Policy & Regulation

Policy & Regulation / Featured Blogs

UN Broadband Commission 2.0

Back in late 2009 I had the honour of explaining my views on how broadband can deliver social and economic benefits to countries and their people to Dr Hamadoun TourĂ© the Secretary-General (SG) of the ITU, the UN body looking after global telecoms. He showed a particular interest in the initiative Australia had taken in developing the NBN. This discussion with the SG led to the establishment in 2010 of the UN Broadband Commission, co-sponsored by UNESCO and the ITU. Dr TourĂ© invited 50 Commissioners from around the world to participate in this initiative, half of them from private industry. more

ICANN 51 Focus: Making ICANN Directly Accountable to the Broader Internet Community

ICANN 51 taking place in Los Angeles this week may not have its customary evening Gala, but it opened with rousing remarks by U.S. Secretary of Commerce Penny Pritzker in the first-ever ICANN appearance of the head of the Cabinet agency from which it was born and which has exercised continuous oversight of its key IANA functions. The themes of the growing importance of Internet Governance and the U.S. government's steadfast commitment to defense of the multistakeholder model, as well as the connection between maintenance of an open Internet and fostering free speech and economic growth, were key elements of Secretary Pritzker's address. more

Where Is Cyberspace?

In my first CircleID post, I compared the cyberspace to a farmland, which has to be cultivated and developed. I ended by asking: Where is cyberspace? I have asked this same question from many people, many of whom are internet experts. They all said the cyberspace is in the computers, networks, or servers, or the Internet itself. I agree with these cyberspace ideas. In addition, my opinion is a bit different. more

Building a Better WHOIS for the Individual Registrant

Today, anyone can use WHOIS to identify the organization or person who registered a gTLD domain name, along with their postal address, email address, and telephone number. Publishing this data has long been controversial, creating a system riddled with problems. On one hand, anonymous access to all WHOIS data enables misuse by spammers and criminals and raises concerns about personal privacy. On the other hand, incomplete or false WHOIS data prolongs Internet outages and leaves crime victims with little recourse. more

Privacy and Security - Five Objectives

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway? more

Internet Regulation: Section 706 vs Title II

At the NANOG meeting in Baltimore this week I listened to a presentation by Patrick Gilmore on "The Open Internet Debate: Section 706 vs Title II." It's true that this is a title that would normally induce a comatose reaction from any audience, but don't let the title put you off. Behind this is an impassioned debate about the nature of the retail Internet for the United States, and, I suspect, a debate about the Internet itself and the nature of the industry that provides it. more

Beyond NETmundial: Initiative or Inertia?

The April NETmundial meeting was a seminal event in the history of Internet Governance. Fears that the meeting might fail to reach consensus were not realized. Instead, the participants achieved a high degree of harmony -- the "Spirit of NETmundial" -- that resulted in issuance of a consensus Statement that, while lacking in precise detail, was effused with positive energy. Since that meeting there has been considerable discussion within the Internet Governance (IG) community as to what lessons have been learned from NETmundial, and how its work might best be carried into the future. more

New gTLD Fees Threaten the Diversity of the Name Space

The great promise of the new gTLD programme is not that it will spawn dozens of .COM clones, but rather that it will lead to the creation of a global constellation of unique names embraced by specific interest groups. As an ICANN community, our challenge now is to ensure that the policy framework we've created to manage new gTLDs advances that vision by not penalising the very sorts of domains that the programme was designed to encourage. more

Cigarette Smuggling and Cyber Security: Low-Tech Crimes Fund High-Tech Threats

You may not connect the cheap cigarettes sold under the counter (or out of a trunk, bodega or by a street vendor) with the mysterious charges on your credit card that you don't remember making or the cash that has, somehow, just disappeared from your bank account. You also may not connect that website selling cheap cigarettes made in second and third world countries with Shellshock or whatever the fashionably scary cyber-threat of the day is when you're reading this. more

Whose Customers Are Those Typing Brand Names in the Browser’s Address Bar?

Fourteen years ago, we had so much hope at the start of a new century. We thought the global economy was going to improve a lot because of the emerging Internet technologies. But where are we today? What has happened in the last 14 years? We know that even advanced countries are suffering from economic difficulties today. What happened to these advanced countries with high speed Internet? more