In response to a letter from ICANN's Noncommercial Users Constituency (NCUC) to data protection authorities concerning overreaching requests of law enforcement agencies in ICANN's ongoing Registrar Accreditation Agreement negotiations, the Article 29 Data Protection Working Party has written the ICANN Board.
Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point...
Question: why has air travel become so painful? Because the threat posed by bad actors requires making everyone jump through hoops before letting them board a plane. To the point that, despite obvious requirements to ensure air safety, some are now openly questioning if the cure is not worse than the disease. Registering a domain name could be about to go the same way.
It's time for the community to demonstrate its resolve to see ICANN implement a successful and effective Trademark Clearinghouse (TMCH). Let's be clear here. The current ICANN implementation model and approach is flawed and needs attention. Following more than three months of consultation and negotiation, today I'm pleased to be able to present the domain name and trademark protection industries with an alternative solution for the operation of ICANN's Trademark Clearinghouse for the new Top-Level Domain (TLD) program.
We have been taking an active interest in the development of the new TLD program by ICANN and excited by the many opportunities and challenges that this "opening up" will bring to us, our customers and the internet ecosystem as a whole. However, we also have our concerns about how some entities wish to use generic domain name extensions as "walled gardens".
One of the reasons telecommunications has been so successful for more than 160 years is that it adopted a strategy that resulted in a seamless network all around the world. You can pick up a phone anywhere in the world and, with little or no instruction, make a call to anybody else in the world without worrying what phones and technology they are using on the other end of the line... But during that process the nature of the network operators changed.
There is no doubt that any national infrastructure plan of the magnitude of national broadband networks as they are currently rolled out in 9 countries and which policies have been put in place in another 110 countries will have questions attached to it. Furthermore, this infrastructure is being developed for the digital economy, which, in itself, is a fast-moving world. Five years ago there were no smartphones, tablets, mobile apps or smart TVs.
Today I released a report on 'National cyber crime and online threats reporting centres. A study into national and international cooperation'. Mitigating online threats and the subsequent enforcing of violations of laws often involves many different organisations and countries. Many countries are presently engaged in erecting national centres aimed at reporting cyber crime, spam or botnet mitigation.
I will first begin this post by emphasizing that this article is entirely my personal viewpoint and not to be considered as endorsed by or a viewpoint of my employer or any other organization that I am affiliated with. Neither is this to be considered an indictment of the sterling work (which I personally value very highly) that several people in Microsoft are doing against cybercrime. Microsoft's takedown of 3322.org to disrupt the Nitol botnet is partial and will, at best, have a temporary effect on the botnet itself...
Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation.