/ Most Viewed

DHS Planning to Monitor, Collect Social Media Information on All Immigrants to US

The U.S. Department of Homeland Security (DHS) published a new rule under the Privacy Act of 1974 in the Federal Register last week, detailing how it intends to expand the information it collects when determining a person's immigration status to include social media handles and potentially even search histories. more

Is the Internet Fragmenting? Join the Discussion Live - Tuesday, May 10, at 3:30pm US EDT

Is the global, open Internet moving away from a network of networks that is universally accessible to a series of networks fragmented along policy, technical or economic lines? As some governments pass laws related to data localization and restriction of cross-border data flows, what will the impact be? What about the increasing use of DNS and content filtering? What other factors have the potential for causing fragmentation? more

IDC on Why Mobile Devices Accessing Internet Will Pass 1 Billion by 2013

There were more than 450 million mobile Internet users worldwide in 2009, a number that is expected to more than double by the end of 2013. Driven by the popularity and affordability of mobile phones, smartphones, and other wireless devices, IDC expects the number of mobile devices accessing the Internet to surpass the one billion mark over the next four years. more

Heading Into Panama for ICANN62

Well amazingly, it's that time again. Next week, individuals from around the world with a keen interest in Internet policy will head to Panama City, Panama for the second ICANN meeting of the year. As always, Brandsight will be attending to follow all of the important policy work being carried out by the community. Before I head off to the meeting (which based on my research will actually be my 32nd ICANN meeting!), I'd like to share a preview of the major topics slated for discussion. more

A Secure Recursive Caching DNS Server

Over the last couple of weeks I have spent some time working on a project to develop a DNS cache for Windows that is intended to be reasonably secure against spoof attacks, in particular in situations where NAT firewalls may prevent port randomization. The program is evolving, but currently uses a couple of ideas to attempt to defeat spoof attacks... The source code is intended to be entirely un-encumbered, that is free in all respects. I would welcome any suggestions or comments on the aims of the project, the source code, the functionality of the program or other ideas. more

Cuban Satellite Connectivity - Today and (Maybe?) Tomorrow

Last January, Doug Madory of Dyn Research reported on Cuban traffic, noting that C&W's share had increased. And this week Madory reported that ETECSA had activated a new internet transit provider, medium-Earth orbit (MEO) satellite-connectivity provider O3b Networks (Other 3 billion), replacing geostationary satellite provider Intelsat... the time for a data packet to travel from earth to an O3b satellite and back to Earth is significantly less than to an Intelsat satellite. more

And Then There Was the Issue of Time

Anyone who has been part of the community during its soon-to-be 12-years of existence will be the first to tell you that while ICANN's intentions are good, its execution, time and again, has been lacking. Unfortunately, the global business world does not and cannot accept only good intentions. Businesses require surety, consistency and clear evidence of stability before they can establish the foundation for their enterprises. more

Singapore’s Fiber Infrastructure Beginning to Pay Off

It's still early days, but Singapore's approach to fiber deployment is beginning to pay off. In December 2007, Singapore announced a major program to get fiber deployed throughout their city state. A critical advantage of their approach was government mandated structural separation between the dark fiber layer deployed in the public right-of-way (a natural monopoly) and higher layer services (where competition is possible and highly desirable. more

Filtering the Internet Is Still a Bad Idea: DCA, ABC, and Steroid Searches

A few days ago, ABC News ran an "investigative" piece called "Group Probes Ease and Danger of Buying Steroids Online." ABC describes the "group" at issue as "an online watchdog," the Digital Citizens Alliance. That group determined that some of the millions of available YouTube videos encourage steroid use and that YouTube (which is owned by Google) places ads next to steroid-related videos and search results. They argue that Google and YouTube should be held legally responsible for any illegal content linked or posted. more

Will 5G Trigger Smart City PPP Collaboration?

As discussed in previous analyses, the arrival of 5G will trigger a totally new development in telecommunications. Not just in relation to better broadband services on mobile phones - it will also generate opportunities for a range of IoT (internet of things) developments that among other projects are grouped together under smart cities (feel free to read 'digital' or 'connected cities'). more

British Security Researcher Credited for Stopping WannaCry Is Charged in a U.S. Cybercrime Case

The 23-year-old British security researcher, Marcus Hutchins, who a few months ago was credited with stopping the WannaCry outbreak by discovering a hidden "kill switch" for the malware, is now reported to have been arrested by the FBI over his alleged involvement in separate malicious software targeting bank accounts. more

The Epsilon Phishing Model

Phishing researcher Gary Warner's always interesting blog offers some fresh perspective on clicking links on emails, as the crux of the phishing problem. Gary writes: "There is a saying 'if you give a man a fish, he'll eat for a day, but if you teach a man to fish, he can feed himself for a lifetime.' In the case of the Epsilon email breach the saying might be 'if you teach a man to be phished, he'll be a victim for a lifetime.' In order to illustrate my point, let's look at a few of the security flaws in the business model of email-based marketing, using Epsilon Interactive and their communications as some examples." more

Vulnerabilities of Weak Marks and Uncurated Websites

Dictionary words, alone, combined as phrases, modified by other parts of speech, and single letters that function as marks also retain in parallel their common associations that others may use without offending third-party rights. As a rule of thumb, generic terms are not registrable as marks until they perceivably cross a threshold to suggestive and higher classifications. more

The FCC Robocall Proceeding: International Insularity

In March of this year, the Federal Communications Commission (FCC) adopted an initial Notice of Inquiry (CG No. 17-59) to mitigate robocalls. In July, it adopted a Second Notice. Mitigating spoofed telephone calls is a global problem which every country in the world has been addressing as part of a global ecosystem for many years in intergovernmental and industry bodies, in academic R&D and patent filings, and industry products with ongoing activity continuing today. more

A Case for Looking Before Leaping: The IANA Stewardship Proposal

In my comments on the draft Cross-Community Working Group (CWG) on Naming Related Functions proposal for the IANA transition, I expressed my overall support, albeit somewhat reserved, for the proposal... but with the ICG's deadline of January 15 having come and gone, and the informal deadline of January 31 looming for the revised proposal from the Names community to be submitted, I'd like to shed some light on what I believe the role and reasoning for some of the mechanisms identified by the CWG, specifically the Contract Co., to be. more