/ Most Viewed

Restraining Order Filed by US States’ Attorneys in the Final Hours of IANA Transition

With less than 24 hours to go before the historic contractual relationship between the US government and ICANN is set to expire, a motion hearing is expected to be held today based on a lawsuit filed in federal court in Texas by four states' attorneys general which could lead to NTIA facing the possibility of a temporary injunction. more

China Sets Up $14.6 Billion Internet Investment Fund

China's government has established a 100 billion yuan (US$14.5 billion) state fund to invest, nurture and support internet companies and spearhead the country's technological innovations and economic transformation into the so-called 'Internet Plus' era. more

How Can WCIT Assist in Connecting the Rest of the World?

A key element of the World Conference on International Telecommunications (WCIT) is to connect the people around the world who are not yet connected. These are people in developing economies, but also people in rural areas within developed economies, as well as the 650 million people with disabilities. The question is whether the International Telecommunications Regulations (ITRs) that are being discussed at WCIT can assist in this. If we go back to 1988, when the current ITRs were first established, the focus was on access and interoperability. more

Chinese APT Groups Exploit Global Domains in Sweeping Cyber Campaign

A years-long cyberespionage campaign by a Chinese state-sponsored group known as Salt Typhoon has revealed a striking escalation in both scale and technical sophistication. more

“Restoring” Internet Freedom for Whom?

Recently, a colleague in the Bellisario College of Communications asked me who gets a freedom boost from the FCC's upcoming dismantling of network neutrality safeguards. He noted that Chairman Pai made sure that the title of the FCC's Notice of Proposed Rulemaking is: Restoring Internet Freedom. My colleague wanted to know whose freedom the FCC previously subverted and how removing consumer safeguards promotes freedom. more

Assigning 32-bit ASNs

With 16-bit Autonomous System Numbers (ASNs), 65,536 unique numbers are possible. Just like 32-bit IP addresses, these 16-bit ASNs are becoming a scarce resource. Therefore, in 2007 the Internet Engineering Task Force (IETF) developed a new format, 32-bit ASNs (RFC 4893), which increases the supply of ASNs to four billion. more

Better Protection of Essential Power and Communication Grids From Storm Damage

After every major hurricane, like the category 4 Ida that recently hit Louisiana, there is talk in the telecom and power industries about better protecting our essential power and communication grids. There was major damage to grids and networks in Louisiana from hurricane winds and storm surges and massive flooding in the mid-Atlantic from Western Maryland to New York City. One thing that we've learned over time is that there is no way to stop storm damage. more

Corporate TLDs - Why Keeping Mum Seems to Be the Order of the Day

Global brand protection powerhouse MarkMonitor recently released survey results revealing the intentions of their corporate clients with respects to new gTLDs. After reading the report, it's fair to say that I'm not surprised by the results, but continue to be frustrated by them. Where are all of these forward thinking and revolutionary online marketers and brand managers? Are they so unaware of the opportunity that has been placed before them or are they just being very savvy? more

President Díaz-Canel, Cuban Internet Is More Than Facebook on Cell Phones – Don’t Be Afraid of It

As a result of Internet service interruption during the recent anti-government protests in Cuba, Florida Senator Rubio and Governor DeSantis and President Biden have called for measures to strengthen and guarantee Cuban Internet connectivity, but that won't happen until the Cuban government recognizes that doing so is in its long-run interest. I have seen several suggestions that we smuggle end-user satellite terminals from services like SpaceX Starlink into Cuba but attempts to... more

US, European Consumer Groups Call on FTC to Investigate Google for Deceptive Tracking of Users

Over 75 consumer groups in U.S. and Europe have asked the US Federal Trade Commission (FTC) to investigate Google for unfairly and deceptively manipulating users of mobile phones with its Android operating system by constantly tracking location. A letter sent to the FTC by the Transatlantic Consumer Dialogue (TACD), a forum of US and EU consumer organizations, says Google manipulates users into constant location tracking. more

UDRP and the ACPA Differences, Advantages and Their Inconveniences

The ACPA and the UDRP provide two separate and distinct methods for resolving domain name disputes. Both alternatives have many critics and proponents, but the true value of each will ultimately be determined by how well each combats cyber-squatting. Separately, the UDRP and the ACPA will probably work well to defuse most of the cyber-squatting that is currently invading the Internet. If combined together the UDRP and the ACPA can be a cost saving and effective way to prevent cybersquatting... more

Thinking Carefully About New gTLD Objections: String Confusion (Part 1 of 4)

Since speaking last fall on community-based TLDs at the New gTLD Summit in Los Angeles, I have been asked a number of times to provide input on the objections ICANN allows in its New gTLD Applicant Guidebook ("AGB" or simply the "Guidebook"). As the March 13 deadline approaches, I now present the first of a series of four spotlight articles on the subject -- one on each of the four permissible grounds for objection. more

NJ Man Arrested for Domain Name Theft and Sale on eBay

A man from the northern New Jersey area was charged and arrested for stealing a domain name belonging to the owners of P2P.com. According to reports, he allegedly transferred the ownership of the domain name to himself and succeeded in reselling it on eBay to a professional basketball player Mark Madsen of the Los Angeles Clippers. more

Battling Over Clouds

More than 40 years ago, the FCC was worried about telephone companies using their power over communications to control the then-nascent (and competitive) data processing marketplace. The Bell System at that point was already banned from providing services that weren't common carriage communications services (or "incidental to" those communications services)... In a 1999 article in the Texas Law Review, Steve Bickerstaff pointed out that Computer 1 meant that no one could provide a "computer utility" service... Today, we'd call the "computer utility" something different -- we'd use the term "cloud computing." more

Is 47 USC 230(c) an Immunity or an Affirmative Defense (Does it Matter?)

Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more