Someone needs to take a good hard look at those Internet surveillance stories being strategically placed on the front page of the New York Times. There's a trail here, I believe, that's worth following. Here are some data points... there appears to be a deep interest in the ability to declare war online, as evidenced by cybersecurity research and public speeches by Herbert Lin, a key player who has worked on several cybersecurity reports for the National Research Council.
more
At Guadalajara, Mexico this week, in the policy debate kicked off by the ITU, Russian Federation's Minister of Communications proposed that the ITU should give itself veto power over ICANN decisions. This proposal by the Regional Commonwealth in the field of Communications (RCC) calls for the ICANN Governmental Advisory Committee (GAC) to be scrapped and replaced by an ITU group. more
The new month visits on us a new attempt to control the Internet; the UN's specialized agency, the International Telecommunication Union (ITU), is holding its quadrennial plenipotentiary meeting in Guadalajara, Jalisco this week. The governments assembled there are considering a few proposals that can best be described as piquant. more
This is the first in a series of releases that tie extensive code injection campaigns directly to policy failures within the Internet architecture. In this report we detail a PHP injection found on dozens of university and non-profit websites which redirected visitor's browsers to illicit pharmacies controlled by the VIPMEDS/Rx-Partners affiliate network. This is not a unique problem, however the pharmacy shop sites in question: HEALTHCUBE[DOT]US and GETPILLS[DOT]US should not even exist under the .US Nexus Policy. more
Yesterday CommunityDNS noticed a sudden, heavy spike in traffic through its Anycast node in Hong Kong. While comfortably processing queries at 863,000 queries per second for close to 2 hours the occurrence was undeniable. While we can't say the increase in traffic was specifically due to DDoS, its sudden increase is suspicious and reminds us that DDoS is still a popular tool used by the malicious community. more
If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more
Broadband; we want it, and we all depend on it; but where you live can impact access and adoption of the best that service providers have to offer. The FCC is looking to change both geographic and demographic limitations now plaguing the U.S. in the global race for broadband economic supremacy. Can a combination of a fixed and wireless-mobile strategy improve broadband economic viability by increasing access, adoption, and affordability across the broadband spectrum? more
Paul observed that most new domain names are malicious. Are they? Since the "dawn of tasting", some 30 million domain names have been created for the purposes of interposition on existing name to resource mappings. That is a third of the .COM historical growth, and mostly in the last five years. ... It is difficult not to conclude that interposition on persistent, public referents is without malice, and that the malicious parties are advertisers seeking to transform public referents into private property, as promotional devices... more
In a relatively short time, the phrase "in the cloud" has become a term of art when talking about the internet. A quick Google search shows nearly a million uses of the phrase in the past month, a 3x increase from the same period in 2009. But, what does it actually mean to have your web site, your software, your data, or anything else "in the cloud?" "In the cloud" is derived from "cloud computing," which in turn is just a new term for distributed computing, where data-crunching tasks are spread across a variety of different physical processing units. This was common in mainframes in the 1960s, and later the idea of distributing processing across cheap PCs running Linux became popular in the 1990s. more
DotCo, which is the ccTLD for Colombia, is opening up to general public registration today. According to official sources from both Neustar and CoInternet the registry has handled over 90 thousand registrations in the first 15 minutes! ... While the initial registration phase of any new domain extension can attract a lot of media interest and a flood of registrations you need to look at the "big picture". more
In this action under the usTLD Dispute Resolution Policy (which mirrors the Uniform Domain Name Dispute Resolution Policy), Complainant sought transfer of the Domain Name grazia.us. Complainant, an Italian company, has used the mark GRAZIA for many years in several markets around the world in connection with its fashion magazine. more
In a previous CircleID article, it was discovered and documented that NAF Panelists and Complainants were systematically copying/pasting nonsense into UDRP decisions. It has been a couple of months with no action by ICANN, and no public statement by NAF. In a shocking new development, though, it turns out that NAF has quietly edited a past UDRP decision! more
Less than a week ago, I posted a short blog piece entitled "Can ICANN Please Stop Shooting Itself in the Foot?" in which I questioned ICANN's actions in connection with the recently announced key signing ceremony. At the end of this piece I asked the question: "While it seems that ICANN continues it propensity to shoot itself in the foot, does the community need to start worrying about when ICANN takes aim at other more vital organizational body parts?" Well it looks like I only had to wait five days to get the answer to that question. more
There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more
Google may have unnecessarily provoked a fight with China, but the Middle Kingdom better keep its wits, lest it repeat a sad protectionist history. Early last millennium China was the world's richest civilization and technology leader. It famously invented gunpowder, iron casting, paper, porcelain, printing, and gigantic nine-masted sailing vessels. Between 1405 and 1433, the great Muslim Chinese explorer Zheng He led seven expeditions in the South Pacific and Indian Oceans, reaching the coast of East Africa. China's naval fleet grew to 3,500 ships... more