We see the problems that we are facing within an increasingly digital society and economy. We cannot go backward; the only way forward is to ensure that this new digital environment is made as safe as possible from a personal, social, political and economic perspective. We are currently struggling on these fronts. Unfortunately, we have now clearly entered a situation of cyber warfare. States now use digital technologies to impose and undermine ideologies. more
Cyber attackers are very skilled at infiltration. They'd find ways into a house through cracks and holes that the homeowner doesn't know about. Analogically speaking, that's what the new cyber attack group dubbed "Hafnium" did when they identified several zero-day Microsoft Exchange vulnerabilities to get into target networks. With thousands of users for every Microsoft Exchange server, the attack has far-reaching implications. First, it establishes the presence of a new threat actor group in town. What else could they be up to? more
I still run across articles that extol the supposed wonders of 5G. The most recent, published in Gizmodo asks "How 5G Could Replace Your Home Broadband Connection". I was surprised to see an article like this in a tech-oriented site because the article gets most of the facts wrong about 5G - facts that are not hard to verify. This article talks about 5G having "faster download speeds, faster upload speeds, more bandwidth, and lower latency" than landline broadband. more
It has become very clear once again: the domain industry won't stop. The scenario we know today is constantly changing, and our industry adapts to the changes taking place in society and the economy. Thanks to its versatility, the domain industry continues to amaze with some big changes year after year. This sector has its own peculiarities, rules, and opportunities for all stakeholders involved. more
Someone recently observed that many stakeholders have fallen victim to a "chilling effect" resulting from fear of retaliation by the rich and powerful bullies currently infecting the multistakeholder community, ICANN, and Internet governance. I related to what I was hearing because I've been personally targeted and libelously attacked and it is deeply dismaying enough having to worry about threats to revenue and reputation along with other harmful effects of such thuggery. more
When I was in the military, we were constantly drilled about the problem of Essential Elements of Friendly Information, or EEFIs. What are EEFis? If an adversary can cast a wide net of surveillance, they can often find multiple clues about what you are planning to do or who is making which decisions. For instance, if several people married to military members all make plans to be without their spouses for a long period of time, the adversary can be certain that a unit is about to be deployed. more
As I've pointed out in recent articles, the promises and obligations of the Memorandum of Understanding (MOU) are merged by direct reference into the InterNIC licensing agreement between the U.S. Department of Commerce and ICANN. This licensing agreement has been extended twice by mutual consent, most recently until January 2025. Therefore, the MOU's promises and obligations remain in effect through the InterNIC licensing agreement despite the fact that the MOU itself terminated in 2009. more
This post is a little more lighthearted than my normal blog posts. An article in FierceWireless caught my eye talking about how Nokia plans to establish a 4G network on the Moon. The primary purpose of the wireless technology will be to communicate between a base station and lunar rovers. 4G LTE is a mature and stable technology that can handle data transmission with ease... more
Back in the 1980s, everyone used the Lotus 1-2-3 spreadsheet on their PCs. In 1989, Borland released a competitor, Quattro Pro. It used the same menu commands as 1-2-3 so that users could import their 1-2-3 spreadsheets with keyboard macros. Lotus sued Borland, and after a loss in the district court, Borland won on appeal, arguing that the keyboard commands are a "method of operation" and not subject to copyright. Lotus appealed to the Supreme Court... more
With the end of March upon us already, we take a fresh look at .kpmg and its ongoing .brand usage strategy in our first quarterly report of the year. A review of Alexa.com rankings for .brands and other new gTLDs is included as well as an examination of the factors that have affected registration rates for new gTLD launches from 2019 and 2020. Our MarkMonitor team of experts also analyzes the ICANN Final Report on the new gTLD Subsequent Procedures Policy Development Process... more
In a recent article, Is ICANN Staff Misleading the Board Into Violating Obligations to the U.S. Government, I wrote: The referenced Memorandum of Understanding (MOU) is the vehicle by which the U.S. government delegates to ICANN the responsibilities for overseeing the technical management of the Internet's Domain Name System (DNS)... This is important for many reasons, and much remains to be analyzed for additional context that can help expose the rot at the Internet's root. more
Reading the White House $100 billion broadband plan was a bit eerie because it felt like I could have written it. The plan espouses the same policies that I've been recommending. This plan is 180 degrees different than the Congress plan that would fund broadband using a giant federal, and a series of state reverse auctions. The plan starts by citing the 1936 Rural Electrification Act, which brought electricity to nearly every home and farm in America. more
It appears people, governments, regulators and legislators worldwide may have forgotten Facebook's complicit involvement with Cambridge Analytica (CA). It is possible that new priorities such as the Covid-19 pandemic in 2020 may have pre-occupied them, and rightly so. But an unprecedented data breach in 2019 unfolded this weekend, bringing a recurring nightmare of the past back into today's reality. more
While Panels under the UDRP and judges under the ACPA draw upon a similar body of principles in determining infringement -- both mechanisms, after all, are crafted to combat cybersquatting -- and though arbitration panels and judges undoubtedly view alleged tortious wrongdoing by abusive registrations of domain names through similar lenses and apply laws that may be outwardly similar, each protective mechanism has developed its own distinct and separate jurisprudence. more
Recently, I had time to reflect on various matters after the alternator in my vehicle decided that the middle of a mountain pass was the appropriate time and place to go to that great big pick-and-pull scrapyard in the sky while leaving me stranded with no cell signal on the side of the road in the middle of nowhere. Until that point, I had been seriously considering applying to ICANN's Nominating Committee for one of the three open seats on ICANN's Board of Directors. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign