International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Wednesday, September 12, 2007

The e-Government Global Dialogue, Citizen-Centric Government: One-Stop Multi-Channel Service Delivery for All, will be held on Tuesday, 18 September 2007, 8:00-10:30 am ET at Room MC2-137, 1818 H Street NW in Washington, DC. It will also be accessible via live webcast.

"The government of the future is a citizen-centric government and the one-stop approach is a quintessential expression of citizen centricity. This seminar, initiated by the Moscow City Government is integral part of Single Window Conference taking place in Zelenograd district of Moscow on Sep 18-20, which will bring together some 300 government officials and other stakeholders from multiple Russian regions as well as the audiences in other transition and developing countries. The seminar will enable policy-makers to get a snapshot of international experience, analyze critical success factors, lessons learned and implementation challenges in citizen service center projects, and explore a symbiotic relationship between the citizen service centres and other service delivery channels. Case studies of citizen service center projects will also be presented, and the following issues will be discussed in more detail: the profile, skills, professional background for one-stop citizen service centers; the legal status / organizational form of citizen service centers; and the relations and linkages between citizen service centers and the government agencies."

More information about this event is available here.
Interested participants may also join via the Live Webcast / Online Discussion.

Wednesday, September 12, 2007 2:24:09 PM (W. Europe Standard Time, UTC+01:00)  #     | 

John E. Dunn reports on Techworld how the global market for criminal malware operates like a supermarket, complete with special offers and volume discounts, as a security company has discovered. On Panda Software’s latest quarterly report, the going rate for a reasonably sophisticated but generic Trojan is between £175 ($350) and £350 ($700), while the email list with which to target victims for the program costs from £50 ($100) per million names. The malware writers even offer specials – in one case the company discovered a site selling a ‘payment capture’ Trojan for £200 ($400) to the first 100 customers to sign up, a saving of £50 ($100) off the normal rate. "In recent months we have witnessed the growing professionalisation of digital crime," said Panda Software’s lab chief Luis Corrons. "The first step for cyber-crooks was when they started looking for profits from their activity instead of just notoriety. Now they are creating a vast online malware market, where there are even specialised segments. New business models are appearing, as we speak," he said.

Corrons adds that the malware industry now appears to be turning from being just a shop from which malware can be bought, to one where services are offered. For between one and five dollars per executable, malware could be cloaked - encrypted - against the anti-virus software programs it was likely to encounter on a for-hire basis. Finally, criminals could rent spam servers for £250 a time to distribute their assembled malware package, the company said. Corrons also provides details of the cost of hiring DDoS attacks in his blog.

Read the full article here.

Wednesday, September 12, 2007 9:31:16 AM (W. Europe Standard Time, UTC+01:00)  #     | 

An article on The Economist discusses RBN (Russian Business Company), the threats it poses to global cybersecurity, and the lack of cooperation from the Russian government. VeriSign classifies RBN as "“the baddest of the bad"”. The anonymity of the group and its senior figures who are only known through their nicknames, and the apparent backing of politicians have led to the continuing success of its operations. "'“RBN is a for-hire service catering to large-scale criminal operations,”' says the report. It hosts cybercriminals, ranging from spammers to phishers, bot-herders and all manner of other fraudsters and wrongdoers from the venal to the vicious. Just one big scam, called Rock Phish (where gullible internet users were tricked into entering personal financial information such as bank account details) made $150m last year, VeriSign estimates." Another difficulty RBN poses is its ability to fight back. This had been evident in the Rock Phish attack to the National Bank of Australia in October 2006. After taking active measures against the attack, RBN fought back by taking down the bank’s home-page for three days.

Despite VeriSign having tracked down the physical location of RBN’s servers and the Western law enforcement officers' pressure on their Russian counterparts to pursue the investigation vigorously, RBN remains confident and active. According to VeriSign, "only strong political pressure on Russia will make the criminal justice system there deal with this glaring example of cyber-illegality."

To read the full article, go to The Economist.

Wednesday, September 12, 2007 9:17:38 AM (W. Europe Standard Time, UTC+01:00)  #     | 

A new mobile system where one makes calls directly between phones, for free, is being trialled by TerraNet, a Swedish company, in hopes of dramatically improving communications in the developing world. "TerraNet has developed the idea using peer-to-peer technology that enables users to speak on its handsets without the need for a mobile phone base station. The technology is designed for remote areas of the countryside or desert where base stations are unfeasible. Projects backed by TerraNet recently launched in Tanzania and Ecuador. The TerraNet technology works using handsets adapted to work as peers that can route data or calls for other phones in the network. The handsets also serve as nodes between other handsets, extending the reach of the entire system. Each handset has an effective range of about one kilometre. This collaborative routing of calls means there is no cost to talk between handsets. When a TerraNet phone is switched on, it begins to look for other phones within range. If it finds them, it starts to connect and extend the radio network. When a number is dialled a handset checks to see if the person being called is within range. If they are, the call goes through. While individually the phones only have a maximum range of 1km, any phone in between two others can forward calls, allowing the distance to double. This principle applied many times creates a mini network. However, TerraNet founder Anders Carlius admitted that this has created big problems with having enough available frequencies. The system can also be used to make calls to other TerraNet mesh networks via a net-connected PC fitted with an inexpensive USB dongle."

Currently, this new system only works with a special handset, but "Mr Carlius said he hopes that it will eventually be a feature available on all phones, like Bluetooth. He said that were this to happen, it could potentially spell the end for the current Global System for Mobile (GSM) communications model which is used by about 70% of all mobile phones." Most large mobile companies seem skeptical at the moment, but according to Mr Carlius, mobile phone manufacturer Ericsson had invested around £3m in TerraNet.

Read the full article on BBC News.

Wednesday, September 12, 2007 8:02:10 AM (W. Europe Standard Time, UTC+01:00)  #     | 

A Swedish security researcher, Dan Egerstad, has recently revealed how he collected 100 passwords from embassies and governments worldwide by sniffing Tor exit routers. Egerstad explains on his blog how he did it, and calls attention to and re-iterates the lack of appreciation for cybersecurity among organizations worldwide.

Read related article on Ars Technica here.

Wednesday, September 12, 2007 7:58:16 AM (W. Europe Standard Time, UTC+01:00)  #     | 

Computerworld reports on a worm targeting Windows PCs that is spreading through Skype's instant messenger, making the Voice over IP (VoIP)'s chat software the next target. Dubbed Ramex.a by Skype spokesman Villu Arak, but pegged Pykspa.d by Symantec, the worm takes a typical instant messenger (IM) line of attack: After hijacking contacts from an infected machine's Skype software, it sends messages to those people that include a live link. Recipients who blithely click on the URL, which poses as a JPG image but is actually a download to a file with the .scr extension, wind up infected. Arak also listed instructions for removing the worm from infected PCs, but they included changes to the Windows registry, a chore most users are hesitant to try. Ramex.a/Pykspa.d injects code into the Explorer.exe process to force it to run the actual malware, a file named wndrivsd32.exe, periodically. The worm also plugs in bogus entries in the Windows hosts file so that installed security software won't be able to retrieve updates.

Skype is only the latest IM client to fall victim to hackers. Both Yahoo Messenger and Microsoft Corp.'s MSN/Live Messenger have been targeted this summer. Exploit code designed to hijack Windows PCs running Yahoo Messenger appeared as early as June, and Yahoo has been forced to patch the IM client several times since. Microsoft, meanwhile, has scheduled fixes for its MSN Messenger and Windows Live Messenger software for tomorrow, presumably to quash a webcam bug that was disclosed late last month.

Read more of this article here.

Wednesday, September 12, 2007 7:55:46 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, September 11, 2007

Bill St. Arnaud's blog passes on information on the upcoming OECD-Canada Technology Foresight Forum on the Participative Web: Strategies and Policies for the Future to be held 3 October 2007 in Ottawa, Canada.

Tuesday, September 11, 2007 9:05:04 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Dancho Danchev’s blog has a post on the agressiveness of the Storm Worm botnet:

“Stage one - infect as many end users with high speed Internet access as possible through the use of client side vulnerabilities. Stage two - ensure the longest possible lifecycle for the malware campaign by having the newly released binaries hosted at the infected PCs themselves. Stage three - take advantage of fast-flux networks to make it harder to shut down the entire botnet. And stage four - strike back at any security researcher or vendor playing around with Storm Worm's fast-flux network or somehow messing up with the malicious economies of scale on a worldwide basis. On Friday I received an email from Susan Williams at aa419.org, and as it looks like several other anti-fraud sites are getting DDoS-ed too :

"On September 2 2007, online scammers began an automated DDoS attack against aa419.org, with the goal of shutting down the anti-fraud site. For some time, aa419 was able to filter the worldwide botnet's attacks by monitoring connections and only allowing legitimate visitors to access thesite. However, by September 5 the hoster was being overwhelmed with nearly 400 GB of incoming requests every hour. Rather than let their infrastructure melt under the onslaught, the server is currently offline. This massive distributed denial of service (DDoS) attack was inspired by aa419.org's mission to blacklist and shut down scam web sites. Since 2004, the all-volunteer organization has recorded more than 18,000 such sites. In addition to publicly warning potential victims of fraud, they work with hosters and registrars to take scam web sites offline quickly, with a success rate of over 97% shut down. Susan Williams, press officer for aa419.org, said, "On the whole, we're positive about this. Not that we enjoy being offline; quite the opposite. But being attacked with a botnet of this magnitude tells us that we are doing serious damage to the organized crime networks that run these scams." Internet crime is increasing at record rates, and aa419.org is at the forefront of the fight against it. "We will continue our work regardless of how many criminals are annoyed by it," Williams said."

"This newest ddos round started about a week ago and knocked us offline for a couple hours while we figured out what was going on. And we're still under attack, so if the site is a bit slower, you know why. Odd month really, lots of sites, lots of sites, are under ddos. We've got over 10k bots attacking us with more being added daily.""

Tuesday, September 11, 2007 8:29:44 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Spamnation reports that the popular scambaiting site 419Eater and the anti-scam site Scamwarners are the latest anti-spam sites to fall victim to a distributed denial of service (DDoS) attack. Artists against 419 was also hit recently as well as another useful anti-scam site, CastleCops, along with other sites hosting antispam forums.

Spamnation asserts that the Zhelatin (Storm Worm) gang is responsible for a number of other DDoS attacks this year, including an attack against anti-spam sites and download sites operated by a rival spam gang. Zhelatin are known to have spare capacity at the moment. There have been reports that they have built up a botnet containing more than a million computers, not all of which are currently being used for stock and pill spam.

For spam gangs like Zhelatin, a DDoS attack appears to be another opportunity to exploit. When the Zhelatin botnet gets to break in a site, it's more likely that the attack has been commissioned by one of their customers. In the same way that a customer can order a stock spam run, they can request a DDoS attack (although it has been claimed that DDoS attacks cost more than regular spam runs, because there is a greater risk that ISPs or law enforcement will react aggressively to shut down the machines involved).

Read full article here.

Tuesday, September 11, 2007 8:55:35 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 10, 2007

The Food and Agriculture Organization (FAO) accepted the role and responsibilities of facilitating activities related to the action line under C.7 ICT Applications - e-Agriculture at the World Summit on the Information Society (WSIS) follow-up meetings held in February 2006 in Geneva.

In May 2007, a pilot web-based platform, www.e-agriculture.org was launched providing a dynamic space for those interested in shaping e-agriculture policies and practices to network, share information, experiences, and opinions, and to find out about new and useful systems, tools, and methodologies.

From 12 September to 3 October 2007, the Consultative Group on International Agricultural Research (CGIAR) invites all e-Agriculture Community members to participate in its online consultation on "Opening Access to CGIAR Research and Knowledge: From Data, Information and Collaboration to Food" at the online forum. The objective is to make it easier for CGIAR staff, partners and potential partners to access, use and add value to the research and to the scientific outputs of the CGIAR.

With the objective to support the use of ICTs and knowledge management in the agricultural sector, a strategy has been drafted on global public goods.

  • Integrated access to global public goods stewarded by the CGIAR (technical standards/portal work);
  • Networking and capacity building to ensure the best possible linkages between CGIAR, NARS and other partners for public goods generation and sharing;
  • Value-added information products and services.
Monday, September 10, 2007 5:38:47 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Peter Gutmann of the Department of Computer Science, University of Auckland presents how "malware has come a long way since it consisted mostly of small-scale (if prolific) nuisances perpetrated by script kiddies. Today, it's increasingly being created by professional programmers and managed by international criminal organisations. The Commercial Malware Industry looks at the methods and technology employed by the professional malware idustry, which is turning out "product" that matches (and in some cases even exceeds) the sophistication of standard commercial software, but with far more sinister applications."

The presentation discusses extensively how the malware industry has evolved from The Numbers Racket to organized crimes and even further now into the Spam, Carding, Phishing and Botnet businesses, among others. Provided in the presentation as well are case studies and examples, statistics, and technical mechanisms of these growing internet crimes as services.

Read more on Peter Gutmann's work here.

Monday, September 10, 2007 11:35:42 AM (W. Europe Standard Time, UTC+01:00)  #     | 

The ITU News Nº 7 September-October 2007 edition features in its Cybersecurity Watch the Cybersecurity Work Programme for Developing Countries. The purpose of the Cybersecurity Watch column is to share information on ITU activities and initiatives related to cybersecurity and countering spam. More information on ITU activities in the domain of cybersecurity can be found at here. ITU–D's ICT Applications and Cybersecurity Division has information on its ongoing projects, resources and publications to assist ITU Member States, including an overview of the ITU Cybersecurity Work Programme for Developing Countries, as well as information on the toolkits mentioned in the article at the CYB website. Details on related workshops and other events can be found here.

Monday, September 10, 2007 11:13:43 AM (W. Europe Standard Time, UTC+01:00)  #     | 

Researchers say the growing botnet has enough distributed power to launch a damaging attack against major businesses or even countries. The Storm worm botnet has grown so massive and far-reaching that it easily overpowers the world's top supercomputers. That's the latest word from security researchers who are tracking the burgeoning network of machines that have been compromised by the virulent Storm worm, which has pounded the Internet non-stop for the past three months. Despite the wide ranging estimates as to the size of the botnet, researchers tend to agree that it's one of the largest zombie grids they've ever seen. According to Matt Sergeant, chief anti-spam technologist with MessageLabs, "in terms of power, [the botnet] utterly blows the supercomputers away. If you add up all 500 of the top supercomputers, it blows them all away with just 2 million of its machines. It's very frightening that criminals have access to that much computing power, but there's not much we can do about it." Sergeant adds that researchers at MessageLabs see about 2 million different computers in the botnet sending out spam on any given day, and he estimates the botnet generally is operating at about 10% of capacity. Adam Swidler, a senior manager with security company Postini, told InformationWeek that while he thinks the botnet is in the 1 million to 2 million range, he still thinks it can easily overpower a major supercomputer.

Cyber criminals who control the botnet have a tremendous amount of destructive power. Early this summer, the Baltic nation of Estonia was pounded in a cyberwar that saw distributed denial-of-service attack primarily targeting the Estonian government, banking, media, and police sites.

Last month, Ren-Isac, a collaboration of higher-education security researchers, sent out a warning that the Storm worm authors had another trick up their sleeves. The botnet actually is attacking computers that are trying to weed it out. It's set up to launch a distributed denial-of-service attack against any computer that is scanning a network for vulnerabilities or malware. The warning noted that researchers have seen "numerous" Storm-related DoS attacks recently. MessageLabs' Sergeant said the botnet also has been launching DoS attacks against anti-spam organizations and even individual researchers who have been investigating it. "If a researcher is repeatedly trying to pull down the malware to examine it the botnet knows you're a researcher and launches an attack against you," he said.

Lawrence Baldwin, chief forensic officer of MyNetWatchman.com, said he doesn't have a handle on how big the overall botnet has become but he's calculated that 5,000 to 6,000 computers are being used just to host the malicious Web sites that the Storm worm spam e-mails are linking users to. And he added that while the now-well-known e-cards and fake news spam is being used to build up the already massive botnet, the authors are using pump-and-dump scams to make money. Swidler said that since mid-July, Postini researchers have recorded 1.2 billion e-mails that have been spit out by the botnet. A record was set on Aug. 22 when 57 million virus-infected messages -- 99% of them from the Storm worm -- were tracked crossing the Internet. According to researchers at SecureWorks, the botnet sent out 6,927 e-mails in June to the company's 1,800 customers. In July, that number ballooned to 20,193,134. Since Aug. 8, they've counted 10,218,196.

Read full article at InformationWeek.

Monday, September 10, 2007 9:56:35 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, September 07, 2007

On early May this year following the controversial uprooting of the 6-foot-tall bronze statue in downtown Tallinn, the capital of Estonia, the nation faced a series of massive botnet attacks. Estonian government, banking, media, and police sites were flooded by overwhelming internet traffic from all over the world which led to DDoS attacks forcing the sites to shut down and remain inaccessible outside the country for extended periods of time. In mid-May, the major botnet attacks suddenly stopped, and the bots appeared to have been set to run for exactly two weeks after which the infected computers abandoned the attacks and reverted to more traditional botnet activities, like spamming and extortion.

This recent attack on Estonia has proven the power of botnets and it DDoS capabilities. Using rented botnets, hundreds of thousands or even millions of infobombs may be launched at a target, all while maintaining total deniability to bring down a country's information infrastructure.

For more details on the botnet attack against Estonia, read full article here.
An article on how bots attack may also be accessed here.

Friday, September 07, 2007 10:25:46 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 06, 2007

Following the devastating earthquake measuring 7.9 on the Richter scale that struck Southern Peru on 15 August 2007, killing more than 500 people and injuring as well as displacing thousands more, ITU deployed 50 satellite terminals to help restore vital communication links in remote and underserved areas. These links are critical in coordinating rescue and relief operations.

According to Ms Cayetana Aljovin, Vice-Minister for Communications of Peru, the equipment is being deployed in areas where telecommunications are not available. But these are most needed to facilitate emergency teams as well as government organizations in establishing communications to coordinate their work. "We take very seriously the role of telecommunications in mitigating disasters," said Mr Sami Al Basheer Al Morshid, Director of ITU’s Telecommunication Development Bureau. "Whenever a country is affected by a disaster, we quickly mobilize and dispatch transportable telecommunications resources that can be used for general communications by government authorities and to provide e-services such as telemedicine that are crucial for saving human lives. We hope that this contribution will go a long way towards helping Peru cope with this massive earthquake".

Emergency telecommunication is the key for government and humanitarian aid agencies involved in rescue operations, medical assistance and rehabilitation. Mountainous terrain in Peru has severely hampered access and the coordination of rescue operations. The restoration of telecommunication resources have helped bridge these gaps and provided the much needed link for the transmission and reception of high speed data for e-applications and for voice communications. This has provided succour to both government authorities and relief agencies as well as to the affected population.

ITU has been responsible for transporting and deploying all the terminals as well as paying for the air time for using them.

Twelve of the terminals are Global Area Network (GAN) terminals and 38 are regional broadband global network satellite terminals (RBGAN). The 12 GAN terminals are capable of providing voice, data and video services, and the 38 RBGAN terminals provide high-speed data communications.

For further information, please visit Emergency Telecommunications or contact Sanjay Acharya, Chief of Media Relations and Public Information, | ITU | Tel: +41 22 730 6135 | e-mail: pressinfo (ad)itu.int | Cosmas Zavazava, Head of Division Emergency Telecommunications,| ITU | Tel: + 41 22 730 5447 | e-mail: cosmas.zavazava (ad)itu.int | Roberto Bastidas-Buch, ITU Area Office Tegucigalpa | Tel: +504 220 1074 | e-mail: roberto.bastidas (ad)itu.int.

For ITU press releases, please click here.

Thursday, September 06, 2007 2:12:17 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, September 05, 2007

Eric Bangeman of Ars Technica reports on the growing power of PSP on the internet today. According to a new survey from ipoque, a German traffic management and analysis firm, P2P traffic is dominating the Internet these days with ipoque's "preliminary results" showing that P2P applications account from anywhere between 50 percent and 90 percent of all Internet traffic. The final survey results are not yet available and will presented at the Emerging Technology Conference at MIT later this month.

During the last year, BitTorrent accounted for between 50 percent to 75 percent of all P2P traffic, with eDonkey coming in second at between 5 percent and 50 percent. ipoque's data appears at odds with that of Ellacoya Networks, a company that makes deep packet inspection gear. The company said in June that P2P traffic accounts for just 37 percent of North American traffic, compared with 46 percent for HTTP traffic. Of that 46 percent, over a third consisted of streaming video, à la YouTube.

Despite the differences in how the traffic is broken out, ipoque and Ellacoya's data both illustrate much of the P2P traffic reported by both firms is video. With the surge in traffic of YouTube and other video sites, as well as the official upcoming launch of Joost, demand for high-bandwidth applications like video is definitely increasing. This has resulted to ISPs' interest in deep packet inspection and other traffic-shaping tools.

Read full article here.

Wednesday, September 05, 2007 2:55:54 PM (W. Europe Standard Time, UTC+01:00)  #     | 

APCAUCE's 2007 meeting was held on 02 September 2007 in conjunction with the 24th APNIC Open Policy Meeting and SANOG 10, in New Delhi, India. The meeting agenda and presentations are now available and may be accessed here. An Overview of the ITU Development Sector Activities on Cybersecurity was presented by Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector is available on the meeting site.

Wednesday, September 05, 2007 2:32:35 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Security firm Sunbelt recently discovered that the Bank of India's hacked website was serving dangerous malware, and the infamous Russian Business Network, an ISP linked to child pornography and phishing, is behind the attack. The service provider in question has developed a notorious reputation. According to VeriSign threat intelligence analyst Kimberly Zenz, the Russian Business Network (RBN) is different to other service providers because "unlike many ISPs that host predominately legitimate items, RBN is entirely illegal. A scan of RBN and affiliated ISPs' net space conducted by VeriSign iDefense analysts failed to locate any legitimate activity. Instead, [our] research identified phishing, malicious code, botnet command-and-control, denial-of-service attacks and child pornography on every single server owned and operated by RBN."

Patrik Runald, senior security specialist at F-Secure, said: "No one knows who the RBN is. They are a secret group based out of St Petersburg that appears to have political connections. The company doesn't legitimately exist. It's not registered and provides hosting for everything that's bad. Their network infrastructure is behind a lot of the bad stuff we're seeing and it has connections to the MPack Group [a well-known group of cybercriminals which used MPack software to steal confidential data]." Runald said that, in the case of the Bank of India's hacked website, RBN used an Iframe to launch another window which then pushed victims to a webpage containing malicious code. The Trojans used in this case were designed to steal passwords from PCs and upload Trojan proxies in aide of developing a botnet.

Read the full article on ZDNet.co.uk.

Wednesday, September 05, 2007 11:28:53 AM (W. Europe Standard Time, UTC+01:00)  #     | 

BBC News reports that easy to use tools that automate attacks on computers are being produced by malicious hackers, according to security experts, ranging from individual viruses to comprehensive kits that let budding cyber thieves craft their own attacks. The top hacking tools may cost up to £500, with some providing 12 months of technical support. Tim Eades from security company Sana said that malicious hackers had evolved over the last few years and were now selling the tools they used to use to the growing numbers of cyber thieves. Individual malicious programs cost up to £17 (25 euros), he said. At the top end of the scale, said Mr Eades, were tools like the notorious MPack which costs up to £500. The regular updates for the software ensure it uses the latest vulnerabilities to help criminals hijack PCs via booby-trapped webpages. It also includes a statistical package that lets owners know how successful their attack has been and where victims are based. MPack has been very popular among criminally minded groups and in late June 2007 managed to subvert more than 10,000 websites in one attack that drew on the tool.

Paul Henry, vice president of Secure Computing, said there were more than 68,000 downloadable hacking tools in circulation. The majority were free to use and took some skill to operate but a growing number were offered for sale to those without the technical knowledge to run their own attacks such as Mpack, Shark 2, Nuclear, WebAttacker, and IcePack. Mr Henry said the tools were proving useful because so many vulnerabilities were being discovered and were taking so long to be patched. Many hacking groups were attracted to selling the kits because it meant they took little risk themselves if the malicious software was used to commit crimes. "The only thing you are going to find is a disclaimer that this was distributed for educational purposes and the user accepts any responsibility for any misuse," he said.

To read full article, click here.

Wednesday, September 05, 2007 11:12:11 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, September 04, 2007

World Information and Communications Development Trends, a presentation by Robert Shaw, head of the ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector, is now available. It was presented to the Ministry of Information and Communications (MIC) in Hanoi, Viet Nam on 27 August 2007 discussing issues related to transition to new technologies and Next Generation Networks (NGN). For more relevant information, visit the CYB website.

Tuesday, September 04, 2007 1:20:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 03, 2007

The United States District Court of Washington ruled in favor of Kaspersky Lab, a leading developer of secure content management solutions, granting immunity from liability in the case brought by online media company Zango. According to Zango's lawsuit, Kaspersky Lab should reclassify Zango’s programs as nonthreatening and Kaspersky Labs’s security software should stop blocking Zango’s potentially undesirable programs. "Judge Coughenour of the Western District of Washington threw out Zango’s lawsuit on the grounds that Kaspersky was immune from liability under the Communications Decency Act. The ruling protects consumer choice to determine what information and software is allowed on each computing system, and enables anti-malware vendors with the right to identify and label software programs that may be potentially unwanted and harmful to a user’s computer as they see fit."

Read full article here.

Monday, September 03, 2007 9:46:38 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, August 30, 2007

Vanguard Media reported today on planned subsidies for telecom operators to erect base transceivers stations in Nigeria with the support of the Universal Service Provision Fund (USPF).

The Fund would receive parts of the annual operating levy that all operators pay to the Nigerian Communications Commission. Finally, subsidies would allow telecom operators to expand their services to isolated and under-served areas, which would enable rural communities to have access to the information society through internet and telephone.

Click here, to read more.

Thursday, August 30, 2007 4:55:22 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Internet bandwidth could become a global currency under a proposed model for the future of e-commerce that exploits a novel peer-to-peer video sharing application designed by a trans-Atlantic team of computer scientists according to an article by Vidura Panditaratne on Wednesday, 29 August 2007. This application is being used by researchers from Delft University of Technology and Vrije Universiteit, Amsterdam and Harvard's School of Engineering and Applied Sciences to explore a next-generation model for safe and legal electronic commerce that uses Internet bandwidth as a global currency. An enhanced version of this application called Tribler is now available for free download online.

A version of the Tribler video sharing software serves as a model for an e-commerce system because of its flexibility, speed, and reliability. The researchers envision this model to connect users to a single global market, without any controlling company, network, or bank with bandwidth as the first true Internet "currency" for such a market. "By studying user behavior within an operational 'Internet currency' system, with a particular focus on understanding how and why attacks, fraud, and abuse occur and how trust can be established and maintained, the researchers imagine future improvements to everything from on-demand television to online auctions to open content encyclopedias."

Read more by accessing the full article.

Thursday, August 30, 2007 9:42:28 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, August 29, 2007

The VietNamNet Bridge yesterday published an interview with the Ministry of Information and Communications of Vietnam. According to the Deputy Minister, developing e-government would support the government to operate more effectively, more transparently and to better serve citizens.

Planned activities based on experiences in Vietnam and other countries would aim to integrate ICT applications into public administration agencies by 2010. Doing so would require digitalizing administrative systems and procedures, and providing ICT training. To overcome the reluctance to change, the programme would seek the support and involvement of civil society, private industry and local and regional administrations.

To read more, click here.

Wednesday, August 29, 2007 5:57:38 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, August 28, 2007

Pakistan's Minister for Information Technology Awais Ahmad Khan Leghari said on Thursday that the adoption of cyber crime bill by the federal cabinet was a major step towards ensuring a secure business environment and promotion of e-commerce. He said the e-crime bill which will be tabled in the parliament very soon, would help draw more business and improve Pakistan's e-readiness ranking as reflected in indices maintained by various agencies and business journals of the world.

The Federal Investigation Agency (FIA) has been given the mandate to probe cases falling under the preview of the e-crime law. He said the e-crime law would require the internet companies maintain their traffic data for at least six months to enable the agencies to investigate cases involving data stored by them. He also added that the government would create special IT tribunals in Islamabad as well as provincial headquarters to investigate and check growing incidents of crimes which remained unpunished for a lack of specific law.

The Prevention of Electronic Crimes Bill 2007 poses penalties ranging from six months to 10 years of punishment for 17 types of cyber crimes, including cyber terrorism, hacking of websites and criminal access to secure data. Thirteen of the crimes listed under the law are bailable.

Read full article here.

Tuesday, August 28, 2007 10:47:42 AM (W. Europe Standard Time, UTC+01:00)  #     | 

GigaOM, on an article by Om Malik, "All Hail SMS," discusses the growing popularity of Short Message Service (SMS), aka text messaging, despite rumors of its pending demise. The technology's relative simplicity and ease of use, despite the high tariffs imposed by carriers around the world, makes SMS usage more and more popular. According to Paul Ruppert, a veteran of mobile business and now a consultant, every year, 2.1 billion global mobile users send 3 trillion SMS messages. Even in markets like the U.S., which lagged in embracing the ease and power of texting and seemingly preferred email and Instant Messaging, text messaging has become an intimate aspect of daily lives, especially for those 15 to 25. Commonly used communications applications embedding direct-to-SMS functionality, such as the new Yahoo Mail, which comes with free text messaging to mobile phone numbers (available in the U.S., Canada, India and the Philippines), have also become apparent nowadays.

Om Malik also writes that "some (mostly entrepreneurs and venture capitalists) believe that like email, SMS is the vehicle for add-on-innovation. There are gaming companies that have turned SMS-based voting into a big business. Voice SMS is being talked about as the next big thing."

To read the full artcile, click here.

Tuesday, August 28, 2007 9:34:42 AM (W. Europe Standard Time, UTC+01:00)  #     | 

ICANN finalized on 23 August 2007 the IDN .test Evaluation Plan and is currently moving forward towards the insertion of IDN strings in the root zone. These IDN TLDs are the word "test" translated into eleven languages including: Arabic, Persian, Chinese (simplified and traditional), Russian, Hindi, Greek, Korean, Yiddish, Japanese and Tamil. The delegation of these TLDs and the evaluations, as described in the plan, is expected to commence in September 2007.

The plan has been modified based on comments received on the IDN public forum and also from consultations with ICANN Technical Advisory Committees. The last version was approved by the ICANN Board at their 14 August 2007 meeting, and the resolution directs ICANN Staff to implement the IDN .test Evaluation Plan, and report back to the ICANN Board following the conclusion of the evaluation.

Keep updated on the progress of this project by visiting http://icann.org/topics/idn.

Read the full article here.

Tuesday, August 28, 2007 8:34:10 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, August 23, 2007

The World Health Organization launched its annual leading publication focusing on building a safer future in public health. The World Health Report 2007 shows how and why the world is at increasing risk of outbreaks of communicable diseases across borders, natural and man-made disasters and other health emergencies that can rapidly become threats to global public health security.

Information and communication technologies used in surveillance, monitoring and response networks are mentioned as tools to respond to outbreaks of infectious diseases. The report says that the prospect of a safer future would be within reach - and that this would be both a collective aspiration and a mutual responsibility.

To read more, click here.

Thursday, August 23, 2007 5:27:46 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, August 22, 2007

The FBI has chosen the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign to host a new law enforcement cybersecurity research center. The bureau said it would provide $3 million to support the first two years' operation of the National Center for Digital Intrusion Response.

The bureau said the state university's IT security scholars would work with FBI cybersecurity specialists to understand what new capabilities are required to better detect and investigate cyberattacks, develop new tools and ensure that FBI agents in the field can use them effectively. The bureau's expansion of its work with the university team reflects changes in the patterns of crime and national security threats, the FBI said. "While cyberattacks were once considered a specialized niche in law enforcement, today there are digital aspects to many crimes and national security threats; all investigators must be able to pursue criminals operating in cyberspace," the FBI said. "NCDIR will provide training, including intensive summer workshops, so all FBI agents have the opportunity to use these new tools in the field."

Some of the projects and IT security tools developed by NCSA through the funding of the National Science Foundation and other federal agencies include MyProxy, a tool for grid credential management; Framework for Log Anonymization and Information Management, an app that facilitates sharing of log data among secure systems; GridShib, at tool that supports identity federation for grids; Trustworthy Cyberinfrastructure for the Power Grid; and Illinois Terrorism Task Force's First Responder's Credentialing.

Read the full article at Government Computer News (GCN).

Wednesday, August 22, 2007 5:01:28 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Australia announced a national strategy on deploying health records available over the internet to every citizen, as The Canberra Times reported yesterday. Patients would be able to securely access their medical claims and rebates over public networks as of 2008. Later on, patients would have online access to their pharmaceutical benefits schemes claims. Eventually, Australians would have access to their individual digital files, which would be automatically updated by health service providers.

A parallel initiative is focusing on ensuring effective follow-up medical care for indigenous children in remote areas. Depending on the patient’s or their parents’ authorization, health professionals would be able to access their digital records to support ongoing care.

(The full article "Aust health histories to be accessible on internet" by Danielle Cronin health reporter, Canberra Times, 21 August 2007, is not available freely online.)

Wednesday, August 22, 2007 3:45:39 PM (W. Europe Standard Time, UTC+01:00)  #     | 

On 22 July 2007, the New York Times reported on Rwanda's current Internet connectivity situation. According to the article, in 2003, Greg Wyler, an American businessman, promised the Rwandan government fiber optic cables and connectivity among schools, government institutions and homes through low-cost, high-speed Internet service. His company, Terracom,was granted a contract to connect 300 schools to the Internet, and later, the company bought 99 percent of the shares in Rwandatel, the country’s national telecommunications company, for $20 million. However, after nearly four years, the government criticizes Terracom for not having delivered and materialized most of the benefits they have hailed.

The technical, political and business realities of Africa are said to have caused this slow progress of the venture. Apart from the failed and delayed attempts to bring affordable high-speed Internet service to the masses in the continent, the lack of infrastructure is also being blamed to be the biggest drawback. Some other difficulties mentioned were insufficient bandwidth capacity on satellites, poor management and intermittent power failures. Rwandan officials also say that the company seems more interested in tapping the more lucrative cellphone market than in being an Internet service provider.

With Terracom’s new chief executive, Christopher Lundh, a former executive of Gateway Communications in London, government officials say Terracom’s performance has improved. The government, meanwhile, is moving forward with its own plans to build a fiber optic network. It also has granted Internet service licenses to South African companies and plans to issue several more. A reduced price of Internet service to about $10 a month is also aimed for according to Nkubito Bakuramutsa, director general of the Rwanda Information Technology Authority.

To read the full article, click here.

Wednesday, August 22, 2007 1:28:47 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, August 21, 2007

According to an analyst report, the internet is heading for a crash unless it increases its bandwidth capabilities. A study conducted by ABI Research claims that cable firms face the biggest challenge as their technology will reach saturation point first.

Stan Schatt, research director at ABI, told Ars Technica: "Uploading bandwidth is going to have to increase, and the cable providers are going to get killed on bandwidth as HD programming becomes more commonplace." He adds that the solution to the problem is to change to digital switching and move to IPTV.

Researchers from Cisco Systems seem to agree with this claim. Cisco found that American video websites currently transmit more data per month than the entire amount of traffic sent over the internet in 2000. The company estimates that file-sharing makes up at least one-third of today's internet traffic. The Cisco report predicted that video streaming and downloads will increase to make up to 30 percent consumer internet traffic in 2011, up from the 2006 figure of nine per cent.

With the release of the BBC's iPlayer online television service in the UK, bandwidth concerns with internet service providers increase even more. However, Orange reports that the internet overload does not appear to have started yet.

Continue reading the article here at vnunet.com.

Tuesday, August 21, 2007 8:57:19 AM (W. Europe Standard Time, UTC+01:00)  #     |