/ Most Viewed

DNS Abuse Definition: Attributes of Mitigation

A substantial amount of DNS community discussion on the topic of DNS Abuse is focused on defining what is or is not DNS Abuse. The definition adopted by ICANN contracted parties, as well as the DNS Abuse Institute, is straightforward: DNS Abuse is malware, botnets, pharming, phishing, and spam where it's a vehicle for the preceding harms. There is, of course, some fuzziness on the margins, where technical harms are also using content. more

WCIT-12 Disappoints, More Work to Be Done

In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at WCIT-12 was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign). After two weeks of sometimes fractious negotiation - 1,275 proposals were discussed in all - the contentious issues were significantly watered down. However the dissenting countries felt that the key issue - anything in relation to the internet - should not be included at all and, quite correctly, did not compromise on that. more

Celebrating 167 Years of Public International Law for Cyber Security

On 30 September 1850 at Dresden, the first international treaty was issued among the first sovereign nations to internet their national electronic communication networks. It was known as the Dresden Convention, and culminated several weeks hammering out basic requirements and techniques to implement an internet spanning the Austro-German European continent at the time, and established a continuing "Union" of signatories to evolve the provisions of the treaty. more

GSA Looking Into .gov Outages

"The General Services Administration is analyzing what caused an outage of .gov websites for a few hours Wednesday morning," reports Federal Times. Officials said the problem involved so-called DNSSEC cybersecurity measures that affected access to certain .gov sites, according to GSA spokeswoman Mafara Hobson. more

Automated Theft of Intellectual Property

A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more

New gTLDs: Comments on the Unsigned “The Economic Case for Auctions”

When Kurt Pritz briefed the Generic Names Supporting Organization (GNSO) Council (and observers) in Los Angeles April 10th and 11th, the new generic Top-Level Domain (gTLD) process model flows transition through an "auction" state in two of the three paths where two or more applications existed for the same (or similar) strings. At that time Kurt, speaking for Staff, was clear that the existence of a well-defined community was not dispositive, which surprised the Council members from the Intellectual Property Constituency... more

NTIA Committed to ICANN Reform

National Telecommunications and Information Administration (NTIA) has made a long term commitment to taking the actions necessary to reform ICANN. Specifically, the Department of Commerce's Strategic Plan for FY 2004-2009 discusses the need for NTIA to take action to reform ICANN. The Strategic Plan details three Strategic Goals for the Department to achieve over the next five years. The second goal is to "Foster science and technological leadership by protecting intellectual property, enhancing technical standards, and advancing measurement science."  more

Securing Weak Links in Supply Chain Attacks

We've all heard the term, "you're only as strong as your weakest link." Whether talking about a tug of war on the playground, a sports team, or a business, this rings as true as ever. Every business relies on a series of suppliers and vendors -- be it the dairy farm supplying milk to the multinational food manufacturer or the payment systems that retailers use. These links form supply chains that every business, large and small, deals with. There is simply no way around it. more

The Internet and OpenStand: The Internet Didn’t Happen by Accident

On the World Standards Day of 2013 it seems appropriate to recognize that on the Internet and throughout the Web, nothing goes anywhere without standards. These technical standards - communication protocols, data exchange formats, and interfaces - allow different computers and networks to talk to each other. They are the lifeblood around the world for multibillion dollar industries that didn't exist 20 years ago. They are born of a collaborative, open process that prides itself on technical expertise and measures success by the depth and breadth of their acceptance across a hodgepodge of vastly different technologies all interconnected to what we euphemistically call "the Global Internet." more

IP Addresses and Traceback

This is an informal description the evolution of a particular area of network forensic activity, namely that of traceback. This activity typically involves using data recorded at one end of a network transaction, and using various logs and registration records to identify the other party to the transaction. Here we'll look at the impact that IPv4 address exhaustion and IPv6 transition has had on this activity, and also note, as we explore this space, the changing role of IP addresses within the IP protocol architecture. more

OneWeb and Intelsat Sign the First Multi-Orbit Broadband Agreement – More to Come

Last October, I reviewed multi-orbit tests and plans of several low Earth orbit (LEO), medium Earth orbit (MEO), and Geostationary (GEO) broadband satellite companies and quoted Neil Masterson, CEO of LEO operator OneWeb as saying, "Interoperability with GEO satellites must happen - it's common sense ... Customers don't care whether it's a LEO satellite or a GEO satellite - all they want is connectivity." more

DNS Resolution, Browsers & Hope For The Future

DNS is not something that most people think about when using the Internet. Neither should they have to: the DNS is just part of the infrastructure in the same way that IP addresses are. The only time a user ought to notice the DNS is when it breaks (and it should never break). If that's true, then we ought to expect any Internet client - including web browsers - to use the very same infrastructure as everything else and for the DNS resolution mechanisms to be the ones offered by the operating system. What makes browsers different? more

ARIN Launches WHOWAS: Trial Service Providing Historical Information for a Given IP Address

American Registry for Internet Numbers (ARIN) is running a trial service that gives users access to historical IP whois data – that is, it will tell you who was responsible for an IP address or block of IPs. The service is not automated and if you want to access it you will need to submit a request via email with information about not only what you want to know, but why you are interested in accessing the information. more

The Internet Archive Hops Out of the Copyright Frying Pan Into a New and Different Fire

In 2020 a group of book publishers sued the Internet Archive over their Controlled Digital Lending program, which made PDF scans of books and lent them out from the Archive's website. For books still in copyright, the Archive usually limited the number of copies of a book lent to the number of physical copies of the book they had in storage. Several publishers sued with an argument that can be summarized as "that's not how it works." more

ISOC Joins Opposition to Stop Online Piracy Act

In a letter released on Monday, the Internet Society Board of Trustees has expressed concern with a number of U.S. legislative proposals that would mandate DNS blocking and filtering by ISPs to protect the interests of copyright holders. "Policies mandating DNS filtering undermine the open architecture of the Internet and raise human rights and freedom of expression concerns," says Internet Society (ISOC). more