This post was prompted by questions I was asked to address when I participated in a panel discussion of cybersecurity. Here are the relevant questions: "Should we reconsider the notion that companies under attack are prohibited from investigating the attackers and trying to locate them? We allow private investigators to conduct some activities that usually only the police are allowed to do; should we accredit private cyber investigators?" ...The one I found more interesting is the second question: whether we should accredit private cyber investigators. more
The FCC has posed a number of provocative questions to AT&T regarding the fact that iPhone subscribers cannot download and use the Google Voice application. AT&T should stifle every motivation to play cute or clever with the FCC. Apple adopted such a strategy when it suggested to the Library of Congress and others that it would be curtains for the free world if iPhone owners could hack, jailbreak, tether, and otherwise use their handsets without fear of violating the prohibition on circumventing copyright laws contained in the Digital Millennium Copyright Act. more
There is a Dutch website which regularly publishes comments on rulings of the World Intellectual Property Organization (WIPO) Arbitration, Dutch court cases, and similar things. They have a newsletter which reports over the latest cases. It is really meant for people who are into the legal aspects of domain names. In the July "nieuwsbrief" newsletter, there was a remark (in Dutch) about a case that the top level ".nl" suffix to the name should not be considered relevant. more
First off all, still unknown to the masses, this newly proposed $185,000 USD generic Top-Level Domain (gTLD) scheme is in reality a suffix-less, custom-made, designer, globally exclusive domain name. Well done ICANN, as it is what the world needs now. However, ICANN has never mentioned this special marketing feature to date, as this suffix-less quality alone brings a major and a very positive revolution in cyber branding architecture for the net savvy marketers and dramatically changes the global thinking which has been primarily locked into a suffix based mentality when trying to reach for anything on the net; what name and what suffix? more
Having followed IP communications as an analyst since 2001, I've seen a few cycles come and go, and Smart Grid reminds me a lot of VoIP. Telcos and utilities both operate large, complex and costly networks, and prior to 1984, both were heavily regulated. Following the deregulation of telecom came a wave of unprecedented innovation and disruption built largely around IP technologies. We all know what that's done for telcos -- and communications in general. more
Introducing new generic Top-Level Domains represents, as ICANN says, "the biggest change in the Internet since its inception 40 years ago." Among the least understood aspects of this change is its potential to alter the economic power of ICANN as an institution. To see how that might happen, let's follow the money as it is expected to flow from the gTLD application process. ICANN expects to get a lot of money from gTLD applications: $92,500,000, to be exact. more
At the recent ISOC Asia conference in Kuala Lumpur a rather innocuous coffee break question was raised: could any one around the table name some of the major Top-Level Domains (TLDs) still delinquent in their IPv6 support? Nobody could answer on the spot but the question intrigued me. A logical place to start looking for an answer was ICANN. more
ICANN has operated on the fundamental principle that there should be separation within the domain name marketplace between registries (wholesale) and registrars (retail). This fundamental principle has been a pillar upon which ICANN has provided registrants (consumers) with increased choice, innovation, and price savings. Therefore it was with great surprise when ICANN staff unilaterally undertook this initial vertical separation analysis through exclusive consultation with ICANN contracting parties (registrars and registries), while totally excluding non-contracting parties (individual, business and non-commercial registrants)... more
Around the world governments, regulators and the industry are struggling with the old regulatory legacy systems. These have become a major stumbling block in the transition to a new environment. Increasingly countries are beginning to understand the social and economic benefits a national broadband infrastructure can offer, but it is impossible to bring that about while the systems are based on the present regulatory regimes. To take these broader benefits into account we will need to develop government policies to facilitate the digital economy... more
Gordon Crovitz's Op-ed in the Wall Street Journal about the relationship between ICANN and the future of free speech quotes me a couple of times... Crovitz emailed me last week when he was researching his column. I was somewhat more critical of ICANN's status quo in our exchange than in the quotes he ended up using. Following are my full answers, emailed to him on Thursday. more
Your corporate domain names send implicit messages (signals) through their Top-Level Domains (TLDs) and their second-level words. Shape your domain names so to send the right messages and to avoid sending unintentionally confusing messages. The post focuses on a framework to help bidders determine which TLDs send messages that are potentially profit generating... Soon TLDs such as ".car," ".cars," ".green," and ".eco" will be available to any qualified body whose request is favored by the allocation system. The system being discussed is a combination of beauty contests and auctions. more
Google has undertaken a beta-test of a telephony platform that includes the opportunity to route incoming calls to multiple devices and telephone numbers as well as free domestic long distance service. Google offers a service that fits somewhere between computer-to-computer, Internet telephony and Voice over the Internet Protocol telephony with access to and from the public switched telephone network. These service categories present polar opposites for U.S. regulatory purposes... more
As a follow up to Susan Brenner's Networks and Nationalization and my comment there, I will go further in this post and talk about the "cyberwar" and "offense" aspects of her article. I think I made this point elsewhere as well... but before getting into a war, it'd be a brilliant idea to actually know that you can win. Cyberwarfare is the sort of game where you don't really need to be a huge government with the largest standing army in the world and sophisticated weaponry in order to win... more
I recently followed an interesting international discussion on FttH vs. cable. With the fiber to the home (FttH) debate hotting up, driven by the possibility of using FttH as the new infrastructure for the digital economy, the cable companies are putting up a stiff fight, both in Europe (Netherlands) and the USA, claiming FttH is not necessary, and that DOCSIS 3.0 can do the job just as well. In these debates the longer-term national interest is often disregarded. The debate is confined to the technology -- what it can and cannot do -- and it also concentrates on a rather short-term timeframe, say of the next five years. more
This post isn't about -- or isn't only about -- the use of computer technology to commit crimes. It's more about the use of computer technology to commit war. A few weeks ago, I was part of a conversation about the legal issues cyberwarfare raises. We were talking about various scenarios -- e.g., a hostile nation-state uses cyberspace to attack the U.S. infrastructure by crippling or shutting down a power grid, air traffic control systems, financial system, etc. Mostly, we were focusing on issues that went to the laws of war, such as how and when a nation-state that is the target of a cyberattack can determine the attack is war, rather than cybercrime or cyberterrorism. more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global