Vigilantism, in cyberspace or a New York subway, gets rejected in the main because more than just one vigilante results in an unlovely chaos. What the Anonymous cyber-vigilantes - those meting out "payback" for commercial decisions about Wikileaks - don't seem to realize is that chaos begets reaction, and in this case the victim may be the Internet itself. more
For an organization where people argue for hours over arcane minutiae, it's remarkable that virtually everyone agrees that ICANN should serve the "global public interest" and build "consumer trust" in the Internet. Although it's only three pages long, ICANN's Affirmation of Commitments (AoC) cites "public interest" five times and "consumer trust" eight times. So at the ICANN meeting today in Cartagena, Colombia, a group of participants explored ways to "institutionalize" these concepts within the organization. more
Like many of you, I am keenly following the Comcast-Level 3 dispute and am trying to make sense of it all. The dispute confirms several universal principles about Internet traffic routing that have passed the test of time. ... Consumers pay Internet Service Providers ("ISPs") a monthly subscription with the expectation that the fee covers access to available content, i.e., the conduit. As the World Wide Web evolves and content options diversify to include full motion video, consumers simply expect their ISPs to make sure the download distribution pipes are sufficiently robust to handle high bandwidth requirements and commensurately large monthly download volume. more
The Internet Society's NY Chapter (ISOC-NY) is delighted to present Milton Mueller's first full exposition of his new book Networks and States: The Global Politics of Internet Governance at NYU on Tuesday December 14 2010. Prof. Mueller is a co-founder of ICANN's NonCommercial User's Constituency and a renowned cyberlibertarian. more
Legislation has been introduced in the US that will require all public federal buildings to install WiFi base stations in order to free up cell phone networks. The Federal Wi-Net Act would mandate the installation of small WiFi base stations in all publicly accessible federal buildings in order to increase wireless coverage and free up mobile networks. The bill would require all new buildings under construction to comply and all older buildings to be retrofitted by 2014. It also orders $15 million from the Federal Buildings Fund be allocated to fund the installations. more
eco, the German ISP association, mentions on its website today that the 100,000th PC was cleaned from infection through its PC cleaning program. Since 15 September, German account holders could visit the website to download tools to clean up computers from digital infections. Botfrei ("botfree", translation WdN) is a cooperation between eco and the German government. First figures seem to prove that this is a successful public-private partnership, worth looking into for other countries as a best practice. more
In this part I want to focus on the gathering of cyber crime data. Are there best practices in the world on how cyber crime data is reported to law enforcement and aggregated to show the impact of said crime? Previously the discussion focused on the fact that cyber crime = crime and on a basic cyber (crime) training for every police officer. From the reactions this received, it is clear that some people see this as a possible solution. more
Public comments on the Proposed Recommendations published by the Accountability and Transparency Review Team ("ATRT") have now been submitted, and it is worth stepping back to evaluate ATRT's work in the context of ICANN's larger challenges. ATRT was constituted to carry out ICANN's commitments under the AoC. Yet at times ICANN acted as if ATRT were an adversary rather than a partner... more
In the transition from IPv4 to IPv6, the preferred solution for network endpoints is to have both native IPv4 and IPv6 connectivity (also called dual-stack connectivity). If a site cannot get native IPv6 connectivity, however, the IPv4 network endpoints can choose from a number of conversion technologies to connect to the IPv6 Internet. The most commonly used conversion mechanisms are 6to4, Teredo and tunnel-brokers. At recent RIPE meetings there have been claims that 6to4 connectivity is quite often broken. We were interested to find out how broken it really is. more
Wikileaks is still accessible -- via Google. Does that change anything? For many Internet users IP addresses as well as domain names are completely transparent. Further, Google (and other search engines) and often the first stop when these users wants to find a service, or a web site. Thus, many of us discussed over the years the eventual viability of Google (... and other search engines) as "DNS" (note the "'s). Now, don't jump at my throat quite yet... more
After reading Steve Delbianco's recent CircleID article entitled The Tale of Two Governance Models I was torn. On one hand I agreed and supported Steve's comments about the strength of the bottom-up consensus driven model upon which ICANN was originally founded. As I am about to begin my thirty fifth ICANN regional meeting over the last eleven years, it is a model which I still believe in and fiercely fight to defend. However, on the other hand I look back over the last eleven years... more
Back in August, FTC chair Jon Leibowitz suggested an Internet do-not-track registry, analogous to the telephone do-not-call registry. At the time, I thought it wasn't a good idea for both technical and non-technical reasons. This week, the FTC published an online privacy report recommending the same thing, and Rep. Ed Markey promises to offer a bill next year to mandate do-not-track for children. With all this interest, might it be a good idea now? Maybe. more
In June of 2008 KnujOn reported that 70 Registrars did not have a business address listed in the InterNIC Registrar Directory. Only after reporting a month later that little had changed did ICANN perform a mass update of the directory. On further inspection we found many of the newly disclosed addresses were phantom locations, false addresses, and PO boxes. more
The past couple of weeks have been pretty seminal for anyone concerned about the state of Internet security and the bigger picture as to how much we could - do - and should - trust the Web. These two strange words - WikiLeaks and Stuxnet - have suddenly entered our lexicon and there is a lot to be concerned about in the world of smart grid. more
This month, ICANN is driving hard to get two of its horses to the finish line. The first is barely a year old - it's the first formal review of ICANN's accountability and transparency. The second horse is going on 4 years old: ICANN's plan to introduce hundreds of new top-level domains (TLDs) for the Internet. Just as these horses have entered the home stretch, one of the racecourse officials is vigorously waving the yellow caution flag. And ICANN would do well to pull back on the reins. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix