ICM Registry applauds the decision yesterday of Judge Lowell Reed of the United States District Court for the Eastern District of Pennsylvania in ACLU v. Gonzales to permanently enjoin enforcement of the Child Online Protection Act ("COPA"). Praising Judge Reed's meticulously documented opinion, ICM Registry President Stuart Lawley said, "This continues the unbroken chain of court decisions in the U.S. upholding free expression on the Internet, and it underscores the superiority of voluntary measures that empower users to select content compared with government regulations." Lawley concluded, "Now, more than ever, it underscores the need for ICANN to approve the proposal for a voluntary .xxx domain as another alternative to government regulation." more
The FCC has long battled for a more efficient deployment of unused spectrum, endeavouring to adapt rules governing 'white space' TV spectrum (largely gifted to broadcasters years ago, and generally in the 700MHz band) to newly released spectrum (in the 600MHz band). This will considerably improve wireless broadband coverage where it is needed most... Certainly, in the US's disjointed broadband sector there are considerable challenges ahead... more
I consult on communication issues for Neustar, an Internet infrastructure company. As most CircleIDers know, Neustar works behind the scenes to ensure the smooth operation of many critical systems like DNS, .us and .biz, local number portability and digital rights management. One of the cool things about working for them is the chance to attend the events they sponsor. Last week Neustar held a security briefing for senior federal IT personnel focused on Cybersecurity and Domain Name System Security Extensions (DNSSEC)... more
We know from life: There is no rule without exception. The problem is, exceptions create space for interpretations and have the risk to undermine the rule. Take Article 19 of the International Covenant on Political and Civil Rights from 1966. Article 19, paragraphs 1 and 2 define the individual right to freedom of expression. Paragraph 3 adds some exceptions where this right can be restricted to protect, inter alia, national security and public order. This is an understandable justification for a restriction, but it opens the door for misuse... more
Avivah Litan, the storied Gartner analyst, laid it down succinctly for insiders in her blog two and one-half years ago. She said, "Web 3.0 will transform us from Web 2.0's monetization via surveillance capitalism and advertising to monetization built directly into the protocol that is equally available to any connected user." Translated, that means we'll control our destiny by owning and managing our credentials for logging into systems, content, financial resources, and, importantly, our data. And, we are told, blockchain technology will enable all that. more
The early designers of the Internet quickly realized that as the number of domain names flourished, there was a need for tracking domain name owners to resolve questions and conflicts that might arise. To that end, they created WHOIS, a public database with the names, phone numbers, email addresses, and mailing addresses of registered domain owners and operators. more
An arbitration panel of the World Intellectual Property Organization has decided 2-1 in favor of Complainant Boca Raton Resort & Club in an action under the Uniform Domain Name Dispute Resolution Policy over the domain name bocaresorts.com. ...The Presiding Panelist, Dennis Foster, disagreed with the majority's conclusion, and issued a dissent that addressed the issue of bad faith. Foster asserted that the Respondent was "entitled to believe that the phrase 'Boca Resorts' is geographically descriptive and means resorts in the city of Boca Raton, Florida... more
Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen. In many cases, they have them come forth repeatedly over the next few weeks, or even months revising the estimated number of impacted customers. To date, I don't think any have ever lowered those numbers. ...Let's consider two events that didn't make the front page of C|Net or CNN. more
The sky is falling! The sky is falling! ...or is it? What is this thing called "pharming"? Put simply, it's redirection of web traffic, so that the server you think you're talking to actually belongs to a criminal. For example: you think you're talking to www.examplebank.com because it says so in the browser's address bar, but actually you're connected to www.mafia-R-us.ru. This can happen in three main ways: 1. DNS Hijack: a social engineering attack on the Internet infrastructure... more
It was bound to happen of course - someone sued Twitter for not verifying a "celebrity" or brand account. Mashable reports on a lawsuit brought by Tony La Russa, who is apparently a manager for the St. Louis Cardinals baseball team. Mashable and others initially reported that La Russa and Twitter had resolved this one. It turns out they haven't after all. So what to make of Mr. La Russa's claims? more
Declan McCullagh recently opined that the "FBI [and the] DEA warn [that] IPv6 could shield criminals from police." His post was picked-up relatively widely in the past few days, with the headlines adding more hyperbole along the way. So just how real is this threat? Let's take a look. more
In a striking admonition issued on August 21st, Andrew Ferguson, chairman of the Federal Trade Commission (FTC), cautioned over a dozen major technology firms against bowing to foreign demands that compromise American users' data security or freedom of speech. more
Sun, surf, and ... service operators? It's a match made in heaven! The Caribbean cable and telecommunications industry may not be large, but it is an important and fast-growing region. The recent Caribbean Cable & Telecommunications Association (CCTA) Annual Meeting in Puerto Rico threw the spotlight on this slice of paradise and I was there to catch up on some of the trends emerging for the year ahead. more
The bulk of corporate domain portfolios largely consist of defensive registrations which often include common misspellings, product names, and abbreviations in countries where they may not even be doing business. More than ever, with the launch of new generic Top-Level Domains (gTLDs) expected to occur next year, companies are now taking a hard look at their defensive holdings and asking themselves whether or not they really need all of these registrations. more
Although this article was first published just a few days ago, on May 8th, there have been several important intervening developments. First, on May 10th ICANN released a News Alert on "NGPC Progress on GAC Advice" that provides a timetable for how the New gTLD program Committee will deal with the GAC Communique. Of particular note is that, as the last action in an initial phase consisting of "actions for soliciting input from Applicants and from the Community', the NGPC will begin to "Review and consider Applicant responses to GAC Advice and Public Comments on how Board should respond to GAC Advice... more