AI, Project Glasswing, and the Changing Institutional Economics of Bugs
On April 7, Anthropic published a 244-page system card for a model that will not be made generally available for now. Claude Mythos Preview, the company’s newest frontier model, is “capable of identifying and then exploiting zero-day vulnerabilities in every…
India’s crude Internet censorship regime
Sections 69A and 79 of the Information Technology Act, 2000, empower the indian government to issue blocking orders to ISPs and intermediaries. The licensing agreement for ISPs explicitly requires that they “block Internet sites […] as identified and directed by…
Fake Cybersecurity: The FCC Router Ban
On March 23, 2026, the Federal Communications Commission (FCC) issued a Memorandum and Order banning the import of “covered” consumer-grade networking hardware. The decision demonstrates once again how the Trump administration’s economic nationalism and its use of “national security” claims…
What Everyone Is Missing About Anthropic and the Pentagon
On February 27th, President Trump directed all federal agencies to cease using Anthropic’s technology after the company refused the Pentagon’s demand to allow lawful use of its AI models for mass domestic surveillance and fully autonomous weapons. Much of the…
Beyond Borders: How Threat Intelligence Provenance Can Save Global Cybersecurity From Geopolitical Fragmentation
In mid-January 2026, the Chinese government allegedly announced a sweeping ban on cybersecurity software from more than a dozen U.S. and Israeli firms, including industry giants like Palo Alto Networks, CrowdStrike, and Check Point. The stated reason: concerns that foreign…
Did an AI application really “bully” a human?
There is a battle over the reputation of advanced AI applications going on in the news. Two worldviews conflict: Are we unleashing dangerous forces that threaten humanity? Or are we just making computers and software do a lot of new…
Digital Media and the American Civil Conflict
Operation “Metro Surge” in Minneapolis-St. Paul, USA, has now attracted national and worldwide attention. Both sides in this conflict see it as a showdown. It is a showdown, and it matters who wins. In this blog, we try to focus on…
Identity Engineering: Why a leading Chinese AI startup abandons its home market
The Chinese AI and venture capital community was shocked by Meta’s swift acquisition of Manus, an AI agent company from Wuhan, China, in a deal worth an estimated $2–3 billion. For Meta, this deal is its third-largest acquisition to date….
Don’t Renew the Cybersecurity Information Sharing Act
The Cybersecurity Information Sharing Act of 2015 (CISA 2015) was enacted during a period of heightened anxiety over massive state-sponsored breaches and the burgeoning threat of global ransomware. Its architects envisioned a nationwide “digital neighborhood watch,” where private companies and…
IGP Year in Review (2025)
The Internet Governance Project’s coverage in 2025 documents a troublesome ongoing global shift from “multistakeholder” governance and ICT liberalization norms toward an era characterized by aggressive techno-nationalism and state-centric control over networks, software applications, and expression. However, there were also…



