/ Recently Commented

Public Sharing and a New Strategy in Fighting Cyber Crime

A couple of years ago I started a mailing list where folks not necessarily involved with the vetted, trusted, closed and snobbish circles of cyber crime fighting (some founded by me) could share information and be informed of threats. In this post I explore some of the history behind information sharing online, and explain the concept behind the botnets mailing list... we may not be able to always share our resources, but it is time to change the tide of the cyber crime war, and strategize. One of the strategies we need to use, or at least try, is public information sharing of "lesser evils" already in the public domain. more

ICANN Auctioning New Top-Level Domains: Serving Public Interest or Its Own?

ICANN has recently published a number of updates to the implementation program for new gTLDs. One of these updates is a paper by ICANN's "auction design consultant PowerAuctions LLC". The document makes a case for an auction to be held for the "resolution of contention among competing new gTLD applicants for identical or similar strings." In other words, two (or more) applicants for ".bank", or applicants for ".bank" and ".banks."... more

Aircell vs. VoIP

Last week American Airlines launched their Aircell wireless Internet access on a limited number of flights. It didn't take long before a few folks tried to make voice and video calls (in violation of Aircell's terms-of-service according to their PR folks), and it didn't take long before someone figured a way around their voice/video blocking efforts. more

IPv6’s Long March

With the thousands of IPv6 controlled lights dimming over the 2008 Olympics, the long march on the road to IPv6 continues as the Olympic IPv6 Workout enters history. The early objective of full commercial deployment for 2008 proved elusive and more realistic goals were set and met with success. Not wasting any time, the starting shot toward commercial deployment followed on the heels of the closing ceremony with the august 25th announcement... more

How Rise in Nationalism and Industry’s Lack of Foresight Could Mean a Fragmented and Isolated Web

I have been thinking a lot lately on the topic of the free flow of information on the internet -- what kinds of tools are available now and in the future for governments (especially repressive ones) to control content, isolate their people and keep any contrary viewpoints censored. I had an interesting conversation with a Practice Lead from IFTF.org. The Institute for the Future (IFTF) is a California based independent, nonprofit research group with 40 years of experience in identifying emerging trends that will transform global society... Turns out they are quite concerned about the fragmentation and control of the Internet as well. But will it be an inevitability? more

FCC Banning Wireless Devices that Interfere with White Spaces Spectrum

The Federal Communications Commission (FCC) has proposed a ban on some wireless microphones and other low-powered devices that operate in the 700-MHz band after the digital TV transition in February, next year. This is part of an attempt to clear any potential interference with the "white spaces" spectrum which will be fully available for "public safety as well as commercial wireless services". more

Comcast Given 30 Days to Disclose Network Management Practices, Says FCC Order

In follow up to August 1st ruling against Comcast, Federal Communications Commission (FCC) in a 67 page order released today has given Comcast 30 days "to disclose the details of their unreasonable network management practices, submit a compliance plan describing how it intends to stop these unreasonable management practices by the end of the year, and disclose to both the Commission and the public the details of the network management practices that it intends to deploy following termination of its current practices." more

Lawrence Lessig’s Reaction to McCain’s Technology Plan

In reaction to U.S. republican presidential candidate John McCain's release of his technology policy statement on August 14, Lawrence Lessig has released a video presentation criticizing the tech plan for lack of change to important issues such as broadband penetration declines in the country. Early during the video presentation, Lessig has this to say: "...the single most important fact about internet's development in last decade has been the extraordinary decline United States has faced with respect to our competitive partners. We started the Bush administration at no. 5, we will end at no. 22. And the question anybody should be asking about internet policy here, is why we did so poorly and what change there might be to reverse that decline..." more

The McCain Campaign’s “Technology” Message

I look at this as the ideas of Mike Powell and Meg Whitman, and a lot of unimportant wordsmithing. Before the Dublin (Erie) IETF I wrote one for one of the top three DCCC targeted races. You, or One, or I (isn't voice fun) tries for ideas that matter, and then try to connect the dots, for the semi-literate staff of a candidate who needs clue, e.g., to make effective calls to the DNC's major contributor lists for area codes 415, 408, 650 and 831. I mention Dublin because ages ago Scott Bradner's plan for Harvard, decent bandwidth everywhere and location transparency was, in just a few pages, a revolutionary policy document then, and now, and I was happy to see Scott again and let him know that two decades later I still remembered seeing policy stated with confidence and clarity. more

McCain’s Technology Non-Plan

The McCain technology plan is finally out. As expected, it's light on what most of us understand as "technology policy." There are many platitudes about the glories of lower taxes and private investment, but little understanding of just how profoundly communications and information technologies are changing our world. The good news, I suppose, is that McCain is finally talking about technology issues which he resolutely ignored for most of the campaign, and which his advisors dismissed as not worthy of Presidential attention. more

McCain’s Tech Policy

I was hoping that McCain's Tech Policy would emphasize and extend the two McCain pro-Internet initiatives -- the McCain Lautenberg Community Broadband Act and Spectrum Re-regulation, neither of which have yet seen the light of day -- but it doesn't. In the first case, it makes a vague nod in the direction of "market failure and other obstacles." In the second, it treats spectrum policy as a done deal; now that we can surf the Web in coffee shops, we're done. more

ICANN’s Allocation Method for New TLDs

ICANN recently commissioned a report from Power Auctions LLC to investigate the merits of auctioning new Top-Level Domains (TLDs). Below I outline some of the issues related to stakeholder interests and mechanism design... Successfully managing the design of an allocation mechanism for new TLDs will entail coordinating functions across various competencies. To rely on a standard auction mechanism for the allocations would be a historic setback for the domain name industry, as successful allocation design is all in the details. more

U.S. Internet Speed Growth Too Slow, Will Take Over 100 Years to Catch Up With Japan

According to a recent study by Communications Workers of America's (CWA's), United States has not made significant improvement in the speeds at which residents connect to the Internet. U.S. continues to fall far behind other countries. "...between 2007 and 2008, the median download speed increased by only four-tenths of a megabit per second (from 1.9 mbps to 2.3 mbps), and the median upload speed barely changed (from 371 to 435 kbps). At this rate, it will take the United States more than 100 years to catch up with current Internet speeds in Japan." more

A Secure Recursive Caching DNS Server

Over the last couple of weeks I have spent some time working on a project to develop a DNS cache for Windows that is intended to be reasonably secure against spoof attacks, in particular in situations where NAT firewalls may prevent port randomization. The program is evolving, but currently uses a couple of ideas to attempt to defeat spoof attacks... The source code is intended to be entirely un-encumbered, that is free in all respects. I would welcome any suggestions or comments on the aims of the project, the source code, the functionality of the program or other ideas. more

Trust, but Verify

We are at an inflection point in our lifetimes. The Internet is broken, seriously broken... Almost all of the systems currently in use on the Internet are based on implicit trust. This has to change. The problem is that these systems are so embedded in our everyday lives that it would be, sort of like, changing gravity, very difficult. more