After over four years of investigation, the international criminal infrastructure platform known as 'Avalanche' is reported to have been dismantled via a collaborative effort involving Public Prosecutor's Office Verden and the Lüneburg Police (Germany) in close cooperation with the United States Attorney's Office for the Western District of Pennsylvania, the Department of Justice and the FBI, Europol, Eurojust and global partners. more
A study conducted by the Verizon Business RISK team in cooperation with the United States Secret Service has found that breaches of electronic records in 2009 involved more insider threats, greater use of social engineering and the continued strong involvement of organized criminal groups. more
As the shorter of the ICANN interregnums comes to a close and the ICANN faithful finalize their dinner reservation agendas for Brussels, it is time again for a preview of what will be 'on-tap' at next week's ICANN meeting. While, as always, there is a lot going on in ICANN Land, a scan of the blogosphere and ICANN list serves suggests that the four most discussed topics will be... more
At the Mobile World Congress in Barcelona, Tom Wheele, the FCC Chairman, gave a range of spirited responses to a grilling from the Director of the GSMA, Anne Bouverot. She was following the line of the telcos and questioned if the FCC intervention would stifle growth and investments in the market; however she had problems reconciling her position with the fact that, despite these regulatory changes, the American industry was still prepared to invest a whopping $45 billion in new spectrum. more
If you're considering rebranding under a new gTLD, go with a comprehensive big bang. A recent study by professors Dale Miller, Bill Merrilees, and Raisa Yakimova ("Corporate Rebranding: An Integrative Review of Major Enablers and Barriers to the Rebranding Process") finds that success comes when senior management makes an unweaving commitment based on proactive analyses of the entire value-chain, with buy-in and input from employees and suppliers. more
Why in the world would any company sign-up for a "New gTLD Application Monitoring Service" when ICANN intends to publicly post all applications on May 1st? Domain Name Watching and Trademark Watching Services make perfect sense when new registrations and applications are being submitted and granted on a daily basis. I think that we can all easily agree that trying to understand new domain name and trademark registrations without an automated service would be nearly impossible. more
A U.S. district court judge rules that Qualcomm violated anti-trust laws and has ordered the chip maker to change some of its licensing and negotiation practices. more
The goal of public policy for connectivity should be to assure access to our common facilities as a public good by adopting sustainable business models that don't put owners and users at odds with each other. Such balances are typically difficult to achieve which is what makes connectivity so unusual - we can achieve both once we fund the facilities as a public good apart from the particular applications such as telephone calls and cable content. more
Recent collaborative test by Core Competence and Nominet have concluded that 75% of common residential and small SOHO routers and firewall devices used with broadband services do not operate with full DNSSEC compatibility "out of the box". The report presents and analyzes technical findings, their potential impact on DNSSEC use by broadband consumers, and implications for router/firewall manufacturers. Included in its recommendations, the report suggests that as vendors apply DNSSEC and other DNS security fixes to devices, consumers should be encouraged to upgrade to the latest firmware. more
China is revising its cybersecurity laws to include faster reporting requirements and stricter oversight of AI-related incidents, reflecting growing concerns about national security and the unchecked expansion of digital infrastructure. more
The Internet Corporation for Assigned Names and Numbers (ICANN) has released new guidance concerning the reporting and disclosure of bugs that affect the Domain Name System, including information of how ICANN itself will behave in response to vulnerabilities. Until recently, ICANN, which is responsible for maintaining the root domain servers at the heart of the DNS system, had no specific guidelines for the reporting of vulnerabilities, leaving responsible disclosure protocols up to the researchers who discovered the bug. more
Google's sister-company Loon has announced its first commercial agreement with Telkom Kenya in order to deliver connectivity to the region using a network of giant balloons. more
Recently I joined my son, who is in his final high school year, to visit the open day of the newly founded Leiden University College in The Hague. The school focuses on Liberal Arts & Science and offers a broad education on (international) politics, philosophy and economy. The idea is to prepare the next generation internationally oriented public servants and leaders of the future. Among others they have former Dutch Minister of Foreign affairs and Secretary General of NATO Jaap de Hoop Scheffer as a college professor. more
The establishment media frequently attack the Internet as spreading inaccurate, unchecked rumors as news. While that is certainly true, the Internet is also demonstrating that the establishment media is no better. In the past weeks we have been told that the Stuxnet virus was written by US and Israeli intelligence. The evidence? Some un-named Israeli intelligence officers grinned broadly at reporters when the subject was mentioned. Is that what it has come to? more
The United States in retaliation to the growing Iranian cyber-activity and the shooting of an unarmed US drone last week has launched a series of cyberattacks against Iran's military IT systems. more