/ Most Viewed

When a UDRP Panel Infers Bad Faith from An Asking Price

In the Converse.co dispute, a three-member UDRP panel unanimously ordered the transfer of the disputed domain name to the Complainants, All Star C.V. and Converse, Inc., owners of the well-known brand CONVERSE for shoes and apparel. The panel drew the inference that the Respondent, by setting of an asking price of around $300,000 after having acquired the domain name for $306, was primarily motivated by a bad faith intent to target the Complaint. more

The Future of Cyber Warfare

Every now and then I get emails from readers of my blog. I mostly reply to them in private, but I recently got one question where I thought my reply might be of general interest. I took the liberty of editing the question somewhat, but in essence it was: "If you have any insight you can share with my class on cyber warfare and security, I would be delighted on hearing it." In general, I think that it's an obvious conclusion that both offensive and defensive actions with regard to national telecommunications infrastructure is becoming an integral part of a nations security assessments.... more

ICANN Drifting Toward Online Content Regulation, Says Law Professor

In a paper for the Washington & Lee Law Review, University of Idaho College of Law Professor Annemarie Bridy, depicts ICANN's ambivalent drift into online content regulation through its contractual facilitation of a "trusted notifier" copyright enforcement program between the Motion Picture Association of America (MPAA) and two registry operators for new gTLDs, Seattle-based Donuts and Abu Dhabi-based Radix. more

FttH Is Not About High-Speed Internet Access - It Is About the Internet of Things

The future of our communications infrastructure will to a very large extent be based on the Internet of Things (IoT). What this means is that hundreds of millions of devices will be connected to the national broadband networks (NBN), gathering massive amounts of information and providing feedback in real time. In any single country, the electricity grid alone will have tens of millions of sensors and devices connected to deliver the energy efficiencies that we all so desperately need. more

The Limits of Notice and Takedown

In The Limits of Filtering, Evan Engstrom and Nick Feamster argue eloquently that the costs of a "takedown-staydown" system to defend against copyright infringement would be prohibitive for online service providers (OSPs) and therefore deprive OSPs of otherwise interested investors. I agree that Engstrom and Feamster raise some valid points, particularly including that content recognition technologies are not perfect... However, we must also remember that the current DMCA regime imposes significant costs... more

Tom Wheeler Announces Resignation as FCC Chairman

Federal Communications Commission Chairman Tom Wheeler has announced he will leave the agency on January 20, the day of President-elect Donald Trump's inauguration. more

Russian Security Firm Kaspersky Announces Its Own Secure OS, 14 Years in the Making

"I've anticipated this day for ages -- the day when the first commercially available mass market hardware device based on our own secure operating system landed on my desk," writes Eugene Kaspersky, Chairman and CEO of Kaspersky Lab, in a blog post introducing company's layer 3 switch powered by Kaspersky OS. more

Top Five Recommendations for IoT Policymakers from ITAC Industry Participants

As the Department of Commerce considers a policy role for the U.S. government in the Internet of Things (IoT), the Department of State is studying a dynamic and evolving international environment around IoT, including technical, commercial, and economic issues. Governments and intergovernmental organizations across the world are waking up to the potential of IoT, and some are looking to move quickly in a nascent landscape to establish themselves as leaders for IoT globally. In the process, few are reaching out to industry. more

Prediction Methods for Crime

There's a new sheriff in town and he's riding the horse of "predictive policing". Back in July the Santa Cruz Police Department began deploying police officers to places where crime is likely to occur in the future -- making use of new predictive modeling programs that are designed to provide daily forecasts of crime hotspots -- thereby allowing the Department to preempt more serious crimes before they occurred. In essence, this is another physical-world application of machine learning and clustering technologies -- applied to preempting a criminal problem. In the cyber-world we've been applying these techniques for a number of years with great success. more

ANA “Vigorously” Opposes Implementation of ICANN’s New gTLD Program, Citing Major Flaws

In a letter to Mr. Rod Beckstrom, President, Internet Corporation for Assigned Names and Numbers (ICANN), the Association of National Advertisers (ANA) has expressed major flaws in ICANN's program for introducing new generic Top-Level Domains. A program which ANA warns would allow as many as 1,000 new Top-Level Domains in the first year and the same cap every year thereafter. more

Decision Day for ICANN: The End of the Beginning, or the Beginning of the End?

I've just arrived in Singapore, where ICANN's board will almost surely vote to launch an unprecedented expansion plan for generic top-level domains (gTLDs). As the new gTLDs start lighting-up over the next two years, we'll look back on this week as the "end of the beginning" since it ended several years of planning for the actual expansion. After the vote the real work begins: evaluating applications, implementing new mechanisms, and contract compliance on a scale far greater than ICANN has ever seen. more

An Investigative Analysis of the Silent Librarian IoCs

The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the group's phishing campaigns that aim to steal research data and intellectual property could have a high success rate. Dozens of phishing domain names have been reported, although some may have already been taken down. more

Obama’s Broadband Plan Will Fail

We stand by our analysis from March 2010, in which we indicated that a national wireless broadband plan remains a second-class option as the infrastructure for the emerging digital economy in America. In his State of the Union address President Obama set the goal of enabling businesses to provide high-speed wireless services to at least 98% of all Americans within five years. To pay for this the government hopes to raise nearly $28 billion from spectrum auctions. more

France Proposes Internet Tax - An Old War resurfacing

France is proposing an Internet Tax which was reported in the New York Times. The proposal if it follows through will affect the landscape of internet governance in days ahead. The Actual Report was commissioned by President François Hollande, which described various measures his government was taking to address what the French see as tax avoidance by Internet companies like Google, Amazon and Facebook. more

Internet Connectivity: Toward a Sustainable Funding Model

I'm writing this in the midst of policy discussions between the Internet world (as embodied in ISOC) and the Telecommunications industry (ITU). The Internet and Telecommunications are very different concepts. The Internet allows us to focus on the task at hand. That's why it is so exciting. Historically telecommunication assumed value was created inside the network and this creates conflict with creating value outside the network. more