Visitors Now:
Total Visits:
Total Stories:
Profile image
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

The Truth about the UN and the Future of the Internet after Dubai

Monday, December 10, 2012 9:19
% of readers think this story is Fact. Add your two cents.

(Before It's News)

By: J.D. Fuzzface and L. Bryant writers, -Terraus.com

Full story may be accessed here!

At the World Conference on International Telecommunications in Dubai this week, the ITU members have decided to adopt the Y.2770 standard for deep packet inspection, a top-secret proposal by way of China that will allow telecom companies across the world to more easily dig through data passed across the Web.

The ITU’s secretary general, Hamadoun Toure, has dismissed critics who have called the proposed DPI model invasive, penning an op-ed this week where he insists his organization’s meeting in Dubai poses ʻʻno threat to free speechʼʼ.

As a simple mockery to basic human rights such as freedom of speech he continues: ʻʻIt is our chance to chart a globally-agreed roadmap to connect the unconnected, while ensuring there is investment to create the infrastructure needed for the exponential growth in voice, video and data traffic,ʼʼ Toure adds: ʻʻthat it presents the UN with a golden opportunity to provide affordable connectivity for all, including the billions of people worldwide who cannot yet go online.ʼʼ

Despite his explanation, though, some nation-states and big-name businesses remain opposed to the proposal. The ITU’s conference this week has been held behind closed doors, and representatives with online service providers Google, Facebook and Twitter have been barred from attending.

According to the UN, implementing deep-packet inspection, or DPI, on such a global scale will allow authorities to more easily detect the transferring and sharing of copyrighted materials and other protected files by finding a way for administrators to analyze the payload of online transmissions, not just the header data that is normally identified and interpreted.

It is standard procedure to route packets based on their headers, after all it is the part of the packet that contains information on the packet’s intended destination, writes The Inquirer’s Lawrence Lati, ʻʻbut by inspecting the contents of each packet ISPs, governments and anyone else can look at sensitive data. While users can mitigate risks by encrypting data, given enough resources encryption can be foiled.ʼʼ

ʻIt’ll be the biggest power grab in the UN’s history, as well as a perversion of its power,ʼʼ he warns.

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.