Policy & Regulation

Blogs

What Can We Learn From 160 Years of Tech Diplomacy at ITU?

On 17 May 1865, 20 European states convened to establish the International Telecommunication Union (ITU) to streamline the clunky process of sending telegraph messages across borders. 160 years later, ITU's anniversary is more than a mere commemorative moment; it is a stark reminder that multilateral cooperation is beneficial and necessary in our increasingly interconnected world.

When Space Becomes Infrastructure: Governance Challenges in Record-Breaking Week for Satellites

This past week offered a striking illustration of the pace and scale at which our shared orbital environment is evolving. In less than 24 hours, six rockets were launched from different parts of the globe, each contributing to the rapid expansion of low Earth orbit (LEO) infrastructure. China deployed a new set of Guowang satellites, while SpaceX launched two batches of Starlink satellites - one from Vandenberg in California and another from Cape Canaveral in Florida. United Launch Alliance (ULA) successfully placed Amazon's Kuiper satellites into orbit...

Reviling Universal Service Subsidies and Then Showcasing the Results

Today, the Supreme Court will consider a challenge to the universal service subsidy program established soon after the introduction of telephone service by the AT&T Bell System and later officially adopted by the FCC as mandated by a 1996 law.1, 2 Universal service funding supports access to telephone and broadband service by subscribers in rural locales that commercial ventures will not serve absent a subsidy.

Bad News From the 2025 Munich Security Conference: Cyberspace Gets Weaponized

There was one unpleasant message from the 2025 Munich Security Conference (MSC), which will have probably far reaching consequences for the governance of the digital space: Cyberspace will be governed by the rules of geo-political conflicts. And it is a battlefield in the 21st century wars. Both in the "Bayerischer Hof" and in the "IHK Munich", where the 11th edition of the Munich Cybersecurity Conference (MCSC) took place, controversial debates circled around the question of how civilian and military use of digital services will interplay in the years to come.

A Threat to Europe’s Digital Human Rights Stewardship

In a contemporary era when the human rights, democracy, and the rule of law are under attack, Europe has asserted itself as the leading global digital steward for maintaining those values. However, doing so through its Digital Sovereignty initiatives is significantly dependent on the ability to produce timely technical standards that underpin the implementing legislation.

The Digital Sovereignty Ecosystem

The terms Digital Sovereignty or Souveraineté numérique have recently risen in prominence to describe the international rule of law as it applies to information and communication technologies. At a time when disinformation is proliferating and the rule of law, democracy, and human rights, together with long-standing relationships, are being cast aside, digital sovereignty is scaling in importance as a key defensive measure among many nations.

Beyond WHOIS: CircleID and Edgemoor Research Institute Inaugural Event on Balancing Privacy and Legitimate Data Needs

The global debate over Internet privacy and security took center stage in a webinar hosted by CircleID in partnership with the Edgemoor Research Institute. The event marked the first in a series exploring the delicate balance between safeguarding personal data and ensuring legitimate access to domain name registration details. As governments, cybersecurity experts, law enforcement, and intellectual property holders grapple with the evolving regulatory landscape, Project Jake seeks to establish a framework that prioritizes policy clarity, efficiency, and adaptability.

How Decades-Old Decisions Left U.S. Networks Vulnerable to Chinese Cyberintrusion

It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking.

Mark Zuckerberg’s Content Moderation Overhaul: Prelude to a Fragmented Internet and a Threat to Truth

Mark Zuckerberg's recent announcement of sweeping changes to Meta's content moderation policies marks a pivotal moment for the internet, democracy, and truth itself. The decision to replace third-party fact-checking with a decentralized "Community Notes" system and relocate trust and safety operations to Texas signals a shift in Meta's governance approach. This move is not only politically expedient but also a troubling prelude to the tech industry bowing to the political priorities of the incoming Trump administration.

IGF 2024 in Riyadh: AI, WSIS+20 and the Global South

"Building our Multistakeholder Digital Future" was the theme of the 19th edition of the UN-based Internet Governance Forum (IGF). It attracted more than 11.000 participants (Offline and Online) from all over the world in Riyadh/Saudi Arabia, December 15-19, 2024. In the 307 plenaries, workshops, open fora, lightening talks and other conversations in the meeting rooms and the lobby halls of the King Abdulaziz International Conference Center (KAICC), nearly everything...

ICANN CSG and NCSG Make Progress at ICANN81

The Commercial Stakeholder Group and Non-Commercial Stakeholder Group (together, the Non-Contracted Party House, or NCPH) met for a daylong Day 0 session on 8 November 2024, immediately prior to the opening of the ICANN81 meeting in Istanbul. This meeting follows one of a similar nature conducted prior to ICANN78 in Hamburg, which was the first joint NCPH meeting following the pandemic.

Crypto - The New Market for Lemons

Ever buy a used car only to realize later that you've purchased a lemon? That scenario occurs because of information asymmetry between the seller -- who knows the car is a lemon -- and the buyer who doesn't. Without transparency, the market assumed that any used car for sale is a lemon, so that drove down the price of good used cars. The good news is that thanks to the Internet, buyers now have access to data that can help them determine if a car is a lemon or a good buy.

Fragmented Connections: How Network Fees Threaten Brazil’s Internet

The debate surrounding network usage fees in Brazil has intensified following the approval of Bill 469/2024 by the House of Representatives' Communications Committee in early December 2024. This bill prohibits telecommunications operators from charging internet companies based on data traffic. While this is merely a preliminary step in a lengthy legislative process, it signals that proposals from telecom companies to implement network usage fees are unlikely to gain traction.

Starlink in the Spotlight: Growth, Challenges, and Future Ambitions

There is a lot of speculation that Starlink is positioned to get a lot more federal subsidy from the BEAD grant program. There are a few things that have to happen for that to come to pass, but that is not the only news about Starlink these days. Starlink announced in September that it reached four million customers worldwide. What is most impressive about that announcement is the rate of growth, with the company just hitting the three million customer mark in May of 2024.

International Law of Critical Internet Infrastructure [CII]: A Comparative Analysis

On Friday December 13, 2024 at 10:00–12:00 CET (09:00-11:00 AM UTC) the Lodz Cyber Hub at the University of Lodz Law School, an ICANN EURALO ALS, and the United Nations University – Comparative Regional Integration Studies (UNU-CRIS) hosts an online workshop 'International Law of Critical Internet Infrastructure: A Comparative Analysis of Europe and China'.

News Briefs

FCC Clears SpaceX, T-Mobile Deal to Expand Coverage to Dead Zones

Biden Administration to Back UN Cybercrime Treaty Amid Controversy

EU Internet Advocates Push Back Against Telecom “Fair-Share” Fees

NIS 2 Directive Set for Implementation with New Guidelines, But Concerns Remain

Malaysia Plans Internet “Kill Switch” to Curb Online Abuse

Senators Introduce COPIED Act to Combat AI-Driven Deepfakes

Canadian Bill S-210 Sparks Controversy Over Internet Regulations

UK First Country to Implement Cybersecurity Laws for Smart Devices, Including Banning Easily Guessable Default Passwords

Proposed Generative AI Disclosure Act Seeks Transparency and Fairness in AI Training Datasets

New FCC Rule Mandates Transparent Broadband Labels to Aid Consumer Choice

U.S. Congress Nears Breakthrough Agreement on National Online Data Protection Framework

FCC Updates Broadband Speed Standard, Aims for Nationwide High-Speed Internet Acces

CENTR Warns Against EU FiDA Proposal’s Impact on Consumer Access and Business Continuity

UN Treaty Threatens Cybersecurity, Warns Google

U.S. Implements New Visa Restrictions to Combat Commercial Spyware Abuse

NSA Admits Purchasing Americans’ Internet Browsing Data Without Warrants

Australia Launches Major Cybersecurity Revamp Following Recent Major Cyberattacks

CENTR Unveils Key Principles for Internet Policy Ahead of 2024 EU Elections

UK Online Safety Act Becomes Law Amid Controversy

Online Safety Bill: UK’s Digital Overhaul

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection