Feeds

US govt interference is a big deal, says Europe

Bush administration attempt to control internet not welcome

  • alert
  • submit to reddit

Top three mobile application threats

European internet registries are preparing a fight-back against the US government following the latter's surprise decision to keep overall control of the "root zone file" that defines the internet's basic set-up.

Despite an increasing number of newspaper articles - all from US media organisations - claiming that the internet community is happy to let the US government continue its role, a recent meeting of registries from across Europe begs to differ.

Instead, those registries have agreed to build, test and install a new automated system for changing vital infrastructure information, thereby removing the US government's ability to meddle in the process.

The process is being pushed by Paul Kane, the head of CENTR - an organisation representing the majority of the world's top-level domains. Kane was quick to point out that the US government had done an excellent checking function on the internet's "root" since 1998 (when it first unexpectedly staked its claim), but noted that the US government's new "principles" state quite clearly that rather than "check" the function of the root - as it does now - it will "authorise" it.

He also claimed that the US' sudden change in position "has not gone down well in European government circles".

Kane asked the floor at a meeting of worldwide top-level domain owners whether they wished to have the ability to make changes to their own domains by themselves. Half the room raised their hands. He then asked who was willing to let the US government authorise those changes on their behalf. Not a single hand went up.

The automation plan will use existing and proven technologies and protocols to depoliticise the root by making it a purely technical matter, Kane said. He added that 23 registries had already agreed to run a test-bed for the new service, which should be up and running by October this year.

ICANN's contract for running the root files (through organisation IANA) ends in March 2006, by which point the world registries hope to have a full report on their alternative, automated process.

A website covering the while process will be set up at www.shared-responsibility.net soon. ®

Related story

Bush administration annexes internet

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.