European Capability for Situational Awareness

Total Page:16

File Type:pdf, Size:1020Kb

European Capability for Situational Awareness European Capability for Situational Awareness A study to evaluate the feasibility of an ECSA in relation to internet censorship and attacks which threaten human rights FINAL REPORT A study prepared for the European Commission DG Communications Networks, Content & Technology by: Digital Agenda for Europe This study was carried out for the European Commission by Free Press Unlimited Ecorys NL Weesperstraat 3 Watermanweg 44 1018 DN Amsterdam 3067 GG Rotterdam The Netherlands The Netherlands and subcontractors: Internal identification Contract number: 30-CE-0606300/00-14 SMART 2013/N004 DISCLAIMER By the European Commission, Directorate-General of Communications Networks, Content & Technology. The information and views set out in this publication are those of the author(s) and do not necessarily reflect the official opinion of the Commission. The Commission does not guarantee the accuracy of the data included in this study. Neither the Commission nor any person acting on the Commission’s behalf may be held responsible for the use which may be made of the information contained therein. ISBN 978-92-79-50396-2 DOI: 10.2759/338748 © European Union, 2015. All rights reserved. Certain parts are licensed under conditions to the EU. Reproduction is authorised provided the source is acknowledged. European Capability for Situational Awareness – Final Report Table of contents Glossary ............................................................................................................................................................4 Abstract ............................................................................................................................................................8 Executive Summary ..........................................................................................................................................9 1. Introduction ........................................................................................................................................... 15 2. Methodology of the study ..................................................................................................................... 19 3. Results of task 1: Consultation and workshop ...................................................................................... 21 4. Results of task 1: Federation models .................................................................................................... 24 5. Results of Use-case research ................................................................................................................. 26 6. Results of task 2: Data sources catalogue ............................................................................................. 29 7. Results of task 3: Data governance framework ..................................................................................... 33 8. Results of task 4: Technical and infrastructure specifications, features and functionalities ................ 38 9. Proof-of-concept use case: demo ......................................................................................................... 42 10. Conclusions ........................................................................................................................................ 45 11. Recommendations ............................................................................................................................. 48 12. Roadmap ........................................................................................................................................... 58 ANNEXES Annex I. List of organisations - survey ........................................................................................................... 67 Annex II. Summary results of the workshop ................................................................................................. 73 Annex III. Data sources list ............................................................................................................................ 76 Annex IV. List of participants IMON ............................................................................................................ 129 Annex V. Budget .......................................................................................................................................... 131 Annex VI. List of additional interviews task 5 .............................................................................................. 140 Annex VII. Bibliography ............................................................................................................................... 141 3 European Capability for Situational Awareness – Final Report Glossary Types of organisations Internet and Human Rights sector: refers to the disciplines, initiatives and stakeholders involved in researching, developing technical solutions, enabling civil society and contributing to policy making in domains which are related to the role that internet technologies play in enabling or restricting human rights. Here is a list of the stakeholders we have identified and which are taking part to a burgeoning Internet and Human Rights sector. Academia: Universities, research organisations and independent researchers Technology Providers: Organisation or individuals developing or operating technology solutions directly related to the Internet and Human Rights sector. For instance, the development of dedicated monitoring infrastructure, data analytics or circumvention software. This doesn't include technology providers that do not directly target Internet and Human Rights such as telecommunication companies, or more generic internet platform providers. Technical Professional Communities: Professionals and professional organisations focused on monitoring and supporting the integrity of global communication networks including computer security, network measurement, software engineering which are not directly related to Human Rights. EC Services: DG or service within or directly supporting the European Commission. Institution: Governmental organisations or organisations directly supporting government services, UN agencies, intergovernmental bodies, European institutions and other institutions ICT Industry: Commercial stakeholders providing Internet infrastructure and services not directly aim at providing solutions for the Internet and Human Rights sector, such as Telecommunication providers or social networking platform or email providers. International Civil Society Organisation: International NGO or other organisation working globally in the Internet and Human rights sector. Local Civil Society Organisation (CSO): National Organisation working in the Internet and Human Rights sector in countries potentially impacted by information controls. Data and information types Data/information on the “state of the Internet infrastructure, connectivity and access”: blocking; filtering; connectivity blackouts or slowdowns; power outages; cyber-attacks and security events including attacks on activists´ networks via Distributed Denial of Service attacks, spyware or malware; countries passing laws or applying measures with a negative impact on Internet infrastructure and on its resilience, security and stability; cyber censorship and surveillance technological developments; state led cyber-attacks, etc. Data/information related to “what is happening on the ground”: Laws and policies affecting the use of ICT for the exercise and protection of human rights; media freedom and pluralism constrains; relevant political events affecting digital freedoms; arrest of activists and journalists in connection to ICT blocked sites; different types of restrictions to freedom of expression; court rulings; illegal 4 European Capability for Situational Awareness – Final Report detentions; unrest in time of elections; crack-downs on protesters and a wide array of other human rights violations. Technical data: Internet infrastructure measurement; connection speed; Internet routing data; correlation of routing data with other intelligence; jitter; traffic latencies; packed loss; packet interception; wrong query resolving; network connectivity shutdowns and slowdowns; state of “health” of the DNS and BGP systems; impact of implementation of DNS-level filtering and blocking measures; surveillance technology producers and trade operations; IP traffic restrictions; proxy censorship; Internet backbone performance; Denial of Service attacks; politically-motivated attacks; malware activity; attacks to activists or media networks; domain de-registration; server takedowns; URLs intervened; targeted redirections; network outages; or power grid failures; domains seized. Internet tools data: restrictions on websites that provide e-mail or other applications like social networks; web hosting; search engines; translation services; VoIP services; circumvention tools; security software; anonymizers; security and privacy training materials; P2P file-sharing, chat or IMS. Political data: unlawful restrictions applied to websites expressing views contrary to the government and government opposition groups; human rights related content such as advocacy, abuses, women liberties; freedom of expression; minority rights; religious movements; foreign policy; political transformations and elections; ethnic groups; history; economics; international organizations; NGOs, activists and human rights defenders; political parties and opposition parties; quality of governmental organizations and judicial
Recommended publications
  • The Next Digital Decade Essays on the Future of the Internet
    THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus NextDigitalDecade.com TechFreedom techfreedom.org Washington, D.C. This work was published by TechFreedom (TechFreedom.org), a non-profit public policy think tank based in Washington, D.C. TechFreedom’s mission is to unleash the progress of technology that improves the human condition and expands individual capacity to choose. We gratefully acknowledge the generous and unconditional support for this project provided by VeriSign, Inc. More information about this book is available at NextDigitalDecade.com ISBN 978-1-4357-6786-7 © 2010 by TechFreedom, Washington, D.C. This work is licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Cover Designed by Jeff Fielding. THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET 3 TABLE OF CONTENTS Foreword 7 Berin Szoka 25 Years After .COM: Ten Questions 9 Berin Szoka Contributors 29 Part I: The Big Picture & New Frameworks CHAPTER 1: The Internet’s Impact on Culture & Society: Good or Bad? 49 Why We Must Resist the Temptation of Web 2.0 51 Andrew Keen The Case for Internet Optimism, Part 1: Saving the Net from Its Detractors 57 Adam Thierer CHAPTER 2: Is the Generative
    [Show full text]
  • The Virtual Sphere 2.0: the Internet, the Public Sphere, and Beyond 230 Zizi Papacharissi
    Routledge Handbook of Internet Politics Edited by Andrew Chadwick and Philip N. Howard t&f proofs First published 2009 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN Simultaneously published in the USA and Canada by Routledge 270 Madison Avenue, New York, NY 10016 Routledge is an imprint of the Taylor & Francis Group, an Informa business © 2009 Editorial selection and matter, Andrew Chadwick and Philip N. Howard; individual chapters the contributors Typeset in Times New Roman by Taylor & Francis Books Printed and bound in Great Britain by MPG Books Ltd, Bodmin All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging in Publication Data Routledge handbook of Internet politicst&f / edited proofs by Andrew Chadwick and Philip N. Howard. p. cm. Includes bibliographical references and index. 1. Internet – Political aspects. 2. Political participation – computer network resources. 3. Communication in politics – computer network resources. I. Chadwick, Andrew. II. Howard, Philip N. III. Title: Handbook of Internet Politics. IV. Title: Internet Politics. HM851.R6795 2008 320.0285'4678 – dc22 2008003045 ISBN 978-0-415-42914-6 (hbk) ISBN 978-0-203-96254-1 (ebk) Contents List of figures ix List of tables x List of contributors xii Acknowledgments xvi 1 Introduction: new directions in internet politics research 1 Andrew Chadwick and Philip N.
    [Show full text]
  • Defending an Open, Global, Secure, and Resilient Internet
    Spine Should Adjust depending on page count Defending an Open,Defending Global, Secure, and Resilient Internet The Council on Foreign Relations sponsors Independent Task Forces to assess issues of current and critical importance to U.S. foreign policy and provide policymakers with concrete judgments and recommendations. Diverse in backgrounds and perspectives, Task Force members aim to reach a meaningful consensus on policy through private and nonpartisan deliberations. Once launched, Task Forces are independent of CFR and solely responsible for the content of their reports. Task Force members are asked to join a consensus signifying that they endorse “the general policy thrust and judgments reached by the group, though not necessarily every finding and recommendation.” Each Task Force member also has the option of putting forward an additional or a dissenting view. Members’ affiliations are listed for identification purposes only and do not imply institutional endorsement. Task Force observers participate in discussions, but are not asked to join the consensus. Task Force Members Elana Berkowitz Craig James Mundie McKinsey & Company, Inc. Microsoft Corporation Bob Boorstin John D. Negroponte Google, Inc. McLarty Associates Jeff A. Brueggeman Joseph S. Nye Jr. AT&T Harvard University Peter Matthews Cleveland Samuel J. Palmisano Intel Corporation IBM Corporation Esther Dyson Neal A. Pollard EDventure Holdings, Inc. PricewaterhouseCoopers LLP Martha Finnemore Elliot J. Schrage George Washington University Facebook Patrick Gorman Adam Segal Bank of America Council on Foreign Relations Independent Task Force Report No. 70 Michael V. Hayden Anne-Marie Slaughter Chertoff Group Princeton University Eugene J. Huang James B. Steinberg John D. Negroponte and Samuel J.
    [Show full text]
  • Transcript 061106.Pdf (393.64
    1 1 FEDERAL TRADE COMMISSION 2 3 I N D E X 4 5 6 WELCOMING REMARKS PAGE 7 MS. HARRINGTON 3 8 CHAIRMAN MAJORAS 5 9 10 PANEL/PRESENTATION NUMBER PAGE 11 1 19 12 2 70 13 3 153 14 4 203 15 5 254 16 17 18 19 20 21 22 23 24 25 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 2 1 FEDERAL TRADE COMMISSION 2 3 4 IN RE: ) 5 PROTECTING CONSUMERS ) 6 IN THE NEXT TECH-ADE ) Matter No. 7 ) P064101 8 ) 9 ---------------------------------) 10 11 MONDAY, NOVEMBER 6, 2006 12 13 14 GEORGE WASHINGTON UNIVERSITY 15 LISNER AUDITORIUM 16 730 21st Street, N.W. 17 Washington, D.C. 18 19 20 The above-entitled workshop commenced, 21 pursuant to notice, at 9:00 a.m., reported by Debra L. 22 Maheux. 23 24 25 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 3 1 P R O C E E D I N G S 2 - - - - - 3 MS. HARRINGTON: Good morning, and welcome to 4 Protecting Consumers in The Next Tech-Ade. It's my 5 privilege to introduce our Chairman, Deborah Platt 6 Majoras, who is leading the Federal Trade Commission 7 into the next Tech-ade. She has been incredibly 8 supportive of all of the efforts to make these hearings 9 happen, and I'm just very proud that she's our boss, and 10 I'm very happy to introduce her to kick things off. 11 Thank you. 12 CHAIRMAN MAJORAS: Thank you very much, and good 13 morning, everyone.
    [Show full text]
  • Berin Szoka & Adam Marcus
    THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus NextDigitalDecade.com TechFreedom techfreedom.org Washington, D.C. This work was published by TechFreedom (TechFreedom.org), a non-profit public policy think tank based in Washington, D.C. TechFreedom’s mission is to unleash the progress of technology that improves the human condition and expands individual capacity to choose. We gratefully acknowledge the generous and unconditional support for this project provided by VeriSign, Inc. More information about this book is available at NextDigitalDecade.com ISBN 978-1-4357-6786-7 © 2010 by TechFreedom, Washington, D.C. This work is licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Cover Designed by Jeff Fielding. THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET 3 TABLE OF CONTENTS Foreword 7 Berin Szoka 25 Years After .COM: Ten Questions 9 Berin Szoka Contributors 29 Part I: The Big Picture & New Frameworks CHAPTER 1: The Internet’s Impact on Culture & Society: Good or Bad? 49 Why We Must Resist the Temptation of Web 2.0 51 Andrew Keen The Case for Internet Optimism, Part 1: Saving the Net from Its Detractors 57 Adam Thierer CHAPTER 2: Is the Generative
    [Show full text]
  • Web Applications Security
    UNIVERSITY OF NICE - SOPHIA ANTIPOLIS These d’Habilitation a Diriger des Recherches presented by Davide BALZAROTTI Web Applications Security Submitted in total fulfillment of the requirements of the degree of Habilitation a Diriger des Recherches Committee: Reviewers: Evangelos Markatos - University of Crete Frank Piessens - Katholieke Universiteit Leuven Frank Kargl - University of Ulm Examinators: Marc Dacier - Qatar Computing Research Institute Roberto Di Pietro - University of Padova Acknowledgments Even though this document is mostly written in first person, every single “I” should be replaced by a very large “We” to pay the due respect to everyone who made this hundred-or-so pages possible. Let me start with my two mentors, who toke me fresh after my Ph.D. and taught me how to do research and how to supervise students. The work of a professor requires good ideas, but also strong management skills, and a good number of tricks of the trade. Giovanni Vigna, at UCSB, was the first to introduce me to web security and to teach me how to do things right. Engin Kirda, at Eurecom, filled up the missing part – teaching me how to find and manage money and how to supervise other Ph.D. students. A big thank to both of them. The second group of people that made this possible are the students I was lucky to work with and supervise in the past five years. Giancarlo Pellegrino, Jelena Isacenkova, Davide Canali, Jonas Zaddach, Mariano Graziano, Andrei Costin, and Onur Catakoglu. They are not all represented in this document, but it is their hard work that transformed some of the papers that are part of this dissertation from an idea to a real scientific study.
    [Show full text]
  • Cybersecurity, Innovation and the Internet Economy
    CYBERSECURITY, INNOVATION AND THE INTERNET ECONOMY THE DEPARTMENT OF COMMERCE INTERNET POLICY TASK FORCE CYBERSECURITY, INNOVATION AND THE INTERNET ECONOMY THE DEPARTMENT OF COMMERCE INTERNET POLICY TASK FORCE June 2011 Message from Secretary of Commerce Gary Locke The Internet has undergone astounding growth, by nearly any measure, in recent years. The number of Internet users increased from roughly 360 million in 2000 to nearly two billion at the end of 2010. The number of hosts connected to the Internet increased from fewer than 30 million at the beginning of 1998 to nearly 770 million in mid-2010. According to industry estimates, this global network helps facilitate $10 trillion in online transactions every single year. As Commerce Secretary, I am proud to work with the American companies that have led the way at every stage of the Internet revolution, from web browsing and e-commerce technology to search and social networking. Along the way, the United States government has supported the private sector in creating the foundation for the Internet’s success. After establishing the computer network that became the Internet, the government opened the door for commercialization of the Internet in the early 1990s. In the late 1990s, the government’s promotion of an open and public approach to Internet policy helped ensure the Internet could grow organically and that companies could innovate freely. More recently, we have promoted the rollout of broadband facilities and new wireless connections in unserved and underserved parts of the country. Today, the Internet is again at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult.
    [Show full text]
  • Spyware: Background and Policy Issues for Congress
    Order Code RL32706 CRS Report for Congress Received through the CRS Web Spyware: Background and Policy Issues for Congress Updated January 31, 2006 Marcia S. Smith Specialist in Aerospace and Telecommunications Policy Resources, Science, and Industry Division Congressional Research Service ˜ The Library of Congress Spyware: Background and Policy Issues for Congress Summary The term “spyware” is not well defined. Generally it is used to refer to any software that is downloaded onto a person’s computer without their knowledge. Spyware may collect information about a computer user’s activities and transmit that information to someone else. It may change computer settings, or cause “pop-up” advertisements to appear (in that context, it is called “adware”). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user’s home page. A type of spyware called “keylogging” software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorized recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker “spyware” when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realize that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software.
    [Show full text]
  • Computer Viruses and Other Malicious Software
    _it E d e it s io w n o Computer Viruses and Other Malicious r yl Software B n O O e D A THREAT TO THE INTERNET ECONOMY da l C u The Internet has become a powerful tool for enhancing innovation and productivity. E e e Nevertheless, the increasing dependence on the Internet and other communication O R s networks means the Internet has also become a popular and efficient way to spread n e computer viruses and other types of malicious software (malware). A r tu Malware attacks are increasing in both frequency and sophistication, thus posing a L e c serious threat to the Internet economy and to national security. Concurrently, efforts to fight malware are not up to the task of addressing this growing global threat; malware Software Malicious Other and Viruses Computer Computer Viruses and response and mitigation efforts are essentially fragmented, local and mainly reactive. A wide range of communities and actors – from policy makers to Internet Service Other Malicious Software Providers to end users – all play a role in combating malware. But there is still limited knowledge, understanding, organisation and delineation of the roles and responsibilities A THREAT TO THE INTERNET of each of these actors. Improvements can be made in many areas, and international ECONOMY co-operation would benefit greatly in areas such as: proactive prevention (education, guidelines and standards, research and development); improved legal frameworks; E-COMMERCER THIRD FOURTH FIFTH FIRST SECOND THIRD FOURTH FIFTH FIRST SECOND THIRD FOURTH FIFTH FIRST stronger law enforcement; improved tech industry practices; and better alignment of CYBERCRIME SECURITY E-COMMERCE THIRD SECOND FIRST FIFTH FOURTH THIRD SECOND FIRST FIFTH FOURTH THRID SECOND FIRST FIFTH FOURTH economic incentives with societal benefits.
    [Show full text]
  • FCC Cyber Security Planning Guide
    Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise of these entities. This guide is not a substitute for consulting trained cyber security professionals. Table of Contents Thank you for using the FCC’s Small Biz Cyber Planner, a tool for small businesses to create customized cyber security planning guides. Businesses large and small need to do more to protect against growing cyber threats. As larger companies take steps to secure their systems, less secure small businesses are easier targets for cyber criminals. This planning guide is designed to meet the specific needs of your company, using the FCC’s customizable Small Biz Cyber Planner tool. The tool is designed for businesses that lack the resources to hire dedicated staff to protect their business, information and customers from cyber threats. Even a business with one computer or one credit card terminal can benefit from this important tool. We generally recommend that businesses using more sophisticated networks with dozens of computers consult a cyber security expert in addition to using the cyber planner. The FCC provides no warranties with respect to the guidance provided by this tool and is not responsible for any harm that might occur as a result of or in spite of its use. The guidance was developed by the FCC with input from public and private sector partners, including the Department of Homeland Security, the National Cybersecurity
    [Show full text]
  • Online Advertising and Hidden Hazards to Consumer Security and Data Privacy
    United States Senate PERMANENT SUBCOMMITTEE ON INVESTIGATIONS Committee on Homeland Security and Governmental Affairs Carl Levin, Chairman John McCain, Ranking Minority Member ONLINE ADVERTISING AND HIDDEN HAZARDS TO CONSUMER SECURITY AND DATA PRIVACY MAJORITY AND MINORITY STAFF REPORT PERMANENT SUBCOMMITTEE ON INVESTIGATIONS UNITED STATES SENATE RELEASED IN CONJUNCTION WITH THE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS’ MAY 15, 2014 HEARING SENATOR CARL LEVIN Chairman SENATOR JOHN McCAIN Ranking Minority Member PERMANENT SUBCOMMITTEE ON INVESTIGATIONS ELISE J. BEAN Staff Director and Chief Counsel DANIEL J. GOSHORN Counsel ANGELA MESSENGER Detailee HENRY J. KERNER Staff Director and Chief Counsel to the Minority JACK THORLIN Counsel to the Minority SCOTT WITTMANN Research Assistant to the Minority MARY D. ROBERTSON Chief Clerk SAMIRA AHMED Law Clerk KYLE BROSNAN Law Clerk to the Minority 5/13/14 Permanent Subcommittee on Investigations 199 Russell Senate Office Building – Washington, D.C. 20510 Majority: 202/224-9505 – Minority: 202/224-3721 Web Address: http://www.hsgac.senate.gov/subcommittees/investigations ONLINE ADVERTISING AND HIDDEN HAZARDS TO CONSUMER SECURITY AND DATA PRIVACY TABLE OF CONTENTS I. EXECUTIVE SUMMARY. 1 a. Subcommittee Investigation. 2 b. Investigation Overview. 3 c. Findings and Recommendations.. 7 Findings: 1. Consumers risk exposure to malware through everyday activity.. 7 2. The complexity of current online advertising practices impedes industry accountability for malware attacks.. 7 3. Self-regulatory bodies alone have not been adequate to ensure consumer security online. 7 4. Visits to mainstream websites can expose consumers to hundreds of unknown and potentially dangerous third parties. 8 5. Consumer safeguards are currently inadequate to protect against online advertising abuses, including malware, invasive cookies, and inappropriate data collection.
    [Show full text]
  • Statistical Analysis of DNS Abuse in Gtlds Final Report
    Statistical Analysis of DNS Abuse in gTLDs Final Report Maciej Korczynski´ ⇤, Maarten Wullink†, Samaneh Tajalizadehkhoob⇤, Giovane C.M. Moura†, Cristian Hesselman† ⇤Delft University of Technology, The Netherlands †SIDN Labs, The Netherlands {Maciej.Korczynski, S.T.Tajalizadehkhoob}@tudelft.nl {Maarten.Wullink, Giovane.Moura, Cristian.Hesselman}@sidn.nl Abstract—Commissioned by the Competition, Consumer Trust, A number of safeguards were built into the Program that and Consumer Choice Review Team with the support of ICANN, were intended to mitigate the rates of abusive, malicious, this study is focused on measuring rates of common forms of and criminal activity in these new gTLDs, such as phishing, abusive activities in the domain name system. We conduct a comprehensive study examining malicious behavior in the global spam, and malware distribution. ICANN is currently engaged DNS and compare abuse rates in new and legacy gTLDs. We in a review of these safeguards and their effects on rates of combine data sets from many sources, including zone files, DNS abuse as an aspect of the Competition, Consumer Trust, domain WHOIS information, data obtained through our active and Consumer Choice Review2. In this paper, we conduct a measurements, and 11 reputable blacklists representing malware, comprehensive study examining rates of malicious and abusive phishing, and spam. We find that the new gTLDs have impacted spam counts of the legacy gTLDs: abused domains in the new behavior in the global DNS and compare abuse rates in gTLDs do not increase the number of total malicious registrations new gTLDs and legacy gTLDs. As the DNS represents a but instead, we observe a decrease in the number of malicious large ecosystem of registries, registrars, privacy/proxy service registrations in legacy gTLDs.
    [Show full text]