The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more
The Copyright Alert System, the result of a deal between big content and big ISPs, is a graduated response program - popularly known as the six strikes - that escalates from nastygrams, to copyright school, to Internet throttling. Just like SOPA/PIPA, enforcement targets will be arbitrarily selected by the content owners, but unlike SOPA/PIPA there will be no appeal via the courts - only to an arbitration firm hired by the program. more
The proposals by the European and Arab telcos that are being considered at the World Conference on International Telecommunications (WCIT) conference in Dubai later this year are most certainly facing defeat. This is not because the USA believes that the international telecommunications regulations (ITR) cannot be discussed by the ITU. America has a rather strange set of national regulations in which they have combined internet infrastructure and content -- and as such they claim that this no longer has anything to do with telecommunications. more
At his first meeting as CEO of ICANN, Fadi Chehade showed up ready to work AND to listen. ICANN's new CEO described his objectives for the organization which included 1) affirmation of purpose, 2) operational excellence, 3) internationalization, and 4) evolution of the multi-stakeholder model on which ICANN is built. He also described significant organizational changes to ICANN leadership and staff... more
Over the past days a lot has been said and written on counter hacking by enforcement agencies. The cause is a letter Dutch Minister I. Opstelten, Security & Justice, sent to parliament. Pros and cons were debated and exchanged. Despite the fact that I perfectly understand the frustration of enforcement agencies of having to find actionable data and evidence that gets criminals convicted in a borderless, amorphous environment, a line seems to be crossed with this idea presented to Dutch parliament. Where are we? more
Forty days. That's how long Fadi Chehade has had to get a handle on the most complex, diverse and important non-profit corporation the world has ever known. The last guy to face such an unforgiving timeline was measuring timber in cubits. So if Cheade is Noah, I guess that makes ICANN Chairman Steve Crocker God, telling Fadi to wrangle all these diverse (and often diverging) constituencies and march them two-by-two into the boat, ahead of the coming storm. more
ICANN is clearly changing with the new CEO making immediate changes to the organizational structure and Compliance announcing a number more effective tools and procedures at Sunday's At-Large Advisory Committee (ALAC) and Regional Leadership Meetings. It seems very ambitious and they will need to be because our year-long research, publicly distributed here for the first time, shows a complete breakdown in ICANN's Compliance functions on every level possible. more
The Budapest Conference on Cyberspace brought together nearly 20 heads of states and ministers plus 700 high level experts from various stakeholder groups from 60 countries. However, after two days of discussion there is less clarity where the so-called "London Process" - established by the British Foreign Minister William Hague in November 2011 in London - will go. The next meeting is scheduled for October 2013 in Seoul. Another flying circus for another Internet Governance talking shop? more
Sen. Amy Klobuchar has introduced a new bill, the "Cloud Computing Act of 2012" (S.3569), that purports to "improve the enforcement of criminal and civil law with respect to cloud computing." Given its introduction so close to the election, it's doubtful this bill will go anywhere. Still, it provides an excellent case study of how even well-meaning legislators can botch Internet regulation. more
As the battle rages over threats to the Internet architecture, a recent publication over the Patent Application for Domain Name Transfers by Verisign is disturbing for those who advocate an open and free Internet. The Application is based on an immediate and direct threat towards an open and free Internet. Just in case people are tempted to think that this was a prank given that they filed it on the 1 April 2011, searches at the United States Patents and Trademark Office (USPTO) reveals that this is a legitimate application . more