The white spaces proceeding is the next big opportunity for experiments in alternative ways of providing wireless highspeed internet access... A key advantage of unlicensed spectrum is that experiments in new technology can be carried out without asking the permission of spectrum licensees. To date, we have made very little spectrum available for unlicensed use and experimentation. The FCC has the discretion to decide whether the digital television "white spaces" may be used on an unlicensed basis... more
Low-orbit space is growing increasingly crowded. Starlink has over 7,100 satellites in orbit and has plans to grow to 30,000. Project Kuiper has plans for a constellation of 3,232 satellites. One Web's first-generation constellation has 648 satellites, with plans to grow to over 6,300 satellites. The Thousand Sails (Qianfan) constellation is planning for up to 15,000 satellites. Numerous countries and businesses are launching or planning for smaller constellations for a wide variety of purposes.
more
Domain holders need to test their sites for 'DNS Flag Day' which will kick off on Friday, Feb. 1, 2019. more
Governments worldwide increasingly resort to shutting down the Internet as a political tool to control information and silence dissent. This alarming trend is not limited to developing nations grappling with civil unrest or political transition. Indeed, it is gaining traction in developed nations, suggesting a global phenomenon transcending geographical boundaries and socio-economic development levels. more
War, famine, pestilence and death. They fought for the last IPv4 addresses, hoarded and sold them at outrageous prices, traffic and commerce came slowly to a halt... Pestilence invaded the internet... Bandits roam the lands. A retired general told recently that the internet looks like the North German plains, easy to invade. Cyberwar and Cybersecurity are becoming mainstream subjects and have increasing Government attention. more
Or, to be more precise, it sure looks like they do. I wrote on another post on a publicly available spam tool, and I mentioned that I came across a page that allowed people to verify whether or not an email address is actually live. The question naturally arises: do spammers clean up their email contact lists based upon whether or not the address is legitimate? Spammers would have an incentive to do this... Do we actually observe spammers changing their sending patterns? I believe that we have evidence that they do. more
There are 2 reasons why Donuts, applicant for more than 300 Top-Level Domains, should become the official Registry for wine applications. It is not because of the content of its application: There are 3 applicants in total and all of them followed the rules provided by ICANN in its applicant guidebook. It is not because they protect the wine industry: the Applicant Guidebook did not "force" applicants to do so. It is not because they are American: there are also very good wines in Gibraltar and Ireland. In Gibraltar in particular... more
Since its founding, Amazon has reinvested profit in building infrastructure. They began with retail sales and distribution infrastructure and later added Amazon Web Services (AWS), providing data center and hosting infrastructure. Amazon founder Jeff Bezos also established Blue Origin, a company to provide satellite launch service and eventually to support space travel. Last year Amazon filed an application for a 3,236-satellite constellation of low-earth orbit Internet service satellites - Project Kuiper. more
California appeals court today gave Federal Trade Commission the green light to move forward with a lawsuit alleging that AT&T Inc was deceptive in slowing internet speeds to customers with unlimited plans. more
The first part of this series explained how Amendment 35 to the NTIA-Verisign cooperative agreement is highly offensive to the public interest. But the reasons for saving the Internet are more fundamental to Western interests than a bad deal made under highly questionable circumstances. One of the world's foremost experts on conducting censorship at scale, the Chinese Communist Party's experience with the Great Firewall... more
Not so long ago, the notion of introducing laws and other regulatory responses to address cyber security issues was regarded with significant hesitation by governments and policy makers. To some extent, this hesitation may well have stemmed from a general perception by those who do not work directly in the field that the world of cyber security is somewhat of a 'dark art'. More recently, however, there has been a substantial shift in this attitude, with proposals to regulate a range of cyber security related matters becoming increasingly numerous. more
The Netherlands, a country with just 16 million people, accounts for more than 3 million ccTLDs. That's an impressive ratio of people to domains -- one ccTLD per 5.3 people -- and it the highest ratio of any country with more than five million residents. Germany comes in a close second, with a ratio of roughly one ccTLD per 6.5 people... more
Trademark owners in the U.S. have a choice in suing for alleged cybersquatting: either the Uniform Domain Name Dispute Resolution Policy (UDRP) or the Anticybersquatting Consumer Protection Act (ACPA). Of the two, the UDRP is far and away the forum of choice for a very good reason: it is speedy, efficient, and inexpensive. Complaint to award can be concluded in less than 45 days. more
Internet Governance like all governance needs to be founded in guiding principles from which all policy making is derived. There are no better fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 3 of a series exploring the UDHR as a guide and template for the digital governance and digital citizenship. We discuss UDHR Articles 6 through 12 and address topics such as fundamental digital values, cyberlaw, policymaking and the role of tribunals in digital governance. more
I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more