144 citation-end-144">, with participation and data volume in freefall.</span></p>
</li>
<li>
<p data-path-to-node="29,1,0"><b data-path-to-node="29,1,0" data-index-in-node="0">Superior alternatives exist</b> in the private and nonprofit sectors that provide the context and trust the government cannot replicate.</p>
</li>
<li>
<p data-path-to-node="29,2,0"><b data-path-to-node="29,2,0" data-index-in-node="0">The centralized model is structurally unsound</b>, creating a repository of &#8220;noise&#8221; that provides little value to the organizations actually responsible for securing the nation’s infrastructure.</p>
</li>
</ol>
<p data-path-to-node="30">Renewing CISA 2015 would be a victory for bureaucratic inertia, but a defeat for cybersecurity efficacy. Instead of reauthorizing a law that supports a declining and ineffective AIS program, policymakers should pivot toward supporting the organic, decentralized ecosystems of the ISACs and focusing federal resources on securing the government’s own notoriously vulnerable networks. Cyber defense belongs at the edge, in the hands of the practitioners—not in a centralized federal database that the industry has clearly outgrown.</p>
</div>
<p>The post <a href="https://www.internetgovernance.org/2026/01/03/dont-renew-the-cybersecurity-information-sharing-act/">Don&#8217;t Renew the Cybersecurity Information Sharing Act</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IGP Year in Review (2025)</title>
		<link>https://www.internetgovernance.org/2025/12/31/igp-year-in-review-2025/</link>
		
		<dc:creator><![CDATA[Brenden Kuerbis]]></dc:creator>
		<pubDate>Wed, 31 Dec 2025 20:36:49 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://www.internetgovernance.org/?p=10385</guid>

					<description><![CDATA[<p>The Internet Governance Project&#8217;s coverage in 2025 documents a troublesome ongoing global shift from &#8220;multistakeholder&#8221; governance and ICT liberalization norms toward an era characterized by aggressive techno-nationalism and state-centric control over networks, software applications, and expression. However, there were also important positive developments surrounding decentralized digital currency, a pragmatic transition to economically based realism concerning [&#8230;]</p>
<p>The post <a href="https://www.internetgovernance.org/2025/12/31/igp-year-in-review-2025/">IGP Year in Review (2025)</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">The Internet Governance Project&#8217;s coverage in 2025 documents a troublesome ongoing global shift from &#8220;multistakeholder&#8221; governance and ICT liberalization norms toward an era characterized by aggressive techno-nationalism and state-centric control over networks, software applications, and expression. However, there were also important positive developments surrounding decentralized digital currency, a pragmatic transition to economically based realism concerning AI, and stronger access controls and individual rights over increasingly valuable data. All of this highlights a digital political economy landscape defined by the friction between a global internet and territorial states. Yet we remain optimistic, as non-state led governance has a long history of demonstrated success and unparalleled connectivity and economic growth. Below is a brief summary of our coverage. As we head into 2026 we’d like to thank our global audience, collaborators, and funders for their continued support.</span></p>
<h3><b>1. The Entrenchment of Techno-Nationalism</b></h3>
<p><span style="font-weight: 400;">The dominant theme of 2025 was the solidification of the &#8220;tech cold war.&#8221; While the US-China conflict remained central, IGP expanded analysis to show how techno-nationalism increasingly became a global norm, with (mostly) governments pursuing their own aggressive and destructive notions of “digital sovereignty”. We’ve consistently critiqued strategies of &#8220;containment&#8221; and &#8220;decoupling,&#8221; arguing that these policies often backfire or serve political theater rather than technical security. </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>US-China Tech War:</b><span style="font-weight: 400;"> We argued that while the US successfully choked off China’s access to advanced hardware (chips), the two ecosystems remain deeply interdependent. </span><i><span style="font-weight: 400;">Unpacking US-China &#8220;Decoupling&#8221;</span></i><span style="font-weight: 400;"> and </span><i><span style="font-weight: 400;">Apple in China</span></i><span style="font-weight: 400;"> highlight that complete separation is economically destructive and often impossible. Meanwhile, Chinese firms adapted by innovating in software efficiency (e.g., </span><i><span style="font-weight: 400;">DeepSeek-OCR</span></i><span style="font-weight: 400;">) rather than brute-force computing.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>The &#8220;India Stack&#8221;:</b><span style="font-weight: 400;"> Coverage of India highlighted a distinct form of protectionism. The blog critiqued the push for &#8220;indigenous&#8221; web browsers as mere skins designed to enforce government surveillance (root certificates) rather than genuine innovation. Similarly, </span><i><span style="font-weight: 400;">India’s Satellite Communications Policy</span></i><span style="font-weight: 400;"> analyzed how the entry of Starlink was managed to balance geopolitical alignment with the U.S. against the protectionist demands of local telecom giants like Jio.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>TikTok &amp; Identity Politics:</b><span style="font-weight: 400;"> The &#8220;settlement&#8221; of the TikTok ban was framed not as a security win, but as the imposition of state-aligned control over media, driven by &#8220;identity politics&#8221; and anti-China sentiment rather than technical threat models.</span></li>
</ul>
<p><b>Referenced Articles:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/04/20/unpacking-us-china-decoupling-in-ai/"><span style="font-weight: 400;">Unpacking US-China &#8220;Decoupling&#8221; in AI</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/01/17/embarrassing-the-future-tiktok-decision-turns-on-data-collection/"><span style="font-weight: 400;">Embarrassing the Future: TikTok Decision Turns on Data Collection</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/01/18/why-a-tiktok-divestiture-never-happened/"><span style="font-weight: 400;">Why a TikTok Divestiture Never Happened</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/09/28/the-shocking-part-of-the-tiktok-settlement-that-no-ones-talking-about/"><span style="font-weight: 400;">The shocking part of the TikTok settlement that no one’s talking about</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/10/14/identity-politics-the-tiktok-deal-chinese-export-controls-and-firms-country-of-origin-conundrum/"><span style="font-weight: 400;">Identity politics: The TikTok Deal, Chinese export controls&#8230;</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/01/29/deepseek-disruption/"><span style="font-weight: 400;">DeepSeek Disruption</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/10/30/deepseek-ocr-chinas-answer-to-the-u-s-chip-ban/"><span style="font-weight: 400;">DeepSeek-OCR: China’s Answer to the U.S. Chip Ban</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/04/15/indigenous-web-browsers-in-india-who-benefits/"><span style="font-weight: 400;">“Indigenous” Web Browsers in India: Who Benefits?</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/08/11/indias-satellite-communications-policy-balancing-competition-connectivity-and-control/"><span style="font-weight: 400;">India’s Satellite Communications Policy</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/07/11/apple-in-china-a-critical-review/"><span style="font-weight: 400;">“Apple in China:” A Critical Review</span></a></li>
</ul>
<h3><b>2. Institutional Challenges to Internet Governance</b></h3>
<p><span style="font-weight: 400;">The year 2025 marked a watershed moment for some global internet governance institutions, culminating in a significant shift toward state-centric influence within the United Nations system and potentially on the African continent.</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>The UN Swallows the IGF:</b> <span style="font-weight: 400;">C</span><span style="font-weight: 400;">overage throughout the year—including </span><i><span style="font-weight: 400;">Has the IGF lost the Plot?</span></i><span style="font-weight: 400;"> and </span><i><span style="font-weight: 400;">Should WSIS End?</span></i><span style="font-weight: 400;">—warned that the forum had become a venue for bureaucratic process rather than helping to resolve real-world digital conflicts. A major development occurred in December with the conclusion of the </span><b>WSIS+20 review</b><span style="font-weight: 400;">. We </span><a href="https://www.internetgovernance.org/wp-content/uploads/IGP-WhitePaper-EndWSIS.pdf"><span style="font-weight: 400;">critically analyzed</span></a><span style="font-weight: 400;"> the UN General Assembly&#8217;s decision to make the </span><b>Internet Governance Forum (IGF)</b><span style="font-weight: 400;"> a &#8220;permanent forum of the UN.&#8221;  By absorbing a multistakeholder deliberative body into the multilateral bureaucracy, the UN has effectively &#8220;internalized&#8221; the conflict between sovereign control and the global internet. While the impact of this remains uncertain, the WSIS process will not face another existential challenge for at least a decade.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>AfriNIC Crisis:</b><span style="font-weight: 400;"> IGP closely followed the governance crisis at </span><b>AfriNIC</b><span style="font-weight: 400;"> (the African region IP address registry). It reported on the Supreme Court of Mauritius’s intervention to allow board elections to proceed despite legal sabotage by litigants. Our coverage was highly critical of </span><b>ICANN’s</b><span style="font-weight: 400;"> intervention with SmartAfrica in the process, arguing that ICANN fostered &#8220;not-so-smart ideas&#8221; that threatened the autonomy of the regional registry system.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Defending Independence:</b><span style="font-weight: 400;"> In contrast to the above, our blog championed initiatives to create independent governance structures. It argued for the privatization of the </span><b>.US domain</b><span style="font-weight: 400;"> to foster innovation and promoted the </span><a href="https://mitpress.mit.edu/9780262552585/declaring-independence-in-cyberspace/"><i><span style="font-weight: 400;">Declaring Independence in Cyberspace</span></i></a><span style="font-weight: 400;"> book to remind stakeholders that the IANA transition proved the viability of non-state governance. </span></li>
</ul>
<p><b>Referenced Articles:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/12/18/wsis20-the-un-swallows-the-igf/"><span style="font-weight: 400;">WSIS+20: The UN Swallows the IGF</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/06/12/should-wsis-end-a-call-for-discussion/"><span style="font-weight: 400;">Should WSIS End? A call for discussion</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/04/23/has-the-igf-lost-the-plot/"><span style="font-weight: 400;">Has the IGF lost the Plot?</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/06/19/has-the-supreme-court-of-mauritius-resolved-afrinics-governance-turmoil/"><span style="font-weight: 400;">Has the Supreme Court of Mauritius Resolved AfriNIC’s Governance Turmoil?</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/11/15/icann-fosters-some-not-so-smart-ideas-for-afrinic/"><span style="font-weight: 400;">ICANN fosters some Not-So-Smart Ideas for AFRINIC</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/02/04/is-it-time-to-privatize-us/"><span style="font-weight: 400;">Is it time to privatize .US?</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/05/12/new-book-declaring-independence-in-cyberspace/"><span style="font-weight: 400;">New Book: Declaring Independence in Cyberspace</span></a></li>
</ul>
<h3><b>3. Technological Governance: Realism over Rhetoric </b></h3>
<p><span style="font-weight: 400;">The narrative shifted from existential dread over AI to economic skepticism and a critique of &#8220;safety&#8221; as a mask for industrial policy.</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Policy &amp; Politics: </b><span style="font-weight: 400;">The blog analyzed the collapse of </span><b>global AI coordination</b><span style="font-weight: 400;"> (</span><i><span style="font-weight: 400;">So Much for Global Governance of AI&#8230;</span></i><span style="font-weight: 400;">), noting that nations retreated to &#8220;AI nationalism&#8221; at the Paris Summit. It also predicted that a </span><b>Trump 2.0</b><span style="font-weight: 400;"> administration would pivot away from &#8220;safety&#8221; obsessions toward deregulation and rapid innovation to compete with China</span></li>
<li style="font-weight: 400;" aria-level="1"><b>AI Investment Corrections</b><span style="font-weight: 400;"> By October, IGP predicted an inevitable economic correction for the </span><b>AI sector</b><span style="font-weight: 400;">. We argued that the massive capital expenditure on chips and data centers is a bubble driven by &#8220;FOMO&#8221; (Fear Of Missing Out) and government subsidies rather than sustainable business models, predicting a crash similar to the dot-com bust.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Governance &amp; Safety:</b><span style="font-weight: 400;"> Early in the year, we critiqued &#8220;safety&#8221; reports from </span><b>California and OpenAI’s</b><span style="font-weight: 400;"> call for bans on Chinese models as &#8220;neo-mercantilist&#8221; protectionism disguised as safety. Countering &#8220;Terminator&#8221; narratives, </span><i><span style="font-weight: 400;">Rethinking AI in Warfare</span></i><span style="font-weight: 400;"> argued for viewing AI as an &#8220;augmentation&#8221; tool for decision support rather than a substitution for human agency. We highlighted research showing that Chinese models (DeepSeek) are not monolithic propaganda tools; they can be &#8220;jailbroken&#8221; to criticize the CCP, suggesting that the &#8220;threat&#8221; of foreign AI is exaggerated to justify domestic control. It wasn’t all AI, we pushed back on exaggerated national-security fears over Battery Energy Storage Systems (BESS), providing a sober, <a href="https://www.internetgovernance.org/wp-content/uploads/Villareal-BESS-June-2024.pdf">fact-driven analysis</a> that risks are manageable if properly engineered. </span></li>
</ul>
<p><b>Referenced Articles:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/02/14/so-much-for-global-governance-of-ai/"><span style="font-weight: 400;">So Much for Global Governance of AI&#8230;</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/02/11/trump-2-0s-ai-policy-direction-a-break-from-national-security-obsession/"><span style="font-weight: 400;">Trump 2.0&#8217;s AI Policy Direction</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/10/08/the-coming-ai-bust/"><span style="font-weight: 400;">The Coming AI Bust</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/02/21/the-frontier-illusion-rethinking-deepseeks-ai-threat/"><span style="font-weight: 400;">The Frontier Illusion: Rethinking DeepSeek’s AI Threat</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/03/03/deepseek-says-xi-jinping-is-a-dictator/"><span style="font-weight: 400;">DeepSeek Says “Xi Jinping is a Dictator”</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/03/14/openais-manifesto-neo-mercantilism-enters-global-ai-governance/"><span style="font-weight: 400;">OpenAI’s manifesto: Neo-mercantilism Enters Global AI Governance</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/03/27/a-review-of-the-draft-report-of-the-california-working-group-on-ai-frontier-models/"><span style="font-weight: 400;">A Review of the Draft Report of the California Working Group on AI Frontier Models</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/06/03/from-substitution-to-augmentation-rethinking-ai-in-warfare/"><span style="font-weight: 400;">From Substitution to Augmentation: Rethinking AI in Warfare</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/02/24/indias-report-on-ai-governance-guidelines-development/"><span style="font-weight: 400;">India&#8217;s Report on AI Governance Guidelines Development</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2024/06/20/batteries-enable-the-renewables-transition-but-can-we-trust-chinas-batteries/"><span style="font-weight: 400;">Batteries Enable the Renewables Transition: But Can We Trust China’s Batteries?</span></a></li>
</ul>
<h3><b>4. The Digital Economy: Money, Data, and Industrial Policy</b></h3>
<p><span style="font-weight: 400;">IGP explored how digital monetary networks and data access control and rights are being reshaped, proposing strategic alignments for the U.S. dollar and exploring emerging governance mechanisms in response to technological change.</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Dollar Dominance:</b><span style="font-weight: 400;"> IGP </span><a href="https://www.internetgovernance.org/wp-content/uploads/Networks_of_money_research_paper-1-1.pdf"><span style="font-weight: 400;">proposes a strategy</span></a><span style="font-weight: 400;"> where the U.S. leverages </span><b>stablecoins</b><span style="font-weight: 400;"> (digitized dollars) to interconnect with the Bitcoin network. Analyzed in the context of the </span><b>GENIUS Act</b><span style="font-weight: 400;">, which legalized and regulated the stablecoin market in mid-2025, the authors argue this would extend U.S. monetary hegemony against BRICS alternatives by making the dollar the on-ramp for the crypto economy.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Data Enclosure:</b> Cloudflare’s<span style="font-weight: 400;"> move to block AI crawlers by default is analyzed as a pivotal moment of &#8220;data enclosure.&#8221; A </span><a href="https://www.tandfonline.com/doi/full/10.1080/23738871.2025.2597192?src="><span style="font-weight: 400;">new paper</span></a><span style="font-weight: 400;"> argues this potentially transforms the “open web,” shifting it further toward market-based and other mechanisms for exchanging increasingly valuable data, and raises important questions about competition and innovation.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Bits vs. Atoms:</b> <i><span style="font-weight: 400;">Industrial Policy vs. Digital Reality</span></i><span style="font-weight: 400;"> critiqued the political obsession with bringing back factory jobs, using Palantir as an example to show that modern &#8220;reindustrialization&#8221; is driven by data and software, not labor-intensive assembly lines.</span></li>
</ul>
<p><b>Referenced Articles:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/02/11/interconnection-and-rivalry-in-global-monetary-networks-strengthening-the-dollar-in-a-shifting-global-economy/"><span style="font-weight: 400;">Interconnection and Rivalry in Global Monetary Networks</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/09/05/networks-of-money-shoring-up-dollar-dominance-with-cryptocurrency/"><span style="font-weight: 400;">Networks of Money</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/05/26/a-genius-bill/"><span style="font-weight: 400;">A GENIUS Bill?</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/12/01/is-the-banking-system-at-a-turning-point/"><span style="font-weight: 400;">Is the Banking System at a Turning Point?</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/07/23/cloudflare-declares-content-independence-a-new-phase-of-data-enclosure-in-ai-markets/"><span style="font-weight: 400;">Cloudflare Declares “Content Independence”: A New Phase of Data Enclosure</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/05/29/industrial-policy-vs-digital-reality-how-data-not-labor-is-rebuilding-the-rust-belt/"><span style="font-weight: 400;">Industrial Policy vs. Digital Reality</span></a></li>
</ul>
<h3><b>5. Censorship, Compliance, and Information Flow</b></h3>
<p><span style="font-weight: 400;">Analysis of free speech moved beyond simple binaries, examining how platforms navigate conflicting legal regimes, how &#8220;safety&#8221; can lead to suppression, and noting a realignment where recent defenders of expression have become proponents of control.</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Power Corrupts:</b><span style="font-weight: 400;"> IGP criticized U.S. Republicans for hypocrisy. After years of decrying jawboning and censorship by Democrats (which we similarly took issue with), they began using state power (visa restrictions, FCC threats) to target political opponents and university protesters once they regained influence. Our coverage of the Kirk Assassination highlighted how political violence is used to justify crackdowns on speech.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Global Censorship:</b><span style="font-weight: 400;"> We also critiqued human rights group Article 19 for labeling an AWS cloud outage a &#8220;democratic failure,&#8221; arguing this conflates technical resilience with political censorship and ideological arguments against private infrastructure. </span><i><span style="font-weight: 400;">Is Musk a Hypocrite?</span></i><span style="font-weight: 400;"> offered a nuanced take on X’s (Twitter) actions in Turkey and India. It distinguished between compliance with valid court orders (Turkey) and resistance to extra-legal state coercion (India), arguing that platforms are often caught between local law and global principles.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Amplification vs. Detection:</b><span style="font-weight: 400;"> Reporting on an IAEA Technical Meeting, we argued that trying to &#8220;detect and delete&#8221; disinformation is a failed strategy. Instead, we encouraged building networks to &#8220;amplify&#8221; factual information during crises, shifting the focus from suppression to resilience. This expert input was grounded in IGP research resulting in a <a href="https://journals.sagepub.com/doi/abs/10.1177/17506352251390806">new paper</a>, which demonstrated how classical propaganda models and evolved digital implementation continue to explain how state actors disseminate, legitimize, and deflect disinformation during high-stakes national crises.</span></li>
</ul>
<p><b>Referenced Articles:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/06/02/the-new-republican-censorship-industrial-complex/"><span style="font-weight: 400;">The New Republican Censorship-Industrial Complex</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/09/17/free-speech-and-the-kirk-assassination/"><span style="font-weight: 400;">Free Speech and the Kirk Assassination</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/05/20/is-musk-a-hypocrite-content-removal-cases-in-turkiye-and-india/"><span style="font-weight: 400;">Is Musk a Hypocrite? Content Removal Cases in Turkiye and India</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/10/20/10289/"><span style="font-weight: 400;">Has Article 19 abandoned Article 19?</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/01/09/dns-based-web-censorship-in-india/"><span style="font-weight: 400;">DNS-based Web Censorship in India</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.internetgovernance.org/2025/07/08/igp-at-iaea-technical-meeting-2025/"><span style="font-weight: 400;">IGP at IAEA Technical Meeting 2025</span></a></li>
</ul>
<p>The post <a href="https://www.internetgovernance.org/2025/12/31/igp-year-in-review-2025/">IGP Year in Review (2025)</a> appeared first on <a href="https://www.internetgovernance.org">Internet Governance Project</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin


Served from: www.internetgovernance.org @ 2026-04-16 15:29:31 by W3 Total Cache
-->