There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more
The last few weeks have reinforced the importance of modern communication networks to societies. Health care providers, schools, governments, and businesses all rely on networks that enable us to connect and collaborate remotely. Had we encountered a similar pandemic ten years ago, we would not have been able to continue our activities on the level that is possible today. more
This was never part of the plan. Going into the Dubai World Conference on International Telecommunications (WCIT) two weeks ago, there was optimism aplenty. After weeks of online and media campaigning, proponents of a free Internet had managed to scare everyone into thinking that WCIT was tantamount to digital Armageddon. This had the effect of defusing the conference before it even started, or so it seemed... more
The Stop Online Piracy Act (SOPA) and its defeat call attention to a delicious irony in public discourse on Internet governance. Even those who don't want the Internet to be an exception from traditional forms of regulation and law are forced to admit that something new and exceptional must be done to bring it under control, such as massive departures from traditional concepts of territorially bounded sovereignty through the use of in rem jurisdiction. more
I joined the ICANN board during the December 2004 ICANN meeting in Cape Town. I served for a three year term and stepped down at this last meeting in Los Angeles and didn't run for another term... Before joining ICANN, I thought that ICANN was the only part of the Internet that wasn't really working. I knew that there must be a better way to do what ICANN does, but I couldn't be bothered to figure it out. I'd agree with people who said things like, "it should just be distributed" or "it should just be first come first serve" or "we should just get rid of it." People from ICANN would say, "it's more complicated than that" or "at this point that would be impossible." After being part of the process for three years, I find myself saying those same things... more
Domain blocking mechanisms are an important element of an organization's defensive domain strategy. With the introduction of the New Generic Top-Level Domain (gTLD) Program by the Internet Corporation for Assigned Names and Numbers (ICANN) in 2013, brand owners were faced with a new challenge -- protecting their marks without overburdening their budgets. Defensive domain registrations were and still are an effective way in which a brand can protect itself in domain namespaces. more
Cybersecurity is a top-of-mind issue with calls for individual vigilance, national legislation, and international treaties to address gaps that are exploited causing significant harm and financial loss on a daily basis. The vast majority of these calls are well-intentioned though even among the best-intentioned, some are poorly directed. Such is the case with all of the proposals that would introduce security into the International Telecommunication Regulations (ITRs) of the International Telecommunication Union (ITU). more
Today, four years after the launch of the Catalan linguistic and cultural registry, Google reports that there are 90 million pages of Catalan content under the some 36 thousand .CAT domains. As imperfect as Google's tools are as a metric, the correct observation is that the use of .CAT by Catalans vastly exceeds the expectations of its initial proponents... more
Want to easily show people where a specific submarine cable goes? Or what cables terminate in a particular location? Last year I wrote about Telegeography's cool interactive submarine cable map and how useful it is to understand the submarine cable side of Internet infrastructure. In that article I mentioned how great it would be if you could get a link for a particular cable or location that you could pass along to other people. more
Call it outreach, call it propaganda or call it brilliance or even desperate measures, spammers (people) who favour the Georgian side in the recent conflict have been spamming using email, to get their point across. Depending on where in the world you are from, your ideological standpoint on Russia and your beliefs, when it comes to what email should be like, can be different and you may judge the action as you will. I call it spam. An Estonian colleague Viktor Larionov was quoted saying that whether there is a cyber war in Georgia or not, we know there is in fact a media war in play... more
Sometimes, a software company is as much about people as it is about technology. Who says PowerMTA admins don't have influence? Not only are they the influencers of our brand [Port25] they are also the main influencers and decision-makers when it comes to purchasing decisions. more
In the past week, Comcast filed an answer, denying all of E360's charges, and attached to it a motion to file a most impressive counterclaim. The court granted the motion on Monday so the counterclaim has been filed. At about the same time, E360 filed its response to Comcast's previous motion to dismiss the suit due to its utter lack of legal merit. more
A lengthy email to the NANOG mailing list last month concerning suspicious routing activities of a company called Bitcanal initiated a concerted effort to kick a bad actor off the Internet. more
We are all accustomed to purchasing and/or using copyrighted material in one fashion or another. From music, movies-(BluRay), e-books-(Kindle), computers-(software), mobile phones-(iPhone) and games; the umbrella of companies wanting to restrict access to its products continues to grow and become increasingly restrictive. more
On the one hand, the big telcos are chanting the mantram, "We shall not block, impair or degrade any content, service or application." On the other hand, they're saying, "There's no problem. We don't need a law until there's a problem." Well, now. Mitch Shapiro over at IP & Democracy, points to Russell Shaw's post that says: "I have been noticing a growing number of posts in which many Vonage users and Vonage Forum Members have been complaining about the quality of Vonage calls over Comcast broadband connections..." more