[governance] US gov's Domain seizing activities
parminder
parminder at itforchange.net
Mon Nov 29 05:06:05 EST 2010
BTW, do click on http://www.torrent-finder.com/ to see the seizure notice .
As the article mentions, the seizure of the domain space is done not at
Registrar level but at TLD owner level, a privilege only available to US
gov for most top TLDs.
On Monday 29 November 2010 02:54 PM, parminder wrote
>
>
> On Monday 29 November 2010 02:52 PM, parminder wrote:
>> (For some reason, domain seizing activities of governments of
>> developing countries
>
> correction. i of course meant developed countries here
>
>
>> , done for IP enforcement, receives so much less attention that that
>> of developing countries done for political and cultural reasons. See
>> below.)
>>
>>
>> The Background Dope on DHS Recent Seizure of Domains
>>
>> http://rulingclass.wordpress.com/2010/11/28/the-background-dope-on-dhs-recent-seizure-of-domains/
>>
>> As has been reported, it looks like ICE
>> <http://www.ice.gov/iprcenter/>, which is the principal investigative
>> arm of DHS, has begun seizing domains under the pretext of IP
>> infringement. But it’s actually not ICE who is executing the
>> mechanics of the seizures. It’s a private company, immixGroup IT
>> Solutions <http://www.immixgroup.com/>. Here is what is going down.
>>
>> In May of this year, immixGroup IT Solutions
>> <http://www.immixgroup.com/news/pr_display.cfm?ID=117> is awarded a
>> one year IT Services contract with DHS. The particulars of this contract:
>>
>> Under this new contract, immixGroup will provide information
>> technology operational services and support, implementation, and
>> maintenance of DHS ICE C3′s software applications, network and
>> CyberSecurity systems, as well as the maintenance and enhancement
>> of applications that support law enforcement activities.
>>
>> The contract includes one base year, one 12-month option period,
>> and two six-month option periods; covers all four divisions of C3
>> (Child Exploitation, Cyber Crimes, Computer Forensics, and Cyber
>> Training); and is critical to C3′s pursuit of criminal activity.
>> immixGroup’s services in this effort include network maintenance,
>> application development and support, forensic lab assistance,
>> data storage maintenance, and information assurance.
>>
>> On November 24th, immixGroup IT Solutions registered the domain
>> SEIZEDSERVERS.COM, and primary and secondary nameservers,
>> NS1.SEIZEDSERVERS.COM, NS2.SEIZEDSERVERS.COM, with Network Solutions,
>> which is the registrar for this domain. Since the DHS contract is
>> provisionally for one year only, the domain was only registered for
>> one year(expires in one year).
>>
>> immixGroup IT Solutions is using CaroNet <https://www.caro.net/> to
>> host their domain, including the authoritative name
>> servers(NS1.SEIZEDSERVERS.COM, NS2.SEIZEDSERVERS.COM) for this
>> domain. They have setup a simple web page, http://seizedservers.com/
>> or http://74.81.170.110 which is the same “Notification of Seizure”
>> page you will get if you type in one of the seized domains in browser
>> address bar(if you’re paranoid: yes, they are tracking using both
>> Google analytics and piwik).
>>
>> ICE is not actually “seizing” any servers or forcing hosting
>> companies to remove web content from their servers; what they are
>> doing is using immixGroup IT Solutions to switch the authoritative
>> name servers for these “seized domains.” But they are not doing it at
>> the Registrar level(by contacting the registrar for the domain and
>> forcing them to update the authoritative name server info to point to
>> NS1.SEIZEDSERVERS.COM, NS2.SEIZEDSERVERS.COM), but rather through the
>> agency who controls the top level domain. In this case, all the
>> “seized domains” appear to be .com and the agency/company who has the
>> ICANN contract for this TLD is VeriSign(which also controls .net
>> TLD). The changes are being made at the top-level authoritative name
>> servers for the .com TLD, which would be the [a-m].gtld-servers.net.
>> These are controlled by VeriSign(note: these top-level name servers
>> are also authoritative for .net and .edu TLDs).
>>
>> So, VeriSign, the owner of the .com TLD, is working in cooperation
>> with DHS, and it appears immixGroup IT Solutions has what we might
>> call an “IT Support Ticket system” setup with VeriSign.
>>
>> That web servers are not being seized and web content not being
>> deleted can easily be verified by clicking this link,
>> http://208.101.51.57, which is the original IP Address of a seized
>> domain, *torrent-finder.com*. It’s still up, and it appears it has
>> registered a new domain, *torrent-finder.info*, that resolves to the
>> original IP address. This site is being hosted by SoftLayer
>> Technologies in Dallas, TX. So, it is certainly within US
>> jurisdiction to be shut down if there was “a case to be made.”
>>
>> Now the .info TLD is not controlled by VeriSign; it’s controlled by
>> Afilias <http://en.wikipedia.org/wiki/Afilias>. So, an interesting
>> little experiment would be to see if the *torrent-finder.info* domain
>> remains up. As of now, we can only conclude that there is back deal
>> between DHS and VeriSign that makes any .com or .net domain subject
>> to seizure by the actions of immixGroup IT Solutions.
>>
>> Lastly, there has been some speculation that this recent business of
>> “domain seizure” portends the same tactics being used to seize the
>> “wikileaks.org” domain. From a technical standpoint, understand that
>> the .org TLD is not controlled by VeriSign; it is controlled by the
>> Public Interest Registry. An interesting thing however: PIR has
>> contracted out the technical operations to Afilias. So, if we were to
>> see *torrent-finder.info* similarly seized, then this would mean that
>> Afilias is also in cahoots with DHS, which could imply the .org TLD
>> could be subject to the same type of “domain seizures.” As of now,
>> there is no evidence of that. And, it should be clear, these type of
>> domain seizures are completely different than the 2008 attempted
>> shutdown of wikileaks.org by the US government. In that case, a U.S.
>> District Court issued an injunction ordering Dynadot, which was the
>> registrar for the domain, to remove all traces of Wikileaks from its
>> records. That didn’t hold up.
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20101129/a0cb955c/attachment.htm>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
governance at lists.cpsr.org
To be removed from the list, send any message to:
governance-unsubscribe at lists.cpsr.org
For all list information and functions, see:
http://lists.cpsr.org/lists/info/governance
Translate this email: http://translate.google.com/translate_t
More information about the Governance
mailing list