The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more
About a week ago, I posted that Australia was getting ISPs to boot infected computers off of their network. I commented on whether or not this was a good policy. However, there was one thing in that article that I wanted to comment on but didn't... more
Google is closing its engineering office in Russia as a result of new law coming into force next year requiring foreign firms to store Russian users' personal data on servers located in Russia. more
One of the most embarrassing and pernicious realities in the world of cybersecurity is the stark reality that some industry cybersecurity standards practices are themselves cyber threats. How so? Most industry and intergovernmental standards bodies serve as means for assembling the constantly evolving collective knowledge of participant experts and package the resulting specifications and best practices as freely available online documents to a vast, diverse universe of users. more
Today, ICANN announced the temporary suspension of the Digital Archery system. ARI Registry Services applauds this development, as it's a clear signal ICANN is listening, considering and acting upon constructive feedback from the community. We encourage ICANN to not only reassess the Digital Archery system, but also the need to proceed with batching at all. more
The most incredible thing about the dot-org sale is no longer the billion-dollar price tag. It's not surprise fait-accompli announcement. It's not the republican billionaires. It's that the proponents have continued to advocate for it in the midst of the worst crisis the world has faced since the second world war. The biggest crisis in almost a hundred years. One that will reverberate for generations. more
Last week, the Federal Communications Commission (FCC) announced new privacy rules that govern how Internet service providers can share information about consumers with third parties. One focus of this rulemaking has been on the use and sharing of so-called "Consumer Proprietary Network Information (CPNI)" - information about subscribers - for advertising. The Center for Information Technology Policy and the Center for Democracy and Technology jointly hosted a panel exploring this topic last May... more
No, not the COVID curve - the curve of U.S. engagement in global industry 5G activities. Let me explain. What is known as 5G actually consists of a broad array of fundamentally revolutionary virtualization platforms that are constantly, collectively developed by industry in several dozen open global bodies. These bodies meet every few weeks, and several score companies around the world process scores to hundreds of input documents to produce many hundreds of effectively mandatory... more
My attention was drawn to the recent African Telecom Union (ATU)'s proposal for the modification and expansion of Resolution 47... As an affected party to the proposal, I feel obliged to make a comment: Recalling my last article to The Hill titled "ICANN is already under the influence of Foreign Governments", I drew an example of how ICANN allowed the African Union Commission, an Intergovernmental body to heavily interfere in the .Africa application so as to delegate it to itself, which led me to take ICANN to Court. more
Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more
When a service is constructed using diverse components, then the way in which service revenues are distributed to the various suppliers of the components of the service can follow a number of quite distinct models. There are various forms of revenue redistribution models where the revenue per transaction is distributed to the various suppliers according to their inputs to support each transaction. more
The ICANN Board will soon be considering candidates for election to the position of ICANN Chairperson and Vice Chair, which compels me to remind both the Board and the ICANN community of the fact that one of the members pursuing the Chairmanship is the subject of an on-going Australian Freedom of Information Act, which was initiated by the irregularities that brought about this individuals dismissal from the .au Domain Administration. more
As I write this, it is World Holocaust Day, 27th January 2021, a memorial of the atrocious events that shocked and outraged the conscience of humanity and gave birth to the Universal Declaration of Human Rights in 1948, the year that Holocaust victims majority of whom were Jews re-established the nation of Israel. Most of us can never begin to imagine the extent of the atrocities but relive the experiences through movies or documentaries, including but not limited to Spielberg's 1993 Schindler's List... more
2015 has already started to make its own land marks in the internet of things world. A major thing that has definitely hit the headlines is cyber security issue, which gives an indication that organizations will probably have to make generous budgetary allocations to answer to these anticipated breaches. Internet governance is perhaps going to remain in the headlines for the rest of 2015. more
On the face of it, the answer is a rather obvious and simple "yes"! The Internet obviously works across borders. Technically, it is a global network servicing its users wherever they may be on the planet. But it is this very nature -- the fact that the Internet is not bound to a specific country or territory -- which has more and more people asking themselves whether it can really work across borders. more