Cloud

The Failures of Internet Governance

100%
0%

Government snooping and cybercrime exacerbate the basic problem of having a world without borders living inside a world with many borders.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
gnuian
50%
50%
gnuian,
User Rank: Ninja
5/22/2014 | 4:21:07 AM
Human Rights vs Nice to Haves
Infrastructure of any kind can be changed at any time once it has become solely regulated by a Government, unless you live in an overly successful democracy.  This fight right now is a proposal, however, and not a fight for our "freedom" or "right" to the Internet.  Just as Americans had to fight "to be free" when we came here to North America, we will have to fight "to have a free Internet".  Dmitri Alperovitch is right in that we can't assume we're going to have the same Internet in the near future that we've grown accostomed to.  Some countries - UN members and otherwise - are using Edward Snowden as an indicator it is time to take control of the Internet, even create their own Internet that silos off other countries, particularly the United States, and they have every right to do that, just as we do.  Because, unfortunately, the Internet being freely available isn't directly a human rights issue.  Freedom of speech and accessibility to forums that allow us to be heard globally are human rights issues, I believe, but how we get that done is another story.  So, we need to be realistic here.  If we truly want open, inclusive and participatory Internet governance, we need to strengthen our bargaining powers and negotiation skills, and be ready to fight.
StephenJ4
100%
0%
StephenJ4,
User Rank: Apprentice
5/15/2014 | 11:52:25 PM
Quis custodiet ipsos custodes?
The Internet inherited the theoretical "trust" of the forerunner Arpanet. Originally connections were for US military use in case of nuclear war then Universities and other Institutions involved in military research were added. In part because access to the network was through authorized computer centers and also "the Academic environment is Honest"; every node became a trusted node. (Considering the amount of faked research (c.f. Dr Teller) and Academic backstabbing, the honesty/trust thing was over rated. Still present in the IETF RFC system.). Internet grew up with IP which grew up with Unix (NCP original Unix/Internet protocol ~1971), and Unix (SunOS/BSD) influence is seen in BGP. We would probably not have such a security mess if the Morris Worm was taken for the alarm it was meant to be. I appreciate the built-in security in IPv6, however it remains that IPv6 is a primary attack tool commonly used by malware. Changes in Internet governance including core protocols like BGP might help. But thinking of the Republican bill in US Congress to requiring US control of the Internet bring up the age old "Who'll watch the watchers" saying.  Currently any State with control of a TLD can knock out the Internet.

Politics of course triumphs security.
Kwattman
50%
50%
Kwattman,
User Rank: Apprentice
5/1/2014 | 11:29:42 AM
Re: Biggest fears about Internet governance trends?
Great points raised and I agree - the views are divergent, but underneath both seems to be an agreement that these are dangerous waters. Open communication solves more than restricted controls but then governments usually want to control the information and propaganda their people see. 
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
4/28/2014 | 2:08:05 PM
Biggest fears about Internet governance trends?
Sara, thanks for raising these issues about control v freedom of the Internet and how (and who) will be making important decisions that impact all of us about privacy and security. Your interviewees offered some divergent views. Do others others in the Dark Reading community agree or disagree?

 

 

 

 
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

CVE-2015-0528
Published: 2015-03-29
The RPC daemon in EMC Isilon OneFS 6.5.x and 7.0.x before 7.0.2.13, 7.1.0 before 7.1.0.6, 7.1.1 before 7.1.1.2, and 7.2.0 before 7.2.0.1 allows local users to gain privileges by leveraging an ability to modify system files.

CVE-2015-0996
Published: 2015-03-29
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive info...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.