ANKARA, Turkey – A Turkish group seeking to improve communications technology is pushing the use of a splinter Internet network that might avoid control by the United States.
The Turkish Informatics Association’s recommendation comes as the U.S. Commerce Department has announced it would indefinitely retain oversight of the Internet’s main traffic-directing computers, known as root servers.
A federation of independent root operators, The Public-Root, is trying to become an alternative network with 13 root servers in 10 countries, including Turkey.
The Turkish Informatics Association and Amsterdam-based Unified Identity Technology want to use that alternative network to offer Internet addresses that end in a company or individual name – such as “www.yourname” – without “.com” or a country code like “.tr” for Turkey.
Although the primary selling point is an easy-to-remember address, “the system could also lead the way to an independent network for countries concerned about increasing interference of the United States,” said Turhan Mentes, the Turkish group’s chairman.
Other alternative root systems exist but most computers are configured to use the official system, which the U.S. Commerce Department oversees through the California-based Internet Corporation for Assigned Names and Numbers, or ICANN.
Alternatives offer more flexibility in creating new suffixes but run the risk of fracturing the Internet such that two users typing the same domain name could reach entirely different Web sites, depending on where they are.
Step away from the laptop: St. Petersburg, Fla., police have arrested a man for using someone else’s wireless Internet network in one of the first criminal cases involving this fairly common practice.
Benjamin Smith III, 41, faces a pretrial hearing this month following his April arrest on charges of unauthorized access to a computer network, a third-degree felony.
Police say Smith admitted using the Wi-Fi signal from the home of Richard Dinon, who had noticed Smith sitting in an SUV outside Dinon’s house using a laptop computer.
The practice is so new that the Florida Department of Law Enforcement doesn’t even keep statistics, according to the St. Petersburg Times, which reported Smith’s arrest this week.
Innocuous use of other people’s unsecured Wi-Fi networks is common, though experts say that plenty of illegal use also goes undetected: such as people sneaking on others’ networks to traffic in child pornography, steal credit card information and send death threats.
Calling Yahoo: Internet powerhouse Yahoo Inc., continuing efforts to extend its reach beyond the desktop, is launching new features Thursday to help mobile phone users plumb its online search engine.
One is a text-messaging feature. Users send a message to “92466” – the numerals used to spell Yahoo on a telephone keypad – and get back direct responses to requests about local businesses, weather and stock quotes. Yahoo also promises to deliver a Web link to get more information about the results.
The feature is initially available to Cingular, Sprint and Verizon subscribers.
In another upgrade, Yahoo is introducing technology that will open up its search engine to mobile handsets equipped with wireless application protocol, or WAP. The ability to call up Web sites found through Yahoo’s mobile search previously had been limited unless a handset could read hypertext markup language, or HTML, the format used by Web browsers.
The WAP searches initially are available to Cingular, Sprint and T-Mobile subscribers.
High-tech sharks: Could technology duplicate the innate ability sharks and stingrays possess to detect electrical fields generated by other creatures in the ocean?
A San Diego technology company and two other firms are trying to find out as part of a U.S. Navy research project that could lead to new ways for the military to detect enemy submarines or mines at sea.
RD Instruments, which develops acoustic sensors for detecting the speed of currents for marine safety, began working on the project in April, said research specialist Jerry Mullison.
Sharks use their ability to detect electric fields created by other animals moving underwater for navigation and targeting prey, Mullison said.
From Herald news services
Talk to us
> Give us your news tips.
> Send us a letter to the editor.
> More Herald contact information.