/ Most Viewed

Google Showing Signs of Increased Concerns Over Rising Data Privacy Scrutiny

Earlier this year, Google quietly terminated its "Mobile Network Insights" service, which provided wireless carriers globally, information on network performance in various locations. more

Cyberattack Cuts Off Thousands of TalkTalk, Post Office Customers in UK

Thousands of TalkTalk and Post Office customers in the UK have had their Internet access cut by an attack targeting certain types of Internet routers, according to a BBC report on Thursday. more

MIT Spam Conference: 2010 Call for Papers and Participation

I am proud (or disappointed) to announce the 8th annual MIT Spam Conference, March 25th and 26th at MIT in Cambridge, Massachusetts. A regular research competition that brings out the best minds in the fight against unsolicited email. At this point it would be helpful to provide a little background on the conference and remind everyone that the Call For Papers is still open. more

ISC Assesses DNS Flag Day

Everyone who participated in supporting DNS Flag Day initiative should feel they have accomplished something worth-while, says ISC's Vicky Risk. more

Domain Name Lessons From iTunes

What do iTunes and a cooperative domain-name Intellectual Property (IP) regime have in common? They are market solutions to illegal activity: free downloading of music and free use of brands in domain names, respectively. The music industry tried to fight the free downloading of copyright-protected music by taking legal action against free downloaders under the pretext that their activity siphons industry revenue... more

EU Should Not Be Setting US WHOIS and Privacy Policy, Says MPAA

The Motion Picture Association of America (MPAA) in its recent submission to the National Telecommunications and Information Administration (NTIA) has raised a stern objection regarding ICANN's attempt to adhere to the EU's General Data Protection Regulation (GDPR), stating that the temporary specification had gone "well beyond what the GDPR mandates." more

FCC Approves White Space Devices: The Dawn of the Age of Opportunistic Spectrum Reuse

Yesterday will go down in history as a bellwether moment. Few among us will soon forget the excitement of Obama's election. But there was an equally historic vote yesterday that for geeks, policy analysts, and technologists represents an entirely new trajectory in telecommunications. In essence, the FCC has begun the transition from command-and-control, single-user spectrum licensure to a more distributed system that holds the potential to eliminate the artificial scarcity that prevented widespread access to the public airwaves since 1927. more

The Untold History of the First Cyber Moonshot

A dialogue between Michael Warner (Historian, United States Cyber Command) and Tony Rutkowski (Cybersecurity engineer, lawyer and historian). Michael is chairing a cyber history panel at the October biennial Symposium on Cryptologic History hosted by the National Security Agency; his panel will include discussion of the almost unknown key role of cryptologist Ruth Nelson leading a team in the 1980s in a major initiative to secure public internet infrastructure. more

Opting for UDRP Over URS

The Internet Corporation for Assigned Names and Numbers (ICANN) implemented the Uniform Rapid Suspension System (URS) in 2013 together with three other rights protection mechanisms for trademarks. It "is not intended for use in any proceedings with open questions of fact, but only clear cases of trademark abuse"... It was designed to afford rights holders claiming abusive registration of domain names with new gTLD extensions an even faster route to remedy than the Uniform Domain Name Dispute Resolution Policy (UDRP). more

Registry-Registrar Cross Ownership: Framing the Issues

There has been much said and written recently about the issue of registry-registrar cross ownership with regard to New Top Level Domains ("New TLDs"). It is clear that there appears to be a fair amount of confusion about the issue and the positions espoused by various parties. To assist the ICANN community in understanding the issue -- the points of agreement and debate -- I offer the following overview on behalf of Network Solutions and Central Registry Solutions... more

Biden’s Cyberspace Ambassador Urges Americans to Tone Down the Anti-China and Anti-Russia Tough Talk on Tech

Nathaniel C. Fick, the federal government's inaugural ambassador at large for cyberspace and digital policy, has urged Americans to tone down the anti-China and anti-Russia tough talk on tech in order to establish better relations with nations that have yet to pick a side. more

The Dubai Debacle: Does It Matter?

The second phase of the Dubai Debacle is now well underway. The first of the ITU-T bodies, the World Telecommunication Standardization Assembly (WTSA) finished its ten day meeting. The second body, the World Conference on International Communication (WCIT) completed its second day. WTSA shapes the ITU T organization and detailed agenda, while the WCIT gives it a treaty-based construct with regulatory mandates. WTSAs occur every four years; WCITs every twenty-five - although there is a proposal to hold them more frequently. more

Over 100 US Mayors Sign Pledge to Hold ISPs Accountable for Net Neutrality Violations

A net neutrality pledge initiated by mayors from New York City, Austin, and Portland, is now signed by more than 100 US mayors. The signed pledge holds ISPs accountable for net neutrality violations, despite the FCC's vote to repeal the regulations late last year. more

Is This Only Sloppy Wording by ICANN?

So I wrote earlier that I though it was good stuff when ICANN released a paper on DNS Security. Yes, I think it was good this paper was released, and yes it points out correctly how important DNSSEC is. But, now when reading it in detail, I find two things that troubles me. And it has to do with management of .ARPA. A top level domain that is used for infrastructural purposes. Like IP-addresses and E.164 numbers... more

Baltimore Gets Hacked: Main Computer Systems Crippled, Experts Estimate Months to Recover

On May 7, hackers breached parts of the computer systems that run Baltimore's government, taking down essential systems such as voice mail, email, a parking fines database, payment systems used for water bills, property taxes, real estate transactions and vehicle citations. more