Jovan Kurbalija Jovan 7Th Edition7th an Introduction to an Introduction INTERNET GOVERNANCE

Total Page:16

File Type:pdf, Size:1020Kb

Jovan Kurbalija Jovan 7Th Edition7th an Introduction to an Introduction INTERNET GOVERNANCE About the author AN INTRODUCTION TO INTERNET GOVERNANCE Dr Jovan Kurbalija is the founding director of DiploFoundation and head of the Geneva Internet The history of this book is long, in Internet time. The Platform. A former original text and the overall approach, including the diplomat, his professional five-basket methodology, were developed in 1997 for and academic background a training course on information and communications is in international law, technology (ICT) policy for government officials from diplomacy, and information Commonwealth countries. In 2004, Diplo published technology. In 1992, he established the Unit for a print version of its Internet governance materials, Internet Governance – Issues, Information Technology and Diplomacy at the AN INTRODUCTION TO INTERNET GOVERNANCE An Introduction to in a booklet entitled Actors and Divides. This booklet formed part of the Mediterranean Academy of Diplomatic Studies in Jovan Kurbalija Malta. After more than ten years of training, research, Information Society Library, a Diplo initiative driven and publishing, in 2002 the Unit evolved into by Stefano Baldi, Eduardo Gelbstein, and Jovan An Introduction to Internet Governance provides a comprehensive overview of the main is- DiploFoundation. Kurbalija. In 2008, a special, revised version of sues and actors in this field. Written in a clear and accessible way, supplemented with fig- the book, entitled simply An Introduction to Internet ures and illustrations, it focuses on the technical, security, legal, economic, development, Governance, was published in cooperation with Since 1994, Dr Kurbalija has been teaching courses INTERNET sociocultural, and human rights aspects of Internet governance. Providing a brief introduc- NIXI India on the occasion of the 2008 Internet on the impact of ICT/Internet on diplomacy and tion, a summary of major questions and controversies, and a survey of different views and Governance Forum (IGF) held in Hyderabad, India. Internet governance. Currently, he is visiting lecturer approaches for each issue, the book offers a practical framework for analysis and discus- In 2009, a revised third edition was published in at the College of Europe in Bruges, Belgium, and sion of Internet governance. cooperation with the Ministry of Communication the University of St Gallen, Switzerland. He has GOVERNANCE and Information Technology of Egypt. The fourth lectured at the Mediterranean Academy of Diplomatic Jovan Kurbalija Since 1997, more than 3000 diplomats, computer specialists, civil society activists, and aca- edition (2010) was produced in partnership with the Studies in Malta, the Vienna Diplomatic Academy in Jovan Kurbalija demics have attended training courses based on the text and approach presented in this Secretariat of the Africa-Caribbean-Pacific Group Austria, the Dutch Institute of International Relations book. With every delivery of the courses, materials are updated and improved, making the of Countries and the European Union. The fifth (Clingendael), the Graduate Institute of International book particularly useful as a teaching resource for introductory studies in Internet govern- edition (2012) was published in cooperation with and Development Studies in Geneva, Switzerland, ance. the Azerbaijan Diplomatic Academy (ADA). The sixth the UN System Staff College, Torino, Italy, and the edition was published in September 2014. The late University of Southern California, in Los Angeles. He Eduardo Gelbstein made substantive contributions conceptualised and has directed DiploFoundation’s to the sections dealing with cybersecurity, spam, and Internet Governance Capacity Building Programme privacy. since 2005. Dr Kurbalija’s main research interests include the development of an international regime for the Internet, the use of the Internet in diplomacy Thanks are due to the team of curators working on GIP Digital Watch and modern negotiations, and the impact of the the observatory, who contributed Internet on modern international relations. to updating various parts of the 2016 edition: Radek 7th edition Bejdak, Stephanie Borg Psaila, Katharina Höne, Tereza Horejsova, Arvin Kamberi, Aida Mahmutović, Dr Kurbalija has published and edited numerous Adriana Minović, Virginia Paque, Roxana Radu, books, articles, and chapters, including: The Internet Vladimir Radunović, Barbara Rosen Jacobson, and Guide for Diplomats, Knowledge and Diplomacy, The Sorina Teleanu. Stefano Baldi, Eduardo Gelbstein†, Influence of IT on Diplomatic Practice, Information and Vladimir Radunović all contributed significantly Technology and the Diplomatic Services of Developing to developing the concepts behind the illustrations Countries, Modern Diplomacy, and Language and in the book. Comments and suggestions from other Diplomacy. With Stefano Baldi and Eduardo Gelbstein, edition7th colleagues are acknowledged in the text. he co-authored the Information Society Library, a set of eight booklets covering a wide range of Internet- related developments. [email protected] The history of this book is long, in Internet time. The original text and the overall approach, including the five-basket methodology, were developed in 1997 for a training course on information and communications technology (ICT) policy for government officials from Commonwealth countries. In 2004, Diplo published a print version of its Internet governance materials, in a booklet entitled Internet Governance – Issues, Actors and Divides. This booklet formed part of the Information Society Library, a Diplo initiative driven by Stefano Baldi, Eduardo Gelbstein, and Jovan Kurbalija. In 2008, a special, revised version of the book, entitled simply An Introduction to Internet Governance, was published in cooperation with NIXI India on the occasion of the 2008 Internet Governance Forum (IGF) held in Hyderabad, India. In 2009, a revised third edition was published in cooperation with the Ministry of Communication and Information Technology of Egypt. The fourth edition (2010) was produced in partnership with the Secretariat of the Africa-Caribbean-Pacific Group of Countries and the European Union. The fifth edition (2012) was published in cooperation with the Azerbaijan Diplomatic Academy (ADA). The sixth edition was published in September 2014. The late Eduardo Gelbstein made substantive contributions to the sections dealing with cybersecurity, spam, and privacy. Thanks are due to the team of curators working on the GIP Digital Watch observatory, who contributed to updating various parts of the 2016 edition: Radek Bejdak, Stephanie Borg Psaila, Katharina Höne, Tereza Horejsova, Arvin Kamberi, Aida Mahmutović, Adriana Minović, Virginia Paque, Roxana Radu, Vladimir Radunović, Barbara Rosen Jacobson, and Sorina Teleanu. Stefano Baldi, Eduardo Gelbstein†, and Vladimir Radunović all contributed significantly to developing the concepts behind the illustrations in the book. Comments and suggestions from other colleagues are acknowledged in the text. INTERNETAn Introduction to GOVERNANCE Jovan Kurbalija Published by DiploFoundation (2016) Malta: DiploFoundation Anutruf, Ground Floor Hriereb Street Msida, MSD 1675, Malta Switzerland: DiploFoundation 7bis, Avenue de la Paix CH‑1211 Geneva, Switzerland Serbia: DiploCentar Braničevska 12a/12 11000 Belgrade, Serbia E‑mail: [email protected] Website: www.diplomacy.edu Design and layout: Viktor Mijatović Editing: Mary Murphy Illustrations: Dr Vladimir Veljasević Prepress : Aleksandar Nedeljkov Except where otherwise noted, this work is licensed under http://creativecommons.org/licences/by‑nc‑nd/3.0/ The translation and publication of this book in other languages is encouraged. For more information, please contact [email protected] Any reference to a particular product in this book serves merely as an example and should not be considered an endorsement or recommendation of the product itself. The square icons and the links at the end of various sub‑sections of the book indicate that there is more background material (ongoing developments, actors, events, instruments, and resources) available online, in the GIP Digital Watch observatory. ISBN: 978‑99932‑53‑30‑3 Contents Foreword .................................................................................................................................... 1 INTRODUCTION .................................................................................................5 What does Internet governance mean? ............................................................................... 5 The evolution of Internet governance................................................................................... 7 The Internet Governance Cognitive Toolkit ....................................................................... 16 Policy approaches .................................................................................................................. 17 Analogies ................................................................................................................................. 24 Classification of Internet governance issues .................................................................... 28 THE INFRASTRUCTURE BASKET ................................................................35 The telecommunications infrastructure ............................................................................36 Internet access providers .....................................................................................................40 Transmission Control Protocol/Internet
Recommended publications
  • An Evaluation of Developments of E- Commerce Practices in Kazakhstan in the Framework of Historical Process
    ISSN 0798 1015 HOME Revista ESPACIOS ÍNDICES / Index A LOS AUTORES / To the ! ! AUTORS ! Vol. 40 (Number 22) Year 2019. Page 10 An evaluation of developments of e- commerce practices in Kazakhstan in the framework of historical process Una evaluación de la evolución de las prácticas de comercio electrónico en Kazajstán en el marco del proceso histórico SEN, Bulent 1; YDYRYS, Serikbay 2; MUNASSIPOVA, Malike 3 & KURALBAYEV, Almas 4 Received: 28/02/2019 • Approved: 07/06/2019 • Published 01/07/2019 Contents 1. Introduction 2. Methodology 3. Results 4. Conclusions Bibliographic references ABSTRACT: RESUMEN: The use of internet in Kazakhstan seems to have El uso de internet en Kazajstán parece haber increased considerably, especially between 2008 and aumentado considerablemente, especialmente entre 2011. The increase of 176.4% in 2008 is the highest 2008 y 2011. El aumento del 176,4% en 2008 es el in all years. When the country’s wide land and low más alto de todos los años. Cuando se considera la population ratio is considered, the given situations amplia proporción de tierra y baja población del país, make it an ideal candidate for the internet ordering las situaciones dadas lo convierten en un candidato sector. Products that are developing in the sense of ideal para el sector de pedidos por Internet. Los retail and that are considered suitable for electronic productos que se están desarrollando en el sentido de commerce are respectively as follows: cosmetics, la venta minorista y que se consideran adecuados electronic goods, home textile and leisure products. para el comercio electrónico son, respectivamente, los Keywords: public-private partnerships, public-private siguientes: cosméticos, productos electrónicos, partnership projects, project efficiency, technical and textiles para el hogar y productos de ocio.
    [Show full text]
  • Internet Governance Project
    International internet Policy Priorities United States Department of Commerce, National Telecommunications and Information Administration (NTIA) [Docket No. 180124068–8068–01] RIN 0660–XC041 The Internet Governance Project (IGP) is a group of professors, postdoctoral researchers and students hosted at the Georgia Institute of Technology’s School of Public Policy. We conduct scholarly research, produce policy analyses and commentary on events in Internet governance, and bring our ideas and proposals directly into Internet governance processes. We also educate professionals and young people about Internet governance in various world regions. IGP welcomes NTIA’s broadly focused NOI on “International Internet Policy Priorities.” We believe that agency is asking many of the right questions and appreciate its desire to look for guidance from the public. Our response will follow the template of the NOI. I. THE FREE FLOW OF INFORMATION AND JURISDICTION A. What are the challenges to the free flow of information online? ​ There are two distinct challenges to the free flow of information. The biggest and most fundamental is alignment,1 which is related to the issue of jurisdiction. Alignment refers to the ​ ​ ​ attempt by national governments to assert sovereignty over cyberspace, by imposing exclusive territorial jurisdiction and national controls in a globally interoperable cyberspace. Data localization is one obvious example of a policy that seeks to achieve alignment, but the process is evident in multiple domains of Internet governance: in cybersecurity policy, trade policy, intellectual property protection and content regulation. In each case states erect barriers that 1 The concept of alignment was described in the book Will the Internet Fragment? (Polity Press, 2017).
    [Show full text]
  • The Future of Internet Governance: Should the United States Relinquish Its Authority Over ICANN?
    The Future of Internet Governance: Should the United States Relinquish Its Authority over ICANN? Lennard G. Kruger Specialist in Science and Technology Policy September 1, 2016 Congressional Research Service 7-5700 www.crs.gov R44022 The Future of Internet Governance: Should the U.S. Relinquish Its Authority over ICANN Summary Currently, the U.S. government retains limited authority over the Internet’s domain name system, primarily through the Internet Assigned Numbers Authority (IANA) functions contract between the National Telecommunications and Information Administration (NTIA) and the Internet Corporation for Assigned Names and Numbers (ICANN). By virtue of the IANA functions contract, the NTIA exerts a legacy authority and stewardship over ICANN, and arguably has more influence over ICANN and the domain name system (DNS) than other national governments. Currently the IANA functions contract with NTIA expires on September 30, 2016. However, NTIA has the flexibility to extend the contract for any period through September 2019. On March 14, 2014, NTIA announced the intention to transition its stewardship role and procedural authority over key Internet domain name functions to the global Internet multistakeholder community. To accomplish this transition, NTIA asked ICANN to convene interested global Internet stakeholders to develop a transition proposal. NTIA stated that it would not accept any transition proposal that would replace the NTIA role with a government-led or an intergovernmental organization solution. For two years, Internet stakeholders were engaged in a process to develop a transition proposal that will meet NTIA’s criteria. On March 10, 2016, the ICANN Board formally accepted the multistakeholder community’s transition plan and transmitted that plan to NTIA for approval.
    [Show full text]
  • Architect's Guide for Securing Network Equipment
    JANUARY 2018 ARCHITECT’S GUIDE FOR SECURING NETWORK EQUIPMENT Trusted Computing Group 3855 SW 153rd Drive Tel (503) 619-0562 Fax (503) 644-6708 [email protected] www.trustedcomputinggroup.org Architect’s Guide for Security Network Equipment Copyright© 2018 Trusted Computing Group | All Rights Reserved ARCHITECT’S GUIDE FOR SECURING NETWORK EQUIPMENT As part of the critical infrastructure of an enterprise, network equipment (Side Bar 1) is subject to the same types of attacks and threats as PCs, servers and the network itself. THESE THREATS INCLUDE: UNAUTHORIZED DEVICES UNAUTHORIZED CODE FIRMWARE IMPLANTS THAT 1 THAT CAN GAIN ACCESS 2 THAT CAN INTERFERE 3 CAN RENDER ATTACKS TO NETWORKED DATA WITH SAFE OPERATION INVISIBLE AND UNREMOVABLE Preserving the integrity and security of network equipment is essential to maintaining customer privacy and network reliability. Trusted Computing solutions can be used to provide these requirements. This Architect’s Guide makes the case for addressing network security and provides some initial guidance from ongoing efforts in this area. AWARENESS PRIOR TO ACTION Experts in providing trust to all aspects of an It is important to distinguish network security enterprise have found that many designers are not provided by items such as firewalls, VPNs, MPLS concerned about protecting the low-level, embedded domains, access lists, intrusion detection, network portions of their infrastructure. For example, those access controls, Radius, DMZs and a host of other people who are interested specifically in network functions that prevent inappropriate access to security are extremely concerned about almost all networked resources, from Secure Network aspects that involve anti-viruses and software but Equipment.
    [Show full text]
  • Per Concordiam V7N2 ENG.Pdf
    per VOLUME 7, ISSUE 2, 2016 ConcordiamJournal of European Security and Defense Issues n BALTIC CYBER DEFENSE n BATTLING BOKO HARAM Nations sign important agreement Nigeria’s online war against extremism n CYBER TERRORISM PLUS Categorizing attacks by severity Partnership for Peace n PROTECTING UKRAINE Kazakhstan seeks security Kyiv faces an array of threats Georgia’s approach to cyber INFORMATION SHARING A Cooperative Approach to Cyber Security Table of Contents features ON THE COVER Cyber attacks rarely recognize national borders. So the strategies aimed at preventing, deflecting and responding to these attacks must also be regionally and globally oriented. GETTY IMAGES 24 10 Defining Cyber Terrorism 28 Online Extremism in Nigeria By Ruben Tuitel By Tommy Victor Udoh, Nigerian Defense Space Agency Coming up with a globally acceptable definition The government focuses on countering Boko Haram’s of what constitutes Internet-based terrorism is use of social media to seduce vulnerable recruits. difficult. 34 Kazakhstan Adapts to the 18 Baltic Cyber Cooperation Cyber Age By Vytautas Butrimas, senior advisor, Cybersecurity By Anna Gussarova, Kazakhstan Institute for and IT Department, Ministry of National Defense, Strategic Studies Republic of Lithuania The country’s growing reliance on the digital economy Lithuania, Latvia and Estonia advance regional demands a change in thinking about security. cooperation by aligning their cyber defense policies. 40 Moldova’s Cyber Security Center By Natalia Spinu, Chief, Moldovan Cyber Security Center, 24 A New Cyber Security Curriculum E.S. Center for Special Telecommunications By Sean Costigan and Michael Hennessy The country uses a comprehensive approach to NATO and the Partnership for Peace devise an improve its ability to defend itself against online threats.
    [Show full text]
  • About the Internet Governance Forum
    About the Internet Governance Forum The Internet Governance Forum (IGF) – convened by the United Nations Secretary-General – is the global multistakeholder forum for dialogue on Internet governance issues. BACKGROUND AND CONTEXT 1 The IGF as an outcome of WSIS 2 IGF mandate 2 THE IGF PROCESS 3 IGF annual meetings 3 Intersessional activities 4 National, regional and youth IGF initiatives (NRIs) 5 PARTICIPATION IN IGF ACTIVITIES 6 Online participation 6 COORDINATION OF IGF WORK 7 Multistakeholder Advisory Group 7 IGF Secretariat 7 UN DESA 7 FUNDING 7 IMPACT 8 LOOKING AHEAD: STRENGTHENING THE IGF 8 The IGF in the High-level Panel on Digital Cooperation’s report 8 The IGF in the Secretary-General’s Roadmap for Digital Cooperation 9 9 1 BACKGROUND AND CONTEXT The IGF as an outcome of WSIS Internet governance was one of the most controversial issues during the first phase of the World Summit on the Information Society (WSIS-I), held in Geneva in December 2003. It was recognised that understanding Internet governance was essential in achieving the development goals of the Geneva Plan of Action, but defining the term and understanding the roles and responsibilities of the different stakeholders involved proved to be difficult. The UN Secretary-General set up a Working Group on Internet Governance (WGIG) to explore these issues and prepare a report to feed into the second phase of WSIS (WSIS-II), held in Tunis in November 2005. Many elements contained in the WGIG report – developed through an open process and multistakeholder consultations – were endorsed in the Tunis Agenda for the Information Society (one of the main outcomes of WSIS-II).
    [Show full text]
  • Afilias Limited Request 28 January 2020
    Registry Services Evaluation Policy (RSEP) Request January 17, 2020 Registry Operator Afilias Limited Request Details Case Number: 00941695 This Registry Services Evaluation Policy (RSEP) request form should be submitted for review by ICANN org when a registry operator is adding, modifying, or removing a Registry Service for a TLD or group of TLDs. The RSEP Process webpage provides additional information about the process and lists RSEP requests that have been reviewed and/or approved by ICANN org. If you are proposing a service that was previously approved, we encourage you to respond similarly to the most recently approved request(s) to facilitate ICANN org’s review. Certain known Registry Services are identified in the Naming Services portal (NSp) case type list under “RSEP Fast Track” (example: “RSEP Fast Track – BTAPPA”). If you would like to submit a request for one of these services, please exit this case and select the specific Fast Track case type. Unless the service is identified under RSEP Fast Track, all other RSEP requests should be submitted through this form. Helpful Tips • Click the “Save” button to save your work. This will allow you to return to the request at a later time and will not submit the request. • You may print or save your request as a PDF by clicking the printer icon in the upper right corner. You must click “Save” at least once in order to print the request. • Click the “Submit” button to submit your completed request to ICANN org. • Complete the information requested below. All fields marked with an asterisk (*) are required.
    [Show full text]
  • Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
    Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K.
    [Show full text]
  • Chapter 25: Taking Stock
    Chapter 25 Taking Stock But: connecting the world meant that we also connected all the bad things and all the bad people, and now every social and political problem is expressed in software. We’ve had a horrible ‘oh shit’ moment of realisation, but we haven’t remotely worked out what to do about it. – Benedict Evans If you campaign for liberty you’re likely to find yourself drinking in bad company at the wrong end of the bar. –WhitDiffie 25.1 Introduction Our security group at Cambridge runs a blog, www.lightbluetouchpaper.org, where we discuss the latest hacks and cracks. Many of the attacks hinge on specific applications, as does much of the cool research. Not all applications are the same, though. If our blog software gets hacked it will just give a botnet one more server, but there are other apps from which money can be stolen, others that people rely on for privacy, others that mediate power, and others that can kill. I’ve already discussed many apps from banking through alarms to prepay- ment meters. In this chapter I’m going to briefly describe four classes of ap- plication at the bleeding edge of security research. They are where we find innovative attacks, novel protection problems, and thorny policy issues. They are: autonomous and remotely-piloted vehicles; machine learning, from adver- sarial learning to more general issues of AI in society; privacy technologies; and finally, electronic elections. What these have in common is that while previously, security engineering was about managing complexity in technology with all its exploitable side-e↵ects, we are now bumping up against complexity in human society.
    [Show full text]
  • A Comparative Analysis of Media Freedom and Pluralism in the EU Member States
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS A comparative analysis of media freedom and pluralism in the EU Member States STUDY Abstract This study was commissioned by the European Parliament's Policy Department for Citizens' Rights and Constitutional Affairs at the request of the LIBE Committee. The authors argue that democratic processes in several EU countries are suffering from systemic failure, with the result that the basic conditions of media pluralism are not present, and, at the same time, that the distortion in media pluralism is hampering the proper functioning of democracy. The study offers a new approach to strengthening media freedom and pluralism, bearing in mind the different political and social systems of the Member States. The authors propose concrete, enforceable and systematic actions to correct the deficiencies found. PE 571.376 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Committee on Civil Liberties, Justice and Home Affairs (LIBE) and commissioned, overseen and published by the Policy Department for Citizens' Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and external, to support EP committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens' Rights and Constitutional Affairs or to subscribe
    [Show full text]
  • Investing in Central Europe 2016
    Investing in Central Europe Your move in the right direction December 2016 Investing in Central Europe | Your move in the right direction Content 1. Investing in Central Europe 3 Introduction The investment process 2. Why Central Europe? 9 3. Comparison of selected data 10 Basic facts Main macroeconomic data GDP growth in CE Taxation 4. Country guides for Bulgaria, Czech Republic, Hungary, Poland, Romania and Slovakia 15 General overview of economy Tax structure Legal entities Labor and wages Education Infrastructure The most active industries / sectors Industrial parks Investment Incentive Foreign Direct Investment (FDI) Expatriate life Weather and climate 5. The Social Progress Index and Foreign Direct Investment in CE Region 149 6. Deloitte Central Europe 164 Deloitte Central Europe Our expertise 7. Contact us 168 2 Investing in Central Europe | Your move in the right direction Introduction The economic and business outlook Indeed, Romania is “the new sexy” and we • When the Eurozone grows by an extra for Central Europe have “taken Romania out of the Balkans”. 1%, then the CEE region grows by In 2016-17 the core/central CEE region Growth exceeds 4% and a large majority an extra 1.3%. looks like a “safe haven” globally. When of companies report excellent business • But South-eastern Europe (SEE), with many emerging markets and developed and this is across most sectors. Romania the exception of Romania, was not ones face strained economic and is not as roller-coaster as it sued to be and performing as well due to structural political developments, core CEE looks the recent 18 months have been some economic issues such as budget comparatively much better.
    [Show full text]
  • L-Root and Internet in LAC Mauricio Vergara Ereche | Qos Internet CEPAL | Oct 2015 Agenda
    L-Root and Internet in LAC Mauricio Vergara Ereche | QoS Internet CEPAL | Oct 2015 Agenda 1 2 3 What is L-Root LAC ICANN? Connectivity 4 5 Our model for Recommend deployment ations | 2 What is ICANN? What is a resilient and secure Internet? Quick Look at ICANN Overview ICANN is a global multi-stakeholder, private sector organization that manages Internet resources for the public benefit. It is best known for its role as technical coordinator of the Internet’s Domain Name System Mission To coordinate, at the overall level, the global Internet’s system of unique identifiers, and in particular to ensure the stable and secure operation of the Internet’s unique identifier system | 4 Supporting A Healthy, Resilient Internet | 5 SSR: Security, Stability and Resiliency Secure 1 Capacity to protect and prevent misuse of Internet Unique identifiers Stable Capacity to ensure that the system operates as expected, 2 and that users of the unique identifiers have confidence that the system operates as expected Resilient Capacity of the unique identifier system to effectively 3 withstand/tolerate/survive malicious attacks and other disruptive events without disruption or cessation of service | 6 L-Root DNS and Anycasting How DNS Works? Root Server 2 www.icann.org ? 1 3 4 8 .ORG Server 5 DNS Resolver (ISP) 6 9 7 www.icann.org ICANN.ORG Server | 8 What is L-Root? “L” is one of 13 independently operated root servers serving the DNS root zone ICANN DNS Engineering team operates L under the Autonomous System Number (ASN) AS20144 using the following
    [Show full text]