International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Thursday, February 16, 2006

OECD Scoping Study for the Measurement of Trust in the Online Environment:

Creating an online environment which builds on trust among users of ICT networks is an increasing priority for business, industry and governments and has been on the OECD agenda since the late 1990s. The aim of this report is to undertake a review of the data available from official, semi-official and private sources which can assist in informing developments and progress in this area. There is a need to be able to use relevant data to assess the effectiveness of public and private initiatives aimed at building trust among users.
Thursday, February 16, 2006 12:08:11 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, February 15, 2006

Circle ID has an interesting piece entitled Internet Governance: An Antispam Perspective by Meng Wong, who is known for his work on the email authentication mechanism SPF*:

I believe that we must move to a default-deny model for email to solve phishing; at the same time we must preserve the openness that made email the killer app in the first place. The tension between these poles creates a tremendous opportunity for innovation and social good if we get things right, and for shattering failure if we get things wrong.

* SPF is derived from original concept work by Paul Vixie which is now also the core of Microsoft's Sender ID.
Wednesday, February 15, 2006 5:44:08 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Eli Noam: Moore’s Law at risk from industry of delay:

"So, in technology, Moore’s Law is alive and well. But technology does not operate in a vacuum. No business or government institution can change at 50 per cent a year. While stability and tradition are important, if a fundamental technology progresses far beyond society’s ability to absorb its impacts, a growing disconnection occurs. When, in the 19th century, technology proceeded at a rapid pace while social institutions did not, the results were upheavals and revolutions. Today, again, the key elements of the information economy are progressing at a scorching rate, while private and public institutions are lagging behind.

Examples include the way the US lost leadership in mobile wireless and broadband internet because of interminable governmental processes in spectrum allocation. Around the world, it has taken more than a decade to set the rules on interconnection among telecommunciation carriers, and they are still far from settled. This has slowed the entry of new-style carriers.

The question of whether new broadband services should be treated in the same time-consuming way as traditional telecommunication has tied regulators in knots and recently created a confrontation between Brussels and Germany. In South Korea, video over the internet requires a broadcasting licence, which has slowed how much the network is used. Patent offices every­where are falling behind their workload. It may soon take more than five years to get a patent in the US."

Wednesday, February 15, 2006 12:49:56 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Via Brough's Communications blog comes news that the GSM Association has announced a new instant messaging initiative.

Wednesday, February 15, 2006 10:19:20 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, February 14, 2006

In line with para 108 and Annex of the Tunis Agenda for the Information Society, a consultation on WSIS Action Line Facilitation for WSIS action line C2, i.e. information and communication infrastructure will take place in conjunction with WTDC-06 in Doha, Qatar, on 9 March 2006, in the Convention Center, Room Al Majlis, to benefit from the presence of many WSIS stakeholders present at WTDC-06. The meeting will run from 14.00 – 17.00 hours. The meeting is open to all WSIS stakeholders that are interested and involved in implementation process in the field of information and communication infrastructure. The meeting will be held in English.

The purpose of the meeting is for information exchange and to discuss the WSIS multi-stakeholder implementation process in field of information and communication infrastructure.  ITU, UNESCO and UNDP are holding a consultation meeting to establish the nature of the coordination process, its outputs, modalities and logistics, of the work to be undertaken on WSIS implementation on 24 February 2006, in Geneva, and the outcome of this meeting will be reported. A draft annotated agenda is attached, together with a registration/badge request form for those not registered for WTDC-06. Further information is available from the implementation website.

Tuesday, February 14, 2006 10:08:56 AM (W. Europe Standard Time, UTC+01:00)  #     | 

FCC Examines Need For Tougher Privacy Rules.

"In a Notice of Proposed Rulemaking (NPRM) adopted today, the Commission seeks comment on a variety of issues related to customer privacy, including what security measures carriers currently have in place, what inadequacies exist in those measures, and what kind of security measures may be warranted to better protect consumers’ privacy. The Notice grants a petition for rulemaking filed by the Electronic Privacy Information Center (EPIC) expressing concerns about whether carriers are adequately protecting customer call records and other customer proprietary network information, or CPNI. EPIC claims that some data brokers have taken advantage of inadequate security standards to gain access to the information under false pretenses, such as by posing as the customer, and then offering the records for sale on the Internet. The practice is known as "pretexting.""
    Tuesday, February 14, 2006 10:05:12 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Monday, February 13, 2006

    The NY Times has an article about cooperation between the telecommunications industry and the US government for legal intercept, including through NSTAC.

    Monday, February 13, 2006 1:47:06 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The ITU is hosting a workshop on Radio-Frequency Identification (RFID) from 14-15 February 2006, bringing the spotlight on the emergence of a so-called "Internet of Things", enabling ubiquitous network connectivity, anytime and anywhere. The agenda and an accompanying press release are available.

    Update: The workshop is being audiocast live and archived.

    Monday, February 13, 2006 11:23:35 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Friday, February 10, 2006

    Bruce Schneier's Schneier on Security points to a paper dismissing the myth that worms won't be able to propagate under IPv6.

    Friday, February 10, 2006 5:19:34 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The Financial Times has an article entitled Privacy Under Pressure in Europe

    A European directive is in preparation that will require the providers of publicly available communications services to retain details of fixed-line, mobile phone and e-mail communications for at least six months, and possibly up to two years. It is a requirement that even the US has not imposed in its war on terror.

    Friday, February 10, 2006 11:34:32 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    Bruce Schneier's Schneier on Security has a post on the new security features of IE7.

    Friday, February 10, 2006 9:15:05 AM (W. Europe Standard Time, UTC+01:00)  #     | 
    Friday, February 10, 2006 9:13:54 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Thursday, February 09, 2006

    Richard Stastny's VoIP and ENUM has a long post on his views on NGN and regulation.

    Thursday, February 09, 2006 11:15:01 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Wednesday, February 08, 2006

    Measuring Broadband's Economic Impact, William H. Lehr, Carlos A. Osorio, Sharon E. Gillett, Massachusetts Institute of Technology and Marvin A. Sirbu, Carnegie Mellon University (Revised January 17 2006):

    Abstract: Does broadband matter to the economy? Numerous studies have focused on whether there is a digital divide, on regulatory impacts and investment incentives, and on the factors influencing where broadband is available. However, given how recently broadband has been adopted, little empirical research has investigated its economic impact. This paper presents estimates of the effect of broadband on a number of indicators of economic activity, including employment, wages, and industry mix, using a cross-sectional panel data set of communities (by zip code) across the United States. We match data from the FCC (Form 477) on broadband availability with demographic and other economic data from the US Population Censuses and Establishment Surveys. We find support for the conclusion that broadband positively affects economic activity in ways that are consistent with the qualitative stories told by broadband advocates. Even after controlling for community-level factors known to influence broadband availability and economic activity, we find that between 1998 and 2002, communities in which mass-market broadband was available by December 1999 experienced more rapid growth in (1) employment, (2) the number of businesses overall, and (3) businesses in IT-intensive sectors. In addition, the effect of broadband availability by 1999 can be observed in higher market rates for rental housing in 2000. We compare state-level with zip-code level analyses to highlight data aggregation problems, and discuss a number of analytic and data issues that bear on further measurements of broadband’s economic impact. This analysis is perforce preliminary because additional data and experience are needed to more accurately address this important question; however, the early results presented here suggest that the assumed (and oft-touted) economic impacts of broadband are both real and measurable.

    Wednesday, February 08, 2006 8:52:50 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    Via Schneier on Security comes a pointer to an interesting paper entitled Introduction to Petname Systems.

    Zooko's Triangle [Zooko] argues that names cannot be global, secure, and memorable, all at the same time. Domain names are an example: they are global, and memorable, but as the rapid rise of phishing demonstrates, they are not secure.

    For background reading, see Zooko: Names: Decentralized, Secure, Human-Meaningful: Choose Two, Waterken YURL: Naming vs. Pointing and the Petnames Markup Language.

    To summarize, you cannot have a namespace which is all three of: 1. decentralized (which is the same as saying that the namespace spans trust boundaries), 2. secure in the sense that an attacker cannot cause name lookups to return incorrect values that violate some universal policy of name ownership, and 3. using human-memorizable keys.

    Wednesday, February 08, 2006 8:17:05 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    Via the ITU-T Newslog comes news that a Recommendation consented at the January meeting of Study Group 13 allows enterprises to convert multiple voice streams or VoIP flows to IP packets, enabling them to be trunked to their destination over a packet switched infrastructure, rather than dedicated circuit-switched infrastructure. Rec Y.1452 gives the required functions and procedures necessary for support of multiplexed narrowband voice services by IP networks. It specifies the required protocols and the operation of the interworking function.

    Wednesday, February 08, 2006 10:34:23 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Tuesday, February 07, 2006

    Regular economic analysis by EU Member States and the European Commission of competition in electronic communications markets and Commission scrutiny of draft national rules are paving the way to free markets, regulated solely by competition law, says a progress report published by the Commission today. Regulation in this sector applies only to operators whose significant market power could prevent the full benefits of telecoms liberalisation from getting through to consumers. Wherever a market analysis has found tangible signs of sustainable competition, regulation has been trimmed back or removed altogether. However, much remains to be done. As of 30 September 2005, sixteen EU Member States had found no effective competition on one or more of the 18 electronic communications markets defined by the EU and had taken steps to boost competition on the markets concerned. Five Member States had found only partial competition on one or more of these markets and had imposed remedies where it was lacking. But nine Member States had yet to notify the Commission of their analyses of any of the 18 markets. Of the analysed markets (152 out of 450), 123 were not competitive, 19 fully competitive, and 10 partially competitive.

    For more information, please click here.

    Tuesday, February 07, 2006 5:51:28 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    Today (7 February 2006) marks the third edition of Safer Internet Day, held under the patronage of Viviane Reding, European Commissioner for Information Society and Media.

    Safer Internet Day is celebrated by more than 96 organisations in 36 countries across the world: 24 EU countries, and others including Russia, Argentina, New Zealand and the USA. Safer Internet Day's biggest event is a worldwide blogathon on safer use of internet launched by Commissioner Reding in Brussels at a minute past midnight, then taken up by New Zealand who post an entry a few minutes later.

    All day long the blogathon will continue to move across the world, through Australia and Russia to Europe, then across to Argentina, Canada and the USA. Over 300 local, regional and national events include press conferences, and competitions in Finland, Germany, Spain and the Czech Republic. There will also be internet safety quizzes and crosswords in Greece, pupil-teach-parent days in Belgium and the Netherlands, conferences in the UK, Hungary and Argentina and a broad palette of activities in schools and libraries.

    For an overview of the days' events, see the main Safer Internet website.

    To view the International Telecommunication Union's entry to the blogathon, click here.

    Tuesday, February 07, 2006 2:27:49 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    To coincide with Safer Internet Day, British Telecom (BT) announced today that, over the last 18 months, the number of attempts to access sites hosting child abuse images has increased from around 10,000 a day to 35,000 a day. All these attempts have been blocked utilising the company's Cleanfeed technology which uses a database of sites supplied by the United Kingdom's Internet Watch Foundation.

    According to Roger Darlington's blog, "BT developed and implemented Project Cleanfeed during my tenure as independent Chair of the IWF and, throughout the process and since, I have been a strong supporter of the initiative and would like to see all British Internet service providers using the same or similar technology."

    For more information and analysis with regards to this steep rise in attempts to access sites hosting child abuse images, see Roger Darlington's blog.

    Tuesday, February 07, 2006 1:50:19 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    ITU's Strategy and Policy Unit has just unveiled a new web site dedicated to NGN Policy and Regulatory Resources. The purpose of the site is to provide links to ITU NGN related activities, a March 2006 workshop entitled What Rules for IP-enabled NGNs? and related national, regional and international policy and regulatory initiatives.

    Tuesday, February 07, 2006 11:08:08 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    In accordance to Ministerial Conference of the World Trade Organization (WTO) to be held in Hong Kong SAR, INTUG has submitted to Trade Directorate-General its position on Trade in Telecommunications Services.

    For more information, please click here.

    Tuesday, February 07, 2006 10:19:57 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    Geoff Huston in the February 2006 edition of ISP Column asks what Convergence?

    The effort to arm networks with complex quality and service manipulation capabilities in the guise of NGNs and QoS networks appears to be a step in precisely the opposite direction to what customers demonstrably want from networks.

    ...

    There is no next vertical killer application coming, and it certainly isn’t going to be just VOIP.

    ...

    We are seeing a new suite of application components in the form of XML, Ajax, RSS, Torrents, Podcasts and similar, and methods of constructing content in previously undreamt of methods. Many of the more captivating services are now in the form of overlay applications, such as Skype for voice or Google’s Gmail for mail . The common factor here is that these services do not use dedicated network infrastructure, but exist as application level overlays. Its clear in this that user’s perception of where the value lies is shifting to the application rather than remaining with the network’s access infrastructure. This value shift is not coalescing within a single application, however. What is evident is that the application space is now an area of intense innovation, and we are seeing diversification in this space, rather than convergence. The richness of structured data sets and their potential to create innovative services is an obvious outcome of this application level activity.

    ...

    Perhaps its time to forget about convergence, and instead look at what it takes to survive as a carrier ISP in today’s deregulated, competitive, unconverged world. Certainly one of the more important principles is to stop attempting to add value to the network by spending large amounts of effort in providing a panoply of services that customers simply don’t want and don’t value. It would appear that want customers want today is for packet carriers to stick to the basics - keep overheads low and operate a network that is simple, stable, fast and cheap. User value construction is happening at the edge of the network through overlay structures, and the major attribute of networks today is not convergence per se, but the ability to open the network’s edge up for competitive innovation.

    Tuesday, February 07, 2006 9:15:26 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Monday, February 06, 2006

    Bruce Schneier's blog Schneier on Security points to the final version of a paper by Daniel J. Solove and Chris Hoofnagle titled "A Model Regime of Privacy Protection." 

    Abstract: A series of major security breaches at companies with sensitive personal information has sparked significant attention to the problems with privacy protection in the United States. Currently, the privacy protections in the United States are riddled with gaps and weak spots. Although most industrialized nations have comprehensive data protection laws, the United States has maintained a sectoral approach where certain industries are covered and others are not. In particular, emerging companies known as "commercial data brokers" have frequently slipped through the cracks of U.S. privacy law. In this article, the authors propose a Model Privacy Regime to address the problems in the privacy protection in the United States, with a particular focus on commercial data brokers. Since the United States is unlikely to shift radically from its sectoral approach to a comprehensive data protection regime, the Model Regime aims to patch up the holes in existing privacy regulation and improve and extend it. In other words, the goal of the Model Regime is to build upon the existing foundation of U.S. privacy law, not to propose an alternative foundation. The authors believe that the sectoral approach in the United States can be improved by applying the Fair Information Practices -- principles that require the entities that collect personal data to extend certain rights to data subjects. The Fair Information Practices are very general principles, and they are often spoken about in a rather abstract manner. In contrast, the Model Regime demonstrates specific ways that they can be incorporated into privacy regulation in the United States.
    Monday, February 06, 2006 8:20:21 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The World Dialogue on Regulation (WDR), a LIRNE administered project, has made eight research reports available online. Produced by WDR partners and associates, the reports fall within the WDR Third Cycle research theme Diversifying Participation in Network Development

    The following reports were made available between 30 November and 20 December 2005. For more information and downloads, follow the links to the World Dialogue on Regulation website.

    Replicability of a Microfinance Approach to Extending Telecommunications Access
    by Malathy Knight-John, Ayesha Zainudeen & Abu-Saeed Khan (LIRNEasia)

    Diversifying Network Participation: A Study of India's Universal Service Instruments 
    by Payal Malik & Harsha de Silva (LIRNEasia)

    Variations on the Expenditure in Communications in Developing Countries
    by Sebastian Ureta (LIRNE)

    More reprts are available on the World Dialogue on Regulation website.

    Monday, February 06, 2006 7:43:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The United States Homeland Security Department’s Cyber Storm cybersecurity exercise scheduled to start 6 February 2006 is said to have worldwide scope.

    "Australia, Canada and the United Kingdom will join 20 companies and two U.S. government agencies, said a senior industry official who requested anonymity because of the information’s sensitive nature. Cyber Storm will test federal and private-sector readiness for cyberattacks, particularly against critical infrastructure. The massive exercise, scheduled for Feb. 6-10, has been planned for a long time, the official said. Participants will face realistic scenarios, the official said. Critical sections of the UK IT infrastructure will come under attack this week as the US Department of Homeland Security runs Operation Cyber Storm, a global penetration test to assess how vulnerable the nation is to online attack."

    "An anonymous source has confirmed to US publication Federal Computer Week that the exercise will be global in scale and include attempted penetration of key UK infrastructure, as well as targets in the US, Canada and Australia. The US National Cyber Security Division is funding the testing programme and Donald Purdy, its acting director, told Congress in October that such a test was being planned. The Department of Homeland Security confirmed in November that the original plan was to hold the test in November but that the response to hurricanes Katrina and Rita forced a rescheduling for February. Penetration tests will be conducted on financial institutions, power companies and other users of critical IT systems."

    For further details about the cybersecurity exercise see the full vnunet.com article.

    Monday, February 06, 2006 3:39:24 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    More regulation while competition is increasing? That does not sound right, according to the GSM Association. Instead, given the innovative nature of 3GSM, its embryonic status and the current lack of market and legal certainty, regulatory forbearance is advisable.

    10 Regulatory Principles:

    1. Regulators should continue to seek a balance between the benefits and costs of intervention, on the one hand, and regulatory forbearance, on the other.

    An overly interventionist approach, which could lead to short-term benefits, could potentially stifle a dynamic market process with inevitable and adverse competitive, economic and even social consequences on the longer term. In general, competition is deemed to be a better approach to economic efficiency than regulation, and the regulators must encourage sustainable competition for the long term.

    2. Regulation should be based on clearly defined goals and policy objectives and should be kept to the minimum necessary to meet these objectives.

    Once effective competition is established or there is a reasonable prospect of a effectively competitive market in the near term, regulatory forbearance should prevail (with competition law providing appropriate safeguards).

    3. Regulators should acknowledge that 'normal' competitive markets reflect a range of operator return and should not intervene in competitive markets where one or more operators' return appears to be above the 'norm'.

    In the mobile market, the reality is that some operators have made good returns (on invested capital), while others have not. This situation is not of itself a cause to regulate away 'excess profits'. If a regulator judges from the highest standard, and regulates accordingly, then the less performing companies will unavoidably hit, thus further reducing already inadequate returns and threatening long term competitive development.

    4. Regulation should fit (reflect) the market situation and balance the micro and macro views.

    For example, when in certain cases mobile termination or roaming charges may appear high to regulators in certain countries, these cannot be judged in isolation.

    5. Regulators should be publicly accountable and act in a transparent way.

    Regulatory intervention should only be imposed after an appropriate public consultation process, which in most cases, will include market definition and assessment and a further assessment as to the appropriate regulatory remedy. A full right of appeal both on grounds of law (substance) and procedure (process) is an essential element of the checks and balances, which are necessary between operators and regulators.

    6. Governments should adopt licensing practices that encourage new investments in telecommunication infrastructures and facilitate competition within the sector.

    Un-harmonized license award procedures together with varying license conditions/obligations may lead to varying investment incentives in national markets and may eventually give rise to some discrepancy with respect to the levels of mobile service developments. Licensing policies and procedures must be applied judiciously] since not only they can influence market entry but also the post-entry conditions affecting competitiveness and market development. For auctions to contribute positively to economic welfare, they must meet a set of stringent preconditions (all potential bidders must be fully informed as to any Government imposed terms and conditions, including fees and changes to fees). When designing auctions, policy-makers should seek to achieve efficient resource allocation rather than primarily aiming to raise surplus government revenue. High license fees in some developed countries may constrain the ability of operators to invest in developing countries.

    7. Spectrum should be allocated on the basis of achieving economically efficient, competitive and structurally desirable outcomes rather than to extract monopoly rents from the industry.

    If the market is the best allocator of scarce resources, as most economists would argue, it is important that countries should be able to develop their own spectrum trading arrangements. In principle, regulators should allow for secondary trading of spectrum within planned internationally frequency allocations, after a thorough consultation process with the industry (i.e. mobile operators) evaluating the advantages and disadvantages of spectrum trading.

    8. The feasibility and commercial desirability of sharing of facilities and infrastructure is a matter, which is operator and market specific.

    In certain circumstances, sharing can be beneficial by, for instance, driving efficiencies through accelerated network rollout, the potential elimination of unnecessary cost duplication and the minimization of certain adverse environmental impacts. Accordingly, regulators should enable commercial negotiations on facility sharing among mobile operators to proceed subject however to license conditions not prohibiting the proposed form of sharing and competition not being materially and adversely impacted by the proposed form of sharing.

    9. Restrictions on the deployment of mobile networks should be based on science and substantiated studies, and not in response to 'public concern' which is without scientific basis.

    10. Adequate consumer safeguards against the inappropriate use of customer data are in place in most countries.

    In overseeing the implementation of those safeguards, regulators should balance the interests of consumers to data privacy, on the one hand, and timely and easy access to services and information on the other. Further, regulators should look first to relevant self-regulatory industry initiatives to achieve those objectives.

    Monday, February 06, 2006 2:26:44 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The Telecom Regulatory Authority of India (TRAI) has published updated indicators on mobile penetration and growth in India. TRAI reports that:

    "India has become one of the fastest growing mobile markets in the world. The mobile services were commercially launched in August 1995 in India. In the initial 5-6 years the average monthly subscribers additions were around 0.05 to 0.1 million only and the total mobile subscribers base in December 2002 stood at 10.5 millions. However, after the number of proactive initiatives taken by regulator and licensor, the monthly mobile subscriber additions increased to around 2 million per month in the year 2003-04 and 2004-05. For the year 2005-06, the first 9 months have seen an addition of 26 million mobile subscribers, which translates into average addition of 3 million subscribers monthly. The additions in the month of December 2005 alone have touched around 4.5 million."

    With currently about 76 million subscribers, TRAI says that monthly mobile growth rates have reached those of its neighbour, China.

    Monday, February 06, 2006 1:01:11 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    An article featured in the Technology Review; "A Tangle of Wires", discusses United States’ approach to cybersecurity.

    Among other things it states that: "The major problems in Internet security [many of which are detailed in "The Internet Is Broken"], are nowhere close to being addressed at the federal level, and what little is being done is on the wrong track, favoring summits, partnerships, and "information sharing" over the much more necessary but less visible work of long-term research and development.”

    The article also points to two reports: ""Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities," a report presented by the U.S. Government Accountability Office to Congress in May 2005. It contends that "While DHS has initiated multiple efforts, it has not fully addressed any of the 13 key cybersecurity-related responsibilities that we identified...and it has much work ahead in order to be able to fully address them.""
    And "Cyber Security: A Crisis of Prioritization," "prepared by the President's Information Technology Advisory Committee (PITAC) and delivered to the executive branch in February 2005." This report does, according to the article, "in its way offer a solution to the long-term problem of cybersecurity."

    View Technology Review for the full article.

    Monday, February 06, 2006 12:34:03 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    Telephony Discussion has a detailed account of a talk given by Norman Lewis, director of research for France Telecom, at eTel where he takes quite a few swipes at his industry colleagues.

    Monday, February 06, 2006 11:36:49 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    The ITU-T Newslog has news on a new ITU-T standard (ITU-T Recommendation, Y.1731) which will allow operators offering Ethernet services to use OAM (operations, administration, and maintenance) mechanisms to facilitate network operation and troubleshooting.

    Recommendation Y.1713 gives user-plane OAM functionality in Ethernet networks. The architectural basis for this Recommendation is the Ethernet specification G.8010. A previous Recommendation Y.1730 served as a prelude to Y.1731 outlining the OAM requirements of operators. Joncour says that Y.1731 was developed in close collaboration with the Institute of Electrical and Electronics Engineers (IEEE) group 802.1. This group is also preparing a standard (802.1ag - Connectivity Fault Management) devoted to Ethernet OAM aspects. IEEE 802.1ag defines a subset of the functions/PDUs described in Y.1731. Regular communications between the two groups ensured alignment of the description of the common features.

    Monday, February 06, 2006 10:36:47 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    Pan Asia Networking (PAN) at the International Development Research Centre (IDRC) is pleased to share two interactive maps with you. The first of these maps provides information about the ICT market structure, regulatory functions, and the national regulatory agency for countries in Asia. You can access the map here.

    The second map provides a list of indicators (including population, GDP per capita, main telephone lines, mobile cellular subscribers, radios, televisions, and internet users) in Asia since 2001. In addition, this map allows one to compare an indicator across up to three countries. An animated instruction guide for this map is attached. You can access the map here.

    Monday, February 06, 2006 8:25:01 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Sunday, February 05, 2006

    According to an article in the IHT, companies will soon have to buy the electronic equivalent of a postage stamp if they want to be certain that their e-mail will be delivered to many of their customers.

    America Online and Yahoo, two of the world's largest providers of e-mail accounts, are about to start using a system that gives preferential treatment to messages from companies that pay from a quarter of a cent to 1 cent each to have them delivered. The Internet companies say this will help them identify legitimate mail and cut down on junk e-mail, identity-theft scams and other scourges of users of their services.

    Sunday, February 05, 2006 6:24:28 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    It's just not major telecommunication carriers who appear to want to build separate "internets" with guaranteed QoS and security (aka NGN). Today's UK Times Online has an article on rumours that Google intends to build its own "tiered" internet.

    Sunday, February 05, 2006 3:13:44 PM (W. Europe Standard Time, UTC+01:00)  #     | 
     Saturday, February 04, 2006
    The Country Code Country Code 1 ENUM LLC has issued a press release on the formation of a committee to coordinate testing activities among participants in its upcoming US ENUM trial. The first meeting of this committee, to be known as the LLC's Trial Participants Advisory Committee (TPAC), will take place in Richardson, Texas, on February 21, 2006. Companies who have an interest in participating inthe trial should plan on attending this meeting. Meeting details will beposted on the LLC's web site.
    Saturday, February 04, 2006 6:45:51 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The beta of Internet Explorer 7 handles internationalized domain names in an interesting method to mitigate what is known as homographic spoofing.

    When attempting to read a web address with non-standard characters, it blocks the action and puts up a dialogue box asking whether the user would like to specifically add the language (actually the corresponding script) as valid.

    The same dialogue box allows the user to specify a locale specific suffix that will be entered with a key combination.

    Saturday, February 04, 2006 9:13:23 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Friday, February 03, 2006

    Link Center has released new report on Towards an African e-Index: Household and Individual ICT Access and Usage across 10 African Countries.

    Based on the 2004 e-Access & Usage Household survey that was completed during the course of 2004 and 2005 by members of the researchICTafrica! network under the direction of Prof Gillwald, this report is the result of a demand study of individuals and households and how ICT's are used across 10 African countries. 

    For more information on the report, please click here. For the full report in pdf format (6,7mb), please click here.

    Friday, February 03, 2006 6:56:08 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    ITU's Market and Finance Unit has just released publication ICT Market Liberalisation Reports for CEE Countries and Baltic States.

    The publication includes seven following contributions:

    • Significant market power in telecommunications: theoretical and practical aspects
    • Increasing the competition in the Polish mobile telecommunication market
    • Lithuanian telecommunication market
    • Liberalization of the ICT Market in Bosnia and Herzegovina
    • Economic and institutional implications of network convergence in Hungary
    • Implementation of the new act on electronic communications in Slovenia
    • Implementation of the New Regulatory Framework in Lithuania

    To download publication, please click here.

    Friday, February 03, 2006 6:30:16 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The Act of 29 December 2005 on transformations and modifications to the division of tasks and powers of state bodies competent for communications and broadcasting (Official Journal of 30 December 2005, No 267, 2258), hereinafter referred to as the Act, defines the principles for the transfer of tasks and powers between Polish state bodies responsible for communications and broadcasting and the principles, scope and mode of transformations within the communications administration.

    Under the Act, a new central-level government administration body - the President of the Office of Electronic Communications (President of UKE, Prezes Urzędu Komunikacji Elektronicznej,) was established as of 14 January 2005 in place of the central-level government administration body - the President of the Office of Telecommunications and Post Regulation (President of URTiP) which was liquidated as of 13 January 2005.

    The President of UKE shall assume the tasks and powers that have so far fallen within the competence of the President of URTiP as well as certain powers of the President of the National Broadcasting Council (KRRiT).

    This in particular refers to the following issues:
    - reservation of frequencies for the purposes of radio or TV programme transmission or retransmission (in communication with the President of KRRiT),

    - competition for a reservation of frequencies for the purposes of digital transmission or retransmission of radio or TV programmes,

    - keeping registers of telecommunications undertakings with respect to the provision of conditional access systems, electronic programme guides and multiplexing of digital signals,

    - relevant market analysis and the imposition, maintenance, amendment or withdrawal of regulatory obligations with respect to telecommunications undertakings concerning conditional access systems, electronic programme guides and multiplexing of digital signals.

    The Prime Minister, having considered three candidatures proposed by the National Broadcasting Council, shall appoint the President of UKE.

    The President of UKE shall be supervised by the minister competent for communications (currently the Minister of Transport and Construction who is also competent for communications).

    Continuity of cases and rights and obligations

    Cases initiated by the National Broadcasting Council, the President of the National Broadcasting Council or by the President of URTiP with respect to tasks assumed by the President of UKE and not completed by the date of entry into force of the Act (i.e. before 14 January 2006) shall be handled by the President of UKE according to the provisions of the Act.

    With respect to cases completed within the framework of administrative proceedings, but not completed in the course of court proceedings, the provisions in force to date shall continue to apply.

    The rights and obligations of the President of URTiP as a party to cases in which a complaint to an administrative court or an appeal to the District Court in Warsaw - the competition and consumer court - may be lodged or has already been lodged, shall be assumed by the President of UKE.

    Frequency reservations made by the President of the Broadcasting Council or by the President of URTiP shall remain valid, unless they are modified or expire under separate provisions.

    Entries in the register of telecommunications undertakings as well as decisions and other settlements with respect to tasks assumed by the President of UKE made before the date of entry into force of the Act shall remain valid.

    All rights and obligations of URTiP shall become the rights and obligations of UKE.

    For more information, please click here.

    Friday, February 03, 2006 6:20:06 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The Telecom Regulatory Authority of India (TRAI) has released a consultation document on the impact of transition to NGNs (also see press release). TRAI will be conducting open house discussions in Delhi and Bangalore on the NGN consultation paper as well as the recent consultation on convergence and competition.

    Friday, February 03, 2006 5:03:53 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    IDATE has just released material with 2005 statistics on FTTx in Europe.

    At mid 2005 IDATE identified 166 FTTx projects in Europe of which 13 are new initiatives since mir 2004.

    By the end of June 2005, there were approximately 646 570 FTTx subscribers in EU 181 and
    roughly 2.51 millions Homes/Building passed showing a penetration rate of 25.8%. Compared to
    mid June 2004 this represents a growth of 18% for subscribers and 28% for Homes/Building
    passed. There are still no major deployments in the 10 new members and we should also notice that nearly 97% of these FTTx Subscribers are concentrated in 5 countries (Sweden, Italy, Denmark, the Netherlands and Norway).

    To read brief material with statistics, please, click here.

    Friday, February 03, 2006 4:52:22 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    From Bruce Schneier's blog Schneier on Security comes a pointer to an article about someone convicted for running a for-profit botnet:

    November's 52-page indictment, along with papers filed last week, offer an unusually detailed glimpse into a shadowy world where hackers, often not old enough to vote, brag in online chat groups about their prowess in taking over vast numbers of computers and herding them into large armies of junk mail robots and arsenals for so-called denial of service attacks on Web sites.

    Ancheta one-upped his hacking peers by advertising his network of "bots," short for robots, on Internet chat channels.

    A Web site Ancheta maintained included a schedule of prices he charged people who wanted to rent out the machines, along with guidelines on how many bots were required to bring down a particular type of Web site.

    In July 2004, he told one chat partner he had more than 40,000 machines available, "more than I can handle," according to the indictment. A month later, Ancheta told another person he controlled at least 100,000 bots, and that his network had added another 10,000 machines in a week and a half.

    In a three-month span starting in June 2004, Ancheta rented out or sold bots to at least 10 "different nefarious computer users," according to the plea agreement. He pocketed $3,000 in the process by accepting payments through the online PayPal service, prosecutors said.

    Starting in August 2004, Ancheta turned to a new, more lucrative method to profit from his botnets, prosecutors said. Working with a juvenile in Boca Raton, Fla., whom prosecutors identified by his Internet nickname "SoBe," Ancheta infected more than 400,000 computers.

    Friday, February 03, 2006 11:47:45 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Thursday, February 02, 2006

    The December 2005 edition of the Internet Protocol Journal has two articles on countering spam:

    Thursday, February 02, 2006 10:10:23 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Tuesday, January 31, 2006

    WSIS E-Flash No 30 dated 30 January 2006 has been published and includes news on:

    • WSIS Executive Secretariat maintained
    • Meeting on WSIS Action Lines Moderators/Facilitators on 24 February 2006
    • Internet Governance Forum - consultations on 16 - 17 February 2006
    • WSIS Golden Book
    • WSIS Stocktaking
    • The ITU development initiative "Connect the World"
    • WSIS Outcome documents
    • New general WSIS contact e-mail address
    Tuesday, January 31, 2006 5:44:20 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    A possible timeline for convening of the Internet Governance Forum (IGF) has been published on the consultations website on the convening of the IGF.

    Tuesday, January 31, 2006 5:36:44 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    A practical guide to planning and building low-cost telecommunication infrastructure.

    This book was created by a team of individuals who each, in their own field, are actively participating in the ever-expanding Internet by pushing its reach farther than ever before. The massive popularity of wireless networking has caused equipment costs to continually plummet, while equipment capabilities continue to sharply increase. We believe that by taking advantage of this state of affairs, people can finally begin to have a stake in building their own communications infrastructure. We hope to not only convince you that this is possible, but also show how we have done it, and to give you the information and tools you need to start a network project in your local community.

    Wireless infrastructure can be built for very little cost compared to traditional wired alternatives. But building wireless networks is only partly about saving money. By providing people in your local community with cheaper and easier access to information, they will directly benefit from what the Internet has to offer. The time and effort saved by having access to the global network of information translates into wealth on a local scale, as more work can be done in less time and with less effort.

    Tuesday, January 31, 2006 4:14:43 PM (W. Europe Standard Time, UTC+01:00)  #     |