/ Most Commented

Cable & Wireless US$3B Deal to Acquire Columbus Exposes Vulnerabilities in Caribbean Telecom Sector

When Cable & Wireless Communications (CWC) announced an agreement to acquire Columbus International, news of the deal sparked widespread concerns about the impact of reduced competition on consumer pricing, infrastructure investment and wider economic development in the Caribbean. If approved, the deal will make CWC the Caribbean's largest wholesale and retail broadband service provider. At the same time, it will return several Caribbean territories into monopoly or near-monopoly markets... more

Content - The Next Regulatory War Zone

At the 2014 TelSoc Charles Todd Oration the former Chair of the ACCC, Graeme Samuel, warned against the looming content monopoly... "There is a constant risk that the exclusive tie-up of rights to content for new and emerging markets will allow the right holders to shut out competition across a wide range of services delivered over new networks." He didn't think that the current telcos have the right expertise to enter the content market... more

IAB Urges Developers to Encrypt by Default

The Internet Architecture Board (IAB) has issued a statement recommending that encryption be the default traffic option for protocols: "The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default. We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic." more

Anti-Cybersquatting Lessons from IP Strategy

The post reconsiders a cooperative solution to cybersquatting that I proposed in 2007. I also draw on examples of success and failure of legal actions to protect intellectual property (IP) licensing. Cybersquatting has gone unabated with the new gTLDs despite the introduction of new protection instruments such as the Trademark Cleaning House (TMCH) database and the availability of Uniform Rapid Suspension (URS) services, as well as declarations by registries of their intentions to block unauthorized registrations. more

ISOC Will Not Participate in NETmundial Initiative

The Internet Society Board of Trustees has issued an announcement stating that it cannot agree to participate in or endorse the Coordination Council for the NETmundial Initiative. "We are concerned that the way in which the NETmundial Initiative is being formed does not appear to be consistent with the Internet Society’s longstanding principles," says the statement released today. more

German Court Holding Domain Registrar Responsible for Its End User Actions

A German appeals court has held a German domain name registrar (Key Systems) responsible for issuing a domain name to H33t, a torrent-tracking site. The case was appealed, but the appeals court upheld the lower court ruling. more

New .WINE and .VIN Are Now Political Tools

The more I follow the .WINE & .VIN opera, the more I start to believe that the idea is either to kill both new gTLD applications to free space in Round 2 of the ICANN new gTLD program or make this subject a political tool "only" to increase Europe's presence in ICANN decisions. If there still is a wish from the European Commission to help .WINE and .VIN to become the strongest identity European wines could ever have on Internet, I would like to understand why the situation is still blocked... more

Combating Counterfeit and Substandard ICT Devices

Counterfeiting is a negative activity that is affecting almost all areas of economies, incidentally it has become a menace in the Internet world. Apart from selling of fake products online, the production and sale of imitated or counterfeit products create huge market for products that hurt the producers of the genuine goods and also create a menancing health risk to the users. more

Why We Don’t “Stick to Our Knitting”: auDA’s Role in the Internet Governance Landscape

Last Friday, following three weeks of dazzling diplomacy, the International Telecommunication Union's (ITU) 2014 Plenipotentiary Conference came to a conclusion in Busan, South Korea. For those unfamiliar with the event, the "Plenipot" is the ITU's most significant gathering... At the Plenipot, ITU members elect new office-bearers, set general policies and determine the Union's strategic plans and activities for the next four years. It is this last part that is of most interest to stakeholders in the Internet community... more

Does the Internet Need “Governance”?

It's remarkable to me that there are now two powerful agencies fighting to "govern" the Internet -- the ITU and the FCC. On any given day, it's hard to tell whether they are on the same side or different sides. The ITU process apparently began in earnest with the World Summit for the Information Society (WSIS) meetings, where the concept of "Internet Governance" became an urgent goal. The FCC process began when incumbent Internet Access Providers (IAPs) argued that "Net Neutrality" was a stalking horse for government control... more

ccTLDs Might Be Property

The long-running saga of victims who are pursuing 'state sponsors of terrorism' via ICANN has taken yet another turn. Some time back the Plaintiffs in Rubin & ors -v- Islamic Republic of Iran & ors managed to obtain Writs of Attachment in the Federal court district in Washington (D.C.) courts ordering that the ccTLDs of those respective countries be seized in part-payment of the damages they are owed. ICANN, fairly predictably, became involved at this point. more

U.S. Court Overrules Attempt to Seize Iran’s, Syria’s and North Korea’s Domains

In a landmark ruling, a U.S. federal court has agreed with the Internet Corporation for Assigned Names and Numbers (ICANN) that the country code Top-Level Domains (ccTLDs) are not property subject to attachment and thus overruled an attempt to seize Iran's, Syria's and North Korea's domains as part of a lawsuit against those countries' governments. more

If It Doesn’t Exist, It Can’t Be Abused

A number of outlets have reported that the U.S. Post Service was hacked, apparently by the Chinese government. The big question, of course, is why. It probably isn't for ordinary criminal reasons: The intrusion was carried out by "a sophisticated actor that appears not to be interested in identity theft or credit card fraud," USPS spokesman David Partenheimer said. ... But no customer credit card information from post offices or online purchases at usps.com was breached, they said. more

GTLDs Valuation Components That You Must Not Overlook

This post outlines the valuation pitfalls that need to be avoided when competing for the acquisition of a new generic Top-Level Domain (gTLD). The most widely used financial tools to determine the economic viability of a capital investment project, such as bidding for a new gTLD, are the Internal Rate of Return (IRR) and the Net Present Value (NPV), which measures the expected additional value a project would create if undertaken. more

Obama Urges FCC to Treat the Internet As a Utility

President Obama released a letter today stating that Internet services -- including both wired and wireless Internet -- should fall under Title II of the Telecommunications Act. Reclassifying broadband this way would prevent providers such as Comcast from charging fees to companies like Netflix in exchange for faster delivery speeds. more