In the sci-fi movie Minority Report, a 'precrime' police unit relies on the visions of psychics to predict future crimes, then arrests the potential perpetrators before they do anything wrong. In the world of Internet governance, the future is now, as regulators want online services to predict and prevent safety threats before they actually occur. more
A Chinese state-backed company has successfully launched its first 18 satellites, marking the initial phase of a significant project to establish a vast orbital network intended to compete with Starlink, according to The China Securities Journal. more
As I keep pointing out -- there is indeed a viable alternative of a real marketplace not a fake one. Today's system is a fake because it depends on capturing the value of the application - communications - in the transport and that is no longer possible because with the Internet the value is created OUTSIDE the network. One example of the collateral damage caused by today's approach is the utter lack of simple wireless connectivity. Another is that we have redundant capital intensive bit paths whose only purpose is to contain bits within billing paths. more
From the beginning, the Internet has been viewed as something special and "unique." For example, in 1996, a judge called the Internet "a unique and wholly new medium of worldwide human communication." The Internet's perceived novelty has prompted regulators to engage in "Internet exceptionalism," crafting Internet-specific laws that diverge from regulatory precedents in other media. Internet exceptionalism has come in three distinct waves... more
In early November 2013, prior to ICANN's Buenos Aires meeting, I published an article at this forum, Policy Advisory Boards – A Cornerstone PICS (Public Interest Commitment Specification), that extoled the advantages of adopting a Policy Advisory Board (PAB) model as a practical, effective, and least burdensome means of effectively implementing the request of ICANN's Governmental Advisory Committee (GAC) for consumer and competitive safeguards at sensitive new gTLD "strings" - especially those that are related to regulated industries and professions. It is deeply gratifying that the article has received nearly 9,000 views since first being posted and inspired considerable discussion. more
On 31 May 2016, The Commission together with Facebook, Twitter, YouTube and Microsoft unveiled a code of conduct that includes a series of commitments to combat the spread of illegal hate speech online in Europe. These IT Companies support the European Commission and EU Member States in the effort to respond to the challenge of ensuring that online platforms do not offer opportunities for illegal online hate speech to spread virally. more
China's central bank is a step closer to becoming the world's first major monetary authority to issue its own digital tender. The People's Bank of China will conduct internal tests for the central bank's digital currency (CBDC) across four cities (Shenzhen, Suzhou, Xiong'An and Chengdu), according to a statement issued by the bank on Friday. more
Over the weekend, ICANN's Board of Directors met in Norway to discuss the fate of new generic Top-Level Domains (gTLDs). As a result of the meeting, two resolutions were passed related to new gTLDs. First, the Board resolved to recommend further actions based on comments recently submitted by the Governmental Advisory Committee. The second resolution directed the ICANN CEO to incorporate a number of items into the fifth version of the Guidebook including... more
As a member of ICANN's Business Constituency I have heard first-hand the perfectly appropriate criticisms from trademark holders of ICANN's roll-out of new generic Top-Level Domains (gTLDs). But while it may be OK for branded companies to wish they didn't have to deal with the matter, the dust that has been kicked up has obscured real value in the program. more
In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures, I highlighted the importance of applying multiple layers of defense to secure these business-critical assets. Last Friday, Brian Krebs, the world-renowned cybersecurity journalist, reiterated the criticality of domain name security because the domain name "e-hawk.net" was stolen from the rightful owner using social engineering tactics targeting its domain name registrar. more
There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more
31 August 2013 marked a historic day for Internet users worldwide. It marked a very key day in the introduction of new gTLDs. On that day ICANN, who oversees the gTLD programme, six years in the making, announced the completion of gTLD Initial Evaluation (IE) results based applicant's ability to demonstrate their financial, technical and operational capability to operate and manage a TLD Registry. more
We're in an interregnum where society has paused, and there's no telling how things may turn. In such times of crisis, we are the explorer; exploring the uncharted waters of change, where dangers and opportunities lie. How the pandemic caused this greater societal change may not be something that an individual can alter, we may, however, take the helm and navigate. more
Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more
The latest Sophos Threat Report shows an upward trend in spam and identity theft through social networks. One of the examples Sophos gives is Facebook. In general Sophos claims that from 2009 to 2010 the spam, phishing and malware containing messages all doubled. more