/ Most Viewed

The Internet Is for All

Over the past fifty years, participants in what began as the DARPA internet community have been turning out diverse technical specifications for TCP/IP network architectures and services. The first twenty years under government agency sponsorship were marked by rather free-wheeling sharing of ideas and collegial accommodation of divergent views typically found in most professional, academic activities. more

Will 5G Trigger Smart City PPP Collaboration?

As discussed in previous analyses, the arrival of 5G will trigger a totally new development in telecommunications. Not just in relation to better broadband services on mobile phones - it will also generate opportunities for a range of IoT (internet of things) developments that among other projects are grouped together under smart cities (feel free to read 'digital' or 'connected cities'). more

Hacking: Users, Computers, and Systems

As many people have heard, there's been a security problem at the Internal Revenue Service. Some stories have used the word hack; other people, though, have complained that nothing was hacked, that the only problem was unauthorized access to taxpayer data but via authorized, intentionally built channels. The problem with this analysis is that it's looking at security from far too narrow a perspective... more

Heading Into Panama for ICANN62

Well amazingly, it's that time again. Next week, individuals from around the world with a keen interest in Internet policy will head to Panama City, Panama for the second ICANN meeting of the year. As always, Brandsight will be attending to follow all of the important policy work being carried out by the community. Before I head off to the meeting (which based on my research will actually be my 32nd ICANN meeting!), I'd like to share a preview of the major topics slated for discussion. more

The Epsilon Phishing Model

Phishing researcher Gary Warner's always interesting blog offers some fresh perspective on clicking links on emails, as the crux of the phishing problem. Gary writes: "There is a saying 'if you give a man a fish, he'll eat for a day, but if you teach a man to fish, he can feed himself for a lifetime.' In the case of the Epsilon email breach the saying might be 'if you teach a man to be phished, he'll be a victim for a lifetime.' In order to illustrate my point, let's look at a few of the security flaws in the business model of email-based marketing, using Epsilon Interactive and their communications as some examples." more

Rightside, Donuts Merger Gets the Green Light from ICANN

New top-level domain registry operators, Rightside Group, Ltd. (NASDAQ:NAME) and Donuts Inc. have received ICANN's express consent on their merger plans announced last month. more

Singapore’s Fiber Infrastructure Beginning to Pay Off

It's still early days, but Singapore's approach to fiber deployment is beginning to pay off. In December 2007, Singapore announced a major program to get fiber deployed throughout their city state. A critical advantage of their approach was government mandated structural separation between the dark fiber layer deployed in the public right-of-way (a natural monopoly) and higher layer services (where competition is possible and highly desirable. more

What Did the Bush Admin Promise the Telco’s in Early 2001?

I have a hypothesis: The Bush administration came to power in December 2000. American telcos were on the precipice about to go into Free fall. We have seen how Bush politicized the Justice Department and are much more aware thanks to John Dean's Broken Government and Charlie Savage's Take Over of the intense desire to aggregate executive power to feed the Addingtons belief in the Unitary Executive. We now know that Cheney was meeting with the energy industry in early 2001 promising them whatever they wanted. We may begin to ask what the domestic telecoms industry was being promised? more

Wikileaks, Anonymous Hackers, and an Excuse for the UN

Vigilantism, in cyberspace or a New York subway, gets rejected in the main because more than just one vigilante results in an unlovely chaos. What the Anonymous cyber-vigilantes - those meting out "payback" for commercial decisions about Wikileaks - don't seem to realize is that chaos begets reaction, and in this case the victim may be the Internet itself. more

Article 28 of the NIS2 Directive and the DNS Industry

At a workshop on the implications of Article 28 for the DNS industry organized by eco -- Association of the Internet Industry in October 2023, stakeholders from the DNS industry, the European Commission, national governments, and the ICANN community convened to discuss the challenges facing the DNS industry and to work together on avoiding fragmentation as much as possible. more

The FCC Robocall Proceeding: International Insularity

In March of this year, the Federal Communications Commission (FCC) adopted an initial Notice of Inquiry (CG No. 17-59) to mitigate robocalls. In July, it adopted a Second Notice. Mitigating spoofed telephone calls is a global problem which every country in the world has been addressing as part of a global ecosystem for many years in intergovernmental and industry bodies, in academic R&D and patent filings, and industry products with ongoing activity continuing today. more

Internet Governance in 2026: Sovereignty, Security, and the Limits of Multistakeholderism

As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and alliance-based cooperation, challenging longstanding institutions and reshaping global norms through enforcement rather than consensus. more

A Case for Looking Before Leaping: The IANA Stewardship Proposal

In my comments on the draft Cross-Community Working Group (CWG) on Naming Related Functions proposal for the IANA transition, I expressed my overall support, albeit somewhat reserved, for the proposal... but with the ICG's deadline of January 15 having come and gone, and the informal deadline of January 31 looming for the revised proposal from the Names community to be submitted, I'd like to shed some light on what I believe the role and reasoning for some of the mechanisms identified by the CWG, specifically the Contract Co., to be. more

Changes in the ICANN Board’s Operational Activities

One of the more interesting developments in this new year is the proposed changes in how, or perhaps more accurately, when the ICANN Board will undertake its activities. Historically, the ICANN Board has held monthly teleconferences (Special Board Meetings), with the exception of those months when the ICANN Board meet in person as part of a regional meeting (Regular Board Meeting). Approximately five years ago, the ICANN Board also began holding bi-annual retreats as part of their regular business activities. Interestingly, the proposed 2010 agenda for the ICANN Board has only four proposed Special Meetings... more

Amazon Announces Project Kuiper Customer Terminals with Speeds up to 1Gbps

Amazon has announced the development of a range of customer terminals for its broadband satellite network, Project Kuiper. The company's first device is a "standard" customer terminal that measures less than 11 inches square and one inch thick and weighs less than five pounds. more