Feeds

ICANN boss: 'Russia and China will NOT take over interwebs'

Is he Putin us on?

Beginner's guide to SSL certificates

ICANN boss Fadi Chehadé appeared before a House of Representatives committee on Wednesday in an attempt to reassure troubled lawmakers that China and Russia will not take control of the internet once the US government pulls out in 2015.

"Do you really think that Vladimir Putin ... can't figure out some way to get control? China and Russia can be very resourceful," asked Louisiana Republican Steve Scalise, according to Reuters.

Chehadé apparently responded by arguing that the “multi-stakeholder” model ICANN hopes to have in place once the US Department of Commerce contract expires in 2015, will help ensure no one nation has too much influence.

“I agree that people will talk about capturing [control of ICANN], but they haven't,” he said. “For 15 years ICANN has operated without one government or any government capturing the decision making.”

The anti-China/Russia voices, no doubt already wearyingly familiar for Chehadé, will only grow louder in the run up to September 2015.

In fact, such is the political consternation over the move that three House of Representatives members have proposed legislation which will force the Commerce department to maintain control over ICANN’s activities until Congress has reviewed the proposals.

Given the speed at which legislators move, this could lead to a significant delay in the handover timetable.

Those who support the Obama administration’s decision say that the Commerce department’s oversight capacity had become little more than symbolic – that ICANN had been running the show ever since the department outsourced the running of the net to the global non-profit in ’98.

However, those worried about what the future may hold believe that, symbolic or not, the US government’s withdrawal could leave a dangerous vacuum which the likes of China or Russia may exploit.

In a statement announcing the proposals in March, Chehadé had the following:

We are inviting governments, the private sector, civil society, and other internet organisations from the whole world to join us in developing this transition process. All stakeholders deserve a voice in the management and governance of this global resource as equal partners.

However, it remains to be seen what form this transition plan will take. Whatever happens it’s likely to be a long, drawn-out affair.

“If we finish it in 18 months, great. If we don't, then you know what, it doesn't matter, let's get it right,” Chehadé told Reuters.

Security for virtualized datacentres

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.