Internet Governance

Internet Governance / Featured Blogs

GAC, Inside Out: When GAC Members Abuse ICANN Procedures…

There is no doubt that the new gTLD program has been the most encouraging revolutionary program in the history of internet. As everybody expected, there have been lots of positive and negative insights about this program in recent years and during the process of development of the program, pushing ICANN to be very conservative in its program in order to satisfy all internet stakeholders. more

Google’s .App TLD Application Under Fire

I've written about "closed generic" new TLD applications several times over the last year. I'm opposed to them, as I've said in the past and continue to say today. However I've generally been supportive of "restricted" TLDs. The Association for Competitive Technology (ACT) has serious concerns about Google's application for .app and want ICANN's board of directors to treat as a "closed generic". more

Here’s Looking at You…

Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services... These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads into one of these clouds, then it's no longer necessarily entirely your data; it may have become somebody else's data too... more

ICANN Board Resolutions May Enable New gTLDs to Potentially Launch in Fall

In an attempt to appease the Governmental Advisory Committee, ICANN's New gTLD Program Committee directed ICANN staff to amend the Registry Agreement so that all New gTLD Registries will be required to include a provision in its Registry-Registrar Agreement that requires Registrars to include in their Registration Agreement a provision prohibiting Registered Name Holders from distributing malware, abusively operating botnets, phishing, piracy, trademark or copyright infringement, fraudulent or deceptive practices, counterfeiting or otherwise engaging in activity contrary to applicable law, and providing (consistent with applicable law and any related procedures) consequences for such activities including suspension of the domain name. more

Urgent Need to Revisit Internet Governance (WCIT-12)

Developments over the past few months - and especially the revelations about the spying work of the NSA on friendly governments and their people and businesses - show how important it is to try and establish some high-level strategies relating to managing the governance of the internet. While companies like Google have been lobbying hard against WCIT-12 - basically because they are opposed to any government interference in the internet - the reality is that, clearly without their knowledge, their own American government through the NSA is already directly interfering in their network. more

The Internet Is Designed for Surveillance

The current implementation of the Internet is hierarchical in that we get IP addresses from providers and then use a DNS that is rooted. We go even further in requiring that we conform to conditions on our intent (AKA our use) of connectivity in order to get a temporary lease on something so fundamental as our identity in the guise of a DNS name. We go further by accepting the idea that we communicate within pipes owned by service providers who can dictate terms in order to extract a rent. more

Internet Infrastructure: Stability at the Core, Innovation at the Edge (Part 2 of 5)

For nearly all communications on today's Internet, domain names play a crucial role in providing stable navigation anchors for accessing information in a predictable and safe manner, irrespective of where you're located or the type of device or network connection you're using. Over the past 15 years hundreds of millions of domain names have been added to the Internet's Domain Name System (DNS), and well over two billion (that's Billion!) new users, some ~34 percent of the global population, have become connected. more

Dot GCC Applicant Fights for Survival

Much has been said about the advice ICANN's Governmental Advisory Committee submitted to the Board of directors at the close of last April's Beijing International Meeting. The recommendations given by governments will probably be the subject of much more discussion in the weeks ahead and the run-up to ICANN's next meeting in Durban (South Africa) in July. Especially now that the comment period opened after Beijing on GAC Advice has closed, and that ICANN has published its summary of the comments received. more

NSA, Prism and Internet Exchange Points in Canada

As the operator of the registry for the .CA top-level domain and the domain name system (DNS) infrastructure that supports it, I am uncomfortable, though not surprised, with the knowledge that a government is monitoring the activities of Internet users. And while recent reports about the National Security Agency's top-secret PRISM program actively monitoring Internet users in the United States and (by default) citizens of other countries - Canada included - are on the front page of newspapers around the world, Internet surveillance is not exactly new. more

Provoking National Boundaries on the Internet? A chilling thought…

The impact of the recently revealed US government data collection practices may go well beyond the privacy ramifications outlined in the Internet Society's statement: expect a chilling effect on global, resilient network architecture. As governments of other countries realize how much of their citizens' traffic flows through the US, whether or not it is destined for any user or service there, expect to see moves to curtail connections to and through the US. more

Industry Updates