/ Most Viewed

ICANN and GAC: A New Role Needed?

Syracuse University professor Milton Mueller published a blog under the title "Will the GAC go away if the Board doesn't follow its advice?". Having been to a number of (very limited) ICANN meetings on behalf of law enforcement cooperation, I would like to share a few - probably thought provoking - observations. The GAC should not leave ICANN but it may be more efficient if its role changed and its efforts were aimed at a different form of output. more

Cyberspace Security in Africa – Where Do We Stand?

Very few African states today have developed a national cybersecurity strategy or have in place cybersecurity and data protection regulations and laws. Yet, the continent has made major headway in developing its digital ecosystem, and moreover, it is home to the largest free trade area in the world, which is predicted to create an entirely new development path harnessing the potential of its resources and people. more

United States Is the Most Bot-Infected Country. Right?

A couple of days ago, Threatpost posted an article indicating that the United States is the most bot-infected country... I think that Microsoft's mechanism of measuring bot infections is a good one, not necessarily because it is the most accurate but because it represents the most complete snapshot of botnet statistics. Because Microsoft Windows is installed on so many computers worldwide and because so many users across the world call home to the MSRT, Microsoft is able to collect a very large snapshot of data. more

Internet Society Releases Internet of Things (IoT) Overview: Understanding the Issues and Challenges

Near the end of the first decade of this century, the world reached an Internet milestone. The number of Internet-connected devices surpassed the number of people alive on planet Earth. At the time, seven billion devices had already been connected to the Internet, and this went completely unnoticed by most people. This moment represented an important sign of the rapid pace in which we are adopting technology and embracing Internet connectivity. more

Risk of Portfolio Approach to Cybersquatting

A secret weapon is falling into dangerous hands. Organized cybercriminals are building up portfolios of cybersquatting domain names. A smart operator with such a portfolio can go beyond simple stealing and competing full out for traffic and revenues. Rightful brand owners, feeling the squeeze, will find out too late that the bandits have the money to fight legal action. The time to act is now, before pieces of the playing field have been bought up by the enemy. more

Report and Analysis of Public Comments Submitted to ICANN on the .COM Pricing Provisions (Part II)

Mr. Arif Ali, a lawyer with Dechert who is very familiar with ICANN governance and has represented numerous parties in ICANN related matters, wrote an extraordinarily detailed and comprehensive critique of the LOI and of Amendment 3. Mr. Ali noted that two of ICANN's most important obligations are to operate for the benefit of the Internet community as a whole and to enable competition and open entry in Internet-related markets, and that the proposed price hikes do not support these obligations... more

A Hospice Strategy for the ITU-T

After the Dubai World Conference on International Telecommunications (WCIT) debacle last year, the exit of almost everyone out of the ITU-T was accelerated. The ongoing meeting of its former "crown jewel" Study Group 13 that claims to be the global coordinator of all things Internet, Cloud Computing, SDN, IoT, and Future Networks, attracted only 80 people - mostly from three countries plus the host. Only a single person from the Americas attended. more

The Only Winning Game at the WCIT

With Russia flipping its far reaching Internet takeover proposals into the WCIT pile this morning, it became apparent to WCITeers heading to Dubai in a couple of weeks that the entire show was on a fast trajectory into the wild blue yonder. Indeed, the event may provide an opportunity for Hollywood to film a sequel to One Flew Over the Cuckoo's Nest. Unfortunately, the Russian proposals are only one of many wake-up indicators that this event may not be the exercise in rational, intelligent discourse that some in the preparatory process apparently believed. more

US Government Waves the Caution Flag at ICANN

This month, ICANN is driving hard to get two of its horses to the finish line. The first is barely a year old - it's the first formal review of ICANN's accountability and transparency. The second horse is going on 4 years old: ICANN's plan to introduce hundreds of new top-level domains (TLDs) for the Internet. Just as these horses have entered the home stretch, one of the racecourse officials is vigorously waving the yellow caution flag. And ICANN would do well to pull back on the reins. more

Google and China: Some General Thoughts

I have deferred blogging on the Google/China imbroglio for a few reasons. First, heavyweights such as Jonathan Zittrain have tracked International online censorship and online security issues more closely than I have. Second, after Google's provocative blog post, I wanted to see the facts develop rather than rely solely on Google's assertions. The spin doctors are now moving in, so the useful development of the factual record will be slowing down. more

Has President Macron Thrown Multistakeholderism Under the Bus at UN IGF 2018 Paris?

Today, President Macron threw down the gauntlet to President Trump and the US administration on Multistakeholderism. In his welcome address to IGF 2018 Paris a few hours ago, President Macron challenged IGF to become more relevant by reinventing itself in factoring in multilateralism into IGF's non-decision-making body and to move beyond the mere talk-ship lip service it has been for the last 13 years. more

ICANN Releases gTLD Applicant Guidebook

Per their timeline, ICANN released the gTLD Applicant Guidebook on May 30th. This version contains revisions based upon both community feedback, as well as recent consultations with the Governmental Advisory Committee (GAC). more

Bringing Broadband to the Arctic

The Arctic region has largely been left out of the broadband arena in the past due to the high cost of building last-mile broadband infrastructure. The primary broadband available in the region has been provided for decades by Iridium Communications, which provided only low-bandwidth connections capable of supporting satellite phones and low-bandwidth monitoring devices. more

Who Has Taken Over As the Most Prolific Botnet Since Rustock Was Taken Down?

Over at the site V3.co.uk, they have an article up today alleging that since the Rustock takedown two weeks ago, the bagle botnet has moved to take over as the botnet that is responsible for sending the most spam. They have not replaced Rustock's total spam volume, only that they are now the number one spam sending botnet. more

China Mandates IPv6 for Router Manufacturers Starting December 1

In a significant move to advance IPv6 adoption, China's Ministry of Industry and Information Technology has directed local router manufacturers to default to the IPv6 protocol from December 1, 2023 onwards. more