/ Recently Commented

Ignorance of History

An international institutional battle of sorts has been playing out in a segment of the trade press over the past couple of weeks over the venue of the Oct 2027 World Radiocommunication Conference (WRC-27). The treaty conference held under the auspices of the International Telecommunication Union (ITU) Radiocommunication Sector is part of a continuum of intergovernmental activities that began in Berlin in 1903. more

ICANN Warns of Possible Sanctions Over AFRINIC Election Irregularities

Mounting governance woes at the African Network Information Centre (AFRINIC) have drawn a sharp rebuke from the Internet Corporation for Assigned Names and Numbers (ICANN), which has issued a stern warning of a potential compliance review. more

OneWeb Can’t Come Close to Replacing Starlink in Ukraine, but It Could Complement It

Elon Musk assured us that he would not stop the Starlink service in Ukraine. But, given his feud with Trump, his criticism of President Zelensky, and his rash actions with DOGE, can he be trusted? (His termination of USAID is estimated to have resulted in 340,000 deaths so far.) When askedabout Musk's influence, Josef Aschbacher, director general of the European Space Agency, said he declined to comment on "the internal politics of the United States and who should influence these decisions" but added "If changes happen and if our US partners and friends are changing their plans, of course we will be ready for plan B. more

The WSIS+20 Roadmap: Baby Steps in the Right Direction

The final phase of the WSIS+20 review has started. The two co-facilitators, Ambassador Suela Janina from Albania and Ambassador Ekitela Lokaale from Kenia, published on May, 21, 2025, their road map. The WSIS+20 Roadmap will lead us to the WSIS High-Level Meeting of the UN General Assembly (UNGA), scheduled for New York at the UN HQ on December 16-17, 2025. The first intergovernmental consultations were held on May 30, 2025, in New York. Two online stakeholder consultations followed on June 9 & 10, 2025. more

The Growing Risk of Space Debris: How Satellite Proliferation Is Polluting Low-Earth Orbit

Low-orbit space is growing increasingly crowded. Starlink has over 7,100 satellites in orbit and has plans to grow to 30,000. Project Kuiper has plans for a constellation of 3,232 satellites. One Web's first-generation constellation has 648 satellites, with plans to grow to over 6,300 satellites. The Thousand Sails (Qianfan) constellation is planning for up to 15,000 satellites. Numerous countries and businesses are launching or planning for smaller constellations for a wide variety of purposes.
 more

ICANN Demands Fairness in AFRINIC Board Elections Amid Governance Concerns

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a formal call for greater transparency and procedural integrity in the ongoing board elections of the African Network Information Centre (AFRINIC). more

Smuggled Phone Reveals North Korea’s Regime Captures User Screens Every Five Minutes, Censors Texting

A smartphone smuggled out of North Korea has revealed the alarming extent of digital surveillance enforced by the Kim regime. Though it resembles a modern Android device, the software within tells a darker story: every five minutes, the phone covertly captures screenshots, storing them in an inaccessible folder for later state inspection. more

America’s Broadband Blind Spot: Audit Reveals Millions More Offline Than FCC Reports

A new audit has sharply challenged the Federal Communications Commission's (FCC) broadband availability estimates, revealing that 26 million Americans lack access to fixed 100/20 Mbps internet, 6.4 million more than the FCC claims. more

i2Coalition Launches ‘DNS at Risk’ Report, Warns of Rising DNS Abuse and Censorship

The i2Coalition has unveiled a new report and website, DNS at Risk, spotlighting the growing misuse of Internet infrastructure by governments to control online content. Released on June 3rd, the initiative documents how states are increasingly deploying DNS resolvers and IP filtering—originally neutral systems—as tools of censorship and enforcement. more

Cyberattacks Spur Boom in Insurance Demand Amid Rising Global Threats

A wave of high-profile cyberattacks is reshaping the global insurance industry, creating both risk and reward for major players. According to a new Bloomberg report, firms like Munich Re and Chubb are capitalising on surging demand for cyber insurance as artificial intelligence makes digital breaches more frequent and destructive. more

Japan Post Launches Digital Codes to Replace Traditional Addresses

Japan Post said Monday that it has launched a "digital address" system that links seven-digit combinations of numbers and letters to physical addresses. more

Increasing Broadband Price Competition Across the US

Competition has been creeping into broadband pricing for the last several years as cable companies have been using low introductory rates to try to win new customers and offering similarly low prices to try to keep them. Anybody who competes against the big cable companies will tell you that cable companies have been competing for years by offering two-year promotional prices to keep customers. However, competition might have gone into a new gear recently... more

A Targeted Blueprint for Tackling DNS Abuse

The NetBeacon Institute is pleased to publish its White Paper: Proposal for PDPs on DNS Abuse. We created this paper to support and advance ICANN Community discussions on potential policy development related to DNS Abuse. From our unique perspective, we believe there are a number of issues that are constrained enough to be a successful ICANN PDP and can make a meaningful difference in our collective work against DNS Abuse. more

ccTLD Registries Push Back Against EU’s Disinformation Crackdown

As the European Union presses ahead with its European Democracy Shield (EUDS) to counter foreign disinformation, European country code top-level domain (ccTLD) registries are urging caution. more

Towards a Generalised Threat-Scoring Framework for Prioritising Results From Brand Monitoring Programmes

The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more