Don't forget to check out http://www.auda.org.au/domain-news/ for the archive of the last 3 months of the news. And see my website - http://GoldsteinReport.com/ - for daily updates in between postings. *************************************************** The domain name news is supported by auDA *************************************************** au: Parliament quietly blocks .info domains http://www.itnews.com.au/News/290150,parliament-quietly-blocks-info-domains.aspx ICANN has 100 new gTLD applicants http://domainincite.com/icann-has-100-new-gtld-applicants/ Australia's cyber protection put to the test http://www.smh.com.au/it-pro/security-it/australias-cyber-protection-put-to-the-test-20120215-1t5nl.html Domain Pulse 2012: Business, Not Porn, Most Popular Domain Name Use http://goldsteinreport.com/article.php?article=16971 Domain Pulse 2012: New TLDs May Face Difficulties Getting Noticed http://www.domainpulse.com/?p=7757 ********************** GOVERNANCE ********************** SOPA and the Future of Internet Governance So what was all that fuss about? SOPA, PIPA, Internet Blackout Day, front page stories in newspapers all across the country, eight million or so emails pouring into the White House, two million #sopa tweets, and 10 million signatures added to online petitions opposing the bills?followed, of course, by the announcement that these various legislative proposals for combating online copyright and trademark infringement had all been taken off the table ?for further study.? http://verdict.justia.com/2012/02/13/sopa-and-the-future-of-internet-governance ********************** DOMAIN NAMES ********************** ********************** - ccTLD & gTLD NEWS ********************** au: Parliament quietly blocks .info domains The Department of Parliamentary Services has blocked access by Australia's parliamentarians to some 5.2 million websites with a .info domain. http://www.itnews.com.au/News/290150,parliament-quietly-blocks-info-domains.aspx .ORG, The Public Interest Registry Releases Results of Bi-annual Domain Name Report .ORG, The Public Interest Registry (PIR) ... released the results of its bi-annual domain name report, "The Dashboard," detailing the robust growth of .ORG during the second half of 2011. Overall, .ORG registrations grew by 9.9 percent in 2011, reaching 9.6 million total domains under management (DUM) by the end of 2011?a net gain of 411,002 for the second half of the year. http://pir.org/node/1983 Manwin, ICM in Settlement Talks; Complaint to Be Amended Manwin attorneys say they are in settlement talks with .XXX operator ICM Registry and ICANN, according to a court filing today. http://newswire.xbiz.com/view.php?id=144320 ICM and YouPorn in antitrust settlement talks It?s Valentine?s Day, so perhaps it?s appropriate that ICM Registry has just revealed that it?s in talks to settle the .xxx antitrust lawsuit filed by one of the world?s biggest porn networks. http://domainincite.com/icm-and-youporn-in-antitrust-settlement-talks/ ********************** - NEW TLDS ********************** ICANN has 100 new gTLD applicants One hundred companies have registered to apply for gTLDs, according to ICANN senior vice president Kurt Pritz. http://domainincite.com/icann-has-100-new-gtld-applicants/ 100 Applicants Registered For New gTLDs There are 100 successful registrants in the online new gTLD Application System, ICANN announced today (14 February). With each successful registrant being able to apply for up to 50 new gTLDs, potentially it means there could be 5000 applications, although this would be nigh on impossible. http://goldsteinreport.com/article.php?article=16973 http://www.domainpulse.com/?p=7753 http://www.domainnews.com/en/100-applicants-registered-for-new-gtlds.html TLD application slots might become valuable As of yesterday 100 people or entities had registered with ICANN?s TLD application system. Each registered user can apply for up to 50 TLDs, which means technically 5,000 TLDs could be applied for with just the existing users. http://domainnamewire.com/2012/02/14/tld-application-slots-might-become-valuable/ It?s decision time on gTLDs Like it or not, the application window for the new gTLDs opened last month, and you need to take a stand on whether to apply. Back in July, I wrote that CMOs need to look at this as a strategic opportunity, not a nuisance. Since then, I?ve advised over 50 companies on this, and all share similar questions and concerns. Let?s look at the biggest ones. http://www.btobonline.com/apps/pbcs.dll/article?AID=/20120215/BLOGS/120219991/1542/BLOGS Top Level Domain Holdings releases annual report Top Level Domain Holdings has released its annual report for the year ending October 31, 2011. http://domainnamewire.com/2012/02/13/top-level-domain-holdings-annual-report/ ********************** - DNS SECURITY ********************** DHS budget would double cyber spending to $769 million The Homeland Security Department nearly doubled its 2013 funding request for cybersecurity in an otherwise slimmed-down budget. http://www.nextgov.com/nextgov/ng_20120213_7454.php How Frequently Do Botnets Reuse IP Addresses? by Terry Zink I wonder how much botnets reuse IP addresses. Do they infect a system and spam, get blocked, discard the IP and move onto the next (new) one? This means that they have a nearly unlimited supply of IP addresses. Or do they infect a system and spam, get blocked, and then let it go dormant only to awaken it some time later? I decided to take a look. http://www.circleid.com/posts/20120213_how_frequently_do_botnets_reuse_ip_addresses/ Anonymous Plans to Go After DNS Root Servers. What Will Be the US's Response? by Terry Zink The other day on pastebin, snippets of an email conversation were posted with members of the hacking group Anonymous discussing plans to conduct DOS attacks against the Internet's root name servers... Going after the Internet's root servers is a very bold move by Anonymous. Whereas before they were "merely" breaking into companies that they believed were acting contra to the hacker ethic, going after the Internet infrastructure is another thing altogether. Why? http://www.circleid.com/posts/20120215_anonymous_plans_to_go_after_dns_root_servers/ Australia's cyber protection put to the test Australia's computer emergency response teams have taken part in an online exercise designed to test Asia Pacific region's cyber protection capabilities, in the wake of several recent internet-based attacks targeting Australian companies. http://www.smh.com.au/it-pro/security-it/australias-cyber-protection-put-to-the-test-20120215-1t5nl.html http://www.brisbanetimes.com.au/it-pro/security-it/australias-cyber-protection-put-to-the-test-20120215-1t5nl.html http://www.theage.com.au/it-pro/security-it/australias-cyber-protection-put-to-the-test-20120215-1t5nl.html Debilitating Cyber Attack: Not If, But When? by Leonard Grace We all know how easy it can be to ignore or underestimate the possibly, or even likelihood, of a terrorist attack; just remember what happened on 9-11. That seems to be just what the U.S. is doing when it comes to a possible Cyber-Attack, no not in other countries, but right here at home where targets like private sector companies, who provide vital economic and emergency services to our population using broadband infrastructure, and are woefully under-secured for such attacks. http://www.circleid.com/posts/20120214_debilitating_cyber_attack_not_if_but_when/ Cybercriminals Building Intricate, Multi-Use Malnets Cybercriminals have gotten so sophisticated that they build an intricate network infrastructure and use it repeatedly for the distribution of malware, according to a new study from the network security company Blue Coat Systems. http://www.networkcomputing.com/security/232600910 us: Senators launch new push for cybersecurity bill Leading senators introduced a cybersecurity bill on Tuesday aimed at safeguarding the nation's water and power systems, which experts have warned often only have the most rudimentary protections against hackers. http://uk.reuters.com/article/2012/02/14/us-cybersecurity-congress-idUKTRE81D1EC20120214 http://in.reuters.com/article/2012/02/14/cybersecurity-congress-idINDEE81D0HM20120214 Senators Introduce Security Bill and Warn of Hacker Threat Want swift action on a complicated, contentious piece of legislation aimed at guarding against hackers? Invoke Sept. 11. http://bits.blogs.nytimes.com/2012/02/14/senators-introduce-security-bill-and-warn-of-hacker-threat/ Senate cybersecurity bill leaves Internet alone, exempts tech companies from oversight The Senate Homeland Security Committee has introduced the broad cybersecurity legislation promised late last year by Senate majority leader Harry Reid (D-NV). But contrary to the fears of many?or perhaps because of them?the bill's scope is tightly restrained, excluding the vast majority of commercial systems and Internet infrastructure itself from coverage. http://arstechnica.com/tech-policy/news/2012/02/senate-cybersecurity-bill.ars Cybersecurity Bill in U.S. Senate Seeks Industry Rules to Thwart Hackers Companies running computer networks essential to U.S. economic and national security would be required to better defend their systems from spies, hackers and terrorists under bipartisan Senate legislation unveiled today. http://www.bloomberg.com/news/2012-02-14/cybersecurity-bill-in-u-s-senate-seeks-industry-rules-to-thwart-hackers.html The Post's View: A cyber risk to the U.S. In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger of terrorism ?in the foreseeable future.? What makes that assessment particularly alarming is that the United States may be as unprepared to defend some of its critical computer systems as it was to protect New York and Washington against al-Qaeda before Sept. 11, 2001. http://www.washingtonpost.com/opinions/a-cyber-risk-to-the-us/2012/02/07/gIQA4q7M9Q_story.html Report concludes number of security vulnerabilities is falling Secunia's security report for 2011 concludes that the absolute number of security vulnerabilities being discovered is falling. This is true in comparison both with the previous year and over a five-year period. This should not, however, be taken as a signal by users to let their guard down. http://www.h-online.com/security/news/item/Report-concludes-number-of-security-vulnerabilities-is-falling-1434096.html Flaw Found in an Online Encryption Method A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online shopping, banking, e-mail and other Internet services intended to remain private and secure. http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html ********************** - DOMAIN DISPUTES ********************** au: Doteasy Technology Inc. v. M Makras & E.A Nahed, Dot Easy Australia Pty. Ltd - Case No. DAU2011-0041 1. The Parties: The Complainant is Doteasy Technology Inc. of Burnaby, British Columbia, Canada, represented by Jonathan Wong, Canada. The Respondents are M Makras & E.A Nahed, Dot Easy Australia Pty. Ltd of New South Wales, Australia represented by Watermark Intellectual Property Lawyers, Australia. 2. The Domain Names and Registrar: The disputed domain names <doteasy.com.au> and <doteasy.net.au> are registered with TPP Wholesale Pty Ltd. ... 6. Decision: For the foregoing reasons, the Complaint is denied. http://www.wipo.int/amc/en/domains/search/text.jsp?case=DAU2011-0041 ********************** - IPv4/IPv6 ********************** DDoS attacks spread to vulnerable IPv6 Internet The next-gen Internet, still immature, is now a pathway for Net attacks, a study finds. Also, ideology has become the primary reason for DDoS attacks. http://news.cnet.com/8301-30685_3-57378307-264/ddos-attacks-spread-to-vulnerable-ipv6-internet/ IPv6: Proper Planning Prevents Poor Performance Internet protocol version 6 (IPv6) is coming, as we've reported in this series on some of the issues network operators have to deal with in the near future. Two issues that require more than just checking boxes on a to-do list concern compliance and security. However, making sure the IPv6 network is as compliant and secure as the existing IPv4 network can be accomplished with the proper planning. http://www.networkcomputing.com/ipv6-tech-center/232600822 http://www.informationweek.com/news/infrastructure/ipv6/232600941 ********************** - MISCELLANEOUS ********************** Domain Pulse 2012: Business, Not Porn, Most Popular Domain Name Use Business is the main user of domain names said Marc Van Wesemael, General Manager of EURid on the first day of the annual Domain Pulse being held in Hamburg, Germany. http://www.domainpulse.com/?p=7749 http://goldsteinreport.com/article.php?article=16971 http://www.domainnews.com/en/domain-pulse-business-not-porn-most-popular-domain-name-use.html Domain Pulse 2012: New TLDs May Face Difficulties Getting Noticed Many applicants for new top level domains have not realised the effort that is required in submitting applications, said Richard Wein, General Manager at the Austrian registry, nic.at, at the Domain Pulse conference in Hamburg, Germany, Monday. http://goldsteinreport.com/article.php?article=16977 http://www.domainpulse.com/?p=7757 http://www.domainnews.com/en/domain-pulse-2012-new-tlds-may-face-difficulties-getting-noticed.html ********************** - DOMAINING & AFTERMARKET ********************** The Afternic DLS Expands Into Russia, Germany's Biggest Domain Conference Gets Underway & WaterShave.org Debuts! The AfternicDLS announced its latest expansion today - one that opens up the rapidly growing Russian market for domain sellers. The AfternicDLS did it by bringing RU-CENTER, Russia?s first and largest domain registrar and hosting company into Afternic?s Premium Reseller Network. ... Elsewhere, the 2012 DOMAINfest Global conference just concluded in California (our comprehensive show review was published Sunday with many new photos and show details) but across the ocean the biggest German-speaking event in the industry - DomainPulse - just got underway today in Hamburg, Germany with an estimated 350 participants on hand for the 9th annual meeting at the Hotel Grand Elysee. http://www.dnjournal.com/archive/lowdown/2012/dailyposts/20120213.htm ********************** INTERNET USE ********************** Humvees, UAVs could create route to Internet in Afghanistan The Pentagon is looking into how unmanned aerial vehicles and Humvees can be turned into Internet access points and woven into a sprawling wireless network in war zones such as Afghanistan. http://www.nextgov.com/nextgov/ng_20120215_7347.php uk: Silver surfer daters 'more honest' Over-60s are more likely than younger singletons to use realistic photos when looking for love online, according to research indicating that "silver surfers" are the fastest growing group of internet daters. http://www.telegraph.co.uk/health/healthnews/9080057/Silver-surfer-daters-more-honest.html ********************************* CHILD PROTECTION & ONLINE SAFETY ********************************* au: Filters kill innovation: ex-US CIO Kundra Ex-US government chief information officer (CIO) Vivek Kundra believes that internal internet filters, like the one currently in place within the Federal Government, can stifle innovation, limit productivity and often miss the root cause of internal security breaches. http://www.zdnet.com.au/filters-kill-innovation-ex-us-cio-kundra-339331635.htm au: Adult-only games rating to start 2013 [AAP] Computer games could be given adult-only ratings from the start of 2013 after a decade-long battle. http://www.computerworld.com.au/article/415569/adult-only_games_rating_start_2013/ ********************** ONLINE TV & MUSIC ********************** uk: Users warned as RnBXclusive.com shut down by police Music site RnBXclusive.com has been shut down by the UK's Serious Organised Crime Agency (Soca). http://www.bbc.co.uk/news/technology-17039722 RnBXclusive music file sharing site shut down [Press Association] The UK music filesharing site RnBXclusive has been shut down and a man has been arrested amid signs that organised crime officers are cracking down on illegal downloading in Britain. http://www.guardian.co.uk/technology/2012/feb/15/rnbxclusive-file-sharing-shut-down ********************** MOBILE/WIRELESS ********************** Mobile Apps Take Data Without Permission The address book in your smartphone ? some of the most personal data you carry ? is free for app developers to take at will without your knowledge. http://bits.blogs.nytimes.com/2012/02/15/google-and-mobile-apps-take-data-books-without-permission/ Apple: App Access to Contact Data Will Require Explicit User Permission After a week of silence, Apple has finally responded to reports that dozens of iOS applications have been accessing, transmitting and storing user contact data without explicit permission. Path was the first to be flagged for this, and others, including Twitter, Yelp and Foursquare, have since tidied up the way they ask for address book data. Apple has faced growing criticism that it has given iOS developers far too much access to address book information without requiring a user prompt. http://allthingsd.com/20120215/apple-app-access-to-contact-data-will-require-explicit-user-permission/ us: Bandwidth breakdown: Mobile rates could rise The demand for bandwidth - the infrastructure which allows people to make phone calls, surf the net and connect with each other - seems insatiable. And in the US and beyond, from the boardrooms of major phone companies, down to college campuses, research labs and internet coffee shops, some users worry there simply won?t be enough to go around in the near future. http://www.aljazeera.com/indepth/features/2012/02/201227174212570830.html Android smartphone conquest continues, but Apple bites back Google's Android mobile operating system dominated the fast-growing smartphone market in the fourth quarter of 2011, powering 50.9% of mobile devices shipped worldwide as it crushed Nokia's Symbian and BlackBerry maker Research in Motion. http://www.guardian.co.uk/technology/2012/feb/15/android-smartphones-apple-2011 Mobile data boom could spell end to 'all you can eat' A predicted massive rise in mobile data traffic could mean the end of unlimited 'all you can eat' data contracts for smartphones and tablets, according to an industry expert. http://www.zdnet.co.uk/news/networking/2012/02/14/mobile-data-boom-could-spell-end-to-all-you-can-eat-40095041/ Google Motorola bid approved in EU and US US regulators have approved Google's $12.5bn (?7.9bn) bid for phone maker Motorola Mobility, hours after it won clearance from European authorities. http://www.bbc.co.uk/news/technology-17021933 Google's Motorola subsidiary takeover could trigger patents battle with Apple The European Commission has given the go-ahead to Google's $12.5bn (?10.4bn) acquisition of Motorola Mobility (MMI), the US handset and set-top box maker ? a move that will open a new and potentially explosive chapter in the fight over smartphone patents. http://www.guardian.co.uk/technology/2012/feb/14/google-motorola-mobility-apple-patents Google Deal for Motorola Mobility Gets Clearance American and European antitrust regulators on Monday approved Google?s acquisition of the cellphone maker Motorola Mobility without formal conditions, paving the way for the search giant to compete directly with its new archrival, Apple. http://www.nytimes.com/2012/02/14/technology/europe-clears-google-acquisition-of-motorola.html Apple iPad China sales and shipments threat in name row A Chinese company is to ask customs officials to block shipments of Apple's iPad both into and out of the country. http://www.bbc.co.uk/news/technology-17026077 ********************** ONLINE CRIME & LEGAL ********************** us: Unsecured Wi-Fi may create legal liability A lawsuit filed in Massachusetts, United States, may have implications on end-users who leave their Wi-Fi networks unsecured. http://www.zdnetasia.com/blogs/unsecured-wi-fi-may-create-legal-liability-62303861.htm ********************** SECURITY ********************** Australia's cyber protection put to the test Australia's computer emergency response teams have taken part in an online exercise designed to test Asia Pacific region's cyber protection capabilities, in the wake of several recent internet-based attacks targeting Australian companies. http://www.smh.com.au/it-pro/security-it/australias-cyber-protection-put-to-the-test-20120215-1t5nl.html http://www.brisbanetimes.com.au/it-pro/security-it/australias-cyber-protection-put-to-the-test-20120215-1t5nl.html http://www.theage.com.au/it-pro/security-it/australias-cyber-protection-put-to-the-test-20120215-1t5nl.html Debilitating Cyber Attack: Not If, But When? by Leonard Grace We all know how easy it can be to ignore or underestimate the possibly, or even likelihood, of a terrorist attack; just remember what happened on 9-11. That seems to be just what the U.S. is doing when it comes to a possible Cyber-Attack, no not in other countries, but right here at home where targets like private sector companies, who provide vital economic and emergency services to our population using broadband infrastructure, and are woefully under-secured for such attacks. http://www.circleid.com/posts/20120214_debilitating_cyber_attack_not_if_but_when/ Cybercriminals Building Intricate, Multi-Use Malnets Cybercriminals have gotten so sophisticated that they build an intricate network infrastructure and use it repeatedly for the distribution of malware, according to a new study from the network security company Blue Coat Systems. http://www.networkcomputing.com/security/232600910 us: Senators launch new push for cybersecurity bill Leading senators introduced a cybersecurity bill on Tuesday aimed at safeguarding the nation's water and power systems, which experts have warned often only have the most rudimentary protections against hackers. http://uk.reuters.com/article/2012/02/14/us-cybersecurity-congress-idUKTRE81D1EC20120214 http://in.reuters.com/article/2012/02/14/cybersecurity-congress-idINDEE81D0HM20120214 Senators Introduce Security Bill and Warn of Hacker Threat Want swift action on a complicated, contentious piece of legislation aimed at guarding against hackers? Invoke Sept. 11. http://bits.blogs.nytimes.com/2012/02/14/senators-introduce-security-bill-and-warn-of-hacker-threat/ Senate cybersecurity bill leaves Internet alone, exempts tech companies from oversight The Senate Homeland Security Committee has introduced the broad cybersecurity legislation promised late last year by Senate majority leader Harry Reid (D-NV). But contrary to the fears of many?or perhaps because of them?the bill's scope is tightly restrained, excluding the vast majority of commercial systems and Internet infrastructure itself from coverage. http://arstechnica.com/tech-policy/news/2012/02/senate-cybersecurity-bill.ars Cybersecurity Bill in U.S. Senate Seeks Industry Rules to Thwart Hackers Companies running computer networks essential to U.S. economic and national security would be required to better defend their systems from spies, hackers and terrorists under bipartisan Senate legislation unveiled today. http://www.bloomberg.com/news/2012-02-14/cybersecurity-bill-in-u-s-senate-seeks-industry-rules-to-thwart-hackers.html The Post's View: A cyber risk to the U.S. In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger of terrorism ?in the foreseeable future.? What makes that assessment particularly alarming is that the United States may be as unprepared to defend some of its critical computer systems as it was to protect New York and Washington against al-Qaeda before Sept. 11, 2001. http://www.washingtonpost.com/opinions/a-cyber-risk-to-the-us/2012/02/07/gIQA4q7M9Q_story.html Report concludes number of security vulnerabilities is falling Secunia's security report for 2011 concludes that the absolute number of security vulnerabilities being discovered is falling. This is true in comparison both with the previous year and over a five-year period. This should not, however, be taken as a signal by users to let their guard down. http://www.h-online.com/security/news/item/Report-concludes-number-of-security-vulnerabilities-is-falling-1434096.html Flaw Found in an Online Encryption Method A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online shopping, banking, e-mail and other Internet services intended to remain private and secure. http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html ********************** PRIVACY ********************** nz: Microsoft's man who monitors privacy Keeping things private in an online world can be a bit a challenge, but it's one that former Paeroa man Brendon Lynch is rising to at Microsoft's international headquarters in Redmond, California. ... He praised the likes of NetSafe.org.nz, an independent, non-profit organisation that promotes safe use of the internet, for publishing guidelines online. http://www.stuff.co.nz/waikato-times/technology/6428139/Microsofts-man-who-monitors-privacy nz: Google privacy changes not all bad: Privacy Commissioner Privacy Commissioner Marie Shroff sees both positive and negative aspects to the major changes in Google?s privacy policy due to take effect on March 1. http://computerworld.co.nz/news.nsf/news/google-privacy-changes-not-all-bad-privacy-commissioner Start-Ups Seek to Help Users Put a Price on Their Personal Data Facebook?s pending initial public offering gives credence to the argument that personal data is the oil of the digital age. The company was built on a formula common to the technology industry: offer people a service, collect information about them as they use that service and use that information to sell advertising. http://www.nytimes.com/2012/02/13/technology/start-ups-aim-to-help-users-put-a-price-on-their-personal-data.html The Global Impact of the E.U.'s New Rules on Data Privacy When Facebook began readying its IPO at the beginning of this month, the social network?s S-1 regulatory filing to the Securities and Exchange Commission ticked off a list of potential risk factors?among them, global data privacy regulations that could impact the business. http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202542035639 South Korea probes Google's privacy policy changes South Korea's communications regulator said it is reviewing Google's upcoming privacy policy changes, and hinted it will take action if these are found to violate local laws. http://www.zdnetasia.com/s-korea-probes-googles-privacy-policy-changes-62303830.htm ********************** CENSORSHIP ********************** India minister Sibal says no censorship of social media India will not censor social media websites, Information Technology Minister Kapil Sibal has said. But he added that internet firms must obey the country's laws. http://www.bbc.co.uk/news/world-asia-india-17024957 India will never censor social media - Sibal No Indian government will ever censor social media, Information Technology Minister Kapil Sibal said, seeking to calm fears of a China-style crackdown on companies like Google and Facebook. http://in.reuters.com/article/2012/02/14/sibal-no-censorship-on-social-media-idINDEE81D04G20120214 Internet in Iran severely disrupted as elections loom Millions of Iranians have suffered serious disruption recently in accessing email and Internet social networking sites, raising concerns authorities are stepping up censorship of opposition supporters ahead of parliamentary elections next month. http://uk.reuters.com/article/2012/02/14/oukin-uk-iran-internet-idUKTRE81D07020120214 http://in.reuters.com/article/2012/02/14/iran-internet-idINDEE81D02Q20120214 Malaysia deports Saudi journalist accused of insulting prophet Malaysia has deported a Saudi journalist accused of insulting the prophet Muhammad on Twitter, despite claims by rights groups that he could face the death penalty in Saudi Arabia. http://www.guardian.co.uk/world/2012/feb/12/malaysia-deports-saudi-journalist-prophet Saudi Writer Is Deported Over Posts on Prophet A Saudi journalist was deported Sunday to his home country, where he was expected to face arrest and possibly death for writing about the Prophet Muhammad. http://www.nytimes.com/2012/02/13/world/asia/saudi-writer-is-deported-over-twitter-posts-on-prophet-muhammad.html ************************** GOVERNMENT & PUBLIC POLICY ************************** au: Internet giants oppose new regulator Internet giants and Australian telecommunications providers have opposed the Australian Government's proposal to instate a digital economy regulator, stating that increased regulation is unnecessary and possibly harmful. http://www.zdnet.com.au/internet-giants-oppose-new-regulator-339331739.htm au: Google urges rejection of net censor Google has urged the federal government to dump an interim independent report recommending cyberspace be regulated in a similar manner to television. http://www.theage.com.au/opinion/political-news/google-urges-rejection-of-net-censor-20120215-1t6q5.html Cisco to challenge Microsoft Skype deal at EU court Cisco has said it will challenge Microsoft's $8.5bn (?5.4bn) takeover of Skype at the EU's top court. The networking giant said conditions needed to be set to ensure Microsoft would not block other video services. http://www.bbc.co.uk/news/technology-17046095 Cisco concerned about Skype, Microsoft Lync integration Exclusive integration "could lock-in businesses who want to reach Skype's 700 million account holders," says Cisco, which has appealed the European Commission's OK of the merger. http://news.cnet.com/8301-1001_3-57378619-92/cisco-concerned-about-skype-microsoft-lync-integration/ Cisco appeals EU's approval of Microsoft/Skype deal Network equipment maker Cisco Systems Inc has appealed the European Commission's approval of Microsoft Corp's acquisition of Internet voice and video service Skype, saying the commission should have put tougher conditions on the deal. http://uk.reuters.com/article/2012/02/15/oukin-uk-cisco-idUKTRE81E1P420120215 ca: Online surveillance bill may breach privacy law, charter A new bill that would require telecommunications providers to give police subscriber information without a warrant will likely be challenged in the courts if crucial changes aren't made, critics say. http://www.cbc.ca/news/technology/story/2012/02/15/technology-surveillance-bill-privacy.html ca: Why a Lawful Access Compromise Can Be Found by Michael Geist The launch of Bill C-30, the online surveillance legislation dubbed the Protecting Children from Internet Predators Act, went about as expected with the government taken to task with big brother imagery ("Say Hello to Big Brother Government") and criticism over the lack of evidence ("Conservatives hew to common sense save for bizarre crime fixation"), the security threats ("Online surveillance bill will be ?a gold mine? for hackers: Ontario privacy commissioner"), and the absence of a thoughtful digital vision ("Canada?s embarrassing failure on lawful access legislation"). The divisive comments from Public Safety Minister Vic Toews seemed to shape much of the dialogue, serving to ratchet up the rhetoric and overshadow both the modest changes to the bill and the legitimate remaining concerns of many Canadians. http://www.michaelgeist.ca/content/view/6324/125/ Canada wants warrantless Internet spying, says critics support child porn Canada's conservative government has re-introduced an Internet surveillance bill that would allow the government to obtain information about Internet subscribers?without a warrant. The legislation would require service providers to provide law enforcement with IP addresses, e-mail addresses, phone numbers, and other information on demand. http://arstechnica.com/tech-policy/news/2012/02/canadian-government-proposes-warrantless-internet-spying-bill.ars Google contract idea results in debate over New Zealand public services The New Zealand government is controversially considering Internet giant Google and other multi-national corporations to contract out work currently done by the public sector, according to Radio New Zealand Tuesday. http://news.xinhuanet.com/english/sci/2012-02/14/c_131409755.htm ********************** MISCELLANEOUS ********************** Apple Asks Outside Group to Inspect Factories Responding to a growing outcry over conditions at its overseas factories, Apple said Monday that an outside organization had begun auditing working conditions at the plants where iPhones, iPads and other Apple products are manufactured, and the group would make its finding public. http://bits.blogs.nytimes.com/2012/02/13/apple-announces-independent-factory-inspections/ Critics Question Record of Monitor Selected by Apple Apple?s announcement on Monday that an outside monitoring group, the Fair Labor Association, has begun inspecting its suppliers? factories in China rekindled a debate over how effective the group has been in eliminating labor abuses. http://www.nytimes.com/2012/02/14/technology/critics-question-record-of-fair-labor-association-apples-monitor.html TUANZ fails to gain grant from InternetNZ An unsuccessful application from the Telecommunications Users? Association (TUANZ) to InternetNZ for a five-figure financial grant may have contributed to the resurrection of a periodic rumour that TUANZ is in serious financial trouble and considering winding up. http://computerworld.co.nz/news.nsf/news/tuanz-fails-to-gain-grant-from-internetnz ********************** TELECOMMUNICATIONS ********************** F.C.C. Bars the Use of Airwaves for a Broadband Plan A proposed wireless broadband network that would provide voice and Internet service using airwaves once reserved for satellite-telephone transmissions should be shelved because it interferes with GPS technology, the Federal Communications Commission said Tuesday. http://www.nytimes.com/2012/02/15/business/media/fcc-bars-airwave-use-for-broadband-plan.html +++++++++++++++++++++++++++++++ (c) David Goldstein 2012 --------- David Goldstein email: goldstein_david at yahoo.com.au web: http://davidgoldstein.tel/ http://goldsteinreport.com/ phone: +61 418 228 605 - mobile; +61 2 9665 5773 - office/home "Every time you use fossil fuels, you're adding to the problem. Every time you forgo fossil fuels, you're being part of the solution" - Dr Tim FlanneryReceived on Thu Feb 16 2012 - 01:41:07 UTC
This archive was generated by hypermail 2.3.0 : Sat Sep 09 2017 - 22:00:11 UTC