VoIP has been banned across most of Africa for a long time, feared by the state-owned telcos as a way for alternative service providers to bypass them with international calls, eroding a very lucrative part of their business. At profit margins of several thousand percent in some cases, it is not surprising that unlicensed operators have sprung up all over the continent, risking huge fines, confiscation of their equipment and even jail terms. more
Multiple reports today indicate that opposition is growing in Europe to plans for three-strikes policies that could lead to the termination of Internet access for some subscribers. In the U.K., protests are mounting over those plans in the recently introduced Digital Economy Bill. The BBC reports that thousands of people have signed a petition urging the government to reconsider its approach, while the Open Rights Group says it has seen a big spike in membership. more
"Outside applications need to be on an equal footing with our own applications," John Donovan said at a SUPERCOMM keynote here in Chicago. "My jaw dropped," one of his colleagues told me a few minutes later, because this is a reversal of AT&T's long-standing position they needed to be able to favor their own applications. AT&T D.C. needs to listen closely to their own CTO, because they are throwing everything they have in D.C. at preventing "non-discrimination" being included in the FCC Net Neutrality regulations. more
The Berkman Center for Internet and Society at Harvard University today announced the release of its 232-page study commissioned by the FCC examining global broadband deployment and usage. The draft of the study titled, "Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world," has now been posted for public comment. more
Ryan Naraine reporting at Threatpost: "Head of Google's anti-malvertising team Eric Davis wants Internet Service Providers (ISPs) to look beyond profits and take a more proactive approach to dealing with malware-infested computers on their networks. During a keynote presentation at the Virus Bulletin conference here, Davis said competitors in the ISP space must look beyond profits and partner on new initiatives to deal with the "parasites" that have taken control of the Internet landscape." more
The surest way to screw up future innovative applications would be for ISPs to make constraining assumptions about the future based on existing applications' performance. Discussing P2P behavior as if it were some monolithic, unchanging entity is simply wrong. What is P2P? BitTorrent? Skype? CNN live video feed fan-outs? And what of changes to these existing apps? What of future apps? more
According to reports today, the Australian federal government made a drastic change to a bill that could potentially allow ISPs to police online traffic. Karen Dearne of the Australian IT reports: "Electronic Frontiers Australia spokesman Geordie Guy said it was unclear if the draft Telecommunications (Interception and Access) Amendment Bill was an "attempt to sneak through" a wholesale expansion of intercepts of private emails and file-sharing or merely a badly drafted bill." more
Analysis could also affect liability of enterprises using cloud computing technologies... Local elected official Steinbach had an email account that was issued by the municipality. Third party Hostway provided the technology for the account. Steinbach logged in to her Hostway webmail account and noticed eleven messages from constituents had been forwarded by someone else to her political rival. more
When discussions with overseas colleagues made it clear to me how fast things are changing here in Australia compared with the rest of the world, I was prompted to write this update about the developments in Australia, particularly in relation to its incumbent telco, Telstra. Most people overseas have not yet fully caught up with the fact that the destructive regime of Telstra's former CEO is well and truly over -- in the past there has been plenty of international reporting of the shocking behaviour of Telstra under Sol Trujillo (former US West) and his persistent attacks on the government included suing Ministers and abusing the Regulator. more
Messaging Anti-Abuse Working Group (MAAWG) has issued the first best practices aimed at helping the global ISP industry work more closely with consumers to recognize and remove bot infections on end-users' machines. The paper outlines a three-step approach with recommendations for detecting bots, notifying users that their computers have been compromised, and guiding them in removing the malware. more
Around the world governments, regulators and the industry are struggling with the old regulatory legacy systems. These have become a major stumbling block in the transition to a new environment. Increasingly countries are beginning to understand the social and economic benefits a national broadband infrastructure can offer, but it is impossible to bring that about while the systems are based on the present regulatory regimes. To take these broader benefits into account we will need to develop government policies to facilitate the digital economy... more
A report released today by Public Knowledge points out that their recent analysis indicates filtering Internet content, as advocated by media companies, will not be effective and in fact harmful to the Internet. An accompanying 60-page whitepaper contains the full report including a number of reasons why the user of copyright filters should not be allowed, encouraged or mandated on U.S. Internet Service Provider (ISP) networks. more
This post isn't about -- or isn't only about -- the use of computer technology to commit crimes. It's more about the use of computer technology to commit war. A few weeks ago, I was part of a conversation about the legal issues cyberwarfare raises. We were talking about various scenarios -- e.g., a hostile nation-state uses cyberspace to attack the U.S. infrastructure by crippling or shutting down a power grid, air traffic control systems, financial system, etc. Mostly, we were focusing on issues that went to the laws of war, such as how and when a nation-state that is the target of a cyberattack can determine the attack is war, rather than cybercrime or cyberterrorism. more
Over the past few weeks I have been seeing reports that some ISP's are actually subverting DNS queries to their own DNS server. Oh the humanity! What this means is that when you (your computer) does a UDP or TCP Port 53 DNS query the ISP is intercepting that and directing it to their own servers. Has anyone been told by their ISP that they are doing this? No? I didn't think so... more
Since my last post about DNS subversion we have had some good feedback. We had 29 responses, I agree a small sample, but what we found is very interesting. Let's remind ourselves of what we are looking at? Does your ISP redirect DNS queries? Specifically, if you try to make a port 53 UDP or TCP connection to a server outside of your ISP's network does it get there? more