As of today, Innovative Auctions has successfully completed private auctions for a total of 18 contested generic Top-Level Domains, resolving contention for more gTLDs than all other mechanisms combined -- including straight-up withdrawals, private negotiations, and swaps. Here is this week's update. more
During the recent ICANN Board meeting in Mexico City, the Board authorized the creation and funding of an Implementation Recommendation Team (IRT). This team was to be comprised of "an internationally diverse group of persons with knowledge, expertise, and experience in the fields of trademark, consumer protection, or competition law, and the interplay of trademarks and the domain name system to develop and propose solutions to the overarching issue of trademark protection in connection with the introduction of new gTLDs." more
The papers have been abuzz with the shutdown of Liberty Reserve, an online payments system, due to accusations of large scale money laundering via anonymous transactions. Many people have noted similarities between LR and Bitcoin and wonder whether Bitcoin is next. I doubt it, because with Bitcoin, nothing is anonymous. more
EU holds an eight-hour-long hearing taking an extensive look at whether US surveillance practices break European data protection laws. more
The modus operandi of the Internet Corporation for Assigned Names and Numbers (ICANN) is achieving consensus. This also holds true for the principal rights protection mechanism that emerged from a two-year round of debates organized by the World Intellectual Property Organization (WIPO) that ICANN implemented in 1999 as the Uniform Domain Name Dispute Resolution Policy (UDRP). Consensus rules; not precedent, although consensus inevitably becomes that. more
In follow up to the cancelation of IANA Contract RFP last month, the United States Department of Commerce (DoC), National Telecommunications and Information Administration (NTIA) have just issued solicitation of the contract. more
Shravanti Reddy?s recent piece draws attention to an important issue that has nagged at ICANN ever since the ill-fated at large elections, when participants from the developed world greatly outnumbered those from the developing world. This imbalance was somewhat mitigated by the regional delineation of candidates, but it nonetheless raised two important questions that have yet to be settled:
First, how can ICANN (and, more generally, Internet governance) be more inclusive of developing countries? And second (less often asked, but perhaps even more important): Why should developing countries care about ICANN -- i.e., why does the answer to the first question even matter? This article discusses some recent developments related to the first question; a later article will consider some specific reasons why ICANN matters to the developing world. more
"Credibility" in English comes through Middle French from a Latin word signifying trustworthiness and reliability in business and personal transactions (allegations, contentions, statements, promises, etc.). Where the goal is persuasion, exaggerating, embellishing, withholding, and falsifying evidence or accusing the adverse party of some heinous crime is not a winning strategy for proving claims or defenses. more
It has been my distinct pleasure to serve on ICANN's Expert Working Group on gTLD Directory Services (EWG). We put in many long months and what seemed like countless hours of research, discussion, meetings, and deliberations on how to tackle a clean-slate approach to gTLD directory services, popularly known as "WHOIS". In our Final Report, the Expert Working Group (EWG) recommended a Registration Directory Service (RDS) to replace today's WHOIS, providing a next-generation system to better meet the needs of the evolving global Internet with greater accuracy, privacy, and accountability. more
If approved, the code would technically be voluntary for Canadian ISPs, but the active involvement of government officials suggests that most large providers would feel pressured to participate. The move toward an ISP code of conduct would likely form part of a two-pronged strategy to combat malicious software that can lead to cybercrime, identity theft, and other harms. First, the long-delayed anti-spam legislation features new disclosure requirements for the installation of software along with tough penalties for non-compliance. more
"ICANN holds .islam, .halal in limbo despite losing case," reports Kieren McCarthy in The Register. more
Less than a week ago, I posted a short blog piece entitled "Can ICANN Please Stop Shooting Itself in the Foot?" in which I questioned ICANN's actions in connection with the recently announced key signing ceremony. At the end of this piece I asked the question: "While it seems that ICANN continues it propensity to shoot itself in the foot, does the community need to start worrying about when ICANN takes aim at other more vital organizational body parts?" Well it looks like I only had to wait five days to get the answer to that question. more
Mention ICANN in Internet circles and you will always find a multitude of views of what the organization should do, needs to do, and should have done; how it has to change, and why; and what it needs to focus on. Well, the time has come to make those views known and to try to persuade the rest of the community that they represent the best step forward. more
It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway? more
There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more