<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style></head>
<body class='hmmessage'><div dir='ltr'>
<DIV dir=ltr><FONT style="FONT-SIZE: 12pt" size=3>INTERNET GOVERNANCE</FONT><BR>&nbsp;<BR>SOPA and the Future of Internet Governance<BR><A href="http://verdict.justia.com/2012/02/13/sopa-and-the-future-of-internet-governance">http://verdict.justia.com/2012/02/13/sopa-and-the-future-of-internet-governance</A><BR>&nbsp;<BR>&nbsp;<BR>Gov't memo downplays WCIT-12 danger to Internet governance<BR><A href="http://www.fiercegovernmentit.com/story/govt-memo-downplays-wcit-12-danger-internet-governance/2012-02-12">http://www.fiercegovernmentit.com/story/govt-memo-downplays-wcit-12-danger-internet-governance/2012-02-12</A><BR>&nbsp;<BR>&nbsp;<BR><FONT style="FONT-SIZE: 12pt" size=3>DOMAIN NAME</FONT><BR>&nbsp;<BR>Hundreds of Whitney Houston domains registered after death<BR><A href="http://domainnamewire.com/2012/02/12/whitney-houston-domains/">http://domainnamewire.com/2012/02/12/whitney-houston-domains/</A><BR>&nbsp;<BR>&nbsp;<BR><A href="http://www.elliotsblog.com/go-daddy-reports-significant-surge-in-whitney-houston-domain-registrations-1820"><FONT color=#0e2b38>Go Daddy Reports “Significant Surge” in Whitney Houston Domain Registrations</FONT></A><BR><A href="http://www.elliotsblog.com/go-daddy-reports-significant-surge-in-whitney-houston-domain-registrations-1820">http://www.elliotsblog.com/go-daddy-reports-significant-surge-in-whitney-houston-domain-registrations-1820</A><BR>&nbsp;<BR>&nbsp;<BR>Largest Russian Registrar RU-CENTER Joins Afternic's Network as Premium Reseller<BR><A href="http://www.marketwatch.com/story/largest-russian-registrar-ru-center-joins-afternics-network-as-premium-reseller-2012-02-13">http://www.marketwatch.com/story/largest-russian-registrar-ru-center-joins-afternics-network-as-premium-reseller-2012-02-13</A><BR>&nbsp;<BR>&nbsp;<BR><FONT style="FONT-SIZE: 12pt" size=3>INTERNET REGULATION</FONT><BR>&nbsp;<BR>15 Years On, President Clinton's 5 Principles for Internet Policy Remain the Perfect Paradigm<BR><A href="http://www.forbes.com/sites/adamthierer/2012/02/12/15-years-on-president-clintons-5-principles-for-internet-policy-remain-the-perfect-paradigm/">http://www.forbes.com/sites/adamthierer/2012/02/12/15-years-on-president-clintons-5-principles-for-internet-policy-remain-the-perfect-paradigm/</A><BR>&nbsp;<BR>&nbsp;<BR>The Internet Society wants ACTA reconsidered<BR><A href="http://www.theinquirer.net/inquirer/news/2151890/internet-society-acta-reconsidered">http://www.theinquirer.net/inquirer/news/2151890/internet-society-acta-reconsidered</A><BR>&nbsp;<BR>&nbsp;<BR><FONT size=3>CYBERCRIME</FONT><BR></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>What If Hackers Ruined the Whole Internet for Everybody?—Forbes&nbsp;<BR><A href="http://secureworldpost.secureworldexpo.com/what-if-hackers-ruined-the-whole-internet-for-everybody-forbes/">http://secureworldpost.secureworldexpo.com/what-if-hackers-ruined-the-whole-internet-for-everybody-forbes/</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>Malware growth linked to social media, targeted attacks and exploit kits: M86<BR><A href="http://www.arnnet.com.au/article/415146/malware_growth_linked_social_media_targeted_attacks_exploit_kits_m86/">http://www.arnnet.com.au/article/415146/malware_growth_linked_social_media_targeted_attacks_exploit_kits_m86/</A><BR>&nbsp;<BR>&nbsp;<BR>Regional police hubs launched to combat cybercrime <BR><A href="http://www.out-law.com/en/articles/2012/february/regional-police-hubs-launched-to-combat-cybercrime-/">http://www.out-law.com/en/articles/2012/february/regional-police-hubs-launched-to-combat-cybercrime-/</A><BR>&nbsp;<BR>&nbsp;<BR>CBI proposes its cyber lab in Bangalore <BR><A href="http://ibnlive.in.com/news/cbi-proposes-its-cyber-lab-in-bangalore/229789-62-132.html">http://ibnlive.in.com/news/cbi-proposes-its-cyber-lab-in-bangalore/229789-62-132.html</A><BR>&nbsp;<BR>&nbsp;<BR>Learning about Cybersecurity from an Unnatural World<BR><A href="http://blogs.computerworlduk.com/unscrewing-security/2012/02/learning-about-cybersecurity-from-an-unnatural-world/index.htm">http://blogs.computerworlduk.com/unscrewing-security/2012/02/learning-about-cybersecurity-from-an-unnatural-world/index.htm</A><BR>&nbsp;<BR>&nbsp;<BR></DIV>                                               </div></body>
</html>