I am just a security guy, as are many others who will read this. Perhaps it is time us "simple" security guys got together and wrote some recommendations for air travel security? Get out your voice out there as an organized professional group which can in turn lobby for our professional recommendations... Here are mine, just to get the ball rolling... more
A new study conducted by British researchers has unveiled a potentially concerning form of cyber threat where hackers can extract personal data just by listening to someone type. more
A new book by David Lindsay, an academic at Monash University's Law School and a widely published expert on internet law, intellectual property law and privacy, has recently been published. ...In this path-breaking work the author examines the extent to which principles of national trade mark law have been used in UDRP decisions. It will be essential reading for anyone, whether academic or practitioner, interested in internet law, intellectual property, and e-commerce law. more
2016 broke the previous all-time high, set back in 2013, for the number of records exposed from reported data breaches. more
I often read marketing material from Online Brand or Content Protection vendors, especially some of the newer ones, that make IP rights enforcement sound very straightforward. In some scenarios, given the correct processes are followed, this can be the case - using eBay's VERO program or similar offerings from the major legitimate platforms, counterfeit listings can be removed very quickly. more
Government are recognising that healthcare is one of the last paper-based sectors of the economy. It has been estimated that, quite apart from the costs involved, this leads to then of thousands of deaths each year. There is no doubt that a fully integrated computerised e-health system will bring with it its own challenges, and will undoubtedly on occasions also deliver its share of problems. But, as has been the case with all other sectors of society and the economy, integrated computerisation in this sector will improve the situation. more
I'm excited! Not because of the 30 hours that it will take me to get to Johannesburg, but because this ICANN meeting will be the second time we've put the Meeting B Policy Forum to the test. If the second time is a charm then hopefully we'll have cemented the Policy Forum into the ICANN meeting structure, and we can start a conversation about having two Policy Forums each year and one AGM meeting. more
The GAC Communiqué recommends that ICANN implement a range of regulations (which the GAC calls "safeguards") for all new generic top-level domains (gTLDs) covering areas ranging from malware to piracy to trademark and copyright infringement. The GAC proposes specific safeguards for regulated and professional sectors covering areas as diverse as privacy and security, consumer protection, fair lending and organic farming. Finally, the GAC proposes a "public interest" requirement for approval of new "exclusive registry access" gTLDs. more
As we watch the Ukraine and Russia conflict over boundaries and territories, I chanced upon a YouTube video showing the region of Europe and how, for the last 1000 years, national boundaries and names of nations have changed where in 1142, you had nations like Muslim Spain, Kievan Rus. In 1143 the Kievan Rus included modern-day Ukraine and Crimea, and in 1163 bulk of Central and Southern Europe was the Holy Roman Empire... more
Over the next two days (9-10 June), the European Dialogue on Internet Governance (EuroDIG) takes place in Brussels, Belgium. With a theme of "Embracing the digital (r)evolution", EuroDIG has a full agenda and Internet Society staff will be participating in many aspects of the programme. For us, a primary focus will be at 11:30 CEST (UTC+2) on Thursday, June 9, when our President and CEO Kathy Brown opens the first Plenary with a keynote speech. more
An article from CBC earlier this year reported that beavers had chewed through an underground fiber and had knocked 900 customers in Tumbler Ridge, British Columbia off broadband for 36 hours. The beavers had chewed through a 4.5-inch conduit that was buried three feet underground. This was an unusual fiber cut because it was due to beavers, but animals damaging fiber is a common occurrence. more
I was part of a small APNIC delegation that attended the ITU Plenipotentiary Conference (PP-10) with a limited Sector Member role as an observer. Our aim was to be available to ITU Member States with questions on IP addressing issues and to follow Member State discussions on the ITU's role in Internet governance issues. Four adopted resolutions at PP-10 were of particular relevance to Internet management, of which one was new: "Facilitating the transition from IPv4 to IPv6". more
Like the Coronavirus, 5G Dementia seems to be spreading around Washington. The latest manifestation has appeared at the FCC -- which is trying its best to make U.S. 5G infrastructure as insecure and primitive as possible. But first, an explanation of how 5G Dementia begins at the top and spreads in the U.S. capitol. 5G Dementia begins with "The Genius" who lounges around White House quarters and emits spontaneous tweets on whatever motivates him at the moment. more
Most of the ICANN community is headed to ICANN 54, the critical meeting in Dublin where some kind of an agreement on accountability reforms needs to be reached if the historic IANA transition is to take place. Only a few months ago, an open, multi-stakeholder process proposed to enhance ICANN's accountability by creating a very limited form of membership. It did not allow any individual in the world to become a member. It did not even allow any individual or organization with a domain name to become a member (as it should have). more
A couple things related to the intersection of email and law happened recently. The 6th circuit court ruled that the government must have a search warrant before accessing email. The published opinion is interesting reading, not just because of the courts ruling on the law but also because of the defendant. more