The new head of the U.S. Executive Branch took several actions this week that have profound collateral consequences for Silicon Valley as well as its scientific and technical communities. Presumably, he thought it was payback time for not supporting him. Perhaps he thought that producing automobiles domestically for non-Muslim U.S. citizens to drive around a walled nation is the way to future economic success. No matter, the effects of actions taken this week are the equivalent of nuking Silicon Valley. more
If there's one simple - high impact - thing you could do to quickly check whether your network has been taken over by a criminal entity, or uncover whether some nefarious character is rummaging through your organizations most sensitive intellectual property out of business hours, what would it be? In a nutshell, I'd look to my DNS logs. It's staggering to me how few security teams have gotten wise to regularly interrogating the logs from their recursive DNS servers. more
A team of Scientists in Pisa, Italy are reported to have set a new world record in wireless data transmission speed. Italian researchers from Sant'Anna University along with the Japanese Waseda University and the National Institute of Information and communication technology in Tokyo, for the "first time in the history of telecommunications" achieved throughput speeds of above 1.2 Terabits per second. Previous record, set in Korea, had been160 Gigabits per second. more
The Internet infrastructure has been having a bad month. Not as bad as, say, the world's aviation infrastructure, but bad enough. First, Chinese Internet censorship leaked out to a few massively unlucky users of the I root server. Then China Telecom failed to filter someone who leaked thousands of hijacked routes to other people's networks through them, probably by accident. And then, inexplicably, Forbes went where no one had gone before... more
The Uniform Domain Name Dispute Resolution Policy (UDRP) has never required that a complainant own any trademark registrations to succeed in a domain name dispute, given that common law trademark rights (if properly established) are sufficient. But, as a pair of recent UDRP decisions reminds us, even some registrations are inadequate. The issue relates to the first element of every UDRP complaint, which requires the party seeking relief to prove that the "domain name is identical or confusingly similar to a trademark... more
Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more
It should come as no surprise that the Federal Communications Commission will substantially change its regulatory approach, wingspan and philosophy under a Trump appointed Chairman. One can readily predict that the new FCC will largely undo what has transpired in previous years. However, that conclusion warrants greater calibration. more
In this part I want to focus on the gathering of cyber crime data. Are there best practices in the world on how cyber crime data is reported to law enforcement and aggregated to show the impact of said crime? Previously the discussion focused on the fact that cyber crime = crime and on a basic cyber (crime) training for every police officer. From the reactions this received, it is clear that some people see this as a possible solution. more
According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more
The steepening trajectory towards event-driven and real-time API architecture is imminent. This means incorporating event-based APIs into a technology strategy and leveraging existing API legacy systems that may have incurred a fair amount of technical debt, especially for historically progressive organizations. more
I ran into an article over at the Register this week which painted the entire networking industry, from vendors to standards bodies, with a rather broad brush. While there are true bits and pieces in the piece, some balance seems to be in order. The article recaps a presentation by Peyton Koran at Electronic Arts (I suspect the Register spiced things up a little for effect); the line of argument seems to run something like this... more
Periodismo de Barrio has edited a collection of 13 articles on the Cuban Internet in collaboration with the Internet Policy Observatory at the University of Pennsylvania. The articles cover the history of the Cuban Internet, the legal framework, services, communities, and projects. It is a diverse collection -- something for everyone. Here are thumbnail summaries of each article. more
In part two of The [Dot] Brand Tribes we argued that introducing new branded generic Top-Level Domains (gTLDs) would bring value to brand owners and have positive effects on customer recognition. In this last post we'll continue that theme and talk about how brand owners can come together to provide shared spaces using the banking industry as an example. more
Never let it be said that group therapy isn't effective. Prior to hosting a new Top-Level Domain (TLD) workshop for a group of Australian applicants last week, the only therapy I would have advised for new TLD applicants was electroshock therapy - given the confidence-sapping delays and the catastrophic impact of constant changes to the program such as Digital Archery, Name Collisions and GAC Advice. more
Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more