International Telecommunication Union   ITU
Site Map Contact us Print Version
 Thursday, 03 March 2005

In this article, Joanne VanAuken says the recent formation of the Voice over IP Security Alliance (VOIPSA) may help increase VoIP security by increasing security awareness and providing free testing tools. While VoIP technology is advancing toward becoming a viable and potentially critical infrastructure for businesses and governments, it also carries the threat of hacking and eavesdropping. Application-level attacks are inevitable and voice spam is also a legitimate worry. If not implemented and secured, VoIP technology will open networks and organizations to increased risk. Ms. VanAuken hopes the VOIPSA will gain acceptance in the security community through vendor collaboration.

Thursday, 03 March 2005 12:49:24 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 02 March 2005

This keynote talk (PDF) by Duane Northcott dating from 2003, describes some of the shifts underway in the forces that shape computing including:

  • Computing defined by Moore’s Law giving way to new model driven by bandwidth
  • Storage can make up for the lack of unlimited, ubiquitous bandwidth

This enables a new computing architectural model which provides for consolidation of clients through remote display technology and mobility through virtualized computing environments (VCEs).

This paradigm shift (which will be driven separately by security issues) will provide major new opportunities for service providers to provide virtualized computing environments and not just connectivity. This suggest that a more centralized computing model with dumb virtual computing environment terminals on the edges may win out yet over today's Internet end-to-end model. There are others who suggest this is where Google's strategy is heading.

Wednesday, 02 March 2005 12:32:46 (W. Europe Standard Time, UTC+01:00)  #     | 

Recently ITU-T Study Group 2 (SG2) determined a a new draft Recommendation to clarify the management of the top level domain “.int”. The draft Recommendation (Word), named (Word) is now considered stable and will be sent to the ITU membership. Unless comments are received, it would be expected to be approved at the December 2005 meeting of SG2. The draft Recommendation (Word) also contains a liaison from SG2 which has been transmitted to ICANN.

Wednesday, 02 March 2005 11:39:42 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 01 March 2005

The ITU Council Working Group on WSIS held a meeting on 13-14 December 2004 discussing ITU activities relevant to the World Summit on the Information Society. The Working Group is to prepare, based on inputs of ITU Member States and Sector Members, as well as those of the Secretary?General and the Directors of the Bureaux and submit to ITU Council proposals on  necessary ITU actions to help accomplish the goals and objectives articulated in the WSIS Declaration of Principles and Plan of Action.

Some of the input documents to that meeting relate to Internet governance including:

Tuesday, 01 March 2005 11:51:12 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 28 February 2005
Monday, 28 February 2005 17:29:50 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 24 November 2004
A recent report by KPMG Australia (press release) illustrates the powerful impact that broadband is having and will continue to have on national economies. The report gives one of the clearest pictures to date as to why broadband should be a national priority for all countries and not just Australia. KPMG has gathered information from recent research and empirical evidence and produced a report entitled Leaders or Laggards? Australia's Broadband Future (PDF). [via CommsWatch]
Wednesday, 24 November 2004 22:36:52 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 18 November 2004
Attacks using massive botnets of compromised PCs are becoming more and more sophisticated and organised gangs are more likely than ever to be behind online attacks, according to a new VeriSign report. The trend appears to be towards more sophisticated attacks by more organised groups, VeriSign said in its twice-yearly Internet Security Intelligence Briefing, released on Tuesday. The criminal groups increasingly rely on massive numbers of compromised home PCs to launch their attacks, said Mark Griffiths, vice-president for VeriSign.
Thursday, 18 November 2004 10:45:09 (W. Europe Standard Time, UTC+01:00)  #     | 

ZDNet has an interview with Richard Clarke where he discusses cybersecurity issues in Straight Talking on Terror. [via Slashdot]

Thursday, 18 November 2004 10:22:17 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 01 November 2004

The Economist asks: "Will charging based on content come to the internet? The history of transportation offers clues."

In a recently published paper, Andrew Odlyzko, a professor at the University of Minnesota, divines lessons from the history of transportation to explain the telecoms industry's attraction to price discrimination, and what it may mean in future. Of course, in general telecoms, companies already exploit variations in what customers are willing to pay for digital bits, depending on whether they take the form of a cable television programme or an SMS text message. On the internet, however, charging according to content would mark a big change.

On the net, discrimination might mean one price for web and e-mail traffic, another for instant messaging and still others for telephone calls, music and films. Is it likely? Mr Odlyzko hopes not, although history strongly suggests that the temptation exists. He thinks that price discrimination might not be in telecoms companies' interests after all. Unlike on canals, toll roads and so forth, internet capacity is abundant. Internet service is therefore a commodity. Simpler, flat-rate pricing, he argues, is likely to increase usage: discrimination would turn some users away.

Indeed, he says, distinguishing between different types of traffic would mean so much technical rejigging that the openness of the internet would be destroyed. Because the internet is decentralised and simply priced, it is cheap for many other networks - run by big companies, universities and telecoms firms - to connect to it. This in turn gives the internet a great capacity for innovation. Price discrimination could jeopardise all this. While content delivery does lend itself to a closed network, connectivity does not. Open networks are likely to win because they can attract more revenues from users,Mr Odlyzko says. Is this wishful thinking? History, as he shows, is full of examples of successful price discrimination. The telecoms companies may yet think it worth a try.

[via E M E R G I C . o r g]

Monday, 01 November 2004 13:17:09 (W. Europe Standard Time, UTC+01:00)  #     | 
The North American Network Operators Group (NANOG) conference, a gathering of Internet Service Provider (ISP) engineers and vendors convenes three times a year for mostly technical conversation along with social networking. The recent NANOG conference in Reston Virginia saw some unusually direct talk about Spam and the ISPs that tolerate it from America Online's Postmaster, Charles Stiles. [via CircleID]
Monday, 01 November 2004 13:04:31 (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, 27 October 2004

The UK mobile phone operators, O2, Orange, TMobile, Virgin Mobile, Vodafone and 3, have today appointed a body to oversee the self-classification of new forms of adult commercial content on mobiles. The new body, which is named the Independent Mobile Classification Body (IMCB), is a subsidiary of premium rate regulator ICSTIS, and has been formed for this purpose. It has now launched a classification framework (press release (Word)) against which providers of commercial content to mobile subscribers will be able to self-classify new forms of content such as still images and video clips. [Via Ewan Sutherland's blog]

Wednesday, 27 October 2004 02:22:38 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 19 October 2004

Lawrence Solum has posted another example of a study showing how ISPs can take down Internet content without any justification.

The Bits of Freedom group, a non-profit Dutch digital rights advocacy organization, recently completed a study to show how easy it is to compel ISPs to disable a customer's web site. They opened an account with 10 different Dutch ISPs and uploaded text from the famous author Multatuli, from 1871. The text stated that the work belonged to the public domain (Multatuli died in 1881, 117 years ago). They then created a fake society to act as the copyright holder and sent take down notices to all the ISPs from a Hotmail e-mail account. 7 of the 10 ISPs took the site down without even having looked at the site. 1 ISP forwarded the customer's information to the fake plaintiff, even though that information was never asked for. In all cases, the customer was informed, but few ISPs sent the full complaint to the customer, and gave only a very short amount of time to the customer to reply. One ISP gave the customer only 3 hours to respond before it removed the material. Only one ISP requested verification of the fake plaintiff's identity because of the dubious hotmail e-mail address.

Tuesday, 19 October 2004 17:10:15 (W. Europe Standard Time, UTC+01:00)  #     | 

The government of India's Ministry of Communications and Information Technology, Department of Telecommunications, has released its broadband policy. During their public consulations, the ITU Strategy and Policy Unit provided its broadband background research and case studies on promoting broadband to the Telecom Regulatory Authority of India (TRAI). [via Om Malik on Broadband]

Tuesday, 19 October 2004 16:24:42 (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, 12 October 2004
Tuesday, 12 October 2004 11:35:04 (W. Europe Standard Time, UTC+01:00)  #     | 
Tuesday, 12 October 2004 11:34:35 (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, 08 October 2004

Google as the Networked Computer from E M E R G I C . o r g. An extract:

"Morgan Stanley’s Mary Meeker wrote in a recent report on Google: “Particularly, with the launch of Gmail, we became intrigued at the possibility that Google could create a distributed computing model layered over user-generated content. Right now users can have 1GB of webmail storage—but with potentially tens of thousands of servers, and commensurately cheap storage space, we wonder about the possibility of Google providing a thin application “desktop” that resides on the browser, where users could jot brief notes (GWord?), do basic calculations (GExcel?), and of course, search. The April 2004 registration of by Google could lend some credibility to this line of thinking. Ultimately, we believe the company could have a significant opportunity ahead of it in Search / Find / Obtain well beyond the domain.”

Are we heading toward a virtualized computing environment, as argued in this talk by Duane Northcutt CTO, Silicon Image, Inc, entitled Mega-Gates, Mega-Bytes, & Mega-Bits Per Second: Three major forces and how they are changing computing (PDF).

Friday, 08 October 2004 20:54:33 (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, 13 August 2004
Spectrum Policy.

The Economist writes that "governments and industries are bracing themselves for the possibility that radio interference will become a thing of the past."

On one side, therefore, are notions of radio frequencies as scarce resources that can be used by only one transmitter at a time and are worth lobbying and paying billions for; on the other side is the idea that any number of transmitters and receivers can peacefully co-exist on the airwaves and that spectrum should therefore be open to all—not individual property, but rather a commons. To understand this debate, one must look back at history; to understand its importance, at economics.

The article discusses four technologies:
- spread spectrum or wideband
- smart antennae
- mesh networking
- cognitive radios

[E M E R G I C . o r g]
Friday, 13 August 2004 17:27:02 (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, 12 August 2004
Cellphones-WiFi Links.

WSJ writes:

Imagine walking to work while talking on your cellphone. Out on the street, you're using a cellular network and paying your mobile provider for each minute you gab. But once you reach the office, your cellphone detects a signal from your company's wireless Internet, or Wi-Fi, transmitter and automatically switches you from the cellular network to the Wi-Fi one. Your call is now being routed over the Internet, saving money on cellphone fees. You're also able to browse the Web on your cellphone at superfast broadband speeds.

Such technology -- under development in Japan and elsewhere -- stands to revolutionize telecommunications on two levels. For the consumer, the technology combines the convenience of cellular access with the low cost and high speeds of Wi-Fi, all in a single device. For the industry as a whole, this technology illustrates a new but increasingly common theme: how the convergence of once-discrete technologies -- in this case, mobile-phone service and the Internet – is pitting unlikely rivals against each other in a battle for chunks of a brand-new territory.

Japan serves as a prime example. Here, two companies have just announced handsets that function on cellular and wireless networks. One is made by NEC Corp. and will be marketed by NTT DoCoMo Inc., Japan's largest cellular provider. The other device is from Fujitsu Laboratories Ltd., a unit of computer-maker Fujitsu Ltd., which has long cooperated with DoCoMo by making handsets for the carriers' exclusive use. This time, however, Fujitsu, in a joint-project with telecommunications equipment-maker Net-2Com Corp., is striking out on its own.

Of course, Japanese companies aren't the only ones developing such devices. Other companies, including Motorola Inc., Schaumburg, Ill., and Hewlett-Packard Co., Palo Alto, Calif., have unveiled phones that combine cellular and Wi-Fi technology.

[E M E R G I C . o r g]
Thursday, 12 August 2004 13:53:19 (W. Europe Standard Time, UTC+01:00)  #     | 
Ofcom's VoB timetable. What Ofcom calls Voice over Broadband (VoB) and everyone else calls Voice over Internet Protocol (VoIP) is exercising the minds of several teams at the regulator. It was originally intended to publish a consultation on consumer protection aspects of VoB in early summer, but Ofcom is now planning to publish a complete set of coordinated VoB documents at the beginning of September to include consumer protection, regulatory and numbering issues. [CommsWatch]
Thursday, 12 August 2004 13:31:39 (W. Europe Standard Time, UTC+01:00)  #     | 
The UK communications market. Ofcom has today published its Communications Market 2004 report together with a media release overview of the trends. It all makes for fascinating reading. There are fundamental economic shifts in the landscape with long-term significance. For the first time ever, subscription revenue... [CommsWatch]
Thursday, 12 August 2004 13:31:10 (W. Europe Standard Time, UTC+01:00)  #     | 
Thursday, 12 August 2004 13:30:29 (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, 19 July 2004
Asia Pacific ENUM Engineering Team.

Press Release about Formation of APEET

Singapore, July 19, 2004 - [CNNIC] (China Network Information Center), [JPRS] (Japan Registry Service), [KRNIC] (Korea Network Information Center), [SGNIC] (Singapore Network Information Center) and [TWNIC] (Taiwan Network Information Center) today announced the formation of Asia Pacific ENUM Engineering Team (APEET), an informal technical project team formed to coordinate and synergize ENUM activities in the Asia Pacific region.

The proposal to form APEET was discussed during an ENUM BoF (Birds-of-a-Feather) session at APRICOT (Asia Pacific Regional Internet Conference on Operational Technologies) in February 2004. Founding member organizations of APEET shared a common vision that as a collective group, they will be able to achieve greater community awareness and better interoperability of ENUM-based trials.

"ENUM allows IP devices to be assigned a telephone number which is globally interoperable," says James Seng, Chairman of APEET. "It is a key enabling technology for seamless IP Telephony which will greatly benefit the end-users."

Before the formation of APEET, each member organization has been conducting its own ENUM trials, most of which are isolated trials conducted within each member organization’s country/region. With the formation of APEET, member organizations will be able to implement technical solutions that facilitate ENUM trials across Asia Pacific.

"We are extremely excited about the formation of this much needed organization," says Hiro Hotta, Director JPRS. "We are ready to bring ENUM trials to the next level."

One of APEET's key project is to implement a live ENUM trial at APRICOT 2005, Kyoto, Japan. The live trial will allow hundreds of APRICOT participants to experience IP Telephony using wireless SIP Phones and calling each another with standard 10-key telephone interface via ENUM. The live trial, believed to be the first of its kind, will serve to demonstrate and educate the technical community on the power, capabilities and feasibility of ENUM together with SIP.

"This looks like one of the most exciting events of 2005 with a demonstration of technologies to rock Asia Pacific", says Richard Shockey, co-Chair of Internet Engineering Task Force (IETF) ENUM Working Group.

The formation of APEET has been well received by the Industry. (APNIC) Asia Pacific Network Information Center has extended its goodwill to host DNS records of "" – the selected "golden root" of APEET technical trials. APEET is also fortunate to have individual experts member such as Richard Shockey.

APEET welcomes all Asia Pacific ccTLD administrators (or its designated representatives) to join and contribute towards the success of ENUM adoption in Asia Pacific.

For more information, please visit

Media Contact:

James Seng

[James Seng's Blog]
Monday, 19 July 2004 13:34:35 (W. Europe Standard Time, UTC+01:00)  #     |