The European Union (EU) has set a high bar by tackling domain name system (DNS) abuse head on via government regulation and seems to have successfully resisted attempts to water down DNS stewardship obligations. Recent guidance from a key European Commission cooperation group (the NIS Cooperation Group) handling sections of the Network and Information Security Directive (NIS2) intends for a robust implementation of Article 28, which will go a long way toward helping to mitigate some of the longstanding problems that persist in the DNS. more
I was hoping that McCain's Tech Policy would emphasize and extend the two McCain pro-Internet initiatives -- the McCain Lautenberg Community Broadband Act and Spectrum Re-regulation, neither of which have yet seen the light of day -- but it doesn't. In the first case, it makes a vague nod in the direction of "market failure and other obstacles." In the second, it treats spectrum policy as a done deal; now that we can surf the Web in coffee shops, we're done. more
In response to ongoing controversies over the use of copyrighted content in training artificial intelligence, U.S. Representative Adam Schiff has introduced the Generative AI Disclosure Act more
Your wireless carrier (in the U.S., probably AT&T or Verizon Wireless) has a lot of control over the handset you can use and the applications that can run on that device. In fact, wireless carriers routinely ask for (and get) an enormous slice of the revenue from applications that work on their networks, and they force handset manufacturers to jump through all kinds of hoops in order to be allowed to sell devices that can connect to these networks... This has had bad effects on the ecosystem of the wireless world. more
A new article by Ken Camp, published at Realtime VoIP, discusses telephony regulations, describing some existing regulatory issues surrounding telecommunications and how they might impact VoIP services. The following is an introduction to this article: "Bringing new technologies such as VoIP into service presents a wide range of technical challenges. Given the highly regulated environment of telecommunications, VoIP presents a set of regulatory challenges. For the most part, these challenges present hurdles to VoIP service providers who want to deliver commercial services to consumers and businesses and don't directly impact business VoIP deployment. ...Businesses that embrace managed VoIP services might want to review some of these regulatory issues, such as E-911 services, with the managed VoIP service provider." more
Internet pioneers and leading figures published an open letter today calling on FCC to cancel the December 14 vote on the agency's proposed "Restoring Internet Freedom Order." more
As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more
In a major win for the public interest, the Broadband Data Improvement Act passed the Senate (on September 26th) and the House (on September 29th). Due to amendments, it now goes back to the Senate for final approval (should be pro-forma) before it lands on George Bush's desk. With the United States falling further and further behind a host of other countries, the question on many people's minds (including the folks over at Point-Topic who created this graphic) is, "Why is this happening?" more
I have often argued that in both the fixed and the mobile telecoms markets the actual telecoms element is a utility -- a utility that allows for an enormous range of new services, new business models and new applications. For this reason the argument for more than a decade (since 2002 to be precise) has been that structural separation of the vertically-integrated telecom model is needed in order to unleash the huge potential of telecoms. If that doesn't happen technologies will be applied that allow the users to bypass the barriers set up by the telcos to protect their utility. more
There is currently a great deal of debate regarding the need for gigabit networks. There are still a lot of voices, often led by conservative political and media people, who argue that hardly anyone needs such networks. Unfortunately for them, however, their arguments are totally flawed. And who are they, anyway, to set the tone for such new infrastructure. Isn't necessity the mother of invention? more
The new year has only just begun, but the work of ICANN's Expedited Policy Development Process for gTLD Registration Data (EPDP for short) is already in full swing. The team just wrapped up several days of meetings in Toronto and I thought it would be a good time for an update on where we are in the process. Before I go any further, I would be remiss if I didn't again take the opportunity to thank the ICANN team supporting our efforts. more
The European Telecommunications Network Operators' Association (ETNO) has issued a press release in which its Executive Board Chair and the ITU's Secretary-General "reiterated the importance of the WCIT to lay the framework that will facilitate the further growth of an innovative, and sustainable future for the telecom and information and communication technology sector (including the Internet)". more
After ten hectic days, the young Clemson civil engineer turned MBA entrepreneur -- who turned a passion for helping equestrians care for their horses into a website enterprise -- had the HorseDVM.com domain, and its IPR returned to HorseDVM LLC. Ultimately, however, it was the registrant who realized the registrar had wrongfully sold him the domain and the unfairness of what had occurred, who facilitated the return. The culpable registrar ultimately did nothing but unfailingly support its auction subsidiary's sale... more
Encryption is a way to keep private information private in the digital world. But there are government actors, particularly here in the US, that want access to our private data. The NSA has been snooping our data for years. Backdoors have been snuck into router encryption code to make it easier to break. Today at M3AAWG we had a keynote from Kim Zetter, talking about Stuxnet and how it spread well outside the control of the people who created it. more
The ICA has just dispatched a letter to Assistant Secretary of Commerce Lawrence Strickling in advance of the talks scheduled in Brussels on February 29-March 1 between ICANN's Board and its Governmental Advisory Committee (GAC). Our letter expresses strong concerns that the positions being advocated by the U.S. government and the GAC regarding the proposed Final Applicant Guidebook (AG) for new generic Top-Level Domains (gTLDs) would be detrimental to ICANN's multi-stakeholder policy process and would undermine the rights of legitimate registrants at new gTLDs. more