The Federal Communications Commission yesterday released a Report and Order in the matter of its implementation of Ray Baum's Act Section 503 and international call spoofing. The FCC mostly did the right things in the R&O except in one rather extraordinary assertion of legal ignorance and bravado. It asserted unilaterally that it could exercise "extraterritorial jurisdiction that Congress expressly provided in section 503 of the Ray Baum's Act," and it furthermore knew of no "treaty obligation [contravened],...nor other legal barrier...and...are aware of none." more
I saw a poster on the London Underground yesterday, and as is often the case it got me thinking about the parallels with telecoms. The poster explains the peak and off-peak fare structure for tube travel. The purpose of this pricing system is to manage the relationship between supply and demand in a system that is capacity constrained. Over short and medium timescales the supply is essentially fixed, and demand can oversaturate that supply. more
In August of last year I wrote in a blog about the importance of cryptech to wide-scale trust in the Internet. For those who don't know about it, http://cryptech.is is a project aiming to design and deploy an openly developed, trustable Hardware Security Module (HSM) which can act both as a keystore (holding your secrets and keeping them private) and as a signing engine. more
The .emarat Arabic script Internationalised Domain Name (IDN) ccTLD for the United Arab Emirates has been entered into the DNS Root Zone and is therefore now resolving. This is a truly historic moment in the development of the Internet in the United Arab Emirates and the wider Arabic-speaking world as it removes the last hurdle preventing people without English-language skills from enjoying the full benefits that the Internet has to offer. more
Despite global polarization, recent UN cyber diplomacy has achieved three significant agreements in 2024: a cyber attack reporting system, a convention against cybercrime, and a "Global Digital Compact." These successes show that consensus on global issues is possible, though the vague wording of agreements raises concerns about their long-term effectiveness in ensuring security and peace. more
OpenVault Just released its Broadband Industry Report for 4Q 2019 that tracks the way that the US consumes data. The results of the reports are as eye-opening as OpenVault reports for the last few years. OpenVault has been collecting broadband usage for more than ten years. As usual, the OpenVault statistics are a wake-up cry for the industry. more
The pace of generative AI development has been astonishing to the degree that the normative space has been unable to keep up. As governments start looking into some implementations of the technology, such as ChatGPT, more advanced techniques and products continue to emerge by the day. Society is changing in irrevocable ways, and it is paramount that the Internet Governance community turns its attention to this question. more
How much visibility do you have over service activation processes? For many service providers, the answer to that question is bleak. The sad truth is that visibility over service activation processes, including errors and misconfigurations, is lacking in many Tier 3, Tier 2, and even Tier 1 organizations. Today's operators often turn to multiple siloed systems when attempting to ensure that services are activated accurately, on time, and are working as promised. more
A fresh & transparent, community-led, bottom-up, public debate has now become unavoidable and undeferrable. "....we need limited and smart regulation" were the clear and unambiguous words of UN Secretary-General Antonio Guterres at the launch of the final report of his UN Panel on Digital Cooperation last week in New York. Last November, I wrote about President Macron throwing down the gauntlet at UN IGF Paris challenging IGF and Multistakeholderism to become more relevant. more
At NANOG on the Road (NotR) in September of 2018, I participated in a panel on BGP security -- specifically the deployment of Route Origin Authentication (ROA), with some hints and overtones of path validation by carrying signatures in BGP updates (BGPsec). This is an area I have been working in for... 20 years? ... at this point, so I have seen the argument develop across these years many times, and in many ways. more
Previously, I've written about how the success of the MVNO (though not without its problems) demonstrates how an Open Access-like business model can work in a wireless context. The underlying carrier, such as Sprint or Verizon, can sell access to its network at wholesale rates to a company like Virgin Mobile, which then markets to consumers. This model can be and is a success both for the retailer and the wholesaler. MVNOs are not perfect. more
As Chairs of ICANN's Registries and Registrar Stakeholder Groups, we are proud to announce that we have initiated a new practice for the Contracted Parties Summits: the publication of our Contracted Parties Summit Statement. As you may (or may not) know, Contracted Parties get together periodically to interact and work together on issues that we care about, and which impact our businesses as registries and registrars. more
Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more
For generations, large pockets of Africa were isolated from things many of us take for granted: access to medical treatment and advances that can make the difference between a healthy, productive life or debilitating illness -- or even an early death. These problems still persist, but over the last two decades technology has helped break through and enable medical professionals to reach the poorest and most remote populations and offer some hope. more
"Money is like muck, not good except it be spread", according to English philosopher Francis Bacon. In these times when everyone is busy with the big questions surrounding the IANA transition and ICANN accountability, I thought we could quickly solve some simple questions. One of them is: What should ICANN do with all that money? What money, you might ask? more
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API