/ Most Commented

The Militarization of the Internet

Someone needs to take a good hard look at those Internet surveillance stories being strategically placed on the front page of the New York Times. There's a trail here, I believe, that's worth following. Here are some data points... there appears to be a deep interest in the ability to declare war online, as evidenced by cybersecurity research and public speeches by Herbert Lin, a key player who has worked on several cybersecurity reports for the National Research Council.
 more

On the Need to Separate the Telecom Business Agenda from Government Policy

At Guadalajara, Mexico this week, in the policy debate kicked off by the ITU, Russian Federation's Minister of Communications proposed that the ITU should give itself veto power over ICANN decisions. This proposal by the Regional Commonwealth in the field of Communications (RCC) calls for the ICANN Governmental Advisory Committee (GAC) to be scrapped and replaced by an ITU group. more

Plutocrats and the Internet

The new month visits on us a new attempt to control the Internet; the UN's specialized agency, the International Telecommunication Union (ITU), is holding its quadrennial plenipotentiary meeting in Guadalajara, Jalisco this week. The governments assembled there are considering a few proposals that can best be described as piquant. more

Policy Failure Enables Mass Malware: Part I (Rx-Partners/VIPMEDS)

This is the first in a series of releases that tie extensive code injection campaigns directly to policy failures within the Internet architecture. In this report we detail a PHP injection found on dozens of university and non-profit websites which redirected visitor's browsers to illicit pharmacies controlled by the VIPMEDS/Rx-Partners affiliate network. This is not a unique problem, however the pharmacy shop sites in question: HEALTHCUBE[DOT]US and GETPILLS[DOT]US should not even exist under the .US Nexus Policy. more

Ensuring Maximum Resilience to the DNS?

Yesterday CommunityDNS noticed a sudden, heavy spike in traffic through its Anycast node in Hong Kong. While comfortably processing queries at 863,000 queries per second for close to 2 hours the occurrence was undeniable. While we can't say the increase in traffic was specifically due to DDoS, its sudden increase is suspicious and reminds us that DDoS is still a popular tool used by the malicious community. more

Three Things Registrars Must Do to Enhance Security

If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more

Broadband Initiatives: Impact Will Depend on Wireless and Fixed Strategies

Broadband; we want it, and we all depend on it; but where you live can impact access and adoption of the best that service providers have to offer. The FCC is looking to change both geographic and demographic limitations now plaguing the U.S. in the global race for broadband economic supremacy. Can a combination of a fixed and wireless-mobile strategy improve broadband economic viability by increasing access, adoption, and affordability across the broadband spectrum? more

DNS RPZ, Malicious Domains… Bring Your Own Policy. Dress Casual.

Paul observed that most new domain names are malicious. Are they? Since the "dawn of tasting", some 30 million domain names have been created for the purposes of interposition on existing name to resource mappings. That is a third of the .COM historical growth, and mostly in the last five years. ... It is difficult not to conclude that interposition on persistent, public referents is without malice, and that the malicious parties are advertisers seeking to transform public referents into private property, as promotional devices... more

Clouded by a Convenient Illusion

In a relatively short time, the phrase "in the cloud" has become a term of art when talking about the internet. A quick Google search shows nearly a million uses of the phrase in the past month, a 3x increase from the same period in 2009. But, what does it actually mean to have your web site, your software, your data, or anything else "in the cloud?" "In the cloud" is derived from "cloud computing," which in turn is just a new term for distributed computing, where data-crunching tasks are spread across a variety of different physical processing units. This was common in mainframes in the 1960s, and later the idea of distributing processing across cheap PCs running Linux became popular in the 1990s. more

DotCo Launch: Over 90 Thousand Domain Names in 15 Minutes!

DotCo, which is the ccTLD for Colombia, is opening up to general public registration today. According to official sources from both Neustar and CoInternet the registry has handled over 90 thousand registrations in the first 15 minutes! ... While the initial registration phase of any new domain extension can attract a lot of media interest and a flood of registrations you need to look at the "big picture". more

Panel Allows Woman to Keep Domain Name That Is Her First Name

In this action under the usTLD Dispute Resolution Policy (which mirrors the Uniform Domain Name Dispute Resolution Policy), Complainant sought transfer of the Domain Name grazia.us. Complainant, an Italian company, has used the mark GRAZIA for many years in several markets around the world in connection with its fashion magazine. more

NAF Caught Revising Past UDRP Decisions?

In a previous CircleID article, it was discovered and documented that NAF Panelists and Complainants were systematically copying/pasting nonsense into UDRP decisions. It has been a couple of months with no action by ICANN, and no public statement by NAF. In a shocking new development, though, it turns out that NAF has quietly edited a past UDRP decision! more

ICANN Reloaded - Will They Ever Learn?

Less than a week ago, I posted a short blog piece entitled "Can ICANN Please Stop Shooting Itself in the Foot?" in which I questioned ICANN's actions in connection with the recently announced key signing ceremony. At the end of this piece I asked the question: "While it seems that ICANN continues it propensity to shoot itself in the foot, does the community need to start worrying about when ICANN takes aim at other more vital organizational body parts?" Well it looks like I only had to wait five days to get the answer to that question. more

Regulating and Not Regulating the Internet

There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more

China Won’t Repeat Protectionist Past in Digital Realm

Google may have unnecessarily provoked a fight with China, but the Middle Kingdom better keep its wits, lest it repeat a sad protectionist history. Early last millennium China was the world's richest civilization and technology leader. It famously invented gunpowder, iron casting, paper, porcelain, printing, and gigantic nine-masted sailing vessels. Between 1405 and 1433, the great Muslim Chinese explorer Zheng He led seven expeditions in the South Pacific and Indian Oceans, reaching the coast of East Africa. China's naval fleet grew to 3,500 ships... more