Featured Blogs

Latest

Challenging UDRP Awards in Federal Court: Recent Outcomes

Challenging UDRP awards in actions under the Anticybersquatting Consumer Protection Act (ACPA) is infrequent though steady. There are currently a number of court filings in U.S. district courts that are in the early stages, most notably the ADO.com case reported on in an earlier essay and several others have either been referred to mediation (the IMI.case) or settled or discontinued. more

Why Foldering Adds Very Little Security

I keep hearing stories of people using "foldering" for covert communications. Foldering is the process of composing a message for another party, but instead of sending it as an email, you leave it in the Drafts folder. The other party then logs in to the same email account and reads the message; they can then reply via the same technique. Foldering has been used for a long time, most famously by then-CIA director David Petraeus and his biographer/lover Paula Broadwell. Why is foldering used? more

ARIN Elects First Board Member from the Caribbean

Regenie Fräser, the former Secretary General of a regional trade association, has been selected to serve a one-year term on the board of trustees of the American Registry of Internet Numbers (ARIN). Fraser's appointment makes her the first person from the Caribbean and the first non-white person to serve on the ARIN board. ARIN is one of five registries worldwide that coordinate Internet number resources. more

FCC Commissioner O’Rielly’s Appalling Op-Ed on the ITU

The FCC Commissioner Michael O'Reilly's recently contributed opinion on the ITU in "The Hill" is beyond bizarre. It also sadly displays an appalling lack of knowledge of the organization and its history. I find it disturbing - as someone who held senior positions at both the FCC and the ITU and wrote the organization's history - how fundamentally ignorant an FCC Commissioner could be today of the global telecommunications ecosystem. more

The Economics of Hacking an Election

There have been many news stories of late about potential attacks on the American electoral system. Which attacks are actually serious? As always, the answer depends on economics. There are two assertions I'll make up front. First, the attacker -- any attacker -- is resource-limited. They may have vast resources, and in particular, they may have more resources than the defenders -- but they're still limited. Why? more

Traceability

At a recent workshop on cybersecurity at Ditchley House sponsored by the Ditchley Foundation in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated... That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses. more

What’s Abusive in Registering Domain Names, and the Reverse?

The two major providers of arbitration services for adjudicating cybersquatting complaints under the Uniform Domain Name Dispute Resolution Policy (UDRP), the World Intellectual Property Organization (WIPO) and Forum, issue daily lists of decisions. In approximately 90% of those disputes, the registrations cannot be described as anything less than mischievous in acquiring second level domains incorporating well-known or famous marks. more

Community Networks Could Help Strengthen the Caribbean Internet

By some estimates, only half of the world's population has internet access, leaving the other half at a sizeable competitive disadvantage. This profound connectivity gap is especially significant in the unserved and underserved areas of developing and least-developed countries. For people who live in these places, Internet connectivity is not just about the Internet. It is a lifeline that gives access to electronic commerce and telehealth services, distance learning, social and political engagement, government services... more

Internet as Non-Kinetic WMD

With each passing day, a new public opinion article appears or U.S. government official pronounces how the open internet is abetting some discovered catastrophic effects on our societal institutions. In just one week, the examples include increased information on FSB & GRU attacks on electoral systems and infrastructure, Trump's obliging tactical destruction of societal norms and propagation of the QAnon cult, U.S government agency officials playing "cyber security spin-the-bottle" at press conferences... more

The IPv4 Market - 2018 Mid-Year Report

The number of IPv4 transactions and volume of IP addresses flowing to and from organizations in the ARIN region in the last 6 months put 2018 on track to be the most active year in the history of the IPv4 market. Nearly 25 million numbers were transferred in the first half of this year, more than doubling the volume of numbers transferred by this time last year and continuing the level of market activity in the last half of 2017 when just over 28 million numbers were transferred. more

HTTPS Interceptions Are Much More Frequent Than Previously Thought

I have written about the problems with the "little green lock" shown by browsers to indicate a web page (or site) is secure. In that article, I consider the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem with the "green lock" paradigm - the impact of HTTPS interception. more

Short Strings of Alphabet Letters in Domain Names: Random to Some, Identifiers to Others

What is the intrinsic (as opposed to trademark) value of short string domain names? It depends, of course. Rights holders have been willing to challenge domain name registrants even if they have no actionable claim for cybersquatting... UDRP Panels have over the years, and in many cases, affirmed that short strings are "inherently valuable in themselves precisely because they are (a) short and (b) can reflect a wide range of different uses." This does not mean it is open season against rights holders for short strings, but it does mean the facts and proof of cybersquatting must be in proper alignment, and this calls for some sober thinking about the evidentiary demands of the Uniform Domain Name Dispute Resolution Policy (UDRP). more

New Domain Conference Coming to South America - Domaining Americas

Veteran domain investor Abner Duarte from PremiumDomains.com.br is featuring a new event called Domaining Americas, to be held in Rio de Janeiro, Brazil, in October 2018. He is puting together a major domain conference for South America. The debut edition of Domaining Americas will be held at the five-star Grand Hyatt Rio De Janiero on Saturday and Sunday, October 6-7, 2018. more

ITU’s Critical Cybersecurity Role and the 2018 Plenipotentiary

In the rather unique world of public international law for cybersecurity, the treaty provisions of the International Telecommunication Union (ITU) stand alone. They form the multilateral basis for the existence of all communication networks, internets, and services worldwide and have obtained the assent by every nation in the world. They also contain the only meaningful multilateral cybersecurity provisions that have endured over a century and a half through all manner of technological change. more

An Update on Securing BGP from IETF 102

One way or another we've been working on various aspects of securing the Internet's inter-domain routing system for many years. I recall presentations dating back to the late '90's that point vaguely to using some form of a digital signature on BGP updates that would allow a BGP speaker to assure themselves as to the veracity of a route advertisement. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days