Thousands of Russians in Moscow and other cities rallied on Sunday against tighter internet restrictions. The protest is reported to be one of the most prominent in the Russian capital in years. more
If you are, like me, not in Busan, South Korea, for the 2014 ITU Plenipotentiary Conference but are curious about what is going on there, my Internet Society colleagues on our public policy team have been posting regular updates to the Internet Society's blog and to the @ISOCPolicy Twitter account... Given that I work in the technology side of Internet Society's work and don't have the cycles to keep up-to-date with everything going on there in Busan, I've found these updates very helpful in understanding some of the major events happening at the ITU Plenipot 2014. more
The Internet Society's NY Chapter (ISOC-NY) is delighted to present Milton Mueller's first full exposition of his new book Networks and States: The Global Politics of Internet Governance at NYU on Tuesday December 14 2010. Prof. Mueller is a co-founder of ICANN's NonCommercial User's Constituency and a renowned cyberlibertarian. more
Toward the end of last week, the world waited with bated breath for the outcome of the 21st annual meeting of the Conference of the Parties (COP) of the UN Framework Convention on Climate Change (UNFCC). The meeting, commonly called COP 21, was held in Le Bourget, Paris, from November 30 to December 12; a bit too soon after the terrorists attacks on Paris earlier in November. COP 21 was important because COP 15 in Copenhagen (2009) failed to arrive at a global consensus... more
I’ve lately been looking at broadband policies that have shaped broadband, and I don’t think there has been any more disastrous FCC policy than the one that defines broadband by speed. This one policy has led to a misallocation of funding and getting broadband to communities that need it. The FCC established the definition of broadband as 25/3 Mbps in 2015, and before then, the definition of broadband was 4/1 Mbps, set a decade earlier. The FCC defines broadband to meet a legal requirement established by Congress and codified in Section 706 of the FCC governing rules. more
With GDPR coming into effect this May, it is almost a forgone conclusion that WHOIS as we know it today, will change. Without knowing the full details, how can companies begin to prepare? First and foremost, ensuring that brand protection, security and compliance departments are aware that a change to WHOIS access is on the horizon is an important first step. Just knowing that the ability to uncover domain ownership information is likely to change in the future will help to relieve some of the angst that is likely to occur. more
Thailand's military-appointed parliament on Thursday passed a controversial cybersecurity law which gives sweeping powers to state cyber agencies. more
The US Federal Communications Commission (FCC) released its 2019 Broadband Deployment Report on Wednesday stating the digital divide is shrinking substantially, and more Americans than ever have access to high-speed broadband. more
When Rogers Communications began promoting its Rogers@Home high-speed Internet service nearly a decade ago, the company branded it "the Internet on Cable." Years later, their service, as well as those of their competitors, is gradually morphing into "the Internet as Cable" as broadcasters, Internet service providers, and cultural groups steadily move toward the delivery of content online that bears a striking resemblance to the conventional cable model. more
In Canada at the moment a fight has been engaged between Bell Canada, a major carrier, and a recent decision of its regulator, the CRTC, concerning whether the CRTC (the Commission) made the correct decision when it said that the underlying transport system was "telecommunications", while the "app" that was carried was "broadcasting". The decision appealed from (the Klass decision) is important because it marks the first time the CRTC has made a decision on the idea that lies at the core of Internet thinking: that an application floats on top of transport layers. more
In the world of ICANN and Internet policy, complexity is manufactured to create an illusion that issues are impenetrably technical such that normal and everyday principles can't apply. This causes a pervasive and entrenched phenomenon of eyes that glaze over at the mere mention of the word "ICANN" -- including those of government regulators and other officials that might otherwise take more of an active interest. more
The most incredible thing about the dot-org sale is no longer the billion-dollar price tag. It's not surprise fait-accompli announcement. It's not the republican billionaires. It's that the proponents have continued to advocate for it in the midst of the worst crisis the world has faced since the second world war. The biggest crisis in almost a hundred years. One that will reverberate for generations. more
Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more
Thursday, September 8, 2016 was a terrible, horrible, no good, very bad day for the prospects of the IANA functions transition being completed by October 1, 2016. Indeed, that same date - but in 2017 - may be the earliest that the handoff from NTIA to ICANN can be completed, given what last Thursday. The day began with the announcement that Sen. Ted Cruz would be making his first Senate floor remarks since exiting the Republican Presidential race, and that the talk's focus would be a continuation and escalation of his long-standing opposition to "Obama's Internet giveaway". Shortly after 11 am, Sen. Cruz began speaking from his Senate desk... more
According to press reports, DHS is going to require federal computer contractors to scan for holes and start patching them within 72 hours. Is this feasible? It's certainly a useful goal. It's also extremely likely that it will take some important sites or applications off the air on occasion - patches are sometimes buggy (this is just the latest instance I've noticed), or they break a (typically non-guaranteeed or even accidental) feature that some critical software depends on. more