Feeds

WCIT leak: CHAOS will REIGN if telco talks fail

Dubai discussion of International Telecoms Regulations could also mean nothing

3 Big data security analytics techniques

As delegates prepare for the intolerable privation of a five-star junket in Dubai to debate re-framing the decades-old International Telecommunications Regulations (ITRs), a leaked management briefing from September warns that chaos may reign if the talks don’t reach a consensus outcome.

The document (at WCIT Leaks, here (PDF)) was drawn up to get delegates to the retreat singing from the same song sheet, so to speak – or at least to make sure they know what’s on the set-list.

The document’s author holds the view that the Dubai meeting will be a battle of the blocs, with the USA, Europe and Asia broadly aligned on one side, Africa, Russia and the Arab states on the other. America’s favourite outcome would be to have the new ITRs as nearly-identical as possible to the old document, drawn up so long ago it still calls the ITU the “CCITT”.

The briefing suggests that if the ITRs are substantially revised, as many as 40 countries more-or-less aligned with the USA would refuse to sign the treaty, effectively splitting global Internet regulation.

Even if a heavily-revised set of ITRs were to emerge as the consensus – highly unlikely given America’s strong opposition to the treaty – the document warns of a likely “anti-ratification” campaign in OECD countries. The ITU apparently believes it would be able to counter such a campaign.

Complaining about the “well funded” campaign against the ITR revision process, the document claims that “The lobbying group that initiated the campaign has probably lost control of it and regrets the intensity of the attacks against ITU (the sponsors of that campaign support ITU-D, ITU-R, and much of ITU-T and probably did not realize that the attacks directed against WCIT would turn into general attacks on the ITU as a whole).”

It continues: “negative media coverage in the US continues, and is now starting to appear in developing countries, and the Secretariat continues its effort to counter this. In particular, as the Secretary-General has said publicly, we should encourage Member States to conduct open consultations at the national level.” ®

SANS - Survey on application security programs

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE & Vodafone will let you BONK on the TUBE – with Boris' blessing
Transport for London: You can pay, but don't touch
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
Google eyes business service in latest Fiber trials
Lucky Kansas City buggers to host yet another pilot program
Huawei exec: 'Word of mouth' will beat Apple and Samsung in Europe
World Mobile Telephone Factory No.3 won't fling the big bucks around just yet
Brazilian president signs internet civil rights law
Marco Civil bill enshines 'net neutrality', 'privacy' as law
DeSENSORtised: Why the 'Internet of Things' will FAIL without IPv6
What's stopping a tinyputer invasion? An IP address shortage, says Cisco
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.