Ukraine invasion: We should consider internet sanctions, says ICANN ex-CEO
Keep Russia's citizens online but block its military networks, say
The former head of ICANN, two EU parliamentarians, and a handful of technical, security, and legal experts on Thursday plan to publish an open letter to the internet governance community arguing that the time has come to develop a targeted internet sanctions system.
The letter [PDF], provided in draft form to The Register, follows a request by Ukrainian government officials for all Russian web domains, revoking HTTPS certificates, and other technical interventions.
Ukraine's request for these online sanctions was rejected by internet administrative bodies ICANN and RIPE (Regional Internet Registry for Europe, the Middle East and parts of Central Asia) on the basis that the punishment was too broad and would have too many undesirable consequences.
But the letter's signatories – Bart Groothuis, member of EU parliament, Netherlands; Bill Woodcock, executive director of Packet Clearing House; Ihab Osman, non-executive director of ICANN, Felix Reda, former member of EU parliament, Germany; Mike Roberts, founding president and former CEO of ICANN; Jeff Moss, president of DEF CON; Niels ten Oever, post-doc researcher at the University of Amsterdam; Runa Sandvik, security researcher; and Kurt Opsahl, deputy executive director and general counsel of the Electronic Frontier Foundation – argue something ought to be done.
The signatories contend the internet governance community has reached a level of maturity that brings with it the responsibility to consider how to respond to humanitarian crises. The letter, they say, represents the beginning of a global internet governance conversation about the appropriate scope and feasibility of internet sanctions.
"We believe that, although the specific sanctions suggested by the Ukrainian Ministry of Digital Transformation are overbroad and would harm civilians, there are well-established mechanisms by which existing forms of internet abuse, such as spam, malware, phishing, and cyber-attacks are controlled, and that these mature mechanisms can easily be extended to communicate specific IP addresses and domain names of sanctioned entities," the letter says.
"In the case of the Russian attack on Ukraine, the Russian military, their propaganda organs, and any dual-use facilities should be in-scope, while the civilian population should be out-of-scope. Sanctions should meet tests of proportionality, efficacy, implementability and reversibility, and non-overreach."
- Ukraine asks ICANN to delete all Russian domains
- ICANN responds to Ukraine demand to delete all Russian domains
- Internet backbone provider Lumen quits Russia
- Internet backbone Cogent cuts Russia connectivity
The group proposes the establishment of a multi-stakeholder mechanism similar to NSP-SEC or Outages, which, following deliberation and consensus, would publish sanctioned IP addresses and domain names in public feeds. Entities subscribing to those feeds could then choose to observe the sanctions, thereby limiting access to the identified resources.
"We call upon our colleagues to participate in a multi-stakeholder deliberation using the mechanism outlined above, and decide whether the IP addresses and domain names of the Russian military and its propaganda organs should be sanctioned, and to lay the groundwork for timely decisions of similar gravity and urgency in the future," the letter concludes. ®
- Advanced persistent threat
- Black Hat
- Bug Bounty
- Common Vulnerability Scoring System
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- Digital certificate
- Domain Name
- Federal government of the United States
- Government of the United Kingdom
- Identity Theft
- Insider Trading
- Kenna Security
- Palo Alto Networks
- Quantum key distribution
- Remote Access Trojan
- RSA Conference
- Trusted Platform Module
- Voice over IP
- Zero trust