Policy & Regulation

Policy & Regulation / Most Viewed

The Third Stage of the VoIP Rocket Never Fired

Ten years ago was the dawn of Voice over IP (VoIP). The pioneering Israeli company VocalTec had just released its VoIP software for PCs (it was named iPhone, BTW). Industry guru Jeff Pulver (whom I now partner with in FWD) had begun to hold his Voice on the Net (VON) shows. As the founder of VoIP startup ITXC, I was invited to give a keynote at VON in Boston. The evolution of VoIP, I opined with the requisite PowerPoint slides, will be like a three stage rocket. I was right about the first two stages and dead wrong about the third... more

Avoiding an ICANN Monopoly on Policy

With all the focus in the TLD world on the imminent arrival of more than a thousand new TLDs and the still unfinished discussions within ICANN on what policy framework those TLDs will need to follow, it is often forgotten that there are hundreds of other TLD policy frameworks that are mature, stable and well tested. These of course are the ccTLD policy frameworks that have been actively developed over 20 years. more

Selling DONA Snake Oil at the ITU

A venerable old ITU tradition got underway today. Its Telecommunication Standardization body, known as the ITU-T, gathered, as it has done every four years for much of the past 100 years in a conclave of nations, to contemplate what they should be doing at their Geneva intergovernmental standards meetings for the next four years. The gathering is called the WTSA... Old intergovernmental institutional habits still continue, so the participants are gathered in a remote location in Tunisia called Hammamet. more

WSIS, Development, and Internet Governance: A Plea for ‘Star Trek’ over ‘Mad Max’

Humanity continues to find itself at a crossroads. Ahead of us lies an uncertain future filled with predictions of imminent doom and ominous prospects along with the wonders of science and technology. Behind us lies a century marked paradoxically by both devastating global conflicts and unparalleled global collaboration. As societies continue to globalize, we are increasingly becoming more connected - to the point where it is difficult, if not impossible, to divorce ourselves from the interconnectivity in contemporary systems of commerce, economics, politics, and culture. more

ICANN Asks U.S. Federal Trade Commission Whether .SUCK is Violating Any Laws

Allen Grogan, ICANN's Chief Contract Compliance Officer, has written a blog post today concerning a formal letter it has received asking the agency to halt the rollout of .SUCKS, a new gTLD operated by Vox Populi Registry Inc. As it stands, a ruling against Vox Populi by ICANN could result in federal prosecution or other legal action, according to ICANN officials. more

DNS Level Action to Address Abuses: New Tools for DNS Operators and Legislators

The ways in which the Internet is embedded in our daily lives are too varied and numerous to catalogue. The Internet delivers information, access to goods, services, education, banking, social interaction and, increasingly, work space. The global pandemic has only heightened our dependence on the online world, which is why efforts to ensure that the Internet remains a trusted and secure environment are more important than ever. more

It’s Time to Talk Solutions on Mass Surveillance

The public discussion of surveillance one year on from the Snowden revelations remains a search for the biggest sinner. New stories 'outing' countries and companies are great transparency and essential for healthy societies but they have a side effect that isn't so benign: they create an evergreen source of new justifications for security services to demand more money for a surveillance and counter-surveillance arms race. more

Examples of Where ICANN Can Be More Accountable

During the "GNSO Discussion with the CEO" at the recent ICANN meeting in Durban, I stated that ICANN talks a lot about the importance of supporting the public interest, but in reality the organization's first priority is protecting itself and therefore it avoids accountability and works very hard at transferring risks to others. In response to my comments, ICANN CEO Fadi ChehadĂ© asked me to provide him examples of where ICANN can be more accountable. Copied below is my response letter to ChehadĂ©, which provides seven examples. more

France’s Proposed Web Blocking Law: A Threat to Internet Freedom, Warns Mozilla Foundation

France's forthcoming SREN Bill could mandate web browsers to block websites deemed illicit by the government, setting a precarious standard for digital freedoms, warns Mozilla Foundation in a recent blog post. more

Can Technology Can Spam?

It seems to be impossible to implement a law against spam - unsolicited bulk email - without making a hash of it. At best, anti-spam laws are ineffective; at worst, they cause more problems than spam itself. Can technology fare any better? ...But despite this flurry of initiatives, we are yet to see a definitive answer to the spam problem. An Anti-Spam Technical Alliance has been formed by Microsoft, America Online, Yahoo! and EarthLink, but these companies continue to proffer competing solutions. Meanwhile, the technology being deployed in the spam wars is causing collateral damage, in the form of 'false positives' - email that is incorrectly categorised as spam, and so never reaches its intended recipient. more

Irish Government To Kill IE ccTLD?

While I was in LA last week John sent me details of the Communications Regulation (Amendment) Bill 2007. While there are some potentially positive aspects in the Bill some of the Bill's contents are, for lack of better word, simply crazy... more

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more

China to Create National Cyberattack Database

China has revealed plans to create a national data repository for information on cyberattacks and will require telecom firms, internet companies and domain name service providers to report threats to it. more

Is ICANN Staff Misleading the Board Into Violating Contractual Obligations to the U.S. Government?

Recently, I had time to reflect on various matters after the alternator in my vehicle decided that the middle of a mountain pass was the appropriate time and place to go to that great big pick-and-pull scrapyard in the sky while leaving me stranded with no cell signal on the side of the road in the middle of nowhere. Until that point, I had been seriously considering applying to ICANN's Nominating Committee for one of the three open seats on ICANN's Board of Directors. more

DNS Privacy at IETF 104

From time to time the IETF seriously grapples with its role with respect to technology relating to users' privacy. Should the IETF publish standard specifications of technologies that facilitate third-party eavesdropping on communications or should it refrain from working on such technologies? Should the IETF take further steps and publish standard specifications of technologies that directly impede various forms of third party eavesdropping on communications? more