Policy & Regulation

Policy & Regulation / Most Viewed

Correlation Between Country Governance Regimes & Reputation of Their Internet Address Allocations

We recently analyzed the reputation of a country's Internet (IPv4) addresses by examining the number of blacklisted IPv4 addresses that geolocate to a given country. We compared this indicator with two qualitative measures of each country's governance. We hypothesized that countries with more transparent, democratic governmental institutions would harbor a smaller fraction of misbehaving (blacklisted) hosts. The available data confirms this hypothesis. A similar correlation exists between perceived corruption and fraction of blacklisted IP addresses. more

What Matters in Net Neutrality

It's hard to know what to make of the Google/Verizon deal since until earlier today both companies have denied that there is one. And it's hard to argue about net neutrality because it means so many different things to different people. I've got lots of reading to do to catch up on the newly released set of principles from the companies, but in the meantime here are a few thoughts on the topic. more

White Spaces: The NAB vs. Reality

One of Washington's most powerful corporate lobbies is at it again. Raising a dust cloud of lies in a last-ditch effort to stop new technology that could better the lives of millions. For more than five years, now, the television broadcast lobby has tried to deny the American public access to white spaces -- unused airwaves that sit vacant between TV channels. Technology now exists that would tap the near limitless potential of these airwaves and deliver high-speed Internet services to tens of millions of people now left on the wrong side of the digital divide. more

2023 Routing Security Summit Starts July 17 - Participate Virtually

Interested in learning more about routing security? How it can affect your connectivity supply chain? What are best practices for enterprises and organizations? What is the role of CSIRTs in securing routing? What are governments doing now, and planning to do in the future around routing security? more

A Climate of Change for the Caribbean Internet

Spring storms with winter qualities clobbered North America this week, threatening Canada with slow-moving storms, and pounding the United States with near-record snowfall in the midwest, low temperatures in the south and tornadoes further east. You could say change was in the air. And although the unseasonable weather didn't reach as far south as Florida, the climate of change still dominated the atmosphere at the fifteenth regional meeting of the Caribbean Network Operators Group (CaribNOG). more

Dissecting the (Likely) Forthcoming Repeal of the FCC’s Privacy Rulemaking

Last week, the House and Senate both passed a joint resolution that prevent's the new privacy rules from the Federal Communications Commission (FCC) from taking effect; the rules were released by the FCC last November, and would have bound Internet Service Providers (ISPs) in the United States to a set of practices concerning the collection and sharing of data about consumers. The rules were widely heralded by consumer advocates, and several researchers in the computer science community, including myself, played a role in helping to shape aspects of the rules. more

FCC Change of Chairman: Opportunities to Advance Telecoms in America

It is always the case that change brings with it new opportunities, and the change in the FCC chair will be no exception to this rule. But we have learned since President Obama came to power that we should not have too high an expectation of such a change. In my discussions with the US Administration, the White House and the FCC I have never come across any major disagreement about my views on the future of telecommunications. more

Dial “L” for Liability - Sec. 230 Protects Online Service for Errant Phone Number

The Communications Decency Act has been described as the greatest Internet law. The first major Internet law designed to censor the Internet actually enabled the interactive Internet. While the censorship provisions of the Communications Decency Act went down in unanimous supreme court flames, a separate provision remains standing. The Good Samaritan provision of the CDA (47 U.S.C. ยง 230) declared that networks and online services are not publishers and therefore are not liable for the content of third parties. more

Why Platform Regulation Concerns ICANN

With the publication of the Australian Governmental report on Digital Platforms1and in the light of the ongoing work on the EU's Digital Services Act, the spotlight of policymaking is on platforms such as Google, Facebook and Amazon. It is natural that members of the ICANN community want to discuss the role of platforms within the ICANN framework, but sadly and predictably, the usual bylaws jockeys and keepers of the true ICANN faith were quick to stifle the conversation. more

Cuba Claims New Regulations Expand Internet Access to Homes and Businesses, But Here’s the Downside

New Cuban regulations regarding private WiFi networks went into effect yesterday, and the New York Times and others proclaimed that "Cuba expands Internet access to private homes and businesses." Yes, Cubans can legally import and install WiFi routers in their homes, small cafes, B&Bs, etc., but these regulations will make little difference in Internet access. more

Populism and Hi-Tech

At a recent panel discussion in Berkeley, USA, the topic - The Moral Economy of Tech - was explored. The panel discussed the way hi-tech people in general view themselves and their work, and even though I am not an engineer or a developer of software and algorithms I could very much relate to that. I often mention the fact that I am proud to be a member of this industry, as it in general provides positive developments to society and the economy. more

Cyberspace Solarium Commission Report

The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more

The Price of Lack of Clarity

As anyone reading this blog, assuredly knows, the world is in the grip of a deadly pandemic. One way to contain it is contact-tracing: finding those who have been near infected people and getting them to self-quarantine. Some experts think that because of how rapidly newly infected individuals themselves become contagious, we need some sort of automated scheme. That is, traditional contact tracing is labor-intensive and time-consuming - a time we don't have. more

Which Way Does Your Data Flow?

Data may be moving to the cloud, but understanding the physical geography underlying the cloud is becoming increasingly critical. October's decision by the European Court of Justice, striking down key portions of the Safe Harbor rules that some companies had relied on to legally transfer personal data between Europe and the U.S., was only the latest example of the regulatory uncertainty involved in cross-border data flows. While Internet companies have begun to address challenges at the static geographic points where data is resident, understanding the actual paths that data travels is an important and sometimes overlooked part of the compliance analysis. more

Trump Signs Cybersecurity Executive Order, Experts Weigh in on the New Draft

The long-waited cybersecurity executive order expected to launch sweeping reviews of the federal government's digital vulnerabilities, was signed today by President Trump. more