Feeds

US govt interference is a big deal, says Europe

Bush administration attempt to control internet not welcome

  • alert
  • submit to reddit

Eight steps to building an HP BladeSystem

European internet registries are preparing a fight-back against the US government following the latter's surprise decision to keep overall control of the "root zone file" that defines the internet's basic set-up.

Despite an increasing number of newspaper articles - all from US media organisations - claiming that the internet community is happy to let the US government continue its role, a recent meeting of registries from across Europe begs to differ.

Instead, those registries have agreed to build, test and install a new automated system for changing vital infrastructure information, thereby removing the US government's ability to meddle in the process.

The process is being pushed by Paul Kane, the head of CENTR - an organisation representing the majority of the world's top-level domains. Kane was quick to point out that the US government had done an excellent checking function on the internet's "root" since 1998 (when it first unexpectedly staked its claim), but noted that the US government's new "principles" state quite clearly that rather than "check" the function of the root - as it does now - it will "authorise" it.

He also claimed that the US' sudden change in position "has not gone down well in European government circles".

Kane asked the floor at a meeting of worldwide top-level domain owners whether they wished to have the ability to make changes to their own domains by themselves. Half the room raised their hands. He then asked who was willing to let the US government authorise those changes on their behalf. Not a single hand went up.

The automation plan will use existing and proven technologies and protocols to depoliticise the root by making it a purely technical matter, Kane said. He added that 23 registries had already agreed to run a test-bed for the new service, which should be up and running by October this year.

ICANN's contract for running the root files (through organisation IANA) ends in March 2006, by which point the world registries hope to have a full report on their alternative, automated process.

A website covering the while process will be set up at www.shared-responsibility.net soon. ®

Related story

Bush administration annexes internet

Mobile application security vulnerability report

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.