[gnso-rds-pdp-wg] Who is in charge? (was Re: Why the thin data is necessary)]

Neil Schwartzman neil at cauce.org
Thu Jun 8 12:37:47 UTC 2017


Oh - one last thought, for now, about accreditation, generally.

Accreditation for access will need to be centralized, perhaps not entirely, but substantially.

I ran an email accreditation program (whitelist) a couple of times in my professional life, my experience dictates that as tough as one might want to be on membership, it is ongoing compliance that will determine if such a thing is meaningful.

ICANN compliance can lend their views as to how incredibly difficult such work is.

Gated access will be trivially bypassed in terms of initial access, and abused on an ongoing basis, by those with bad intent, and provide an annoying, or even insurmountable barrier (again, emerging nations) to those who intend to use such access for the benefit of the ecosystem.



Neil Schwartzman
Executive Director
Coalition Against Unsolicited Commercial Email
http://cauce.org
Tel : (303) 800-6345
Twitter : @cauce




> On Jun 8, 2017, at 2:17 PM, Neil Schwartzman <neil at cauce.org> wrote:
> 
> 
> On Jun 8, 2017, at 11:38 AM, jonathan matkowsky <jonathan.matkowsky at riskiq.net <mailto:jonathan.matkowsky at riskiq.net>> wrote:
> 
>> ​On a side note, a threat researcher or analyst is not the equivalent of an investigator.  So focusing on certifying investigators is irrelevant to any issue within the working group. 
> 
> You are correct Jonathan, if you mean ‘law enforcement investigators’. In some companies, the term is used synonymously with threat researcher. In that context, "certifying investigators, researchers and analysts is irrelevant to any issue within the working group.” would be more apropos.
> 
> That said gated access needs some sort of parsing model. which is why I object to it in any form.
> 
>> On Jun 8, 2017, at 10:55 AM, Stephanie Perrin <stephanie.perrin at mail.utoronto.ca <mailto:stephanie.perrin at mail.utoronto.ca>> wrote:
>> 
>> What criteria does an organization like APWG apply, when it admits members and shares data with them?  
> 
> http://apwg.org/membership/membership/ <http://apwg.org/membership/membership/>
> 
> Example of some, but far from all, security initiatives include APWG.org, M3AAWG and FIRST.org (this latter with very stringent criteria, they do onsite visits of CERTs and SIRTs, etcetera). Membership is subject to proprietary internal regulation specific to these organizations, and may be determined by a vote by existing members, ongoing reviews, etcetera.
> 
> The type of data exchanged in almost all cases is deeper on the order of a magnitude than WHOIS data in terms of sensitivity, it may involve materials, discussions of techniques, that would provide benefit to the adversary were they know (or known that we know), or disrupt legal initiatives being prepared, or even live law enforcement cases.
> 
> What happens when trust is breached? The member in question is removed.
> 
> Simply because someone passes accreditation doesn’t make them impervious to engaging in future abuse; the most recent case being an analyst with the NSA who leaked top secret documents to the press. I know someone who is currently in the process of being accredited for such a job, it is at minimum an 18-month process. Perhaps more. I’ve not spoken to her in a while. Furthermore, Mr. Snowden, I believe, did not have such accreditation, as an outside contractor. So there’s that, too.
> 
> N.B.: not all researchers, investigators, and analysts are members of companies or organizations that maintain membership to these groups. Many are professionals without credentials. Many companies are not members. Their abuse ops teams operate without credentials. They access WHOIS constantly to protect their networks, and those of others, for example, feeding the anti-spam mechanisms protecting u of T’s mail systems.
> 
>>  When I have questions like this, I often check with experts before I ask.  They don't call me naive, they answer my questions
> 
> The phrase "I believe the notion of certifying private cybercrime investigators to be painfully naive” said nothing about you personally; I spoke to the concept, nothing more. you can choose to take personal umbrage but it was not meant in that manner.
> 
>> we need a system that is slightly more organized and less open to anti-competitive behaviour than the club-of-folks-who-know-each-other under which we are operating now.
> 
> I agree when you said "Folks, can we please try to be polite to one another on this list? “, after all, calling the security research industry anti-competitive isn’t impolite. [for non-english speakers, the use of the word “impolite" was intended to be ironic].
> 
> I do not believe we need anything more than what we have now. WHOIS access is working extremely well.
> 
> 
> Neil Schwartzman
> Executive Director
> Coalition Against Unsolicited Commercial Email
> http://cauce.org
> Tel : (303) 800-6345
> Twitter : @cauce
> 
> 
> 
> 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20170608/eeb80ce0/attachment-0001.html>


More information about the gnso-rds-pdp-wg mailing list