Tom Wheeler, the new Chairman of the Federal Communications Commission, gave a speech today at Ohio State University. It was a good speech on his regulatory philosophy. But that's not so interesting. There's nothing out of the ordinary about a government official giving a speech. The unusual development was that the Chairman also released an ebook, called Net Effects. Even more unusual, it's not a bland ghostwritten policy whitepaper; it's a deeply researched work of history. more
I recently had the opportunity to speak on a podcast with Dave Bittner at CyberWire to discuss how .AI is giving cybercriminals a new avenue to take advantage of some of the largest companies in the world based on research findings from CSC's 2023 Domain Security Report. Below is a summary of the key points discussed during this podcast. more
The 2010's have been nothing short of transformative in the broadband space. Despite disappointing deployment rates across the U.S., the past decade has been a period of exponential change and innovation. As we look toward the new decade, here are five key predictions based on current trends and developments in the broadband industry. more
Users of LinkedIn were unable to access the site for several hours due to what the company has reported to have been a DNS issue. The site is claimed to have been accidentally pointed to a domain name parking page and some users were greeted with a domain for sale page when trying to access LinkedIn's homepage. According to downrightnow, LinkedIn's outage began around 6 pm PST on Wednesday and is continuing, though website has gradually resumed for some users. more
For most of this year governments from outside the G8 have not wavered from their essential themes on the Internet: they regard it as a shared resource that works in part as a result of their own investment in infrastructure, they want to be included in its governance through a decision-making process that is transparent, accessible and, in broad character, multilateral, and they want to be able to trust it and know that as much as it is a tool of growth for others, it can also be for them. more
The only Cyber law passed in Pakistan till date is the famous ETO-2002 (Electronic Transaction Ordinance - 2002). It required Ministry of IT&T to set up a Central Repository for all digital certificates and in addition to set up a body to be named as Electronic Certification Accreditation Council (ECAC) to accredit Electronic Certification Authorities to be established in the country... In this regard, government has not only closed its eyes and has blindly trusted the only certificate authority (CA) in the country operated by a private business group, it has also mandated the citizens and business to trust it. Case in point is Central Board of Revenue (CBR) that has told all taxpayers to digitally sign the emails using the certificates issued by this private party... more
As artificial intelligence integrates into public infrastructure, it introduces new layers of systemic risk. Policymakers must shift focus from AI's potential to its exposure, applying governance models that reflect these emerging, compound vulnerabilities. more
According to the official news agency, Xinhua, implementation of China's controversial Cybersecurity Law will begin on June 1, requiring strict data surveillance and storage for companies operating in the county. more
The .ORG sale has placed Maureen Hilyard – ICANN's At-large Chair – squarely between the largest outpouring of individual user sentiment that the Internet community has ever seen, and the people who can do something about it. For At-large, the stakes are high. ICANN has spent years building up a user organization to balance corporate and government interests. At-large could be a key bulwark against the capture of Internet resources by those with capital and political power. more
In the absence of data on renewals and deletions which are yet to happen, it can be enlightening to compare the domain names from the zone files of a year ago to the domain names in the current zones. The first group is the legacy gTLDs. The "Retained" domain names are those still in the December 2019 zone files. The "Deleted" domain names are those which are no longer in the current zones. Some of the retained domain names may have been reregistered, but these are not renewals charts. more
Last Thursday, during VeriSign's Q3 2019 quarterly earnings call, CEO Jim Bidzos offered statements that seemed to be carefully calibrated to satisfy Wall Street's curiosity about protracted negotiations with ICANN on a Third Amendment to the .com Registry Agreement while also appearing to distance the company from the soon-to-be forthcoming product of that year-long effort. more
In the last few weeks courts in the USA have carried on business as usual. They continue to provide the two major telcos in the USA, Verizon and AT&T, with extraordinary protection -- basically retaining the outdated regulatory system in the USA that identifies the duopoly between the telcos and the cablecos as the best way forward for the development of telecoms competition in this country. This is rather different from the position taken by the new Obama Administration, which has indicated that it will break with past regulations... more
More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows," reports Brian Krebs. more
Facebook's Internet.org has launched a free Internet application in Colombia as part of a drive to bring developing markets online. Colombia is the first nation in Latin America and the fourth in the world to receive the new Internet.org service, in partnership with local mobile phone provider Tigo, but the aim is to push the app globally. The mobile app, aimed at low income and rural users, offers more than a dozen tools via the Android operating system... more
In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more