Language Selection

English French German Italian Portuguese Spanish

The internet is doing nicely without its own UN

Filed under
Web

Who runs the internet? Who cares? As long as your internet browser sends you to the right location in cyberspace, the technical workings of the World Wide Web aren't really of much concern. Right?

For web users that's right, but for governments and technology bodies around the world, there's a brewing concern about the fact that most of the infrastructure that powers the internet is based in the United States. Of the 13 servers hosting the intricate system that directs us all to the right places on the internet, only three are based outside of the country.

So far that hasn't proven to be any problem.

A bunch of benevolent American university boffins, some military types and a few IT visionaries from the private sector were primarily responsible for getting the network now known as the internet off the ground in the 1970s. They are legends for doing so and have kept a close eye on the internet's development ever since.

The Internet Corporation for Assigned Names and Addresses (ICANN) is the web's current babysitter. But for a technology body, it courts a fair amount of controversy.

The reasons for that are political and commercial. Remember the "internet land-grab"? It kicked into high gear during the dotcom boom as corporates scrambled to reserve the best domain names. The current animosity towards the US-dominated ICANN is a lot like that. No one knows what the future will hold for the internet - and countries, especially developing ones such as India, want a say in how the web will work years from now.

The scenario has played out in the real world since time began. All those conferences of the "big three" (Churchill, Roosevelt and Stalin) that took place toward the end of World War II, were to decide how to carve up control of post-war Europe.

It was a delicate game of give and take. Stalin was happy to abandon the communists in Greece for a bigger prize - dominance in Romania and Poland. Churchill, wanting to counter the power of Russia, demanded the French get a controlling slice of the new Germany.

They also talked about setting up a governing body for the world - the United Nations. Now, that same body is facilitating the debate about the delegation of power on the internet. Unable to agree on a single scenario for governance of the internet, a special UN body has drawn up four.

Option one is for the United Nations to create a "global internet council" that would take total power away from the United States in terms of its control of ICANN.

A more radical plan calls for control of the address system to shift from US to international hands - a new body called the International Internet Council.

Yet another plan calls for the creation of three groups that would be responsible for internet addressing. That sounds like a political and logistical nightmare.

The last option, and perhaps the most sensible, is to leave ICANN intact and simply create a forum for greater debate of net issues.

A long-term, official solution will be hammered out at the UN's World Summit on the Information Society, which will be held in Tunisia in November. It will consider taking up one of the proposed options.

Expect there to be some heated debate and intense lobbying as the future controllers of the internet are elected.

None of this would be an issue, were it not for a couple of ominous signs that the United States is willing to fight like hell to maintain the status quo.

Earlier this year, the US Department of Commerce said it planned to keep its hands on the "root zone" file, a simple text file that's integral to this system of turning internet protocol (IP) addresses into actual web addresses.

Apparently the United States "intends to preserve the security and stability" of the web's architecture and needs to keep control to do so.

On top of that came word last month from US Assistant Commerce Secretary Michael Gallagher that the US government is doing away with plans to have an international body overseeing the workings of the internet. In the context of the "war on terror", it's easy to see the Washington thinking behind this. Cyber-terrorism is a not insignificant threat.

ICANN cut its ties with the Department of Commerce late next year but its desire to keep the power base in the United States is unlikely to change.

US moves to draw the web closer to its chest shouldn't worry the rest of the world. The web is essential to US business. The biggest online traders - the likes of amazon.com and eBay.com - are all American. It's in the interests of the United States for all of us to have unfettered, global access to the web. That's why they haven't ring-fenced it and tried to charge us money to use it.

ICANN needn't change much, but a forum for major new issues needs to be established and the UN needs to have "power of veto" when it comes to major decisions that could inhibit access to the internet in any part of the world.

By Peter Griffin
The New Zealand Herald.

More in Tux Machines

Proxmox VE 4.3 released

Proxmox Server Solutions GmbH today announced the general availability of Proxmox Virtual Environment 4.3. The hyper-converged open source server virtualization solution enables users to create and manage LXC containers and KVM virtual machines on the same host, and makes it easy to set up highly available clusters as well as to manage network and storage via an integrated web-based management interface. The new version of Proxmox VE 4.3 comes with a completely new comprehensive reference documentation. The new docu framework allows a global as well as contextual help function. Proxmox users can access and download the technical documentation via the central help-button (available in various formats like html, pdf and epub). A main asset of the new documentation is that it is always version specific to the current user’s software version. Opposed to the global help, the contextual help-button shows the user the documentation part he currently needs. Read more

Games for GNU/Linux

Security News

  • Tuesday's security updates
  • New Open Source Linux Ransomware Divides Infosec Community
    Following our investigation into this matter, and seeing the vitriol-filled reaction from some people in the infosec community, Zaitsev has told Softpedia that he decided to remove the project from GitHub, shortly after this article's publication. The original, unedited article is below.
  • Fax machines' custom Linux allows dial-up hack
    Party like it's 1999, phreakers: a bug in Epson multifunction printer firmware creates a vector to networks that don't have their own Internet connection. The exploit requirements are that an attacker can trick the victim into installing malicious firmware, and that the victim is using the device's fax line. The firmware is custom Linux, giving the printers a familiar networking environment for bad actors looking to exploit the fax line as an attack vector. Once they're in that ancient environment, it's possible to then move onto the network to which the the printer's connected. Yves-Noel Weweler, Ralf Spenneberg and Hendrik Schwartke of Open Source Training in Germany discovered the bug, which occurs because Epson WorkForce multifunction printers don't demand signed firmware images.
  • Google just saved the journalist who was hit by a 'record' cyberattack
    Google just stepped in with its massive server infrastructure to run interference for journalist Brian Krebs. Last week, Krebs' site, Krebs On Security, was hit by a massive distributed denial-of-service (DDoS) attack that took it offline, the likes of which was a "record" that was nearly double the traffic his host Akamai had previously seen in cyberattacks. Now just days later, Krebs is back online behind the protection of Google, which offers a little-known program called Project Shield to help protect independent journalists and activists' websites from censorship. And in the case of Krebs, the DDoS attack was certainly that: The attempt to take his site down was in response to his recent reporting on a website called vDOS, a service allegedly created by two Israeli men that would carry out cyberattacks on behalf of paying customers.
  • Krebs DDoS aftermath: industry in shock at size, depth and complexity of attack
    “This attack didn’t stop, it came in wave after wave, hundreds of millions of packets per second,” says Josh Shaul, Akamai’s vice president of product management, when Techworld spoke to him. “This was different from anything we’ve ever seen before in our history of DDoS attacks. They hit our systems pretty hard.” Clearly still a bit stunned, Shaul describes the Krebs DDoS as unprecedented. Unlike previous large DDoS attacks such as the infamous one carried out on cyber-campaign group Spamhaus in 2013, this one did not use fancy amplification or reflection to muster its traffic. It was straight packet assault from the old school.
  • iOS 10 makes it easier to crack iPhone back-ups, says security firm
    INSECURITY FIRM Elcomsoft has measured the security of iOS 10 and found that the software is easier to hack than ever before. Elcomsoft is not doing Apple any favours here. The fruity firm has just launched the iPhone 7, which has as many problems as it has good things. Of course, there are no circumstances when vulnerable software is a good thing, but when you have just launched that version of the software, it is really bad timing. Don't hate the player, though, as this is what Elcomsoft, and what Apple, are supposed to be doing right. "We discovered a major security flaw in the iOS 10 back-up protection mechanism. This security flaw allowed us to develop a new attack that is able to bypass certain security checks when enumerating passwords protecting local (iTunes) back-ups made by iOS 10 devices," said Elcomsoft's Oleg Afonin in a blog post.
  • After Tesla: why cybersecurity is central to the car industry's future
    The news that a Tesla car was hacked from 12 miles away tells us that the explosive growth in automotive connectivity may be rapidly outpacing automotive security. This story is illustrative of two persistent problems afflicting many connected industries: the continuing proliferation of vulnerabilities in new software, and the misguided view that cybersecurity is separate from concept, design, engineering and production. This leads to a ‘fire brigade approach’ to cybersecurity where security is not baked in at the design stage for either hardware or software but added in after vulnerabilities are discovered by cybersecurity specialists once the product is already on the market.

Ofcom blesses Linux-powered, open source DIY radio ‘revolution’

Small scale DAB radio was (quite literally) conceived in an Ofcom engineer’s garden shed in Brighton, on a Raspberry Pi, running a full open source stack, in his spare time. Four years later, Ofcom has given the thumbs up to small scale DAB after concluding that trials in 10 UK cities were judged to be a hit. We gave you an exclusive glimpse into the trials last year, where you could compare the specialised proprietary encoders with the Raspberry Pi-powered encoders. “We believe that there is a significant level of demand from smaller radio stations for small scale DAB, and that a wider roll-out of additional small scale services into more geographic areas would be both technically possible and commercially sustainable,” notes Ofcom. Read more