/ Most Commented

Key Members of Congress Call for Permanent ICANN-US Tie

Philip Corwin of the Internet Commerce Associations reports: "In a stunning rebuke of ICANN's assertion that it had achieved sufficient accountability and professional stature to justify termination of its unique relationship with the U.S. government, the Chairman of the House Committee on Energy and Commerce as well as the Chairman of its Internet Subcommittee, along with eight other Committee members, dispatched a joint letter on August 4th to Commerce Secretary Gary Locke urging that the relationship between ICANN and the U.S. be made permanent and strengthened." more

How Copyright Violators Are Removed from Search Engine Listings Based on DMCA

It may not be widely-known but the big 3 search engines -- Google, Yahoo! and Bing -- have established procedures for removing natural search results on the basis of the Digital Millennium Copyright Act (DMCA). That's good news for brand owners: if consumers can't find infringing websites via the search engines, they're less likely to come across them at all... more

Trans-Sector Thinking Spreading to the Highest Levels in Government

Australia, New Zealand and the USA have taken international leadership in relation to their approaches to the infrastructure investment their countries are committed to in relation to the multi-billion dollar investment in national broadband and smart grid infrastructure. This is based on open networks, which will allow multiple access to infrastructure that can be used for e-health, smart grids, tele-education, as well as, of course, to telecoms, Internet and entertainment services. more

NJ Man Arrested for Domain Name Theft and Sale on eBay

A man from the northern New Jersey area was charged and arrested for stealing a domain name belonging to the owners of P2P.com. According to reports, he allegedly transferred the ownership of the domain name to himself and succeeded in reselling it on eBay to a professional basketball player Mark Madsen of the Los Angeles Clippers. more

WIPO: Disregard TLD in Trademark Dispute

There is a Dutch website which regularly publishes comments on rulings of the World Intellectual Property Organization (WIPO) Arbitration, Dutch court cases, and similar things. They have a newsletter which reports over the latest cases. It is really meant for people who are into the legal aspects of domain names. In the July "nieuwsbrief" newsletter, there was a remark (in Dutch) about a case that the top level ".nl" suffix to the name should not be considered relevant. more

Seeing the Opportunity for IP Communications Within the Smart Grid Space

Having followed IP communications as an analyst since 2001, I've seen a few cycles come and go, and Smart Grid reminds me a lot of VoIP. Telcos and utilities both operate large, complex and costly networks, and prior to 1984, both were heavily regulated. Following the deregulation of telecom came a wave of unprecedented innovation and disruption built largely around IP technologies. We all know what that's done for telcos -- and communications in general. more

OpenDNSSEC Launched to Help Drive Adoption of DNSSEC

A team of developers including .SE (The Internet Infrastructure Foundation), LNetLabs, Nominet, Kirei, SURFnet, SIDN and John Dickinson have come together to create open source software, called OpenDNSSEC, to make it easier to deploy DNSSEC. Patrik Wallström, responsible for DNSSEC at .SE comments: "In order to spread the use of DNSSEC to an increased number of domain names, the management surrounding this technology must be simplified. Together with a number of collaborators, we're developing OpenDNSSEC. Leveraging our deployment experience, we will produce a well-packaged, easy-to-use and flexible DNSSEC tool that eliminates all manual procedures. Those in charge of name servers no longer need detailed knowledge about the protocol in order to use it." more

More Than Half Top-Level Domains Not Really on Top of IPv6

At the recent ISOC Asia conference in Kuala Lumpur a rather innocuous coffee break question was raised: could any one around the table name some of the major Top-Level Domains (TLDs) still delinquent in their IPv6 support? Nobody could answer on the spot but the question intrigued me. A logical place to start looking for an answer was ICANN. more

Survey Suggests Strained Budgets Causing Security Cutbacks on Known Threats

A recent survey of security professionals by RSA Conference with regards to critical security threats and infrastructure issues currently faced, revealed budgetary constrains as the top challenge currently faced. According to reports, the study suggests that even though practitioners are most concerned about email phishing and securing mobile devices, technologies addressing these needs are at risk of being cut from IT budgets. 72% percent of respondents indicated a rise in email-borne malware and phishing attempts since Fall 2008, with 57% stating they have seen an increase in Web-borne malware. Concerns about zero-day attacks and rogue employees as a result of layoffs were cited by 28% and 26% of survey respondents, respectively. more

Nuclear Command and Control Structures Vulnerable to Cyber Terrorism

A research paper commissioned by the International Commission on Nuclear Non-proliferation and Disarmament (ICNND) suggests that nuclear command and control systems are vulnerable to cyber terrorism. "Despite claims that nuclear launch orders can only come from the highest authorities, numerous examples point towards an ability to sidestep the chain of command and insert orders at lower levels," says the report. more

Video: Google’s IPv6 Deployment Strategy

The IPv6 Act Now website, aimed at encouraging the adoption of IPv6, has featured a video today on Google's implementation of IPv6, which resulted in the launch of ipv6.google.com. In this video, Lorenzo Colitti, network engineer at Google, explains the planning, deployment, and future plans for making Google services available over IPv6. The best way to proceed with an IPv6 deployment, Colitti says is "to run everything on the same infrastructure." more

Malware Production Continues at Record-Setting Pace; 6000 Unique Pieces Per Day

Security researches report seeing as much unique malware in the first half of 2009 as seen in all of 2008. "This is quite something when you consider that in 2008 we saw the greatest ever growth in malware," says David Marcus of McAfee Avert Labs. More specifically, Marcus in a blog post writes that the numbers add up to an average of 200,000 unique pieces malware monthly or more than 6,000 a day. "Bear in mind these are malware we consider unique (something we had to write a driver for) and does not count all the other malware we detect generically or heuristically... When you add in the generic and heuristic detections the number becomes truly mind boggling," writes Marucs. more

SEACOM Lights Up Eastern Africa

The SEACOM submarine cable, completed in the past 24 hours, is the first modern submarine cable connecting to eastern Africa, and the first of an unprecedented wave of new cable projects on both the eastern and western coasts of Africa. Approximately USD2.4 billion in new submarine cable projects are scheduled for completion by the end of 2011. The plans for so many new cables reflect both Africa's lack of international communications infrastructure, and soaring capacity requirements. more

The Google Telephone Company?

Google has undertaken a beta-test of a telephony platform that includes the opportunity to route incoming calls to multiple devices and telephone numbers as well as free domestic long distance service. Google offers a service that fits somewhere between computer-to-computer, Internet telephony and Voice over the Internet Protocol telephony with access to and from the public switched telephone network. These service categories present polar opposites for U.S. regulatory purposes... more

More on Networks and Nationalization With Respect to Cyberwar

As a follow up to Susan Brenner's Networks and Nationalization and my comment there, I will go further in this post and talk about the "cyberwar" and "offense" aspects of her article. I think I made this point elsewhere as well... but before getting into a war, it'd be a brilliant idea to actually know that you can win. Cyberwarfare is the sort of game where you don't really need to be a huge government with the largest standing army in the world and sophisticated weaponry in order to win... more