On-Prem

Networks

Ukraine invasion: We should consider internet sanctions, says ICANN ex-CEO

Keep Russia's citizens online but block its military networks, say


The former head of ICANN, two EU parliamentarians, and a handful of technical, security, and legal experts on Thursday plan to publish an open letter to the internet governance community arguing that the time has come to develop a targeted internet sanctions system.

The letter [PDF], provided in draft form to The Register, follows a request by Ukrainian government officials for all Russian web domains, revoking HTTPS certificates, and other technical interventions.

Ukraine's request for these online sanctions was rejected by internet administrative bodies ICANN and RIPE (Regional Internet Registry for Europe, the Middle East and parts of Central Asia) on the basis that the punishment was too broad and would have too many undesirable consequences.

But the letter's signatories – Bart Groothuis, member of EU parliament, Netherlands; Bill Woodcock, executive director of Packet Clearing House; Ihab Osman, non-executive director of ICANN, Felix Reda, former member of EU parliament, Germany; Mike Roberts, founding president and former CEO of ICANN; Jeff Moss, president of DEF CON; Niels ten Oever, post-doc researcher at the University of Amsterdam; Runa Sandvik, security researcher; and Kurt Opsahl, deputy executive director and general counsel of the Electronic Frontier Foundation – argue something ought to be done.

The signatories contend the internet governance community has reached a level of maturity that brings with it the responsibility to consider how to respond to humanitarian crises. The letter, they say, represents the beginning of a global internet governance conversation about the appropriate scope and feasibility of internet sanctions.

"We believe that, although the specific sanctions suggested by the Ukrainian Ministry of Digital Transformation are overbroad and would harm civilians, there are well-established mechanisms by which existing forms of internet abuse, such as spam, malware, phishing, and cyber-attacks are controlled, and that these mature mechanisms can easily be extended to communicate specific IP addresses and domain names of sanctioned entities," the letter says.

"In the case of the Russian attack on Ukraine, the Russian military, their propaganda organs, and any dual-use facilities should be in-scope, while the civilian population should be out-of-scope. Sanctions should meet tests of proportionality, efficacy, implementability and reversibility, and non-overreach."

The group proposes the establishment of a multi-stakeholder mechanism similar to NSP-SEC or Outages, which, following deliberation and consensus, would publish sanctioned IP addresses and domain names in public feeds. Entities subscribing to those feeds could then choose to observe the sanctions, thereby limiting access to the identified resources.

"We call upon our colleagues to participate in a multi-stakeholder deliberation using the mechanism outlined above, and decide whether the IP addresses and domain names of the Russian military and its propaganda organs should be sanctioned, and to lay the groundwork for timely decisions of similar gravity and urgency in the future," the letter concludes. ®

Send us news
102 Comments

Germany points finger at Fancy Bear for widespread 2023 hacks, DDoS attacks

Also: Microsoft promises to git gud on cybersecurity; unqualified attackers are targeting your water systems, and more

68 tech names sign CISA's secure-by-design pledge

Security's an uphill battle ... does this latest move have teeth?

TikTok sues America to undo divest-or-die law

Nothing like folks in Beijing lecturing us on the Constitution

America's enemies targeting US critical infrastructure should be 'wake-up call'

Having China, Russia, and Iran routinely rummaging around is cause for concern, says ex-NSA man

Critical infrastructure security will stay poor until everyone pulls together

Claroty CEO Yaniv Vardi tells us what's needed to defend vital networks

Microsoft fixes a bug abused in QakBot attacks plus a second under exploit

Plus: Google Chrome, Apple bugs also exploited in the wild

AWS CISO tells The Reg: In the AI gold rush, folks are forgetting application security

'Everybody's learning as they go. But there's a rush to get these apps out'

CISA boss: Secure code is the 'only way to make ransomware a shocking anomaly'

And it would seriously inconvenience the Chinese and Russians, too

Dozens of vulnerabilities fixed in Xiaomi, Google Android flavors … slowly

Oversecure details bugs spotted and stamped since private disclosure

First LockBit, now BreachForums: Are cops winning the war or just a few battles?

TLDR: Peace in our time is really really hard

'Cyberattack' shutters Christie's website days before $840M art mega-auction

Going once, going twice, going offline

AI red-teaming tools helped X-Force break into a major tech manufacturer 'in 8 hours'

Hint: It's the 'the largest' maker of a key computer component