I strongly believe there is a serious "breach" in the Applicant Guidebook: I checked the scoring, I checked the possible objections, I am aware of the Governmental Advisory Committee (GAC) early warning but I really could not find how ICANN is going to avoid Community applications to be submitted as Standard ones. The role of ICANN is to offer a solution to launching new generic Top-Level Domains, it is no party in saying whether a new gTLD is a Community or not. more
"ICANN ethical conflicts are worse than they seem," says Beau Brendler, chairman of the North American Internet user advisory committee to ICANN (NARALO), in an op-ed post published today. Brendler writes: "Whatever might be said about outgoing ICANN CEO Rod Beckstrom, Internet users worldwide should be thanking him. Last week in Costa Rica, at the organization's 43rd meeting, Beckstrom blew a harsh blast of cold Arctic reality into the room about the board's conflicts of interest. more
In a blog post on the ICANN website, Joe Abley writes: "Resolvers are servers on the Internet which use the Domain Name System (DNS) protocol to retrieve information from authoritative servers and return answers to end-user applications... So, all in all, how many resolvers are there? Given that anybody can run one, it seems like a difficult thing to measure. It turns out, however, that all resolvers that talk directly to authoritative servers on the Internet leave a trail, and with a little data crunching we can come up with a number." more
The United States Patent and Trademark Office currently does not provide Trademark protection services for the Top Level Domain industry, an industry which generates almost $1 Billion in revenues annually in the United States. The Top Level Domain industry is the only legal business class in the United States that is denied constitutionally guaranteed intellectual property protections... The lack of Trademark Protection for the Top Level Domain industry has greatly increased the amount of uncertainty associated with the ICANN Application Process for new Top Level Domains. more
We know from life: There is no rule without exception. The problem is, exceptions create space for interpretations and have the risk to undermine the rule. Take Article 19 of the International Covenant on Political and Civil Rights from 1966. Article 19, paragraphs 1 and 2 define the individual right to freedom of expression. Paragraph 3 adds some exceptions where this right can be restricted to protect, inter alia, national security and public order. This is an understandable justification for a restriction, but it opens the door for misuse... more
One of many controversies surrounding the introduction of new domain names is the special protection given, though a moratorium, to the Red Cross and Red Crescent Movement (RCRC) and International Olympic Committee (IOC). Although the RCRC and the IOC are discussed together, they are very different. more
On February 16, 2012 ICANN took the new step of suspending the Registrar Alantron's ability to register new names or accept inbound domain transfers. This new compliance tool was used following Alantron's apparently inadequate response to a breach notice issued November 7, 2011. The issue in part concerns Alantron's perpetual problems with Port 43 WHOIS access which is required by the Registrar Accreditation Agreement. more
The Internet is contributing more to the American economy than the entire federal government, according to a new study by the Boston Consulting Group. The Internet accounted for $684 billion, or 4.7% of all U.S. economic activity in 2010, according to latest report released by Boston Consulting Group. more
In our last post on CircleID we showed encouraging growth in the number of IPv6-enabled networks. But announcing an IPv6 prefix is only one of the first steps a network operator should take when deploying IPv6. For a full IPv6 deployment, IPv6 needs to be enabled on network infrastructure and made available to end users. One key piece of infrastructure for which we can measure IPv6 capabilities are DNS resolvers. more
Knowing how long to store your company email can be confusing. For some industries and public companies there are laws dictating how long emails should be kept, but for other companies it is more discretionary. A document retention policy can help with this. Deciding which emails to keep and for how long - and then most importantly, sticking to your policy - will be looked on more favourably should you find yourself justifying missing email evidence to a judge. more
As the WHOIS debate rages and the Top-Level Domain (TLD) space prepares to scale up the problem of rogue domain registration persists. These are set to be topics of discussion in Costa Rica. While the ICANN contract requires verification, in practice this has been dismissed as impossible. However, in reviewing nearly one million spammed domain registrations from 2011 KnujOn has found upwards of 90% of the purely abusive registrations could have been blocked. more
I recently had a chance to read a report titled, "Show Me the Money: Characterizing Spam-advertised Revenue" produced as a joint effort from the University of California, San Diego (UCSD), International Computer Science Institute, and UC Berkeley by Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker and Stefan Savage. I also had a chance to hear Chris Kanich speak about the topic - Show Me The Money! This post contains my notes with some photos taken from that report. more
Courtesy forwards have been a standard feature of e-mail systems about as long as there have been e-mail systems. A user moves or changes jobs or something, and rather than just closing the account, the mail system forwards all the mail to the user's new address. Or a user with multiple addresses forwards them all to one place to be able to read all the mail together. Since forwarding is very cheap, it's quite common for forwards to persist for many years. Unfortunately, forwarding is yet another thing that spam has screwed up. more
Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. Whereas we in the security field usually talk about spam, malware and cyber crime, he talked about three meta-trends that all have the potential to be more dangerous than the cybercriminals. Here are my notes. more
Boy, that was a great party the White House threw yesterday when their new online privacy rights were unwrapped and passed around. Most everyone hefted their shiny new rights, agreed they were nice, and talked about the need for swift adoption. But when the party was done, everyone filed out, turning a blind eye to the post-party cleanup and a sink full of dirty dishes. more