International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Thursday, June 02, 2005

In an article from Reuters: A bill for mandatory logging of emails, phone calls and other electronic communications to combat terrorism and fraud will limit data storage to a year at most, the European Commission said on Wednesday.

Viviane Reding, Commissioner for Information Society and Media, said a similar proposal put forward by four member states in 2004 wanted data to be stored for three to four years, which she said would impose a costly burden on phone and internet companies.

[Via Fergie's Tech Blog and Reuters]

Thursday, June 02, 2005 1:39:30 PM (W. Europe Standard Time, UTC+01:00)  #     | 

In the framework of its Technology Watch activities, ITU-T has recently published a technical paper on radio frequency identification (RFID) and opportunities for its use in mobile telecommunication services. RFID enables data to be transmitted by a tiny portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. It is only recently that the technology has begun to take off in the mass market. Analysts predict that RFID will revolutionize areas of industry, such as supply chain management and the retail business, for example by reducing costs with better stock management. The technical paper presents several ideas for applications of RFID technology in mobile telecommunication services as well as possible areas for standardization efforts. Apart from purely technical concepts, the challenging aspects of security and privacy are discussed. A PowerPoint presentation of the paper is also available.

ITU-T recently set up a correspondence group on RFID in the framework of its Technology Watch and a dedicated e-mail reflector on the matter for initiating studies on the technology. Additionally, ITU-T is to hold a workshop on RFID standardization issues in the first quarter of 2006. [via ITU-T Newslog]

Thursday, June 02, 2005 12:15:07 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, June 01, 2005

The Directorate-General Information Society and Media of the European Commission has released a working document on Broadband access in the EU: situation at 1 January 2005.

"Take-up of high-speed "broadband" internet connections is growing fast, according to figures released on 1 June by Information Society and Media Commissioner Viviane Reding. There are now 40 million broadband lines in the EU, an increase of 70% on last year. This represents 45 000 new broadband lines on average per day, up from 29 000 per day in 2003. The surge in broadband take-up, driven by competition among market players to provide consumers with faster, lower-priced internet access, bodes well for the "i2010" strategy, tabled on 1 June, to boost jobs and growth in the digital economy. New entrants are stepping up investment in broadband infrastructure to build market share. Some European countries are among the top performers in the world while others are lagging behind."

NB: The EU provides statistical rankings in their survey only EU25 member states. The ITU's statistics in broadband include non-EU25 economies.

Wednesday, June 01, 2005 6:08:36 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, May 31, 2005

OECD has released a report on Anti-spam Law Enforcement

"Successful enforcement of anti-spam law serves as an economic disincentive to spammers by imposing fines and penalties which undermine their profits, provides a state-sponsored mechanism for protection and redress to victims of spam-related consumer fraud, and vindicates the privacy rights of spam recipients. Ultimately, an increased enforcement presence may help restore trust in e-mail systems that has been eroded by spam."

For the full report (PDF), click here.

Tuesday, May 31, 2005 4:03:41 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, May 27, 2005

OECD has released a report on Next Generation Network (NGN) development in member countries.

"Over the last several years, a number of the major network operators have put in place network upgrade plans to implement next generation networks (NGN). Some market analysts now predict that the entire Public Switched Telephone Network (PSTN) will evolve into an NGN over the next 10 years or so. Technological change is happening very quickly, underscoring the need for policy and regulation to be based on principles that support consumer interests, such as competition policy, not on specific technical aspects of networks."

For the full report (PDF), click here.  

Friday, May 27, 2005 2:53:13 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The OECD has just published an excellent paper by Suresh RAMASUBRAMANIAN on Spam Issues in Developing Countries (PDF), which is linked to from the OECD antispam toolkit.

Friday, May 27, 2005 2:35:09 PM (W. Europe Standard Time, UTC+01:00)  #     | 

From the ITU-T Newslog: ITU-T has completed the specifications necessary for telecoms operators around the world to offer a ‘super’ triple play of video, Internet and voice services.

The ITU-T Recommendation for very-high-bit-rate digital subscriber line 2 (VDSL2) will allow operators worldwide to compete with cable and satellite operators by offering services such as high definition TV (HDTV), video-on-demand, videoconferencing, high speed Internet access and advanced voice services including VoIP, over a standard copper telephone cable.

VDSL2 will offer consumers up to 100 Mbps up and downstream, a massive ten-fold increase over the more common ADSL. Essentially it allows so-called ‘fibre-extension’ bringing fibre like bandwidth to premises not directly connected to the fibre-optic segment of a telecoms company’s network.

As well as addressing increasing consumer demands, VDSL2 offers telecom carriers a solution that promises to be interoperable with the ADSL kit that many operators already have in place. This interoperability will make the migration of customers to VDSL2 much simpler. Another important feature of VDSL2 is that it will work in both legacy ATM networks and next generation IP based networks.

VDSL2 is seen by many operators as an ideal accompaniment to a fibre to the premises (FTTP) rollout, where for instance fibre is supplied direct to an apartment block and from there copper cable is used to supply residents with high-speed VDSL2.

Yoichi Maeda, chairman of the Study Group responsible for the work said: “We have leveraged the strengths of ADSL, ADSL2+, and VDSL to achieve the very high performance levels that you will see with VDSL2. It looks set to become an extremely important feature of the telecommunications landscape and is a landmark achievement for our members, many of whom were relying on this Recommendation in order to take their businesses to the next level.”

The publication of standardized specifications in an ITU-T Recommendation (G.993.2) means that operators can avoid being locked into a single vendor. As well as the economic advantages that this may bring it also means that operators can select the best solutions according to their needs.

Friday, May 27, 2005 2:09:17 PM (W. Europe Standard Time, UTC+01:00)  #     | 
Friday, May 27, 2005 2:03:01 PM (W. Europe Standard Time, UTC+01:00)  #     | 

At an ITU/EU (ENISA) Regional Seminar on Cybersecurity for CEE, CIS and Baltic States in Riga, Latvia, Robert Shaw of the ITU Strategy and Policy Unit has given a presentation (PDF) on the upcoming ITU WSIS Thematic Meeting on Cybersecurity which will be held June 28-July 1 2005 at ITU headquarters.

Other presentations on available on the event web site, including an update by Pernilla SKANTZ on the establishment of the European Network and Information Security Agency (ENISA).

Friday, May 27, 2005 1:32:33 PM (W. Europe Standard Time, UTC+01:00)  #     | 

From SecurityPipeline: The CIA is conducting a war game this week to simulate an unprecedented, Sept. 11-like electronic assault against the United States.

The three-day exercise, known as "Silent Horizon," is meant to test the ability of government and industry to respond to escalating Internet disruptions over many months, according to participants. They spoke on condition of anonymity because the CIA asked them not to disclose details of the sensitive exercise taking place in Charlottesville, Virginia, about two hours southwest of Washington.

The simulated attacks were carried out five years in the future by a fictional new alliance of anti-American organizations that included anti-globalization hackers. The most serious damage was expected to be inflicted in the closing hours of the war game Thursday.

The national security simulation was significant because its premise--a devastating cyberattack that affects government and parts of the economy on the scale of the 2001 suicide hijackings--contradicts assurances by U.S. counterterrorism experts that such effects from a cyberattack are highly unlikely.

Friday, May 27, 2005 12:20:39 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Here is an unusual production of local Internet content: photographs from the web site of the small Japanese village of Inakadate showing off their beautiful rice-paddy art:

Friday, May 27, 2005 10:36:27 AM (W. Europe Standard Time, UTC+01:00)  #     | 

Via iwar: GAO: Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities, May 26, 2005

While DHS has initiated multiple efforts to fulfill its responsibilities, it has not fully addressed any of the 13 responsibilities, and much work remains ahead. For example, the department established the United States Computer Emergency Readiness Team as a public/private partnership to make cybersecurity a coordinated national effort, and it established forums to build greater trust and information sharing among federal officials with information security responsibilities and law enforcement entities. However, DHS has not yet developed national cyber threat and vulnerability assessments or government/industry contingency recovery plans for cybersecurity, including a plan for recovering key Internet functions. DHS faces a number of challenges that have impeded its ability to fulfill its cyber CIP responsibilities. These key challenges include achieving organizational stability, gaining organizational authority, overcoming hiring and contracting issues, increasing awareness about cybersecurity roles and capabilities, establishing effective partnerships with stakeholders, achieving two-way information sharing with these stakeholders, and demonstrating the value DHS can provide. In its strategic plan for cybersecurity, DHS identifies steps that can begin to address the challenges. However, until it confronts and resolves these underlying challenges and implements its plans, DHS will have difficulty achieving significant results in strengthening the cybersecurity of our critical infrastructures.

Complete Report...

Friday, May 27, 2005 8:50:47 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, May 26, 2005

From a Bridges.org study:

The Software Comparison research project provides the needed background information and advice to people who want to make sound software choices for public computer labs in Africa. The final report represents the first comprehensive analysis of software choices in the African public-access context. The study looked at 121 computer labs in Namibia, South Africa and Uganda, examining the range of factors that affect software choices; the realities of the current situation in Africa; and the long-term implications of software choices for Africa. This research was led by bridges.org and supported by Collaborating Partners SchoolNet Africa, the International Development Research Council (IDRC) and the Open Society Institute (OSI). In addition, a number of field-study partners provided access to computer labs for the study. A high-level Advisory Group, comprised of experts in the field from both sides of the debate, was actively involved in the study on a regular basis: reviewing project documents (methodology, report drafts etc.), providing feedback and additional resources.

Final report: The final research report was released in May 2005. The accompanying news announcement provides a brief summary and background to the study. The full report and separate Annex can be downloaded as pdf files.

Thursday, May 26, 2005 4:42:19 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Communications has a post on the recent IMTC Forum 2005: The Future of Next Generation Networks: Convergence of VoIP, Videoconferencing and Mobile, May 10-12, 2005.

The IMTC is an industry association best known for championing video telephony.  Many of the attendees have devoted 10, 15, even 20 years of effort to making video telephony work. 

All of the presentations made at the Forum are linked to in this document (Word) on the IMTC web site. Some presentations worth highlighting include:

Thursday, May 26, 2005 2:47:47 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The OECD has released its Broadband Statistics for OECD economies as of December 2004. The site includes some good graphics.

NB: The OECD provides statistical rankings in this survey only for OECD member economies. The ITU's statistics in broadband include non-OECD economies.

Thursday, May 26, 2005 10:00:38 AM (W. Europe Standard Time, UTC+01:00)  #     | 

The Institute for Prospective Technological Studies of the EC Joint Research Center (JRC) has released a report on the "Demand for Furture Mobile Communication Markets and Services in Europe". 

"In order to prepare for the International Telecommunications Union (ITU) Word Radio Conference in 2007 (WRC'07), where national delegations will consider the future demands of wireless services for radio spectrum, efforts are being made to reach agreement on future traffic volumes within the European Union. This study forms part of this effort and was led by the Institute for Prospective Technological Studies (IPTS1), on the request of DG INFSO. It aims to explore (qualitatively) the way that citizens will use future wireless communications services over mobile networks, and to assess (quantitatively) the traffic that will be generated by 2010, 2015 and 2020."

The report explores different possible scenarios for Europe for the future. "Disposable income determines consumption – what is bought and how it is bought. The failure to understand this or to grasp the real utility to the user of the service, combined with affordability and accessibility, has led to many errors in estimating demand for services in telecommunications. Too often, a technocentric view of new services has resulted in demand being vastly underestimated or overestimated. Thus while some of the biggest product launches in communications services over the past 20 years have delivered flops, seemingly trivial services have exploded. For instance, the impact of a simple service, SMS, has been greatly underestimated and was largely unforeseen by the industry."

"The initial European impacts over 2000 to 2004 of WAP (Wireless access protocol) for mobile web access to rich data services were greatly overestimated for its first form - only now is its utility being seen. We should also note that in wireless services, a regional market such as the European Union will be increasingly shaped by a global market. In 2020, there could be of the order of 5 billion mobile users, shaping technology, services, content and pricing."

For the full report, see here.

Thursday, May 26, 2005 9:12:34 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, May 25, 2005

Skype CEO and co-founder Niklas Zenström's keynote presentation from VON Europe 2005 is now available for download. [via Pulverblog]

His two solutions for emergency services calling are interesting, particularly the second:

  • Provide open interface to emergency centrals which can receive text, voice and video over IP
  • Build up national IP geo mapping databases managed by national authorities

Update: The Register has their take on the speech.

Wednesday, May 25, 2005 5:13:01 PM (W. Europe Standard Time, UTC+01:00)  #     | 

A very comprehensive survey site on Computer Forensics from Dave Dittich.

Wednesday, May 25, 2005 4:08:46 PM (W. Europe Standard Time, UTC+01:00)  #     | 

"Anti-spam enforcement authorities in 13 European countries recently agreed to share information and pursue complaints across borders in a joint drive to combat electronic junk mail. The nations will cooperate in investigating complaints about crossborder spam from anywhere within the European Union to make it easier to identify and prosecute spammers anywhere in Europe.The voluntary agreement establishes a common procedure for handling cross-border spam complaints". The participating European countries, including Austria, Belgium, the Czech Republic, Ireland, Italy, Lithuania, the Netherlands, and Spain, will through these initiatives try their best to address complaints from each other.

Spain's data protection authority, Agencia Española de Proteccion de Datos, and the U.S. Federal Trade Commission also recently signed a bilateral memorandum of understanding to promote enhanced cooperation and information sharing on spam enforcement activities. In July 2004, the FTC signed a similar agreement with the United Kingdom and Australia.

"Germany is taking spam control into its own hands. People who send junk e-mail in Germany will face fines of as much as 50,000 euros according to a draft law agreed upon by Germany's ruling coalition of Social Democrats and Greens. The law will also prevent spammers from disguising their name and the nature of the e-mail. German lawmakers hope that the steep fine will make people think twice about sending spam. It has been illegal to send spam in Germany since July 2004, but the ruling coalition hopes the new legislation will help stop the practice."

Click here to view the full article.

Wednesday, May 25, 2005 2:33:24 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The 2005 ASEM Cyber Security Workshop, Seoul will be held in Republic of Korea, hosted by the Ministry of Information and Communication of Korea. The ITU WSIS Thematic Meeting on Cybersecurity will follow shortly afterwards, June 29-July 1 2005 in Geneva, Switzerland.

Wednesday, May 25, 2005 11:42:48 AM (W. Europe Standard Time, UTC+01:00)  #     | 

2005 marks the 20th anniversary of the publication of the report of the Independent Commission ("Maitland Commission") on Worldwide Telecommunication Development, entitled "The Missing Link". To mark the anniversary, ITU has published the original report on its website, in English, French and Spanish.

The "missing link" of the title's report refers to the gap in telecommunications development, within and between nations. Although the term "digital divide" is now more common, the original arguments presented in the report are still quite valid. In particular, the report calls for "decisions at the highest political level" to bring "all of mankind within easy reach of a telephone by early part of the next century". Research by ITU (see the 2003 World Telecommunication Development Report) indicates that, by the start of this century, just over 80 per cent of the world's population were within reach of phones (increasingly mobile phones rather than fixed line telephones). Although this falls short of the original target, the "decisions at the highest political level" that the report calls for is now closer to fruition with the holding of the World Summit on the Information Society (WSIS), which is the first time this issue has been discussed at the Heads of State and Heads of Government level. The WSIS Declaration of Principles, adopted by the first phase of the WSIS in December 2003 contains the following commitment (para 10):

"We are also fully aware that the benefits of the information technology revolution are today unevenly distributed between the developed and the developing countries and within societies. We are fully committed to turning this digital divide into a digital opportunity for all, particularly for those who risk being left behind and being further marginalized". 

Wednesday, May 25, 2005 11:21:59 AM (W. Europe Standard Time, UTC+01:00)  #     | 

H.E. Ambassador Janis Karklins (Latvia) has invited WSIS stakeholders to take part in an informal consultation on implementation and follow-up of the Plan of Action for the World Summit on the Information Society (WSIS), to take place in Room 26 of the United Nations in Geneva, on 13 June, from 10-13 and 15-18 (see invitation letter). The consultations will take place just ahead of the meeting of the UN Working Group on Internet Governance.

These consultations will concern, in particular, paras 10-11 of the draft Operational document for the Tunis phase of the Summit, and the compilation of comments on that draft. The deadline for further comments is 31 May 2005.

The consultations follow-on from those hosted by ITU's Working Group on WSIS (WG-WSIS) that were held on 2 May

Wednesday, May 25, 2005 10:51:50 AM (W. Europe Standard Time, UTC+01:00)  #     | 

According to Warren's Washington Internet Daily on 24 May 2005:

Stuck in an "embryonic" stage of sharing cybersecurity information, many European countries look to govt. for encouragement, the head of the European Network & Information Security Agency (ENISA) said in an interview. Despite claims of willingness to work together, a lack of actual cooperation is the chief roadblock to better infrastructure protection, said ENISA Exec. Dir. Andrea Pirotti, adding that many stakeholders want national or European Union authorities to nudge them. ENISA will be the "director of the orchestra" beginning later this year, Pirotti said.

The new agency has created working groups on security awareness-raising, risk analysis and assessment, and computer emergency response teams (CERTs), Pirotti said. The CERT panel will devise an effective way to stimulate cooperation among European nations and to establish as many CERTs as possible, he said. In smaller communities, ENISA may also push for warning, advice and reporting points (WARPs), sometimes called "mini-CERTs." Often set up and run by volunteers, WARPs field network threat information from and report problems to the larger CERTs, Pirotti said. But unlike CERTs they don't provide technical fixes.

ENISA working groups will set best practices with detailed procedures for establishing CERTs and WARPs, Pirotti said. ENISA officials then will take the ideas to national officials and push for their creation. "We shall do our best, but this is just the beginning," he said. Local authorities are keen on the idea but want ENISA to give them a framework and suggestions. Most know the risks of not having CERTS, he said, and are willing to invest in them.

ENISA is beginning to develop a presence, joining the ITU at a June forum on network security in central and east Europe, the former Soviet bloc and the Baltic states (WID May 23 p6). The group also plans a late Sept. information security conference in Budapest.

A permanent ENISA stakeholder group has 30 members from industry, academia and the consumer community, Pirotti said. The group, which first met in March, convenes June 2 to discuss mobile phone security, among other issues.

ENISA's workforce is far from complete -- of 40 workers authorized, 4 have been hired -- but a massive recruiting effort for agency administrative and technical personnel now underway will end in late July, Pirotti said. ENISA will occupy its permanent hq in Heraklion, Greece, in Sept. and start work in earnest in Oct. or Nov. -- Dugie Standeford

Wednesday, May 25, 2005 9:33:10 AM (W. Europe Standard Time, UTC+01:00)  #     | 

From the FTC's Operation Spam Zombies page:

Spammers use home computers to send bulk emails by the millions. They take advantage of security weaknesses to install hidden software that turns consumer computers into mail or proxy servers. They route bulk email through these "spam zombies," obscuring its true origin.

As part of a worldwide effort to prevent these abuses, the FTC announces "Operation Spam Zombies." In partnership with 20 members of the London Action Plan and 16 additional government agencies from around the world, the Commission is sending letters to more than 3000 Internet service providers (ISPs) internationally, encouraging them to take the following zombie-prevention measures:

  • block port 25 except for the outbound SMTP requirements of authenticated users of mail servers designed for client traffic. Explore implementing Authenticated SMTP on port 587 for clients who must operate outgoing mail servers.
  • apply rate-limiting controls for email relays.
  • identify computers that are sending atypical amounts of email, and take steps to determine if the computer is acting as a spam zombie. When necessary, quarantine the affected computer until the source of the problem is removed.
  • give your customers plain-language advice on how to prevent their computers from being infected by worms, trojans, or other malware that turn PCs into spam zombies, and provide the appropriate tools and assistance.
  • provide, or point your customers to, easy-to-use tools to remove zombie code if their computers have been infected, and provide the appropriate assistance.

In a later phase, the Operation plans to notify Internet providers worldwide that apparent spam zombies were identified on their systems, and urge them to implement measures to prevent that problem.

Business Guidance

Letter text translations (provided by participating agencies):

Wednesday, May 25, 2005 8:32:41 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, May 24, 2005

At the WSIS Thematic Meeting "Towards the realisation of the ubiquitous network society", held 16-17 May in Tokyo, co-organised by MIC Japan, ITU and United Nations University (UNU), a new project to develop and mass-manufacture a US$100 laptop, primarily for use in schools, was launched by MIT Media Lab together with an Open Computer Initiative from UNU. The partnership aims to have working prototypes available for demonstration by the Tunis Phase of the World Summit on the Information Society (WSIS), November 16-18 2005. The initial specifications for the laptops are 500 MHz processor, 1 GB hard drive and wi-fi enabled, running LINUX. Over time, it is planned that the laptops would become more powerful, but not more expensive.

For more information, see: http://www.unu.edu/hq/rector_office/press2005/mre12-05.doc.

Tuesday, May 24, 2005 8:22:33 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, May 23, 2005

CNN/Money is reporting that US Bank of America Corp. and Wachovia Corp. are among the big banks notifying more than 670,000 customers that account information was stolen in what may the biggest security breach to hit the banking industry.

Account information on the customers was illegally sold by bank employees to a man identified as Orazio Lembo, whom police said was doing business by illegally posing as a collection agency.

[via Slashdot]

Monday, May 23, 2005 9:13:54 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Gregg Keizer writes on TechWeb: Spammers and phishers are using new kinds of attacks to build wide-ranging profiles of online users -- everything from their political views to their sexual preference -- a security firm said Monday.

[via Fergie's Tech Blog]

Monday, May 23, 2005 9:13:42 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Declan McCullagh writes on C|Net News:

Remote-controlled "zombie" networks operated by bottom-feeding spammers have become a serious problem that requires more industry action, the Federal Trade Commission is expected to announce on Tuesday.

The FTC and more than 30 of its counterparts abroad are planning to contact Internet service providers and urge them to pay more attention to what their customers are doing online. Among the requests: identifying customers with suspicious e-mailing patterns, quarantining those computers and offering help in cleaning the zombie code off the hapless PCs.

To be sure, computers infected by zombie programs and used to churn out spam are a real threat to the future of e-mail. One report by security firm Sophos found that compromised PCs are responsible for 40 percent of the world's spam--and that number seems to be heading up, not down.

But government pressure--even well-intentioned--on Internet providers to monitor their users raises some important questions.

[via Fergie's Tech Blog]

Monday, May 23, 2005 1:35:03 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Sunday, May 22, 2005

Mobile Phones Change Ways Africans Live and Do Business

The rapid growth in mobile phone use throughout the developing world, especially in sub-Saharan Africa, is helping to transform national economies, producing a thriving entrepreneurial class and marked growth in private capital, according to Leonard Waverman, an economist with the London Business School.

Speaking at the American Enterprise Institute (AEI) in Washington May 5 on a panel of fellow economists and representatives of one of Europe’s largest wireless telephone providers, Vodafone UK, Waverman pointed to the extensive use of mobile phone accounts in the developing countries as a new source of economic development in Africa.

Although mobile phone penetration is only about 9 percent in Africa generally, mobile phones account for approximately 75 percent of all telephone connections in 19 of the poorest African countries, Waverman said, adding, "If you look at it globally, the growth in the number of mobile telephone subscribers in developing countries is twice that in the developed world"

In most instances, he explained, mobile phone infrastructure is easier to set up and cheaper to maintain than the standard fixed-line telecommunications systems that were technological holdovers from the colonial past and often controlled by the government. The new systems sidestep the control issue, have fewer technical problems and are having a noticeable effect on the future of telecommunications in Africa, as antiquated analog networks are being replaced with newer digital ones.

Scott Wallsten, formerly an economist at the World Bank and now a fellow at AEI, added that "mobile telephony often succeeds in developing countries because state monopolies rarely view [the companies] as a threat -- until they are established. By then, the investment has been made, and the customer base has already been set up."

Waverman stressed that a good communications network is important in producing economic growth in developing nations by transforming the enterprise sector and spreading wealth as far as the voice can be carried through the ether.

"Information is power. Providing information to everyone takes the power away from the few. And we are seeing this [dynamic] occurring across much of Africa today. We are seeing the emergence of a new middle class," he said, as new businesses and businessmen emerge with new capital for growth.

[US Dept of State via my weblog]

Sunday, May 22, 2005 9:13:59 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Internet Telephony Providers Can Seek Exemption from Obligations: On April 15 2005 the Norwegian Post and Telecommunications Authority published a policy paper entitled Regulation of VoIP Services. The paper presents the authority's views on how Voice over Internet Protocol (VoIP) services are regulated under Norwegian law.

The policy paper indicates that VoIP service offerings that are designed for any-to-any communication and are publicly available are considered to be publicly available telephony services. Therefore, these VoIP services are subject to all obligations to which providers of electronic communication services and publicly available telephony services are subject under the Electronic Communications Act and the Regulations on Electronic Communications Networks and Services.

The policy paper also indicates that the authority would consider granting temporary exemptions from some of the obligations imposed on internet telephony providers offering VoIP services that are designed for any-to-any communication and are publicly available.

On May 2 2005 the authority sent a letter to service providers offering VoIP services in Norway, requesting them to send applications for temporary exemptions by June 1 2005.

From International Law Office [via my weblog]

Sunday, May 22, 2005 6:32:55 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Spectrum policy in transition by Philippa MARKS and Kiyotaka YUGUCHI, Keio Communication Review No. 26 (2004). A comparison of spectrum policy in the UK, France and Japan. Also see ITU's related work in the Strategy and Policy Unit's Radio Spectrum Management for a Converging World.

[Keio University - Mediacom via my weblog]

Sunday, May 22, 2005 6:32:35 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Lucent Bets on Wireless and IMS

In a tail-wags-dog story, Lucent Technologies, long associated with telecom big iron, is literally throwing its weight and its product development into the air. “We see the wireline business eroding. Mobility has higher growth, and it appears mobility is the best target for the new services architecture—IMS (IP multimedia subsystem),” said Rand Edwards, Lucent’s director of strategy and marketing-network operations software group.

Lucent will make its migration policy very clear at next week’s Telemanagement World conference in Nice, France, where it will showcase its IMS-driven VitalSuite software, demonstrating how service providers can migrate it into their systems to expand offerings into more complex architectures that start first with next-gen services and applications on wireless networks.

Canadian wireless operator Telus has bought into the VitalSuite for its trouble-patterning capabilities to do detailed network surveillance through analysis and network problem identification.

IMS “is a pretty complex service delivery platform and being able to isolate where a problem might be occurring gets more difficult (and) might not be observable from a traditional fault or performance type of view,” Edwards said. “This type of diagnosis or analysis is going to become increasingly important.”

From [Telecom Flash via my weblog]

Mobile | NGN | Standards
Sunday, May 22, 2005 3:23:58 PM (W. Europe Standard Time, UTC+01:00)  #     | 

OPTA, the Independent Dutch Post and Telecommunications Authority, has released their annual Vision of the Market report. 

"The vision of the markets reflect the commission’s view on important trends and competition developments in the markets, as well as on the position of the end-user. In the annual report, OPTA accounts for its activities and results in the year 2004. The annual accounts give insight into OPTA’s financial house-keeping."

Each year OPTA publishes its Vision of the Market. The publication contains OPTA’s ideas regarding developments on the markets for post and electronic communication. The report furthermore recognizes that:

"The landscape in the communications sector is changing. Convergence is now reality: technological developments have made it possible to offer the same services using the same technology (the internet) via multiple types of networks. This is evident in the introduction of voice and television services via the internet. The communications sector is also broadening through integration with the IT, media and entertainment sectors. Convergence has as consequence that companies that did not compete in certain services in the past now do so. The competition potential is increasing, but the problem areas will not immediately disappear because network owners are still able to create entry barriers for competing parties. OPTA will intervene if and when providers abuse their dominant position."

For the full report, please click here.

[Via my weblog]

Sunday, May 22, 2005 3:18:22 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Security experts warm it would not be hard for a cyberpunk or terrorist to turn off the lights in a large portion of the U.S.

The article states that "The U.S. power grid, with its billions of dollars worth of electrical lines, switching stations, and electrical generators, is like a big shiny toy for computer hackers."

The article goes further on to say that "Power companies rely on a complex relay of information between delivery stations to regulate electrical flows. They send commands back to these stations to control the voltage and amperage allowed to flow to consumers. It is a network, just like the internet. And just like the internet, it is subject to attack."  

For the full article featured in RedHerring, click here.

Via Fergie's Tech Blog]

Sunday, May 22, 2005 9:28:33 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Saturday, May 21, 2005

Latin American nations are finding unique uses for WiFi including building a Wi-Fi-linked e-payments network in Guayaquil, Ecuador. Quite clever actually since it cuts down merchants’ long-distance phone charges, and speeds up transactions. In Chilean pueblo of Cora Cora, 7000 residents can now connect to the Internet, via a WiFi network that is fed by a satellite pipe. This has been made possible through joint efforts by the local government authorities, business and community members.

"Project team members and the community now are moving forward with the project's next phase by developing Web sites and e-commerce services for government administration, business, academic and educational use. Plans to build wireless links, networks and similar services in the neighboring town of Chavi, some eight kilometers away, are also in the works".

For the full article, please see here.

[Via feed24]

Saturday, May 21, 2005 5:20:44 PM (W. Europe Standard Time, UTC+01:00)  #     | 

From NetWizard's Blog

While email authentication is no longer such hot topic as it was last year, nevertheless the two main proposals (SPF and Sender-ID) are moving slowly through the IETF process to become experimental protocols. Both just published new drafts (spf and sender-id [1], [2] and [3]). At the same time it is interesting to note that Sender-ID has been placed on the next telechat agenda for the IESG. While SPF has not been put on the IESG telechat, it will probably follow shortly.

What does this mean in simple non-IETF-speak terms? These two proposals may finally be approved by the IETF for experimental use - a long path that started way back in the ASRG two years ago. It still remains to be seen whether either one will be deployed and widely used, especially considering the pending patent applications that Microsoft has on Sender-ID and their GPL-incompatible license.

Saturday, May 21, 2005 8:08:53 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, May 20, 2005

The internet edition of the "E-Commerce and Development Report 2004" published by United Nations Conference on Trade and Development (UNCTAD) has been released. The E-commerce and Development Report is intended to provide policy-makers and practitioners with information and analysis to better assess the implications of the growing role of ICTs in economic development.

From the report foreword by UN Secretary General Kofi Annan:
"Information and communications technologies have considerable potential to promote development and economic growth. They can foster innovation and improve productivity. They can reduce transaction costs and make available, in mere seconds, the rich store of global knowledge. In the hands of developing countries, and especially small- and medium-sized enterprises, the use of ICTs can bring impressive gains in employment, gender equality and standards of living".

To view the full report and highlights from the report, click here.

 

 

Friday, May 20, 2005 11:41:52 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, May 19, 2005

News Release: Word | Acrobat
FCC Commissioner Martin Statement: Word | Acrobat
FCC Commissioner Abernathy Statement: Word | Acrobat
FCC Commissioner Copps Statement: Word | Acrobat
FCC Commissioner Adelstein Statement: Word | Acrobat

Thursday, May 19, 2005 5:02:56 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Om Malik's Broadband Blog has a piece on ITU-T's upcoming VDSL2 standard and a comparison of speeds of various xDSL flavours. ITU-T Study Group 15 meetings are now underway (16-27 May 2005) in Geneva working on this as well as a number of other standards. The list of 281 delayed contributions into the meeting shows the intensive activity in this Study Group by service providers and equipment manufacturers.

Thursday, May 19, 2005 4:33:06 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The European Commission will hold an Open Workshop on Identifying Policy and Regulatory Issues of Next Generation Networks (PDF) on 22 June 2005. The workshop is directed towards policy makers and regulators, but is open to anyone who may have an interest. A provisional programme can be found here (PDF). Attendance is free of charge but registration is required.

The ITU is also hosting a workshop on NGN policy and regulatory issues in February 2006. More details will be announced later here.

Thursday, May 19, 2005 3:29:28 PM (W. Europe Standard Time, UTC+01:00)  #     | 

This new Strategy and Policy Unit website gathers ITU resources related to Next Generation Networks.

Thursday, May 19, 2005 12:49:44 PM (W. Europe Standard Time, UTC+01:00)  #     | 

South Africa's ITweb in an article says: "There is an opportunity for SA to lead the open source explosion, as we are a combination of first and third world, with various cultures, so we can understand and reach various markets. [via Information Policy]

Thursday, May 19, 2005 12:26:46 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Japan's Vodafone K.K. announced today (PDF) new anti-spam measures to make its Vodafone live! mobile internet service more dependable for customers. As a measure to prevent nuisance mails, the number of SMS that can be sent to from a Vodafone K.K. 3G handset within one day will be limited to 500 starting 31 May 2005. Handsets that exceed this limit will not be able to send additional SMS for the following 20 days.

Thursday, May 19, 2005 11:04:22 AM (W. Europe Standard Time, UTC+01:00)  #     | 

From Slashdot: Canada's National Task Force on Spam released its final report today. Despite prior spam actions on privacy grounds in Canada, the task force is calling for a tough new anti-spam law including penalties for failure to obtain appropriate opt-in consents before sending commercial email as well as private right of action to encourage Canadian lawsuits against spammers. Professor Michael Geist, who headed up the legal aspects of the task force, provides a good summary of the recommendations.

Thursday, May 19, 2005 7:57:03 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, May 18, 2005

Fergie's Tech Blog points to a new paper published by the Honeynet Project and Research Alliance entitled Know Your Enemy: Phishing; Behind the Scenes of Phishing Attacks.

  • "What makes this paper new/different is that it focuses on behind the scenes of how attackers build, use and maintain their infrastructure of hacked systems. Its based on data collected in the UK and Germany, and is similar in technical detail to our previous Botnet paper."
Wednesday, May 18, 2005 2:24:46 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Brough Turner in Communications has an interesting post on defacto Internet QoS. In a follow-up, he says he was only partly right.


Wednesday, May 18, 2005 12:29:44 PM (W. Europe Standard Time, UTC+01:00)  #     | 

A recent meeting of Study Group 12 saw progress in the development of QoS-related standards for IP-based networks and services.

QoS is seen as a key area to address in IP-based networks, especially as more carriers announce plans to carry voice traffic using the protocol.

Progress was made on the revision of Recommendation G.1020 which gives performance parameter definitions for quality of speech and other voiceband applications utilising IP networks. The updates will specify voice quality measurements associated with the use of the VoIP management protocol, RTP Control Protocol Extended Reports (RTCP XR). RTCP XR defines a set of metrics that contain information for assessing VoIP call quality and diagnosing problems.

And Y.1541 which gives network performance objectives for IP-based services, is also actively under revision to include new QoS classes with more stringent packet loss performance, needed for example for commercial video applications and certain TCP formats.

Also during its meeting - the first of the new study period - SG12 consented a revision of Recommendation G.107 (the E-model, see previous e-Flash story, to include an improved treatment of bursty packet loss.

[via ITU-T Newslog]

Wednesday, May 18, 2005 9:37:12 AM (W. Europe Standard Time, UTC+01:00)  #     | 

The Optical Internetworking Forum (OIF) will host an interoperability demonstration at June's Supercomm event in Chicago, USA showing how a suite of ITU-T standards will enable data stream services like Ethernet to be effectively transported over existing SONET/SDH and ASON enabled carrier networks.

Additionally the demo will show how Ethernet can be used to link any number of endpoints in a wide area network (WAN), or simply as a service delivery mechanism (see press release).

The event will include testing of data plane interoperability of next generation transport network functions such as generic framing procedure (GFP), virtual concatenation (VCAT) and link capacity adjustment scheme (LCAS), all supporting technologies to SONET/SDH (and all defined in ITU-T G-series Recommendations).

The seven global telecommunication carriers taking part will provide test facilities, engineering staff and network connectivity. More...

[via ITU-T Newslog]

Wednesday, May 18, 2005 9:36:12 AM (W. Europe Standard Time, UTC+01:00)  #     | 

ITU members are increasingly signalling the interest of the telecommunications community in grid computing. The technology is under study by the Technology Watch within ITU-T. And following discussions between the Global Grid Forum (GGF) and ITU-T, a workshop on telecoms and grids is planned for 2006.

On behalf of GGF, Franco Travostino of Nortel gave a presentation at the recent Study Group 13 meeting in Geneva. In it he gave an introduction to the work of the forum, also explaining the basics of grids.

Travostino describes grid computing as a software platform for distributed participants to form a virtual organization, securely share resources, and engage in coordinated problem-solving activities.

There are a number of areas of interest for the telecoms industry. At a simple level, telcos could use grids internally, for billing and simulations for example. They could also offer grid managed services, or act as service brokers.

Travostino pointed out that the discussion on grids involves more than just how to provide bigger pipes. There are other issues that may be of interest to ITU-T, such as how to control the network, how to manage dynamic provisioning and how to provide collision-free addresses (IPv4 <-> NAT).

[via ITU-T Newslog]

Wednesday, May 18, 2005 9:24:57 AM (W. Europe Standard Time, UTC+01:00)  #     |