[gnso-rds-pdp-wg] Who is in charge? (was Re: Why the thin data is necessary)]

Gomes, Chuck cgomes at verisign.com
Thu Jun 8 14:52:21 UTC 2017


Neil,



Have you read the Expert Working Group (EWG) Report?  If not, it is prerequisite reading for this WG because the ICANN Board tasked us as a WG with using it as a starting point for our work.  It can be found here: https://www.icann.org/en/system/files/files/final-report-06jun14-en.pdf .



I encourage you to note the composition of the EWG that is described starting on page 164.  In my opinion the group consisted of some extremely qualified people with lots of different areas of expertise.  That said, you may still think they were naïve in recommending a gated access solution, but you should at least be aware that they put an incredible amount of time and effort into their work and their final report provides essential information for our WG to consider.



Our WG does not have to accept the EWG recommendations but we certainly need to seriously evaluate them and have sound reasons for rejecting them.



Chuck



From: gnso-rds-pdp-wg-bounces at icann.org [mailto:gnso-rds-pdp-wg-bounces at icann.org] On Behalf Of Neil Schwartzman
Sent: Thursday, June 08, 2017 8:18 AM
To: ICANN RDS <gnso-rds-pdp-wg at icann.org>
Subject: [EXTERNAL] Re: [gnso-rds-pdp-wg] Who is in charge? (was Re: Why the thin data is necessary)]




On Jun 8, 2017, at 11:38 AM, jonathan matkowsky <jonathan.matkowsky at riskiq.net<mailto:jonathan.matkowsky at riskiq.net>> wrote:




   ​On a side note, a threat researcher or analyst is not the equivalent of an investigator.  So focusing on certifying investigators is irrelevant to any issue within the working group.



   You are correct Jonathan, if you mean ‘law enforcement investigators’. In some companies, the term is used synonymously with threat researcher. In that context, "certifying investigators, researchers and analysts is irrelevant to any issue within the working group.” would be more apropos.



   That said gated access needs some sort of parsing model. which is why I object to it in any form.



   On Jun 8, 2017, at 10:55 AM, Stephanie Perrin <stephanie.perrin at mail.utoronto.ca<mailto:stephanie.perrin at mail.utoronto.ca>> wrote:

   What criteria does an organization like APWG apply, when it admits members and shares data with them?


   http://apwg.org/membership/membership/



   Example of some, but far from all, security initiatives include APWG.org, M3AAWG and FIRST.org (this latter with very stringent criteria, they do onsite visits of CERTs and SIRTs, etcetera). Membership is subject to proprietary internal regulation specific to these organizations, and may be determined by a vote by existing members, ongoing reviews, etcetera.



   The type of data exchanged in almost all cases is deeper on the order of a magnitude than WHOIS data in terms of sensitivity, it may involve materials, discussions of techniques, that would provide benefit to the adversary were they know (or known that we know), or disrupt legal initiatives being prepared, or even live law enforcement cases.



   What happens when trust is breached? The member in question is removed.



   Simply because someone passes accreditation doesn’t make them impervious to engaging in future abuse; the most recent case being an analyst with the NSA who leaked top secret documents to the press. I know someone who is currently in the process of being accredited for such a job, it is at minimum an 18-month process. Perhaps more. I’ve not spoken to her in a while. Furthermore, Mr. Snowden, I believe, did not have such accreditation, as an outside contractor. So there’s that, too.



   N.B.: not all researchers, investigators, and analysts are members of companies or organizations that maintain membership to these groups. Many are professionals without credentials. Many companies are not members. Their abuse ops teams operate without credentials. They access WHOIS constantly to protect their networks, and those of others, for example, feeding the anti-spam mechanisms protecting u of T’s mail systems.




    When I have questions like this, I often check with experts before I ask.  They don't call me naive, they answer my questions


   The phrase "I believe the notion of certifying private cybercrime investigators to be painfully naive” said nothing about you personally; I spoke to the concept, nothing more. you can choose to take personal umbrage but it was not meant in that manner.




   we need a system that is slightly more organized and less open to anti-competitive behaviour than the club-of-folks-who-know-each-other under which we are operating now.


   I agree when you said "Folks, can we please try to be polite to one another on this list? “, after all, calling the security research industry anti-competitive isn’t impolite. [for non-english speakers, the use of the word “impolite" was intended to be ironic].



   I do not believe we need anything more than what we have now. WHOIS access is working extremely well.



   Neil Schwartzman

   Executive Director

   Coalition Against Unsolicited Commercial Email

   http://cauce.org

   Tel : (303) 800-6345

   Twitter : @cauce







-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20170608/c63b0da6/attachment.html>


More information about the gnso-rds-pdp-wg mailing list