According to press reports, DHS is going to require federal computer contractors to scan for holes and start patching them within 72 hours. Is this feasible? It's certainly a useful goal. It's also extremely likely that it will take some important sites or applications off the air on occasion - patches are sometimes buggy (this is just the latest instance I've noticed), or they break a (typically non-guaranteeed or even accidental) feature that some critical software depends on. more
A recent invitation to participate in a webinar to discuss ICANN's Role in Satellite Internet Governance as an enabler of UN Sustainable Development Goal (SDG) 9 prompted me to consider this issue. As a legal scholar with expertise in telecommunications infrastructure, I had much to say and discuss about the new mega-constellation phenomenon and its potential role in achieving SDG9, which, for me, is a multifaceted and fascinating subject. more
WIPO's newest overview of the Uniform Domain Name Dispute Resolution Policy (UDRP) succinctly states what decisions have made clear through the years: The UDRP's first test is only a "standing requirement." Standing, under the law, simply means that a person or company is qualified to assert a legal right. It does not mean or imply that one will necessarily prevail on any claims. The UDRP includes a well-known three-part test that all trademark owners must satisfy to prevail, but the first element has a low threshold. more
On February 4, 2016, U.S. Senator (and Republican Party Presidential nomination contender) Ted Cruz, joined by Senators James Lankford and Michael Lee, dispatched a letter to ICANN CEO Fadi Chehade stating that "we were surprised and dismayed to learn that you have agreed to co-chair a high-level advisory committee for the World Internet Conference, which is organized by the Chinese government, while you serve as the Chief Executive Officer of ICANN under contract with the United States Government". The letter continued by posing a series of nine questions... more
A paper out of the Public Policy Institute of California (PPIC) examines answers to "Does Broadband Boost Local Economic Development?" Many might flame PPIC for daring to ask such a question, but with billions of dollars in public funds being spent by governments around the world, it seems appropriate for some science to be applied to study the benefits. more
Whoever said there wasn't enough room in Munich this time of year for anything but the mighty Oktoberfest clearly underestimated the draw of the new Top-Level Domain Program and the interest within Europe. The NewDomains.org conference held in Munich over the past two days confirmed three important insights for me; one: there is a large audience of brands and entrepreneurs who still have little awareness about the new Top-Level Domain program; two: those that are aware of the program and would like to participate are seriously behind schedule in preparing their application and strategy to submit to ICANN during the application window from 12 January to 12 April 2012. more
It must be tricky to be an advocate of transparency when your job involves selling serious encryption tools to government departments, large and small companies, hospitals and people who are concerned about having their bank account details hijacked from a home PC. After all, the point about good encryption software and the systems that surround it is that they provide a way to keep your secrets secret, while open government and the effective regulation of financial services would seem to require the widest possible dissemination of all sorts of operational data... more
Internet governance is getting a thorough look under the hood, thanks to the National Telecommunication and Information Administration. NTIA recently concluded its public comment period under a Notice of Inquiry (NOI), which asked for public comments regarding the future of the Joint Project Agreement (JPA) between the Department of Commerce and ICANN. At its core, the NOI asks whether the White Paper's original vision of privatizing the technical coordination and management of the Internet is working. For reasons I will explain, it would be deeply unwise for NTIA to terminate the JPA just yet. more
It's been almost six weeks since the NTIA announced "that the proposal developed by the global Internet multistakeholder community meets the criteria NTIA outlined in March 2014 when it stated its intent to transition the U.S. Government's stewardship role for the Internet domain name system (DNS) technical functions, known as the Internet Assigned Numbers Authority (IANA) functions", and thereby signaled the start of the last lap of the IANA transition marathon. more
Yahoo today announced it has agreed to pay $50 million in damages and will offer two years of free credit-monitoring services to 200 million people whose email addresses and other personal information were stolen as part of the massive security breach. more
The breach of the Democratic National Committee e-mail system and a massive digital advertising fraud believed to be run by alleged actors in Russia share a common thread beyond their ability to capture the news cycle. Although each event targeted a different weakness in brand/online security platforms, the common denominator is the use of fraudulent domain names. more
Running a DNS server that serves the root gives an interesting view into the world of the DNS. With the ongoing improvements to the ICANN operated L-ROOT, we've been fortunate enough to be able to make use of the "DNS Statistics Collector" (DSC) tool. "DSC" allows us to generate different views of the DNS queries we have been seeing at the L-ROOT systems. more
Releasing new statistics today, the United Nations International Telecommunications Union (ITU) announced that by end of 2014, there will be nearly three billion Internet users -- two-thirds of them from the developing world -- with mobile-broadband penetration approaching 32 per cent. Moreover, people from developing countries make up for more than 90 per cent of those who are not yet using the Internet. more
Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more
Recently, the Presidents of four Latin American countries slammed ICANN over its .amazon domain name decision. This added to a long list of geo-politically infused challenges which ICANN needed to render final decisions on after all delay tactics or deferments had already been fully exhausted. It is clear that ICANN is facing unprecedented challenges as it tackles issues that go beyond its current narrow mandate. more