Saturday, September 20, 2025

Formal Complaint Letter to IEEE: Plagiarism in IoT Newsletter (September 14, 2025)

 

© 2025 Charles Sun. All rights reserved.


This is the full text of the formal complaint letter I submitted to IEEE on September 14, 2025. The letter set a deadline of September 19, 2025 for corrective action regarding documented plagiarism in the IEEE IoT Newsletter article. That deadline has now passed without response. To ensure transparency, I am publishing the letter here in full as part of the public record.


Date: September 14, 2025

Dear IEEE IoT Newsletter Editorial Board / Editor‑in‑Chief, IEEE Intellectual Property Rights (IPR) Office, and IEEE Member Conduct/Ethics Committee (EMCC):

I am formally reporting clear, major plagiarism in the IEEE IoT Newsletter article “IPv6 and Internet of Things: Prospects for Latin America” (July 17, 2017). My detailed, line‑by‑line forensic review confirms that substantial portions are directly taken from my article, “No IoT Without IPv6” (ComputerWorld, May 19, 2016).

The attached, fully documented analysis identifies seven discrete, verifiable cases of plagiarism, summarized below:

#

Plagiarized Content (IEEE)

IEEE Location (Para)

Original Content (ComputerWorld)

CW Location (Para)

Type / Severity

1

“There is no IoT without IPv6.”

¶ 4 & Conclusions

“No IoT Without IPv6” (title); “…the IoT won’t be happening without IPv6.”

Title; Final ¶

Major — Verbatim slogan / core thesis

2

“IT experts predict that there will be over 50 billion ‘connected devices’ by 2020.”

¶ 2

“projected … more than 50 billion devices… by 2020.”

Reason 1, ¶ 2

Moderate — Paraphrased data / framing

3

“…IPv4 offers just under, 4.3 billion unique IP addresses. …IoT clearly needs more IP addresses…”

¶ 2

“IPv4 has only 4.3 billion possible IP addresses.”

Reason 1, ¶ 3

Moderate — Paraphrase, data & structure

4

“IPv6 extends… 128 bits (340 undecillion or 340 trillion trillion trillion)… for the next decades.”

¶ 3

“IPv6… 340 undecillion (that is 340 trillion trillion trillion) addresses…”

Reason 1, ¶ 6

Moderate — Numeric / phrase copying

5

“IPv6 is about vision, leadership, innovation and competitive edge.”

¶ 4

“Adopting IPv6 is a matter of leadership, vision and competitive edge.”

Reason 5, opening line

Major — Verbatim, central argument

6

Framing of Vint Cerf as an authority on IPv4 as “experimental” / IPv6 “production”

¶ 1 (lead); thematic

“…Vint Cerf… IPv4 is only ‘the experimental version…’ IPv6… actual production version…”

Reason 4

Major — Analytical / research misappropriation; concealed citation

7

“the IoT market will generate between $6 to 10 trillion a year by 2025”

¶ 6

“…the IoT represents at least a $6 trillion opportunity.”

Reason 5, final ¶

Major — Direct paraphrase; concealed source / data theft

All instances are supported with direct URL links, precise contextual quotations, and severity designations based on IEEE’s Plagiarism Policy, COPE Guidelines, and the Harvard Guide. This is not incidental overlap or public‑domain reuse — these are central technical, business, and interpretive claims, unique to my work, presented without attribution.

Required Actions — to be completed or formally scheduled no later than Friday, September 19, 2025:

  1. Immediate retraction of the offending IEEE IoT Newsletter article.
  2. Formal public acknowledgment of the plagiarism and an apology.
  3. Publication of a corrective notice describing the process undertaken and the standards now in place to prevent recurrence.
  4. Notification to all venues where this article or its content has been used, citing the retraction and reason.

If I do not receive confirmation of these actions or a binding resolution timeline by the stated deadline, I will proceed to take further steps to protect my work and the public record, supported by the complete forensic evidence package.

Please confirm receipt of this complaint immediately and provide the name and contact information of the individual responsible for the investigation. I am available to supply further documentation as needed.

Respectfully,

Charles Sun

Attachment:

Forensic Analysis Report - Plagiarism in IEEE IoT Newsletter Article 20250914

Citation Formats for This Article:

APA (7th Edition) Citation
Charles Sun. (2025, September 14). Formal complaint letter to IEEE: Plagiarism in IoT Newsletter. IPv6 Czar's Blog. https://ipv6czar.blogspot.com/2025/09/formal-complaint-letter-to-ieee.html

MLA (9th Edition) Citation
Sun, Charles. "Formal Complaint Letter to IEEE: Plagiarism in IoT Newsletter." IPv6 Czar's Blog, 14 Sept. 2025, https://ipv6czar.blogspot.com/2025/09/formal-complaint-letter-to-ieee.html.

Chicago (17th Edition) Citation
Charles Sun. "Formal Complaint Letter to IEEE: Plagiarism in IoT Newsletter." IPv6 Czar’s Blog. September 14, 2025. https://ipv6czar.blogspot.com/2025/09/formal-complaint-letter-to-ieee.html


Disclaimer: The views presented are only personal opinions and do not necessarily represent those of the U.S. Government.

#PlagiarismExposed #PublishingEthics #IEEEAccountability #ForensicDocumentation #IntellectualIntegrity #NoIoTWithoutIPv6 #CitationMatters #TechTransparency #DataMisuse #CharlesSunReports






© 2025 Charles Sun. All rights reserved.

Plagiarism in IEEE IoT Newsletter: Escalation After Inaction

© 2025 Charles Sun. All rights reserved.


Five years after the first exposure, and days after a formal complaint deadline, IEEE remains silent. The matter now moves to escalation.


This post is a sequel to my 2020 exposé on plagiarism in an IEEE publication. Five years after that initial documentation, I submitted a formal complaint directly to IEEE. The deadline I set for corrective action has now passed without response. In light of this continued silence, the matter must be escalated.
In February 2020, I published A Case of Plagiarism in the IEEE Article to publicly document troubling evidence of unattributed copying in an IEEE publication. I closed that piece with a warning: “IEEE, the world is watching.”

Five years later, the world has indeed been watching — and IEEE has yet to act.

On September 14, 2025, I submitted a formal letter of complaint to IEEE, setting a deadline of September 19, 2025 for corrective action. That deadline has now passed without resolution or acknowledgment.

Today, I am publishing my new Forensic Analysis Report, available here:
🔗 Forensic Analysis Report: Plagiarism in IEEE IoT Newsletter Article

This report provides a detailed, evidence-based examination of plagiarism in the IEEE IoT Newsletter article. The findings document:

  • Verbatim copying of unique phrasing and data
  • Patchwriting and unattributed paraphrasing
  • Misappropriation of research with altered or fabricated sources
  • Theft of conceptual frameworks central to the original work

Why this matters

  • Integrity of scholarship: Plagiarism erodes trust in professional and academic publishing.
  • Accountability: Institutions must uphold their own ethical standards, not enforce them selectively.
  • Transparency: Forensic documentation ensures the public record remains accurate and verifiable.

What’s next

In 2020, I warned that the world was watching. In 2025, it is clear: silence is complicity. This issue can no longer remain buried within institutional silence.

I call upon:

  • The academic community to recognize and reject unethical practices.
  • Professional organizations to demand accountability from IEEE.
  • Readers and researchers to share this report and insist on corrective action.

The integrity of scholarship demands nothing less.

Transparency Note

For full transparency, I have also published the complete text of my formal complaint letter to IEEE, dated September 14, 2025. This letter set a deadline of September 19, 2025 for corrective action — a deadline that has now passed without response.

You can read the full letter here:
🔗 Formal Complaint Letter to IEEE: Plagiarism in IoT Newsletter (September 14, 2025)

With this letter now part of the public record, the responsibility for action lies squarely with IEEE. Silence is no longer an option.


Citation Formats for This Article:

APA (7th Edition) Citation
Charles Sun. (2025, September 20). Plagiarism in IEEE IoT Newsletter: Escalation after inaction. IPv6 Czar's Blog. https://ipv6czar.blogspot.com/2025/09/plagiarism-in-ieee-iot-newsletter.html

MLA (9th Edition) Citation
Sun, Charles. "Plagiarism in IEEE IoT Newsletter: Escalation After Inaction." IPv6 Czar's Blog, 20 Sept. 2025, https://ipv6czar.blogspot.com/2025/09/plagiarism-in-ieee-iot-newsletter.html.

Chicago (17th Edition) Citation
Charles Sun. "Plagiarism in IEEE IoT Newsletter: Escalation After Inaction." IPv6 Czar’s Blog. September 20, 2025. https://ipv6czar.blogspot.com/2025/09/plagiarism-in-ieee-iot-newsletter.html

#PlagiarismExposed #PublishingEthics #IEEEAccountability #ForensicDocumentation #IntellectualIntegrity #NoIoTWithoutIPv6 #CitationMatters #TechTransparency #DataMisuse #CharlesSunReports

Disclaimer: The views presented are only personal opinions and do not necessarily represent those of the U.S. Government.


© 2025 Charles Sun. All rights reserved.


Friday, September 19, 2025

FORENSIC ANALYSIS REPORT: Plagiarism in IEEE IoT Newsletter Article

 

© 2025 Charles Sun. All rights reserved.

Subjects of Analysis

·       Source Article:
Sun, C. (2016, May 19). No IoT without IPv6. ComputerWorld. https://www.computerworld.com/article/1664898/no-iot-without-ipv6-2.html

·       Subject Article:
IPv6 and Internet of Things: Prospects for Latin America. (2017, July 17). IEEE IoT Newsletter. https://iot.ieee.org/articles-publications/newsletter/july-2017/ipv6-and-internet-of-things-prospects-for-latin-america.html

Executive Summary

This forensic analysis identifies multiple, verifiable instances of plagiarism within a July 2017 IEEE IoT Newsletter article. The investigation reveals that the piece systematically appropriates specific phrasing, unique statistical data, core argumentative structures, and central conceptual frameworks from Mr. Sun’s earlier work with no attribution. The types of plagiarism identified range from verbatim copying and patchwriting to the severe misappropriation of a unique intellectual concept and the intentional obfuscation of sources to disguise stolen research. These practices constitute a severe and multi-layered breach of academic and journalistic integrity, misrepresenting the originality of the work and failing to credit the original author for his research, synthesis, and innovative ideas.


The following section documents each identified instance of plagiarism with direct citations from both source texts for verification. Instances are ordered by their appearance in the subject IEEE article. 

Instance 1: The Central Thesis and Title

Source (ComputerWorld, 2016):

Title: “No IoT without IPv6”

Paragraph 1: "Does your company foresee making big bucks from the Internet of Things? It won’t be happening without widespread adoption of IPv6 first."

Paragraph 3: "Without the extensive global adoption and successful deployment of IPv6... the IoT won’t be possible."

IEEE Article (2017):

First Paragraph:

"Internet of Things (IoT) clearly needs more IP addresses than IPv4 can provide. As a result, there is no IoT without IPv6."


Analysis: The IEEE article's central thesis and its most memorable phrase are taken directly from the ComputerWorld article's title and opening argument. Its use as the foundational premise demonstrates a pattern of copying from the source material.

Type of Plagiarism: Verbatim (for the phrase) and Ideational (for the core concept).

Severity: High. It forms the primary argument of the article.

Instance 2: Misappropriation of the "50 Billion Devices" Projection

Source (ComputerWorld, 2016): 

            Reason #1, Paragraph 2:

"Cisco is thinking even bigger; it has projected that there will be more than 50 billion devices connected to the Internet by 2020."

IEEE Article (2017):             

            First Paragraph:

"Information Technologies (IT) experts predict that there will be over 50 billion ‘connected devices’ by 2020."


Analysis: The IEEE article lifts the specific 50 billion figure that Charles Sun explicitly attributes to Cisco. It replaces the clear attribution ("Cisco") with the vague and unsourced "IT experts," obfuscating the origin of the data and plagiarizing the author's act of selecting and presenting this specific statistic.

Type of Plagiarism: Misappropriation of Research / Source Obscurement.

Severity: Medium. It copies a specific, sourced data point while removing its citation.

Instance 3: Verbatim Use of the "4.3 Billion Addresses" Fact

Source (ComputerWorld, 2016):

            Reason #1, Paragraph 3:

"IPv4 has only 4.3 billion possible IP addresses."

            IEEE Article (2017):

"the current Internet Protocol version 4 (IPv4) offers just under, 4.3 billion unique IP addresses."

Analysis: This is a near-verbatim copy of a factual statement. The exact phrasing "4.3 billion" is a direct lift from the ComputerWorld article, demonstrating a lack of original composition.

Type of Plagiarism: Verbatim.

Severity: Low-Medium. It is a direct copy of a well-known factual phrase.
 

Instance 4: Description of IPv6 Address Space

Source (ComputerWorld, 2016):

Reason #1, Paragraph 6:

"It [IPv6] has a total of 340 undecillion (that is 340 trillion trillion trillion) addresses."

IEEE Article (2017):

Second Paragraph:

"The new Internet Protocol version 6 (IPv6) extends the IPv4 address space from 32 bits to 128 bits (340 undecillion or 340 trillion trillion trillion), which should be sufficient for the next decades."

Analysis: This is a near-verbatim copy of a highly specific and descriptive phrase. The parenthetical explanation "340 trillion trillion trillion" is a distinctive phrasing choice by the original author, copied exactly.

Type of Plagiarism: Verbatim.

Severity: Medium. It is a direct copy of unique descriptive text.

Instance 5: Argument on Leadership and Vision

Source (ComputerWorld, 2016):

Heading for Reason #5:

"Adopting IPv6 is a matter of leadership, vision and competitive edge."

Paragraph 5: "What really matters is whether a company’s leadership has the vision to ensure that it retains a competitive edge..."

IEEE Article (2017):

Third Paragraph:

"IPv6 is about vision, leadership, innovation and competitive edge."

Analysis: The IEEE article condenses the ComputerWorld article's fifth reason into a single, plagiarized sentence. It copies the three key nouns—"vision," "leadership," and "competitive edge"—and adds "innovation," while maintaining the identical core message and phrasing.

Type of Plagiarism: Verbatim and Patchwriting.

Severity: High. It directly lifts the language of the original author's conclusion.

Instance 6: Misappropriation and Source Manipulation of IoT Market Valuation

Source (ComputerWorld, 2016):

Final Paragraph:

"One estimate, from Business Insider, is that the IoT represents at least a $6 trillion opportunity."

IEEE Article (2017):

Sixth Paragraph:

"According to McKinsey, the IoT market will generate between $6 to 10 trillion a year by 2025"

Analysis: This is a sophisticated and serious form of plagiarism involving source manipulation. The author uses the ComputerWorld article as the source for the $6 trillion valuation but alters the figure range and timeframe. Most egregiously, the author substitutes the original source (Business Insider) with a different one (McKinsey). This is a deliberate obfuscation designed to present the researched information as the product of the author's own independent literature review.

Type of Plagiarism: Misappropriation of Research and Source Fabrication/Obfuscation.

Severity: High. This demonstrates intentionality and a calculated effort to disguise the theft of another author's research, a severe violation of ethics.

Instance 7: The "Experimental vs. Production" Conceptual Framework (MAJOR INSTANCE)


Source (ComputerWorld, 2016):

Reason #4:

"According to Vint Cerf, one of the fathers of the Internet... IPv4 is only “the experimental version of the Internet.”... As Cerf stated, IPv6 is the actual production version of the Internet for the 21st century. Why have we been using a beta version in our production environment for so long?"

Analysis of Concept: Sun uses a quote from Vint Cerf to create a powerful and unique rhetorical framework: framing IPv4 as an outdated "experimental/beta" system and IPv6 as the true "production" system for the future.

IEEE Article (2017) Use of the Concept:

1.     False Front: The article opens with a different, correctly cited Vint Cerf quote.

2.     Conceptual Appropriation in Conclusions:

"Latin American private sector, government and academia need to accelerate the IoT and IPv6 adoption... [due to] unwillingness to change what works."

Analysis: The phrase "unwillingness to change what works" is a direct conceptual theft. "What works" refers to IPv4, the system Cerf called "experimental." The critique that persistence with it is due to an "unwillingness to change" is the entire point Sun made using Cerf's authority. The IEEE author strips the concept of its powerful framing and supporting evidence and presents the resulting insight as her own. 

Type of Plagiarism: Ideational Plagiarism (theft of the core concept) and Paraphrasing without Attribution. 

Severity: Critical. This is the most severe form identified. It moves beyond copying text to stealing the intellectual and rhetorical architecture of the original author's argument, fundamentally misrepresenting the IEEE author's own analytical capabilities.

Overall Conclusion


The IEEE article "IPv6 and Internet of Things: Prospects for Latin America" contains multiple, verifiable instances of plagiarism from Charles Sun's "No IoT without IPv6." The plagiarized elements are not incidental; they form the foundational pillars of the IEEE article: its central thesis, its key supporting data, its unique descriptive language, its concluding argument on business leadership, and its core conceptual framework.

The pattern of misconduct ranges from careless copying to Intentional Deception, as evidenced by the substitution of source citations in Instance 6. The practices detailed in this report violate fundamental principles of academic and journalistic integrity, including:

  • IEEE Code of Ethics: Specifically Section 7.2 (II) of the IEEE Code of Ethics: "to be honest and realistic in stating claims or estimates based on available data," and the general imperative to reject plagiarism in all its forms.
  • Academic Standard: The failure to provide attribution for ideas, concepts, and research constitutes a severe breach of scholarly conduct.

This analysis confirms that the IEEE article fails to meet the minimum expectations of original scholarship and proper attribution. The severity and extent of these instances warrant formal investigation and corrective action by the IEEE Publications Board.
 

Recommended Actions


The evidence leaves no room for doubt: this is a case of pervasive plagiarism and a direct violation of publication ethics, as well as established academic and professional standards. Such misconduct strikes at the heart of scholarly integrity and cannot be excused or minimized.

The IEEE IoT Newsletter editorial board must take immediate, decisive action:

  • Formally retract the plagiarized article from all IEEE platforms and archives.
  • Issue a public statement of censure against the author, explicitly acknowledging the ethical breach.
  • Affirm IEEE’s commitment to enforcing its own publication standards and protecting the integrity of the scholarly record.

Anything less than full accountability will signal tolerance for intellectual theft and erode trust in IEEE’s editorial process. The credibility of the institution demands that this matter be addressed openly, decisively, and without delay.


Citation Formats for This Article:


APA (7th Edition) Citation
Charles Sun. (2025, September 19). Forensic analysis report: Plagiarism in IEEE IoT Newsletter article. IPv6 Czar's Blog. https://ipv6czar.blogspot.com/2025/09/forensic-analysis-report-plagiarism-in.html

MLA (9th Edition) Citation
Sun, Charles. "Forensic Analysis Report: Plagiarism in IEEE IoT Newsletter Article." IPv6 Czar's Blog, 19 Sept. 2025, https://ipv6czar.blogspot.com/2025/09/forensic-analysis-report-plagiarism-in.html

Chicago (17th Edition) Citation
Charles Sun. "Forensic Analysis Report: Plagiarism in IEEE IoT Newsletter Article." IPv6 Czar’s Blog. September 19, 2025. https://ipv6czar.blogspot.com/2025/09/forensic-analysis-report-plagiarism-in.html


Disclaimer: The views presented are only personal opinions and do not necessarily represent those of the U.S. Government.

#PlagiarismExposed #PublishingEthics #IEEEAccountability #ForensicDocumentation #IntellectualIntegrity #NoIoTWithoutIPv6 #CitationMatters #TechTransparency #DataMisuse #CharlesSunReports

© 2025 Charles Sun. All rights reserved.


Sunday, September 14, 2025

Summary of Forensic Plagiarism Analysis Report: IEEE IoT Newsletter vs. ComputerWorld


   © 2025 Charles Sun. All rights reserved.

On September 14, 2025, I submitted a formal complaint to IEEE regarding documented plagiarism in their IoT Newsletter article "IPv6 and Internet of Things: Prospects for Latin America" (July 17, 2017). The article contains multiple instances of unattributed reuse from my original ComputerWorld piece "No IoT Without IPv6" (May 19, 2016).


🔍 Key Findings
  • Total Instances Identified: 7

  • Severity Breakdown: 4 Major, 3 Moderate

  • Types of Misappropriation:

    • Verbatim copying of slogans and core arguments

    • Paraphrased data and framing without attribution

    • Direct reuse of numeric values and phrasing

    • Concealed citations of expert analysis and market data



📌 Representative Example

ComputerWorld (May 2016): “No IoT Without IPv6” (title); “…the IoT won’t be happening without IPv6.”

IEEE IoT Newsletter (July 2017): “There is no IoT without IPv6.” (¶ 4 & Conclusions)

Classification: Major — Verbatim slogan / core thesis


📊 Full Comparative Evidence Table

The full table documents all seven instances with side-by-side excerpts, paragraph mapping, and severity classification.


📣 Status & Next Steps

The full report was submitted to IEEE on September 14, 2025 with a deadline for corrective action by Friday, September 19, 2025.

If no resolution is reached, the complete evidence package — including visuals, correspondence, and recommended actions — will be published in full and shared with relevant stakeholders.


Citation Formats for This Article:

APA (7th Edition) Citation
Charles Sun. (2025, September 14). Summary of forensic plagiarism analysis report: IEEE IoT Newsletter vs. ComputerWorld. IPv6 Czar's Blog. https://ipv6czar.blogspot.com/2025/09/summary-of-forensic-plagiarism-analysis.html

MLA (9th Edition) Citation
Sun, Charles. "Summary of Forensic Plagiarism Analysis Report: IEEE IoT Newsletter vs. ComputerWorld." IPv6 Czar's Blog, 14 Sept. 2025, https://ipv6czar.blogspot.com/2025/09/summary-of-forensic-plagiarism-analysis.html.

Chicago (17th Edition) Citation
Charles Sun. "Summary of Forensic Plagiarism Analysis Report: IEEE IoT Newsletter vs. ComputerWorld." IPv6 Czar’s Blog. September 14, 2025. https://ipv6czar.blogspot.com/2025/09/summary-of-forensic-plagiarism-analysis.html


Disclaimer: The views presented are only personal opinions and do not necessarily represent those of the U.S. Government.

#PlagiarismExposed #PublishingEthics #IEEEAccountability #ForensicDocumentation #IntellectualIntegrity #NoIoTWithoutIPv6 #CitationMatters #TechTransparency #DataMisuse #CharlesSunReports



© 2025 Charles Sun. All rights reserved.





Tuesday, September 9, 2025

Charles Sun Named to 2026 Engage National Security & Enforcement 150




I’m honored to share some exciting news: I’ve been named to the 2026 Engage National Security & Enforcement 150, a peer‑driven recognition that celebrates leaders who build trust, foster collaboration, and deliver real solutions across our national security and enforcement communities. This honor is especially meaningful because it reflects the voices of colleagues and partners who see the value in showing up with intention, humility, and a shared sense of mission. Below is the official press release with all the details, including the full list of honorees and the criteria that define this recognition.


FOR IMMEDIATE RELEASE


Media Contact:

Charles Sun
Email: press@aucglobal.com
LinkedIn: linkedin.com/in/charlessun

 

WASHINGTON, DC — September 9, 2025Charles Sun, a federal IPv6 thought leader and Information and Communications Technology (ICT) executive whose leadership has been recognized nationally, has been named to the 2026 Engage National Security & Enforcement 150, an annual list curated by OrangeSlices AI honoring leaders who exemplify collaboration, innovation, and mission impact across the national security and enforcement community.

Nominated and selected by peers, honorees are recognized not for their titles, but for how they lead — listening with intention, creating space for others, and building trust across boundaries to deliver real, workable solutions.

“I am deeply honored — and truly humbled — to be recognized alongside such an extraordinary group of leaders,” said Sun. “This award reflects the collective efforts of colleagues, partners, and mentors who make this work possible every day.”

The 2026 honorees represent agencies and partners across the U.S. Department of Homeland Security, U.S. Department of State, U.S. Department of Justice, FBI, and more.

“These leaders are already shaping how national security and enforcement agencies deliver on behalf of the people they serve,” said Shelley McGuire, Chief Strategy Officer at OrangeSlices AI. “They are the ones others look to for guidance, collaboration, and momentum.”

Selection Criteria

Honorees were evaluated using a prescribed rubric, with the following six characteristics serving as core evaluation criteria. These qualities reflect what it truly means to lead with purpose, collaboration, and impact in today’s Federal environment:

  • Open Communication – They share insights through events, published thought pieces, or open platforms like LinkedIn — because they believe transparency and shared knowledge drive progress.
  • Mission‑Focused Thinking – Their perspective extends beyond organizational walls. They prioritize the needs of the communities they serve, actively seeking feedback and collaboration to drive better outcomes.
  • Reliable Partnership – They lead with clarity, humility, and accountability. These individuals are trusted partners who understand their role — and the roles of others — and consistently deliver on shared goals.
  • Community Presence – These leaders are actively involved. Whether at events, in working groups, or through mentorship, they show up, contribute, and help lift the entire ecosystem.
  • Perspective‑Seeking – Engaged leaders welcome input from a wide range of stakeholders — including users, partners, and community voices — to inform more complete, inclusive, and effective solutions.
  • Innovation‑Minded – They challenge the status quo. By championing new technologies, processes, and ideas, they help drive progress and adaptability in an increasingly complex environment.

These characteristics are core to the Engage GovCon ethos and provide all leaders across government and industry a model for how to collaborate, engage, and thrive.

About Charles Sun

Charles Sun has over three decades of leadership experience in ICT across the public and private sectors. He has served as Technology Co‑Chair of the U.S. Federal IPv6 Task Force, chaired the Federal IPv6 Technical Roundtable, and held senior ICT leadership roles at the U.S. Department of Homeland Security, Export‑Import Bank of the United States, and the U.S. Department of Commerce — including the U.S. Census Bureau as well as the U.S. Department of Labor’s Bureau of Labor Statistics. Across these agencies, he advanced IT modernization, infrastructure resilience, cybersecurity posture, and operational efficiency. In the private sector, Sun has excelled as a senior network engineer and consultant for organizations including the University of Maryland, Northrop Grumman, AOL Time Warner, and Georgetown University. Since 2018, he has been a columnist for Homeland Security Today on Internet security and IPv6 deployment.

About OrangeSlices AI

OrangeSlices AI Playful Name. Serious about Democratizing Data and Disrupting the GovCon Competitive Intelligence Market. The core mission for OS AI is to identify, share and create timely, actionable and responsible information and data products, tools and resources that 1) are accessible to all organizations and their teams, small to large; 2) will assist Federal government and Industry IT and consulting leaders to more effectively identify and engage with each other; and 3) shine a spotlight on those leaders and companies that are #DoingItRight.

Meet the 2026 honorees: https://lnkd.in/eH5Ssq2n


###


Citation Formats for the Press Release:

APA (7th Edition) Citation
Charles Sun. (2025, September 24). Charles Sun Named to 2026 Engage National Security & Enforcement 150. IPv6 Czar's Blog. https://ipv6czar.blogspot.com/2025/09/charles-sun-named-to-2026-engage.html

MLA (9th Edition) Citation
Sun, Charles. "Charles Sun Named to 2026 Engage National Security & Enforcement 150." IPv6 Czar's Blog, 24 Sept. 2025, https://ipv6czar.blogspot.com/2025/09/charles-sun-named-to-2026-engage.html.

Chicago (17th Edition) Citation
Charles Sun. "Charles Sun Named to 2026 Engage National Security & Enforcement 150." IPv6 Czar’s Blog. September 24, 2025. https://ipv6czar.blogspot.com/2025/09/charles-sun-named-to-2026-engage.html