We know from life: There is no rule without exception. The problem is, exceptions create space for interpretations and have the risk to undermine the rule. Take Article 19 of the International Covenant on Political and Civil Rights from 1966. Article 19, paragraphs 1 and 2 define the individual right to freedom of expression. Paragraph 3 adds some exceptions where this right can be restricted to protect, inter alia, national security and public order. This is an understandable justification for a restriction, but it opens the door for misuse... more
I consult on communication issues for Neustar, an Internet infrastructure company. As most CircleIDers know, Neustar works behind the scenes to ensure the smooth operation of many critical systems like DNS, .us and .biz, local number portability and digital rights management. One of the cool things about working for them is the chance to attend the events they sponsor. Last week Neustar held a security briefing for senior federal IT personnel focused on Cybersecurity and Domain Name System Security Extensions (DNSSEC)... more
After they finished the tenth installment of their enormous multi-volume history, The Story of Civilization, Will and Ariel Durant wrote a set of thirteen essays entitled The Lessons of History. I happened to pick up this volume yesterday; it's both slim and sweeping. The Durants loved history, and wanted to show their readership what waves and tensions and trends they perceived. It's not a great book, but it's an undeniably forceful one. One essay discusses the essential moral characteristics of individuals, listing six traits and providing "positive" and "negative" descriptions of ways in which people act. more
A large scale ransomware attack today is spreading rapidly worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in bitcoins. more
We're jamming! Well, jamming in the cable industry, in the Caribbean. This year's Caribbean Cable Telecommunications Association (CCTA) annual conference ran from January 22 to 24 and was billed as "the Caribbean meets the future of cable TV." Indeed, the topics were all forward-looking -- network upgrades, new plant expansions, delivery of content over multiple devices, search and navigation tools -- the list goes on. It's an event where folks in the broadband business get together to share ideas and best practices. more
25 years ago, on April 22, 1993, a software release happened that fundamentally changed the user experience of the Internet. On that day, version 1.0 of "NCSA Mosaic for the X Window System" was released. You could now have (gasp!) text MIXED WITH IMAGES on the same page! Reading the Mosaic 1.0 release notes from Marc Andreessen is a bit of fun, as it includes gems like "Fixed mysterious stupid coredump that only hits Suns." more
The bulk of corporate domain portfolios largely consist of defensive registrations which often include common misspellings, product names, and abbreviations in countries where they may not even be doing business. More than ever, with the launch of new generic Top-Level Domains (gTLDs) expected to occur next year, companies are now taking a hard look at their defensive holdings and asking themselves whether or not they really need all of these registrations. more
Actually practical and not necessarily a problem. The Security Council of the Russian Federation, headed by Vladimir Putin, has ordered the "government to develop an independent internet infrastructure for BRICS nations, which would continue to work in the event of global internet malfunctions." RT believes "this system would be used by countries of the BRICS bloc - Brazil, Russia, India, China and South Africa." Expect dramatic claims about Russia's plan for an alternate root for the BRICs and not under Western control. more
The WIPO Arbitration and Mediation Center on Monday announced it had registered its 50,000th "cybersquatting" case. The 50,000th case just received by WIPO coincides with the organization's 20th anniversary on November 20, 2020. more
On April 16th at 11:00pm GMT, the first of two botnets began a massive spam campaign to take advantage of the recent Boston tragedy. The spam messages claim to contain news concerning the Boston Marathon bombing, reports Craig Williams from Cisco. The spam messages contain a link to a site that claims to have videos of explosions from the attack. Simultaneously, links to these sites were posted as comments to various blogs. more
Implementation of European Union's General Data Protection Regulation, or GDPR, is a major concern of our government, said David Redl during a meeting held on Thursday in Washington DC. more
"Law Enforcement, Courts Need to Better Understand IP Addresses, Stop Misuse," says EFF in whitepaper released on Thursday. more
ISPs in the U.S. saw a significant surge in both downstream and upstream traffic, increasing at least 30% and as much as 40% during peak business hours and as much as 60% in some markets, according to a new report from the Broadband Internet Technical Advisory Group (BITAG). more
Many of you will have seen news stories that explained what was going on: a huge DDoS attack on the infrastructure of Dyn had taken down access to many large websites like Twitter. A great deal of digital ink has since been spilled in the mainstream press on the insecurity of the Internet of Things, as a botnet of webcams was being used. Here are some additional issues that might get missed in the resulting discussion. more
The proposed new European Union (EU) Artificial Intelligence Act has been extolled in the media as a bold action by a major legislative body against the perceived dangers of emerging new computer technology. The action presently consists of an initial proposal for a Regulation with annexes from 2021, plus recent Amendments adopted on 14 June. This regulatory behemoth exists entwined among a multitude of other recent EU major regulations... more