Feeds

WCIT leak: CHAOS will REIGN if telco talks fail

Dubai discussion of International Telecoms Regulations could also mean nothing

Remote control for virtualized desktops

As delegates prepare for the intolerable privation of a five-star junket in Dubai to debate re-framing the decades-old International Telecommunications Regulations (ITRs), a leaked management briefing from September warns that chaos may reign if the talks don’t reach a consensus outcome.

The document (at WCIT Leaks, here (PDF)) was drawn up to get delegates to the retreat singing from the same song sheet, so to speak – or at least to make sure they know what’s on the set-list.

The document’s author holds the view that the Dubai meeting will be a battle of the blocs, with the USA, Europe and Asia broadly aligned on one side, Africa, Russia and the Arab states on the other. America’s favourite outcome would be to have the new ITRs as nearly-identical as possible to the old document, drawn up so long ago it still calls the ITU the “CCITT”.

The briefing suggests that if the ITRs are substantially revised, as many as 40 countries more-or-less aligned with the USA would refuse to sign the treaty, effectively splitting global Internet regulation.

Even if a heavily-revised set of ITRs were to emerge as the consensus – highly unlikely given America’s strong opposition to the treaty – the document warns of a likely “anti-ratification” campaign in OECD countries. The ITU apparently believes it would be able to counter such a campaign.

Complaining about the “well funded” campaign against the ITR revision process, the document claims that “The lobbying group that initiated the campaign has probably lost control of it and regrets the intensity of the attacks against ITU (the sponsors of that campaign support ITU-D, ITU-R, and much of ITU-T and probably did not realize that the attacks directed against WCIT would turn into general attacks on the ITU as a whole).”

It continues: “negative media coverage in the US continues, and is now starting to appear in developing countries, and the Secretariat continues its effort to counter this. In particular, as the Secretary-General has said publicly, we should encourage Member States to conduct open consultations at the national level.” ®

Beginner's guide to SSL certificates

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.