Policy & Regulation

Policy & Regulation / Most Commented

Supreme Court Delivers One-Two Punch to Agency Power

At the end of its 2024 term, the Supreme Court made two landmark rulings that limit federal agencies' regulatory powers. Loper Bright Enterprises v. Raimondo curtails their ability to create new regulations, while SEC v. Jarkesy reduces their capacity to enforce existing laws. These decisions significantly weaken agencies like the FCC in regulating sectors of the national economy, marking a substantial shift in administrative authority. more

Book Review: Forks in the Digital Road - Key Decisions in the History of the Internet

At first glance, this book looks like another history of the Internet, but it is much, much more. The authors use their engineering and scholarly understanding of what constitutes Internet history to identify forks in the digital road and key past decisions that shaped the Internet's path. The first part of the book maps out the core technical and policy decisions that created the Internet.  more

The Role of Chronic Radio Interoperability Impediments in the Butler, PA Assassination Attempt

There are many inconvenient truths about radio spectrum sharing and transceiver interoperability that require full ventilation and resolution. Spectrum users want exclusive access and - news flash - they do not like to share! Campaign events, like the Trump Bulter, PA rally, require short notice, forced cooperation between and among federal, state, and local law enforcement officers, as well as a variety of other government agencies. more

Malaysia Plans Internet “Kill Switch” to Curb Online Abuse

Malaysia is advancing legislation for an internet “kill switch” aimed at curbing online abuse and illegal activities. This initiative, spearheaded by the country’s Law and Institutional Reform Minister Azalina Othman Said, seeks to hold social media and messaging platforms accountable for content disseminated through their services. more

Phishers Exploit the Cybercrime Supply Chain Despite the Availability of Effective Countermeasures

Interisle Consulting Group today released its fourth annual Phishing Landscape report investigating where and how cybercriminals acquire naming and hosting resources for phishing. Our study shows that cybercriminals evolved their tactics for obtaining attack resources, including sharply increasing their exploitation of subdomain and gateway providers. more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more

Senators Introduce COPIED Act to Combat AI-Driven Deepfakes

In a bipartisan effort to address the growing threat of deepfakes, U.S. Senators Marsha Blackburn (R-Tenn.), Maria Cantwell (D-Wash.), and Martin Heinrich (D-N.M.) have introduced the Content Origin Protection and Integrity from Edited and Deepfaked Media Act (COPIED Act). more

Net Neutrality: What Is Old Is New Again

On July 22, the FCC's open Internet order - which transforms Internet access service from a lightly regulated information service into a heavily regulated telecommunications service - will take effect. This article describes the policies and legal theories underlying the Order and the Order's effect on consumers of Internet services and providers of the service, including a number of entities that had previously escaped FCC regulation. more

Canadian Bill S-210 Sparks Controversy Over Internet Regulations

A new bill in the Canadian Senate, Bill S-210, has ignited a heated debate over its potential impact on the Internet in Canada. The bill, which mandates strict age verification for online content, has raised significant concerns among privacy advocates, network operators, and digital rights groups. more

NIS 2.0 and Its Impact on the Domain Name Ecosystem

I recently appeared on the 419 Consulting podcast to discuss the European Union's NIS 2.0 Directive and its impact on the domain name ecosystem. I encourage all TLD registries, domain name registration service providers, and DNS operators to listen to the recording of that session which Andrew Campling has made available. more

13th Registration Operations Workshop: Join Us Online on June 4th, 2024

As a member of the ROW Planning Committee, I am writing this post on behalf of the Committee and welcome all community members to join us on June 4th. We are celebrating ROW's 10th anniversary! A decade of collaboration and inspiration! Thank you to the incredible community that has fueled this journey! more

What Defines a Stakeholder in Internet Governance? (Netmundial+10 Special)

What defines a stakeholder in Internet governance? Is it a professional occupation, an ideology, or a specific methodology? One of the key themes emerging in the Netmundial+10 event has been that of stakeholder involvement, participation and representation in different IG mechanisms. The numeric increase in contributors to these processes since the original Netmundial is palpable. However, questions remain about the definition of a stakeholder and the premises under which these actors should engage in policy work together. more

How Much Did the U.S. Wireless Carriers “Earn” From “Location Information Aggregators”?

The FCC lawfully fined U.S. facilities-based wireless carriers nearly $200 million for selling highly intrusive location data about subscribers without their "opt-in" consent. In Section 222 of the Communications Act, Congress comprehensively specified how the carriers bore an affirmative duty of care not to disclose clearly defined Customer Proprietary Information ("CPNI"). The Act explicitly required the FCC, and no other agency, to protect telecommunications consumers. more

UK First Country to Implement Cybersecurity Laws for Smart Devices, Including Banning Easily Guessable Default Passwords

Today UK's new consumer protection laws against hacking and cyber-attacks officially take effect. This legislation, a global first, mandates that all internet-connected smart devices - from smartphones and game consoles to connected refrigerators - meet stringent security standards. more

The Hidden Costs of Digital Convenience

In today's digital age, the Internet is a ubiquitous presence in our lives, playing a pivotal role in how we communicate, work, learn, and entertain ourselves. However, the convenience and benefits of the Internet come with a hidden cost to the environment, which is often overlooked by end users. This article explores the environmental impact of online activities and highlights the importance of adopting more sustainable digital practices. more