As the WHOIS debate rages and the Top-Level Domain (TLD) space prepares to scale up the problem of rogue domain registration persists. These are set to be topics of discussion in Costa Rica. While the ICANN contract requires verification, in practice this has been dismissed as impossible. However, in reviewing nearly one million spammed domain registrations from 2011 KnujOn has found upwards of 90% of the purely abusive registrations could have been blocked. more
Major U.S. broadband providers are now mandated to display clear consumer labels outlining prices, speeds, and data allowances for their services. This directive from the Federal Communications Commission (FCC) applies to all major standalone home and mobile broadband plans, targeting providers with over 100,000 subscribers. more
When it comes to domain name disputes, no domain name has captured more media attention than sex.com. Of course, disputes about sex often obtain a great deal of attention, and the sex.com domain name dispute can grab its share of headlines because the case involves sex, theft, declared bankruptcy, a once-thriving Internet porn business, and fraud, instead of the typical cybersquatting allegations. Indeed, this case is remarkable for its potential impact on the development of caselaw concerning whether there is a valid basis to assume that trademark interests should overwhelm all non-commercial interests in the use of domain names. The answer is no, but the caselaw to support that answer is in tension with cases that strongly imply a contrary conclusion. more
The U.S. Congress' road to Stopping Online Piracy (SOPA) and PROTECT IP (PIPA) has had some twists and turns due to technical constraints imposed by the basic design of the Internet's Domain Name System (DNS). PIPA's (and SOPA's) provisions regarding advertising and payment networks appear to be well grounded in the law enforcement tradition called following the money, but other provisions having to do with regulating American Internet Service Providers (ISPs) so as to block DNS resolution for pirate or infringing web sites have been shown to be ineffectual, impractical, and sometimes unintelligible. more
"Comparisons with Telecommunications Policy" is the focus of part two of a three-part series based on a study prepared by Karl M. Manheim, Professor of Law at Loyola Law School and Lawrence B. Solum, Professor of Law at University of San Diego. Special thanks and credit to Hastings Communications and Entertainment Law Journal, Vol. 25, p. 317, 2004. ...In the United States, an independent federal agency, under the direction of Congress, is charged with developing and implementing policies governing the major telecommunications industries. These include broadcast radio and television, wireline and wireless telephony, and video distribution via cable, wireless, and satellite. One might wonder why the Federal Communications Commission ("FCC") does not likewise have jurisdiction, at least in the US, over perhaps the most significant telecommunications industry -- the Internet. more
Mid-January 2012 marked a major inflection point for digital copyright policy in the United States... Yet no one involved with Congressional interaction on either side of the issue believes it has been sidetracked for long, and "Hollywood" and "Silicon Valley" are both plotting their next moves in this high-stakes game to further define the responsibilities and potential liabilities... The resolution of this dispute will determine the ability of Internet services to move to "the cloud"... more
As the steward of .ORG, Public Interest Registry is committed to serving as an "exemplary registry" for the DNS. As part of that mission, PIR published our Anti-Abuse Principles last year that serve as our north star to address questions of abuse. As PIR has stated on many occasions, generally speaking, the DNS is not the appropriate place to address questions of website content abuse because of the blunt tool we as a registry have and the collateral damage that can be caused by suspending a domain name for a piece of content. more
The debate surrounding network usage fees in Brazil has intensified following the approval of Bill 469/2024 by the House of Representatives' Communications Committee in early December 2024. This bill prohibits telecommunications operators from charging internet companies based on data traffic. While this is merely a preliminary step in a lengthy legislative process, it signals that proposals from telecom companies to implement network usage fees are unlikely to gain traction. more
In June, the net neutrality debate took an unexpected turn when the Netherlands leap-frogged the USA to became the first country to legislate for mobile net neutrality. Business models for fixed and mobile networks must shift toward volume charges. The net neutrality debate has been seen not having much relevance outside the USA because the plight of carriers there was aggravated by unlimited usage. more
Suppose you wanted to know who operates a website at a given domain name. Perhaps you suspect that the domain name is pointing to a website that offers illegal content, or you may just want to send a comment to its authors. Conveniently, the Internet provides a so-called "WHOIS" system that ordinarily provides contact information for each registered domain. But in the case of many hundreds of thousands of domains, the WHOIS data just isn't accurate. more
As you read this, please keep in mind that I say it all with a track record nearly 14 years of being proactive and having a zero-tolerance policy toward criminal activity and network abuse on our system. We have great relationships with Law Enforcement Agencies both here in Canada and abroad. We are always helpful and (usually) happy to answer questions, and help LEA understand the complexities and nuances of the internet. We've had the good fortune to meet some really intelligent and clued in cybercrime units. We participate in numerous communities in combating net.abuse and cybercrime. more
The U.S. has introduced a new visa restriction policy targeting individuals implicated in the misuse of commercial spyware. Secretary of State Antony Blinken announced that these restrictions would apply to those involved in, facilitating, or benefiting from the abuse of such technology. more
Some of the root server operators post public statistics for their domain name traffic at the top-level. For example, the graph (which can take a bit of time to generate, given ICANN's slow servers) for the L-root server's most popular Top-Level Domain (TLD) queries demonstrates, to no one's surprise, that .com is king. What's more interesting, though, especially given the new generic Top-Level Domain (gTLD) debate, is to look at the most popular invalid (non-existent) TLDs. more
As we work on this final CircleID essay addressing the last four Articles in the UDHR, we explore how the UDHR provides the principles on which to build the rights and responsibilities of digital citizenship and bring integrity and trust to cyberspace and the Internet ecosystem. We reflect on what we have learned. For us, the authors of this series, we are reminded that trust in the processes of government, business entities, and society is central to the wellbeing of society, our communities, our families, and ourselves. more
Three years ago, the first Internet-Draft on Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP) was published, which will become a Request for Comments (RFC). The IETF Registration Protocols Extensions (REGEXT) working group is the home of the coordination effort for standards track EPP extensions. They released eight RFCs over the last couple of years, and they are currently working on more than 15 Internet-Drafts. more