Presidential nominee Donald J. Trump and his supporters are pursuing platforms to create an altered America in a different world that is profoundly different in almost every respect from what has existed until now -- it is a new world best described as the Trump Apocalypse. Would the Internet as we have known it continue to exist? The short answer is probably not. Here is why. more
I've been fascinated by the recent announcement that Australia is spending $31 billion USD to upgrade its broadband. With all the excitement and fuss over the broadband stimulus funding in the American Recovery and Reinvestment Act, it may seem strange to be claiming that the $7.2 billion is a pitifully small amount -- but let me bring this home for you... more
M3AAWG, the Messaging, Malware, and Mobile, Anti-Abuse Working Group and APWG, the Anti-Phishing Working Group, surveyed their members about recent WHOIS changes. With over 300 results from security researchers, it's the broadest report yet on WHOIS use. The survey results confirm our concerns that WHOIS was a vital resource for security research, and its loss is a serious and ongoing problem. more
In response to the European Commission surprise announcement last week that British domain owners may no longer be entitled to keep their ".eu" domain names, EFF is urging the registry for .eu (EURid) no to follow through. more
Today, the global Internet community reached an important milestone. The US Department of Commerce National Telecommunications & Information Administration (NTIA) announced that the community-developed proposal to transition the stewardship of the Internet Assigned Numbers Authority (IANA) functions meets the criteria it set out in March 2014. more
At the Mobile World Congress in Barcelona, Tom Wheele, the FCC Chairman, gave a range of spirited responses to a grilling from the Director of the GSMA, Anne Bouverot. She was following the line of the telcos and questioned if the FCC intervention would stifle growth and investments in the market; however she had problems reconciling her position with the fact that, despite these regulatory changes, the American industry was still prepared to invest a whopping $45 billion in new spectrum. more
The goal of public policy for connectivity should be to assure access to our common facilities as a public good by adopting sustainable business models that don't put owners and users at odds with each other. Such balances are typically difficult to achieve which is what makes connectivity so unusual - we can achieve both once we fund the facilities as a public good apart from the particular applications such as telephone calls and cable content. more
I've followed Cuba's home-connectivity "plan" from the time it was leaked in 2015 until the recent Havana home Internet trial. I thought the plan was a bad idea when it was leaked -- it calls for installation of obsolete DSL (digital subscriber line) technology -- and now that the Havana trial is complete, I question whether the plan was real. ETECSA denied the validity of the leaked presentation at the time, and their definition of "broadband" was "at least 256 kb/s." more
It's Friday, a day to tie some threads together. There were three announcements/events this week that are connected in a non-obvious way... These three elements go together in creating a picture of US policy towards Internet access at the beginning of 2008. Rather than seeing the Internet as an engine for economic growth, creativity, innovation, and new jobs -- and as the converged communications medium for the next generation -- current policy is to wait for private companies to decide when investment in access makes sense for them. Those private companies have plenty of incentives to shape access to suit their own business plans. more
Ever since we first became involved in developing policies and strategies for countries relating to what are now known as national broadband networks, we have argued that those taking part in the strategic decision-making processes of designing these networks should look, not at what broadband can do now, but at what high-speed broadband can do to assist countries to create the best opportunities for future developments. more
As the shorter of the ICANN interregnums comes to a close and the ICANN faithful finalize their dinner reservation agendas for Brussels, it is time again for a preview of what will be 'on-tap' at next week's ICANN meeting. While, as always, there is a lot going on in ICANN Land, a scan of the blogosphere and ICANN list serves suggests that the four most discussed topics will be... more
Recently I joined my son, who is in his final high school year, to visit the open day of the newly founded Leiden University College in The Hague. The school focuses on Liberal Arts & Science and offers a broad education on (international) politics, philosophy and economy. The idea is to prepare the next generation internationally oriented public servants and leaders of the future. Among others they have former Dutch Minister of Foreign affairs and Secretary General of NATO Jaap de Hoop Scheffer as a college professor. more
Wait and see approach on abuse attracts ICANN Stakeholder attention: A few weeks ago I made a detailed argument as to why product safety applies to domains, just like it does to cars and high chairs. I also argued that good products equal good business or "economically advantaged" in the long run. Then I really made a strong statement, I said if we don't actively engage other Internet stakeholders -- those that interact with our products, we would eventually lose the opportunity to self-regulate. more
Over the next decade which companies do you think will be better able to exercise monopoly power? Amazon, T&T, Comcast, Facebook, Google, Regional phone companies, or Verizon? If you'd asked me this question in 2000, I would've picked AT&T, Comcast, Verizon, and regional phone companies. They are part of local duopolies for wired infrastructure. more
What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more