WG5 Documents
Reference Materials of the Summit WG 5
In this section you will find a continually-expanding set of sources from which to draw ideas, and where you can see previous work related to the subjects of the working group.
Technical documents
- Summary of the DNSSEC implications to the stability of the network
- DNS Threat Analysis: Inventory of threats incl. recommendations
- SSAC Statement 25: Fast Flux Hosting and DNS (English) (Francais) (Espanol)
- SSAC Statement 7: Domain name hijacking: Incidents, threats, risks and remedial actions
- SSAC Statement 26 - Statement on the Deployment of DNSSEC (English)
- Expert report on effectivness of lawful access restictions from the TU Dresden, Germany (in German but covers activities worldwide: in detail Germany, Great Britain, China, and ICRA)
- Windows 2008R2 supports real DNSSEC with an interesting improvment for the last mile.
- Barriers to the deployment of DNSSEC focussing on the registry, registrar, and customer triangle
- Root signing processes by the US Department of Homeland Security contains a detailed list assumed processed, involved parties, and consequences for the rest of the world.
Fast Flux Hosting Activities in the GNSO
- GNSO Issues Report on Fast Flux Hosting (English) (Francais) (Espanol)
- Public Consultation (until 15th February): GNSO Fast Flux Hosting Initial Report (EN) (Espanol) (Francais)
- alacworkinggroups:Presetation at the WG5 from Dave
Social documents
- Organised crime in Europe: the threat of cybercrime - Situation report 2004 (2005)
> Organised crime and other forms of economic and serious crime are likely to remain priority concerns of European societies for the foreseeable future. As the nature of crime changes, policies against crime will need to adjust. This situation report indicates new and emerging threats and priority issues of concern and aims to help policy makers in Europe make more informed decisions on anti-crime strategies. The publication provides an overview of the organised crime situation in Europe in 2004. A topical chapter is dedicated to the challenge of cybercrime with a detailed analysis of different forms of cybercrime, its links to organised crime and terrorism, and its impact on societies.
- Cyberterrorism – the use of the Internet for terrorist purposes
- Ineffectiveness of current law enforcement methods (german only)
- Geographic mapping of servers hosting illegal content Analysis of the various European censorship list (german only, but pictures are international)
- Expert report: How legal are lawful access restrictions from the Planck Institute for Foreign and International Criminal Law in Freiburg i. Br., Germany (Report is in German). This report is important, because it claims DNS manipulations to be the only legal method.
- IGF position on multiple parties signing the root
- Other useful link (at the Council of Europe): http://www.coe.int/t/dc/files/themes/cybercrime/default_en.asp
Audiovisual Materials
- Video of a live hack including faked web sites
> In June, Dave Piscitello of the ICANN Staff conducted a briefing on Fast Flux Hosting intentionally targeted at Internet end user. You may review the recording above.
> ^^ Links
> Antiphishing Working Group
> Identidad Robada