/ Most Viewed

Recent COPA Ruling Shedding Light on Usefulness of XXX as Voluntary Self Regulatory Vehicle?

ICM Registry applauds the decision yesterday of Judge Lowell Reed of the United States District Court for the Eastern District of Pennsylvania in ACLU v. Gonzales to permanently enjoin enforcement of the Child Online Protection Act ("COPA"). Praising Judge Reed's meticulously documented opinion, ICM Registry President Stuart Lawley said, "This continues the unbroken chain of court decisions in the U.S. upholding free expression on the Internet, and it underscores the superiority of voluntary measures that empower users to select content compared with government regulations." Lawley concluded, "Now, more than ever, it underscores the need for ICANN to approve the proposal for a voluntary .xxx domain as another alternative to government regulation." more

Policies to Promote Broadband Access in Developing Countries

In the 2014 Istanbul-Turkey IGF workshop on policies to promote broadband access in developing countries organised by Rui ZHONG of ISOC China, we realized that while technological solutions are advancing rapidly, policy and regulations remain a significant barrier to affordable internet especially in the developing world. According to a report by Alliance for Affordable Internet ( A4AI), the key to affordability is the policy and regulatory environment that shapes the different actors in the market. more

IP Address Reputation Primer

There has been a lot of recent discussions and questions about reputation, content and delivery of email. I started to answer some of them, and then realized there weren't any basic reference documents I could refer to when explaining the interaction. So I decided to write some. This post is about IP address reputation with some background on why IPs are so important and why ISPs focus so heavily on the sending IP. more

MarkMonitor Supports Brand Registry Group (BRG) Call for Preliminary Applicant Guidebook

During last week's ICANN71 Virtual Policy Forum, the Brand Registry Group (BRG) held a very informative session about how ICANN can help potential applicants prepare for the next new gTLD round. Speakers during the session provided historical perspective that applicant guidebooks have regularly evolved over time as a result of community review and feedback provided to ICANN, providing concrete examples of how the current applicant guidebook was developed. more

McAfee Labs 2018 Report Reveals 480 New Threats Per Minute, Sharp Increase in IoT-Focused Malware

In its latest quarterly report, McAfee Labs has reported seeing an average of 480 new threats per minute and a sharp increase in malware targeting IoT devices. more

Tony La Russa’s Legal Claims Against Twitter Look Tenuous

It was bound to happen of course - someone sued Twitter for not verifying a "celebrity" or brand account. Mashable reports on a lawsuit brought by Tony La Russa, who is apparently a manager for the St. Louis Cardinals baseball team. Mashable and others initially reported that La Russa and Twitter had resolved this one. It turns out they haven't after all. So what to make of Mr. La Russa's claims? more

What Do Bitcoin, Cloud Computing and the New gTLDs All Have in Common?

I am a student of life, learning one hard lesson at a time. In fact, I actually dropped out of my last year of college to start a tech company in a new space called the internet. I was an entrepreneur running an online service prior to the advent of the world wide web in 1992, back when Pine, Usenet, and Gopher ruled the information superhighway. Over the last 25 years, I have learned a great deal about technology adoption cycles by launching six internet companies, each at the forefront of a new technology wave. more

The Dark Internet

I consult on communication issues for Neustar, an Internet infrastructure company. As most CircleIDers know, Neustar works behind the scenes to ensure the smooth operation of many critical systems like DNS, .us and .biz, local number portability and digital rights management. One of the cool things about working for them is the chance to attend the events they sponsor. Last week Neustar held a security briefing for senior federal IT personnel focused on Cybersecurity and Domain Name System Security Extensions (DNSSEC)... more

ICANN at the Inflection Point: Implications and Effects Of the GAC Beijing Communique

Although this article was first published just a few days ago, on May 8th, there have been several important intervening developments. First, on May 10th ICANN released a News Alert on "NGPC Progress on GAC Advice" that provides a timetable for how the New gTLD program Committee will deal with the GAC Communique. Of particular note is that, as the last action in an initial phase consisting of "actions for soliciting input from Applicants and from the Community', the NGPC will begin to "Review and consider Applicant responses to GAC Advice and Public Comments on how Board should respond to GAC Advice... more

FCC Banning Wireless Devices that Interfere with White Spaces Spectrum

The Federal Communications Commission (FCC) has proposed a ban on some wireless microphones and other low-powered devices that operate in the 700-MHz band after the digital TV transition in February, next year. This is part of an attempt to clear any potential interference with the "white spaces" spectrum which will be fully available for "public safety as well as commercial wireless services". more

Internet Governance and the Universal Declaration of Human Rights, Part 8: Articles 22-25

This article is Part 8 of the series of articles discussing human rights in the digital age and published here on CircleID.2 When we commenced this analysis of the UDHR, and the relevance of its principles to our rights and duties within the Internet ecosystem, we committed ourselves to work through the UDHR one Article at a time. With this Part 8 we are four-fifths through that task. more

The WSIS Deal

There is considerable coverage this morning (or this evening in Tunis) on the last minute WSIS deal struck yesterday. The gist of the coverage rightly reports that the U.S. emerged with the compromise they were looking for as the delegates agreed to retain ICANN and the ultimate U.S. control that comes with it (note that there is a lot in the WSIS statement that may ultimately prove important but that is outside the Internet governance issue including the attention paid to cybercrime, spam, data protection, and e-commerce). This outcome begs the questions -- what happened? And, given the obvious global split leading up to Tunis, what changed to facilitate this deal? more

New gTLDs and Their Hidden Costs: Part 2

In my last post I discussed some questions that remain about ICANN's generic Top-level Domain (gTLD) budget. Today I discuss the rights protections mechanisms as they currently appear. An economic study commissioned ICANN to analyze the new gTLD process recently concluded that "the biggest likely costs" of approving new gTLDs are "consumer confusion and trademark protection." more

Sailing Backwards: WSIS 10+ Avoids Entering Uncharted Territory

Early August 2014 the UN General Assembly agreed on the procedures how to review the results of the UN World Summit on the Information Society (WSIS) from 2005. According to the draft resolution, the WSIS 10+ event will be a high level intergovernmental meeting in New York in December 2015. This meeting will adopt an "intergovernmental agreed outcome document"... The outcome document will be negotiated by governments in an "intergovernmental negotiation process". Non-governmental stakeholders from the private sector, civil society and technical community will be invited for "informal interactive consultation" in a parallel process. Wait a minute? What are "informal interactive consultations" in a parallel process? more

Slippery Territory: IOC and Red Cross in the New gTLD Program

We know from life: There is no rule without exception. The problem is, exceptions create space for interpretations and have the risk to undermine the rule. Take Article 19 of the International Covenant on Political and Civil Rights from 1966. Article 19, paragraphs 1 and 2 define the individual right to freedom of expression. Paragraph 3 adds some exceptions where this right can be restricted to protect, inter alia, national security and public order. This is an understandable justification for a restriction, but it opens the door for misuse... more