/ Most Viewed

Credibility and Disbelievablity as it Affects Outcomes in UDRP Proceedings

"Credibility" in English comes through Middle French from a Latin word signifying trustworthiness and reliability in business and personal transactions (allegations, contentions, statements, promises, etc.). Where the goal is persuasion, exaggerating, embellishing, withholding, and falsifying evidence or accusing the adverse party of some heinous crime is not a winning strategy for proving claims or defenses. more

The Christmas Goat and IPv6 (Year 6)

When I last year failed to take a picture of the Christmas goat before it was taken down, I decided this year to take a pic every minute, just to be on the safe side. A shortened movie based on these pics of the 2015 Christmas Goat can be find on YouTube. The clip on YouTube also shows that in the early morning of December the 27th the goat was set on fire and burned down in minutes. more

ICANN Openness and Transparency: Actions Speak Louder than Words

ICANN has announced that they will be having a Special Meeting of the ICANN Board on 19 February 2010 (3:00 UCT) to discuss the "upcoming ICANN International meeting." It is reasonable to assume that the 17 February 2010 security update will be a topic of discussion... I trust that the ICANN Board will make the right decision balancing the obligations that ICANN has to the global Internet community, with the safety and security of those ICANN stakeholders that participate in person at these ICANN events. However, the ICANN Board needs to gain the trust of the global community in connection with this and other important decisions that it will be making. more

Canadian Government Quietly Pursuing New ISP Code of Conduct

If approved, the code would technically be voluntary for Canadian ISPs, but the active involvement of government officials suggests that most large providers would feel pressured to participate. The move toward an ISP code of conduct would likely form part of a two-pronged strategy to combat malicious software that can lead to cybercrime, identity theft, and other harms. First, the long-delayed anti-spam legislation features new disclosure requirements for the installation of software along with tough penalties for non-compliance. more

The Emergence of Consensus in the UDRP

The modus operandi of the Internet Corporation for Assigned Names and Numbers (ICANN) is achieving consensus. This also holds true for the principal rights protection mechanism that emerged from a two-year round of debates organized by the World Intellectual Property Organization (WIPO) that ICANN implemented in 1999 as the Uniform Domain Name Dispute Resolution Policy (UDRP). Consensus rules; not precedent, although consensus inevitably becomes that. more

ICANN Mission Creep is Becoming Mission Leap

Under the leadership of Fadi Chehade and Steve Crocker, ICANN finally runs like an organization that has grown up. When it comes to process, accountability, and transparency, this is excellent news for the Internet. But it also raises a new question: how far will we let ICANN grow "out" of the limited technical mission for which it was created? In his opening remarks here in Durban, Chehade announced the expansion of local engagement centers and significant expansion of ICANN staff - for the second straight year. more

The ‘Domain Rights Dozen’ - ICA’s RPM Revision Review Principles

As the fall of 2012 begins the implementation of rights protection mechanisms (RPMs) for new gTLDs is reaching a critical stage... Given the half year interval between the upcoming Toronto ICANN meeting and the following Beijing meeting in April 2013, it is highly desirable, and perhaps essential, that community discussion in Toronto result in a clear consensus on how RPM implementation should proceed if new gTLDs are to launch without further delay and if potential registrants are to perceive them as acceptable platforms for speech and commerce. more

Slippery Slope

Last week, I visited Budapest to deliver a speech at the ICANN Studienkreis, an annual conference where experts study and address some current issues relating to Internet governance. I discussed how the Internet is on a slippery slope. Starting with the legitimate concern over how to deal with cybersquatters, we have moved to an unreasonable focus on legal control of Internet content and the domain name system. more

ICT Sectors Are Merging Into a New Wholesale Platform for the Networked Economy

There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more

Privacy and Security - Five Objectives

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway? more

Mobile: The Major Battleground

Interesting developments in the USA, Australia and New Zealand are giving some insight into the future direction of the mobile industry. In May BuddeComm reported proposed merger between AT&T and T-Mobile as a major threat to competition in the USA. This was viewed as a very obvious issue, and that under normal circumstances such a deal would be rejected by the FCC. But circumstances are no longer normal... more

Domain Transfers… Domain Hijacking… Make Your Voice Heard

ICANN's Generic Names Supporting Organisation (GNSO) has formed a working group to consider changes to the domain transfer process to enhance security and reduce hijacking. The working group consists of registrars, aftermarket players, domainers and other members of the ICANN Community. The group published its preliminary recommendations at the ICANN meeting in Brussels two weeks ago and the 20-day comment period has just begun. more

Sopho’s Threat Report Focuses on Social Network Spam

The latest Sophos Threat Report shows an upward trend in spam and identity theft through social networks. One of the examples Sophos gives is Facebook. In general Sophos claims that from 2009 to 2010 the spam, phishing and malware containing messages all doubled. more

Consumers Are the Serfs of the Feudal Internet Companies

In one of the email conversations with my expert colleagues from around the globe, an interesting article was discussed written by Bruce Scheier in Wired: When it comes to security, we're back to feudalism. An interesting aspect of the discussion was the conclusion that Google's and Facebook's consumers are not their customers. The distinction is important, because consumers are the product being sold to their actual customers who are their advertisers. more

ICANN Board Retreat Results in Specific New gTLD Directives

Over the weekend, ICANN's Board of Directors met in Norway to discuss the fate of new generic Top-Level Domains (gTLDs). As a result of the meeting, two resolutions were passed related to new gTLDs. First, the Board resolved to recommend further actions based on comments recently submitted by the Governmental Advisory Committee. The second resolution directed the ICANN CEO to incorporate a number of items into the fifth version of the Guidebook including... more