How the world is learning to love ICANN

As ICANN learns to play fair with redelegations


In case you aren't aware, how the Internet is run and will be run for future generations will be decided in the next 26 months. When a three-year "memorandum of understanding" (MoU) between the US government and the Internet Corporation for Assigned Names and Numbers (ICANN) ends on 30 September 2006, who gets to oversee this revolutionary medium will be decided. One way or another.

ICANN - a private Californian company - was supposed to have become an autonomous managing body years ago. The fact that it isn't, five years after it first signed the MoU, is an indication of how little the rest of the world has been willing to accept its authority. Why? Because until very recently it was run almost exclusively by North American computer scientists who showed almost no respect, and certainly no diplomacy, toward any views other than their own.

The distrust towards this supposedly global representative body grew as the Internet grew in importance and finally led to the situation that two months after ICANN signed the US government's MoU, the United Nations voted to set up an investigation into "Internet governance".

The “preparatory committee” for that investigation has just met (24-26 June 2004) and the final report will appear at the World Summit on the Information Society (WSIS) in Tunis on 16 November 2005. If ICANN hasn't managed to persuade the world of its importance and authority by then, it may become no more than a footnote in Internet history.

And waiting in the wings to take over is the International Telecommunications Union (ITU), which already oversees most of the world's communications technologies and also runs the WSIS meeting. With ICANN perceived as difficult, US-biased and unlistening, the ITU's support has grown dangerously in the past two years.

Unless ICANN can sway the world's governments, business and Internet communities right now, it may see itself consumed by the ITU and its dream of independence lost forever.

And so it does...

And that is precisely what it is doing. Dr Paul Twomey became president and CEO of ICANN on 27 March 2003. He has huge experience in ICANN but, vitally, comes from a diplomatic and government background. Within weeks of his appointment, Twomey realised what he had to do. He pulled in business managers and lawyers, instead of computer scientists playing at politics, and put performance before personality.

It is a tight schedule and the loss of techies at the top has niggled a few Internet old hands (the fact that an outage of the .org top-level domain this week was barely noticed by ICANN executives is telling), but it is having an effect and, incredibly, the world is gradually learning to love ICANN.

And if one issue strikes at the heart of the problems ICANN finds itself in, and demonstrates the changing environment, it is the matter of domain redelegation.

Every country has its own top-level domain (called a country-code top-level domain, or ccTLD) - .uk is for the UK, .de for Germany, .br for Brazil etc. But the way the Internet works, there is one authoritative record (or "root") of who runs all these domains. That root is owned and run by the Internet Assigned Numbers Authority (IANA). ICANN has very gradually, and against much opposition, taken over IANA and its role. And, in its desperation to be recognised by other countries at the Internet's authority, has abused the control IANA provides to get those running ccTLDs to sign contracts with it accepting its rule.

There are a large number of reasons why the person (or organisation) currently running a ccTLD would want it assigned to someone else, and more why someone else would want it assigned to them. The most significant movement at the moment is developing nations taking control of their own country's Internet presence after years of being run by knowledgeable Westerners, either for philanthropic reasons or for financial gain.

However, ICANN has in the past been guilty of only allowing someone else to take over the domain (for it to be "redelegated") if they sign up to its own contract, which gives ICANN significant rights over its status. This abuse even affected those that weren't asking for a redelegation. Ordinary maintenance of a domain, which sees large, key servers swapped occasionally, requires IANA to make changes. These changes were being delayed as a way of pressuring countries to sign up to ICANN's contract.

The bully-boy tactics backfired and for the rest of the world became a fundamental source of anger and mistrust against ICANN.

In the past month, and in the course of next month, however, this approach will finally - and belatedly - bethrown out the window. And, if ICANN's head of Policy Development Support, Paul Verhoef, is to be believed, the results of actions not words has already seen a positive response from the worldwide community.


Other stories you might like

  • Demand for PC and smartphone chips drops 'like a rock' says CEO of China’s top chipmaker
    Markets outside China are doing better, but at home vendors have huge component stockpiles

    Demand for chips needed to make smartphones and PCs has dropped "like a rock" – but mostly in China, according to Zhao Haijun, the CEO of China's largest chipmaker Semiconductor Manufacturing International Corporation (SMIC).

    Speaking on the company's Q1 2022 earnings call last Friday, Zhao said smartphone makers currently have five months inventory to hand, so are working through that stockpile before ordering new product. Sales of PCs, consumer electronics and appliances are also in trouble, the CEO said, leaving some markets oversupplied with product for now. But unmet demand remains for silicon used for Wi-Fi 6, power conversion, green energy products, and analog-to-digital conversion.

    Zhao partly attributed sales slumps to the Ukraine war which has made the Russian market off limits to many vendors and effectively taken Ukraine's 44 million citizens out of the global market for non-essential purchases.

    Continue reading
  • Colocation consolidation: Analysts look at what's driving the feeding frenzy
    Sometimes a half-sized shipping container at the base of a cell tower is all you need

    Analysis Colocation facilities aren't just a place to drop a couple of servers anymore. Many are quickly becoming full-fledged infrastructure-as-a-service providers as they embrace new consumption-based models and place a stronger emphasis on networking and edge connectivity.

    But supporting the growing menagerie of value-added services takes a substantial footprint and an even larger customer base, a dynamic that's driven a wave of consolidation throughout the industry, analysts from Forrester Research and Gartner told The Register.

    "You can only provide those value-added services if you're big enough," Forrester research director Glenn O'Donnell said.

    Continue reading
  • D-Wave deploys first US-based Advantage quantum system
    For those that want to keep their data in the homeland

    Quantum computing outfit D-Wave Systems has announced availability of an Advantage quantum computer accessible via the cloud but physically located in the US, a key move for selling quantum services to American customers.

    D-Wave reported that the newly deployed system is the first of its Advantage line of quantum computers available via its Leap quantum cloud service that is physically located in the US, rather than operating out of D-Wave’s facilities in British Columbia.

    The new system is based at the University of Southern California, as part of the USC-Lockheed Martin Quantum Computing Center hosted at USC’s Information Sciences Institute, a factor that may encourage US organizations interested in evaluating quantum computing that are likely to want the assurance of accessing facilities based in the same country.

    Continue reading
  • Bosses using AI to hire candidates risk discriminating against disabled applicants
    US publishes technical guide to help organizations avoid violating Americans with Disabilities Act

    The Biden administration and Department of Justice have warned employers using AI software for recruitment purposes to take extra steps to support disabled job applicants or they risk violating the Americans with Disabilities Act (ADA).

    Under the ADA, employers must provide adequate accommodations to all qualified disabled job seekers so they can fairly take part in the application process. But the increasing rollout of machine learning algorithms by companies in their hiring processes opens new possibilities that can disadvantage candidates with disabilities. 

    The Equal Employment Opportunity Commission (EEOC) and the DoJ published a new document this week, providing technical guidance to ensure companies don't violate ADA when using AI technology for recruitment purposes.

    Continue reading
  • How ICE became a $2.8b domestic surveillance agency
    Your US tax dollars at work

    The US Immigration and Customs Enforcement (ICE) agency has spent about $2.8 billion over the past 14 years on a massive surveillance "dragnet" that uses big data and facial-recognition technology to secretly spy on most Americans, according to a report from Georgetown Law's Center on Privacy and Technology.

    The research took two years and included "hundreds" of Freedom of Information Act requests, along with reviews of ICE's contracting and procurement records. It details how ICE surveillance spending jumped from about $71 million annually in 2008 to about $388 million per year as of 2021. The network it has purchased with this $2.8 billion means that "ICE now operates as a domestic surveillance agency" and its methods cross "legal and ethical lines," the report concludes.

    ICE did not respond to The Register's request for comment.

    Continue reading
  • Fully automated AI networks less than 5 years away, reckons Juniper CEO
    You robot kids, get off my LAN

    AI will completely automate the network within five years, Juniper CEO Rami Rahim boasted during the company’s Global Summit this week.

    “I truly believe that just as there is this need today for a self-driving automobile, the future is around a self-driving network where humans literally have to do nothing,” he said. “It's probably weird for people to hear the CEO of a networking company say that… but that's exactly what we should be wishing for.”

    Rahim believes AI-driven automation is the latest phase in computer networking’s evolution, which began with the rise of TCP/IP and the internet, was accelerated by faster and more efficient silicon, and then made manageable by advances in software.

    Continue reading
  • Pictured: Sagittarius A*, the supermassive black hole at the center of the Milky Way
    We speak to scientists involved in historic first snap – and no, this isn't the M87*

    Astronomers have captured a clear image of the gigantic supermassive black hole at the center of our galaxy for the first time.

    Sagittarius A*, or Sgr A* for short, is 27,000 light-years from Earth. Scientists knew for a while there was a mysterious object in the constellation of Sagittarius emitting strong radio waves, though it wasn't really discovered until the 1970s. Although astronomers managed to characterize some of the object's properties, experts weren't quite sure what exactly they were looking at.

    Years later, in 2020, the Nobel Prize in physics was awarded to a pair of scientists, who mathematically proved the object must be a supermassive black hole. Now, their work has been experimentally verified in the form of the first-ever snap of Sgr A*, captured by more than 300 researchers working across 80 institutions in the Event Horizon Telescope Collaboration. 

    Continue reading
  • Shopping for malware: $260 gets you a password stealer. $90 for a crypto-miner...
    We take a look at low, low subscription prices – not that we want to give anyone any ideas

    A Tor-hidden website dubbed the Eternity Project is offering a toolkit of malware, including ransomware, worms, and – coming soon – distributed denial-of-service programs, at low prices.

    According to researchers at cyber-intelligence outfit Cyble, the Eternity site's operators also have a channel on Telegram, where they provide videos detailing features and functions of the Windows malware. Once bought, it's up to the buyer how victims' computers are infected; we'll leave that to your imagination.

    The Telegram channel has about 500 subscribers, Team Cyble documented this week. Once someone decides to purchase of one or more of Eternity's malware components, they have the option to customize the final binary executable for whatever crimes they want to commit.

    Continue reading

Biting the hand that feeds IT © 1998–2022