Cybercrime

Cybercrime / Featured Blogs

Survey Predicts Attacks on the Network Infrastructure Within 10 Years

Pew Internet Project has released a report called "The Future of the Internet" based on a recently conducted survey where 1,286 internet experts are said to have looked at the future impact of the internet and assessed predictions about how technology and society will unfold. The following is and excerpt from the report predicting at least one devastating attack will occur in the next 10 years on the networked information infrastructure or the United States power grid.

Person to Person Security and Privacy Infringement

IT security strategies invariably focus on maintaining impenetrable fortresses around computers and network systems. Firewalls, virtual private networks and anti-virus programs are the tools IT engineers use to create their digital security. Sophisticated defense systems can be very effective at keeping the obvious attackers at bay, yet they often create a false sense of security because the real attacks, the kind that inflict irreparable damage on a system or network, avoid the obvious routes into the secure fortress.

Internet Management and National Security: Time for a Federal Action Plan

Former CIA Director George Tenet recently gave a speech highlighting the need for federal action on internet management in order to protect national security. As reported by the online edition of Government Executive, Mr. Tenet explained that, "greater government regulation of the Internet and telecommunications networks is needed in order to guard against terrorist attacks."

Are We Attending the Right ICANN Meeting?

I have no idea who wrote that wonderful piece, Time for Reformation of the Internet, posted by Susan Crawford. (It wasn't me - I never use the word "netizen".) Elliot Noss of Tucows wrote a partial rebuttal, I must be attending the wrong ICANN meetings. Elliot's company, Tucows, has been a leader in registrar innovation and competition. And Tucows has constantly been among the most imaginative, progressive, responsible, and socially engaged companies engaged in these debates. ...But the points made by Time for Reformation of the Internet go far beyond registries and registrars.

Cornucopia: A Radically Different Approach to TLDs

Much of the discussion about proposed TLDs centres around domain names as a form of classification: ".mobi" for mobile device content, ".kids" for child-safe content, language codes for language-specific content, ".museum" for museum-related entities, and so on. Notoriously little activity has been forthcoming in actually implementing these proposals, and the select few that have been allowed out into the world are, shall we say, a tad arbitrary. I'd like to engage in a little thought experiment where we abandon the "few TLDs with carefully chosen meanings" paradigm, and instead consider the benefits of a cornucopia of completely meaningless TLDs.

dotMP Goes Mobile, Limits Access to WHOIS Data

The fact that the market for mobile phones that provide Internet access (aka "smart phones") is predicted to increase during the next several years, with global shipments growing to an impressive nearly 125 million units in 2009, means the competition for bridging mobile content and mobile phone use is likely to be keen. Indeed, dotMP already must face competition for registry services that will target mobile phone users. A few of the biggest names in information technology and mobile communications -- led by Nokia and including Microsoft, Vodafone, HP, Orange, Samsung and Sun Microsystems are planning to wedge into the Top-level Domain name space (TLD) by supporting a new TLD registry for mobile web content focused on web pages built specifically for access by mobile devices like smart phones and handheld computers or Personal Digital Assistants (PDAs)... what may set dotMP apart from the technology giants led by Nokia, is a significant value added benefit to its domain name registration services...it will protect the privacy of its registrants.

Putting a Spammer in Jail

The country's first criminal trial about spam ended in Leesburg, Virginia earlier this month with a conviction of Jeremy Jaynes, better known under his nom de spam of Gavin Stubberfield. I was an expert witness for the prosecution, the Commonwealth of Virginia. The case was brought under Virginia's state anti-spam law, not the weaker Federal CAN-SPAM act...

Thoughts About “Protection Against BIND”

Imagine my surprise upon reading a BBC article which identified ISC BIND as the top security vulnerability to UNIX systems. At ISC, we have striven for a decade to repair BIND's reputation, and by all accounts we have made great progress. "What could this be about," I wondered, as I scanned the BBC article for more details. It turns out that BBC was merely parroting what it had been told by SANS. OK, let's see what SANS has to say...

ICANN UDRP and Contract Disputes

When domain name conflicts between manufacturers and distributors rest on contractual disputes over the use of the trademark owners' marks, ICANN UDRP panels have frequently denied relief. See generally the cases cited and discussed in Western Holdings, LLC v. JPC Enterprise, LLC d/b/a Cutting Edge Fitness and d/b/a Strivectin SD Sales & Distribution, D2004-0426 (WIPO August 5, 2004) by Mark Partridge as sole panelist. The decision summarizes other ICANN UDRP decisions involving contractual disputes. For instance...

Personal Names, Politics and Cybersquatting

Thinking about the www.kerryedwards.com auction reminds one of the uneasy relationship between personal names, politics and cybersquatting. When reporters learned that the domain name was taken by Kerry Edwards, the Indiana bail bondsman, at least some headlines were quick to brand Mr. Edwards' conduct as cybersquatting. The Chicago Sun-Times, for example, ran the headline "Kerry Edwards is the Name, Cybersquatting is the Game." Mr. Edwards, of course, had registered his own name as a domain name long before Kerry picked Edwards as a running mate.