ICANN Review on Fast Track IDN ccTLDs

ICANN’s year-end annual meeting is happening at Cartagena de Indias, Colombia, December 5-10. This is one of 3 ICANN global meetings held yearly. Cartagena must be a nice city. I can see the Walled Old Town with Towers, Churches and cannons on the Wall, which is opposite to the Convention Center. But apart from enjoying the sunshine of Caribbean Sea at the breaks, I have been at the conferences or en route to the conference.

IDN fast track process review is one of the sessions. ICANN staff chaired the session. Senior Director on IDNs presented on the following aspects of fast track process:

– Transparency
– Community Support
– Meaningfulness
– Determination of the IDN ccTLD manager
– IDN Tables
– Disputes
– Confusingly similar string
– Objection/re-evaluation rights

Although there were less than 30 participants in the plenary room, the session brought up interesting information. At the end of the presentation, there were questions raised on the Internet referred to .бг (applied Bulgaria IDN ccTLD string) case. The staff restated that they were not supposed to comment on any specific case.

I then asked a procedural question. Although the String evaluation done by DNS stability panel (according to their guidelines) is a technical decision, it is a decision made on behalf of ICANN and has (significant) policy implication. If such technical determination is not subject to reconsideration or independent review, wouldn’t it be an accountability issue, as highlighted by ICANN at the opening ceremony?

To my *rough* memory, both replied that fast track process should be sufficiently simply, without objection or re-evaluation. And, surprisingly both ICANN staff replied that anyone would be available to reconsideration or review. I assume I heard their reply clearly. The audio record at the link is broken unfortunately.

********************

Interestingly, ICANN staff made a statement on December 4, 2010 on Internet Governance list: “The Fast Track Process is a limited process set up for the initial implementations of IDN ccTLDs. It was a factor in the community development of the process that there should be no reconsideration process included specific to the Fast Track process because it was a limited approach to only those requests where no dispute, questions, or otherwise concerns existed.” “Now, the process is a year old, and hence we are conducting a review of how well it functions and if any changes should be made. There is a public forum online and also a session scheduled in Cartagena. We will discuss all aspects of the process there.”

ICANN Senior Director on IDNs later responded in following two bulletin points:

  • The fast track process was built limited in nature and for those applications where there is no concerns or no disputes of any kind. I also said I believe this is an appropriate approach for the initial IDN TLD delegations. It does however not mean that things should be more liberal in the future, but it is always easier to expand a program than to narrow it after the fact.
  • Anyone at ICANN who are unhappy about a decision and not able to solve this with staff, can always go to the Ombudsman or seek reconsideration through the process for such. For details about these general processes, which are non-dependant on the fast track process, but part of ICANNs Accountability and Review Processes, please see the link.

The case reveals the ICANN’s matrix of Ombudsman, reconsideration, independent review or other “accountability mechanisms” (if any). There are built-in appeal systems for a specific program and there are others generally applied.

Comments (19)

Global Internet of Things Conference in Beijing

Global Internet of Things Conference (GIOTC) was held on November 23-24, 2010 in Beijing National Convention Center. Hundreds of people, most from business and administration, joined the conference and side exhibition. I did not come to the confusing-structured conference hall until the afternoon of November 23, missing a couple of presentations from European Commission and many companies. In the afternoon session, the first half, chaired by Rob van Kranenburg, comprised of 6 full presentations on technological developments or business applications. Mr. Kranenburg manage to mobilize his panelists to respond questions and generate new thinkings.

At around 16:30, I took over and chair the last panel on policy discussion. Unfortunately the panel is still more about technicality than polity. The speakers, in sequence, talked about IPv6 application for IoTs, operational side of IoTs and China-EU Joint Expert Group on IoTs. Later, 3 discussants from EU-China group, M2M and ESTI, joined the panel. I tried hard to open up the policy discussions on privacy, security, trust and policy-impact of standardization, but it does not seem attracting much responses.

It is interesting to see how IoTs suddenly become an eye-catching term in China after the high leader gave a speech with reference to it in April 2010. The speech cannot be googled for I always get an error page after inputting the relevant keywords. Weird enough. Anyway, government is making huge investment on technical development and industrial application with the aim of creating a new booming point for the economy.

The agenda and introduction of my panel is attach.

Internet for Things: Standards, Trade and Legal Issues

16:30-17:30 ( Discussion group: 60 mins )

Panel moderator:

Dr. Prof. Hong Xue, Director of Institute for Internet Policy & Law, Beijing Normal University

Speakers

1. Mr. Xiaodong Lee CNNIC

2. Prof. Jian Wang, Director of Center for International Business Studies, University of International Business and Economics

3. Mr. Hui Zhang, Secretary-General of working group sensor Network (WGSN)

Discussants

Mr. David Boswarthick, Technical Official of M2M standards group

Ms. Margot Dor, Director of Strategic Projects, ETSI

Mr. Philippe Cousin, European experts for the EU-China Internet of things Export Group

Introduction

We are impressed by the prospect that the Internet of Things is going to reshape the future of our technology, economy and society as a whole. The tremendous social impacts of IoTs signify the importance of establishing suitable governance regime to ensure progress, competitiveness, privacy and all the other essential values of information society.

This workshop will be specifically focusing on a few critical aspects of governance issues. As highlighted by European Commission’s “Internet of Things — An action plan for Europe”, governance addresses:

a)      Identification and identifier mechanism (IPv6);

b)      Privacy and personal data—right to silence chips

c)       Trust and Security, especially in trade operation

d)     Standardization (not necessarily be based on a deterministic or syntactic model but would instead be based on the context of the event; event-driven architecture )

Tim Berners-Lee made a presentation on November 22. When applauding for the long live of the web, he reemphasizes the value of universality. The primary design principle underlying the Web’s usefulness and growth is universality. When we move to communications between objects, standardization process need to keep delicate balance between the values of openness, interoperable and those of security and privacy.

Comments (439)

A War between “Penguin” and “Tiger”

What is the most sensational ICT news in China this week? Of course, it is the War between two animals–Penguin representing Tencent and  Tiger for Qihoo. After sending its 0.6 billion Chinese IM users a “Public Condemnation against Qihoo 360′” via pop-up windows, Tencent, which has been using the logo of two cute-looking penguins, publicly announced that it stops inter-operating with Qihoo’s 360’s newly released security program, Kou Kou Bodyguard. Tencent condemned Qihoo (Chinese name “Magical Tiger”) for hijacking users’ accounts through striping ads attached to QQ and redirecting QQ users to 360 browers. Qihoo that developed from an anti-virus company to the second large security and online assistance program service provider to 0.5 billion Chinese users denied the allegation that Kou Kou Bodyguard was a Trojan program to steal users’ information but has removed the program offline.

The War between  two leading Internet companies have devastated many Internet users, particularly who  had solely relied on these domestic services on IM, chatting, searching and email, etc. Under Tencent’s unilateral announcement, any user who has Qihoo 360 installed on the computer will not be able to login Tencent’s popular IM program QQ. Tencent has sued Qihoo for unfair competition and other claims to Beijing Court. Meanwhile, angry QQ users (especially those who paid fees to Tencent) have gather to bring collective action against Tencent. Ministry of Industry and Information Technology and Ministry of Public Security have summoned both parties for investigation.

For more information, please refer to “QQ-360 Battle Escalates into War” on WSJ.

The case shows the poor legal protection on privacy and personal information for more than 1 billion Internet users in China. It is widely believed that Internet giants are all blatantly detecting, collecting and trading their users’ privacy information for profit. In this case, tens of million of users become the virtual hostage of commercial strategy. Internet companies’ tremendous technical capacity can be a threat of the users’ choice and legitimate interest.

How would Tencent implement its anti-360 campaign? How did it detect and verify whether a user has uninstall Qihoo 360 or not? The answer is that Tencent’s widely used IM client integrates QQ Housekeep (formerly named QQ Doctor) that can automatically scan users’ drive and detect the files and programs installed on users’ computers.  Qihoo 360 had labelled QQ Doctor as a privacy-infringement program but Tencent rebutted that 360 lied for fear of competition in security product market.

In addition, malice competition actions not only directly hurt the consumers but potentially endanger the network security and stability. Civil disputes may deteriorate into cyber-crimes. Common use of cloud computing gives Internet giants “invisible hand” to manipulate, control and imperil billion’s of users. When data, computer and usage are more beyond the control of users, we have good reason to worry who is really in control.

The competent governmental agency, MIIT, finally stepped in the dispute. In an official announcement made on November 21,  both parties were condemned for acts of unfair competition and bad social impacts. Both were required to stop any acts that may damage the legitimate interests of users, stop mutual attacks and apologize to the users. The announcement also asked both to take appropriate make-up measures.  Interestingly, MIIT ordered both to carefully learn relevant laws and regulations and improve their moral construction. Let alone the morality standards that are apparently in doubt, people may wonder what kind of laws and regulations they should “carefully learn”. Obviously, there has no law or regulation to touch a commercial operator’s proactive or aggressive self-defensive actions.

Comments (412)

2010 CIETAC Seminar for Presiding Arbitrators

CIETAC Presiding Arbitrators’ Seminar was held on November 5-6 in Beijing East Garden International Conference Center. Around 50 academic, lawyers, in-house counsels and CIETAC staff took the shuttle bus and headed to the lakeside villa at the sunny noon of Friday.

This is the first seminar organized by CIETAC to brainstorm Presiding Arbitrators. Unlike ad hoc arbitration that is widely adopted around the world, Chinese Arbitration Law only allows for institutional arbitration.  The state-sanctioned institutions should guarantee the quality of arbitral awards. Presiding arbitrators are primarily responsible for fair and reasonable decisions. CIETAC has been emphasizing the responsibility and accountability in arbitral proceedings.

A couple of issues was discussed and hotly debated. For example, a couple of senior arbitrators (in their 70s or 80s) mentioned the divergence of international arbitration and domestic arbitration, which has always been a Chinese characteristic. However, after China becomes a WTO Member and complies with the National Treatment principle, it does not make much sense to segregate proceedings based on arbitrary judgment on “overseas” factors. There are more Chinese companies making Overseas Director Investment to other countries. It would be more controversial to draw the line.

There are other interesting discussions, such as how to handle the case when a persistent presiding arbitrator refuses to consult the co-arbitrators, how to define the relation among “arbitraral court, “expert advisory commitment” and Arbitration Commitment, etc.

Comments (97)

Two Chinese Extradited to US for Violation of ITAR

It was reported by China Legal Daily that two Chinese businessmen were recently lured by secret agents of US to Hungary and later arrested and extradited to US for attempting to export anti-radiation PROM chips that can be used for outer space and military purpose, which are classified as USML items.

International Traffic in Arms Regulations (ITAR) is a set of United States government regulations that control the export and import of defense-related articles and services on the United States Munitions List (USML). U.S. Persons (including organizations) can face heavy fines if they have, without authorization or the use of an exemption, provided foreign (non-US) persons with access to ITAR-protected defense articles, services or technical data

Two Chinese exchanged emails with the secret agent who disguised as the CEO of an  American trade company. The report said that they were misled that the transaction would be permissible via a third country. They were arrested when flew to Hungary to collect the goods from their trade partners. The Chinese report said they were entrapped by US secret agent and extradited without due process, such as presence of Chinese Counselor and Chinese translation of Hungarian court decision.

Interestingly, one of the Chinese, Yuan, was almost extradited from UK to US for Human Magic Power’s trademark dispute with an American company called ABRO Industrial 3 years ago. Yuan claimed that he was lured by Abro to UK for negotiation of the trademark ABRO ownership of which was under retrial at Beijing High Court but was arrested on aircraft landing in London Heathrow Airport. Fortunately Yuan managed to go home thanks to a misspelling of UK court decision. He did not have the same luck this time and has to face US court trial.

The series of entrapment extradition cases may alert the Chinese businessmen that they should be aware of foreign laws and regulations for international trade. However, ABRO trademark case is still puzzling. Based on limited information available, American Abro does not have any legal ground to seek criminal sanction under US law against a Chinese company that applied for registration of an identical mark with the Chinese Trademark Office. Perhaps, the Chinese company exported goods to US market using the mark ABRO.

It proves my guess that Yuan’s Hunan Magic Power indeed shipped alleged counterfeit goods to US and many other countries. In 2005, Hunan Magic allegedly shipped $22,000 worth of products to Livingston Parish, Lousiana, sparking the charges that led to Yuan’s arrest in London. Under Louisiana laws, among the toughest in the U.S. against counterfeiting, he could face millions in fines and up to five years in jail.
Since the Chinese government has no extradition treaty with the U.S., meaning Yuan would likely only be sent back to face those charges by a third nation. That was the beginning of Heathrow arrest. US has extradition agreement with more than 100 countries. It seems it still pretty dangerous for Chinese businessmen who have been targeted by US law enforcement to go abroad.

Comments (165)

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »