Policy & Regulation

Policy & Regulation / Recently Commented

No Spectrum Shortage, Just an Allocation Problem

As a new study from Citi Investment Research & Analysis make clear, the US does not have a spectrum shortage. We've just allowed a relatively small number of carriers to control the spectrum. ... Perhaps if we had an effective "use it or lose it" policy in place, or a heavy tax on unused spectrum a more vibrant market for this spectrum would emerge. more

ICANN and Ethics

On September 2nd ICANN opened a one-month public comment period asking whether its Conflict of Interest Policy and related Bylaws should be altered. In light of recent heightened scrutiny of ICANN's policies regarding permissible employment options for departing Directors and key employees this announcement might have been welcome news. Instead, it's a narrow, cart-before-the-horse initiative that seems tone-deaf to predictable stakeholder, political and public relations fallout. more

Government and Botnets

The US government is looking at telling ISPs how to deal with compromised customers and botnets. They're a bit late to the party, though. Most of the major commercial ISPs have been implementing significant botnet controls for many years now. more

Google Finds Nothing is Shovel Ready, Not Even for Free Fiber Build

Google is deploying fiber at its own expense in Kansas City, Kansas and Kansas City, Missouri to demonstrate the value of one gigabit (a gigabit is a billion bits -- a lot) per second residential Internet connections and perhaps to show at&t and Verizon and the cable companies how the search giant might fight back if its growth is restricted by their restrictions or limitations. ... Whoops. Google just learned the same lesson that President Obama learned in Stimulus 1 more

Multi-Stakeholder Debate at the IGF: Lessons from a Safari

Here at the IGF in Kenya, we're debating how governments, private sector, and civil society can improve the multi-stakeholder model that's helped the Internet become such a vital part of life around the world. Makes me think of another kind of multi-stakeholder model I saw last week on a photo safari in Kenya's Masai Mara National Reserve. more

Censorship, Email and Politics

Spamfiltering blocks email. This is something we all know and understand. For most people, that is everyone who doesn't manage an email server or work in the delivery field or create spamfilters, filtering is a totally unseen process. The only time the average person notices filters is when they break. The breakage could be blocking mail they shouldn't, or not blocking mail they should. more

Russia and China Propose UN General Assembly Resolution on “Information Security”

On September 12 China, the Russian Federation, Tajikistan and Uzbekistan released a Resolution for the UN General Assembly entitled "International code of conduct for information security." The resolution proposes a voluntary 12 point code of conduct based on "the need to prevent the potential use of information and communication technologies for purposes that are inconsistent with the objectives of maintaining international stability and security and may adversely affect the integrity of the infrastructure within States..." more

Internet: Government Dominance or Governance?

In an age where the world has gone global in many forms and guises, the political attention is more and more focussed on national, populist issues, that arise from fear for the unknown. I can't deny it: the future undoubtedly contains many uncertainties. This usually comes with a general public that's afraid and in fear of things they cannot oversee. Thus it is easily aroused by a populist leader who feeds on this fear and throws flammable material on the already smouldering fire. In a time where leadership is called for, it seems lacking. The Internet governance discussion demands visionary leadership on a cross border level and it needs it soon. more

Removing Principle of Confidentiality in ICANN’s NomCom is a Bad Idea

In its informal background paper "Applying the Highest Standard of Corporate Governance" (August 2011) the European Commission proposes to revise the procedures of ICANNs Nominating Committee (NomCom). Instead of the confidential treatment of applicants the EU calls for an open publication of "a full list of candidates". Is this a good idea? I don't think so. The rationale behind the EU proposal is "to improve confidence on the selection procedure" and "to avoid conflict of interests". But the proposed improvement is based on a wrong assumption... more

Underneath the Hood: Ownership vs. Stewardship of the Internet

As is well known to most CircleID readers - but importantly, not to most other Internet users - in March 2011, ICANN knowingly and purposefully embraced an unprecedented policy that will encourage filtering, blocking, and/or redirecting entire virtual neighborhoods, i.e., "top-level domains" (TLDs). Specifically, ICANN approved the creation of the ".XXX" suffix, intended for pornography websites. Although the owner of the new .XXX TLD deems a designated virtual enclave for morally controversial material to be socially beneficial for the Internet, this claim obfuscates the dangers such a policy creates under the hood. more

ICANN Finds Its Voice

I think we are finally getting somewhere: ICANN is no longer fluttering flusteredly whenever a lobbying group sends a nastygram over the transom. Case in point: a Association of National Advertisers (ANA) that arrived a few days ago, full of bombast and muscle-flexing, demanding that ICANN immediately stop the new gTLD program until a long list of demands from the ANA were met, or else the ANA would be forced to take some Very Scary Actions... more

Does ICANN Need to Evolve Its Code of Conduct?

If you follow the Internet governance world like I do, you've no doubt had time to ponder the news of former ICANN Board Chair Peter Dengate Thrush's appointment as Executive Chairman of Top Level Domain Holdings Limited (TLDH). This was a seemingly fast jump from the body that coordinates the Internet (whose most recent milestone was to approve the creation of new gTLDs) to one of the key companies that stands to actively benefit from this burgeoning part of the domain name industry. Further, he's taken up a position that, according to reports, will allow him to benefit substantially as well. more

Desperate Attempts to Drag the USA Into the Digital Economy

In the USA an interesting initiative has been taken by a number of leaders in the telco industry who are frustrated with the inability of the country to start building the high-speed broadband infrastructure that is needed for the development of its digital economy. While the Obama Administration has the right vision to make this happen - and the American National Broadband Plan is a good example of this - the dysfunctional political state of the country makes it impossible to establish the industry transformation needed to make this happen. more

Is Cybersecurity a Priority? You Wouldn’t Know It If You Go by Top Level Defections

In the US administration, we see important people like incoming Secretary of Defense Leon Panetta say at his Senate confirmation hearing that "a strong likelihood that the next Pearl Harbor" could well be a cyberattack that cripples the U.S. power grid and financial and government systems. He also said that cybersecurity will be one of the main focuses of his tenure at the Pentagon. But when you look at what is actually happening in cyber security, there is more position jockeying than there is real progress. more

Alignment of Interests in DNS Blocking

I've written recently about a general purpose method called DNS Response Policy Zones (DNS RPZ) for publishing and consuming DNS reputation data to enable a market between security companies who can do the research necessary to find out where the Internet's bad stuff is and network operators who don't want their users to be victims of that bad stuff... During an extensive walking tour of the US Capitol last week to discuss a technical whitepaper with members of both parties and both houses of the legislature, I was asked several times why the DNS RPZ technology would not work for implementing something like PROTECT-IP. more