/ Most Viewed

2023 Routing Security Summit Starts July 17 - Participate Virtually

Interested in learning more about routing security? How it can affect your connectivity supply chain? What are best practices for enterprises and organizations? What is the role of CSIRTs in securing routing? What are governments doing now, and planning to do in the future around routing security? more

Spam from Mobile Networks? Who Woulda Thought…

Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits more

Thinking Carefully About New gTLD Objections: String Confusion (Part 1 of 4)

Since speaking last fall on community-based TLDs at the New gTLD Summit in Los Angeles, I have been asked a number of times to provide input on the objections ICANN allows in its New gTLD Applicant Guidebook ("AGB" or simply the "Guidebook"). As the March 13 deadline approaches, I now present the first of a series of four spotlight articles on the subject -- one on each of the four permissible grounds for objection. more

Know Someone Who Has Made the Internet Better? Postel Award Nominations Deadline May 18

Do you know of someone who has made the Internet better in some way who deserves more recognition? Maybe someone who has helped extend Internet access to a large region? Or wrote widely-used programs that make the Internet more secure? Or maybe someone who has been actively working for open standards and open processes for the Internet? more

ICA Tells DOC of Concerns Over USG and GAC “Scorecards”

The ICA has just dispatched a letter to Assistant Secretary of Commerce Lawrence Strickling in advance of the talks scheduled in Brussels on February 29-March 1 between ICANN's Board and its Governmental Advisory Committee (GAC). Our letter expresses strong concerns that the positions being advocated by the U.S. government and the GAC regarding the proposed Final Applicant Guidebook (AG) for new generic Top-Level Domains (gTLDs) would be detrimental to ICANN's multi-stakeholder policy process and would undermine the rights of legitimate registrants at new gTLDs. more

The Sovereignty Paradox: What Iran’s 2026 Shutdown Reveals About the Fragmenting Internet

Iran's 2026 internet shutdown was not a glitch but a trial of digital sovereignty, revealing how easily connectivity can be weaponised to silence society, concentrate state power, and fracture the promise of a global internet. more

“Restoring” Internet Freedom for Whom?

Recently, a colleague in the Bellisario College of Communications asked me who gets a freedom boost from the FCC's upcoming dismantling of network neutrality safeguards. He noted that Chairman Pai made sure that the title of the FCC's Notice of Proposed Rulemaking is: Restoring Internet Freedom. My colleague wanted to know whose freedom the FCC previously subverted and how removing consumer safeguards promotes freedom. more

Facebook vs Google: The Pot Calling the Kettle Black

In case you missed it a few days, a story broke that said that Facebook was caught hiring a PR firm to spread stories about Google about how they invade people's privacy... Even though I work for Microsoft and therefore can hardly be considered unbiased, I think Microsoft would be in a position to call out others for lack of privacy protection. I say this based on the fact that in my division, every new feature that we implement has to go through Privacy reviews... more

Is 47 USC 230(c) an Immunity or an Affirmative Defense (Does it Matter?)

Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more

McCain’s Tech Policy

I was hoping that McCain's Tech Policy would emphasize and extend the two McCain pro-Internet initiatives -- the McCain Lautenberg Community Broadband Act and Spectrum Re-regulation, neither of which have yet seen the light of day -- but it doesn't. In the first case, it makes a vague nod in the direction of "market failure and other obstacles." In the second, it treats spectrum policy as a done deal; now that we can surf the Web in coffee shops, we're done. more

Amazon Announces Project Kuiper Customer Terminals with Speeds up to 1Gbps

Amazon has announced the development of a range of customer terminals for its broadband satellite network, Project Kuiper. The company's first device is a "standard" customer terminal that measures less than 11 inches square and one inch thick and weighs less than five pounds. more

Charter Approved to Review All Rights Protections Mechanisms in All Generic TLDs

On March 9th, 2016, during its final open meeting at ICANN 55 in Marrakech, Morocco, the Generic Names Supporting Organization (GNSO) Council approved a motion that I proposed to adopt the Charter of the Policy Development Process (PDP) to Review all Rights Protections Mechanisms (RPMs) in all Generic Top-Level Domains. I serve on the Council as one of the two representatives of ICANN's Business Constituency, and my fellow Councilors have designated me to serve as the GNSO's Liaison to the Working Group (WG), and as its Interim Chair. more

Governing the Invisible: AI Risks in Telecom Infrastructure Outpace Global Legal Frameworks

As AI systems take on critical roles in telecommunications, global regulatory frameworks remain outdated and fragmented, leaving essential infrastructure vulnerable to novel risks that current laws on cybersecurity and data protection fail to address. more

Satellites Directly to Cellphones

AT&T and satellite company AST SpaceMobile announced a partnership to provide satellite cellular service directly from satellites to cellphones. This will provide a service that is much needed for the billions of remote users who are not in the range of a cell tower. This is an emerging industry that is still being referred to by different acronyms. more

Battling Over Clouds

More than 40 years ago, the FCC was worried about telephone companies using their power over communications to control the then-nascent (and competitive) data processing marketplace. The Bell System at that point was already banned from providing services that weren't common carriage communications services (or "incidental to" those communications services)... In a 1999 article in the Texas Law Review, Steve Bickerstaff pointed out that Computer 1 meant that no one could provide a "computer utility" service... Today, we'd call the "computer utility" something different -- we'd use the term "cloud computing." more