[DNS] domain name news - 10 June

[DNS] domain name news - 10 June

From: David Goldstein <david>
Date: Mon, 10 Jun 2013 12:52:35 +1000

The domain name news is supported by auDA


NGPC Adopts Resolution Accepting Nine Items of GAC Beijing Advice on New gTLDs

ICANN Announces Top-Level Executive Changes To Bolster Operational Effectiveness

The official (unrealistic) go-live date for new gTLDs is September 28

ICANN Accepts Some Government Advice On New TLDs

Six private new gTLD auctions raise $9m

au: Realestate.com.au vs Realestate1.com.au Judgement Is In

Statement of the Director-General on linguistic diversity on the Internet
As the United Nations agency for education, the sciences, culture, communication and information, UNESCO has long and actively promoted cultural and linguistic diversity as foundations for sustainable development and lasting peace.

NGPC Adopts Resolution Accepting Nine Items of GAC Beijing Advice on New gTLDs
The ICANN Board New gTLD Program Committee (NGPC) met on 4 June 2013 and adopted a resolution accepting nine items of the GAC's Beijing advice with respect to New gTLD applications. The Resolution addresses most though not all of the GAC's non-Safeguard Advice and does not address any of the Safeguard Advice in Annex 1 of the GAC Beijing Communiqu?. As such, this Resolution represents only the first of what will be a series of NGPC decisions addressing the GAC's Beijing advice.

Next Set of Initial Evaluation Results Released
Total Number of Passing Applications Now 628. View Them Here.

Stephen D. Crocker to Heather Dryden
Protections for Intergovernmental Organizations

NGPC Adopts Resolution Accepting Nine Items of GAC Beijing Advice on New gTLDs
The ICANN Board New gTLD Program Committee (NGPC) met on 4 June 2013 and adopted a resolution accepting nine items of the GAC's Beijing advice with respect to New gTLD applications. The Resolution addresses most though not all of the GAC's non-Safeguard Advice and does not address any of the Safeguard Advice in Annex 1 of the GAC Beijing Communiqu?. As such, this Resolution represents only the first of what will be a series of NGPC decisions addressing the GAC's Beijing advice.

Call for Subject Matter Experts for the IDN Root Zone LGR Integration Panel and Advisors to All Panels
Today, ICANN's IDN Variant TLD Program moves forward with initiating the implementation of the IDN Root Zone LGR Procedure by publishing the Call for Subject Matter Experts for the IDN Root Zone LGR Integration Panel and Call for Advisors to the IDN Root Zone LGR Panels.

Webinar: TMCH & IDNs
You are invited to a webinar intended to address questions and provide a background around Internationalized Domain Names and the Trademark Clearinghouse processes, including the comments in Beijing about implementation of variant rules. As we have prioritized the applications so that the first new gTLDs will be IDNs, this is an opportunity to learn more about the TMCH and IDNs and provide more background to those interested on how things are working.

New Organizational Changes by Fadi Chehad?
It is with great pleasure that I share with you some exciting new organizational changes that will be taking place at the start of the new fiscal year on July 1, and which are part of my desire to increase ICANN?s focus on management at all levels.

ICANN Announces Top-Level Executive Changes To Bolster Operational Effectiveness
ICANN yesterday announced a number of changes that the organisation says will bolster its operational effectiveness. The most prominent of these changes is the move of Akram Atallah, currently Chief Operating Officer (COO), who will become division President of the Generic Domains Division, a newly created branch that will focus on generic domain operations, domain name industry engagement and web services for the community.

ICANN hires new COO, moves Atallah
ICANN has moved chief operating officer Akram Atallah to a new role and hired a replacement from outside the organization.

Fadi Chehade: The internet has become the most powerful tool for freedom
The internet's global big daddy, ICANN, oversees the allocation of domain names and IP addresses. Its new CEO, Fadi Chehade, spoke with Robin David at the Stockholm Internet Forum about ICANN changing the online world by introducing 1,000 new TLDs, becoming less American and more global ? and how, as controversy rages over Barack Obama's administration allegedly surveying people online, the internet is the most powerful route to civil liberties:

Atallah shunted sideways in ICANN exec rejig
ICANN has a new COO, after incumbent Akram Atallah was moved into a new role as president of a new Generic Domains Division.

How the Registrar Accreditation Agreement Affects Domainers - On April 22, 2012 ICANN released the final proposal for the new Registrar Accreditation Agreement (RAA) for gTLDs
ICANN has released the RAA to the public for comment until June 4, 2013.Although the RAA is specifically for registrars, there are also some updates relating to domain registrants, mostly in the realm of data accuracy and retention.

ICA Tells ICANN The Draft Of RAA Agreement Is ?Deficient in Scope?
The Internet Commerce Association submitted comments to ICANN website, on the current draft statement of Registrants? Rights and Responsibilities (RRR) calling it ?deficient in scope?.

 - ccTLD & gTLD NEWS
Why you should get a .BIZ domain name
There are two obvious reasons for getting a .BIZ domain name. .BIZ brands your website as business-focused (duh) and name.com has .BIZ domain names for the super duper way low extremely awesome price of $4.99 (less than half the cost of a .COM).

.IO Domains Offline?
As reported on twitter and Hacker News, .IO domains have stopped resolving and apparently new registrations are not going through either.

Translation of "JP Domain Name Registry Report 2012" Posted
JPRS posted English translation of "JP Domain Name Registry Report 2012." This is the annual report for 2012, briefing that year's activities performed by JPRS, in relation to its management and administration of .JP TLD.

mx: The modification of Akky?s Service Policies came into effect Jun 08, 2013
Akky (a divison of NIC Mexico) informs that the modification of Akky Domain Name Policies and the Online Presence Service Policies came into effect on Jun 08, 2013 as it was announced on May 24, 2013.

The official (unrealistic) go-live date for new gTLDs is September 28
September 28 could be (won?t be) the launch date of the first new gTLD sunrise period, according to a (unrealistic) timetable released by ICANN yesterday.

ICANN Accepts Some Government Advice On New TLDs
ICANN this week accepted another set of advice from its Government Advisory Committee with regard to new TLD applications.

GNSO wins minor victory in Trademark+50 dispute
The ICANN board has rescheduled an important decision for trademark owners, apparently at the behest of members of the Generic Names Supporting Organization Council.

Plural gTLDs could be a casualty as ICANN accepts big chunk of GAC advice
ICANN has accepted nine pieces of Governmental Advisory Committee advice pertaining to new gTLDs, essentially killing off two applications and putting question marks over many more.

Exclusive results of the Trademark Clearinghouse
NetNames have been given exclusive access to the latest market research to be publish on awareness of the new gTLD program. Deliotte, the operator of the Trademark Clearinghouse (TMCH), commissioned Vanson Bourne, a global market research company for technology brands, to conduct an independent survey of 200 consumer facing businesses with 3,000 ? 10,000+ employees to gain insights into general awareness of the new gTLD program, and actions taken up by those businesses to operate in the new gTLD space.

Public education on new gTLDs is key to the future of internet success
Ofcom, the organization that acts as the UK?s telecoms regulator recently announced that it is going to make some changes to non-geographic telephone numbers to simplify the current situation that often confuses the general public. The announcement listed what the current issues were and identified solutions.

Six private new gTLD auctions raise $9m
The new gTLD contention sets for .club, .college, .luxury, .photography, .red, and .vote have been settled in a series of auctions this week that raised over $9 million.

Private auction settles .club fight
.CLUB Domains has won the right to launch the .club gTLD at a private auction against two other applicants, according to an announcement from the company.

1,400 new address suffixes on the way
Government agencies and business groups across Thailand should be aware of new policies governing internet domain names if they wish to protect the country's interests, says the non-profit group responsible...

3 Advantages to Using a New gTLD
While no one can be certain how the internet, or its users, will react to the launch and development of the new gTLDs, we can be sure that the new extensions offer a plethora of new possibilities worth exploring. Whether you?ve applied for an extension yourself, or hope to take advantage of an open gTLD after launch, you?ll want to leverage one of the many benefits that come with your new gTLD.

Watch .club win its new gTLD for $[censored]
As we reported earlier in the week, .CLUB Domains was one of the first companies to win its new gTLD auction and now the company has published a short video of the moment the auction closed.

Big week for new gTLDs as 114 apps pass
ICANN has just released this week?s Initial Evaluation results and it?s the biggest dump to date, with 114 applications getting through to the next stage of the process.

The scores on the TMCH doors: level of trademark owner engagement revealed
Deloitte has revealed the number of trademark owners and agents currently registered with the Trademark Clearinghouse. The news comes in the week that ICANN published the first responses to the recent GAC advice on the gTLD programme and L'Or?al became the latest company to withdraw a ?.brand? application. Read blog

6 new TLD auctions bring in average of $1.5 million each
The first six private TLD auctions held by Innovative Auctions have closed, bringing in a total of $9.01 million in winning bids.

L?Oreal?s dot-brand bites the dust
Beauty products maker L?Oreal has withdrawn its new gTLD application for .loreal.

The ICANN Showdown: Private Auctions, ICANN Auctions, and Sword Fights (Hopefully)
Although we've repeatedly suggested sword fights, pistol duels, pick a card, and freeze tag as possible resolution methods for deciding which new TLD applicant should win a contention set, ICANN?s decided to stay with auctions. 

Engineering Russia?s Cyrillic revolution by St?phane Van Gelder
Russian domain entrepreneur Sergey Sharikov has ambitions to spread the use of his language?s alphabet on the Internet far beyond its current state.

Donuts withdraws its .vote bid, raising questions about new gTLD auctions
One down, only 306 to go! Donuts has withdrawn its application for the .vote new gTLD, leaving an Afilias joint venture as the sole remaining applicant, it emerged today.

First Private Auction Used To Determine Right To .CLUB gTLD Application
The contentious private auctions for the rights to new gTLDs has got underway with the first auction being used to determine the rights to operate .club.

ICANN Board rules on non-safeguard GAC advice
The ICANN Board New gTLD Program Committee (NGPC) has approved a resolution ruling on a number of items of advice from the Governmental Advisory Committee with regards to new TLDs.

Heads up, .GMBH applicants: this trademark application is slipping through the cracks
I?ve written numerous times about companies trying to trademark TLD strings with the U.S. Patent and Trademark Office. Although the USPTO won?t grant trademarks on TLDs, some applicants have been able to sneak their applications through at least part of the process.

dotJoburg domain moves ahead
The institution for local domain names continues to gain momentum, as the initial evaluation stage of ICANN?s new gTLDs project has been completed.

dotJoburg domain names available soon
.joburg (dotJoburg) domain names will soon be a reality, offering an opportunity to create more awareness of Johannesburg-based businesses and organisations and locations, venues, tourism products and services, from a destination marketing perspective.

Big New gTLD Brand Withdraws As L?Or?al Drops Application For .LOREAL
L?Or?al which is one of the largest brand applicants for new gTLD?s just withdrew its application for the its matching new gTLD brand .LOREAL

SWITCH report sees increase in malware infections in Q1
The number of Swiss websites infected by malware rose by 25 percent in Q1 2013, according to the PandaLabs Quarterly Report for SWITCH.

More malware on Swiss websites: SWITCH reports further increase
In 2012, more than 2,800 websites with addresses ending in .ch or .li were cleaned of "drive-by" code. SWITCH warns that malware represents the biggest threat to Internet users in 2013. The negative trend is continuing, with 25% more websites infected by malware in the first quarter of 2013.

ISC Patches Known BIND 9 DoS Vulnerability
DNS servers running BIND 9 should upgrade the latest version of the software after an Internet Systems Consortium advisory warned a remotely exploitable vulnerability had been publicly disclosed.

BIND security update closes DoS vulnerability
The BIND developers have released BIND versions 9.6-ESV-R9-P1, 9.8.5-P1 and 9.9.3-P1 to fix a vulnerability that can be exploited by attackers to crash the open source DNS server and cause a denial of service (DoS). The affected BIND versions are 9.6-ESV-R9, 9.8.5 and 9.9.3.

ISC patches publicly disclosed BIND 9 denial-of-service flaw [IDG]
The Internet Systems Consortium (ISC), the organization that develops and maintains the widely used BIND DNS (Domain Name System) software, has patched a publicly disclosed vulnerability that can be used to remotely crash DNS servers running recent releases of BIND 9.

BIND 9 Users Should Upgrade to Most Recent Version to Avoid Remote Exploit by Evan Daniels
A remote exploit in the BIND 9 DNS software could allow hackers to trigger excessive memory use, significantly impacting the performance of DNS and other services running on the same server. A flaw was recently discovered in the regular expression implementation used by the libdns library, which is part of the BIND package. The flaw enables a remote user to cause the 'named' process to consume excessive amounts of memory, eventually crashing the process and tying up server resources to the point at which the server becomes unresponsive.

Three DNS Hosting Providers Report Possibly Linked DDoS Attacks
Three separate domain name management and DNS hosting providers have reported DDoS attacks over the past few days, and according to several reports, it is possible that the attacks are related.

How we can get out of the DNS DDoS trap
A new class of enormous DDoS attacks emerged March 26 with a DNS reflection attack by email spammer CyberBunker against anti-spam service Spamhaus. The reported traffic peak of 300Gbps was double the previous record.

Microsoft, FBI take aim at global cyber crime ring
Europol said a global effort led by Microsoft Corp to stop one of the world's biggest cybercrime rings has succeeded in wiping out the malicious computer networks that the gang used, known as the Citadel Botnets.

Microsoft, Authorities Disrupt Hundreds of Citadel Botnets with ?Operation b54?
Calling it the company?s ?most aggressive? botnet operation operation to date, Microsoft has joined with the FBI for a massive disruption of the Citadel botnet.

1,462 botnets shut down by Microsoft, FBI and financial sector
In a campaign code-named Operation b54 and authorised by a court in North Carolina, Microsoft worked with the FBI, financial services companies and other partners in order to take action against 1,462 botnets spreading the malware known as Citadel. About five million computers have been infected, with losses caused by the botnets amounting to about half a billion US dollars.

FBI and Microsoft take down criminal botnet
A vast criminal network of hijacked computers responsible for more than $500m in bank fraud has been taken offline by an assault involving Microsoft and the US Federal Bureau of Investigation.

FBI and Microsoft take down $500m-theft botnet Citadel
The FBI and Microsoft have broken up a huge network of hijacked home computers responsible for stealing more than $500m (?323m) from bank accounts.

European cyber cop declares Microsoft's Citadel bust a success
Europol said a global effort led by Microsoft Corp to stop one of the world's biggest cybercrime rings has succeeded in wiping out the malicious computer networks that the gang used, known as the Citadel Botnets.

EU countries must be able to sentence hackers to two years, draft law says [IDG]
Hackers would face up to two years or more in prison no matter where they live in the European Union under a new draft law approved by the European Parliament?s civil liberties committee on Thursday.

Cybercrime: Admit nothing and deny everything - Barack Obama says he is ready to talk with Xi Jinping about Chinese cyber-attacks. That makes one of them
Xi Jinping?s first meeting with President Obama as head of state on June 7th is also the first such summit to feature prominently the issue of alleged Chinese cyber-attacks on American companies and interests. It has taken a long time for the issue to take centre stage in diplomatic relations between the two countries. After years of ineffectual and perhaps overly discreet grumbling about Chinese hacking, American officials are finally forcing the issue.

Obama and Xi Tackle Cybersecurity as Talks Begin in California
President Obama, midway through much-anticipated weekend talks with President Xi Jinping of China, said Friday night that there was no parallel between the cyberattacks on American businesses and government interests that it blames on China and the United States government?s surveillance of phone and Internet traffic to foil terrorists.

Obama warns Xi that continued cybertheft would damage relations, U.S. officials said
President Obama confronted Chinese President Xi Jinping here Saturday with specific evidence of China?s widespread theft of intellectual property from U.S. companies and warned the newly minted Chinese leader that continued ?cybertheft would undermine economic ties between the rival nations, U.S. officials said.

U.S. and China Move Closer on North Korea, but Not on Cyberespionage
Even as they pledged to build ?a new model? of relations, President Obama and President Xi Jinping of China ended two days of informal meetings here on Saturday moving closer on pressuring a nuclear North Korea and addressing climate change, but remaining sharply divided over cyberespionage and other issues that have divided the countries for years.

Cyber disputes loom large as Obama meets Xi
President Barack Obama will complain to Chinese President Xi Jinping at a summit on Friday about suspected Chinese cyber hacking of U.S. secrets, even as the White House faces growing questions at home over American government surveillance.

U.S. Helps Allies Trying to Battle Iranian Hackers
The Obama administration has begun helping Middle Eastern allies build up their defenses against Iran?s growing arsenal of cyberweapons, and will be doing the same in Asia to contain computer-network attacks from North Korea, according to senior American officials.

au: Realestate.com.au vs Realestate1.com.au Judgement Is In
The judgement in the Federal Court of Australia matter for REA Group Ltd v Real Estate 1 Ltd has just been handed down. Forget the parent companies, as this is about a battle of the websites realestate.com.au and realestate1.com.au and to a lesser extent realcommercial.com.au and realcommercial1.com.au.

au: Compagnie G?n?rale des Etablissements Michelin v. Thomas Panagiotopoulos - Case No. DAU2013-0011
1. The Parties: The Complainant is Compagnie G?n?rale des Etablissements Michelin of Clermont-Ferrand (or ?Michelin?), France, represented by Dreyfus & associ?s. The Respondent is Thomas Panagiotopoulos of Abbotsford, Victoria, Australia. 2. The Domain Name and Registrar: The disputed domain name <michelinstar.com.au> is registered with Crazy Domains Pty Ltd. (the ?Registrar?)

 - IPv4/IPv6
IPv6 Could be Dominant Protocol in Six Years
The still-young Internet protocol platform known as ?IPv6? has made major progress since just on year ago when IPv6 Launch Day was held.

?No need? and the debate over IP address conservation by Milton Mueller
At the RIPE 66 meeting in Dublin, the bold, long-overdue proposal to eliminate needs assessments for IPv4 number allocations got an interesting response. RIPE-NCC is the Regional Internet Registry for Europe, and almost everyone in Europe supported the proposal. Vocal opposition came from two policy tourists from North America: ARIN Board member Bill Woodcock and ARIN Advisory Council member Chris Grundemann.

At our current rate of progress, IPv6 will be fully implemented on May 10, 2048
IPv6 is more efficient, more secure, and more mobile-friendly than IPv4. And in an exploding ecosystem of Internet-capable smart devices which IPv4?s 4.3 billion addresses already can?t cover, IPv6 has enough IP addresses for every single atom on the surface of the Earth ? plus another 100 or so Earth-like planets.

IPv6 in 2013: Where Are We Now?
IPv6 Launch Day aimed to accelerate global IPv6 adoption by encouraging sites around the world to turn IPv6 on and leave it on. The Launch Day event was the Internet Society's second yearly event for IPv6, following IPv6 Day in 2011. 2013 sees no IPv6 Day event, but that doesn't mean the job of moving the world to IPv6 is done.

Message From the NRO Regarding the First Anniversary of the World IPv6 Launch
The Number Resource Organization (NRO), representing all five of the Regional Internet Registries (RIRs), joins the Internet Society (ISOC) in celebrating the first anniversary of World IPv6 Launch. The NRO continues to directly support the efforts of the Internet community at all levels to facilitate global adoption of IPv6.

One Year Later: Who's Doing What With IPv6? by Mirjam Kuehne
One year on from the World IPv6 Launch in June 2012, we wanted to see how much progress has been made towards the goal of global IPv6 deployment. Both APNIC and Google are carrying out measurements at the end user level, which show that around 1.29% (APNIC) and 1.48% (Google) of end users are capable of accessing the IPv6 Internet. Measurements taken from this time last year show 0.49% (APNIC) and 0.72% (Google), which means the amount of IPv6-enabled end users has more than doubled in the past 12 months.

IPv6: Less Talk and More Walk by Bruce Sinclair
The sixth month of the year is both symbolic and historic for IPv6 and a good time to take stock and see how we've progressed. But instead of looking at the usual suspects of number of networks, number of users, number of websites, etc... on IPv6, let's look at some new trends to see what's happening. At gogo6 we've been measuring the "Buzz" of the IPv6 market every week over the last two and a half years.

Netcraft June 2013 Web Server Survey
In the June 2013 survey we received responses from 672,985,183 sites, 148k more than last month.

Netcraft Most Reliable Hosting Company Sites in May 2013
Qube Managed Services had the most reliable hosting company site in May, with only 2 failed requests. Qube specialises in providing managed hosting from three data centres in London, New York and Zurich.

.CO Registry Lists Portfolio of Two-Character Premium Domain Names for Sale on the GoDaddy Platform
Effective immediately, the .CO Registry is listing its portfolio of two-character premium .CO domain names for sale with GoDaddy. The two-character .CO domain names are now available through GoDaddy?s Aftermarket, and soon-to-be via the domain availability check on the front of the website, making these premium digital assets widely available to GoDaddy?s customer base of SMBs and global businesses.

ccTLDs Pile Up 9 Entries on This Week's Sales Chart But There Were No Six-Figure Sales for First Time in Two Months
After seven straight weeks led by one or more six-figure sales, the domain aftermarket took a breather this week with the highest reported sale topping out at $32,500. That was GlobalOffice.com, a name that put Afternic at #1 on our latest weekly all extension Top 20 Sales Chart.

us: New NTIA Report Explores How and Why People Connect to the Internet [news release]
In a new report released today, Exploring the Digital Nation: America?s Emerging Online Experience, NTIA examines how Americans connect to the Internet and what Americans do once they get online. The report, co-authored with the Economics and Statistics Administration, confirms the dramatic growth in the number of Americans who are going online to perform important tasks like applying for jobs, looking up health information, and learning about current events.

The Distasteful Side of Social Media Puts Advertisers on Their Guard
As social media sites pursue advertising in a bid for new revenue, they are finding that they must simultaneously create a safe space for the advertisers they attract.

Global Digital Citizenship: Encouraging Safe and Responsible Use Online - Melbourne - June 24, 2013
The Family Online Safety Institute is partnering with Telstra to present an international forum titled 'Global Digital Citizenship: Encouraging Safe and Responsible Online Use'. This free event will bring together members of industry, academics, government officials, and the non-profit sector to openly discuss the challenges and opportunities that arise in cyber safety - both in Australia and around the world.

au: SafeGov survey finds parents want to ban online data tracking in schools
A national survey has revealed parents overwhelming object to their children's data being tracked by private companies.

au: Spying via classroom internet services worries parents
Parents are concerned that internet services which provide email platforms and educational apps in schools may also be spying on their children for commercial purposes.

As smartphone market matures, makers race to wow consumers
... The handheld devices, which just a few years ago were seen as technological status symbols, are now for the first time in the hands of a majority of Americans, according to a study released Wednesday by the Pew Internet & American Life Project. They?ve become commonplace, meaning for every technophile sideloading apps onto an unlocked smartphone, there?s probably a middle-aged office worker peering over a pair of bifocals at a touchscreen.

Apple accused of securing preferential terms for iPhone with mobile operators
Apple used its influence to secure preferential treatment from mobile operators wanting to offer the iPhone, squeezing out competition from rival brands, according to a former senior executive at a major European operator.

Internet Society Funds 11 Community-Based Projects that Enhance Internet Environments in Underserved Regions [news release]
The Internet Society today announced funding for 11 community-based Internet projects that will enhance the Internet ecosystem in underserved communities around the world. The Community Grants are awarded twice each year to Internet Society Chapters and Members. Recipients receive up to US$10,000 to implement their projects.

U.S. lawmakers to introduce new bill to punish cyber theft
A day before Chinese President Xi Jinping visits the United States, three U.S. lawmakers plan to propose a new law that would punish hackers backed by China, Russia or other foreign governments for cyber spying and theft.

The A-list conspiracy: Did Hollywood tell Obama to take down internet entrepreneur Kim Dotcom?
Featuring helicopters and scores of armed police, the dramatic, night-time raid on the remote luxury mansion of a larger-than-life comic book villain in January last year had all the trappings of a Hollywood blockbuster.

Patent reform: Obama goes troll-hunting - The president proposes a new round of intellectual-property reform
The solitary, lumbering trolls of Scandinavian mythology would sometimes be turned to stone by exposure to sunlight. Barack Obama is hoping that several measures announced on June 4th will have a similarly paralysing effect on their modern incarnation, the patent troll.

The White House Takes Aim at Patent Trolls
Frustration with patent trolls, and momentum for reform, has been building for some time now. Today, the stakes got even higher when the White House announced that it was actively taking on the troll problem. This is big news, and not just because of the seven legislative proposals the White House recommends (more on those below). Even more important are the five executive actions the President intends to take with or without congressional help.

us: Google allows ads for illegal drugs, state AG says
Google still is allowing ads for illegal online pharmacies that sell dangerous or counterfeit drugs without a prescription, Mississippi state Attorney General Jim Hood charged Thursday.

Cyber Criminals Using Photo-Sharing Programs to Compromise Computers [news release]
The FBI has seen an increase in cyber criminals who use online photo-sharing programs to perpetrate scams and harm victims? computers. These criminals advertise vehicles online but will not provide pictures in the advertisement. They will send photos on request. Sometimes the photo is a single file sent as an e-mail attachment, and sometimes the victim receives a link to an online photo gallery.

IC3 2012 Internet Crime Report Released: More Than 280,000 Complaints of Online Criminal Activity Reported in 2012 [news release]
Today the Internet Crime Complaint Center (IC3) released the 2012 Internet Crime Report?a summary of reported fraudulent activity, including data and statistics. In 2012, the IC3 received and processed 289,874 complaints, averaging more than 24,000 complaints per month. Unverified losses reported to IC3 rose 8.3 percent over the previous year.

Ponemon and Symantec Find Most Data Breaches Caused by Human and System Errors - Malicious and Criminal Attacks are the Most Costly Worldwide [news release]
Symantec Corp. and the Ponemon Institute today released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136? per record . Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent higher than other industries.

Pirate Bay founder Warg accused of Denmark hack
Pirate Bay co-founder Gottfrid Svartholm Warg is suspected of being involved in one of Denmark's biggest hack attacks.

Europe Continues Wrestling With Online Privacy Rules
More than a year ago, the European Union?s top justice official proposed a tough set of measures for protecting the privacy of personal data online.

Data-Driven Tech Industry Is Shaken by Online Privacy Fears
The dreamers, brains and cranks who built the Internet hoped it would be a tool of liberation and knowledge. Last week, an altogether bleaker vision emerged with new revelations of how the United States government is using it as a monitoring and tracking device.

NSA taps in to internet giants' systems to mine user data, secret files reveal
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

Anger swells after NSA phone records court order revelations
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.

UK gathering secret intelligence via covert NSA operation
The UK's electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world's biggest internet companies through a covertly run operation set up by America's top spy agency, documents obtained by the Guardian reveal.

Tech Companies Concede to Surveillance Program
When government officials came to Silicon Valley to demand easier ways for the world?s largest Internet companies to turn over user data as part of a secret surveillance program, the companies bristled. In the end, though, many cooperated at least a bit.

Edward Snowden: the whistleblower behind the NSA surveillance revelations
The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

Edward Snowden comes forward as source of NSA leaks
A 29-year-old who says he is a former undercover CIA employee said Sunday that he was the principal source of recent disclosures about ?top-secret National Security Agency programs, exposing himself to possible prosecution in an acknowledgment that had little if any precedent in the long history of U.S. intelligence leaks.

NSA contractor Edward Snowden braces for backlash after turning whistleblower on US data-mining operation
The man behind the largest leak of classified information in the history of the US National Security Agency (NSA) has chosen to make his identity public, despite the potential consequences for himself and his loved ones. Edward Snowden, a 29-year-old employee of defence contractor Booz Allen Hamilton and former CIA technical assistant, said he had never intended to remain anonymous. ?I have no intention of hiding who I am because I know I have done nothing wrong,? he said.

Former C.I.A. Worker Says He Leaked U.S. Surveillance Data
A 29-year-old former technical assistant for the Central Intelligence Agency was the source for a series of recent disclosures about the government?s collection of huge amounts of private Internet and telephone data, the British newspaper The Guardian revealed on Sunday.

The National Security Agency: surveillance giant with eyes on America
The very existence of National Security Agency (NSA) was not revealed for more than two decades after its establishment in 1952, and even now its structure and activities remain largely unknown. Hence its wry nickname: No Such Agency.

Feinstein ?Open? to Hearings on Surveillance Programs
Senator Dianne Feinstein, the chairwoman of the Senate intelligence committee and a defender of the phone and Internet surveillance programs that have come into public view in recent days, said on Sunday that she would consider holding hearings about them.

Obama Defends Surveillance: In Rare Acknowledgment of Antiterror Tactics, President Cites 'Modest Encroachments' in Name of Security
President Barack Obama, in a rare public acknowledgment of secret efforts to combat terrorism, on Friday defended a pair of highly classified surveillance programs as necessary to protect Americans at the price of only "modest encroachments" on personal privacy.

Obama Calls Surveillance Programs Legal and Limited
President Obama offered a robust defense of newly revealed surveillance programs on Friday as more classified secrets spilled into public, complicating a summit meeting with China?s new president focused partly on human rights and cybersecurity.

Government surveillance programs renew debate about oversight
The disclosure of vast government surveillance programs has renewed the debate about whether the kind of transparent oversight that Americans expect from their government can work if it might compromise efforts to keep them safe from terrorism.

U.S. Official Releases Details of Prism Program
A top U.S. intelligence official on Saturday declassified some details about the purpose and operations of an effort that obtains information from U.S. Internet companies as part of foreign-surveillance efforts.

How the U.S. Uses Technology to Mine More Data More Quickly
When American analysts hunting terrorists sought new ways to comb through the troves of phone records, e-mails and other data piling up as digital communications exploded over the past decade, they turned to Silicon Valley computer experts who had developed complex equations to thwart Russian mobsters intent on credit card fraud.

U.S., company officials: Internet surveillance does not indiscriminately mine data
The director of national intelligence on Saturday stepped up his public defense of a top-secret government data surveillance program as technology companies began privately explaining the mechanics of its use.

Ministers to reveal British link to US data spying scandal
Ministers will respond in parliament on Monday to claims that UK intelligence agencies have gained access to a vast reservoir of private data relating to people living in Britain ? including emails and phone logs ? collected by spies at the US National Security Agency.

Should Google serve the state ? or serve its customers?
For four days in January, Eric Schmidt, Google's executive chairman, lectured to packed houses at the University of Cambridge on the theme of "Connectivity and the Diffusion of Power". His visit, as Humanitas visiting professor in media, provided a fascinating opportunity to observe a major corporate leader discussing ideas, rather than talking purely about matters of business.

Obama undergoes a philosophical shift on counterterrorism surveillance
As a junior senator with presidential aspirations, Barack Obama built his persona in large part around opposition to Bush administration counterterrorism policies, and he sponsored a bill in 2005 that would have sharply limited the government?s ability to spy on U.S. citizens.

Obama defends sweeping surveillance efforts
President Obama on Friday defended the government?s collection of data on the phone records of millions of Americans, saying that it was a modest encroachment on privacy and one he thinks is both lawful and justified in order to identify terrorists plotting to attack the United States.

U.S. Internet Spying Draws Anger, and Envy
Europe?s reaction Friday to news of a sweeping international digital surveillance program by the U.S. government ranged from the outrage of citizens and politicians to the muted envy of some law enforcement agencies on this side of the Atlantic.

Tech Companies Concede to Surveillance Program
When government officials came to Silicon Valley to demand easier ways for the world?s largest Internet companies to turn over user data as part of a secret surveillance program, the companies bristled. In the end, though, many cooperated at least a bit.

Administration Says Mining of Data Is Crucial to Fight Terror
In early September 2009, an e-mail passed through an Internet address in Peshawar, Pakistan, that was being monitored by the vast computers controlled by American intelligence analysts. It set off alarms. The address, linked to senior Qaeda operatives, had been dormant for months.

Civil liberties: GCHQ and the American data trough
The Guardian's Prism documents raise questions about US-UK intelligence-gathering, including that from British citizens, which should urgently be debated in parliament

News of U.S. Surveillance Draws Anger of Activists and Militants Abroad
Mohamed al-Hadi, an antigovernment activist in Syria, had just received a Skype briefing from rebels about the Ming military airport near the northern city of Aleppo, a protracted battleground in the country?s civil war. Then he learned that the United States government had the ability to monitor that call, as well as a broad range of other information transmitted through the Internet.

U.S. Collects Vast Data Trove: NSA Monitoring Includes Three Major Phone Companies, as Well as Online Activity
The National Security Agency's monitoring of Americans includes customer records from the three major phone networks as well as emails and Web searches, and the agency also has cataloged credit-card transactions, said people familiar with the agency's activities.

Obama is like Apple, Google and Facebook: a once hip brand tainted by Prism
Among the guests at the fabled Bilderberg meeting, held this weekend just outside London, are the top brass of Google, Amazon and Microsoft. How appropriate they should be there, alongside luminaries of the US political and military establishment. For this was the week that seemed to confirm all the old bug-eyed conspiracy theories about governments and corporations colluding to enslave the rest of us.

Four Big Questions About NSA Spying, Prism, and Tech Dragnets
Reports of Prism, the National Security Agency?s program to gain perpetual access to all the information running through the servers of major Silicon Valley companies, are enough to give anyone a jolt. And considering what we know about the NSA, it seems plausible that it?s spying on us. But there are some things about Prism that don?t quite add up:

Government Says Secret Court Opinion on Law Underlying PRISM Program Needs to Stay Secret
In a rare public filing in the secret Foreign Intelligence Surveillance Court (FISC), the Justice Department today urged continued secrecy for a 2011 FISC opinion finding government surveillance to be unconstitutional. Significantly, the activities at issue were carried out under the controversial legal authority that underlies the National Security Agency?s recently-revealed PRISM program.

In Light of NSA Revelations, Government Asks for More Time in EFF Surveillance Cases
In light of the confirmation of NSA surveillance of millions of Americans communications records, and especially the decision by the government to declassify and publicly release descriptions of the program, the government today asked the courts handling two EFF surveillance cases for some additional time to consider their options.

Why Metadata Matters
In response to the recent news reports about the National Security Agency's surveillance program, President Barack Obama said today, "When it comes to telephone calls, nobody is listening to your telephone calls." Instead, the government was just "sifting through this so-called metadata." The Director of National Intelligence James Clapper made a similar comment last night: "The program does not allow the Government to listen in on anyone?s phone calls. The information acquired does not include the content of any communications or the identity of any subscriber."

GCHQ Prism spying claims: Labour urges PM to launch investigation
Prime Minister David Cameron has been urged to launch an investigation into allegations that Britain's electronic listening post GCHQ has been gathering data through a secret US spy programme.

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

Consumers, privacy advocates call for investigation into PRISM
The backlash against the PRISM surveillance program, which The Washington Post reported gives the U.S. government a direct pipeline to data from major consumer technology companies ? is in full force, with several groups calling for a full Congressional investigation of the program.

Silicon Valley through the NSA prism
The Obama administration on Thursday defended the National Security Agency?s need to collect telephone records of U.S. citizens, calling such information ?a critical tool in protecting the nation from terrorist threats." 

Calculating Apple?s True U.S. Tax Rate
One lesson from the Senate hearing about Apple?s offshore tax planning is that figuring out what a multinational company actually pays in taxes is harder than it should be. At the risk of sounding Clintonesque, it depends on what the meaning of ?pays? is.

Helpful ISP is Too Helpful: Australia's Censorship Fiasco, And How It Could Have Been Stopped
Australian Internet users have been cursed for over a decade by governments who appear to neither understand nor care about the consequences of Internet censorship. The current Communications minister, Stephen Conroy, has been particular notorious on this matter: after failing to get parliamentary approval for his Internet blacklist plans, he announced that government departments, including his own, had powers to block websites anyway under the ambiguously-written powers of Section 313 of the fifteen-year old Telecommunications Act.

Publishers Tell of Disputes With Apple on E-Book Prices
In an e-mail to her boss, Leslie Moonves, Carolyn K. Reidy, the chief executive of Simon & Schuster, dismissed an Apple executive as a ?minion.?

nz: Mega CEO on the Internet
The Internet is changing the way we do business, owners will only survive by adapting and responding to this, says the chief executive of Kim Dotcom's company Mega.

David Goldstein

email: david at goldsteinreport.com
web:  http://davidgoldstein.tel/
phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home

"Every time you use fossil fuels, you're adding to the problem. Every time you forgo fossil fuels, you're being part of the solution" - Dr Tim Flannery
Received on Mon Jun 10 2013 - 02:52:35 UTC

This archive was generated by hypermail 2.3.0 : Sat Sep 09 2017 - 22:00:11 UTC