I recall from some years back, when we were debating in Australia some national Internet censorship proposal de jour, that if the Internet represented a new Global Village then Australia was trying very hard to position itself as the Global Village Idiot. And the current situation with Australia's new Data Retention laws may well support a case for reviving that sentiment. more
The first part of this series explained how Amendment 35 to the NTIA-Verisign cooperative agreement is highly offensive to the public interest. But the reasons for saving the Internet are more fundamental to Western interests than a bad deal made under highly questionable circumstances. One of the world's foremost experts on conducting censorship at scale, the Chinese Communist Party's experience with the Great Firewall... more
"On the Internet, no one knows whether you're a dog." Of course, if you are a dog, and you are fibbing about it, according to the US Attorneys Office out in California you're a felon and should be sent to the dog pound. Fortunately, there's a new dog in town who seems to be howling a different tune. Bad facts make for bad law. The unfortunate alleged facts of this case involved fibbing about actual identities, playing with a young girl's emotions, and the girl's eventual suicide. more
On September 30, 2002, the Memorandum of Understanding (MOU) between the US Department of Commerce (DOC) and the corporation created to privatize the infrastructure of the Internet will expire. This corporation, known as ICANN (Internet Corporation for Assigned Names and Numbers) has had a very contentious existence from its earliest days. On July 10, 2002, a US Department of Commerce official, Nancy Victory, sent a letter to ICANN. She wrote that the agreement between ICANN and the DOC "will expire on September 30, 2002 and in the coming weeks, the Department of Commerce will assess whether to renew, extend, or modify this agreement. To assist in this review process," Victory asked, "I request that you provide me with a report detailing ICANN's efforts in these areas, as well as any other information that might inform the Department in its decision-making with respect to this agreement." Victory said that the response to her letter should be sent no later than August 15, 2002. more
The US Federal Communications Commission (FCC) recently issued a public notice that it will be holding two workshops on the transition of the public switched telephone network (PSTN) to "new technologies" such as voice-over-IP (VoIP). The workshops will be held on December 6 and 14, 2011, at the FCC's office in Washington, DC. The public notice states the goal as... more
Last week, I read Ed Falk's blog post where he commented on a possible solution to the spam problem. He himself was commenting on a study done by researchers out of the University of California where they discovered that credit card transactions for stuff bought in spamvertisements are handled by three companies: one in Azerbaijan, one in Denmark and one in the West Indies. Presumably, if security experts and law enforcement went after these companies, spammers would have their financial supply cut off. No money = no incentive to spam. more
Nearly ten years ago, the Government of Canada wrote a letter to the chair of the Canadian Internet Registration Authority (CIRA) that set out the framework for the management of the dot-ca domain. The government articulated a vision of the dot-ca domain as a “key public resource” and called on CIRA to act in an open and transparent manner. CIRA has long sought to live up to those standards, but in recent months the organization has shown an unmistakable shift toward prioritizing commercial gain over the public interest along with a troubling move toward secret decision making... more
Governments worldwide increasingly resort to shutting down the Internet as a political tool to control information and silence dissent. This alarming trend is not limited to developing nations grappling with civil unrest or political transition. Indeed, it is gaining traction in developed nations, suggesting a global phenomenon transcending geographical boundaries and socio-economic development levels. more
Amid evolving privacy laws and rising cybersecurity threats, domain registration data disclosure remains a contentious issue. Beyond WHOIS: Filling the Gaps brings together experts to examine Project Jake's policy framework, aiming to balance privacy with legitimate access. Join industry leaders for insights on policy clarity, operational efficiency, and the future of domain name governance. more
I recently read an interesting post on LinkedIn Engineering's blog entitled "TCP over IP Anycast -- Pipe dream or Reality?" The authors describe a project to optimize the performance of www.linkedin.com. The web site is served from multiple web server instances located in LinkedIn's POPs all over the world. Previously LinkedIn used DNS geomapping exclusively to route its users to the best web server instance, but the post describes how they tried using BGP routing instead. more
There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more
After a widespread blackout hit the United States and Canada, the so-called network domino effect attracted high public attention. Modern physicists have paid attention to the effect of network dominos. Especially, scientists who have studied complex systems have warned that a network domino effect, if it occurs, will bring chaos to a society that is well connected through the Internet. The cause of the blackout in the United States and Canada was not traced down quickly. But it apparently shows a typical network domino effect. more
A great deal of hype is out there, as vendors talk up the next development in mobile technology, known as 5G. FCC Chairman Tom Wheeler made a good comparison. He said that one person looking at the paintings by the Master in the Picasso Museum in Barcelona sees a different picture to the person next to them. That's what 5G is all about at the moment -- a great picture with lots of different interpretations. more
e360 initially filed suit against Comcast early in 2008. They asserted a number of things, including that Comcast was fraudulently returning "user unknown" notices and that they were certified by ReturnPath. Comcast filed a countersuit alleging violations of CAN SPAM, violations of the computer fraud and abuse act, as well as a number of other things including abuse of process. In April of 2008 the judge ruled in favor of Comcast and dismissed e360's case, while allowing the countersuit to proceed. more
As 2014 winds down, cloud spending is up. That's the word from research firm IDC -- as reported by IT Jungle, cloud spending will reach over $56 billion this year and won't stop anytime soon. By 2018, predictions peg the cloud as worth $127 billion, and that's just counting "core" cloud services such as SaaS, PaaS and IaaS. Cloud-based peripherals, the Internet of Things and other cloud initiatives are also on track to make an impact; here's a quick look at top cloud considerations for the coming year. more
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global