The establishment media frequently attack the Internet as spreading inaccurate, unchecked rumors as news. While that is certainly true, the Internet is also demonstrating that the establishment media is no better. In the past weeks we have been told that the Stuxnet virus was written by US and Israeli intelligence. The evidence? Some un-named Israeli intelligence officers grinned broadly at reporters when the subject was mentioned. Is that what it has come to? more
In the brief history of Internet governance, few initiatives have been greeted with wider support than the recently signed Affirmation of Commitments between the U.S. Department of Commerce and the Internet Corporation for Assigned Names and Numbers (ICANN). The praise is well deserved, but now it's time to remind ICANN of the problems that the AOC did not solve, most importantly ICANN's ongoing accountability gap. more
Admittedly, I'm a not Johnny-come-lately with regards to surveillance, intelligence, telecommunications, network security, law enforcement, and a cross-pollination of all-of-the-above. I actually have a very colorful background of working within all of the aforementioned disciplines - at one time or another - either through the U.S. Military, U.S Government contractors, private industry, etc. ... And unfortunately, I am not generally "shocked" very often by much of the abuses being perpetrated on unwitting Internet users, both by supposedly "trusted" entities (e.g. Democratic Governments, ISPs, etc.) more
This post outlines the valuation pitfalls that need to be avoided when competing for the acquisition of a new generic Top-Level Domain (gTLD). The most widely used financial tools to determine the economic viability of a capital investment project, such as bidding for a new gTLD, are the Internal Rate of Return (IRR) and the Net Present Value (NPV), which measures the expected additional value a project would create if undertaken. more
Are there any companies left that we can still call cable companies? Everything in the business press still refers to Comcast and Charter as cable companies and AT&T and Verizon as telephone companies. It's getting harder to justify using these traditional labels, and maybe the time is finally here to just start calling them all ISPs. After all, these four companies collectively have 80 million broadband customers... more
While it was good to see that the Administration included telecoms in its new stimulus package - which was launched in September 2011 - the concerns expressed when the project was announced last year still persist. Wireless is not a solution to the significant broadband problems the USA is facing. ... The new plan seems to be driven more by the failed attempts in previous initiatives to roll out more broadband infrastructure. more
The Electronic Frontier Foundation (EFF) has just told ICANN to drop the notion of applying the Uniform Rapid Suspension (URS) dispute resolution system to .Travel and other legacy gTLDs without undertaking a full Policy Development Process (PDP). In a June 12 letter, EFF stated: ICANN should not apply URS to the .travel domain, or to any additional domains, by the unaccountable means of staff inserting new conditions into the renewal of the registry operator's contract. Rather, the public policy implications of such a move demand that a full PDP be undertaken first. more
For those people tracking the evolution and deployment of DNSSEC or who are just interested in "DNS security" in general there is a great amount of activity happening next week at IETF 90 in Toronto. I dove into this activity in great detail in a recent post, "Rough Guide to IETF 90: DNSSEC, DANE and DNS Security", and summarized the activity in a Deploy360 post... more
Several people abroad have started mailing me and others asking if rumors of new legislation to be passed in Sweden on the 17th of June is for real. There are also reports in international forums starting to pop up. This is fairly old news, and I think that most of us are surprised that this has not generated more press both inside and outside Sweden earlier. This legislation will allow for the Swedish National Defense Radio Agency (FRA) to wiretap Internet traffic leaving the country... more
A number of recent UDRP decisions remind trademark owners (and counsel) that cybersquatting cases have to be built from the ground up. Each stage has its evidentiary demands. The first two demand either/or proof; the third, the most demanding, requires proof of unified or conjunctive bad faith registration and bad faith use of the accused domain name. Priority, which intuitively would be thought a factor under the first stage (as it is under the ACPA) is actually a factor under the third stage. more
Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. more
The last couple of years have seen a growth in commercial sinkholing operations. What was once an academic method for studying botnets and other types of Internet-born threat, has more recently turned in to an increasingly profitable business for some organizations. Yesterday I published a blog on the DarkReading site titled Sinkholing For Profit, and I wanted to expand upon some aspects of the sinkholing discussion (there's only so much you can fit in to 800-ish word limits). more
RIPE Atlas, the new active measurements network maintained by the RIPE NCC, gives you a way to easily measure the quality of your Internet services. RIPE Atlas is designed in such a way that it can collect data for analysis from a great number of locations on the Internet. The actual measurement devices, or "probes", are so small that they can be easily deployed in a home environment. more
There is growing interest in the US for the FCC to look at White Space to enable more options for broadband wireless in rural areas. What is White Space? Last weekend, the Sunday NY Times published an article about wireless services that included this description: "In many areas, not all broadcast [television] channels are in use. The unused channels are "white spaces" of high-quality spectrum that could be made available to local Internet service providers. Unlike the much higher frequency of Wi-Fi, television broadcast frequencies can travel for miles and penetrate walls, providing a much broader range for Internet service." There is a coalition of eight technology companies driving the discussion in the US... more
My main argument is about the policy of handling vulnerabilities for 6 months without patching (such as the Google attacks 0day apparently was) and the policy of waiting a whole month before patching this very same vulnerability when it first became an in-the-wild 0day exploit (it has now been patched, ahead of schedule). Microsoft is the main proponent of responsible disclosure, and has shown it is a responsible vendor... I simply call on it to stay responsible and amend its faulty and dangerous policies. more
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign