[DNS] domain name news - 13 December

[DNS] domain name news - 13 December

From: David Goldstein <goldstein_david§yahoo.com.au>
Date: Sun, 12 Dec 2010 18:30:25 -0800 (PST)
Don't forget to check out http://www.auda.org.au/domain-news/ for the archive of 
the last 3 months of the news.

And see my website - http://GoldsteinReport.com/ - for daily updates in between 


The domain name news is supported by auDA


Internet organisations furious over government-only IGF decision by Kieren 

ICANN Board Plans Consultation with Government Representatives on New Generic 
Top-Level Domains and .XXX Top-Level Domain

ICANN delays TLD expansion approval [IDG]

ICANN Delays New gTLDs, Again, To Consider Public Comment

Fate of new TLDs to be settled in private by Milton Mueller

Update from ICANN ? ?We have reached a turning point?

Another big step forward for new TLDs by Adrian Kinderis

auDA seeks to wind up Bottle Domains (Australian Style Pty Ltd)

Australians supported by auDA Foundation Grants

SWITCH and wikileaks.ch

The Swiss registry has refused to block domain name wikileaks.ch

.XXX Faces More ICANN Approval Delays

Implementing DNSSEC by Torbj?rn Ekl?v, Interlan Gefle AB, and Stephan Lagerholm, 
Secure64 Software Corp.

Why WikiLeaks hackers are a glitch, not a cyberwar by Douglas Rushkoff, author 
most recently of "Program or Be Programmed" and "Life Inc: How Corporatism 
Conquered the World and How to Take it Back"

Democratic Underground Responds to Righthaven Copyright Troll Lawsuit

Copyright Troll Demands Drudge Report Domain Name

2012 Isn't the End of the World by Vinton G. Cerf [IEEE Internet Computing]
The Internet address space has used a format called IPv4 since 1977, but this 
only allows for 4.3 billion unique termination points in the Internet. It is now 
clear that more terminations must be supported and the recommended format is 
called IPv6 and uses 128 bit addresses. The IPv4 address space is going to 
exhausted by 2012 or sooner. It is time to implement IPv6 everywhere in the 
Internet and to assure full connectivity among all IPv6-capable devices and 

ICANN Joins Broad Coalition in Opposing a Government Only U.N. Advisory 
Committee to Internet Governance Forum
ICANN has joined other groups in sending a letter to the United? Nations? 
Commission on Science and Technology for Development (CSTD), which expresses 
surprise and strong opposition to a government-only model for participation and 
consultation in working group whose mission is to study improvements to the 
Internet Governance Forum.

Internet organisations furious over government-only IGF decision by Kieren 
Ten Internet organisations, including ICANN, the Internet Society, regional 
Internet registry APNIC, and country registry operators AuDA and Nominet, have 
responded angrily to a closed-doors decision by the UN Commission on Science and 
Technology for Development to eliminate anyone but governments from a key 
decision-making on the future of the IGF.

Online groups slam Internet Governance Forum
A number of internet groups are petitioning the United Nations over plans for 
the Internet Governance Forum (IGF).

ICANN Board Plans Consultation with Government Representatives on New Generic 
Top-Level Domains and .XXX Top-Level Domain
ICANN?s Board of Directors plans an extended meeting with its Governmental 
Advisory Committee (GAC) to resolve the remaining concerns of the committee?s 
members over ICANN?s plans to expand the current number of 21 generic top-level 
domains (gTLDs), such as .com, .net and .gov.

Advancing ICANN Accountability and Transparency
ICANN is taking steps to provide unprecedented public access to actions by its 
Board of Directors.

Public Comment: TLG Review ? Final Report
ICANN continues its work to conduct bylaw mandated organizational reviews to 
provide for continual improvement in its technical coordination and policy 
development support roles.

ICANN delays TLD expansion approval [IDG]
ICANN postponed approval of a mechanism to let groups apply for and manage new 
Internet domain extensions called generic Top Level Domains (gTLDs), such as the 
existing .com and .net.


ICANN Delays New gTLDs, Again, To Consider Public Comment
ICANN has delayed, once again, the introduction of new gTLDs at its meeting in 
Cartagena, Colombia.


Fate of new TLDs to be settled in private by Milton Mueller
At the ICANN meeting in Colombia, the board passed resolutions indicating that 
it is one last step away from implementing the program to create new top level 
domains. The board considers the problems of trademark protection, root 
scalability, mitigating malicious conduct and economic analysis to be closed.

Update from ICANN ? ?We have reached a turning point?
Here?s a quick update from the ICANN meeting in Cartagena. I will publish a 
fuller analysis later. The quick take-away is that the new gTLD process is now 
nearly inevitable, and that the GAC and the ICANN Board will meet in February 
2011 to resolve the remaining issues. This will push the timeline out, but not 
by much, perhaps a month or two.

Icann delays web domain expansion plan
The global body that controls website addresses has put off plans to enable the 
creation of hundreds of top-level domain names to compete with .com and .net in 
the wake of objections from the US

So What Exactly Did ICANN Decide About .XXX and New TLDs Today?
There?s an old truism amongst lawyers. Show them a one page contract and they?ll 
tell you it?s rock solid. Show them a long contract and they can start poking 
holes in it.

ICANN new TLD launch delayed (again)
ICANN?s new top-level domains program has been delayed, likely for a few months 
at least, after governments submitted a laundry list of issues they believe are 
still unresolved.

Calls for ?fast-track? for new TLDs
Some would-be top-level domain registries have started to call for ICANN to 
gradually phase in the launch of its new TLD program, so they can get their feet 
in the door early.

Another big step forward for new TLDs by Adrian Kinderis
So after the initial reaction and ?over-reaction? by some folks in the audience, 
I have been thinking about the implications of the ICANN resolution on new gTLDs 
at its Board meeting in Cartagena, Colombia.

The Real Threat to the Single Root of the Internet Seems to Come from ICANN 
Itself, of All Places by Khaled Fattal
The proposed final Guidebook for the New gTLDs and IDN gTLDs contains elements 
that raise grave risks to the ICANN single root of the Internet caused by none 
other than ICANN itself. Below is my intervention at the ICANN Cartagena Public 
Forum today. ICANN President and CEO Mr. Rod Beckstrom was prompt to reply and 
acknowledge the validity of my statement adding that ICANN is fully aware of the 

Will generic top level domain name strategies change online marketing?
What will gTLDs mean for marketers and how can you prepare for their arrival? 
Neil Barton, director at Hostway discusses the options.

$2 Million Wasted on Economic Studies for New TLDs
Depending on which transcripts I read from the ICANN meeting in Colombia this 
week, ICANN has spent $1 million to $2 million on economic studies about new top 
level domain names to date.

 - ccTLD & gTLD NEWS
auDA seeks to wind up Bottle Domains (Australian Style Pty Ltd)
On 29 November 2010, .au Domain Administration (auDA) filed an application with 
the Supreme Court of Victoria seeking a winding up order against Australian 
Style Pty Ltd (t/a Bottle Domains). auDA has notified the Australian Securities 
and Investments Commission (ASIC) of the application.

Australians supported by auDA Foundation Grants
The auDA Foundation is a charitable organisation that provides funds for 
innovative projects which utilise internet technology to promote and encourage 
education and research for the benefit of the Australian community.

SWITCH and wikileaks.ch
SWITCH, the registry for .ch internet addresses, is currently receiving a large 
number of enquiries as to the circumstances under which SWITCH would delete 
wikileaks.ch. This is governed by law.

The Swiss registry has refused to block domain name wikileaks.ch
Pursuant to notice posted on the website switch.ch, despite many requests 
addressed to the registry regarding removal of wikileaks.ch, this site will not 
be blocked. Issues regarding blockage and removal of this site are subject 
solely to a court decision, SWITCH representatives reckon The registry for 
national domains .ch (Switzerland) and .li (Lichtenstein), SWITCH doesn?t hold 
itself responsible for content posted on these domain names. Furthermore, SWITCH 
does not host wikileaks.ch. Physically, the site is located in a different place 
and SWITCH only provides the domain name support.

A .com domain name increases a company's exposure to foreign lawsuits, rules ECJ
Companies using a .com or .eu domain name, or displaying international codes for 
phone numbers, are more likely to be 'directing' their activities at foreign 
consumers, affecting where they can sue or be sued, the Court of Justice of the 
EU has ruled.

Dispute lock - A new service from ISNIC
While a domain dispute is being processed by the authorities, it is necessary to 
prevent the disputed domain from being transferred (it's registrant changed) to 
a third party.

Dot-P2P New gTLD Proposed But Unlikely to Get Up
In response to the US government issuing seizure orders last week against 82 
domain names of commercial websites engaged in what the government described as 
the illegal sale and distribution of counterfeit goods and copyrighted works, a 
new gTLD proposal has been launched.


Accented Characters Now Allowed in Slovenian Domain Names, Registration Costs 
The Academic and Research Network of Slovenia (ARNES), a public institute 
responsible for managing Slovenia's country code top-level domain (ccTLD) .si, 
has announced new rules, effective October 20, 2010, governing the registration 
of internationalized domain names (IDNs).

What If There Were An Application For Dot Wikileaks?
What would happen if ICANN ... received an application for a .wikileaks TLD next 
year, under its new system of opening up the internet for domains? It could make 
an interesting example of how well the complex system to apply for new TLDs 
works and how much political intervention is possible in the system. At the 39th 
ICANN meeting in Cartagena, Colombia this week, the self-regulatory body is 
trying to finalise issues in the published Final Applicant Guidebook ? and it is 
governments and trademark owners that are calling for more time and more 

Launch of '.xxx' porn domain name delayed [AFP]
THE global body responsible for regulating Internet domain names delayed on 
Friday launching an '.xxx' domain for pornographic websites.




Internet oversight agency closer to approving '.xxx' address for online porn 
sites [AP]
Porn sites are closer to getting their own address on the Internet. The online 
red-light district would be in the form of an ".xxx" domain name suffix 
alongside longstanding ones such as ".com" and ".org. 




.XXX Faces More ICANN Approval Delays
ICANN delayed the introduction of the .XXX sTLD once again at its board meeting 
on Friday.

Governments stonewall interwebs porn domain
The bid to create .xxx ? a top-level domain just for web porn ? will be tied up 
in red tape for at least a few more months after national governments pressured 
ICANN to block its approval.

Internet group calls for '.xxx' domain name [AFP]
INTERNET specialists gathered in Colombia on Thursday called for the creation of 
an '.xxx' domain for pornographic websites, saying it would make it easier to 
police them.




ICM Registry Claims Dot-XXX Victory
ICM Registry has commented following the vote in Cartagena today by the ICANN 
Board of Directors approving a resolution that paves the way for the final 
approval of ICM?s dot-XXX application after consultations with the Government 
Advisory Committee (GAC) in February.

DotXXX reaches new milestone!!! [news release]
Following successful attendance at a number of recent Adult Industry trade shows 
in Barcelona, Amsterdam , Berlin and Most recent as Sponsor of the 
Eurowebtainment show in Vienna, Austria, we are pleased to announced that we now 
have over 10,000 members of the Sponsored Community that have applied to 
pre-register over 187,000 domains ahead of our scheduled launch in Q1 next year.

Implementing DNSSEC by Torbj?rn Ekl?v, Interlan Gefle AB, and Stephan Lagerholm, 
Secure64 Software Corp.
As a reader of The Internet Protocol Journal, you are probably familiar with the 
Domain Name System (DNS) "cache poisoning" techniques discovered a few years 
ago. And you have most likely heard that Domain Name System Security Extensions 
(DNSSEC) [0, 13, 14, 15] is the long-term cure. But you might not know exactly 
what challenges are involved with DNSSEC and what experience the early adopters 
have gathered and documented. Perhaps you waited with your own rollout until you 
could gather more documentation about operational experiences when rolling out 

Rolling Over DNSSEC Keys by George Michaelson, APNIC, Patrick Wallstr?m, .SE, 
Roy Arends, Nominet, Geoff Huston, APNIC
As we are constantly reminded, the Internet can be a very hostile place, and 
public services are placed under constant pressure from a stream of probe 
traffic, attempting to exploit any one of numerous vulnerabilities that may be 
present at the server. In addition, there is the threat of Denial of Service 
(DoS) [1] attacks, where a service is subjected to an abnormally high traffic 
load that attempts to saturate and take it down. This story starts with the 
detection of a possible hostile DoS attack on Domain Name System (DNS) servers, 
and narrates the investigation as to the cause of the incident, and the wider 
implications of what was found in this investigation.

Why WikiLeaks hackers are a glitch, not a cyberwar by Douglas Rushkoff, author 
most recently of "Program or Be Programmed" and "Life Inc: How Corporatism 
Conquered the World and How to Take it Back"
Like a momentary glitch on a flat-panel display, the attacks by hackers calling 
themselves "Anonymous" came and went. Visa, PayPal, MasterCard and Amazon report 
no significant damage, and business goes on as usual. The corporations acting to 
cut off WikiLeaks remain safe.

WikiLeaks backlash: The first global cyber war has begun, claim hackers
He is one of the newest recruits to Operation Payback. In a London bedroom, the 
24-year-old computer hacker is preparing his weaponry for this week's battles in 
an evolving cyberwar. He is a self-styled defender of free speech, his weapon a 
laptop and his enemy the US corporations responsible for attacking the website 

Anonymous Wikileaks supporters explain web attacks
A group of pro-Wikileaks activists who coordinated a series of web attacks have 
explained their actions.

Has progress been made in fighting DDoS attacks? [IDG]
As the distributed denial-of-service attacks spawned by this week's WikiLeaks 
events continue, network operators are discussing what progress, if any, has 
been made over the past decade to detect and thwart DoS attacks.

Pro-WikiLeaks cyber army gains strength; thousands join DDoS attacks
The retaliatory attacks by pro-WikiLeaks activists are growing in strength as 
hackers add botnets and thousands of people download an open-source attack tool, 
security researchers said today.


WikiLeaks: DDOS attacks reflect 'public opinion'
WikiLeaks neither supports nor condemns the cyber attacks that have targeted its 
critics, it said Friday, just as it appears the attackers are mounting a fresh 
operation against Moneybookers.com.

Wikileaks FAQ by Jonathan Zittrain
... I guess a too-crafty-by-half solution would be to mirror everything in the 
.ch zone to a new .ch server run by ICANN, then delete wikileaks.ch?s info from 
that server?s files, then redirect the root zone to the new server instead of 
the old. That would work for about five minutes. After that, increasing chaos as 
Swiss webmasters made changes to their .ch names in the ?official? nic.ch 
registry only to find them not reflected for those users unlucky enough to be 
rerouted to ICANN?s snapshot mirror. At which point the mirror roots (and the 
ISPs) awaken to the deception and take action a la the preceding graf.

US House cybersecurity activist bemoans apathy about countering threats
This week's hacker attacks on credit card and other consumer websites in the 
wake of the WikiLeaks controversy provide a perfect example of America's 
vulnerability to attacks against online networks by criminals, spies and enemy 
states, Rep. Michael McCaul, R-Texas, co-founder of the House Cybersecurity 
Caucus, said Thursday.

DNS Provider Mistakenly Caught in WikiLeaks Saga Now Supports the Group
A DNS provider that suffered backlash last week after it was wrongly identified 
as supplying and then dropping DNS service to WikiLeaks has decided to support 
the secret-spilling site, offering DNS service to two domains distributing 
WikiLeaks content.

VeriSign Deploys DNS Security Extensions in .net Zone
VeriSign ... announced it has deployed DNS Security Extensions (DNSSEC) in the 
.net zone.

The .net domain joins the DNSSEC fold
Domain name records in the .net Top Level Domain have been digitally signed with 
the DNS Security Extensions (DNSSEC) that help secure the Internet 
infrastructure against hijacking and misdirection of traffic.

Democratic Underground Responds to Righthaven Copyright Troll Lawsuit
Righthaven is attempting to make a business out of suing Internet websites for 
copyright infringement. It has filed 180 copyright actions so far ?without ever 
first asking that a work be removed from the target website?in each case 
alleging ?willful infringement? and attempting to extract settlements by threats 
of statutory damages (up to $150,000), attorneys? fees and seizure of the domain 

Copyright Troll Demands Drudge Report Domain Name
One of the litigation scare tactics employed by copyright troll Righthaven is it 
routinely demands allegedly infringing sites to forfeit their domain names.

Copyright troll Righthaven sues for control of Drudge Report domain
News aggregation impresario Matt Drudge is being sued for copyright infringement 
for reproducing a copyrighted photo along with a link to a story about airport 
security on the Las Vegas Review-Journal website. ... In the new lawsuit, 
Righthaven asks a judge to "lock the Drudge Report Domain and transfer control 
of the Drudge Report Domain to Righthaven."

Copyright trolls demand Drudge Report domain
Copyright troll Righthaven has demanded that the high-profile online magazine 
the Drudge Report hand over its domain name.

 - IPv4/IPv6
Protect your pre-1997 IP address: With IPv4 space running out any day now, is 
your legacy IP address space safe?
If your company obtained its IP address space before 1997, you have probably 
received several letters from the American Registry for Internet Numbers Ltd. 
(ARIN) encouraging you to enter into a contractual agreement to protect the IP 
address. But should you sign it?

Two Six-Figure Sales Totaling Over $867,000 Top This Week's Domain Sales Chart
The four-day Thanksgiving weekend gave most Americans a very short work week 
last week but the domain aftermarket continued full steam ahead, producing two 
of the year's 30 biggest sales to date. In a private transaction the owners of 
HomeInsurance.com reported they have acquired HomeOwnersInsurance.com for a 
whopping $570,000 - the 11th biggest cash sale reported for far in 2010.

Internet Economy: broadband statistics (June 2010)
The OECD has just released new statistics on broadband penetration in OECD 
countries as of June 2010. These include the number of broadband subscribers per 
country, broadband subscriptions by technology, the percentage of fibre 
connections in total broadband and, for the first time, a wireless broadband 
penetration indicator.

Balancing Act: Finding Consensus on Standards for Unmasking Anonymous Internet 
Speakers by Matthew Mazzotta [Boston College Law Review]
Abstract: The growth in popular use of the internet has led to a dramatic 
increase in both the amount of anonymous speech and the number of aggrieved 
plaintiffs claiming to be harmed by it. Lawsuits involving anonymous internet 
speech present thorny questions for courts because plaintiffs typically must 
obtain the identity of anonymous speakers during discovery before any 
adjudication of the underlying claim. Compelled disclosure of identifying 
information thus risks chilling speech by subjecting anonymous speakers who have 
done nothing illegal to unwarranted harassment and retaliation. In response to 
these concerns, courts have formulated ?unmasking? standards for determining 
when to allow anonymous speakers to be identified. This Note examines trends 
within various unmasking standards and proposes a single standard for future 
courts that requires notice, an evaluation on the merits of the plaintiff?s 
claim, and a balancing of the First Amendment rights of the anonymous speaker 
against the strength of the plaintiff?s claim and the need for unmasking.

Extending Tort Liability to Creators of Fake Profile on Social Networking 
Websites by Kay, Bradley
In today?s world, social media has become ubiquitous. While social media 
provides opportunities for networking, there are also opportunities for 
exploitation. Courts and legislatures have provided remedies for some wrongs 
that can occur on social networking websites. However one area remains 
neglected- false profiles made for real people.
http://jip.kentlaw.edu/art/Volume 10/10 Chi-Kent J Intell Prop 1.pdf

Knowledge and Misfeasance: Tiffany v. eBay and the Knowledge Requirement of 
Contributory Trademark Infringement by Matthew C. Berntsen [Boston University 
Journal of Science & Technology Law]
Introduction: eBay created a new business model, made possible by the internet. 
The popular legend is that eBay was originally intended as a site at which 
consumers could offer for sale and sell still useable items sitting in garages 
and basements. But it blossomed into the world?s largest marketplace where 
anonymous sellers offer unseen and unexamined merchandise to distant buyers. 
Given such circumstances, it was not long before the counterfeiters and grifters 
of the world realized that the site could be exploited by them without risk.

The Law and Politics of Net Neutrality: Part 1 by Jeff Kao [Columbia Science and 
Technology Law Review]
The current political climate portends significant political changes following 
today?s midterm elections.  The balance of power will likely shift back toward 
the right, greatly reducing the governing mandate of the Democratic Party.  The 
current administration?s ability to push policies through will be tempered by a 
shift of power in Congress, possibly preventing the Obama administration from 
achieving its stated policy goals after two years in power.  One of the policy 
goals under attack is Net Neutrality, a term popularized by Tim Wu, professor 
here at Columbia Law School, and an issue that has greatly divided political 
actors in this country.

The Law and Politics of Net Neutrality: Part 2 by Jeff Kao
In the previous post, I wrote about the recent history of net neutrality, the 
Open Internet Rules in the works, and the ensuing backroom dealings and 
legislative battles.  But now that the mid-term elections are over, has the 
future of net neutrality rules changed, and is net neutrality dead? Republicans 
made gains in the Senate and took control of the House, but does the change in 
legislative politics impact the regulatory process (and the profit outlook for 
any company that does business over the Internet)?  To have a shot at predicting 
the regulatory and legislative action over the next two years ? an eternity in 
Internet time ? we must examine the legal force of the rules being considered.  
Even though the Comcast BitTorrent decision was a blow to the agency?s 
regulatory position, Comcast Corp. v. FCC, 600 F.3d 642 (2010), an analysis of 
the legal framework that underlies it shows that not all (jurisdiction) was lost 
for the FCC.  To properly understand the FCC?s current regulatory position, we 
have to go back beyond the April 2010 Comcast BitTorrent decision by the D.C. 

Telecommunications (interception and access) and its Regulation in Arab 
Countries by Nazzal Kiswani [Journal of International Commercial Law and 
Abstract: Telecommunication has been a necessity in all countries this century. 
Communication has always been an essential part of our lives, education, family 
relations, business, government and other organizational activities. As 
telecommunication technology has advanced, so has the need for the interception 
of telecommunications and access by law enforcement authorities.

Applying Copyright Abandonment in the Digital Age by Matthew W. Turetzky
Abstract: Copyright law protects orphan and parented works equally--but it 
shouldn't. Consequently, current law unnecessarily restrains public access to 
works that authors have not exercised dominion over for decades.This problem has 
come to the fore in the Google Books settlement, which critics argue will give 
Google a de facto monopoly over orphan works. But this criticism implicates an 
obvious question: Why are orphan works protected by copyright law in the first 
place? If orphan works were in the public domain, then no one would worry about 
Google's supposed "monopoly" because Google's competitors would be free to copy 
the works without facing class action lawsuits. To address these concerns, I 
propose a new equitable defense to copyright infringement: the orphan theory of 

Vertical Separation of Telecommunications Networks: Evidence from Five Countries 
by Robert W. Crandall, Jeffrey A. Eisenach, and Robert E. Litan
The widespread adoption of mandatory unbundling in telecommunications markets 
has led to growing interest in mandatory ?functional separation,? i.e., 
separation of upstream network operations from downstream retail operations. 
Since 2002, vertical separation has been implemented in five OECD countries: 
Australia, Italy, New Zealand, Sweden, and the United Kingdom.
http://www.law.indiana.edu/fclj/pubs/v62/no3/7- CRANDALL_FINAL.pdf

Keywords Advertising: Issues of Trademark Infringement by Althaf Marsoof 
[Journal of International Commercial Law and Technology]
Abstract: The Internet has become a crucial advertising tool for modern-day 
businesses. Increasingly, business enterprises are opting for online presence, 
and this phenomenon has significantly transformed advertising techniques. 
Consumers wish to spend less time and gain optimal results whilst searching for 
products and services on the Internet. In this setting, enterprising entities, 
such as Google, have sought to make maximum use of the need for online presence 
which has given rise to Internet advertising schemes such as Google?s ?AdWords.

Singapore teens' perceived ownership of online sources and credibility by Andrew 
Michael Duffy, Tan Liying, Larissa Ong
Abstract: This study investigates teenage attitudes towards unofficial versus 
mainstream media as a source of information. It starts from three unproven 
premises. First, that young people place more trust in unofficial online news 
than in mainstream media, because they feel a greater ownership of the 
cyberworld. Second, due to a perception of authoritarian control over 
Singapore's mainstream media, truth and accuracy in unofficial sources are of 
secondary importance to a feeling of ownership. Third, teenagers' need for 
accuracy is secondary to their need for ownership and differentiation; and, 
unofficial information sources are a badge of identity worn by the young.

Facebook privacy settings: Who cares? by danah boyd, Eszter Hargittai
Abstract: With over 500 million users, the decisions that Facebook makes about 
its privacy settings have the potential to influence many people. While its 
changes in this domain have often prompted privacy advocates and news media to 
critique the company, Facebook has continued to attract more users to its 
service. This raises a question about whether or not Facebook's changes in 
privacy approaches matter and, if so, to whom. This paper examines the attitudes 
and practices of a cohort of 18- and 19-year-olds surveyed in 2009 and again in 
2010 about Facebook's privacy settings.

Protecting the Children: Challenges that Result In, and Consequences Resulting 
From, Inconsistent Prosecution of Child Pornography Cases in a Technical World 
by Francis S. Monterosso
Of all the sinister things that Internet viruses do, this might be the worst: 
They can make you an unsuspecting collector of child pornography. Heinous 
pictures and videos can be deposited on computers by viruses?the malicious 
programs better known for swiping your credit card numbers. In this twist, it?s 
your reputation that?s stolen. Pedophiles can exploit virus-infected PCs to 
remotely store and view their stash without fear they?ll get caught.

Sexting and Teenagers: OMG R U Going 2 Jail??? by Catherine Arcabascio
Sexting is a relatively recent practice engaged in by the young, and sometimes 
not-so-young, and foolish.1 ?Sexting? is ?the practice of sending or posting 
sexually suggestive text messages and images, including nude or semi-nude 
photographs, via cellular telephones or over the Internet.? While sexting can 
and does occur between and among people of any age, the real concerns are with 
teenagers who are sexting.

Rivals Say Google Plays Favorites, Displaying Own Health, Shopping, Local 
Content Ahead of Links to Competing Sites
Google Inc. increasingly is promoting some of its own content over that of rival 
websites when users perform an online search, prompting competing sites to cry 

Wi-Fi Threat to Trees Rooted in Shaky Stats
A study that implied that 70% of urban trees are sick because of exposure to 
electromagnetic radiation from Wi-Fi towers show how quickly sensational numbers 
can spread.

Hate and the internet: Does the internet encourage insidious and bullying 
I remember the first time I logged into a chatroom. It was 1996, and I was using 
my mum's AOL account to mooch around the world wide web, which was still very 
much in its infancy. I was in that glorious, unrestricted period of life between 
college and reality, and the web seemed to offer splendid, unrestricted access 
to the outside world in a way that no generation had known before.

The Words We Searched in 2010, From Google
What do the terms Chatroulette, iPad and Justin Bieber have in common? No, they 
are not a part of a new Internet-inspired movie; they were the ?fastest rising? 
terms typed into Google?s search engine over the past year.

Nicki Minaj and Justin Bieber rank high in Google's Zeitgeist list for UK
Google publishes its annual Zeitgeist ? the list of the year's most popular UK 
search terms ? and it reveals that a fascination with Americana is in rude 
health, with gossip and news about "celebutante" Kim Kardashian and YouTube 
darling and teeny-bopper Justin Bieber in high demand.

Colombia Internet Audience Increases 31 Percent in Past Year to Rank as 
Fastest-Growing Market in Latin America
comScore ... released results from its latest study on Internet usage in 
Colombia. The report found that Colombia is the fastest-growing Internet market 
in Latin America, growing 31 percent in the past year to reach 11.8 million 
unique visitors in September 2010.

8 Percent of American Internet Users Go to Twitter, Report Says
A new study released Thursday by The Pew Research Center found that 8 percent of 
Americans who are active on the Internet are enthusiastic users of the social 
networking service Twitter.

8% of Americans use Twitter, Pew study says
Nearly one in 10 American adults who use the Internet are Twitter users.


Study: Twitter Use More Popular Among Young Minorities
The Pew Research Center's first-ever study that exclusively examined Twitter 
users found that 8 percent of U.S. adults online use the micro-blogging 

8% of online Americans use Twitter
Overview: This is the first-ever survey reading from the Pew Research Center?s 
Internet & American Life Project that exclusively examines Twitter users. In 
previous surveys, the Project had asked internet users whether they ?used 
Twitter or another service to share updates about yourself or to see updates 
about others??

Facebook emerges as 'terrorist recruiting ground'
The US government has warned that terrorist groups like al-Qaeda are targeting 
Facebook as a prime recruitment ground.

Cloudy outlook as Google steps up push to rule web
Google?s ambitions are so sweeping, the theatres in which its campaign is being 
advanced so dispersed, that it is not always easy to trace the outlines of the 
broader war it is fighting. Sometimes it takes simultaneous advances on a number 
of fronts to bring its progress into focus. This has been one of those weeks.

uk: New tactics for tackling online sexual predators [news release]
The Virtual Global Taskforce (VGT) Conference held this week highlighting that 
international law enforcement agencies need to work with global industry 
partners, including non-government organisations, to keep children across the 
world safe from online child sexual exploitation.

au: 'Sexting' teens breach child porn law
CHILDREN sending and receiving sexually explicit images on mobile phones - or 
'sexting' - are unwittingly falling foul of child pornography laws, a 
parliamentary hearing on child cyber-safety has heard.

nz: Online risks shown in Facebook teen sex case
An internet safety group is warning about the dangers of social networking sites 
after a Whangarei man was sentenced for sexually abusing a 15-year-old girl he 
befriended through Facebook.

nz: Facebook stalking could stunt your child's growth
Sarah Lester enjoys an active social life. And like many girls her age - she 
relies on Facebook to stay in touch with friends and the latest happenings.

us: F.C.C. to Hold Forum on Teenagers and Technology
Parents, researchers and educators have been asking whether the spread of mobile 
devices and Internet access, for all their benefits, can have negative side 
effects for young people, interfering with homework or leading to cyberbullying. 
Now the government is asking the same question.

Barbie video doll sparks child pornography fears
The FBI has issued an alert about a popular Barbie doll containing a hidden 
video camera it says could be used to produce child pornography ? but stressed 
that the toy has not been linked with any reported crimes.

us: EFF Asks Judges to Protect Identities in Porn-Downloading Lawsuits
The Electronic Frontier Foundation (EFF) has asked judges in Texas and West 
Virginia to block requests to unmask accused file sharers in several predatory 
copyright troll lawsuits involving the alleged illegal downloading of 

Arrr, we pillage a fine booty of free films: Australian study
The scale of global digital piracy has been revealed in new research by a team 
at the University of Ballarat that found the action-comedy film Kick-Ass was 
downloaded more than 323,000 times in one week in July - three weeks before it 
was released on DVD.


Smartphones changing the way we shop
Mobile shopping and m-commerce the buzzwords as high street stores try to keep 
up with consumers' altered behaviour

Angry Birds, Flocking to Cellphones Everywhere
It sounds like a tough sell: a game that involves catapulting birds at elaborate 
fortresses constructed by evil pigs.

Apple, Google Asked to Pay Up as Mobile Operators Face Data Flood
Google Inc., Apple Inc., and Facebook Inc. need to pitch in to help pay for the 
billions of dollars of network investments needed for their bandwidth-hogging 
services, European phone operators say.

European mobile operators say big sites need to pay for users' data demands
European mobile networks have called on companies such as Facebook, Apple, 
Google to help pay for network upgrades as the growth in smartphone use has made 
data demand soar.

Nokia's MeeGo Will Bet on Differences to iOS and Android
One of the most interesting talks today at LeWeb, Paris, came from Marko 
Ahtisaari, senior vice president of design at Nokia. ... Mr. Ahtisaari 
identified two ?dominant design candidates? for mobile phones ? the Apple iOS 
look with screens of apps and a physical home key, and a second model shared 
between Symbian and Andriod that sees multiple home screens and ? depending on 
the phone model ? lots more keys. The iOS was, he said, ?beautifully elegant,? 
simple to learn, and ?fantastically constrained.? The second model, which is the 
fastest growing, he said, was simple and organic, and built by user over time.

300,000 Android phones activated a day, claims Google
While Android's success has been well-documented, it's still hard to wrap your 
head around the idea that 300,000 Android phones are being activated every day.

Google Android Phones Are Selling Like Hotcakes
The Nexus S smartphone.Google's lead Android developer Andy Rubin tweeted that 
the company is activating more than 300,000 Android phones each day. This 
equates to more than 9 million Android phones activated per month, despite 
reports that the platform's activation numbers were plummeting as of late.

Android's Aussie market share triples
Yesterday, local analyst firm IDC published a research report noting that 
although Apple was still growing strongly, it was Google's mobile operating 
system Android that was expanding its turf the fastest.

Mobile services in Australia hit 25.99 million [news release]
The total number of mobile services in operation (voice and data services) in 
Australia increased by seven per cent during 2009?10 to reach 25.99 million 
services at June 2010, according to the Australian Communications and Media 
Authority's Communications Report 2009-10, tabled by the Minister for Broadband, 
Communications and the Digital Economy in Parliament today.

Spam Will Wreck Social Networks Next
Microsoft Chairman Bill Gates announced in 2004 that the problem of e-mail spam 
would be "solved" within two years.

Mobile 'revolution' eases Pacific isolation, poverty [AFP]
From the rugged highlands of Papua New Guinea to the remote islands of Tonga, a 
telecommunications revolution in the Pacific is helping ease poverty and 
isolation in some of the world's poorest countries.


EBay not liable on trademark dispute: EU court
Internet auction site eBay Inc is generally not liable for trademark 
infringements committed by users on its site, a European Court of Justice legal 
expert said on Thursday, ahead of a final court ruling.

eBay wins preliminary EU court backing in L'Oreal fight
US online auction site eBay won preliminary backing from Europe's highest court 
Thursday in a copyright battle with French cosmetics giant L'Oreal.


WikiLeaks vs The Machine
US government tells firms to pull plug on whistleblowing website as hackers 
cause chaos with revenge attacks on Assange's 'enemies'

WikiLeaks row: why Amazon's desertion has ominous implications for democracy
Amazon's decision to abandon WikiLeaks sends out a clear message: you can 
publish what you like ? as long as it meets with the government's approval

Hackers Give Web Companies a Test of Free Speech
A hacking free-for-all has exploded on the Web, and Facebook and Twitter are 
stuck in the middle.

Why WikiLeaks hackers are a glitch, not a cyberwar by Douglas Rushkoff, author 
most recently of "Program or Be Programmed" and "Life Inc: How Corporatism 
Conquered the World and How to Take it Back"
Like a momentary glitch on a flat-panel display, the attacks by hackers calling 
themselves "Anonymous" came and went. Visa, PayPal, MasterCard and Amazon report 
no significant damage, and business goes on as usual. The corporations acting to 
cut off WikiLeaks remain safe.

WikiLeaks backlash: The first global cyber war has begun, claim hackers
He is one of the newest recruits to Operation Payback. In a London bedroom, the 
24-year-old computer hacker is preparing his weaponry for this week's battles in 
an evolving cyberwar. He is a self-styled defender of free speech, his weapon a 
laptop and his enemy the US corporations responsible for attacking the website 

Anonymous Wikileaks supporters explain web attacks
A group of pro-Wikileaks activists who coordinated a series of web attacks have 
explained their actions.

Has progress been made in fighting DDoS attacks? [IDG]
As the distributed denial-of-service attacks spawned by this week's WikiLeaks 
events continue, network operators are discussing what progress, if any, has 
been made over the past decade to detect and thwart DoS attacks.

Pro-WikiLeaks cyber army gains strength; thousands join DDoS attacks
The retaliatory attacks by pro-WikiLeaks activists are growing in strength as 
hackers add botnets and thousands of people download an open-source attack tool, 
security researchers said today.


WikiLeaks: Who are the hackers behind Operation Payback?
The MasterCard website was forced offline for several hours today, following an 
online assault led by a shadowy group of hackers protesting against the card 
issuer's decision to block payments made to the WikiLeaks website.

Operation Payback fails to take down Amazon in WikiLeaks revenge attack
The transient group of online activists crippling websites in "revenge" for 
cutting off ties with WikiLeaks today attempted its most audacious attack yet ? 
and failed.

Web Attackers Point to Cause in WikiLeaks
They got their start years ago as cyberpranksters, an online community of 
tech-savvy kids more interested in making mischief than political statements.

Anonymous cyberwarriors stun experts: Anarchists and idealists behind ?Operation 
Internet subcultures rarely make front page news. But when the mysterious forces 
of Anonymous took it upon themselves to attack opponents of WikiLeaks, the 
whistle-blowing website, their success took everyone ? not least victims such as 
Visa, MasterCard and PayPal ? by surprise.

WikiLeaks supporters disrupt Visa and MasterCard sites in 'Operation Payback'
It is, according to one breathless blogger, "the first great cyber war", or as 
those behind it put it more prosaically: "The major shitstorm has begun."

Web Attackers Point to Cause in WikiLeaks
They got their start years ago as cyberpranksters, an online community of 
tech-savvy kids more interested in making mischief than political statements.

Pro-Wikileaks activists abandon Amazon cyber attack
Pro-Wikileak activists have abandoned plans to bring down the website of online 
retailer Amazon, and switched back to targeting PayPal.

Increased illicit behavior on Internet pharmacies
Of the nearly 7,000 sites reviewed by the National Association of Boards of 
Pharmacy, only 4% of those online sites appear to be in compliance with pharmacy 
laws and practice standards.

NZ security breaches down, but reporting still low ? survey
An Otago University survey of computer crime and security shows a noticeable 
drop in intrusions and other compromises of New Zealand computer systems in 
2009, compared to the survey done in 2007.

Technology Outpaces Privacy (Yet Again)
How far does consumer privacy protection lag behind data-collection systems, 
those advanced technologies that media companies use to gather, share and profit 
from our personal information? Too far, according to two privacy advocates. 


Privacy project uses cryptography to reduce shared info
A project that could radically reduce the amount of personal information we 
share in our dealings has been revealed by IBM researchers.

Report: No Real Leader On Browser Privacy
A new report released Thursday from the Center for Democracy and Technology 
analyzing privacy controls on Internet browsers found that while they all offer 
privacy control features none stand out as a real leader on the issue.

CDT Releases Comprehensive Report on Browser Privacy Controls
The Center for Democracy & Technology today released a report assessing the 
privacy control features of the five major browsers.  The report concludes that 
no single browser stands above the rest?all have strengths that are offset by 
weaknesses.  The report is an update of CDT's 2009 browser report.

Join EFF in Standing up Against Internet Censorship
Over the past few weeks, we here at EFF have watched as whistleblowing website 
WikiLeaks has fueled an emotionally charged debate about the secrecy of 
government information and the people's right to know. We have welcomed this 
debate, and the fact that there have been myriad views is the embodiment of the 
freedom of expression upon which this country was founded.

Can Free Speech Be Protected on a Private Internet?
Does the US constitution protect WikiLeaks? Only courts can decide how far the 
whistleblowing platform can go. Yet Amazon and others have simply blocked the 
site, rather than waiting for legal clarification. The companies' cowardice is 
now threatening Internet freedom.

Dealing with WikiLeaks: America is rightly furious. But it should learn from its 
mistakes in the past decade and stick to its own rules
Big crimes deserve tough responses. In any country the theft and publication of 
250,000 secret government documents would deserve punishment. If the leak costs 
lives, let alone the careers and trust that have already perished amid the 
WikiLeaks disclosures, the case for action is even stronger.

Venezuela seeks to regulate Internet with media bill
Venezuela plans to include the Internet in a law that regulates the media, under 
a proposed bill presented to parliament on Thursday that the opposition claims 
will result in censorship.

Beijing blocks websites ahead of award ceremony
China's aggressive crackdown ahead of the Nobel Peace Prize ceremony in Oslo 
stepped up a notch last night with the removal of access to key foreign news 
sites in an attempt to starve the country of news on Liu Xiaobo's award.

Nobel prize: Chinese censors clamp down on internet buzz over Liu Xiaobo
Chinese internet users hit upon the idea of using the phrase ?empty chair? to 
refer to Mr Liu, a reference to the empty chair that will represent him at 
today?s Nobel ceremony.

Chairman Genachowski?s Next Net Neutrality Proposal: What to Watch For: 
Commentary by Corynne McSherry
EFF has been monitoring the net neutrality debate with an eye to two main 
concerns, both stemming from our conviction that however laudable the goal of 
neutrality--and it is a laudable goal--the regulatory and legislative paths that 
get us there must not amount to a ?Trojan horse? that we?ll all regret:

us: Phone, Cable Lobbying War Over Net Neutrality Heats Up
Big phone and cable companies are outgunning Silicon Valley in last-minute 
lobbying to shape a pending Federal Communications Commission proposal to 
prevent Internet providers from interfering with web traffic.

Brussels mulls shortening data retention periods
The European Commission is planning a review of the Data Retention Directive, 
which could include harmonisation and a reduction of the periods when public 
authorities can access citizens' private electronic data for security reasons. 


nz: Labour: broadband law change creates consumer risk
The government's telecommunications amendment bill has passed its first reading 
and will be opened up for feedback from the public.

nz: Constructive Suggestions To Improve Copyright Bill Released
A coalition of organisations and concerned citizens has today released a letter 
and briefing paper proposing final improvements to copyright legislation 
currently before Parliament.

NZ Govt Copyright Leak: Doubts Value of WIPO Internet Treaties, Supports 
Flexible Digital Lock Rules
New Zealand is one of several countries currently negotiating the Trans-Pacific 
Partnership Agreement, a regional trade deal that the U.S. would like to see 
include a major chapter on intellectual property (Canada has been excluded from 
the talks).

Welsh government lays out broadband plans
Welsh businesses will all have access to next-generation broadband by 2016, the 
Welsh Assembly pledged on Wednesday.

Phones calls used to redefine UK regions
Social networks could provide the key to redrawing the regional map of Britain, 
producing areas with strong social cohesion. That's the idea of an international 
team, who have created a social map of Great Britain.

Tax protest turns Vodafone's smile upside down
It was a clever PR ruse designed to promote Vodafone as generous, 
Christmas-loving and hip: the mobile phone operator would give away free 
handsets to lucky Twitter users who used the tag #mademesmile to tell the 
company what made them beam.

Telco complaints scheme under fire from Consumer NZ, Tuanz
The award-wining Telecommunications Disputes Resolution Scheme, which has shed 
several members since it began over two years ago, is under fire from consumer 

nz: Wilde laments wait for ultrafast network
It is disappointing Wellington was not included in the first tranche of regions 
that will get ultrafast broadband under a government scheme, Greater Wellington 
regional council chairwoman Fran Wilde says.

Dutch man had up to 50 child victims [Reuters]
Dutch police arrested a 19-year-old man on Saturday on suspicion of joint 
responsibility for a cyber attack on the website of the public prosecution 

Police arrest paedophile babysitter in one of the Netherlands' worst abuse cases
Parents of dozens of young children in Amsterdam have been warned their children 
may have been abused by a babysitter in one of the worst sexual abuse cases to 
come to light in the Netherlands.


(c) David Goldstein 2010

David Goldstein
email: goldstein_david&#167;yahoo.com.au
web:  http://davidgoldstein.tel/
phone: +61 418 228 605 - mobile; +61 2 9665 5773 - office/home
"Every time you use fossil fuels, you're adding to the problem. Every time you 
forgo fossil fuels, you're being part of the solution" - Dr Tim Flannery

Received on Sun Dec 12 2010 - 18:30:25 UTC

This archive was generated by hypermail 2.3.0 : Sat Sep 09 2017 - 22:00:10 UTC