
by: Kim G. von Arx and Gregory R. Hagen[*]
III. DoC's CONTRACTUAL CONTROL OF ICANN
1. The Case of the Redelegation of .au, .jp, .bi and .mw
2. The Case of the .us Redelegation and the Power of the DoC
 
    
    {1}             
     
    
    In the year 2000, the Government Advisory 
    Committee (“GAC”) of the Internet Corporation for Assigned Names and Numbers 
    (“ICANN”) passed a set of principles that essentially claimed national sovereignty 
    over country code top-level domains (“ccTLD”s) such 
    as .us, .ca, .uk and .au.[1]  Shortly thereafter, ICANN redelegated 
    several ccTLDs in accordance with new GAC principles.  
    Despite the outcry accompanying the passage of these principles[2] and ICANN’s self-professed adherence thereto, the entire exercise 
    could easily be criticized as merely symbolic because of the overriding power 
    of ICANN in the operation of the Domain Name System (“DNS”).  
    Indeed, Stuart Lynn, ICANN’s current president, summed up the lack of power that 
    ccTLDs have within the governance structure of the 
    Internet when he opined that “ICANN could, in theory, recommend that a particular 
    ccTLD be redelegated to 
    a cooperating administrator.  If the 
    
 
    
    {2}             
     
    
    As 
 
    
    {3}             
     
    
    The DoC has a strong enforcement power because it has a domain 
    registrar’s or registrant’s virtual life in its hands.  It has the power to enforce the decision by 
    evicting anyone from his or her cyberspace domain.  As Post quite aptly stated, “the domain name 
    system . . . [is] the one place where enforceable Internet policy can be promulgated 
    without any of the messy enforcement and jurisdictional problems that bedevil 
    ordinary law-making exercises on the Net.”[4]  Put another way, the hierarchical architecture 
    of the DNS is sufficient to endow those who control the A root with the power 
    to make and enforce law and policy regarding domain names.  Equally troubling, the control over the A root 
    also invites economic, political, and social pressures that inevitably force 
    ICANN to go beyond its delegated powers of technical management of the system 
    to include derivative powers.[5]  Such derivative powers may be applied to areas 
    considered to be those reserved to national sovereigns, including matters 
    of registry regulation, name policy, electronic surveillance, national defense, 
    and critical infrastructure.
 
    
    {4}             
     
    
    Despite a few early demands that the 
    U.S. withdraw from control of the DNS, and the later emands 
    and claims of GAC, curiously, none of the individual 243 countries with delegated 
    ccTLDs have complained forcefully about the lack of sovereignty 
    over their own ccTLD, nor of any of the general 
    policy implications.  This lapse is 
    peculiar since nations desperately guard sovereignty over their physical domains 
    against advancing globalization.  Italian 
    prime minister Silvio Berlusconi, 
    for example, in his speech to the Italian parliament, reassured the nation 
    as well as the European Union (“EU”), of 
 
    
    {5}             
     
    
    ICANN originated in part from the recognition 
    of the globalization of the Internet as a communications network. Because 
    of the increasingly global scale of the Internet, the U.S. Government desired 
    to rid itself of the task of operating the DNS and also wanted to obtain international 
    input into the technical management of the DNS. 
    At the same time, it wanted to maintain control over critical DNS policies 
    through a reservation of control of the A root.  
    The solution that was arrived at was to privatize the management of 
    the DNS by placing management in ICANN, a private 
 
    
    {6}             
     
    
    Thus, from its inception, ICANN was 
    intended to preclude the participation of “national governments acting as 
    sovereigns. . . [or] intergovernmental organizations acting as representative 
    of governments.”[7]  Yet, the formation of ICANN to manage the DNS 
    appeared to be tempered by the 
 
    
    {7}             
     
    
    As Barber has pointed out, one aspect 
    of globalization – privatization – has had the effect of placing transnational 
    organizations outside the regulatory environment of the nation state.[8]  On his view, such organizations are rogue institutions 
    operating in an anarchic realm devoid of significant regulation, unprepared 
    to enter into a form of international civil society.[9]  Similarly, ICANN has been placed in the curious 
    position that its conduct is too tightly controlled by the DoC, on the one hand, and not accountable to nation states 
    and the 
 
    
    {8}             
     
    
    The source of control over ICANN is 
    control over the A root. Thus, the ultimate problem with DNS, on our account, 
    is precisely that the 
 
    
    {9}             
     
    
    While it is possible to overstate the 
    risks associated with foreign control over country domains, the existing system 
    highlights a tension between national interests and the existence of a network 
    architecture which is currently beyond the ability of national governments 
    - other than the 
 
    
    {10}         
     
    
    This paper will briefly introduce DNS 
    and also introduce the problem of 
 
    
    {11}         
     
    
    The existing naming scheme is hierarchical.  
    Internet address names consist of alphanumeric strings separated by 
    a dot (•), e.g., law.richmond.edu, and are read from left (the lower level 
    of the domain) to right (the higher level of the domain).  Theoretically, there is a highest-level domain 
    at the apex of the domain name space, the “root domain,” 
    which is usually left unnamed, under which all domains fall. 
 
    
    {12}         
     
    
    There are 258 top-level domains, which 
    are the highest level of named domains, i.e., the part of the address to the 
    extreme right.  There are three types 
    of TLDs.  One is the generic 
    TLD (gTLD)[13] such as .com, .org, 
    .net, and .mil.  The second one is the 
    country code TLD ("ccTLD")[14] such as .ca (Canada), 
    .de (Germany), .uk (United Kingdom), .tv (Tivoli), .ch (Switzerland), 
    .au (Australia), and .jp (Japan).  Finally, there is one infrastructure TLD ("iTLD")[15] called .arpa.   
    ccTLDs are perceived as being connected 
    to a specific territory or country whereas gTLDs 
    are global and generally not associated with any territory or country.  The iTLD is the Address and Routing Parameter 
    Area domain and is used solely for Internet infrastructure purposes; therefore, 
    it does not affect or concern the normal user in any way. 
 
    
    {13}         
     
    
    While the architecture of the DNS is 
    becoming common knowledge, a brief review is helpful as background to our 
    main thesis.[16]  Each computer located on the Internet is assigned 
    an Internet Protocol (“IP”) address for data packet delivery.  Many computers, or hosts, that are connected 
    to the Internet are also assigned an alphanumeric name such as “icann.org.”  
    This name, however, is not required by the network software, but is 
    used for human mnemonic convenience and to provide for stability of services, 
    such as e-mail, when there is a change of host.  
    To the network, however, “icann.org” is meaningless until it is translated 
    into a numerical IP address.  Name resolution 
    is carried out by the DNS, a distributed naming system comprised of a huge 
    list of computer names and their corresponding numerical IP addresses.  
 
    
    {14}         
     
    
    When a domain name is entered into the 
    location box of an Internet browser, a local DNS resolver, 
    a small piece of client software, first contacts a name server close to the 
    Internet surfer to determine the website’s IP address.  
    Generally, the local ISP name server is able to supply the IP address 
    associated with the domain name.  If 
    the local DNS server does not contain the needed information, then it will 
    forward the request to the A root name server controlled by ICANN.  
    This A root name server contains the IP address of all the authoritative 
    name servers for TLDs in a file, the A root zone 
    file.  This A root name server 
    will return the information about the location of the authoritative name server 
    for the requested domain name. 
 
    
    {15}         
     
    
    In fact, there is no single unique root 
    name server.  There are thirteen root 
    name servers (which are assigned letters from A–M).[17]  Only one of them, the so-called A root, contains the “original” root zone file.  The A root, the primary server, resolves queries 
    by referring the inquiring computers to the Internet 
    address of the computer that has the authoritative list of the registered 
    domain names in the relevant TLD.  This single root zone file is made available 
    to the twelve other root servers, the secondary root servers.  Nine of the 
    secondary servers are also physically located in the 
 
    
    {16}         
     
    
    The sharing of control over 
    the A root suggested in this paper would amount to “splitting” the root in 
    the sense of defying the authority of the A root.  In the past, there were concerns that secondary 
    root servers could split, endangering internet stability. It has been argued, 
    however, that, as long as the United States government retains control of 
    the A root, the probability that any of the other secondary root servers would 
    choose to split, i.e., that they would no longer regard the A root as authoritative, 
    is very remote.[19]  The reasons proffered are as follows.  First, as discussed above, eight of the legacy 
    root servers (including the A root) are owned by the 
III. 
    DoC’s CONTRACTUAL CONTROL OF ICANN
 
    
    {17}         
     
    
    DoC controls ICANN 
    through a contractual framework underpinned by the DoC 
    control of the A root domain server.  DoC control of the A root came about because the 
 
    
    {18}         
     
    
    Fortuitously, a new corporation, 
    ICANN, was soon incorporated and the 
  
    
    {19}         
     
    
    In regard to the Memorandum 
    of Understanding, the original and all subsequent extensions provide for DoC’s 
    power to terminate the agreement on 120 days notice.  
    Also, the major contracts between DoC and 
    ICANN require annual or semi-annual renewals, and as such DoC 
    has the power to pressure ICANN into submission by threatening transfer of 
    powers to another body. [29] 
     
IV. NATIONAL GOVERNMENTS’ 
    ROLE IN THE DNS
 
    
    {20}         
     
    
    Technically, the ccTLDs 
    are subdomains of the “root domain” created by the 
    
 
    
    {21}         
     
    
    In spite of the fact that ccTLDs 
    are subdomains of the root domain, countries are 
    increasingly associating their ccTLD with their respective country.  Certain ccTLD registries, such as 
 
    
    {22}         
     
    
    According to a recent survey by Market 
    Research commissioned by CIRA 75% of Canadians believe .ca means 
 
    
    {23}         
     
    
    Some countries have claimed that they 
    are national authorities over their ccTLDs.  For example, 
    the EU noted that it appears to be the competent ‘public authority’ for the 
    purposes of the .eu TLD, and should be recognised as such by ICANN.[38]  
 
    
    {24}         
     
    
    Concerns over national sovereignty 
    culminated in the issuance of a communiqué by GAC establishing principles 
    of delegation and redelegation of ccTLDs.[43] These principles established 
    a set of correspondence that must occur in order for a valid redelegation to take place. In its communiqué, “[t]he GAC 
    also reaffirmed that the delegation of a ccTLD Registry 
    is subject to the ultimate authority of the relevant public authority or government.  
    The GAC discussed the development of best practices for the administration 
    of ccTLDs and agreed to continue this discussion.”[44] In 
    the earlier ICP-1, the role of national government had been less influential 
    than that accorded by GAC in the delegation and redelegation 
    process: “The desires of the government of 
    a country with regard to delegation of a ccTLD are 
    taken very seriously. The IANA will make them a major consideration in any 
    TLD delegation/transfer discussions.”[45] 
 
    
    {25}         
     
    
    Despite the criticisms that 
    have been leveled at ICANN regarding its management of the DNS, there has 
    been little critical comment on the U.S. DoC control 
    over the A root server system. While Stuart Lynn’s President's Report: ICANN – The Case for Reform noted that “if ICANN comes to be seen . . . as simply a tool 
    of the US Government, it will no longer have any hope of accomplishing its 
    original mission,” [46] this 
    point has not spurred any widely agreed-upon solution. Neither the Blueprint 
    for Reform,[47] 
    The Heathrow Declaration,[48] the New.net 
    Proposal[49] nor John Perry 
    Barlow’s Accra Manifesto,[50] substantially 
    criticize the 
 
    
    {26}         
     
    
    Past and recent developments in the 
    
It 
    might be that after the Sept. 11 attacks, the 
 
    
    {27}         
     
    
    Carl Auerbach, an ICANN director, seems to agree with Müller-Maguhn.[55]  Both refer to remarks made by Nancy Victory, 
    Assistant Secretary of Commerce for Telecommunications and Information as 
    evidence of this recalcitrance, stating that, “[r]egarding 
    the A Root server, the Department of Commerce has no plans to transfer policy 
    control . . . [W]hen the necessary technical capacity is in place, the department 
    may enter into a management agreement or other legal arrangement with ICANN 
    for operation of the A Root server.”[56]      
V. 
    THE POWERS OF ICANN AND THE 
 
    
    {28}         
     
    
    The power of the 
 
    
    {29}         
     
    
    
It 
    is clearly not enough for the 
    
    {30}         
     
    
    The 
The U.S. Government believes that the Internet is a global medium and that its technical management should fully reflect the global diversity of Internet users. We recognize the need for and fully support mechanisms that would ensure international input into the management of the domain name system. In withdrawing the U.S. Government from DNS management and promoting the establishment of a new, non-governmental entity to manage Internet names and addresses, a key U.S. Government objective has been to ensure that the increasingly global Internet user community has a voice in decisions affecting the Internet's technical management.[61]
  
    
    {31}         
     
    
    Regardless of the fact that ICANN has 
    directors from diverse geographical areas, the international makeup of ICANN 
    remains more apparent than real.  National governments 
    are not members of ICANN, and the GAC is solely an advisory group which ICANN 
    may ignore at its pleasure.  More importantly, 
    the 
 
    
    {32}         
     
    
    ccTLDs were delegated originally by Jon Postel without the benefit of any formal written agreement.  
    However, ICANN is attempting to remedy the lack of a contractual arrangement 
    between ICANN and the various ccTLDs by pressuring ccTLDs to enter 
    into a formal contractual relationship.[62]    This contract-based scheme is already becoming 
    the standard method of governing relations between TLD registrars and registries.[63]  Until recently, none 
    of the ccTLD registries had been able to arrive 
    at a mutually acceptable agreement with ICANN.  
    However, on 
 
    
    {33}         
     
    
    Article 6.2 of the sponsorship agreements 
    sets out when ICANN and the sponsoring authority can terminate the agreement.[67]  ICANN can unilaterally terminate the agreement 
    if there is a material breach of the contract, or if arbitration shows that 
    the sponsoring organization is in violation of the agreement.[68]  Article 6.3 sets out the effect of termination: 
    upon termination, ICANN must, with coordination of the government authority, 
    notify the sponsoring organization of the successor.[69]    
  
    
    {34}         
     
    
    Most countries have not signed an agreement 
    with ICANN due to differences of opinion in regard to adequacy of payments, 
    equality in decision-making, representation within the ICANN structure, and 
    various other matters.[70] This, of course, 
    raises the following question: why were the registries of 
1. The 
    Case of the Redelegation of .au, .jp, 
    .bi and .mw
 
    
    {35}         
     
    
    The source of ICANN’s 
    power over registrars is its ability to “recommend [to DoC] 
    that a particular ccTLD be redelegated to a cooperating 
    administrator.”[71] As already 
    mentioned above, 
It is further RESOLVED [00.75] that in view of the state of ongoing discussions 
    directed toward reaching stable and appropriate agreements between ICANN and 
    the ccTLD organizations, delegation of additional 
    ccTLDs should be finalized only upon achievement 
    of stable and appropriate agreements between ICANN and the ccTLD 
    organization, in a form approved by the Board.[72] 
 
    
    {36}         
     
    
    Although this resolution 
    concerns the creation of additional 
    ccTLDs, it is possible that this policy was applied 
    by ICANN to redelegations as well.[73]  On this view, each of the registries of 
 
    
    {37}         
     
    
    However, this explanation does not explain 
    why 
2. 
    The Case of the .us Redelegation and the Power of 
    the DoC
 
    
    {38}         
     
    
    Perhaps, the most interesting 
    example of the use of the power to redelegate (without 
    any regard to ICANN policies and procedures which other ccTLDs are meticulously forced to follow)[80] is the redelegation 
    of the .us, in that it reveals that the technological control of DoC 
    allows it to influence policy.  This 
    transfer was apparently forced upon the existing .us registry, Verisign, 
    and was done without regard for ICANN’s policy that 
    required mutual agreement between the old and new registries.  Indeed, it was completed “before the completion 
    of the normal IANA requirements [of a formal written agreement].”[81]  While the earlier hostile redelegation 
    of .au was done with ICANN’s full approval, the 
    redelegation of .us was not.  The official, but obscure, explanation can be 
    found in the only existing communication, an announcement from ICANN about 
    the redelegation. It reads:  “[t]he 
    United States Government informed ICANN on 
 
    
    {39}         
     
    
    ICANN admits that if it 
    had not accepted the request from the 
C. Power to Create and Destroy 
    ccTLDs
 
    
    {40}         
     
    
    The control over the A root provides 
    the power to create or destroy ccTLDs and implies that no country or union of countries can 
    unilaterally force inclusion in the A root.  
    In this area, ICANN has purported to maintain a separation between 
    technical operation and policy by deferring to the ISO 3166-1 country code 
    list.  Because IANA cannot assess whether 
    or not particular areas are “countries,” the policy set forth in ICP-1 for 
    delegation matters has been to simply refer to the ISO 3166-1 list as an independent 
    and authoritative source of two-letter abbreviations for countries and areas.[85]  Therefore, almost all of the ccTLDs are derived from the official ISO standard.  Five ccTLDs, however, 
    have been created by ICANN which are not based on the official ISO list, but 
    which can be found on the ISO country code reserve list.[86] 
 
    
    {41}         
     
    
    An example of an uncontentious 
    ccTLD removal is the 
 
    
    {42}         
     
    
    In 1999, the EU announced its plan to 
    introduce a new ccTLD -- .eu.  
    Then, on 
 
    
    {43}         
     
    
    On 
 
    
    {44}         
     
    
    In light of these powers and the unwillingness 
    to give up any control over ccTLDs, the following question arises: what are the associated 
    risks that come with a U.S.-controlled DNS?  They include loss of sovereignty over policies 
    relating to domain registry regulation, name policy, privacy, electronic surveillance, 
    national security and critical infrastructure.
A. 
     Loss of ccTLDs’ 
    Sovereignty
 
    
    {45}         
     
    
    The power of ICANN to threaten a ccTLD 
    with potential redelegation or annihilation provides ICANN with a mechanism 
    to ensure ccTLD compliance with ICANN policies and 
    to force the adoption of ICANN-friendly contractual terms and conditions.  These contractual terms and conditions can mandate 
    or influence the types of policies that will be created and enforced by the 
    ccTLD.  Thus, 
    to the extent that ccTLD policies impinge on domestic 
    policy, they also diminish the sovereignty of nations to adopt laws independently 
    of ICANN.  The current Model ccTLD 
    sponsorship agreement provides that a ccTLD must 
    conform to ICANN policies where they concern “the interoperability of the 
    Delegated ccTLD with other parts of the DNS and 
    Internet; technical operational capabilities and technical performance of 
    the ccTLD operator; and the obtaining and maintenance 
    of, and public access to, accurate and up-to-date contact information for 
    domain name registrants.”[98]  Interpreted broadly, “interoperability” and 
    “technical operations capabilities” could impose subtle effects on the regulation 
    of registries, name policy, privacy, critical infrastructure, and national 
    defense in countries foreign to the 
 
    
    {46}         
     
    
    The ability of ICANN to attach conditions 
    to the use of names enables it to control the supply of domain names.  
    ICANN can effectively decide the identity of registries.  
    Generally speaking, foreign nations have simply accepted the 
 
    
    {47}         
     
    
    The technological control over the A 
    root has enabled ICANN to embark on a program to enlarge rights exceeding 
    those that formerly existed for names.  For gTLDs, this occurs 
    directly through the Uniform Dispute Resolution Procedure, which has been 
    viewed as systemically biased toward complainants and trademark interests.[100] On Mueller’s view, 
    the problem with this trend is that it is inconsistent with the function of 
    the DNS.[101]  Whatever the merits of such criticism, there 
    is the difficulty that national governments no longer have control over domain 
    name policy independently of ICANN.  
 
    
    {48}         
     
    
    An example of this phenomenon is the 
    fact that 
D.  
    Electronic Surveillance & Information Transfer
 
    
    {49}         
     
    
    The ability of someone to engage in 
    anonymous transactions on the Internet has been one of its central appeals, 
    as well as a source of its problems.  Recently, a bill was introduced in the United 
    States Congress to provide criminal penalties for providing false information 
    when registering a domain name on the Internet.[105]  Ensuring the accuracy of registrant information 
    is considered to be necessary, among other reasons, in order to assist 
    law enforcement with the timely investigation and prosecution of illegal activity.[106] 
    Such activity could extend to enforcing laws regarding Internet taxation and 
    copyright infringement.
 
    
    {50}         
     
    
    However, the 
[t]he 
    Sponsoring Organization shall ensure that the zone file and accurate and up-to-date 
    registration data for the Delegated ccTLD is continuously 
    available to ICANN, in a manner which ICANN may from time to time reasonably 
    specify, for purposes of verifying and ensuring the operational stability 
    of the Delegated ccTLD only.[107]  
    
 
    
    {51}         
     
    
    Such an approach may conflict with certain 
    national privacy laws prohibiting transfer of information across borders into 
    states which do not have privacy legislation that the nation of the transferor 
    considers adequate, unless there is an adequate exemption. 
 
    
    {52}         
     
    
    The importance of the Internet 
    as a critical infrastructure has become common knowledge.  
    Former United States President Bill Clinton noted: “The 
 
    
    {53}         
     
    
    It is often pointed out 
    that since both civilian and military infrastructure in many nations are becoming 
    increasingly dependent on the existence of the Internet, the ability to disrupt an enemy’s communication might 
    be a strategic asset.[110]  From the point of view of military reasoning, 
    cyberspace is a new battle space 
    to which military principles apply on par with land, sea and aerospace.[111]  The principle of full spectrum dominance is 
    said to apply to cyberspace.  “The label 
    full spectrum dominance implies that US forces are able to conduct prompt, 
    sustained, and synchronized operations with combinations of forces tailored 
    to specific situations and with access to and freedom to operate in all domains 
    – space, sea, land, air, and information.”[112]  A number of military exercises, such as Eligible 
    Receiver and Solar Sunrise have demonstrated that attacks on military information 
    infrastructure can be made successfully.[113]
 
    
    {54}         
     
    
    While it seems clear that 
    the Internet itself has become part of the underlying battle space,[114] 
    and subject to being threatened, it is not clear the degree to which control 
    over the A root is also a strategic asset.  
    For example, the degree to which military operations, including the 
    “digitized battlefield,”[115] depend upon 
    use of the DNS is unknown.  Are e-mails, 
    for example, encrypted or not, part of the present or future national defense 
    operations?  Given that the importance 
    of the DNS is not sufficiently known it is not surprising that control over 
    the DNS would be viewed as critical. 
 
    
    {55}         
     
    
    Recently the Energy and Commerce Committee 
    sent a letter to Secretary Donald L. Evans of DoC 
    in response to 
 
    
    {56}         
     
    
    Finally, we want to strongly reiterate 
    our support for continued Department of Commerce control over the so-called 
    "A-root" server.  We believe that any assumption of control over 
    that asset by any outside entity would be contrary to the economic and national 
    security interests of the 
 
    
    {57}         
     
    
    Similarly, New.net suggests 
    in its proposal to reform ICANN that, “the U.S. Government would be responsible 
    for making all policy decisions regarding the legacy DNS root,”[117] 
    and that “[b]y maintaining control over the legacy DNS root, the 
 
    
    {58}         
     
    
    
 
    
    {59}         
     
    
    Of course, if the DNS is 
    vital to the national security of the 
 
    
    {60}         
     
    
    Critical Infrastructures are systems 
    whose incapacity or destruction would have a debilitating impact on the defense 
    or economic security of a nation. These include: telecommunications, electrical 
    power systems, gas and oil, banking and finance, transportation, water supply 
    systems, government services and emergency services.[121] The Internet is 
    increasingly becoming a universal platform on which such critical infrastructure 
    depends and is, therefore, itself a critical infrastructure. 
 
    
    {61}         
     
    
    A central concern is to ensure that 
    the Internet is protected from threats.  The President's Commission on Critical Infrastructure 
    Protection concentrated on threats to the information infrastructure. It noted 
    that:
Threats 
    to the Internet are of primary concern because we are becoming increasingly 
    dependent on it for communications—including government and military communications—for 
    commerce, for remote control and monitoring of systems, and for a host of 
    other uses; because our ability to understand its full impact on society seems 
    unable thus far to keep up with its explosive growth; and because it is inherently 
    insecure.[122]
Malicious attacks on DNS servers can result in "falsified" DNS 
    responses that divert or hijack traffic to counterfeit web pages and misdirect 
    e-mail.[123]  The widespread use of DNS data caches by ISPs 
    and lower-level networks allows attackers to engage in cache poisoning and 
    cache spoofing to accomplish similar results.  
    As a result of these and other deficiencies in the original DNS specification, 
    the Internet Engineering Task Force (“IETF”) has been working on a set of 
    security-enhancing tools, known collectively as DNS Security (“DNSSEC”).[124]  DNSSEC uses public key cryptography to verify 
    the authenticity of DNS data.[125]  DNSSEC essentially facilitates a chain of trust 
    starting with the root name servers and proceeding through the hierarchical 
    resolution of a domain name.[126]  At each zone in the DNS, the information is 
    electronically signed and, when received by others, the signature of the upper 
    level zone is verified using an associated public encryption key.[127]   
 
    
    {62}         
     
    
    There is a more basic security problem.  
    Due to the hierarchical nature of the DNS, the root name server system 
    is the most vulnerable component of the DNS.  
    The simplest form of attack is an attack on any of the thirteen root 
    domain servers.  The recent distributed 
    denial of service attack on the root name servers showed that, although global 
    reachability and packet loss was affected, the network withstood 
    the attack.[128] There is some discrepancy 
    of opinion, however, regarding the degree of resiliency of the root name servers. 
    ICANN claims that, given that the name servers are widely geographically distributed, 
    it is unlikely that all root name servers would be damaged by an attack, environmental 
    crisis or catastrophe.  
 
    
    {63}         
     
    
    In terms of load, it has been estimated, 
    given the amount of current traffic each individual root name server receives, 
    that root name service can function with little to no disruption when 40% 
    of the name servers are offline.  Therefore, should a significant catastrophe 
    or attack occur, the diversity of location will permit the root name server 
    system to continue operation while the disrupted name servers are restored.[129]  Others do not agree.  According to Paul Vixie, 
    one of the developers of BIND, "[t]he Internet is very fragile. . . [I]t 
    would be very easy for an angry teenager with a $300 computer to create almost 
    unlimited pain for anyone on the Internet and not get caught."[130]  It has been suggested by the U.S. National Research 
    Council in an exhaustive study that Internet growth rates will soon outstrip 
    the ability of processing speed of root servers to adequately deal with the 
    number of naming requests.[131]  
 
VII. 
    DECLARING ccTLD INDEPENDENCE
 
    
    {64}         
     
    
    In order to diminish the 
    risks associated with foreign control over ccTLDs, countries need to gain control over their own ccTLD.  The solution 
    proposed here differs from solutions that have been formerly proposed.  One solution is to include country representation 
    in ICANN on the basis that countries have some form of property interest in 
    ccTLDs.  GAC, 
    for example, grounds national interests in the purported fact that ccTLDs are national resources.[132]  The flaw in this proposal is that it ignores 
    the 
 
    
    {65}         
     
    
    Another proposal takes its 
    cue from analogous proposals regarding the problem of privatization in global 
    commerce. On such a view, ICANN’s failure[134] 
    is a symptom of a general problem of globalization.  Barber puts the general problem as follows:
The 
    difficulty nation-states have with globalization comes not just from the force 
    of what is happening in the international arena but from ideological developments 
    within nation-states. The push toward privatization is bipartisan. This is 
    not decentralization -- the devolution of power down the democratic public 
    ladder to provinces, municipalities, and neighbourhoods 
    -- but de-democratization, the shifting of concentrated power at the highest 
    levels from public to private hands. Power shifted from authorities that were 
    hierarchical but also public, transparent, and accountable, to authorities 
    that remain hierarchical but are private, opaque, and undemocratic.[135] 
     
 
    
    {66}         
     
    
    On Barber’s account, there 
    are two competing solutions to the problems of accountability of international 
    institutions such as ICANN.  One is to attempt to democratize international 
    institutions and markets through the creation of a “transnational civil society.”[136]  This effort is led by individuals attempting 
    to create a transnational civic space within which international institutions 
    are accountable.  The call for the DNS 
    to be operated by the International Telecommunications Union, which is subject 
    to the existing international telecommunications regime, is an example of 
    this type of solution within the context of the DNS.  
    
 
    
    {67}         
     
    
    A second solution recognizes 
    that international institutions, whether the United Nations, International 
    Monetary Fund, World Trade Organization, are the creation of national governments 
    and hence should be controlled by national governments.  
    Barber again puts the latter point well: 
National sovereignty is said to be a dying concept, but it is a long way 
    from dead. Sovereign nations remain the locus of democratic society and the 
    only viable powers capable of opposing, subduing, and civilizing the anarchic 
    forces of the global economy. International civil society, the emerging global 
    alternative to the world markets, needs the active support of sovereign states 
    for its fragile new institutions to have even a modest impact.[137]  
 
    
    {68}         
     
    
    Our solution attempts, first, 
    to reassert sovereignty over ccTLDs because national 
    control over individual ccTLDs ensures national 
    participation, accountability and visibility. Secondly, once individual nation 
    states are in control of their own ccTLDs, multilateral 
    negotiations can take place to create a regulatory framework within which 
    individual nations can recognize each others domains.   This reassertion of sovereignty over ccTLDs attempts to provide a form of internationalization 
    of the A root called for by the White Paper that would be sensitive to the 
    sovereign interests of the U.S., as well as those of foreign countries, and 
    creates a framework of greater accountability in which technical management 
    of the DNS can operate.
 
    
    {69}         
     
    
    This change of control may 
    be done either with the cooperation of the 
 
    
    {70}         
     
    
    Alternatively, if the 
 
    
    {71}         
     
    
    Such a Declaration of ccTLD 
    
 
    
    {72}         
     
    
    Barber’s account of the 
    problems of privatization is remarkably similar to independent critiques of 
    ICANN, by Boyle Froomkin and others, which tends 
    to confirm the present analysis.  While 
    one of ICANN’s main rationales was supposed to be an increase in 
    accountability,[140] a consequence of 
    the privatization of the DNS is that the state can use “privatized enforcement and state-backed 
    technologies to evade some of the practical and constitutional restraints 
    on the exercise of legal power over the Internet.”[141]  
 
    
    {73}         
     
    
    Moreover, a government can achieve regulatory 
    ends, often without suffering the political consequences that the same ends, 
    pursued directly, would yield.  In other words, the state can indirectly govern, 
    and impose its agenda upon by simply employing private parties to do indirectly 
    that which it is forbidden to accomplish directly.[142] It is in this respect 
    that Froomkin has argued that the delegation of 
    power by the 
 
    
    {74}         
     
    
    Following Foucault, Boyle noticed that 
    the method of regulation by code on the Internet is a form of discipline.[145]  On this view, regulation by the architecture 
    of DNS makes such regulation invisible 
    and automatic.  It provides a method of individuating registrants 
    and encoding them into a network whose behaviour can thereafter be monitored.  
    Boyle notes that if we understand the methods of “surveillance . . 
    . which presupposes a tightly knit grid of material coercion” rather than 
    an overbearing sovereign who can rule only as far as his/her sword reaches, 
    then we might understand the indirect and hidden regulability of the Internet.[146]   This hidden regulability 
    can also allow non-state actors to achieve influence through influence over 
    the “grid of coercion.” For example, the recent threat by ICANN to terminate 
    Verisign’s contract to manage the .com because it is not ensuring 
    the accuracy of registrant information[147] is grounded in 
    the concern of trademark interests, and others, to be able to know the identity 
    of domain name holders for litigation purposes.
 
    
    {75}         
     
    
    Unfortunately, it is beyond 
    the scope of this paper (and the expertise of the authors) to provide a full 
    technical explanation of how to achieve technical independence.  
    However, a very short summary should suffice for the purposes of this 
    paper.    
 
    
    {76}         
     
    
    The ability to declare independence 
    of ccTLDs hinges on the fact that it is possible 
    to create alternate roots.[148]  More correctly, alternate roots already exist 
    and operate without disrupting the stability of the DNS.  It has been maintained that alternate roots 
    “provide an important check on abuses or bad economic policies of the dominant 
    root operator.”[149]  As Mueller has further argued, banning alternative 
    roots is “inadvisable [or it] may not even be possible.”[150]  These inclusive alternate roots have the information 
    from the A root and alternative TLDs.[151] 
 
    
    {77}         
     
    
    Ironically, the source of 
    the authority of the A root server and those who control it is the fact that 
    it is accepted as an authority by the Internet community.  In particular, it is accepted as an authority 
    by major ISPs throughout the world.  Those 
    ISPs and their name servers are in turn recognized as authoritative by individual 
    computer users.  In order to achieve 
    independence, then, there is a need to renounce the authority of ICANN and 
    the A root server.  In fact, the U.S. 
    government power over the DNS via its A root will and can continue only as 
    long as the other twelve Secondary Root Servers copy and rely on the A root.
 
    
    {78}         
     
    
    One method of attaining 
    independence begins with “enlarging the root.”  In order to accomplish this, it should be recognized 
    that the legacy DNS is not physically hierarchical.  There is a unique root only in a logical or 
    virtual sense.[152]  For, while the A root server is technically 
    a root for those servers that accept it as authoritative, other servers accept 
    one or more of the other thirteen root servers as authoritative.  Thus, individual nations can take it upon themselves 
    to enlarge the root by creating an additional authoritative root server.  
    The national government could then require domestic ISPs to recognize 
    the national root as authoritative.  Essentially, 
    instead of relying on the idea of an authoritative root which is controlled 
    by an independent entity, each country retains authority for its own domain.  In this sense, the national government would 
    have control over its own root.  As 
    mentioned, however, present technical limitations limit the root to thirteen 
    servers.  The issue that then arises 
    is whether the national root will recognize the A root as authoritative.
 
    
    {79}         
     
    
    A second step involves splitting 
    the root.[153]   This step requires that the national authority 
    no longer recognizes the A root as an authority.  Instead national roots may directly recognize 
    other national roots as authoritative peers.  
    This peer-to-peer approach can be extended to other name servers as 
    well.  Currently, if a local name server 
    cannot provide the answer to a query, such as donaldduck.com, the query is 
    sent to the root which returns the address of the authoritative server for 
    the .com domain.  On a peer – to - peer 
    account, each name server would point to the 243 ccTLD 
    root servers as authoritative for ccTLDs and the 
    thirteen Legacy root servers (or the fourteen gTLD 
    servers) as authoritative for gTLDs.  Therefore, if someone in 
 
    
    {80}         
     
    
    This proposal to share the A root assists 
    with the problem of lessening single points of failure and increases the scalability 
    of the DNS.  Two common methods are used to increase the 
    scale of DNS services: caching and server replication.[157]  Caching is a technique allowing frequently accessed 
    names to be cached on a local name server. Replication is a method of distributing 
    databases to multiple name servers.  For example, replication could allow for a root 
    server to provide several ccTLD (such as .uk, .ca, or .de) name server addresses.  Likewise, a name server could provide for the 
    addresses of several root servers.  Unfortunately, 
    the names and address of root servers under the current DNS protocol must 
    fit into a single 512–byte packet and this limits the number of root servers 
    to thirteen.[158]  After reaching its maximum number of servers, 
    the only method to increase the load of the root is to boost the capacity 
    and processing power of the root servers.  
    It appears that there must be an effort to enlarge the number of root 
    servers in order to cope with increased DNS queries.
 
    
    {81}         
     
    
    Perhaps a form of a single 
    physical international root listing all the addresses of authoritative ccTLD 
    servers would emerge, but such a root would not likely be controlled by a 
    single country and would not be authoritative.  
    For example, such a root may be a database with shared access rights 
    according to which each country is able to exclusively manage its information 
    regarding the authoritative ccTLD address.  This 
    method of a p2p-based DNS for ccTLDs would allow 
    each country a choice whether to participate or not.[159]  A non-participating country would continue to 
    recognize the legacy root.
 
    
    {82}         
     
    
    This paper has argued that the 
 
    
    {83}         
     
    
    Emerging national concerns of sovereignty 
    over their own ccTLDs have not been met by the privatization 
    of the DSN. Placing the management of the DNS in ICANN’s 
    hands has further decreased the ability of most nations to control domestic 
    policies affected by the DNS. In order to acquire greater control of the DNS, 
    nations must refuse to recognize the authority of ICANN and the A root server.  
    Instead, the authority over the A root should be shared by a mutual 
    acknowledgment that nations are authoritative for their respective ccTLDs.  Such sharing 
    will require increasing the root server system to include national DNS roots 
    and the introduction of a peer-to-peer protocol into the DNS. 
  
    
    {84}         
     
    
    On this approach, multilateral collaboration 
    is required to create a new DNS political framework and computer architecture, 
    including protocols, standards, and uniform policies within which mutual recognition 
    of national ccTLD authorities can exist.   Such collaboration would ensure that an international 
    DNS policy organization or framework would be accountable to sovereign nations. 
    Sovereign domains would ensure that the power over national policy and law 
    is retained by the country itself and not invisibly housed in technology controlled 
    by a foreign entity.
[*] Kim G. von Arx is Legal Counsel to the Canadian 
      Internet Registration Authority (www.cira.ca) and Gregory R. Hagen is Replacement 
      Assistant Professor, Faculty of Law, 
[1] Governmental Advisory Committee, ICANN, Principles for Delegation and Administration 
      of ccTLDs, at 
      
 http://www.icann.org/committees/gac/gac-cctldprinciples-23feb00.htm 
      (
[2] 
      See David G. Post, 
      The Great Internet Give-Away?, at http://www.temple.edu/lawschool/dpost/icann/ccTLD.html 
      (Mar. 2, 2000); Milton L. Mueller, Governments 
      and Country Names: ICANN’s Transformation into 
      an Intergovernmental Regime, at 
      http://istweb.syr.edu/~mueller/gacnames.pdf 
      (last visited Sept. 19, 2002) (presenting the paper at PCT 2002 Conference 
      in Honolulu, Hawaii and critiquing an increasing international involvement 
      in the DNS). 
[3] M. Stuart Lynn, President’s Report: ICANN – The Case for Reform, 
      at http://www.icann.org/general/lynn-reform-proposal-24feb02.htm  (
[4] David G. Post, Governing Cyberspace, or Where is James Madison When We Need Him?, at http://www.temple.edu/lawschool/dpost/icann/comment1.html 
      
       
      
      (June 1998) (referring to David G. Post, Cyberspace’s Constitutional Moment, THE 
      AMERICAN LAYWER (Nov. 1999)), available at http://www.temple.edu/lawschool/dpost/DNSGovernance.htm). 
      
[5] Hearing 
      Before the Senate Comm. on Commerce, Sci., and Transp., Subcomm. on Sci., 
      Tech., and Space, at http://www.icann.org/correspondence/lynn-testimony-12jun02.htm 
      (
[6] BBC News, Berlusconi Says Italy Committed to Europe, 
      at http://news.bbc.uk/1/hi/world/europe/1760325.stm 
      (last visited 
[7] Management of Internet 
      Names and Addresses, 63 Fed. Reg. 31,741 (proposed 
      
[8] Benjamin R. Barber, Globalizing Democracy, 11 AMERICAN PROSPECT 
      ONLINE 20 (
see also Alejandro Colás, 
      The Promises of International Civil 
      Society: Global Governance, Cosmopolitan Democracy and the End of Sovereignty?, 
      at http://www.theglobalsite.ac.uk/press/107colas.pdf  (
[9]
[10] See 
      Michael Geist, Fair.com?: An Examination 
      of the Allegations of Systemic Unfairness in the ICANN UDRP, at http://aix1.uottawa.ca/~geist/geistudrp.pdf 
      (last visited Aug. 2001); Milton Mueller, An 
      Analysis of ICANN's Uniform Dispute Resolution 
      Policy, at http://www.acm.org/usacm/IG/roughjustice.pdf 
      (last visited 
[11] A. Michael Froomkin & Mark A. Lemley, ICANN and Antitrust, at http://www.law.miami.edu/~froomkin 
      /articles/icann-antitrust.pdf (last visited 
      
[12] A. Michael Froomkin, 
      Wrong Turn in Cyberspace: Using ICANN 
      to Route Around the APA and the Constitution, 50 DUKE 
      L.J. 17, at 45-46 (2000), available at http://www.law.miami.edu/~froomkin/articles/icann.pdf 
      (last visited Sept. 19, 2002); Jonathan Weinberg, ICANN and the Problem of Legitimacy, 50 DUKE 
      L.J. 187, 188 (2000), available at 
      http://www.law.wayne.edu/weinberg/legitimacy.pdf 
      (last visited Sept. 19, 2002).  
[13] Internet Assigned Numbers Authority, Generic Top-Level Domains, at http://www.iana.org/gtld/gtld.htm 
      (last modified 
[14] Internet Assigned Numbers Authority, Root-Zone Whois Information, 
      at http://www.iana.org/cctld/cctld-whois.htm 
      (last modified 
[15] Internet Assigned Numbers 
      Authority, Infrastructure Top-Level 
      Domain, at http://www.iana.org/arpa-dom/ (last modified 
      
[16] See 
      generally DNS Resources Directory, at 
      http://www.dns.net/dnsrd/ 
      (last visited 
[17] The 
[18] Greek Research & Technology Network, 
      Root Name Servers, at http://netmon.grnet.gr/stathost/rootns/  (last modified 
[19] Froomkin, supra 
      note 12, at 45-46.  
[20] Jon Postel, the 
      “creator” and “safekeeper” of the DNS, seemed 
      to have been revered by the world as being, arguably, the most influential, 
      trustworthy, and dedicated management person since the inception of the 
      non-military Internet. 
[21] See 
      President’s and Vice-President’s Report on Global Electronic Commerce, A Framework For Global Electronic Commerce, 
      Information Technology Management Web, at 
      http://www.itmweb.com/essay541.htm 
      (July 1, 1997) (issued by William J. Clinton & Albert Gore, Jr., this 
      document is also known as the “E-commerce White Paper”). 
[22] Management of Internet 
      Names and Addresses, 63 Fed. Reg. 31,741 (proposed 
      
[23] Interestingly, Froomkin 
      and Lemley commented  that, “[t]he White Paper did not actually 
      mandate the creation of this corporation, but . . . only said how nice it 
      would be if someone would form it to undertake certain specified tasks so 
      that the government could strike a deal with it.”  Froomkin & Lemley, supra note 
      11, at 7-8.
[24] Id at 8..  
      
[25] See 
      
[26] Memorandum of Understanding, Dep’t of Commerce 
      and ICANN, at www.ntia.doc.gov/ntiahome/domainname/icann-memorandum.htm 
      (last visited 
[27] Cooperative Research & 
      Development Agreement, U.S. Dep’t of Commerce & ICANN, at www.icann.org/committees/dns-root/crada.htm 
      (last visited 
[28] "IANA (Internet Assigned Numbers Authority) 
      is the organization . . . that, under a contract from the 
[29] Froomkin & 
      Lemley, 
      supra note 11, at 13; Memorandum of Understanding, 
      Dep’t of Commerce and ICANN, supra 
      note 26.
[30] Management of Internet Names and Addresses, 
      supra note 7.
[31]
[32]
[33] Allan Gregg, Presentation to the Annual General 
      Meeting of the Canadian Internet Registration Authority, Canadian Attitudes Toward 
      the Dot-ca Domain, at www.cira.ca/official-doc/104.cira_tsc_en.pdf  (
[34] Id.; 
      see also Press Release, Canadian Internet Registration Authority, Results 
      of a CIRA Study of Canadian Companies, at 
      www.cira.ca/news-releases/72.html  (May 28, 2002).  It appears that the WIPO Standing Committee 
      on Trademarks, Industrial Designs and Geographical Indicators is going to 
      recommend to the WIPO General Assembly that country codes should be protected 
      as geographical indications. Both the long name and short name of the country, 
      appearing in the UN and the ISO 3166 lists, plus any other "common" 
      names (like "Holland," "Ceylon," "Burma" in 
      the six official languages of the UN (English, French, Spanish, Russian, 
      Arabic, and Chinese), in all those alphabets/characters, plus the official 
      language(s) of the country (South Africa has eleven). Protection is to be 
      given in all gTLDs, existing and future, as well as all ccTLDs.  If that was 
      not enough, not only are the exact names protected, but any misleading spellings.  
      See also World Intellectual Property Organization, Standing Committee 
      on Trademarks, Industrial Designs and Geographical Indicators, Second Special 
      Session on the Report of the Second WIPO Internet Domain Name Process, The 
      Protection of Country Names in Domain Name System, at http://www.wipo.int/sct/en/documents/special_session/pdf/sct_s2_3.pdf  (Mar. 29, 2002).  
[35] Letter from Michael Binder, Assistant Deputy 
      Minister, Industry Canada, to Robert Hall, Chair, Canadian Internet Registration 
      Authority, at www.iana.org/reports/industry-canada-letter-11mar99.htm 
      (last visited Mar. 11, 1999).  
[36] Press Release, NeuStar, 
      Inc., U.S. Government Selects Neustar To Manage 
[37] Commission Working Paper, 
      The Creation of the .EU Internet Top Level Domain, at 5, at http://europa.eu.int/comm 
      /information_society/policy/internet/pdf/doteu_en.pdf  (
[38]
[39] Letter from Richard Alston, Senator and Minister 
      for Communications, Information Technology and the Arts, Australia, to M. 
      Stuart Lynn, President and Chief Executive Officer, Internet Corporation 
      for Assigned Names and Numbers, at 
      www.iana.org/cctld/au/alston-to-lynn-04jul01.htm  (July 4, 2001).  
[40] Electronic Communications 
      and Transactions Bill No. 23195, GOV'T 
      GAZETTE, 
[41]
[42]  Namespace, Government Involvement in ccTLD Administration, 
      CCTLD REVIEW, 
      at http://www.namespace.org.za/cctld_review.html  (Mar. 26, 2002); see also Nominet .UK News, Annual General Meeting 2000, at www.nominet.org.uk/members/agm2000 
      .html  (last visited Sept. 20, 
      2002); Nominet.UK News, Reflections 
      on the AGM 2001, at www.nominet.org.uk/news/agm-reflect.html 
      (last visited Sept. 20, 2002).
[43] Governmental Advisory Committee, supra note 1.
[44] Communiqué of the Government 
      Advisory Committee, ICANN, at 
      http://cyber.law.harvard.edu/icann/santiago/archive/GAC-Comminuque-mtg3.html 
      (last visited 
[45] Internet Coordination Policy, 
      ICANN, ICP-1: Internet Domain Name System Structure and Delegation 
      (ccTLD Administration and Delegation), at 
      www.icann.org/icp/icp-1.htm 
      (May 1999) (containing a summary of current practices of the ICANN).    
[46]
[47] ICANN. ICANN: A Blueprint for Reform, at http://www.icann.org/committees/evol-reform/blueprint-20jun02.htm 
      (last visited 
[48] Elliot Noss, et 
      al., A New Approach to ICANN Reform: 
      The Heathrow Declaration, at http://www.byte.org/heathrow/heathrow-declaration-v0r0d5-032502.html 
      (
[49] New.Net, A Proposal for More Realistic Domain Name Governance, 
      at http://www.new.net/WhitePaper_v2.html 
      (last visited Mar. 2002).  
[50] John Perry Barlow, The Accra Manifesto, at http://lists.essential.org/pipermail/random-bits/2002-March/000792.html 
      (last visited 
[51] John Perry Barlow, A Declaration of the Independence of Cyberspace, 
      at http://www.eff.org/~barlow/ 
      Declaration-Final.html (Feb. 8, 1996). 
[52] Barlow, supra note 50.
[53]
[54] Steve Kettmann, 
      Will US Release Grip on ICANN?, WIRED NEWS, 
      at http://www.wired.com/news/infostructure/0,1377,49836,00.html 
      (
[55]
[56]
[57] Improvement of Technical Mgmt. of Internet Names and Addresses, 
      63 Fed. Reg. 8826 
      (
[58] Management of Internet Names and Addresses, 
      supra note 7.
[59] Angela Proffitt, 
      Drop the Government, Keep the Law:  New International Body for Name Assignment Can 
      Learn from 
[60] Industry Canada, Reform of the Domain Name System: Current Developments & Statement 
      of Principles: An Information Paper Prepared by Industry Canada with the 
      assistance of Omnia Communications Inc., at http://e-com.ic.gc.ca/english/strat/651d2.html  (Sept. 1998).
[61] Management of Internet Names and Addresses, 
      supra note 7.
[62] ICANN, Proposed TLD Sponsorship Agreement, at http://www.icann.org/tlds/agreements/sponsored 
      /sponsorship-agmt-16oct01.htm (
[63] See, e.g., ICANN, Registrar Accreditation Agreement, at www.icann.org/registrars/ra-agreement-17may01.htm 
      (
[64] ICANN, ccTLD Sponsorship Agreement (.au), at www.icann.org/cctlds 
      /au/sponsorship-agmt-25oct01.htm (
[65] ICANN, ccTLD Sponsorship Agreement (.jp), 
      at www.icann.org/cctlds/jp 
      /sponsorship-agmt-27feb02.htm  (
[66]
[67] CcTLD Sponsorship Agreement (.au), 
      supra note 64, art. 
      6.2; ccTLD Sponsorship Agreement (.jp), 
      supra note 65, art. 6.2. 
[68] CcTLD Sponsorship Agreement (.au), 
      supra note 64, art. 
      6.2; ccTLD Sponsorship Agreement (.jp), 
      supra note 65, art. 6.2.
[69] CcTLD Sponsorship Agreement 
      (.jp), supra note 65, art. 6.3; ccTLD Sponsorship Agreement (.au), supra note 
      64, art. 6.3.  
[70]
[71]
[72] ICANN, Preliminary Report, Special Meeting of the 
      Board, at http://www.icann.org/minutes/prelim-report-25sep00.htm 
      (
[73] See, 
      e.g., ICANN, Memorandum of Understanding between the Department of Commerce 
      and the Internet Corporation for Assigned Names and Numbers, amend. 2, at http://www.icann.org/general/amend2-jpamou-07sep00.htm 
      (
[74] IANA, IANA 
      Report on Request for Redelegation of the .au 
      Top-Level Domain, at 
       www.iana.org/reports/au-report-31aug01.htm 
      (
[75] J. Postel, Domain 
      System Structure and Delegation, Memo in response to Request for Comments, 
      No. 1591, at www.isi.edu/in-notes/rfc1591.txt 
      (Mar. 1994) (J. Postel is associated with the 
      University of Southern California, Information Sciences Institute).   
[76] Internet Coordination Policy, supra note 45.  
[77] Governmental Advisory Committee, supra note 1.  
[78] IANA, IANA 
      Report on Request for Redelegation of the .ca 
      Top-Level Domain, at http://ww.iana.org/reports/ca-report-01dec00.htm 
      (Dec. 1, 2000);  see also Letter from Maureen Cubberley, 
      Chair, Canadian Internet Registration Authority, to Michael Roberts, President 
      and Chief Executive Officer, Internet Corporation for Assigned Names and 
      Numbers, at http://www.iana.org/reports 
      /cira-letter-30nov00.htm (Nov. 30, 2000).  
      
[79] 
      IANA, supra note 78.
[80] See 
      generally Letter from Derek A. Newman, attorney, Newman & Newman 
      LLP, to Louise Touton, Vice President and General 
      Counsel, IANA, at www.wwtld.org/Tracking_IANA/CX_Touton_Nameserver_Changes_20011213.pdf  (Dec. 13, 2001) (regarding the .cx Christmas Islands).  To 
      this date, there has still not been a redelegation 
      of .cx.  
[81] ICANN, Announcement, Redelegation of .us Country-Code Top-Level Domain, at www.icann.org/announcements/announcement-19nov01.htm 
      (
[82]
[83]
[84] ICANN, Articles 
      of Incorporation, para. 3, 
      at http://www.icann.org/general/articles.htm 
      (Nov. 21, 1998).  
[85] ISO 3166 Maintenance Agency, 
      English Country names and Code Elements, at www.din.de/gremien/nas/nabd/iso3166ma/codlstp1/en_listp1.html 
      (last modified 
[86] ISO 3166 Maintenance Agency, ISO 3166-1 and Country Coded Top-Level Domains 
      (ccTLDs), at http://www.iso.org/iso/en/prods-services/iso3166ma/04background-on-iso-3166/iso3166-1-and-ccTLDs.html 
      (last visited 
[87] Sergey 
[88] ICANN, Internet 
      Assigned Numbers Authority Report on Request for Delegation of the .ps Top-Level Domain, at http://www.iana.org/reports/ps-report-22mar00.htm 
      (
[89] Commission Working Paper, supra note 37.  
[90] Letter from Erkki 
      Liikanen, Member of the European Commission, to 
      Mike Roberts, President and Chief Executive Officer Internet Corporation 
      for Assigned Names and Numbers, at 
      http://europa.eu.int/ISPO/eif 
      /InternetPoliciesSite/DotEU/LetterLiikanenRoberts.html  (July 6, 2000).  
[91] Letter from Michael M. Roberts, President 
      and Chief Executive Officer Internet Corporation for Assigned Names and 
      Numbers, to Erkki Liikanen, 
      Member of the European Commission, 
      at www.icann.org/correspondence/roberts-letter-to-liikanen-10aug00.htm 
      (Aug. 10, 2000).  
[92] ICANN, Preliminary 
      Report, Special Meeting of the Board, supra 
      note 72; see also Posting of Ant 
      Brooks, ant@hivemind.net, to cctld-discuss@wwtld.org, at http://www.wwtld.org/mailarchive/cctld-discuss/vol01/msg00287.html 
      (discussing Andrew McLachlin’s interpretation 
      of the resolution) (Sept. 30, 2000). 
[93] See 
      Commission of the European Communities, Proposal for a Regulation of the 
      European Parliament and of the Council on the Implementation of the Internet 
      Top Level Domain “.EU,” at http://europa.eu.int/eur-lex/en/com/pdf 
      /2000/en_500PC0827.pdf  (Dec. 
      12, 2000).  
[94] See 
      Press Release, European Commission, Commission Welcomes Adoption of Regulation 
      for “.eu” Internet Domain Names, at 
http://europa.eu.int/rapid/start/cgi/guesten.ksh?p_action.gettxt=gt&doc=IP/02/468 |0|RAPID&lg=EN  
(last visited 
[95] David McGuire, ICANN Has Final Say on Dot-EU Internet Domain – Update, NEWSBYTES 
      (
[96] ICANN, Preliminary 
      Report, Special Meeting of the Board, supra 
      note 72.     
[97] This may raise an interesting issue of undue 
      influence.  
[98] ICANN, Model 
      ccTLD Sponsorship Agreement – Triangular Situation, 
      para. 4.5.1, at http://www.icann.org/cctlds/model-tscsa-31jan02.htm 
      (
[99] See 
      also MILTON L. MUELLER, 
      RULING THE ROOT: INTERNET 
      GOVERNANCE AND THE TAMING 
      OF CYBERSPACE 211-26 (The MIT Press 2002).
[100] Milton L. Mueller, An Analysis of ICANN's 
      Uniform Dispute Resolution Policy, at 
      http://www.acm.org/usacm/IG/roughjustice.pdf 
      (last visited 
[101] MUELLER, 
      supra note 99, at 228-53.
[102] Heathmount A.E. Corp. v. Technodome.com, No. CA-00-00714-A, 2000 
[103]
[104]
[105] Rep. Howard Coble, To Provide Criminal Penalties for Providing False Information in Registering 
      a Domain Name on the Internet (introduced 5/2/2002), at  http://thomas.loc.gov/cgi-bin/query/z?c107:h.r.4640: 
      (last visited Nov. 14, 2002).
[106] See 
      The Accuracy and Integrity of the 
      Whois Database: Hearing Before the Subcomm. 
      on Courts, the Internet, and Intellectual Prop. 
      of the House Comm. on the Judiciary, 107th Cong. (statement 
      of Michael D. Palage), at http://www.house.gov/judiciary/palage052202.PDF  (2002) (last visited 
[107] ICANN, Model 
      ccTLD Sponsorship Agreement – Triangular Situation, 
      supra note 98, at para. 4.2.
[108] Dan Bart, Nations and a World at Risk, Report of 
      the Telecommunications Standards Advisory Council of Canada 3, available at http://www.tiaonline.org/standards/cip/ciptsacc.pdf 
      (Mar. 24, 1999).  
[109] United 
      States Commission on National Security/21st Century, New World Coming: American 
      Security in the 21st Century, Supporting Research and Analysis 52 
      (1999), available at http://www.nssg.gov/NWR_A.pdf (Sept. 
      15, 1999). 
[110] Froomkin, supra 
      note 12, at 48-49. 
[111] See 
      Glenn H. Takemoto, Information Warfare in the Cyber Domain, at 3-5 (2001), at http://www.infowar.com/mil_c4i/01/IWinCyberDomain.pdf 
      (last visited 
[112] CHAIRMAN OF THE JOINT 
      CHIEFS OF STAFF, JOINT 
      VISION 2020, at 8, available 
      at http://www.dtic.mil/jv2020/jv2020.doc 
      (June 2000). 
[113]
[114] See 
      generally Dorothy E. Denning, Activism, 
      Hacktivism, and Cyberterrorism: 
      The Internet as a Tool for Influencing Foreign Policy, at 
      http://www.nautilus.org/info-policy/workshop/papers/denning.html 
      (last visited 
[115] See 
      generally Mike Balough, Army Digitization 
      Overview, Report to the Defence Industry Association, available at http://www.dtic.mil/ndia/cannon/balough.pdf 
      (
[116] Letter from Billy Tauzin, et al, Chairman, 
      House Committee on Energy and Commerce, to Donald L. Evans, Secretary of 
      Commerce, at http://www.politechbot.com/p-03268.html 
      (Mar. 13, 2002). 
[117] New.net, supra note 49.  
[118]
[119] Takemoto, supra note 111, at 3-5.
[120] There does not appear to be an active .iq registry.
[121] Executive Summary, President’s Commission 
      on Critical Infrastructure Protection, Critical Foundations: Protecting 
      America’s Infrastructures, available 
      at http://www.ciao.gov/resource/pccip/PCCIP_Report.pdf  (Oct. 1997). 
[122]
[123] ICANN, ICANN DNS Security 
      Update #1, at http://www.icann.org/committees/security/dns-security-update-1.htm 
      (
[124]
[125]
[126]
[127]
[128] Matrix Systems, Distributed Denial of Service Attack, available 
      at http://www.matrixnetsystems.com/ea/advisories/20021022_instant_alert.jsp. 
      (last visited 
[129]
[130] Reuters, Experts: Hackers Could Easily Shut Down 
[131] NATIONAL 
      RESEARCH COUNCIL, COMMITTEE 
      ON THE INTERNET IN THE EVOLVING 
      INFORMATION INFRASTRUCTURE, 
      COMPUTER SCIENCE AND TELECOMMUNICATIONS 
      BOARD, THE INTERNET'S COMING 
      OF AGE 63 (National Academy Press 2001), 
      available at http://www.nap.edu/books/0309069920/html 
      (last visited Sept. 19, 2002).  
[132] Governmental Advisory Committee, supra note 1.
[133] This issue is more fully discussed in G. 
      Hagen, Sovereign Domains and Property 
      Claims, INT'L 
       J.L. TECH. (forthcoming 
      Spring, 2003).
[134] See Froomkin & Lemley, 
      supra note 11, at 1-2; Froomkin, supra 
      note 12, at 29-32. 
[135] Barber, supra note 8. 
[136]
[137]
[138] See 
      G. Hagen & K. G. von Arx, Patriation of the .ca, 
      CAN. J.L. & TECH. 1:3 
      (November 2002).
[139] Management of Internet 
      Names and Addresses, 63 Fed. Reg. 31,741 (proposed 
      
[140] Management of Internet Names and Addresses, 
      supra note 7.
[141] James Boyle, Foucault In Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors, 
      at http://www.wcl.american.edu/pub/faculty/boyle/foucault.htm 
      (1997) (emphasis added).
[142] James Boyle, A Nondelegation Doctrine For The Digital Age?, 50 DUKE 
      L.J. 5, 8-9 (Oct. 2000), available at http://www.law.duke.edu/shell/cite.pl?50+Duke+L.+J.+5. 
      
[143] Froomkin, supra note 12, at 143.
[144] Boyle, supra 
      note 142 at 13-14. 
[145] Id.
[146]
[147] David McGuire, ICANN Threatens to Take Away VeriSign's '.com' 
      Privileges, WASHINGTON POST, 
      Sept. 4, 2002, at E05, available at 
      http://www.washingtonpost.com/wp-dyn/articles/A34373-2002Sep3.html; 
      David McGuire, ICANN Threatens To 
      Revoke VeriSign's Right To Sell Dot-Com Names, WASHINGTON 
      POST, Sept. 3, 2002, available at http://www.washingtonpost.com/ac2/wp-dyn/A33395-2002Sep3?language=printer.
[148] This conflicts with ICANNs 
      assertion in ICP-3, that it is the “single, authoritative public root for 
      the Internet Domain Name System.”  Indeed, 
      its claim is that “[f]rom the inception of the 
      DNS, its most fundamental design goal has been to provide the same answers 
      to the same queries issued from any place on the Internet.” ICANN, ICP-3: A Unique, Authoritative Root for the DNS, at http://www.icann.org/icp/icp-3.htm 
      (
[149] Milton L. Mueller, Competing DNS Roots: Creative Destruction or Just Plain Destruction?, at 16, at http://www.itu.int/osg/spu/seminars/mueller/tprc2001.pdf 
      (
[150]
[151] See, 
      e.g., New.net, supra note 
      49.  
[152] See, 
      e.g., Simon Higgs, Routing Around 
      a Single Point of Failure, at 
      
http://www.icannwatch.org/article.php?sid=198 
      (last visited Sept. 19, 2002); Simon Higgs, Alternative 
      Roots and the Virtual Inclusive Root, at 
      http://www.higgs.com/publications/id/draft-higgs-virtual-root-00.txt 
      (May 2001); Simon Higgs, Root Server 
      Definitions, at http://www.higgs.com/publications/id/draft-higgs-root-defs-00.txt 
      (Feb. 2001).   
[153] Recently Stuart Lynn contended that, “it 
      is simply unthinkable that a large fraction of the TLDs 
      in the root zone file should be permitted to operate independently of the 
      global community and of policies established by the global community. In 
      each case, it is essential that these critical entities formally agree not 
      to break the DNS, and to abide by standard global operational practices 
      arrived at through the ICANN process.”  
[154] See 
      generally Hagen & von Arx, supra 
      note 138.  
[155]MUELLER, supra 
      note 99, at 48. 
[156] This simple outline of a p2p based system seems to confirm the judgment 
      of the ICANN Protocol Supporting Organization that it is technically to 
      devise a multiple root DNS. “Although, it would be technically possible 
      to devise and standardize a fully compliant alternative multiple root server 
      system, there appears no technical reason for changing from the present 
      working system, as this would require the development of a new set of protocols 
      for use by the DNS.”  ICANN Protocol 
      Standards Organization, Minutes, 
      at http://www.pso.icann.org/PSO_Minutes/PSO-Minutes-4Sept2001.txt 
      (
[157] NATIONAL RESEARCH 
      COUNCIL, supra 
      note 131.  
[158]
[159] Of course, the above scheme could also apply 
      to all TLDs.  We 
      have not proposed such a solution in this paper. However, as time goes on, 
      the DNS may have 257 root servers.  In 
      other words, each gTLD and ccTLD would have its own root server, which points to other 
      authoritative root servers.