On July 2, 2002, Damien Cave published an interview on Salon.com with John Gilmore, "original 'cypherpunk' and all-around Internet supergeek," titled "It's time for ICANN to go." In this wide-ranging interview, Gilmore -- an early employee of Sun Microsystems who also co-founded Cygnus Software (acquired by Red Hat) and was an early supporter of the Electronic Frontier Foundation and the Internet Society (ISOC) -- offered blunt insight and eye-opening historical detail... more
ICANN's batching program, called digital archery, is deeply flawed and should be abandoned before it causes havoc with the new gTLD program. As well as arbitrarily creating winners and losers, creating unfair advantages for certain types of applicants and for certain regions, the program may be suffering from another software "glitch" of the kind that damaged the application process. There is a much better solution: a single batch for all applications. more
Confusion is a basic element in both cybersquatting and trademark infringement. It appears twice in the UDRP; once in paragraph 4(a)(i) in the adjectival phrase "confusing similarity", and once in paragraph 4(b)(iv) in the phrase "likelihood of confusion." Each use of the distinctive phrases is directed to a different observer. More of this in a moment. The first relates to standing; the second to infringement. Unless a party has standing it can have no actionable claim. more
"The General Services Administration is analyzing what caused an outage of .gov websites for a few hours Wednesday morning," reports Federal Times. Officials said the problem involved so-called DNSSEC cybersecurity measures that affected access to certain .gov sites, according to GSA spokeswoman Mafara Hobson. more
How to properly balance the commercial rights of a complainant with the free speech rights of a respondent has challenged a generation of Uniform Domain Name Dispute Resolution Policy (UDRP) panelists. Panelists have adopted a variety of approaches and consensus has been elusive. Paragraph 4(c)(iii) of the Policy provides that a respondent may have a right or legitimate interest in a disputed domain name... more
Three companies, SpaceX, OneWeb, and Boeing are working on constellations of low-Earth orbiting satellites to provide Internet connectivity. While all three may be thinking of competing with long, terrestrial cables, SpaceX CEO Elon Musk said "the goal will be to have the majority of long-distance traffic go over this (satellite) network" at the opening of SpaceX's Seattle office in 2015. Can he pull that off? more
Internet Society's DNSSEC Deployment Maps are now available as part of a larger set of Global Internet Maps from its annual Global Internet Report. The map is based off of the 5 stages of DNSSEC deployment that the organization tracks as part of the weekly DNSSEC deployment maps generated. more
A paper titled, "Civil society involvement in ICANN: Strengthening future civil society influence in ICANN policymaking," written by Robin Gross, examines the historical role that civil society has played at ICANN in policymaking. more
Yesterday, hundreds of sweaty ICANN attendees put on their best clothes and braved the crush of the rush hour metro on a very hot day to crush together for the ICANN gala at the overwrought Hotel de Ville (city hall) in Paris. Most of them missed an interesting announcement. I arrived an hour late, but even so food and drink were not yet served (not even water), and everyone was in desperate need of provisioning. The dull roar of heat-induced complaining drowned out the dignitaries making speeches at the far end of the hall. more
The Federal Trade Commission is challenging the public to create an innovative tool to help protect consumers from security vulnerabilities in the software of home devices connected to the Internet of Things. more
The Berkman Center for Internet and Society at Harvard University today announced the release of its 232-page study commissioned by the FCC examining global broadband deployment and usage. The draft of the study titled, "Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world," has now been posted for public comment. more
It's unclear what this means in the long run. Do bad actions and actors go undetected? Do we lose our visibility into network management? What is a "secure" network, and how do we secure it using traditional techniques of network perimeter traffic inspection when all the network traffic is opaque? If we can't see inside the DNS anymore, then how can we tell if (or when) the DNS has been captured by one or two digital behemoths? more
WIPO's Arbitration and Mediation Center earlier this month became the only non-Chinese entity to provide domain name dispute resolution services for the .CN and .?? (China) country code Top-Level Domain (ccTLD). more
In a letter released on Monday, the Internet Society Board of Trustees has expressed concern with a number of U.S. legislative proposals that would mandate DNS blocking and filtering by ISPs to protect the interests of copyright holders. "Policies mandating DNS filtering undermine the open architecture of the Internet and raise human rights and freedom of expression concerns," says Internet Society (ISOC). more
Using the lingo of Internet Governance, the "stakeholders" of digital technologies currently live in a state of confusion about their rights and responsibilities in the digital age. Digital technologies confront us with many questions we thought had been answered long before. We have a pretty clear understanding of our rights and responsibilities as citizens of our country, how a state should be governed, and how the private sector should conduct its business. more