The most notable thing about the EC Papers on ICANN, which were leaked by Kieren McCarthy last week, is that they are designed to completely subordinate ICANN as an institution. We have not seen such a comprehensive attack by a government on ICANN since the World Summit on the Information Society. One can infer that this is payback for the Board's decision to not treat the EC's views, expressed in its Governmental Advisory Committee (GAC), as binding instructions rather than as nonbinding advice. more
I have returned to the subject of the title on a number of occasions and it is worth revisiting. Like judicial proceedings, the substance of disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) and Panel determinations are publicly available. The Internet Corporation for Assigned Names and Numbers (ICANN) mandates in its Rules that all decisions must be delivered to the parties within "three business days" of their receipt of the decision and posted on providers' websites. more
By 2018, the private cloud market will be worth almost $70 billion, according to a report from Technology Business Research and reported by eWeek, while cloud-based security services are predicted to reach more than $3 billion in 2015. Despite these gains, however, there are struggles: Information Management points to research that found that 88 percent of companies adopting the cloud experienced at least one "unexpected challenge," and on average survey respondents used three cloud vendors to find the right mix of pricing and services. more
One thing that ICANN clearly lacks is a set of well documented and often referenced founding principles. This leaves the awkward position where everyone who has been around since the beginning has a different position on what those principles should have been and all those that have joined later know that there is something fundamental missing. The missing principle vexing me this week is that of fair competition. Even now, long after the gTLD vote, the argument still runs on... more
Apple today reported it is constructing its first data center in China, in partnership with a local internet services company, in order to comply with the tougher cybersecurity laws enacted last month. more
NANOG 69 was held in Washington DC in early February. Here are my notes from the meeting. It would not be Washington without a keynote opening talk about the broader political landscape, and NANOG certainly ticked this box with a talk on international politics and cyberspace. I did learn a new term, "kinetic warfare," though I'm not sure if I will ever have an opportunity to use it again! more
Google today launched a long-rumored "Drive" service to allow users store photos, videos, and other digital files in its massive data centers. Available immediately, first five gigabytes of storage per account of Google Drive is free and additional storage will be sold for prices starting at $2.49 per month for 25 gigabytes. more
With my post earlier this month about the possibility of SIP botnets [also featured here on CircleID], I've had a number of people asking about more information and wondering about the possible impacts. And while I will write more on botnets in general, as far as the potential impact of "botnets" in general, one need only look over at the current situation in Estonia... Now, perhaps Russia is behind the attack... perhaps not. There are obviously much larger political issues going on between the two states. more
A registrar who also engages in domain tasting can inadvertently create ripple effects throughout the domain name industry. Thus, domain name owners must exert pressure on ICANN to reduce this risk. We are now experiencing ripple effects from the subprime market and its repercussions on related markets. ...there can be a problem when registrar functions and domain tasting are conducted by the same entity. Unmonitored coupling of seemingly unrelated markets can be devastating to our industry. more
The new Anti-Phishing Working Group (APWG) Global Phishing Survey has just been released. Written by myself and Rod Rasmussen of IID, the report is the "who, what, where, when, and why" look at phishing, examining the second half of 2014. The report has many findings, but here I'll concentrate on the new gTLDs. The second half of 2014 was when an appreciable number of new gTLDs entered general availability and started to gain market share. more
'It could've been worse' is a fascinating expression. It implies that the incident in question obviously could have been worse than expected, however it also implies that it could have been better, ultimately leading to the conclusion that it was at least somewhat bad. So both fortunately and unfortunately for three Greek banks, the ransom DDoS attacks levied against them by hacker group the Armada Collective could have been worse. more
While there is much discussion in the United States about the mergers of Comcast and Time Warner Cable, and of AT&T and DirectTV, issues such as this are generally discussed from a very narrow perspective and, we maintain, from the wrong underlying telecoms regime operating in that country - one that has stifled competition in the telecoms for nearly two decades. The same wrong parameters apply to the endless debates on net neutrality an issue that is, by the way, largely of significance to the US market alone. more
The U.S. Government is causing a huge disservice to protection and defense in the private sector (80%+ of CIKR) by creating an ECS that contains monetary incentive for a few large players to exert undue control over the availability, distribution, and cost of security threat indicators. While there may be a legitimate need for the federal government to share classified indicators to entities for protecting critical infrastructure, the over-classification of indicator data is a widely recognized issue that presents real problems for the private sector. ECS as currently construed creates monetary incentives for continued or even expanded over-classification. more
One IP address is much the same as another - right? There's hardly a difference between 192.0.2.45 and 192.0.2.46 is there? They are just encoded integer values, and aside from numerological considerations, one address value is as good or bad as any other - right? So IP addresses are much the same as each other and an after-market in IP addresses should be like many other markets in undistinguished commodity goods. Right? more
I once wrote about about the legal right objections on Guillon.info and with all these new generic Top-Level Domain (gTLD) announcements, I find it interesting to check if an application could be blocked by paragraph 3.2.2.2 of the latest Draft Applicant Guidebook. more