Policy & Regulation

Policy & Regulation / Most Viewed

Cybersecurity Standards Competition

The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more

A Look at the Security Collapse in the HTTPS Market

While in recent years, HTTPS has become integral part of protecting social, political, and economic activities online, widely reported security incidents -- such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed -- have exposed systemic security vulnerabilities of HTTPS to a global audience. more

NTIA Chief Suggests “Cooling Off Periods” for ICANN Staff Before Moving On to Outside Jobs

In a statement delivered during the ICANN63 in Barcelona, David Redl,
Assistant Secretary of Commerce for Communications and Information (NTIA) said that while the community has greatly improved ICANN's accountability there is still room left for improvements. more

Freedom to Connect

Over the last ten years, Andrew Odlyzko has been writing about a pricing algorithm that would assure reasonable service levels at reasonable prices. If you're going to F2C, you might want to read that brief article or this slightly more complex one to learn (or refresh your sense of) PMP -- Paris Metro Pricing models to deal with network congestion. You'll also get a sense of why throwing bandwidth at the network will not be sufficient. Here's a great article from 1995... more

Website Monitoring Practices Taking Advantage of Critical Loopholes in Privacy Protection

Researchers at the University of California, Berkeley's School of Information have released a report raising concern over website monitoring practices which appear to be taking advantage of critical loopholes in privacy protection. According to the study, most popular websites in the United States "all share data with their corporate affiliates and allow third parties to collect information directly by using tracking beacons known as 'Web bugs' -- despite the sites' claims that they don't share user data with third parties." more

How a Resilient Society Defends Cyberspace

Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more

What to Make of the Inaugural NetThing 2019

The last Australian Internet Governance Forum (auIGF) was held in October 2016 before the annual event was cancelled as part of an auDA review. Three years on and the auIGF replacement – NetThing – was held in Sydney on 28 October 2019, though I was surprised to see that this Australian Internet event no longer had an associated .au domain name, instead choosing to go with NetThing.info. more

Farm Access to Broadband

The U.S. Department of Agriculture has been measuring computer usage on farms and publishes the results every two years in its Farm Computer Usage and Ownership report. The most recently released report for 2019 was compiled by asking questions to 20,000 farmers. This is a large sample from the more than 2 million farms in the country. more

FCC Chairman: It’s Time to Settle Net Neutrality Questions

Federal Communication Commission (FCC) Chairman, Tom Wheeler, today in an open letter in the Wired Magazine writes: "After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question has arrived..." more

Optimistic Speculation on What Elon Musk Might Do With Twitter

Elon Musk is a self-proclaimed "free speech absolutist" which leads some to worry that Twitter will be open to the sort of thing one finds at gab.com if his purchase of the company is completed. I have no idea what Musk plans to do with Twitter but let me offer some optimistic speculation. For a start, I don't believe Musk will use Twitter to advance right-wing candidates or policy. more

U.S. Federal Government Response Too Slow to Friday’s Internet Attack, Warns Cybersecurity Official

"We often refer to the Cuyahoga River in Cleveland that caught on fire over 20 times before we actually did something to introduce the Clean Water Act," says Allan Friedman, the director of cybersecurity initiatives for the Department of Commerce's National Telecommunications and Information Administration (NTIA), in conference call on Monday. more

U.S. Issues Cyber Incident Coordination Policy

White House has issued new directive spelling out how the Federal government will coordinate its incident response activities in the event of a large-scale cyber incident. more

Brazil Judge Orders 72-Hour Ban on WhatsApp

A Brazilian judge on Monday issued a 72-hour ban on WhatsApp chat service throughout Brazil. The measure which took effect at 2 p.m. was issued on April 26 following a failed 2013 access order from a branch of civil police that investigates criminal activity online. more

Justice Department Recommends That the FCC Deny the Proposed ARCOS Cable Segment Connecting Florida and Cuba

In September 2020, I wrote a post on a proposed 56-kilometer link between the ARCOS undersea cable and the north coast of Cuba, near Havana. The Trump-appointed Justice Department Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector was to conduct a 120-day security review of the proposal. more

Troubling Efforts to Distort and Undermine the Multistakeholder Process

ICANN's request for comment on amending the .com registry agreement to restore Verisign's pre-2012 pricing flexibility ended last Friday and, with 8,998 responses submitted by stakeholders, may have been a multistakeholder version of the St. Valentine's Day Massacre. Public interest in .com pricing is understandably high but the sheer volume of responses – nearly three times the number of comments submitted this summer on deregulating .org pricing – also suggests a show of force... more