Welcome to the premier episode of cybercrank’s ‘Let’s be frank!, a cybercrank editorial channel that will periodically question generally accepted conventions. Consider it a space where a cybercrank can rant – politely, …
From Routing Risk to Cyber Sovereignty: A China Case
This post was initially published 16-Dec-2019 and updated on 27-Dec-2019. I spend a fair amount of time footprinting and looking at data on country internet topologies, i.e. the size, structure and industry …
From Routing Risk to Cyber Sovereignty: A China Case arrow_forward
Huawei Unsettles Five Eyes Alliance
There’s been a lot of controversy around Huawei of late – trade sanctions with the US; source of tension in the Five Eyes alliance; exporting video surveillance systems to the world. In …
Small NATO Allies Surviving in the Bear’s Shadow – Lessons from Montenegro and Estonia
When my open source monitors recently tripped media reports on USCYBERCOM cyberwarfare exercises with Montenegro, my initial reaction was that this was about the US providing training and support to a tiny …
Small NATO Allies Surviving in the Bear’s Shadow – Lessons from Montenegro and Estonia arrow_forward
Internet Mechanics™
As Internet Mechanics™ is a major theme of this blog, an introduction is in order. Mechanics refers to the study of the properties and behavior of physical things when subjected to forces …