WannaCry, originated firstly in state projects but spread by other actors, has touched upon myriads of infrastructure such as hospitals, telecommunication, railroads that many countries have labelled as critical. IT engineers are hastily presenting patching codes in various localized versions. The other patch needed, however, is more than technical. It is normative and legislative. The coding of that patch for a situation like this is in two layers of dilemma. more
Every time I witness another argument about changing the rules of the Whois system I marvel at how such an important core internet protocol could be so widely misunderstood. I don't mean that the protocol's technical details are not well understood -- it's a very simple device, easy to implement correctly and easy to use even for new users. I mean that the Whois system itself and its purpose in the Internet ecosystem is widely misunderstood. Everybody uses Whois and lots of people argue about Whois but precious few folks know why Whois exists in the first place. more
This is the first in a series of releases that tie extensive code injection campaigns directly to policy failures within the Internet architecture. In this report we detail a PHP injection found on dozens of university and non-profit websites which redirected visitor's browsers to illicit pharmacies controlled by the VIPMEDS/Rx-Partners affiliate network. This is not a unique problem, however the pharmacy shop sites in question: HEALTHCUBE[DOT]US and GETPILLS[DOT]US should not even exist under the .US Nexus Policy. more
The April NETmundial meeting was a seminal event in the history of Internet Governance. Fears that the meeting might fail to reach consensus were not realized. Instead, the participants achieved a high degree of harmony -- the "Spirit of NETmundial" -- that resulted in issuance of a consensus Statement that, while lacking in precise detail, was effused with positive energy. Since that meeting there has been considerable discussion within the Internet Governance (IG) community as to what lessons have been learned from NETmundial, and how its work might best be carried into the future. more
In politics, as in Internet policy, the most effective weapons are also the oldest. So when it came time for hard-line intellectual property advocates to make a desperate last stand against the new gTLD program, it came as no surprise they turned to the atomic bomb of rhetorical devices: FUD. FUD stands for "fear, uncertainty and doubt" and it is the tool of last resort when change is coming and you want to stop it. The theory is simple: the human response to fear is to cling to what's familiar and oppose what's new. So if you can scare enough people about the potential effects of a new policy or law, you stand a pretty good chance of preventing it from ever going into effect. more
A recent piece in The Markup called Swinging the Vote? attempts to figure out how Google decides where to deliver political e-mail. They were startled to discover that only a small fraction of it was delivered into the main inbox, and a fair amount was classed as spam. They shouldn't have been. This is an example of the fallacy We're so nice that the rules don't apply to us, which is far too common among non-profit and political mailers. more
A look into the past reveals that continuous developments in weaponry technology have been the reason for arms control conventions and bans. The banning of the crossbow by Pope Urban II in 1096, because it threatened to change warfare in favour of poorer peasants, the banning of poisoned bullets in 1675 by the Strasbourg Agreement, and the Geneva protocol banning the use of biological and chemical weapons in 1925 after world war 1, all prove that significant technological developments have caused the world to agree not to use certain weapons. more
The Federal Communications Commission (FCC) in Washington has advanced its wireless health care agenda by adopting rules that will enable Medical Body Area Networks (MBANs), low-power wideband networks consisting of multiple body-worn sensors that transmit a variety of patient data to a control device. MBANs provide a cost effective way to monitor every patient in a healthcare institution, so clinicians can provide real-time and accurate data which allows them to intervene if necessary. more
While Occupy Wall Street and other groups representing the so-called 99% are getting most of the press, the 1% is raising its profile as well, at least when it comes to gTLDs. They are complaining that introducing global choice and competition to the Internet will cost them money. The chief of the Association of National Advertisers (ANA) now says that it has "spent the last few months" considering the new gTLD program, and has found it lacking. They want ICANN to shut the whole thing down. more
The United States government (USG) has provided its first official reaction to the October 2013 Montevideo Statement issued by organizations responsible for coordination of the Internet technical infrastructure, the upcoming April Internet governance conference in Sao Paulo, Brazil , as well as other matters related to Internet governance -- including the ITU Plenipotentiary meeting scheduled for October in Busan, South Korea. more
It's easy to dismiss Verisign's antitrust suit as a ploy to push through Sitefinder. But whether one loves Sitefinder or hates Sitefinder, the complaint raises a much more significant issue that won't go away even if ICANN lets Verisign roll out Sitefinder. At the heart of Verisign's complaint is the lack of any definable process for decisionmaking, and its a complaint shared by others. A settlement between Verisign and ICANN that does not create a clear process for decisionmaking at ICANN that includes trustworthy independent review will merely delay the inevitable. Eventually, some other party will become just as frustrated and again challenge ICANN -- either in U.S. court or by enlisting the help of the U.S. Commerce Department, non-U.S. governements, or multinational treaty organizations. ICANN must recognize that the days of ad hoc decision making based on realpolitick must end and give way to stable processes that ICANN staff cannot control. more
Over the past days a lot has been said and written on counter hacking by enforcement agencies. The cause is a letter Dutch Minister I. Opstelten, Security & Justice, sent to parliament. Pros and cons were debated and exchanged. Despite the fact that I perfectly understand the frustration of enforcement agencies of having to find actionable data and evidence that gets criminals convicted in a borderless, amorphous environment, a line seems to be crossed with this idea presented to Dutch parliament. Where are we? more
"Law Enforcement, Courts Need to Better Understand IP Addresses, Stop Misuse," says EFF in whitepaper released on Thursday. more
There was a naive idealism in the early days of the Internet that attempted to rise above the tawdry game of politics. Somehow, we thought that we had managed to transcend a whole set of rather messy geopolitical considerations that plagued the telephone world and this new digital space that the Internet was creating was simply not going to play by the old rules. more
One of the problems with trying to secure systems is the lack of knowledge in the community about what has or hasn't worked. I'm on record as calling for an analog to the National Transportation Safety Board: a government agency that investigates major outages and publishes the results. In the current, deregulatory political climate, though, that isn't going to happen. But how about a voluntary system? more