On-Prem

Networks

Ukraine invasion: We should consider internet sanctions, says ICANN ex-CEO

Keep Russia's citizens online but block its military networks, say


The former head of ICANN, two EU parliamentarians, and a handful of technical, security, and legal experts on Thursday plan to publish an open letter to the internet governance community arguing that the time has come to develop a targeted internet sanctions system.

The letter [PDF], provided in draft form to The Register, follows a request by Ukrainian government officials for all Russian web domains, revoking HTTPS certificates, and other technical interventions.

Ukraine's request for these online sanctions was rejected by internet administrative bodies ICANN and RIPE (Regional Internet Registry for Europe, the Middle East and parts of Central Asia) on the basis that the punishment was too broad and would have too many undesirable consequences.

But the letter's signatories – Bart Groothuis, member of EU parliament, Netherlands; Bill Woodcock, executive director of Packet Clearing House; Ihab Osman, non-executive director of ICANN, Felix Reda, former member of EU parliament, Germany; Mike Roberts, founding president and former CEO of ICANN; Jeff Moss, president of DEF CON; Niels ten Oever, post-doc researcher at the University of Amsterdam; Runa Sandvik, security researcher; and Kurt Opsahl, deputy executive director and general counsel of the Electronic Frontier Foundation – argue something ought to be done.

The signatories contend the internet governance community has reached a level of maturity that brings with it the responsibility to consider how to respond to humanitarian crises. The letter, they say, represents the beginning of a global internet governance conversation about the appropriate scope and feasibility of internet sanctions.

"We believe that, although the specific sanctions suggested by the Ukrainian Ministry of Digital Transformation are overbroad and would harm civilians, there are well-established mechanisms by which existing forms of internet abuse, such as spam, malware, phishing, and cyber-attacks are controlled, and that these mature mechanisms can easily be extended to communicate specific IP addresses and domain names of sanctioned entities," the letter says.

"In the case of the Russian attack on Ukraine, the Russian military, their propaganda organs, and any dual-use facilities should be in-scope, while the civilian population should be out-of-scope. Sanctions should meet tests of proportionality, efficacy, implementability and reversibility, and non-overreach."

The group proposes the establishment of a multi-stakeholder mechanism similar to NSP-SEC or Outages, which, following deliberation and consensus, would publish sanctioned IP addresses and domain names in public feeds. Entities subscribing to those feeds could then choose to observe the sanctions, thereby limiting access to the identified resources.

"We call upon our colleagues to participate in a multi-stakeholder deliberation using the mechanism outlined above, and decide whether the IP addresses and domain names of the Russian military and its propaganda organs should be sanctioned, and to lay the groundwork for timely decisions of similar gravity and urgency in the future," the letter concludes. ®

Send us news
102 Comments

Meta comms chief handed six-year Russian prison sentence for 'justifying terrorism'

Memo to Andy Stone: Don't go to Moscow for your holidays

US government excoriates Microsoft for 'avoidable errors' but keeps paying for its products

In what other sphere does a bad supplier not feel pain for its foulups?

OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories

While some other LLMs appear to flat-out suck

Kremlin's Sandworm blamed for cyberattacks on US, European water utilities

Water tank overflowed during one system malfunction, says Mandiant

Russia, Iran pose most aggressive threat to 2024 elections, say infoseccers

Google security crew reveal ‘the four Ds’ to be on the watch for

Old Windows print spooler bug is latest target of Russia's Fancy Bear gang

Putin's pals use 'GooseEgg' malware to launch attacks you can defeat with patches or deletion

Governments issue alerts after 'sophisticated' state-backed actor found exploiting flaws in Cisco security boxes

Don't get too comfortable: 'Line Dancer' malware may be targeting other vendors, too

Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims

'I want to buy a car. That's all'

Ex-CEO of 'unicorn' app startup HeadSpin heads to jail after BS'ing investors

Lachwani faked it but didn't make it

H-1B visa fraud alive and well amid efforts to crack down on abuse

It's the gold ticket favored by foreign techies – and IT giants suspected of gaming the system

HPE sues China's Inspur Group over server patents

Middle Kingdom biz accused of IP theft and changing names to evade sanctions

French issue <em>alerte rouge</em> after local governments knocked offline by cyber attack

Embarrassing, as its officials are in the US to discuss Olympics cyber threats