Policy & Regulation

Policy & Regulation / Most Commented

The Beginning of the End of the Internet?

Discrimination, Closed Networks and the Future of Cyberspace... Just over a month ago, Karl Auerbach asked, "Is the Internet Dying?". Today, Commissioner Michael J. Copps, of the Federal Communications Commission (FCC) in a speech at the New America Foundation, is asking the very same question, "Is The Internet As We Know It Dying?" and warning about FCC policies that damaged media now threatening the Internet. more

Principles for Internet Policy

Of all the candidates for the Democratic nomination, Howard Dean raised the most amount of money over the Internet. On March 15th, the Dean campaign launched the first official weblog in presidential campaign history, six days after Dean himself first stumped in the blogosphere. What follows are Dean's principles for Internet Policy.

This nation -- and not just this nation -- needs to have an honest conversation about what's real, possible and desirable when it comes to the gift of the Internet. Conversations need shared ground. Here are the beliefs we think should guide the development of a fact-based federal policy. We put these forward as part of a continuing Great American Conversation. more

Does Online Privacy ‘Really’ Matter? ‘No’ According to Consumers

In introducing yet another online privacy bill, Sen. Ernest Hollings (D-S.C.) claimed that "privacy fears are stifling the development and expansion of the Internet as an engine of economic growth." Certainly, surveys consistently show that consumers express concern about Internet privacy. But what do these surveys really prove? If consumers are really concerned about their online privacy, their behavior doesn't show it. Here's why... more

ICANN: A Concrete “Thin Contract” Proposal

It looks as if ICANN is going to require applicants for new TLDs to agree (in advance) not to negotiate a changed contract with ICANN. We agree that streamlining the process is in everyone's interest. Along those lines, we are proposing a substantially thinner contract that ICANN and new registries could use. Existing registries should also be allowed to sign up to this contract, if they wish. more

98% Of Internet’s Main Root Server Queries Are Unnecccary: Should You Be Concerned?

A recent study by researchers at the Cooperative Association for Internet Data Analysis (CAIDA) at the San Diego Super Computer Center (SDSC) revealed that a staggering 98% of the global Internet queries to one of the main root servers, at the heart of the Internet, were unnecessary. This analysis was conducted on data collected October 4, 2002 from the 'F' root server located in Palo Alto, California.

The findings of the study were originally presented to the North American Network Operators' Group (NANOG) on October 2002 and later discussed with Richard A. Clarke, chairman of the President's Critical Infrastructure Protection Board and Special Advisor to the U.S. President for Cyber Space Security. more

The Post-MLAT Era: Why Dynamic Injunctions are the New Frontier of Access Blocking

As cross-border enforcement falters, dynamic injunctions are reshaping internet governance, allowing authorities to update blocking lists in real time and prioritize access deterrence over slow, often futile source takedowns across fragmented global legal regimes. more

Africa’s Digital Transformation Is Outpacing Its Cybersecurity Governance

Africa's digital boom is accelerating, but safeguards lag. Governments and firms deploy systems at speed, while weak enforcement and fragmented oversight leave economies exposed to mounting cyber risks. more

Satellite Industry Heats Up as Amazon, SpaceX and Blue Origin Compete for Orbit

April's satellite sector saw Amazon's $10.8bn Globalstar bid, surging plans for orbital data centres, intensifying SpaceX rivalry, regulatory friction, and doubts over broadband promises, underscoring a crowded, contested race to control next-generation connectivity infrastructure global. more

Authority Formation and Legitimacy in Parallel Governance Tracks

Africa's internet governance faces parallel tracks as AFRINIC's community-led reforms unfold alongside a continent-wide blueprint, raising questions over whether legitimacy will stem from participatory processes or increasingly coordinated external alignment. more

Building RIPE SEE: A Conversation With Jan Žorž About Community, Trust, and the Work Behind a Regional Event

Jan Žorž reflects on SEE RIPE's role in uniting a fragmented region, where trust built through informal exchange now underpins internet resilience and helps align engineers with policymakers as regulatory pressures intensify. more

Iran’s Internet Blackout Hits 60 Days - Deepening Economic Crisis, Two-Tier Access

Iran's now 60-day internet blackout is inflicting heavy economic losses, disrupting exports and daily life, while a tiered access plan deepens inequality and signals a shift toward tighter state control of digital connectivity. more

Beyond Connectivity: How Submarine Cable Resilience Dictates Digital Sovereignty in the Age of Fragmented Governance

Subsea cables underpin global data flows, yet resilience, control and deep sea access now define digital sovereignty as governance fragments, hyperscalers consolidate ownership, and states prioritize survivability over efficiency in an increasingly contested geopolitical seabed. more

Africa’s Community Networks Offer a Local Path to Inclusive and Resilient Connectivity

Community networks, locally built and governed, are emerging across Africa as cost-effective tools to extend connectivity, bolster digital sovereignty, and improve cyber resilience, despite regulatory, financial, and technical constraints that hinder broader adoption. more

No Safe Harbor: SCOTUS Scuttles the DMCA

America's Supreme Court, in Cox v Sony, recast online copyright liability, effectively sidelining the DMCA safe harbor and replacing it with a narrow inducement standard that leaves service providers little obligation to meaningfully police infringement. more

Why Africa’s Cybersecurity Problem Has Nothing to Do with Hackers

Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience. more