/ Most Viewed

The Boundary Between Sec. 230 Immunity and Liability: Jones v. Dirty World Entertainment Recordings

Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more

White House Issues Update on Cybersecurity Report

J. Nicholas Hoover reporting in InformationWeek: "The White House on Wednesday issued an update of the Obama administration's ongoing cybersecurity work, detailing some of the steps being taken in an effort to secure the nation's networks against cyber attacks and in the process offering some new insight into the administration's future plans. The progress report, issued immediately after a meeting held by White House cybersecurity coordinator Howard Schmidt with agency secretaries, cybersecurity experts..." more

India Seeks Alternatives to NSO Group Spyware Amid Global Snooping Scandals

The Indian government is seeking to acquire new spyware in an effort to replace the controversial Pegasus system, which has been blacklisted by the US government. more

A Case for Regulating Social Media Platforms

There are some who see the regulation of social media platforms as an attack on the open internet and free speech and argue that the way to protect that is to let those platforms continue to self-regulate. While it is true that the open internet is the product of the same freedom to innovate that the platforms have sprung from, it is equally the product of the cooperative, multi-stakeholder organisations where common policy and norms are agreed. more

Over the Top Services at the ITU PP-2018: Considering the Pittsburgh Massacre

This past Saturday, a self-professed neo-Nazi massacred eleven worshipers at synagogue services in Pittsburgh. The killer was reported to have lived on and was incented by an "Over the Top (OTT)" service purposely established to facilitate extremist activities known as Gab. Within hours, the cloud service providers hosting their services announced they would no longer provide hosting services. Presumably, the threat of both potential civil litigation liability among other penalties, as well as adverse publicity, provided the motivation. more

Antony Van Couvering Interviews Adrian Kinderis, CEO of Bombora Technologies (Video)

The talk ranges from new gTLD introductions, the role of ccTLDs in the new landscape, the relationships between registries and registrars, and some predictions for the future. more

Names, Numbers and Beyond…

Couple of weeks ago I started a new initiative called "Names, Numbers and Beyond". I started this as I genuinely think we are facing big issues due to the uncontrolled and non-standard growth of the IP and Name space used today and tomorrow. To keep in control and make everything manageable, parcelling out IP address space and the use of tight naming standards/policies is necessary to make networks work better and make them achievable. more

Website Usage Trends Among Top-Level Domains

EURid and Leuven Statistics Research Centre have released the results of a study investigating websites under most popular top-level domains. more

Apple (Not Surprisingly) is Not a Cybersquatter

It's highly unusual for a well-known trademark owner to be accused of cybersquatting, but that's what happened when a Mexican milk producer filed a complaint against Apple Inc. under the Uniform Domain Name Dispute Resolution Policy (UDRP) in an attempt to get the domain name lala.com. Not only did Apple win the case, but the panel issued a finding of "reverse domain name hijacking" (RDNH) against the company that filed the complaint. more

Thoughts About U.S. Government’s Decision on IANA Transition

Last week the government of the United States made an announcement that sent shockwaves through the Internet governance world. The National Telecommunications & Information Administration (NTIA), a division of the Department of Commerce, publicly stated that it will not be renewing its contract with the Internet Assigned Numbers Authority (IANA) past its September 2015 expiry date. The importance of this announcement cannot be underestimated. more

United States Steps Up Digital Incursions Into Russia’s Electric Power Grid, According to NYT

The United States has shifted its Russia strategy more toward offense and inserted potentially crippling malware inside Russia's electric power grid at a depth and with an aggressiveness that had never been tried before, according to a New York Times's story that broke over the weekend. more

Trademark Registrations on the ‘Supplemental Register’ Don’t Count (in Domain Name Disputes)

The Uniform Domain Name Dispute Resolution Policy (UDRP) has never required that a complainant own any trademark registrations to succeed in a domain name dispute, given that common law trademark rights (if properly established) are sufficient. But, as a pair of recent UDRP decisions reminds us, even some registrations are inadequate. The issue relates to the first element of every UDRP complaint, which requires the party seeking relief to prove that the "domain name is identical or confusingly similar to a trademark... more

Cyber Crime: It’s All About Data (Part 2)

In this part I want to focus on the gathering of cyber crime data. Are there best practices in the world on how cyber crime data is reported to law enforcement and aggregated to show the impact of said crime? Previously the discussion focused on the fact that cyber crime = crime and on a basic cyber (crime) training for every police officer. From the reactions this received, it is clear that some people see this as a possible solution. more

GFC Slows Down Cloud Computing Developments

The ongoing Global Financial Crisis (GFC) has also had a significant impact on some of the developments in our industry -- for example, cloud computing. It looks as though the GFC is the key reason that developments in cloud computing have not happened more quickly. Industry evidence suggests that shifting to the cloud saves 20%-50% off current IT deployments, and, according to its advocates, it can be many times more than that. more

Why African Telecom Union (ATU) Proposal Should be Rejected

My attention was drawn to the recent African Telecom Union (ATU)'s proposal for the modification and expansion of Resolution 47... As an affected party to the proposal, I feel obliged to make a comment: Recalling my last article to The Hill titled "ICANN is already under the influence of Foreign Governments", I drew an example of how ICANN allowed the African Union Commission, an Intergovernmental body to heavily interfere in the .Africa application so as to delegate it to itself, which led me to take ICANN to Court. more