October 2013

ISPs warm to IPv6, but old-era Internet plumbing persists

Internet service providers are gradually warming to IPv6, the technology for a vastly more capacious Internet, but there are also signs of a technique to extend the useful lifespan of IPv4.

IPv4 has served the Internet well, but it doesn't have enough addresses for all the world's devices. IPv6 opens the doors for uncountable numbers of devices, but the transition to support it has dragged on for years. A survey by the Number Resource Organization (NRO), a group that represents several central powers that allocate Internet address, shows that Internet service providers (ISPs) are slowly getting IPv6 religion. Of 646 ISPs in the survey, 72 percent are considering promoting IPv6 to their customers in 2013, according to the survey. That's up from 63 percent in 2011 and 2012 and 58 percent in the 2010 survey. Customers are taking advantage of the services, too, though IPv6 data is still only a small fraction of total Internet traffic. In 2010, 60 percent of ISPs said none of their customers use IPv6 connectivity. That's now down to 35 percent. Conversely, the percentage of ISPs that said more than one in fifty of their customers use IPv6 has increased from about 3 percent in 2010 to about 12 percent in 2013.

No harm, no foul: Google wins case over browser tracking

US District Judge Sue Robinson has thrown out a class action against Google, saying the search giant didn’t harm anyone when it tricked Internet Explorer and Apple’s Safari browsers into accepting advertising cookies -- even though those browsers’ settings specifically forbid such cookies. Judge Robinson found Google and two other firms had circumvented the no-advertising settings, but that the consumers were unable to show they had been harmed by the fact the companies collected their data and used it to target ads to them.

Benton Foundation Moves to Expand Communications News and Analysis Service

The Benton Foundation announced that Rebecca Ellis has joined the organization as Writing Associate for the foundation’s Headlines service. Ellis will report directly to Kevin Taglang, who has recently been promoted to Executive Editor. Since 1996, the Benton Foundation has provided free, daily summaries of articles from the consumer and trade press concerning the quickly-changing communications policy landscape. Taglang will focus on creating new content and resources for Benton’s readers. To help guide Benton’s effort to expand its communications news and analysis services, the foundation announced that Robert A. Cohen recently joined its Board of Directors. Cohen is a leading media management consultant with extensive executive and operations experience. He specializes in developing profitable business strategies for existing digital and print businesses, launching and repositioning media brands, integrating print and digital media, and improving subscription, membership, and retail sales for websites, magazines, newspapers, newsletters and other properties. “The Benton Foundation now has the right people and the right tools in place,” said Executive Director Adrianne Furniss, “to deliver to communications policymakers and advocates the news and analysis they need to advance discussions that ensure that media and telecommunications serve the public interest and enhance our democracy.”

New NIST cybersecurity standards could pose liability risks

Critical infrastructure companies could face new liability risks if they fail to meet voluntary cyber security standards being developed by the National Institute of Standards and Technology.

The slated release of the standard draft was delayed due to the federal government shutdown. A preliminary version of the draft standard has been circulating, however. The formal draft version, when released, will be available for public review until February 2014, according to the original schedule. Once the review is complete, a final version of the standards that incorporates changes recommended by stakeholders will be released. The NIST cyber security framework is designed to serve as a security best practices guide for organizations in critical infrastructure sectors, like power, telecommunications, financial services and energy. It is not designed to mandate specific security controls. Rather, it offers broad standards for identifying and protecting critical data, services and assets against cyber threats. While participation in the standards program is voluntary, in practice, critical infrastructure owners and operators will likely be left with little choice but to follow the standards, or at least show they have comparable security measures in place, said Jason Wool, an attorney with Venable LLP, a Washington DC-based law firm. Companies that ignore the standards and are breached will open themselves up to negligence, shareholder and breach of contract lawsuits along with other liability claims. The standards will likely be viewed as the minimum level of care and integrity within critical infrastructure sectors, Wool noted.

'Core Internet institutions' snub US government

The US may just have lost that much more control over the way the Internet is governed.

Ever since its creation, the core functionality of the Internet has more or less been under the direct supervision of the US, by way of the Internet Assigned Numbers Authority (IANA) Functions Contract. But now, after an Internet Corporation for Assigned Names and Numbers (ICANN) summit meeting in Montevideo, Uruguay, many of the major bodies responsible for Internet governance are calling for "accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing." Milton Mueller, writing for the Internet Governance Project, reported on this meeting with no small amount of sangfroid, describing the released statement as "an explicit rejection of the US Commerce Department’s unilateral oversight of ICANN.” Mueller attributed this movement away from the US' default oversight to backlash from "the Snowden revelations about NSA spying on the global Internet," and noted that "You know you’ve made a big mistake, a life-changing mistake, when even your own children abandon you en masse."

Skype under investigation in Luxembourg over link to NSA

Skype is being investigated by Luxembourg's data protection commissioner over concerns about its secret involvement with the US National Security Agency (NSA) spy program Prism.

In 2003, the calling service had a reputation as a tool for evading surveillance but now it is under scrutiny for covertly passing data to government agencies. The Microsoft-owned Internet chat company could potentially face criminal and administrative sanctions, including a ban on passing users' communications covertly to the US signals intelligence agency. Skype itself is headquartered in the European country, and could also be fined if an investigation concludes that the data sharing is found in violation of the country's data-protection laws. Luxembourg's data-protection commissioner initiated a probe into Skype's privacy policies following revelations in June about its ties to the NSA.

NSA Veterans: The White House Is Hanging Us Out to Dry

Gen. Keith Alexander and his senior leadership team at the National Security Agency are angry and dispirited by what they see as the White House's failure to defend the spy agency against criticism of its surveillance programs, according to four people familiar with the NSA chiefs' thinking.

The top brass of the country's biggest spy agency feels they've been left twisting in the wind, abandoned by the White House and left largely to defend themselves in public and in Congress against allegations of unconstitutional spying on Americans. Former intelligence officials closely aligned with the NSA criticized President Barack Obama for saying little publicly to defend the agency, and for not emphasizing that some leaked or officially disclosed documents arguably show the NSA operating within its legal authorities. "There has been no support for the agency from the President or his staff or senior administration officials, and this has not gone unnoticed by both senior officials and the rank and file at the Fort," said Joel Brenner, the NSA's one-time inspector general, referring to the agency's headquarters at Fort Meade (MD). The weak backing from top administration officials has aggravated the relationship between Gen Alexander and the White House, where he has never been warmly embraced.

Competition drives IP transit prices below $1 per Mbps, study says

The ongoing demand for higher capacities to drive even faster network speeds, combined with technological enhancements to deliver greater throughput per bit, is pushing the price of IP transit below $1 per Mbps, according to new data developed by TeleGeography. The price drop, which the research firm did not see as necessarily bad, is being fueled by a highly competitive marketplace where high bandwidth is requisite and price wars are popping up as carriers offer to deliver more speed for less cost.

AT&T, Verizon execs cite 'chilling' effect of murky TDM-to-IP transition regulations

AT&T and Verizon envision a blended wireless and wireline service world, but regulatory executives from both telecommunications companies said that a lack of regulatory clarity in transitioning their legacy time-division multiplexing (TDM) networks to Internet protocol (IP) is a key barrier.

"In 2009, the Federal Communications Commission set some very ambitious objectives, one of which was a complete shutdown of the TDM architecture and merge to IP by 2017," said James Cicconi, senior executive vice president of external and legislative affairs for AT&T. "We're here in 2013 and not a single thing that I can discern has been done to advance that objective." Cicconi said that he has gotten little, if any, guidance from the FCC on the next step. And Craig Silliman, senior vice president of public policy for Verizon, said that while the telco has benefited from a "light touch" regulatory approach for advancing its wireless business, legacy voice service regulations have hindered its wireline moves.

Stanford researchers discover ‘alarming’ method for phone tracking, fingerprinting through sensor flaws

One afternoon late last month, security researcher Hristo Bojinov placed his Galaxy Nexus phone face up on the table in a cramped Palo Alto conference room. Then he flipped it over and waited another beat. And that was it. In a matter of seconds, the device had given up its “fingerprints.”

Code running on the website in the device’s mobile browser measured the tiniest defects in the device’s accelerometer -- the sensor that detects movement -- producing a unique set of numbers that advertisers could exploit to identify and track most smartphones. It’s a novel approach that raises a new set of privacy concerns: Users couldn’t delete the ID like browser cookies, couldn’t mask it by adjusting app privacy preferences -- and wouldn’t even know their device had been tagged. Asked if this sort of work risks putting ideas into the heads of online advertisers, Bojinov said he’d be surprised if someone in the industry wasn’t already exploring these approaches.