A just-launched ICANN "working group" (of which I am a member) will - eventually - help to determine the future of the Uniform Domain Name Dispute Resolution Policy (UDRP), the 17-year-old domain name arbitration system that has been embraced by trademark owners and criticized by some domainers; as well as the Uniform Rapid Suspension System (URS), the new (and limited) arbitration process that applies to the new gTLDs. more
Cybercriminals are continuing to exploit human nature and relying on familiar attack patterns such as phishing, and increase their reliance on ransomware, where data is encrypted and a ransom is demanded, according to Verizon 2016 Data Breach Investigations Report released today. more
The problem today is bureaucracy and its companions - fear of competition, change and stepping out of line. Cuba connected to the Internet in 1996, but three factors stifled the Cuban Net: the US embargo, economic depression during what the Cubans call the "special period" after the disintegration of the Soviet Union and the Cuban government's fear of free information, which was also fed in part by the Soviet collapse. more
As I pointed out in last week's essay, having trademark rights that come into existence later than registrations of corresponding domain names only gets complainants to first base; they have standing but no actionable claim. I also noted a nuance (not a difference in substance) in standing requirements between the Uniform Dispute Resolution Policy (UDRP) and the Anti-Cybersquatting Consumer Protection Act (ACPA). However, standing depends upon the specific facts of the case... more
I believe and strongly support Internet Principle and Right Coalition (IPRC) Charter is an important edition of document supplementing the principles and rights of individual internet users in any developing and least developed country. Especially in Asia Pacific region where the need and use of such document is immense, as there is a gap in recognition and awareness of rights of internet users. more
Do you live in the Asia-Pacific region and are interested in accelerating the deployment of key technologies such as IPv6, DNSSEC, TLS or secure routing mechanisms? If so, my Internet Society colleagues involved with the Deploy360 Programme are seeking a "Technical Engagement Manager" based somewhere in the AP region. Find out more information about the position, the requirements and the process for applying. more
European commission has taken a preliminary view that Google abused its mobile operating system's dominant position, following an initial one-year investigation. "What we found is that Google pursues an overall strategy on mobile devices to protect and expand its dominant position in internet search," says Margrethe Vestager, the EU competition chief. more
One of the discussions I am currently having with my international colleagues is about the global trend towards urbanisation and the resulting shift of political, economic and financial powers from centralised states and federal structures to mega-city or mega-urban region centres. Some of my American colleagues expressed the fear that this would further marginalise rural communication. more
In October 2012, the Chairman and Ranking Member of the House Intelligence Committee issued a joint statement warning American companies that were doing business with the large Chinese telecommunications companies Huawei and ZTE to "use another vendor." The bipartisan statement explains that the Intelligence Committee's Report, "highlights the interconnectivity of U.S. critical infrastructure systems and warns of the heightened threat of cyber espionage and predatory disruption or destruction of U.S. networks if telecommunications networks are built by companies with known ties to the Chinese state, a country known to aggressively steal valuable trade secrets and other sensitive data from American companies." more
According to the latest computer and Internet use data released by NTIA, Americans as a whole are becoming less likely to have residential broadband. NTIA's Chief Economist, Giulia McHenry, in blogs post today wrote: "Americans’ rapid move toward mobile Internet service appears to be coming at the expense of home broadband connections." more
Fred Campbell reporting in The Hill writes: "It's no secret that controversy has plagued the Obama Administration's plan to surrender U.S. oversight of the Internet domain naming and numbering systems from the current U.S.-based ICANN to the 'global multistakeholder community.' But the reason the Federal Communications Commission (FCC) declined to exercise its statutory jurisdiction over Internet numbering inside the United States was indeed secret until Senator Ted Cruz forced the FCC to explain itself." more
Speaking during a discussion on innovation hosted by Reuters in Washington, Bill Gates said that no one was an "absolutist" on either side of the digital privacy debate but that he supports Microsoft's lawsuit against the U.S. government seeking the freedom to tell customers when federal agencies have sought their data. more
There are two essential differences between the Uniform Dispute Resolution Policy (UDRP) and the Anti-Cybersquatting Consumer Protection Act (ACPA), one procedural and one substantive. The procedural difference is quite minor, a mere quirk that Panels adopted by consensus in the early days of the UDRP and deserves no more than a footnote. Under the UDRP, complainants have standing on proof that they have trademark rights when they file their complaints... more
The Fund for Internet Research and Education - FIRE - is an initiative of AFRINIC that gives Grants and Awards to outstanding projects that use the Internet to provide innovative solutions to Africa's unique education, information, infrastructure, and communication needs. FIRE Africa is part of an initiative called The Seed Alliance that has LACNIC's FRIDA Program, APNIC's ISIF.Asia program, and the Internet Society as members. more
We recently received an email from a customer asking about hybrid DDoS mitigation and its ability to stop large application layer attacks. Here's the truth: Hybrid DDoS mitigation works and can stop large application layer attacks. Hybrid DDoS mitigation typically involves a purpose-built DDoS mitigation appliance or software on dedicated hardware that sits immediately in front of or behind an enterprise's edge router. more