Public comments on the Proposed Recommendations published by the Accountability and Transparency Review Team ("ATRT") have now been submitted, and it is worth stepping back to evaluate ATRT's work in the context of ICANN's larger challenges. ATRT was constituted to carry out ICANN's commitments under the AoC. Yet at times ICANN acted as if ATRT were an adversary rather than a partner... more
These days in Washington, even the most absurd proposals become the new normal. The announcement yesterday of a new U.S. State Department Cyberspace Bureau is yet another example of setting the nation up as an isolated, belligerent actor on the world stage. In some ways, the reorganization almost seems like a companion to last week's proposal to take over the nation's 5G infrastructure. Most disturbingly, it transforms U.S. diplomacy assets from multilateral cooperation to becoming the world's bilateral cyber-bully nation. more
Afghanistan's President Ashraf Ghani has signed into law a cybercrime bill this week targeting online crime and militancy by groups such as the Taliban and Islamic State despite concerns it could limit free speech. more
Talking technical is easy. Distilling technical detail, complex threats and operation nuances down to something that can be consumed by people whose responsibility for dealing with cybercrime lays three levels below them in their organizational hierarchy is somewhat more difficult. Since so many readers here have strong technical backgrounds and often face the task of educating upwards within their own organizations, I figured I'd share 4 slides from my recent presentation that may be helpful in communicating how the world has changed. more
We are building the Internet Archive of Canada because, to quote our friends at LOCKSS, "lots of copies keep stuff safe," writes founder Brewster Kahle in a blog post on Tuesday. more
A new study has been released by Center for Strategic and International Studies (CSIS) Commission on Cybersecurity for the 44th President that looks into cybersecurity manpower challenges in the United States. The report titled, "A Human Capital Crisis in Cybersecurity," is produced by CSIS - a bipartisan public and foreign policy think tank in Washington. more
Uniform Domain-Name Dispute-Resolution Policy (UDRP) Rule 1 defines Reverse Domain Name Hijacking (RDNH) as "using the Policy in bad faith to attempt to deprive a registered domain name holder of a domain name"... There has been a mixed history in granting and denying this remedy for overreaching rights. Some Panels consider RDNH regardless whether it has been requested (even if respondent defaults in responding to the complaint); others will only consider the issue if requested. more
Word has leaked out that Apple is working on a satellite project. The company is at the beginning of the research project, so there is no way to know exactly what they have in mind. For example, is the company considering launching satellites, or would they lease capacity from one of the other planned satellite networks? The fact that Apple is working on the concept is a good segue to discuss the many ways that satellite connectivity could be useful to Apple or other companies. more
I became interested in the global management of the Domain Name System (DNS) in 1991, soon after helping to create commercial Internet Service Providers (ISPs) in Sweden. We moved the Internet Exchange Point (IX) from Academia to the private sector and similarly the management of the SE country code top-level domain. The exercise was fascinating and it really tweaked my interest in the DNS and Internet Protocol (IP) addresses. more
Pawn Storm, also known as Sednit, Fancy Bear, APT28, Sofacy, and STRONTIUM, is a cyber espionage organization operating for over a decade which has been particularly aggressive in the past few years. more
Trademark issues are emerging with the upcoming introduction of new generic top-level domains on the internet, and the board members of the body introducing the names has passed the ball back to intellectual property experts to find answers. The Intellectual Property Constituency of the Internet Corporation for Assigned Names and Numbers (ICANN) has been asked to work out a viable solution "no later than 24 May 2009." Trademark issues have been defined as one of four overarching issues still to be solved before ICANN can finalise the application procedure for the next hundreds or thousands of top-level domains from .eco to .music. more
The Association of National Advertisers is at it again, this time spelling the death of new gTLDs barely after they emerge from the gate. In 1982, at the dawn of the video age, Motion Picture Association of America President Jack Valenti infamously told Congress, with more than one unfortunate reference to various types of violent crime, that the advent of the VCR would spell immediate and irrevocable doom to the motion picture industry, and that the device should certainly be thrown to the scrap heap even before its arrival. more
"Security is all about protecting the user." That's the comment that came up the other week in the twittersphere that kicked off a not-unexpected trail of pro and con tweets. Being limited to 140 characters makes it rather difficult to have a deep and meaningful discussion on the topic and the micro-blogging apparatus isn't particularly conducive to the communicating the nuances of a more detailed thought. So I thought I'd address the topic here in blog format instead. more
Between 2010 and 2013, 120 million Machine to Machine (M2M) connections have been added globally reaching a total of 195 million in Q4 2013, according to a recent study by the GSMA. Globally, M2M connections account for 2.8% of total mobile connections in 2013, up from 1.4% in 2010. Global M2M connections will reach a quarter of a billion (250 million) in 2014, said the GSMA. more
Google has accused Microsoft, Oracle, Apple and other companies for waging an organized campaign against Android through "bogus patents". Google's Senior Vice President and Chief Legal Officer, David Drummond, in a blog post yesterday wrote: "I have worked in the tech sector for over two decades. Microsoft and Apple have always been at each other's throats, so when they get into bed together you have to start wondering what's going on. Here is what's happening..." more