From sharonchallis at aol.com Mon Jan 31 09:33:44 2011 From: sharonchallis at aol.com (Sharon Lemon) Date: Mon, 31 Jan 2011 09:33:44 +0000 Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items In-Reply-To: <35F48913-24BF-411D-A6E0-2FEFCD521F71@etlaw.co.uk> References: <35F48913-24BF-411D-A6E0-2FEFCD521F71@etlaw.co.uk> Message-ID: Thank you Emily, THis seems a sensible agenda. Could we also discuss where our FTF meeting is going to be held in September please? Sharon Sent from my iPad On 29 Jan 2011, at 09:53, Emily Taylor wrote: > Dear all > > I'm sure that, like me, you'll be shocked to learn that, next Wednesday, it will be two weeks since our face to face meeting! I'm therefore writing with some suggestions to prepare for our next call. > > As we decided at our London meeting, the next conference call is taking place this Wednesday at 16:00 UTC. Bearing in mind our action plan, our priority for this call should be to agree definitions and preliminary questions for public comment prior to the San Francisco meeting. It would be useful to have materials circulated in advance of the call, especially from those groups working on definitions (C, D, E, F). > > In preparation for this meeting, we are hoping each subteam will report on: > > 1. current status, > 2. an outline of what they might propose in our public comment period. > 3. questions for ICANN staff (questions based on London Compliance and/or Policy presentations, any ICANN materials posted to the Whois Wiki, or as needed), > 4. research and support items the Subteam might need, > > Alice is ready to help subteams with creating Doodle polls and setting up conference bridges for sub-teams (all calls will be recorded and archived unless otherwise requested). > > Early next week, we will also be circulating a short report of our meeting for review, approval and publication by the group. > > As a reminder, here are our Subteams: > > A. What is the Whois Policy? -- James, Kathy, Wilfried; > B. Whois Policy Implementation Review: Peter, Bill, Emily, Michael; > C. Law Enforcement: Kim, Sharon, Wilfried and Lutz; > D. Consumers and Consumer Trust Sarmad, Olivier, Lynn, Peter, Bill; > E. Applicable laws: Kim, Omar, Michael, Lynn; > F. Producers and Maintainers of Whois Data: James, Susan, Wilfried > (with Omar looking into the related question of who "owns" the > data) > > Is there anything else we should add to the agenda? > > Kind regards > > Emily > > > 76 Temple Road, Oxford OX4 2EZ UK > telephone: 01865 582 811 mobile: 07540 049 322 > emily.taylor at etlaw.co.uk www.etlaw.co.uk > > > _______________________________________________ > Rt4-whois mailing list > Rt4-whois at icann.org > https://mm.icann.org/mailman/listinfo/rt4-whois -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/195da7b8/attachment.html From emily.taylor at etlaw.co.uk Mon Jan 31 09:56:37 2011 From: emily.taylor at etlaw.co.uk (Emily Taylor) Date: Mon, 31 Jan 2011 09:56:37 +0000 Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items In-Reply-To: References: <35F48913-24BF-411D-A6E0-2FEFCD521F71@etlaw.co.uk> Message-ID: Yes, I'm happy to add that to the agenda, Sharon. Alice - please can you update the agenda for Wednesday. E On 31 Jan 2011, at 09:33, Sharon Lemon wrote: > Thank you Emily, > > THis seems a sensible agenda. Could we also discuss where our FTF meeting is going to be held in September please? > > Sharon > > > Sent from my iPad > > On 29 Jan 2011, at 09:53, Emily Taylor wrote: > >> Dear all >> >> I'm sure that, like me, you'll be shocked to learn that, next Wednesday, it will be two weeks since our face to face meeting! I'm therefore writing with some suggestions to prepare for our next call. >> >> As we decided at our London meeting, the next conference call is taking place this Wednesday at 16:00 UTC. Bearing in mind our action plan, our priority for this call should be to agree definitions and preliminary questions for public comment prior to the San Francisco meeting. It would be useful to have materials circulated in advance of the call, especially from those groups working on definitions (C, D, E, F). >> >> In preparation for this meeting, we are hoping each subteam will report on: >> >> 1. current status, >> 2. an outline of what they might propose in our public comment period. >> 3. questions for ICANN staff (questions based on London Compliance and/or Policy presentations, any ICANN materials posted to the Whois Wiki, or as needed), >> 4. research and support items the Subteam might need, >> >> Alice is ready to help subteams with creating Doodle polls and setting up conference bridges for sub-teams (all calls will be recorded and archived unless otherwise requested). >> >> Early next week, we will also be circulating a short report of our meeting for review, approval and publication by the group. >> >> As a reminder, here are our Subteams: >> >> A. What is the Whois Policy? -- James, Kathy, Wilfried; >> B. Whois Policy Implementation Review: Peter, Bill, Emily, Michael; >> C. Law Enforcement: Kim, Sharon, Wilfried and Lutz; >> D. Consumers and Consumer Trust Sarmad, Olivier, Lynn, Peter, Bill; >> E. Applicable laws: Kim, Omar, Michael, Lynn; >> F. Producers and Maintainers of Whois Data: James, Susan, Wilfried >> (with Omar looking into the related question of who "owns" the >> data) >> >> Is there anything else we should add to the agenda? >> >> Kind regards >> >> Emily >> >> >> 76 Temple Road, Oxford OX4 2EZ UK >> telephone: 01865 582 811 mobile: 07540 049 322 >> emily.taylor at etlaw.co.uk www.etlaw.co.uk >> >> >> _______________________________________________ >> Rt4-whois mailing list >> Rt4-whois at icann.org >> https://mm.icann.org/mailman/listinfo/rt4-whois 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/9cb70a4a/attachment.html From lutz at iks-jena.de Mon Jan 31 09:32:05 2011 From: lutz at iks-jena.de (Lutz Donnerhacke) Date: Mon, 31 Jan 2011 09:32:05 +0000 (UTC) Subject: [Rt4-whois] FYI - report to my community Message-ID: I'd like to inform you, that I wrote an report to my community about my activities within review team. ICANN and it's groups believe in transparency, but I prefer to be the first here. http://wwwneu.iks-jena.de/eng/Blog/That-s-the-way-it-always-have-been or in German: http://wwwneu.iks-jena.de/Blog/Das-war-schon-immer-so There should be nothing about interna in the text, just personal background to AtLarge. From alice.jansen at icann.org Mon Jan 31 10:35:53 2011 From: alice.jansen at icann.org (Alice Jansen) Date: Mon, 31 Jan 2011 02:35:53 -0800 Subject: [Rt4-whois] Prel Rep for your consideration Message-ID: <05B243F724B2284986522B6ACD0504D7E5CF9FB616@EXVPMBX100-1.exc.icann.org> Dear Review Team Members, Please find attached a preliminary report for your consideration. Please provide your comments and editing requirements. The proposal is to add this item for adoption and public distribution to the agenda of our forthcoming conference call. Thanks, Very best regards Alice Alice E. Jansen -------------------------- ICANN Assistant, Organizational & Affirmation Reviews alice.jansen at icann.org Direct Dial: +32.2.234.78.64 Mobile: +32.4.73.31.76.56 Office Fax: +32.2.234.78.48 Skype: alice_jansen_icann -------------------------- 6, Rond Point Schuman B-1040 Brussels, Belgium -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/2d6d2e87/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: WHOIS REVIEW TEAM MEETING - London - Prel Rep - Final.docx Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document Size: 20837 bytes Desc: WHOIS REVIEW TEAM MEETING - London - Prel Rep - Final.docx Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/2d6d2e87/WHOISREVIEWTEAMMEETING-London-PrelRep-Final.docx From Kim at vonarx.ca Mon Jan 31 14:43:23 2011 From: Kim at vonarx.ca (Kim G. von Arx) Date: Mon, 31 Jan 2011 09:43:23 -0500 Subject: [Rt4-whois] Law enforcement definition Message-ID: <93BEF7ED-FD65-44F7-BCF7-6527EB59FCED@vonarx.ca> Dear All: here is our sub-group's suggested definition of law enforcement: an organization or the activity of an organization all of which are authorized by a nationally or internationally recognized government to maintain, co-ordinate, and enforce laws, regulations, or multi-national treaty obligations within the internationally recognized authorized boundaries of that nationally or internationally recognized government Please note that I am sending this without having received Lutz's comments, and as such it may be subject to some changes from his end. Kim __________________________________ kim at vonarx.ca +1 (613) 286-4445 "Shoot for the moon. Even if you miss, you'll land among the stars..." -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/99663d2a/attachment.html From jbladel at godaddy.com Mon Jan 31 23:07:13 2011 From: jbladel at godaddy.com (James M. Bladel) Date: Mon, 31 Jan 2011 16:07:13 -0700 Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items Message-ID: <20110131160713.9c1b16d3983f34082b49b9baf8cec04a.501bf5ff76.wbe@email00.secureserver.net> An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/b783738f/attachment.html From lynn at goodsecurityconsulting.com Tue Feb 1 01:55:05 2011 From: lynn at goodsecurityconsulting.com (lynn at goodsecurityconsulting.com) Date: Mon, 31 Jan 2011 18:55:05 -0700 Subject: [Rt4-whois] FYI - report to my community Message-ID: <20110131185505.00ef555ff13978e3e1b8d2179880f99e.a263a47de5.wbe@email12.secureserver.net> An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/4d1091b0/attachment.html From lynn at goodsecurityconsulting.com Tue Feb 1 02:44:13 2011 From: lynn at goodsecurityconsulting.com (lynn at goodsecurityconsulting.com) Date: Mon, 31 Jan 2011 19:44:13 -0700 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation Message-ID: <20110131194413.00ef555ff13978e3e1b8d2179880f99e.db1310a2d7.wbe@email12.secureserver.net> An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110131/4f64d9a7/attachment.html From bill.smith at paypal-inc.com Tue Feb 1 15:26:33 2011 From: bill.smith at paypal-inc.com (Smith, Bill) Date: Tue, 1 Feb 2011 08:26:33 -0700 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation In-Reply-To: <20110131194413.00ef555ff13978e3e1b8d2179880f99e.db1310a2d7.wbe@email12.secureserver.net> References: <20110131194413.00ef555ff13978e3e1b8d2179880f99e.db1310a2d7.wbe@email12.secureserver.net> Message-ID: <3BA03626-4C16-41BA-ACBA-2F3E9701F17A@paypal.com> While I agree that identifying use cases for Whois data is an interesting exercise, I respectfully suggest that it is beyond the remit of this Review Team. On Jan 31, 2011, at 6:44 PM, > > wrote: Dear All, To follow on Kathy's message, it is certainly a very serious situation in Egypt. When the government basically "unplugged" Internet access in that country, communication in general was disrupted. I wondered if they were still able to send fax messages over telephone lines? We actually had protesters here in Atlanta of sympathetic supporters last weekend who held a small demonstration. Overall, I agree that we need to think about the circumstances of political dissidents and human rights activists as we review the implementation of WHOIS. But in my experience, WHOIS data is helpful but not necessary to trace a communication on the Internet. When someone wants to hide the source of a communication, a common technique is to exploit open relay channels on someone else's server so that it appears to be the source (but is not). Sometimes, individuals who want to hide their location may relay through 5 or more servers making it extremely difficult to trace back. I am not suggesting that anyone should employ this type of technique, only that it is technically possible and that WHOIS data would not matter. Similarly, I am sure you are all aware of email spoofing used in spam. This technique hides the real identity and source of the spam sender. It displays an email address in the send field that is not the true sender. These points are why I am interested in Lutz's idea of identifying "use cases" for WHOIS data. Kind regards, Lynn -------- Original Message -------- Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation From: "Kathy Kleiman" > Date: Fri, January 28, 2011 10:14 pm To: > Dear All, I know we are all watching the stories from the Middle East with interest, and great concern. I remember the issue of privacy/anonymity came up in our London discussions. I thought the following posting to Professor Dave Farber?s Interesting People List might be of interest. Best, Kathy From: David Farber [mailto:dave at farber.net] Sent: Friday, January 28, 2011 3:50 PM To: ip Subject: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation http://www.eff.org/deeplinks/2011/01/egypt-blocks-websites-arrests-bloggers-and Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest Commentary by Eva Galperin As we've seen in Iran and Tunisia, social networking tools have given activists in authoritarian regimes a powerful voice, which can be heard well beyond their own country. But the use of social networking tools has also given their governments ways to identify and retaliate against them. This week we are watching the same dynamic play out in Egypt. This is why it is critical that all activists ?in Egypt and elsewhere?take precautions to protect their anonymity and freedom of expression. The protests in Egypt this week also highlight another important point: authoritarian governments can block access to social media websites, but determined, tech-savvy activists are likely to find ways to circumvent censorship to communicate with the rest of the world. In an attempt to clamp down on Egyptian protesters, Egyptian President Hosni Mubarak?s government is intermittently blocking websites and arresting bloggers, journalists, and dissidents. Like the Tunisians, Egyptian protesters have made heavy use of social media websites to share information about the protests with the outside world and with each other. In spite of the Egyptian government?s blocking of Twitter, tweets from the Egyptian protests in Suez and Cairo provided up-to-the-minute reports about protest activity, the movements of police, deaths and injuries, links to photos on Twitpic, and videos on YouTube. Cooperation amongst protesting citizens has kept communications resilient so far. When protestors in Cario's Tahir Square experienced an outage in cell phone data service, nearby residents reportedly opened their home Wi-Fii networks to allow protesters to get online. On the first day of protests, the Egyptian government blocked several websites, including Twitter and Bambuser, a Swedish website which allows users to stream live video from their cell phones. By the second day, the government's blocking of Twitter was sparse and intermittent, but there were reports of blocking Facebook and YouTube. It is unclear whether or not the Egyptian government will continue to expand its list of blocked sites in the coming days. Even the US Secretary of State Hillary Clinton, who was conspicuously silent during the protests leading up to the Tunisian revolution, has called on the Mubarak government to respect freedom of expression and urged them ?not to?block communications, including on social media sites.? The other dangerous aspect of the Mubarak government?s shameful campaign of silence and censorship has been the arrest and detention of bloggers, journalists, and activists. The Committee to Protect Journalists has reported that the Egyptian government has shut down at least two independent news websites: Al-Dustour and El-Badil. Police beat Al-Jazeera correspondent Mustafa Kafifi and Guardian reporter Jack Shenker, who posted anaudio recording of the incident. Policemen have attacked and arrested cameramen covering the protests and onlookers recording the protests with cell phones. Egypt is no stranger to the arrest of bloggers. Egyptian blogger Kareem Amer was sentenced to four years in prison for ?disparaging religion? and ?defaming the president? in 2007. In 2009, web forum founder Karim Al-Bukheiri was arrested, tortured, and subject to constant government surveillance. Just last year, the Islamic Human Rights Foundation reported that Egyptian Security Forces arrested ?at least 29 activists, including bloggers, lawyers, and human rights activists.? The concern here is clear?if the street protests subside, the Mubarak government could initiate a campaign of retaliation and oppression, arresting and harassing the very bloggers and activists who have been chronicling the protests online. Some countries have gone even further. In Iran two opposition activists were hanged this week for taking pictures and video of the Green Revolution protests and posting them online. Given the potential dangers, it is absolutely critical that Egyptian protesters take precautions when communicating online. To reiterate, social networking tools have given activists a powerful voice, which can be heard well beyond Egypt, but activists should also remember that the Egyptian government could use these same tools to identify and retaliate against them. We recommend that political activists look at our Surveillance Self Defense International report for information on how to use technology defensively to better protect their anonymity and freedom of expression in Egypt and other authoritarian regimes. Archives [https://www.listbox.com/images/feed-icon-10x10.jpg] | Modify Your Subscription | Unsubscribe Now [https://www.listbox.com/images/listbox-logo-small.png] ________________________________ _______________________________________________ Rt4-whois mailing list Rt4-whois at icann.org https://mm.icann.org/mailman/listinfo/rt4-whois From kim at vonarx.ca Tue Feb 1 16:19:39 2011 From: kim at vonarx.ca (Kim G. von Arx) Date: Tue, 1 Feb 2011 11:19:39 -0500 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation In-Reply-To: <3BA03626-4C16-41BA-ACBA-2F3E9701F17A@paypal.com> References: <20110131194413.00ef555ff13978e3e1b8d2179880f99e.db1310a2d7.wbe@email12.secureserver.net> <3BA03626-4C16-41BA-ACBA-2F3E9701F17A@paypal.com> Message-ID: <84C9C176-1979-4BDD-B2E2-9D4C2BF0B54E@vonarx.ca> I disagree. I believe that identifying WHOIS use is a necessary exercise to determine "legitimate needs" and consumer trust. Kim __________________________________ kim at vonarx.ca +1 (613) 286-4445 "Shoot for the moon. Even if you miss, you'll land among the stars..." On 1 Feb 2011, at 10:26, Smith, Bill wrote: > While I agree that identifying use cases for Whois data is an interesting exercise, I respectfully suggest that it is beyond the remit of this Review Team. > > On Jan 31, 2011, at 6:44 PM, > > wrote: > > Dear All, > To follow on Kathy's message, > it is certainly a very serious situation in Egypt. When the government basically "unplugged" Internet access in that country, communication in general was disrupted. I wondered if they were still able to send fax messages over telephone lines? We actually had protesters here in Atlanta of sympathetic supporters last weekend who held a small demonstration. Overall, I agree that we need to think about the circumstances of political dissidents and human rights activists as we review the implementation of WHOIS. > > But in my experience, WHOIS data is helpful but not necessary to trace a communication on the Internet. > When someone wants to hide the source of a communication, a common technique is to exploit open relay channels on someone else's server so that it appears to be the source (but is not). > Sometimes, individuals who want to hide their location may relay through 5 or more servers making it extremely difficult to trace back. > I am not suggesting that anyone should employ this type of technique, only that it is technically possible and that WHOIS data would not matter. > > Similarly, I am sure you are all aware of email spoofing used in spam. This technique hides the real identity and source of the spam sender. It displays an email address in the send field that is not the true sender. > > These points are why I am interested in Lutz's idea of identifying "use cases" for WHOIS data. > Kind regards, > Lynn > > -------- Original Message -------- > Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as > Egyptian Government Blocks Websites, Arrests Activists in Response to > Continued Protest | Electronic Frontier Foundation > From: "Kathy Kleiman" > > Date: Fri, January 28, 2011 10:14 pm > To: > > > Dear All, > I know we are all watching the stories from the Middle East with interest, and great concern. I remember the issue of privacy/anonymity came up in our London discussions. I thought the following posting to Professor Dave Farber?s Interesting People List might be of interest. > Best, > Kathy > > From: David Farber [mailto:dave at farber.net] > Sent: Friday, January 28, 2011 3:50 PM > To: ip > Subject: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation > > > http://www.eff.org/deeplinks/2011/01/egypt-blocks-websites-arrests-bloggers-and > > Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest > Commentary by Eva Galperin > As we've seen in Iran and Tunisia, social networking tools have given activists in authoritarian regimes a powerful voice, which can be heard well beyond their own country. But the use of social networking tools has also given their governments ways to identify and retaliate against them. This week we are watching the same dynamic play out in Egypt. This is why it is critical that all activists ?in Egypt and elsewhere?take precautions to protect their anonymity and freedom of expression. The protests in Egypt this week also highlight another important point: authoritarian governments can block access to social media websites, but determined, tech-savvy activists are likely to find ways to circumvent censorship to communicate with the rest of the world. > In an attempt to clamp down on Egyptian protesters, Egyptian President Hosni Mubarak?s government is intermittently blocking websites and arresting bloggers, journalists, and dissidents. Like the Tunisians, Egyptian protesters have made heavy use of social media websites to share information about the protests with the outside world and with each other. In spite of the Egyptian government?s blocking of Twitter, tweets from the Egyptian protests in Suez and Cairo provided up-to-the-minute reports about protest activity, the movements of police, deaths and injuries, links to photos on Twitpic, and videos on YouTube. Cooperation amongst protesting citizens has kept communications resilient so far. When protestors in Cario's Tahir Square experienced an outage in cell phone data service, nearby residents reportedly opened their home Wi-Fii networks to allow protesters to get online. > On the first day of protests, the Egyptian government blocked several websites, including Twitter and Bambuser, a Swedish website which allows users to stream live video from their cell phones. By the second day, the government's blocking of Twitter was sparse and intermittent, but there were reports of blocking Facebook and YouTube. It is unclear whether or not the Egyptian government will continue to expand its list of blocked sites in the coming days. Even the US Secretary of State Hillary Clinton, who was conspicuously silent during the protests leading up to the Tunisian revolution, has called on the Mubarak government to respect freedom of expression and urged them ?not to?block communications, including on social media sites.? > The other dangerous aspect of the Mubarak government?s shameful campaign of silence and censorship has been the arrest and detention of bloggers, journalists, and activists. The Committee to Protect Journalists has reported that the Egyptian government has shut down at least two independent news websites: Al-Dustour and El-Badil. Police beat Al-Jazeera correspondent Mustafa Kafifi and Guardian reporter Jack Shenker, who posted anaudio recording of the incident. Policemen have attacked and arrested cameramen covering the protests and onlookers recording the protests with cell phones. > Egypt is no stranger to the arrest of bloggers. Egyptian blogger Kareem Amer was sentenced to four years in prison for ?disparaging religion? and ?defaming the president? in 2007. In 2009, web forum founder Karim Al-Bukheiri was arrested, tortured, and subject to constant government surveillance. Just last year, the Islamic Human Rights Foundation reported that Egyptian Security Forces arrested ?at least 29 activists, including bloggers, lawyers, and human rights activists.? The concern here is clear?if the street protests subside, the Mubarak government could initiate a campaign of retaliation and oppression, arresting and harassing the very bloggers and activists who have been chronicling the protests online. Some countries have gone even further. In Iran two opposition activists were hanged this week for taking pictures and video of the Green Revolution protests and posting them online. > Given the potential dangers, it is absolutely critical that Egyptian protesters take precautions when communicating online. To reiterate, social networking tools have given activists a powerful voice, which can be heard well beyond Egypt, but activists should also remember that the Egyptian government could use these same tools to identify and retaliate against them. We recommend that political activists look at our Surveillance Self Defense International report for information on how to use technology defensively to better protect their anonymity and freedom of expression in Egypt and other authoritarian regimes. > Archives [https://www.listbox.com/images/feed-icon-10x10.jpg] | Modify Your Subscription | Unsubscribe Now > > [https://www.listbox.com/images/listbox-logo-small.png] > > > ________________________________ > _______________________________________________ > Rt4-whois mailing list > Rt4-whois at icann.org > https://mm.icann.org/mailman/listinfo/rt4-whois > > > > _______________________________________________ > Rt4-whois mailing list > Rt4-whois at icann.org > https://mm.icann.org/mailman/listinfo/rt4-whois -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110201/58b757ef/attachment.html From bill.smith at paypal-inc.com Tue Feb 1 18:49:29 2011 From: bill.smith at paypal-inc.com (Smith, Bill) Date: Tue, 1 Feb 2011 11:49:29 -0700 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation In-Reply-To: <84C9C176-1979-4BDD-B2E2-9D4C2BF0B54E@vonarx.ca> References: <20110131194413.00ef555ff13978e3e1b8d2179880f99e.db1310a2d7.wbe@email12.secureserver.net> <3BA03626-4C16-41BA-ACBA-2F3E9701F17A@paypal.com> <84C9C176-1979-4BDD-B2E2-9D4C2BF0B54E@vonarx.ca> Message-ID: <0EB96DE1-84CB-4FE1-AEB5-4277424760C1@paypal.com> I fear that such an exercise will be a repeat of the attempt to develop an internationally harmonized set of policies for morality, public order, and the like. While one may object to Egypt's cutting off Internet access, it is certainly within a sovereign state's right to do so. (in my opinion). There are any number of such situations that each of us may find amoral, encourage disorder, etc. In my opinion, efforts to codify a single set of "legitimate" needs will fail or be rejected by some of the very players we try to influence by establishing such a list. On Feb 1, 2011, at 8:19 AM, Kim G. von Arx wrote: I disagree. I believe that identifying WHOIS use is a necessary exercise to determine "legitimate needs" and consumer trust. Kim __________________________________ kim at vonarx.ca +1 (613) 286-4445 "Shoot for the moon. Even if you miss, you'll land among the stars..." On 1 Feb 2011, at 10:26, Smith, Bill wrote: While I agree that identifying use cases for Whois data is an interesting exercise, I respectfully suggest that it is beyond the remit of this Review Team. On Jan 31, 2011, at 6:44 PM, > > wrote: Dear All, To follow on Kathy's message, it is certainly a very serious situation in Egypt. When the government basically "unplugged" Internet access in that country, communication in general was disrupted. I wondered if they were still able to send fax messages over telephone lines? We actually had protesters here in Atlanta of sympathetic supporters last weekend who held a small demonstration. Overall, I agree that we need to think about the circumstances of political dissidents and human rights activists as we review the implementation of WHOIS. But in my experience, WHOIS data is helpful but not necessary to trace a communication on the Internet. When someone wants to hide the source of a communication, a common technique is to exploit open relay channels on someone else's server so that it appears to be the source (but is not). Sometimes, individuals who want to hide their location may relay through 5 or more servers making it extremely difficult to trace back. I am not suggesting that anyone should employ this type of technique, only that it is technically possible and that WHOIS data would not matter. Similarly, I am sure you are all aware of email spoofing used in spam. This technique hides the real identity and source of the spam sender. It displays an email address in the send field that is not the true sender. These points are why I am interested in Lutz's idea of identifying "use cases" for WHOIS data. Kind regards, Lynn -------- Original Message -------- Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation From: "Kathy Kleiman" > Date: Fri, January 28, 2011 10:14 pm To: > Dear All, I know we are all watching the stories from the Middle East with interest, and great concern. I remember the issue of privacy/anonymity came up in our London discussions. I thought the following posting to Professor Dave Farber?s Interesting People List might be of interest. Best, Kathy From: David Farber [mailto:dave at farber.net] Sent: Friday, January 28, 2011 3:50 PM To: ip Subject: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation http://www.eff.org/deeplinks/2011/01/egypt-blocks-websites-arrests-bloggers-and Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest Commentary by Eva Galperin As we've seen in Iran and Tunisia, social networking tools have given activists in authoritarian regimes a powerful voice, which can be heard well beyond their own country. But the use of social networking tools has also given their governments ways to identify and retaliate against them. This week we are watching the same dynamic play out in Egypt. This is why it is critical that all activists ?in Egypt and elsewhere?take precautions to protect their anonymity and freedom of expression. The protests in Egypt this week also highlight another important point: authoritarian governments can block access to social media websites, but determined, tech-savvy activists are likely to find ways to circumvent censorship to communicate with the rest of the world. In an attempt to clamp down on Egyptian protesters, Egyptian President Hosni Mubarak?s government is intermittently blocking websites and arresting bloggers, journalists, and dissidents. Like the Tunisians, Egyptian protesters have made heavy use of social media websites to share information about the protests with the outside world and with each other. In spite of the Egyptian government?s blocking of Twitter, tweets from the Egyptian protests in Suez and Cairo provided up-to-the-minute reports about protest activity, the movements of police, deaths and injuries, links to photos on Twitpic, and videos on YouTube. Cooperation amongst protesting citizens has kept communications resilient so far. When protestors in Cario's Tahir Square experienced an outage in cell phone data service, nearby residents reportedly opened their home Wi-Fii networks to allow protesters to get online. On the first day of protests, the Egyptian government blocked several websites, including Twitter and Bambuser, a Swedish website which allows users to stream live video from their cell phones. By the second day, the government's blocking of Twitter was sparse and intermittent, but there were reports of blocking Facebook and YouTube. It is unclear whether or not the Egyptian government will continue to expand its list of blocked sites in the coming days. Even the US Secretary of State Hillary Clinton, who was conspicuously silent during the protests leading up to the Tunisian revolution, has called on the Mubarak government to respect freedom of expression and urged them ?not to?block communications, including on social media sites.? The other dangerous aspect of the Mubarak government?s shameful campaign of silence and censorship has been the arrest and detention of bloggers, journalists, and activists. The Committee to Protect Journalists has reported that the Egyptian government has shut down at least two independent news websites: Al-Dustour and El-Badil. Police beat Al-Jazeera correspondent Mustafa Kafifi and Guardian reporter Jack Shenker, who posted anaudio recording of the incident. Policemen have attacked and arrested cameramen covering the protests and onlookers recording the protests with cell phones. Egypt is no stranger to the arrest of bloggers. Egyptian blogger Kareem Amer was sentenced to four years in prison for ?disparaging religion? and ?defaming the president? in 2007. In 2009, web forum founder Karim Al-Bukheiri was arrested, tortured, and subject to constant government surveillance. Just last year, the Islamic Human Rights Foundation reported that Egyptian Security Forces arrested ?at least 29 activists, including bloggers, lawyers, and human rights activists.? The concern here is clear?if the street protests subside, the Mubarak government could initiate a campaign of retaliation and oppression, arresting and harassing the very bloggers and activists who have been chronicling the protests online. Some countries have gone even further. In Iran two opposition activists were hanged this week for taking pictures and video of the Green Revolution protests and posting them online. Given the potential dangers, it is absolutely critical that Egyptian protesters take precautions when communicating online. To reiterate, social networking tools have given activists a powerful voice, which can be heard well beyond Egypt, but activists should also remember that the Egyptian government could use these same tools to identify and retaliate against them. We recommend that political activists look at our Surveillance Self Defense International report for information on how to use technology defensively to better protect their anonymity and freedom of expression in Egypt and other authoritarian regimes. Archives [https://www.listbox.com/images/feed-icon-10x10.jpg] | Modify Your Subscription | Unsubscribe Now [https://www.listbox.com/images/listbox-logo-small.png] ________________________________ _______________________________________________ Rt4-whois mailing list Rt4-whois at icann.org https://mm.icann.org/mailman/listinfo/rt4-whois _______________________________________________ Rt4-whois mailing list Rt4-whois at icann.org https://mm.icann.org/mailman/listinfo/rt4-whois From emily.taylor at etlaw.co.uk Tue Feb 1 18:06:47 2011 From: emily.taylor at etlaw.co.uk (Emily Taylor) Date: Tue, 1 Feb 2011 18:06:47 +0000 Subject: [Rt4-whois] Law enforcement definition In-Reply-To: <93BEF7ED-FD65-44F7-BCF7-6527EB59FCED@vonarx.ca> References: <93BEF7ED-FD65-44F7-BCF7-6527EB59FCED@vonarx.ca> Message-ID: <1E567E07-8104-4A64-80FC-2AF56DFC5073@etlaw.co.uk> Dear Kim and James Thank you for circulating your drafts and status in advance of the meeting. Groups D and E (Consumers/Consumer Trust and Applicable Laws), is there anything you can share prior to the telecon? Kind regards Emily On 31 Jan 2011, at 14:43, Kim G. von Arx wrote: > Dear All: > > here is our sub-group's suggested definition of law enforcement: > > an organization or the activity of an organization all of which are authorized by a nationally or internationally recognized government to maintain, co-ordinate, and enforce laws, regulations, or multi-national treaty obligations within the internationally recognized authorized boundaries of that nationally or internationally recognized government > > Please note that I am sending this without having received Lutz's comments, and as such it may be subject to some changes from his end. > > Kim > > > > __________________________________ > > kim at vonarx.ca > +1 (613) 286-4445 > > "Shoot for the moon. Even if you miss, you'll land among the stars..." > > > > > > > > _______________________________________________ > Rt4-whois mailing list > Rt4-whois at icann.org > https://mm.icann.org/mailman/listinfo/rt4-whois 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110201/8e25f4ce/attachment.html From lynn at goodsecurityconsulting.com Tue Feb 1 21:30:50 2011 From: lynn at goodsecurityconsulting.com (lynn at goodsecurityconsulting.com) Date: Tue, 01 Feb 2011 14:30:50 -0700 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation Message-ID: <20110201143050.00ef555ff13978e3e1b8d2179880f99e.34dde38938.wbe@email12.secureserver.net> An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110201/0c3f4303/attachment.html From lynn at goodsecurityconsulting.com Tue Feb 1 22:25:07 2011 From: lynn at goodsecurityconsulting.com (lynn at goodsecurityconsulting.com) Date: Tue, 01 Feb 2011 15:25:07 -0700 Subject: [Rt4-whois] Sub-group on applicable law Message-ID: <20110201152507.00ef555ff13978e3e1b8d2179880f99e.7238a759c5.wbe@email12.secureserver.net> An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110201/fe38eba9/attachment.html From Yakushev at dstadvisors.ru Wed Feb 2 06:30:16 2011 From: Yakushev at dstadvisors.ru (Yakushev Mikhail) Date: Wed, 2 Feb 2011 06:30:16 +0000 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation In-Reply-To: <0EB96DE1-84CB-4FE1-AEB5-4277424760C1@paypal.com> References: <20110131194413.00ef555ff13978e3e1b8d2179880f99e.db1310a2d7.wbe@email12.secureserver.net> <3BA03626-4C16-41BA-ACBA-2F3E9701F17A@paypal.com> <84C9C176-1979-4BDD-B2E2-9D4C2BF0B54E@vonarx.ca> <0EB96DE1-84CB-4FE1-AEB5-4277424760C1@paypal.com> Message-ID: <7C0268D000FB534D8BEDFAD61C5E72A80A0F49@OWA.mazal.ru> Dear colleagues, I do agree with Bill. What happens with Internet in Egypt is not something 'wrong' with Internet/ICANN/IANA/IETF/ITU policies, but this is the reflection of the inability of certain nations to exercise their political (=human) rights. Instead of democracy, there are Internet technologies. Which were cut off, because no technologies can replace democratic procedures. And in opinion of a sovereign state, if this state does not need democracy, 'competing' technologies may/should be promptly avoided/banned. As a citizen of a state, where - saying it politically correctly - 'democracy is not a priority' - I need to admit that the case is very important, very dangerous, very unfortunate - but it is beyond what our Review Team should be involved in. Rgds, Michael -----Original Message----- From: rt4-whois-bounces at icann.org [mailto:rt4-whois-bounces at icann.org] On Behalf Of Smith, Bill Sent: Tuesday, February 01, 2011 9:49 PM To: Kim G. von Arx Cc: rt4-whois at icann.org Subject: Re: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation I fear that such an exercise will be a repeat of the attempt to develop an internationally harmonized set of policies for morality, public order, and the like. While one may object to Egypt's cutting off Internet access, it is certainly within a sovereign state's right to do so. (in my opinion). There are any number of such situations that each of us may find amoral, encourage disorder, etc. In my opinion, efforts to codify a single set of "legitimate" needs will fail or be rejected by some of the very players we try to influence by establishing such a list. On Feb 1, 2011, at 8:19 AM, Kim G. von Arx wrote: I disagree. I believe that identifying WHOIS use is a necessary exercise to determine "legitimate needs" and consumer trust. Kim __________________________________ kim at vonarx.ca +1 (613) 286-4445 "Shoot for the moon. Even if you miss, you'll land among the stars..." On 1 Feb 2011, at 10:26, Smith, Bill wrote: While I agree that identifying use cases for Whois data is an interesting exercise, I respectfully suggest that it is beyond the remit of this Review Team. On Jan 31, 2011, at 6:44 PM, > > wrote: Dear All, To follow on Kathy's message, it is certainly a very serious situation in Egypt. When the government basically "unplugged" Internet access in that country, communication in general was disrupted. I wondered if they were still able to send fax messages over telephone lines? We actually had protesters here in Atlanta of sympathetic supporters last weekend who held a small demonstration. Overall, I agree that we need to think about the circumstances of political dissidents and human rights activists as we review the implementation of WHOIS. But in my experience, WHOIS data is helpful but not necessary to trace a communication on the Internet. When someone wants to hide the source of a communication, a common technique is to exploit open relay channels on someone else's server so that it appears to be the source (but is not). Sometimes, individuals who want to hide their location may relay through 5 or more servers making it extremely difficult to trace back. I am not suggesting that anyone should employ this type of technique, only that it is technically possible and that WHOIS data would not matter. Similarly, I am sure you are all aware of email spoofing used in spam. This technique hides the real identity and source of the spam sender. It displays an email address in the send field that is not the true sender. These points are why I am interested in Lutz's idea of identifying "use cases" for WHOIS data. Kind regards, Lynn -------- Original Message -------- Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation From: "Kathy Kleiman" > Date: Fri, January 28, 2011 10:14 pm To: > Dear All, I know we are all watching the stories from the Middle East with interest, and great concern. I remember the issue of privacy/anonymity came up in our London discussions. I thought the following posting to Professor Dave Farber's Interesting People List might be of interest. Best, Kathy From: David Farber [mailto:dave at farber.net] Sent: Friday, January 28, 2011 3:50 PM To: ip Subject: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation http://www.eff.org/deeplinks/2011/01/egypt-blocks-websites-arrests-bloggers-and Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest Commentary by Eva Galperin As we've seen in Iran and Tunisia, social networking tools have given activists in authoritarian regimes a powerful voice, which can be heard well beyond their own country. But the use of social networking tools has also given their governments ways to identify and retaliate against them. This week we are watching the same dynamic play out in Egypt. This is why it is critical that all activists -in Egypt and elsewhere-take precautions to protect their anonymity and freedom of expression. The protests in Egypt this week also highlight another important point: authoritarian governments can block access to social media websites, but determined, tech-savvy activists are likely to find ways to circumvent censorship to communicate with the rest of the world. In an attempt to clamp down on Egyptian protesters, Egyptian President Hosni Mubarak's government is intermittently blocking websites and arresting bloggers, journalists, and dissidents. Like the Tunisians, Egyptian protesters have made heavy use of social media websites to share information about the protests with the outside world and with each other. In spite of the Egyptian government's blocking of Twitter, tweets from the Egyptian protests in Suez and Cairo provided up-to-the-minute reports about protest activity, the movements of police, deaths and injuries, links to photos on Twitpic, and videos on YouTube. Cooperation amongst protesting citizens has kept communications resilient so far. When protestors in Cario's Tahir Square experienced an outage in cell phone data service, nearby residents reportedly opened their home Wi-Fii networks to allow protesters to get online. On the first day of protests, the Egyptian government blocked several websites, including Twitter and Bambuser, a Swedish website which allows users to stream live video from their cell phones. By the second day, the government's blocking of Twitter was sparse and intermittent, but there were reports of blocking Facebook and YouTube. It is unclear whether or not the Egyptian government will continue to expand its list of blocked sites in the coming days. Even the US Secretary of State Hillary Clinton, who was conspicuously silent during the protests leading up to the Tunisian revolution, has called on the Mubarak government to respect freedom of expression and urged them "not to...block communications, including on social media sites." The other dangerous aspect of the Mubarak government's shameful campaign of silence and censorship has been the arrest and detention of bloggers, journalists, and activists. The Committee to Protect Journalists has reported that the Egyptian government has shut down at least two independent news websites: Al-Dustour and El-Badil. Police beat Al-Jazeera correspondent Mustafa Kafifi and Guardian reporter Jack Shenker, who posted anaudio recording of the incident. Policemen have attacked and arrested cameramen covering the protests and onlookers recording the protests with cell phones. Egypt is no stranger to the arrest of bloggers. Egyptian blogger Kareem Amer was sentenced to four years in prison for "disparaging religion" and "defaming the president" in 2007. In 2009, web forum founder Karim Al-Bukheiri was arrested, tortured, and subject to constant government surveillance. Just last year, the Islamic Human Rights Foundation reported that Egyptian Security Forces arrested "at least 29 activists, including bloggers, lawyers, and human rights activists." The concern here is clear-if the street protests subside, the Mubarak government could initiate a campaign of retaliation and oppression, arresting and harassing the very bloggers and activists who have been chronicling the protests online. Some countries have gone even further. In Iran two opposition activists were hanged this week for taking pictures and video of the Green Revolution protests and posting them online. Given the potential dangers, it is absolutely critical that Egyptian protesters take precautions when communicating online. To reiterate, social networking tools have given activists a powerful voice, which can be heard well beyond Egypt, but activists should also remember that the Egyptian government could use these same tools to identify and retaliate against them. We recommend that political activists look at our Surveillance Self Defense International report for information on how to use technology defensively to better protect their anonymity and freedom of expression in Egypt and other authoritarian regimes. Archives [https://www.listbox.com/images/feed-icon-10x10.jpg] | Modify Your Subscription | Unsubscribe Now [https://www.listbox.com/images/listbox-logo-small.png] ________________________________ _______________________________________________ Rt4-whois mailing list Rt4-whois at icann.org https://mm.icann.org/mailman/listinfo/rt4-whois _______________________________________________ Rt4-whois mailing list Rt4-whois at icann.org https://mm.icann.org/mailman/listinfo/rt4-whois _______________________________________________ Rt4-whois mailing list Rt4-whois at icann.org https://mm.icann.org/mailman/listinfo/rt4-whois -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/b2889b78/attachment.html From Peter.Nettlefold at dbcde.gov.au Wed Feb 2 08:10:18 2011 From: Peter.Nettlefold at dbcde.gov.au (Nettlefold, Peter) Date: Wed, 2 Feb 2011 19:10:18 +1100 Subject: [Rt4-whois] FW: Sub-group on applicable law [SEC=UNCLASSIFIED] In-Reply-To: <0A445C686DD64C4A88DAD8EA725C6FEC38B2E47325@EMB01.dept.gov.au> References: <636771A7F4383E408C57A0240B5F8D4A3025CF8CBD@EMB01.dept.gov.au>, <0A445C686DD64C4A88DAD8EA725C6FEC38B2E47325@EMB01.dept.gov.au> Message-ID: <636771A7F4383E408C57A0240B5F8D4A3025A5EDDC@EMB01.dept.gov.au> Hi all, Thanks to the sub-group for their excellent work on this. My comment on this is that we could consider, particularly at this stage of the review, keeping our definitions or understandings of terms as broad as possible. This is partly because I think that it may be better to have some overlap in our definitions by keeping them broad, rather than risk missing something by having them too narrow. In the case of ?applicable laws?, my suggestion is to keep our definition open so that it can potentially include any relevant/applicable laws. Privacy laws will obviously be a key part of this, but there may be other laws that we haven?t yet identified. As we discussed in London, I think this issue is common to each of our definitional questions. For example, privacy issues should also be raised in the ?consumer trust? area, and I?ve put forward some comments to that sub-group to that effect. Unfortunately I won?t be on the call tonight, but I?m happy to discuss any of this. Regards, Peter From: rt4-whois-bounces at icann.org [mailto:rt4-whois-bounces at icann.org] On Behalf Of lynn at goodsecurityconsulting.com Sent: Wednesday, 2 February 2011 9:25 AM To: rt4-whois at icann.org Cc: Yakushev at dstadvisors.ru Subject: [Rt4-whois] Sub-group on applicable law Dear All, Our sub-group suggests that our definition for the term "applicable law" should be: An agreed understanding for the purpose of WHOIS review: national laws related to personal data protection and data privacy, implementing internationally recognized legal norms such as the U.N. Universal Declaration of Human Rights, the U.N.Guidelines for the Regulation of Computerized Personal Data Files. -------------- next part -------------- ------------------------------------------------------------------------------- The information transmitted is for the use of the intended recipient only and may contain confidential and/or legally privileged material. Any review, re-transmission, disclosure, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited and may result in severe penalties. If you have received this e-mail in error please notify the Security Advisor of the Department of Broadband, Communications and the Digital Economy, 38 Sydney Ave, Forrest ACT 2603, telephone (02) 6271-1376 and delete all copies of this transmission together with any attachments. Please consider the environment before printing this email. ------------------------------------------------------------------------------- From lutz at iks-jena.de Wed Feb 2 08:46:15 2011 From: lutz at iks-jena.de (Lutz Donnerhacke) Date: Wed, 2 Feb 2011 08:46:15 +0000 (UTC) Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation References: <3BA03626-4C16-41BA-ACBA-2F3E9701F17A@paypal.com> Message-ID: * Smith, Bill wrote: > While I agree that identifying use cases for Whois data is an interesting > exercise, I respectfully suggest that it is beyond the remit of this > Review Team. We discussed this point in London as one of the first items on the agenda and came to the conclusion, that we have a clear definition from ICANN: Whois is a "timely, unrestricted and public access to accurate and complete information, including registrant, technical, billing, and administrative contact information." If we take this point deeply serious, we do not need a subgroup of (inter)national law as well a subgroup of law enforcement definition, because we only have a mandate to check the current policies how they support the requirement above. Please forgive me, that I expressed my personal view outside this group and informed you about it. From emily.taylor at etlaw.co.uk Wed Feb 2 15:14:58 2011 From: emily.taylor at etlaw.co.uk (Emily Taylor) Date: Wed, 2 Feb 2011 15:14:58 +0000 Subject: [Rt4-whois] Agenda and summary of comments - Our Call Today Message-ID: <552405E3-52D8-42D7-BA0C-6313AFD52EB7@etlaw.co.uk> Dear All On 29 January, I sent around a suggested agenda for today's call, which was essentially to hear from the sub-groups dealing with definitional work, and also catch up from the Policy and Implementation subgroups. Alice circulated meeting notes from our London meeting on 31 January, which are attached. I would also like to recap on the arrangements for our Face to Face meeting in September. Therefore, my proposed agenda today is: ------------------ Agenda 1. Roll call and apologies 2. Adoption of agenda 3. London meeting notes, comments and adoption 4. Information - September meeting 5. Report from subgroups (C,D,E,F): - Current Status - Outline of proposed content for public comment period - Questions for ICANN staff - Research and support items required. 6. Progress report - Policy and Implementation subgroups (A & B). 7. AOB Kind regards Emily Here is a copy of what I have received so far from the subgroups: -------------------- Law Enforcement an organization or the activity of an organization all of which are authorized by a nationally or internationally recognized government to maintain, co-ordinate, and enforce laws, regulations, or multi-national treaty obligations within the internationally recognized authorized boundaries of that nationally or internationally recognized government [awaiting comments from Lutz] --------------------- Applicable Laws An agreed understanding for the purpose of WHOIS review: national laws related to personal data protection and data privacy, implementing internationally recognized legal norms such as the U.N. Universal Declaration of Human Rights, the U.N.Guidelines for the Regulation of Computerized Personal Data Files. Comment from Peter Nettlefold: My comment on this is that we could consider, particularly at this stage of the review, keeping our definitions or understandings of terms as broad as possible. This is partly because I think that it may be better to have some overlap in our definitions by keeping them broad, rather than risk missing something by having them too narrow. In the case of ?applicable laws?, my suggestion is to keep our definition open so that it can potentially include any relevant/applicable laws. Privacy laws will obviously be a key part of this, but there may be other laws that we haven?t yet identified. As we discussed in London, I think this issue is common to each of our definitional questions. For example, privacy issues should also be raised in the ?consumer trust? area, and I?ve put forward some comments to that sub-group to that effect ------------------ Producers and Maintainers RT4 Members: I can report that I have met with our in-house Legal folks to research the following questions. It is not likely that we will have a final response in time for our Wednesday call, but I should have something back to this group by Friday at the latest. Please review the questions and let me know if you spot any omissions or errors. 1. Who "owns" the WHOIS data? * RAA Section 3.5 ("Rights in Data") * RAA Section 3.6 ("Data Escrow") and Registrar Data Escrow (RDE) Specifications (http://www.icann.org/en/rde/rde-specs-09nov07.pdf ) 2. Where do Registrar obligations under current WHOIS policy reside? * RAA * Consensus Policy * RRA (Registry / Registrar Agreement) * WHOIS Protocol (RFC 3912) * Local law * Others? 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/8bda2972/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: WHOIS REVIEW TEAM MEETING - London - Prel Rep - Final-2.docx Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document Size: 24441 bytes Desc: not available Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/8bda2972/WHOISREVIEWTEAMMEETING-London-PrelRep-Final-2.docx -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/8bda2972/attachment-0001.html From bill.smith at paypal-inc.com Wed Feb 2 15:33:15 2011 From: bill.smith at paypal-inc.com (Smith, Bill) Date: Wed, 2 Feb 2011 08:33:15 -0700 Subject: [Rt4-whois] FW: Sub-group on applicable law [SEC=UNCLASSIFIED] In-Reply-To: <636771A7F4383E408C57A0240B5F8D4A3025A5EDDC@EMB01.dept.gov.au> References: <636771A7F4383E408C57A0240B5F8D4A3025CF8CBD@EMB01.dept.gov.au>, <0A445C686DD64C4A88DAD8EA725C6FEC38B2E47325@EMB01.dept.gov.au> <636771A7F4383E408C57A0240B5F8D4A3025A5EDDC@EMB01.dept.gov.au> Message-ID: <97628077-9EBD-49A7-9206-9E5C6DF93C5A@paypal.com> +1 On Feb 2, 2011, at 12:10 AM, Nettlefold, Peter wrote: > Hi all, > > Thanks to the sub-group for their excellent work on this. > > My comment on this is that we could consider, particularly at this stage of the review, keeping our definitions or understandings of terms as broad as possible. This is partly because I think that it may be better to have some overlap in our definitions by keeping them broad, rather than risk missing something by having them too narrow. > > In the case of ?applicable laws?, my suggestion is to keep our definition open so that it can potentially include any relevant/applicable laws. Privacy laws will obviously be a key part of this, but there may be other laws that we haven?t yet identified. > > As we discussed in London, I think this issue is common to each of our definitional questions. For example, privacy issues should also be raised in the ?consumer trust? area, and I?ve put forward some comments to that sub-group to that effect. > > Unfortunately I won?t be on the call tonight, but I?m happy to discuss any of this. > > Regards, > > Peter > > > From: rt4-whois-bounces at icann.org [mailto:rt4-whois-bounces at icann.org] On Behalf Of lynn at goodsecurityconsulting.com > Sent: Wednesday, 2 February 2011 9:25 AM > To: rt4-whois at icann.org > Cc: Yakushev at dstadvisors.ru > Subject: [Rt4-whois] Sub-group on applicable law > > Dear All, > > Our sub-group suggests that our definition for the term "applicable law" should be: > > An agreed understanding for the purpose of WHOIS review: > national laws related to personal data protection and data privacy, implementing internationally recognized legal norms such as the U.N. Universal Declaration of Human Rights, the U.N.Guidelines for the Regulation of Computerized Personal Data Files. > From lynn at goodsecurityconsulting.com Wed Feb 2 15:34:29 2011 From: lynn at goodsecurityconsulting.com (lynn at goodsecurityconsulting.com) Date: Wed, 02 Feb 2011 08:34:29 -0700 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation Message-ID: <20110202083429.00ef555ff13978e3e1b8d2179880f99e.8ff7654ac5.wbe@email12.secureserver.net> An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/fa457640/attachment.html From emily.taylor at etlaw.co.uk Wed Feb 2 15:37:03 2011 From: emily.taylor at etlaw.co.uk (Emily Taylor) Date: Wed, 2 Feb 2011 15:37:03 +0000 Subject: [Rt4-whois] Fwd: Agenda and summary of comments - Our Call Today References: <552405E3-52D8-42D7-BA0C-6313AFD52EB7@etlaw.co.uk> Message-ID: Hi all Kathy pointed out that this message got truncated in transmission, so here's another version. Emily Begin forwarded message: > From: Emily Taylor > Date: 2 February 2011 15:14:58 GMT > To: "rt4-whois at icann.org WHOIS" > Subject: Agenda and summary of comments - Our Call Today > > Dear All > > On 29 January, I sent around a suggested agenda for today's call, which was essentially to hear from the sub-groups dealing with definitional work, and also catch up from the Policy and Implementation subgroups. > > Alice circulated meeting notes from our London meeting on 31 January, which are attached. > > > I would also like to recap on the arrangements for our Face to Face meeting in September. > > Therefore, my proposed agenda today is: > > > ------------------ > Agenda > > > 1. Roll call and apologies > > 2. Adoption of agenda > > 3. London meeting notes, comments and adoption > > 4. Information - September meeting > > 5. Report from subgroups (C,D,E,F): > > - Current Status > > - Outline of proposed content for public comment period > > - Questions for ICANN staff > > - Research and support items required. > > 6. Progress report - Policy and Implementation subgroups (A & B). > > 7. AOB > > > Kind regards > > Emily > > > Here is a copy of what I have received so far from the subgroups: > > -------------------- > > Law Enforcement > > an organization or the activity of an organization all of which are authorized by a nationally or internationally recognized government to maintain, co-ordinate, and enforce laws, regulations, or multi-national treaty obligations within the internationally recognized authorized boundaries of that nationally or internationally recognized government > > [awaiting comments from Lutz] > > --------------------- > > Applicable Laws > > An agreed understanding for the purpose of WHOIS review: > national laws related to personal data protection and data privacy, implementing internationally recognized legal norms such as the U.N. Universal Declaration of Human Rights, the U.N.Guidelines for the Regulation of Computerized Personal Data Files. > > > Comment from Peter Nettlefold: > > My comment on this is that we could consider, particularly at this stage of the review, keeping our definitions or understandings of terms as broad as possible. This is partly because I think that it may be better to have some overlap in our definitions by keeping them broad, rather than risk missing something by having them too narrow. > > In the case of ?applicable laws?, my suggestion is to keep our definition open so that it can potentially include any relevant/applicable laws. Privacy laws will obviously be a key part of this, but there may be other laws that we haven?t yet identified. > > As we discussed in London, I think this issue is common to each of our definitional questions. For example, privacy issues should also be raised in the ?consumer trust? area, and I?ve put forward some comments to that sub-group to that effect > > ------------------ > > Producers and Maintainers > > > RT4 Members: > I can report that I have met with our in-house Legal folks to research the following questions. It is not likely that we will have a final response in time for our Wednesday call, but I should have something back to this group by Friday at the latest. Please review the questions and let me know if you spot any omissions or errors. > > 1. Who "owns" the WHOIS data? > * RAA Section 3.5 ("Rights in Data") > * RAA Section 3.6 ("Data Escrow") and Registrar Data Escrow (RDE) Specifications (http://www.icann.org/en/rde/rde-specs-09nov07.pdf ) > > 2. Where do Registrar obligations under current WHOIS policy reside? > * RAA > * Consensus Policy > * RRA (Registry / Registrar Agreement) > * WHOIS Protocol (RFC 3912) > * Local law > * Others? > > > > > > 76 Temple Road, Oxford OX4 2EZ UK > telephone: 01865 582 811 mobile: 07540 049 322 > emily.taylor at etlaw.co.uk www.etlaw.co.uk > > 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/03e425f8/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: WHOIS REVIEW TEAM MEETING - London - Prel Rep - Final-2.docx Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document Size: 24441 bytes Desc: not available Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/03e425f8/WHOISREVIEWTEAMMEETING-London-PrelRep-Final-2.docx -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/03e425f8/attachment-0001.html From bill.smith at paypal-inc.com Wed Feb 2 15:41:39 2011 From: bill.smith at paypal-inc.com (Smith, Bill) Date: Wed, 2 Feb 2011 08:41:39 -0700 Subject: [Rt4-whois] FW: [IP] Internet Security Savvy is Critical as Egyptian Government Blocks Websites, Arrests Activists in Response to Continued Protest | Electronic Frontier Foundation In-Reply-To: References: <3BA03626-4C16-41BA-ACBA-2F3E9701F17A@paypal.com> Message-ID: <2DEC2307-F0AC-4B5F-8CA3-27BE80C82EB1@paypal.com> Lutz, I take this review seriously, and I am certain everyone else does as well. I have no issue with your blog post and sincerely apologize if I gave the impression that I did. Regards, Bill On Feb 2, 2011, at 12:46 AM, Lutz Donnerhacke wrote: > * Smith, Bill wrote: >> While I agree that identifying use cases for Whois data is an interesting >> exercise, I respectfully suggest that it is beyond the remit of this >> Review Team. > > We discussed this point in London as one of the first items on the agenda > and came to the conclusion, that we have a clear definition from ICANN: > > Whois is a "timely, unrestricted and public access to accurate and > complete information, including registrant, technical, billing, and > administrative contact information." > > If we take this point deeply serious, we do not need a subgroup of > (inter)national law as well a subgroup of law enforcement definition, > because we only have a mandate to check the current policies how they > support the requirement above. > > Please forgive me, that I expressed my personal view outside this group and > informed you about it. > _______________________________________________ > Rt4-whois mailing list > Rt4-whois at icann.org > https://mm.icann.org/mailman/listinfo/rt4-whois From kKleiman at pir.org Wed Feb 2 15:46:21 2011 From: kKleiman at pir.org (Kathy Kleiman) Date: Wed, 2 Feb 2011 10:46:21 -0500 Subject: [Rt4-whois] Updated Whois Review Team Agenda Message-ID: <3371CBBD15D9714482943AD5D5B752760586FB4101@pir-mail-01> Hi All, Here's an updated Agenda which I worked through with Emily earlier today. It includes definitions circulated by the Subteams (tx you!), as well as some planning material/dates people have requested. Here's a current agenda working draft. Talk to you soon! Kathy 1. Minutes of London Meeting - Finalizing and Accepting. 2. September meeting in Marina Del Ray- Tues/Wed, Sept. 20/21(2 full days) 3. Meeting In San Francisco - a. Sunday, March 13th - Full Day Team Meeting b. Monday, March 14th - Possibility of meeting with GAC and ALAC c. Tuesday, March 15th - Constituency Day, ccNSO Day, ASO Day: Meeting with as many constituencies, advisory committees and supporting organizations as possible (in half hour sessions) d. Wednesday, March 16th - Public Session with ICANN Community (we are requesting a one hour public session at 2pm, but this may be placed at another time on Wednesday). 4. SUBTEAM REPORTS: Reports of Law Enforcement, Applicable Laws, Consumer Trust, Producers/Maintainers of Data a. current status, b. definition outline of what each Subteam proposes we submit in our public comment period. i. Law Enforcement: "an organization or the activity of an organization all of which are authorized by a nationally or internationally recognized government to maintain, co-ordinate, and enforce laws, regulations, or multi-national treaty obligations within the internationally recognized authorized boundaries of that nationally or internationally recognized government." "Please note that I am sending this without having received Lutz's comments, and as such it may be subject to some changes from his end." ii. Applicable Laws: "An agreed understanding for the purpose of WHOIS review: national laws related to personal data protection and data privacy, implementing internationally recognized legal norms such as the U.N. Universal Declaration of Human Rights, the U.N. Guidelines for the Regulation of Computerized Personal Data Files." iii. Consumer Trust: (apologies if I missed an email) iv. Producers and Maintainers of Whois Data (seeking to merge with Consumer Trust?) c. For each Subteam: What questions do you have for ICANN staff (questions based on London Compliance and/or Policy presentations, any ICANN materials posted to the Whois Wiki, or as needed)?, d. For each Subteam, what research and support items the Subteam might you need?, Alice is ready to help subteams with creating Doodle polls and setting up conference bridges for sub-teams (all calls will be recorded and archived unless otherwise requested). 5. Policy and Implementation - clarify the dividing line. 6. Additional items or business? Kathy Kleiman Director of Policy .ORG, The Public Interest Registry Direct: +1 703-889-5756 | Mobile:+1 703-371-6846| www.pir.org | Find us on Facebook | .ORG Blog | Flickr | YouTube | Twitter | Confidentiality Note: Proprietary and confidential to .ORG, The Public Interest Registry. If received in error, please inform sender and then delete. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/44d3eeb1/attachment.html From kim at vonarx.ca Wed Feb 2 15:49:02 2011 From: kim at vonarx.ca (Kim G. von Arx) Date: Wed, 2 Feb 2011 10:49:02 -0500 Subject: [Rt4-whois] Fwd: Agenda and summary of comments - Our Call Today In-Reply-To: References: <552405E3-52D8-42D7-BA0C-6313AFD52EB7@etlaw.co.uk> Message-ID: <30643BFA-433B-467B-B58C-6848FCC7E83D@vonarx.ca> Hi: One of my past question is still outstanding, i.e., are our tel conferences webcast? If so, what is the address for those webcasts? If not, why are we not webcasting them? Thanks. kim From lutz at iks-jena.de Wed Feb 2 16:07:39 2011 From: lutz at iks-jena.de (Lutz Donnerhacke) Date: Wed, 2 Feb 2011 16:07:39 +0000 (UTC) Subject: [Rt4-whois] Questionare Admin Interface Message-ID: If you like you might add your own areas and questions using: http://whois-rt4-survey.iks-jena.de/admin.php I'm still in the "collection" phase for myself. From sarmad at cantab.net Wed Feb 2 16:12:31 2011 From: sarmad at cantab.net (Dr. Sarmad Hussain) Date: Wed, 2 Feb 2011 21:12:31 +0500 Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items In-Reply-To: <35F48913-24BF-411D-A6E0-2FEFCD521F71@etlaw.co.uk> References: <35F48913-24BF-411D-A6E0-2FEFCD521F71@etlaw.co.uk> Message-ID: <000b01cbc2f4$015aae80$04100b80$@net> Dear All, Here is an interim version of the Working Draft for Consumer and Consumer Trust. This is under discussion in our group and will still change over time. Regards, Sarmad From: rt4-whois-bounces at icann.org [mailto:rt4-whois-bounces at icann.org] On Behalf Of Emily Taylor Sent: Saturday, January 29, 2011 2:54 PM To: RT4 WHOIS Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items Dear all I'm sure that, like me, you'll be shocked to learn that, next Wednesday, it will be two weeks since our face to face meeting! I'm therefore writing with some suggestions to prepare for our next call. As we decided at our London meeting, the next conference call is taking place this Wednesday at 16:00 UTC. Bearing in mind our action plan, our priority for this call should be to agree definitions and preliminary questions for public comment prior to the San Francisco meeting. It would be useful to have materials circulated in advance of the call, especially from those groups working on definitions (C, D, E, F). In preparation for this meeting, we are hoping each subteam will report on: 1. current status, 2. an outline of what they might propose in our public comment period. 3. questions for ICANN staff (questions based on London Compliance and/or Policy presentations, any ICANN materials posted to the Whois Wiki, or as needed), 4. research and support items the Subteam might need, Alice is ready to help subteams with creating Doodle polls and setting up conference bridges for sub-teams (all calls will be recorded and archived unless otherwise requested). Early next week, we will also be circulating a short report of our meeting for review, approval and publication by the group. As a reminder, here are our Subteams: A. What is the Whois Policy? -- James, Kathy, Wilfried; B. Whois Policy Implementation Review: Peter, Bill, Emily, Michael; C. Law Enforcement: Kim, Sharon, Wilfried and Lutz; D. Consumers and Consumer Trust Sarmad, Olivier, Lynn, Peter, Bill; E. Applicable laws: Kim, Omar, Michael, Lynn; F. Producers and Maintainers of Whois Data: James, Susan, Wilfried (with Omar looking into the related question of who "owns" the data) Is there anything else we should add to the agenda? Kind regards Emily Image removed by sender. Emily Taylor Consultant (Internet Law and Governance) 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk No virus found in this incoming message. Checked by AVG - www.avg.com Version: 9.0.872 / Virus Database: 271.1.1/3409 - Release Date: 01/29/11 00:34:00 -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/e143d523/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: image/jpeg Size: 507 bytes Desc: not available Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/e143d523/attachment.jpe -------------- next part -------------- A non-text attachment was scrubbed... Name: Consumer and Consumer Trust - working paper.doc Type: application/msword Size: 42496 bytes Desc: not available Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/e143d523/ConsumerandConsumerTrust-workingpaper.doc From kKleiman at pir.org Wed Feb 2 16:14:25 2011 From: kKleiman at pir.org (Kathy Kleiman) Date: Wed, 2 Feb 2011 11:14:25 -0500 Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items In-Reply-To: <000b01cbc2f4$015aae80$04100b80$@net> References: <35F48913-24BF-411D-A6E0-2FEFCD521F71@etlaw.co.uk> <000b01cbc2f4$015aae80$04100b80$@net> Message-ID: <3371CBBD15D9714482943AD5D5B752760586FB4113@pir-mail-01> Tx you Sarmad! From: rt4-whois-bounces at icann.org [mailto:rt4-whois-bounces at icann.org] On Behalf Of Dr. Sarmad Hussain Sent: Wednesday, February 02, 2011 11:13 AM To: 'RT4 WHOIS' Subject: Re: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items Dear All, Here is an interim version of the Working Draft for Consumer and Consumer Trust. This is under discussion in our group and will still change over time. Regards, Sarmad From: rt4-whois-bounces at icann.org [mailto:rt4-whois-bounces at icann.org] On Behalf Of Emily Taylor Sent: Saturday, January 29, 2011 2:54 PM To: RT4 WHOIS Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items Dear all I'm sure that, like me, you'll be shocked to learn that, next Wednesday, it will be two weeks since our face to face meeting! I'm therefore writing with some suggestions to prepare for our next call. As we decided at our London meeting, the next conference call is taking place this Wednesday at 16:00 UTC. Bearing in mind our action plan, our priority for this call should be to agree definitions and preliminary questions for public comment prior to the San Francisco meeting. It would be useful to have materials circulated in advance of the call, especially from those groups working on definitions (C, D, E, F). In preparation for this meeting, we are hoping each subteam will report on: 1. current status, 2. an outline of what they might propose in our public comment period. 3. questions for ICANN staff (questions based on London Compliance and/or Policy presentations, any ICANN materials posted to the Whois Wiki, or as needed), 4. research and support items the Subteam might need, Alice is ready to help subteams with creating Doodle polls and setting up conference bridges for sub-teams (all calls will be recorded and archived unless otherwise requested). Early next week, we will also be circulating a short report of our meeting for review, approval and publication by the group. As a reminder, here are our Subteams: A. What is the Whois Policy? -- James, Kathy, Wilfried; B. Whois Policy Implementation Review: Peter, Bill, Emily, Michael; C. Law Enforcement: Kim, Sharon, Wilfried and Lutz; D. Consumers and Consumer Trust Sarmad, Olivier, Lynn, Peter, Bill; E. Applicable laws: Kim, Omar, Michael, Lynn; F. Producers and Maintainers of Whois Data: James, Susan, Wilfried (with Omar looking into the related question of who "owns" the data) Is there anything else we should add to the agenda? Kind regards Emily [cid:image001.jpg at 01CBC2CA.59B1FBD0] 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk No virus found in this incoming message. Checked by AVG - www.avg.com Version: 9.0.872 / Virus Database: 271.1.1/3409 - Release Date: 01/29/11 00:34:00 -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/084963b6/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: image001.jpg Type: image/jpeg Size: 507 bytes Desc: image001.jpg Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/084963b6/image001.jpg From kKleiman at pir.org Wed Feb 2 16:15:12 2011 From: kKleiman at pir.org (Kathy Kleiman) Date: Wed, 2 Feb 2011 11:15:12 -0500 Subject: [Rt4-whois] unmute my line Message-ID: <3371CBBD15D9714482943AD5D5B752760586FB4115@pir-mail-01> Could my line please be unmated by the operator?? Kathy Kleiman Director of Policy .ORG, The Public Interest Registry Direct: +1 703-889-5756 | Mobile:+1 703-371-6846| www.pir.org | Find us on Facebook | .ORG Blog | Flickr | YouTube | Twitter | Confidentiality Note: Proprietary and confidential to .ORG, The Public Interest Registry. If received in error, please inform sender and then delete. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/88b85d31/attachment.html From olof.nordling at icann.org Wed Feb 2 16:19:26 2011 From: olof.nordling at icann.org (Olof Nordling) Date: Wed, 2 Feb 2011 08:19:26 -0800 Subject: [Rt4-whois] unmute my line In-Reply-To: <3371CBBD15D9714482943AD5D5B752760586FB4115@pir-mail-01> References: <3371CBBD15D9714482943AD5D5B752760586FB4115@pir-mail-01> Message-ID: <05B243F724B2284986522B6ACD0504D7E5D0296D53@EXVPMBX100-1.exc.icann.org> Please use *6 to mute and *7 to unmute From: Kathy Kleiman [mailto:kKleiman at pir.org] Sent: Wednesday, February 02, 2011 5:15 PM To: Olof Nordling Cc: 'RT4 WHOIS' Subject: unmute my line Importance: High Could my line please be unmated by the operator?? Kathy Kleiman Director of Policy .ORG, The Public Interest Registry Direct: +1 703-889-5756 | Mobile:+1 703-371-6846| www.pir.org | Find us on Facebook | .ORG Blog | Flickr | YouTube | Twitter | Confidentiality Note: Proprietary and confidential to .ORG, The Public Interest Registry. If received in error, please inform sender and then delete. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/31c8e19a/attachment.html From lutz at iks-jena.de Wed Feb 2 16:25:37 2011 From: lutz at iks-jena.de (Lutz Donnerhacke) Date: Wed, 2 Feb 2011 16:25:37 +0000 (UTC) Subject: [Rt4-whois] Law Enforcement proposals Message-ID: Law Enforcement shall be defined as: an organization or the activity of an organization all of which are authorized by a nationally or internationally recognized government to maintain, co-ordinate, and enforce (secular or religious) laws, regulations, or multi-national treaty obligations within the internationally recognized authorized boundaries of that nationally or internationally recognized government to maintain, implement, and enforce: social order, public safety, business and societal regulations, services and facilities, and legal compliance. Or A law enforcement agency is an government agency responsible for the enforcement of the laws, which is subject to judicial or open civil overview. Think about a) Gouvernment executive agencies (like police) b) Secret service c) Military service d) Lawyers in their position at court trials e) Lawyers (without restrictions) f) Everybody dealing with Intellectual Property (cease and desist letters) g) Commercial Abuse figherts (like Antispammers, Antivirus, Network Operators) h) Noncommmercial Abuse fighters (like CERTS and Antispammers) i) Private Abuse fighters (mainly Antispammers and Network Operators) From olof.nordling at icann.org Wed Feb 2 16:27:35 2011 From: olof.nordling at icann.org (Olof Nordling) Date: Wed, 2 Feb 2011 08:27:35 -0800 Subject: [Rt4-whois] Adobe room: http://icann.adobeconnect.com/whois-review/ Message-ID: <05B243F724B2284986522B6ACD0504D7E5D0296D5D@EXVPMBX100-1.exc.icann.org> -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/815c9c83/attachment.html From sarmad at cantab.net Wed Feb 2 16:38:38 2011 From: sarmad at cantab.net (Dr. Sarmad Hussain) Date: Wed, 2 Feb 2011 21:38:38 +0500 Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items References: <35F48913-24BF-411D-A6E0-2FEFCD521F71@etlaw.co.uk> Message-ID: <004301cbc2f7$a734b0f0$f59e12d0$@net> Here is an updated version, with Peter's comments incorporated. Regards, Sarmad From: Dr. Sarmad Hussain [mailto:sarmad at cantab.net] Sent: Wednesday, February 02, 2011 9:13 PM To: 'RT4 WHOIS' Cc: 'Emily Taylor'; Smith, Bill; 'lynn at goodsecurityconsulting.com'; Nettlefold, Peter; 'Olivier ITEANU' Subject: RE: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items Dear All, Here is an interim version of the Working Draft for Consumer and Consumer Trust. This is under discussion in our group and will still change over time. Regards, Sarmad From: rt4-whois-bounces at icann.org [mailto:rt4-whois-bounces at icann.org] On Behalf Of Emily Taylor Sent: Saturday, January 29, 2011 2:54 PM To: RT4 WHOIS Subject: [Rt4-whois] Call on Wednesday - preparation, and suggested agenda items Dear all I'm sure that, like me, you'll be shocked to learn that, next Wednesday, it will be two weeks since our face to face meeting! I'm therefore writing with some suggestions to prepare for our next call. As we decided at our London meeting, the next conference call is taking place this Wednesday at 16:00 UTC. Bearing in mind our action plan, our priority for this call should be to agree definitions and preliminary questions for public comment prior to the San Francisco meeting. It would be useful to have materials circulated in advance of the call, especially from those groups working on definitions (C, D, E, F). In preparation for this meeting, we are hoping each subteam will report on: 1. current status, 2. an outline of what they might propose in our public comment period. 3. questions for ICANN staff (questions based on London Compliance and/or Policy presentations, any ICANN materials posted to the Whois Wiki, or as needed), 4. research and support items the Subteam might need, Alice is ready to help subteams with creating Doodle polls and setting up conference bridges for sub-teams (all calls will be recorded and archived unless otherwise requested). Early next week, we will also be circulating a short report of our meeting for review, approval and publication by the group. As a reminder, here are our Subteams: A. What is the Whois Policy? -- James, Kathy, Wilfried; B. Whois Policy Implementation Review: Peter, Bill, Emily, Michael; C. Law Enforcement: Kim, Sharon, Wilfried and Lutz; D. Consumers and Consumer Trust Sarmad, Olivier, Lynn, Peter, Bill; E. Applicable laws: Kim, Omar, Michael, Lynn; F. Producers and Maintainers of Whois Data: James, Susan, Wilfried (with Omar looking into the related question of who "owns" the data) Is there anything else we should add to the agenda? Kind regards Emily Image removed by sender. Emily Taylor Consultant (Internet Law and Governance) 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk No virus found in this incoming message. Checked by AVG - www.avg.com Version: 9.0.872 / Virus Database: 271.1.1/3409 - Release Date: 01/29/11 00:34:00 -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/b2c4db52/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: image/jpeg Size: 507 bytes Desc: not available Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/b2c4db52/attachment.jpe -------------- next part -------------- A non-text attachment was scrubbed... Name: Consumer and Consumer Trust - working paper 0.2.doc Type: application/msword Size: 44544 bytes Desc: not available Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/b2c4db52/ConsumerandConsumerTrust-workingpaper0.2.doc From kim at vonarx.ca Wed Feb 2 17:00:06 2011 From: kim at vonarx.ca (Kim G. von Arx) Date: Wed, 2 Feb 2011 12:00:06 -0500 Subject: [Rt4-whois] Law Enforcement proposals In-Reply-To: References: Message-ID: <3E8D85CF-4F4E-4613-9CAD-285C28A67A00@vonarx.ca> All, the definition from Sharon and me below is not the one we had circulated. Here is the one Sharon and I had agreed upon: > Law Enforcement is an organization or the activity of an organization all of which are authorized by a nationally or internationally recognized government to maintain, co-ordinate, and enforce laws, regulations, or multi-national treaty obligations within the internationally recognized authorized boundaries of that nationally or internationally recognized government __________________________________ kim at vonarx.ca +1 (613) 286-4445 "Shoot for the moon. Even if you miss, you'll land among the stars..." On 2 Feb 2011, at 11:25, Lutz Donnerhacke wrote: > Law Enforcement shall be defined as: > an organization or the activity of an organization all of which are > authorized by a nationally or internationally recognized government to > maintain, co-ordinate, and enforce (secular or religious) laws, > regulations, or multi-national treaty obligations within the > internationally recognized authorized boundaries of that nationally or > internationally recognized government to maintain, implement, and enforce: > social order, public safety, business and societal regulations, services > and facilities, and legal compliance. > > Or > A law enforcement agency is an government agency responsible for the > enforcement of the laws, which is subject to judicial or open civil > overview. > > Think about > a) Gouvernment executive agencies (like police) > b) Secret service > c) Military service > d) Lawyers in their position at court trials > e) Lawyers (without restrictions) > f) Everybody dealing with Intellectual Property (cease and desist letters) > g) Commercial Abuse figherts (like Antispammers, Antivirus, Network Operators) > h) Noncommmercial Abuse fighters (like CERTS and Antispammers) > i) Private Abuse fighters (mainly Antispammers and Network Operators) > _______________________________________________ > Rt4-whois mailing list > Rt4-whois at icann.org > https://mm.icann.org/mailman/listinfo/rt4-whois -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/94c551e8/attachment.html From olof.nordling at icann.org Wed Feb 2 17:09:37 2011 From: olof.nordling at icann.org (Olof Nordling) Date: Wed, 2 Feb 2011 09:09:37 -0800 Subject: [Rt4-whois] WHOIS REVIEW TEAM MEETING - London - notes Message-ID: <05B243F724B2284986522B6ACD0504D7E5D0296D8F@EXVPMBX100-1.exc.icann.org> Dear Review Team Members, The attached notes from the London meeting were approved at the RT conference call today, subject to any further comments or edits by team members to the list before 16.00 UTC on Friday 4 February. Best regards Olof -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/2fbcc033/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: WHOIS REVIEW TEAM MEETING - London - Prel Rep - Final.docx Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document Size: 21282 bytes Desc: WHOIS REVIEW TEAM MEETING - London - Prel Rep - Final.docx Url : http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/2fbcc033/WHOISREVIEWTEAMMEETING-London-PrelRep-Final.docx From emily.taylor at etlaw.co.uk Wed Feb 2 17:19:15 2011 From: emily.taylor at etlaw.co.uk (Emily Taylor) Date: Wed, 2 Feb 2011 17:19:15 +0000 Subject: [Rt4-whois] Please can you mute your phones if not speaking? Message-ID: <7FD684AF-DA7C-439D-A506-DEE34D95D096@etlaw.co.uk> We're getting some background noise 76 Temple Road, Oxford OX4 2EZ UK telephone: 01865 582 811 mobile: 07540 049 322 emily.taylor at etlaw.co.uk www.etlaw.co.uk -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110202/252d6308/attachment.html From emily.taylor at etlaw.co.uk Thu Feb 3 10:52:32 2011 From: emily.taylor at etlaw.co.uk (Emily Taylor) Date: Thu, 3 Feb 2011 10:52:32 +0000 Subject: [Rt4-whois] ICANN public session change of time Message-ID: <594B2A5B-2E59-457F-BD02-AFEFEB28DD5A@etlaw.co.uk> Dear all Thanks for a productive call yesterday. We had agreed Wednesday 2pm for our public outreach session to avoid conflict with the gNSO. This morning I have been informed that the gNSO now intend to hold their session at 2pm on Wednesday. As the deadline for finalising the programme looms I have asked the ICANN staff to schedule our public session for 11-12 on Wednesday morning. Emily Sent from my iPhone From Peter.Nettlefold at dbcde.gov.au Fri Feb 4 06:06:32 2011 From: Peter.Nettlefold at dbcde.gov.au (Nettlefold, Peter) Date: Fri, 4 Feb 2011 17:06:32 +1100 Subject: [Rt4-whois] Out of the office [SEC=UNCLASSIFIED] In-Reply-To: <3E8D85CF-4F4E-4613-9CAD-285C28A67A00@vonarx.ca> References: <3E8D85CF-4F4E-4613-9CAD-285C28A67A00@vonarx.ca> Message-ID: <636771A7F4383E408C57A0240B5F8D4A3025D5E062@EMB01.dept.gov.au> Hello all, This is just to advise that I will be out of the office on leave for the next two weeks. My colleague Tristan Kathage (cc'd to this mail) works on internet governance issues with me, so please feel free to contact Tristan with any urgent issues in my absence. If the review team and the sub-groups I'm a part of feel comfortable to do so, then cc'ing Tristan to emails in my absence will allow him to get me up to speed quickly on my return. Kind regards, Peter ------------------------------------------------------------------------------- The information transmitted is for the use of the intended recipient only and may contain confidential and/or legally privileged material. Any review, re-transmission, disclosure, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited and may result in severe penalties. If you have received this e-mail in error please notify the Security Advisor of the Department of Broadband, Communications and the Digital Economy, 38 Sydney Ave, Forrest ACT 2603, telephone (02) 6271-1376 and delete all copies of this transmission together with any attachments. Please consider the environment before printing this email. ------------------------------------------------------------------------------- -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mm.icann.org/pipermail/rt4-whois/attachments/20110204/13d9cd27/attachment.html