[governance] US to impose sanctions on foreign cyber attackers
Jefsey
jefsey at jefsey.com
Sat Apr 4 07:37:28 EDT 2015
At 00:28 04/04/2015, Fouad Bajwa wrote:
>But this should be a larger debate beyond the remit of nation states
>that involves the broader civil society and other stakeholders.
>These technologies did not just appear on their own, they were
>developed by individuals, groups, communities and companies and so
>forth. Why are we so afraid to create a discourse and bridge the
>gaps opposed to the propaganda? Why not raise and argue at the IGF
>and regional fora? Why not a dynamic coalition on the issue?
This should. But for the time being better for me to share in the
most efficient part I can forster/help.
This is why I would certainly ***welcome and support*** a dynamic
coalition on the issue. However, as long as I am concerned I can only
focus on the post-google internet practical "initem" (set of initial
conditions to condition or having conditionned a system), i.e. the
catenet's substructural (between operations and infrastructure)
technology that will allow to complete the second phase of Vint
Cerf's IEN 48 project of 1978 - of which the first phase was the
present internet. https://www.rfc-editor.org/ien/ien48.txt
("objectives" section).
This was definitly blocked since 1985 by the NSA "status-quo"
strategy of architectural protection (lack of OSI Layer 6
presentation in the UNIX/internet architecture). The recente
"premissionless innovation" now partly opens the door to that
possibility; however they want to keep controlling it via the "maffia
type" multistakeholder pretence. Technological emergence is
omnistakeholder based anyway, but they will keep containing it as
much as they can until a full "layer-6+" has been incorporated in the
multiple technologies involved.
https://www.iab.org/2014/11/14/iab-statement-on-internet-confidentiality/
jfc
>On Thursday, 2 April 2015, Jefsey
><<mailto:jefsey at jefsey.com>jefsey at jefsey.com> wrote:
>Fouad,
>
>the problem is not that much what they do, but that they do it in
>order to accustom us to what they are going to do soon - by Sept.
>30, 2015: i.e. to formally make ICANN the international law of the
>internet - and the FCC the cybersupreme court. The transition is
>from an US Executive Dominion to a colonny under US jursdiction (cf.
>TPP, TAFTA, etc.)
>Up to now, the only consideration for an alternative is my appeal
>(<http://iuwg.net/index.php/Letter_to_Lawrence_E._Strickling,_Assistant_Secretary,_NTIA>http://iuwg.net/index.php/Letter_to_Lawrence_E._Strickling,_Assistant_Secretary,_NTIA).
>
>
>RFC 2026 states: "In all cases a decision concerning the disposition
>of the dispute, and the communication of that decision to the
>parties involved, must be accomplished within a reasonable period of
>time." The delay in responding shows that they consider it carefully
>as it desserves. So far everything is on track. I expect that
>several "MYCANN Plugs-in" will be ready by Oct. 1st.
>
>jfc
>
>
>At 14:16 02/04/2015, Fouad Bajwa wrote:
>
>How far will nations go with addressing the cyberattack threat?
>Pakistan has a cybercrime bill in the making that treats such attacks
>within its borders as treason and severe punishments while larger
>powerful nations with global reach like the US are going to treat this
>possibly with sanctions. Civil Society has so far been a back seat
>audience on such contemporary security issues. There have been
>academic interventions on such subjects but within the practitioner
>and regulatory spaces, there hardly have been any alternative
>approaches to seriously address such issue. May be some consideration
>in future IGFs?
>
>FYI
>Obama threatens foreign cyber attackers with sanctions
>Warwick Ashford, Thursday 02 April 2015 09:45
>Computer Weekly - CYBER SECURITY
><http://www.computerweekly.com/news/4500243644/Obama-threatens-foreign-cyber-attackers-with-sanctions>http://www.computerweekly.com/news/4500243644/Obama-threatens-foreign-cyber-attackers-with-sanctions
>
>--
>Regards.
>--------------------------
>Fouad Bajwa
>Public Policy Analyst
>Follow my Tweets: <http://twitter.com/fouadbajwa>http://twitter.com/fouadbajwa
>My Blog: Internet's Governance:
><http://internetsgovernance.blogspot.com/>http://internetsgovernance.blogspot.com/
>
>
>
>Content-Transfer-Encoding: 8bit
>Content-Disposition: inline
>
>____________________________________________________________
>You received this message as a subscriber on the list:
>Â Â Â governance at lists.igcaucus.org
>To be removed from the list, visit:
>Â Â Â
><http://www.igcaucus.org/unsubscribing>http://www.igcaucus.org/unsubscribing
>
>For all other list information and functions, see:
>Â Â Â
><http://lists.igcaucus.org/info/governance>http://lists.igcaucus.org/info/governance
>To edit your profile and to find the IGC's charter, see:
>Â Â Â <http://www.igcaucus.org/>http://www.igcaucus.org/
>
>Translate this email:
><http://translate.google.com/translate_t>http://translate.google.com/translate_t
>
>
>
>
>
>--
>Regards.
>--------------------------
>Fouad Bajwa
>Public Policy Analyst
>Follow my Tweets: <http://twitter.com/fouadbajwa>http://twitter.com/fouadbajwa
>My Blog: Internet's Governance:
><http://internetsgovernance.blogspot.com/>http://internetsgovernance.blogspot.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20150404/157c738a/attachment.htm>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
governance at lists.igcaucus.org
To be removed from the list, visit:
http://www.igcaucus.org/unsubscribing
For all other list information and functions, see:
http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
http://www.igcaucus.org/
Translate this email: http://translate.google.com/translate_t
More information about the Governance
mailing list