by: Kim G. von Arx and Gregory R. Hagen[*]
III. DoC's CONTRACTUAL CONTROL OF ICANN
1. The Case of the Redelegation of .au, .jp, .bi and .mw
2. The Case of the .us Redelegation and the Power of the DoC
{1}
In the year 2000, the Government Advisory
Committee (“GAC”) of the Internet Corporation for Assigned Names and Numbers
(“ICANN”) passed a set of principles that essentially claimed national sovereignty
over country code top-level domains (“ccTLD”s) such
as .us, .ca, .uk and .au.[1] Shortly thereafter, ICANN redelegated
several ccTLDs in accordance with new GAC principles.
Despite the outcry accompanying the passage of these principles[2] and ICANN’s self-professed adherence thereto, the entire exercise
could easily be criticized as merely symbolic because of the overriding power
of ICANN in the operation of the Domain Name System (“DNS”).
Indeed, Stuart Lynn, ICANN’s current president, summed up the lack of power that
ccTLDs have within the governance structure of the
Internet when he opined that “ICANN could, in theory, recommend that a particular
ccTLD be redelegated to
a cooperating administrator. If the
{2}
As
{3}
The DoC has a strong enforcement power because it has a domain
registrar’s or registrant’s virtual life in its hands. It has the power to enforce the decision by
evicting anyone from his or her cyberspace domain. As Post quite aptly stated, “the domain name
system . . . [is] the one place where enforceable Internet policy can be promulgated
without any of the messy enforcement and jurisdictional problems that bedevil
ordinary law-making exercises on the Net.”[4] Put another way, the hierarchical architecture
of the DNS is sufficient to endow those who control the A root with the power
to make and enforce law and policy regarding domain names. Equally troubling, the control over the A root
also invites economic, political, and social pressures that inevitably force
ICANN to go beyond its delegated powers of technical management of the system
to include derivative powers.[5] Such derivative powers may be applied to areas
considered to be those reserved to national sovereigns, including matters
of registry regulation, name policy, electronic surveillance, national defense,
and critical infrastructure.
{4}
Despite a few early demands that the
U.S. withdraw from control of the DNS, and the later emands
and claims of GAC, curiously, none of the individual 243 countries with delegated
ccTLDs have complained forcefully about the lack of sovereignty
over their own ccTLD, nor of any of the general
policy implications. This lapse is
peculiar since nations desperately guard sovereignty over their physical domains
against advancing globalization. Italian
prime minister Silvio Berlusconi,
for example, in his speech to the Italian parliament, reassured the nation
as well as the European Union (“EU”), of
{5}
ICANN originated in part from the recognition
of the globalization of the Internet as a communications network. Because
of the increasingly global scale of the Internet, the U.S. Government desired
to rid itself of the task of operating the DNS and also wanted to obtain international
input into the technical management of the DNS.
At the same time, it wanted to maintain control over critical DNS policies
through a reservation of control of the A root.
The solution that was arrived at was to privatize the management of
the DNS by placing management in ICANN, a private
{6}
Thus, from its inception, ICANN was
intended to preclude the participation of “national governments acting as
sovereigns. . . [or] intergovernmental organizations acting as representative
of governments.”[7] Yet, the formation of ICANN to manage the DNS
appeared to be tempered by the
{7}
As Barber has pointed out, one aspect
of globalization – privatization – has had the effect of placing transnational
organizations outside the regulatory environment of the nation state.[8] On his view, such organizations are rogue institutions
operating in an anarchic realm devoid of significant regulation, unprepared
to enter into a form of international civil society.[9] Similarly, ICANN has been placed in the curious
position that its conduct is too tightly controlled by the DoC, on the one hand, and not accountable to nation states
and the
{8}
The source of control over ICANN is
control over the A root. Thus, the ultimate problem with DNS, on our account,
is precisely that the
{9}
While it is possible to overstate the
risks associated with foreign control over country domains, the existing system
highlights a tension between national interests and the existence of a network
architecture which is currently beyond the ability of national governments
- other than the
{10}
This paper will briefly introduce DNS
and also introduce the problem of
{11}
The existing naming scheme is hierarchical.
Internet address names consist of alphanumeric strings separated by
a dot (•), e.g., law.richmond.edu, and are read from left (the lower level
of the domain) to right (the higher level of the domain). Theoretically, there is a highest-level domain
at the apex of the domain name space, the “root domain,”
which is usually left unnamed, under which all domains fall.
{12}
There are 258 top-level domains, which
are the highest level of named domains, i.e., the part of the address to the
extreme right. There are three types
of TLDs. One is the generic
TLD (gTLD)[13] such as .com, .org,
.net, and .mil. The second one is the
country code TLD ("ccTLD")[14] such as .ca (Canada),
.de (Germany), .uk (United Kingdom), .tv (Tivoli), .ch (Switzerland),
.au (Australia), and .jp (Japan). Finally, there is one infrastructure TLD ("iTLD")[15] called .arpa.
ccTLDs are perceived as being connected
to a specific territory or country whereas gTLDs
are global and generally not associated with any territory or country. The iTLD is the Address and Routing Parameter
Area domain and is used solely for Internet infrastructure purposes; therefore,
it does not affect or concern the normal user in any way.
{13}
While the architecture of the DNS is
becoming common knowledge, a brief review is helpful as background to our
main thesis.[16] Each computer located on the Internet is assigned
an Internet Protocol (“IP”) address for data packet delivery. Many computers, or hosts, that are connected
to the Internet are also assigned an alphanumeric name such as “icann.org.”
This name, however, is not required by the network software, but is
used for human mnemonic convenience and to provide for stability of services,
such as e-mail, when there is a change of host.
To the network, however, “icann.org” is meaningless until it is translated
into a numerical IP address. Name resolution
is carried out by the DNS, a distributed naming system comprised of a huge
list of computer names and their corresponding numerical IP addresses.
{14}
When a domain name is entered into the
location box of an Internet browser, a local DNS resolver,
a small piece of client software, first contacts a name server close to the
Internet surfer to determine the website’s IP address.
Generally, the local ISP name server is able to supply the IP address
associated with the domain name. If
the local DNS server does not contain the needed information, then it will
forward the request to the A root name server controlled by ICANN.
This A root name server contains the IP address of all the authoritative
name servers for TLDs in a file, the A root zone
file. This A root name server
will return the information about the location of the authoritative name server
for the requested domain name.
{15}
In fact, there is no single unique root
name server. There are thirteen root
name servers (which are assigned letters from A–M).[17] Only one of them, the so-called A root, contains the “original” root zone file. The A root, the primary server, resolves queries
by referring the inquiring computers to the Internet
address of the computer that has the authoritative list of the registered
domain names in the relevant TLD. This single root zone file is made available
to the twelve other root servers, the secondary root servers. Nine of the
secondary servers are also physically located in the
{16}
The sharing of control over
the A root suggested in this paper would amount to “splitting” the root in
the sense of defying the authority of the A root. In the past, there were concerns that secondary
root servers could split, endangering internet stability. It has been argued,
however, that, as long as the United States government retains control of
the A root, the probability that any of the other secondary root servers would
choose to split, i.e., that they would no longer regard the A root as authoritative,
is very remote.[19] The reasons proffered are as follows. First, as discussed above, eight of the legacy
root servers (including the A root) are owned by the
III.
DoC’s CONTRACTUAL CONTROL OF ICANN
{17}
DoC controls ICANN
through a contractual framework underpinned by the DoC
control of the A root domain server. DoC control of the A root came about because the
{18}
Fortuitously, a new corporation,
ICANN, was soon incorporated and the
{19}
In regard to the Memorandum
of Understanding, the original and all subsequent extensions provide for DoC’s
power to terminate the agreement on 120 days notice.
Also, the major contracts between DoC and
ICANN require annual or semi-annual renewals, and as such DoC
has the power to pressure ICANN into submission by threatening transfer of
powers to another body. [29]
IV. NATIONAL GOVERNMENTS’
ROLE IN THE DNS
{20}
Technically, the ccTLDs
are subdomains of the “root domain” created by the
{21}
In spite of the fact that ccTLDs
are subdomains of the root domain, countries are
increasingly associating their ccTLD with their respective country. Certain ccTLD registries, such as
{22}
According to a recent survey by Market
Research commissioned by CIRA 75% of Canadians believe .ca means
{23}
Some countries have claimed that they
are national authorities over their ccTLDs. For example,
the EU noted that it appears to be the competent ‘public authority’ for the
purposes of the .eu TLD, and should be recognised as such by ICANN.[38]
{24}
Concerns over national sovereignty
culminated in the issuance of a communiqué by GAC establishing principles
of delegation and redelegation of ccTLDs.[43] These principles established
a set of correspondence that must occur in order for a valid redelegation to take place. In its communiqué, “[t]he GAC
also reaffirmed that the delegation of a ccTLD Registry
is subject to the ultimate authority of the relevant public authority or government.
The GAC discussed the development of best practices for the administration
of ccTLDs and agreed to continue this discussion.”[44] In
the earlier ICP-1, the role of national government had been less influential
than that accorded by GAC in the delegation and redelegation
process: “The desires of the government of
a country with regard to delegation of a ccTLD are
taken very seriously. The IANA will make them a major consideration in any
TLD delegation/transfer discussions.”[45]
{25}
Despite the criticisms that
have been leveled at ICANN regarding its management of the DNS, there has
been little critical comment on the U.S. DoC control
over the A root server system. While Stuart Lynn’s President's Report: ICANN – The Case for Reform noted that “if ICANN comes to be seen . . . as simply a tool
of the US Government, it will no longer have any hope of accomplishing its
original mission,” [46] this
point has not spurred any widely agreed-upon solution. Neither the Blueprint
for Reform,[47]
The Heathrow Declaration,[48] the New.net
Proposal[49] nor John Perry
Barlow’s Accra Manifesto,[50] substantially
criticize the
{26}
Past and recent developments in the
It
might be that after the Sept. 11 attacks, the
{27}
Carl Auerbach, an ICANN director, seems to agree with Müller-Maguhn.[55] Both refer to remarks made by Nancy Victory,
Assistant Secretary of Commerce for Telecommunications and Information as
evidence of this recalcitrance, stating that, “[r]egarding
the A Root server, the Department of Commerce has no plans to transfer policy
control . . . [W]hen the necessary technical capacity is in place, the department
may enter into a management agreement or other legal arrangement with ICANN
for operation of the A Root server.”[56]
V.
THE POWERS OF ICANN AND THE
{28}
The power of the
{29}
It
is clearly not enough for the
{30}
The
The U.S. Government believes that the Internet is a global medium and that its technical management should fully reflect the global diversity of Internet users. We recognize the need for and fully support mechanisms that would ensure international input into the management of the domain name system. In withdrawing the U.S. Government from DNS management and promoting the establishment of a new, non-governmental entity to manage Internet names and addresses, a key U.S. Government objective has been to ensure that the increasingly global Internet user community has a voice in decisions affecting the Internet's technical management.[61]
{31}
Regardless of the fact that ICANN has
directors from diverse geographical areas, the international makeup of ICANN
remains more apparent than real. National governments
are not members of ICANN, and the GAC is solely an advisory group which ICANN
may ignore at its pleasure. More importantly,
the
{32}
ccTLDs were delegated originally by Jon Postel without the benefit of any formal written agreement.
However, ICANN is attempting to remedy the lack of a contractual arrangement
between ICANN and the various ccTLDs by pressuring ccTLDs to enter
into a formal contractual relationship.[62] This contract-based scheme is already becoming
the standard method of governing relations between TLD registrars and registries.[63] Until recently, none
of the ccTLD registries had been able to arrive
at a mutually acceptable agreement with ICANN.
However, on
{33}
Article 6.2 of the sponsorship agreements
sets out when ICANN and the sponsoring authority can terminate the agreement.[67] ICANN can unilaterally terminate the agreement
if there is a material breach of the contract, or if arbitration shows that
the sponsoring organization is in violation of the agreement.[68] Article 6.3 sets out the effect of termination:
upon termination, ICANN must, with coordination of the government authority,
notify the sponsoring organization of the successor.[69]
{34}
Most countries have not signed an agreement
with ICANN due to differences of opinion in regard to adequacy of payments,
equality in decision-making, representation within the ICANN structure, and
various other matters.[70] This, of course,
raises the following question: why were the registries of
1. The
Case of the Redelegation of .au, .jp,
.bi and .mw
{35}
The source of ICANN’s
power over registrars is its ability to “recommend [to DoC]
that a particular ccTLD be redelegated to a cooperating
administrator.”[71] As already
mentioned above,
It is further RESOLVED [00.75] that in view of the state of ongoing discussions
directed toward reaching stable and appropriate agreements between ICANN and
the ccTLD organizations, delegation of additional
ccTLDs should be finalized only upon achievement
of stable and appropriate agreements between ICANN and the ccTLD
organization, in a form approved by the Board.[72]
{36}
Although this resolution
concerns the creation of additional
ccTLDs, it is possible that this policy was applied
by ICANN to redelegations as well.[73] On this view, each of the registries of
{37}
However, this explanation does not explain
why
2.
The Case of the .us Redelegation and the Power of
the DoC
{38}
Perhaps, the most interesting
example of the use of the power to redelegate (without
any regard to ICANN policies and procedures which other ccTLDs are meticulously forced to follow)[80] is the redelegation
of the .us, in that it reveals that the technological control of DoC
allows it to influence policy. This
transfer was apparently forced upon the existing .us registry, Verisign,
and was done without regard for ICANN’s policy that
required mutual agreement between the old and new registries. Indeed, it was completed “before the completion
of the normal IANA requirements [of a formal written agreement].”[81] While the earlier hostile redelegation
of .au was done with ICANN’s full approval, the
redelegation of .us was not. The official, but obscure, explanation can be
found in the only existing communication, an announcement from ICANN about
the redelegation. It reads: “[t]he
United States Government informed ICANN on
{39}
ICANN admits that if it
had not accepted the request from the
C. Power to Create and Destroy
ccTLDs
{40}
The control over the A root provides
the power to create or destroy ccTLDs and implies that no country or union of countries can
unilaterally force inclusion in the A root.
In this area, ICANN has purported to maintain a separation between
technical operation and policy by deferring to the ISO 3166-1 country code
list. Because IANA cannot assess whether
or not particular areas are “countries,” the policy set forth in ICP-1 for
delegation matters has been to simply refer to the ISO 3166-1 list as an independent
and authoritative source of two-letter abbreviations for countries and areas.[85] Therefore, almost all of the ccTLDs are derived from the official ISO standard. Five ccTLDs, however,
have been created by ICANN which are not based on the official ISO list, but
which can be found on the ISO country code reserve list.[86]
{41}
An example of an uncontentious
ccTLD removal is the
{42}
In 1999, the EU announced its plan to
introduce a new ccTLD -- .eu.
Then, on
{43}
On
{44}
In light of these powers and the unwillingness
to give up any control over ccTLDs, the following question arises: what are the associated
risks that come with a U.S.-controlled DNS? They include loss of sovereignty over policies
relating to domain registry regulation, name policy, privacy, electronic surveillance,
national security and critical infrastructure.
A.
Loss of ccTLDs’
Sovereignty
{45}
The power of ICANN to threaten a ccTLD
with potential redelegation or annihilation provides ICANN with a mechanism
to ensure ccTLD compliance with ICANN policies and
to force the adoption of ICANN-friendly contractual terms and conditions. These contractual terms and conditions can mandate
or influence the types of policies that will be created and enforced by the
ccTLD. Thus,
to the extent that ccTLD policies impinge on domestic
policy, they also diminish the sovereignty of nations to adopt laws independently
of ICANN. The current Model ccTLD
sponsorship agreement provides that a ccTLD must
conform to ICANN policies where they concern “the interoperability of the
Delegated ccTLD with other parts of the DNS and
Internet; technical operational capabilities and technical performance of
the ccTLD operator; and the obtaining and maintenance
of, and public access to, accurate and up-to-date contact information for
domain name registrants.”[98] Interpreted broadly, “interoperability” and
“technical operations capabilities” could impose subtle effects on the regulation
of registries, name policy, privacy, critical infrastructure, and national
defense in countries foreign to the
{46}
The ability of ICANN to attach conditions
to the use of names enables it to control the supply of domain names.
ICANN can effectively decide the identity of registries.
Generally speaking, foreign nations have simply accepted the
{47}
The technological control over the A
root has enabled ICANN to embark on a program to enlarge rights exceeding
those that formerly existed for names. For gTLDs, this occurs
directly through the Uniform Dispute Resolution Procedure, which has been
viewed as systemically biased toward complainants and trademark interests.[100] On Mueller’s view,
the problem with this trend is that it is inconsistent with the function of
the DNS.[101] Whatever the merits of such criticism, there
is the difficulty that national governments no longer have control over domain
name policy independently of ICANN.
{48}
An example of this phenomenon is the
fact that
D.
Electronic Surveillance & Information Transfer
{49}
The ability of someone to engage in
anonymous transactions on the Internet has been one of its central appeals,
as well as a source of its problems. Recently, a bill was introduced in the United
States Congress to provide criminal penalties for providing false information
when registering a domain name on the Internet.[105] Ensuring the accuracy of registrant information
is considered to be necessary, among other reasons, in order to assist
law enforcement with the timely investigation and prosecution of illegal activity.[106]
Such activity could extend to enforcing laws regarding Internet taxation and
copyright infringement.
{50}
However, the
[t]he
Sponsoring Organization shall ensure that the zone file and accurate and up-to-date
registration data for the Delegated ccTLD is continuously
available to ICANN, in a manner which ICANN may from time to time reasonably
specify, for purposes of verifying and ensuring the operational stability
of the Delegated ccTLD only.[107]
{51}
Such an approach may conflict with certain
national privacy laws prohibiting transfer of information across borders into
states which do not have privacy legislation that the nation of the transferor
considers adequate, unless there is an adequate exemption.
{52}
The importance of the Internet
as a critical infrastructure has become common knowledge.
Former United States President Bill Clinton noted: “The
{53}
It is often pointed out
that since both civilian and military infrastructure in many nations are becoming
increasingly dependent on the existence of the Internet, the ability to disrupt an enemy’s communication might
be a strategic asset.[110] From the point of view of military reasoning,
cyberspace is a new battle space
to which military principles apply on par with land, sea and aerospace.[111] The principle of full spectrum dominance is
said to apply to cyberspace. “The label
full spectrum dominance implies that US forces are able to conduct prompt,
sustained, and synchronized operations with combinations of forces tailored
to specific situations and with access to and freedom to operate in all domains
– space, sea, land, air, and information.”[112] A number of military exercises, such as Eligible
Receiver and Solar Sunrise have demonstrated that attacks on military information
infrastructure can be made successfully.[113]
{54}
While it seems clear that
the Internet itself has become part of the underlying battle space,[114]
and subject to being threatened, it is not clear the degree to which control
over the A root is also a strategic asset.
For example, the degree to which military operations, including the
“digitized battlefield,”[115] depend upon
use of the DNS is unknown. Are e-mails,
for example, encrypted or not, part of the present or future national defense
operations? Given that the importance
of the DNS is not sufficiently known it is not surprising that control over
the DNS would be viewed as critical.
{55}
Recently the Energy and Commerce Committee
sent a letter to Secretary Donald L. Evans of DoC
in response to
{56}
Finally, we want to strongly reiterate
our support for continued Department of Commerce control over the so-called
"A-root" server. We believe that any assumption of control over
that asset by any outside entity would be contrary to the economic and national
security interests of the
{57}
Similarly, New.net suggests
in its proposal to reform ICANN that, “the U.S. Government would be responsible
for making all policy decisions regarding the legacy DNS root,”[117]
and that “[b]y maintaining control over the legacy DNS root, the
{58}
{59}
Of course, if the DNS is
vital to the national security of the
{60}
Critical Infrastructures are systems
whose incapacity or destruction would have a debilitating impact on the defense
or economic security of a nation. These include: telecommunications, electrical
power systems, gas and oil, banking and finance, transportation, water supply
systems, government services and emergency services.[121] The Internet is
increasingly becoming a universal platform on which such critical infrastructure
depends and is, therefore, itself a critical infrastructure.
{61}
A central concern is to ensure that
the Internet is protected from threats. The President's Commission on Critical Infrastructure
Protection concentrated on threats to the information infrastructure. It noted
that:
Threats
to the Internet are of primary concern because we are becoming increasingly
dependent on it for communications—including government and military communications—for
commerce, for remote control and monitoring of systems, and for a host of
other uses; because our ability to understand its full impact on society seems
unable thus far to keep up with its explosive growth; and because it is inherently
insecure.[122]
Malicious attacks on DNS servers can result in "falsified" DNS
responses that divert or hijack traffic to counterfeit web pages and misdirect
e-mail.[123] The widespread use of DNS data caches by ISPs
and lower-level networks allows attackers to engage in cache poisoning and
cache spoofing to accomplish similar results.
As a result of these and other deficiencies in the original DNS specification,
the Internet Engineering Task Force (“IETF”) has been working on a set of
security-enhancing tools, known collectively as DNS Security (“DNSSEC”).[124] DNSSEC uses public key cryptography to verify
the authenticity of DNS data.[125] DNSSEC essentially facilitates a chain of trust
starting with the root name servers and proceeding through the hierarchical
resolution of a domain name.[126] At each zone in the DNS, the information is
electronically signed and, when received by others, the signature of the upper
level zone is verified using an associated public encryption key.[127]
{62}
There is a more basic security problem.
Due to the hierarchical nature of the DNS, the root name server system
is the most vulnerable component of the DNS.
The simplest form of attack is an attack on any of the thirteen root
domain servers. The recent distributed
denial of service attack on the root name servers showed that, although global
reachability and packet loss was affected, the network withstood
the attack.[128] There is some discrepancy
of opinion, however, regarding the degree of resiliency of the root name servers.
ICANN claims that, given that the name servers are widely geographically distributed,
it is unlikely that all root name servers would be damaged by an attack, environmental
crisis or catastrophe.
{63}
In terms of load, it has been estimated,
given the amount of current traffic each individual root name server receives,
that root name service can function with little to no disruption when 40%
of the name servers are offline. Therefore, should a significant catastrophe
or attack occur, the diversity of location will permit the root name server
system to continue operation while the disrupted name servers are restored.[129] Others do not agree. According to Paul Vixie,
one of the developers of BIND, "[t]he Internet is very fragile. . . [I]t
would be very easy for an angry teenager with a $300 computer to create almost
unlimited pain for anyone on the Internet and not get caught."[130] It has been suggested by the U.S. National Research
Council in an exhaustive study that Internet growth rates will soon outstrip
the ability of processing speed of root servers to adequately deal with the
number of naming requests.[131]
VII.
DECLARING ccTLD INDEPENDENCE
{64}
In order to diminish the
risks associated with foreign control over ccTLDs, countries need to gain control over their own ccTLD. The solution
proposed here differs from solutions that have been formerly proposed. One solution is to include country representation
in ICANN on the basis that countries have some form of property interest in
ccTLDs. GAC,
for example, grounds national interests in the purported fact that ccTLDs are national resources.[132] The flaw in this proposal is that it ignores
the
{65}
Another proposal takes its
cue from analogous proposals regarding the problem of privatization in global
commerce. On such a view, ICANN’s failure[134]
is a symptom of a general problem of globalization. Barber puts the general problem as follows:
The
difficulty nation-states have with globalization comes not just from the force
of what is happening in the international arena but from ideological developments
within nation-states. The push toward privatization is bipartisan. This is
not decentralization -- the devolution of power down the democratic public
ladder to provinces, municipalities, and neighbourhoods
-- but de-democratization, the shifting of concentrated power at the highest
levels from public to private hands. Power shifted from authorities that were
hierarchical but also public, transparent, and accountable, to authorities
that remain hierarchical but are private, opaque, and undemocratic.[135]
{66}
On Barber’s account, there
are two competing solutions to the problems of accountability of international
institutions such as ICANN. One is to attempt to democratize international
institutions and markets through the creation of a “transnational civil society.”[136] This effort is led by individuals attempting
to create a transnational civic space within which international institutions
are accountable. The call for the DNS
to be operated by the International Telecommunications Union, which is subject
to the existing international telecommunications regime, is an example of
this type of solution within the context of the DNS.
{67}
A second solution recognizes
that international institutions, whether the United Nations, International
Monetary Fund, World Trade Organization, are the creation of national governments
and hence should be controlled by national governments.
Barber again puts the latter point well:
National sovereignty is said to be a dying concept, but it is a long way
from dead. Sovereign nations remain the locus of democratic society and the
only viable powers capable of opposing, subduing, and civilizing the anarchic
forces of the global economy. International civil society, the emerging global
alternative to the world markets, needs the active support of sovereign states
for its fragile new institutions to have even a modest impact.[137]
{68}
Our solution attempts, first,
to reassert sovereignty over ccTLDs because national
control over individual ccTLDs ensures national
participation, accountability and visibility. Secondly, once individual nation
states are in control of their own ccTLDs, multilateral
negotiations can take place to create a regulatory framework within which
individual nations can recognize each others domains. This reassertion of sovereignty over ccTLDs attempts to provide a form of internationalization
of the A root called for by the White Paper that would be sensitive to the
sovereign interests of the U.S., as well as those of foreign countries, and
creates a framework of greater accountability in which technical management
of the DNS can operate.
{69}
This change of control may
be done either with the cooperation of the
{70}
Alternatively, if the
{71}
Such a Declaration of ccTLD
{72}
Barber’s account of the
problems of privatization is remarkably similar to independent critiques of
ICANN, by Boyle Froomkin and others, which tends
to confirm the present analysis. While
one of ICANN’s main rationales was supposed to be an increase in
accountability,[140] a consequence of
the privatization of the DNS is that the state can use “privatized enforcement and state-backed
technologies to evade some of the practical and constitutional restraints
on the exercise of legal power over the Internet.”[141]
{73}
Moreover, a government can achieve regulatory
ends, often without suffering the political consequences that the same ends,
pursued directly, would yield. In other words, the state can indirectly govern,
and impose its agenda upon by simply employing private parties to do indirectly
that which it is forbidden to accomplish directly.[142] It is in this respect
that Froomkin has argued that the delegation of
power by the
{74}
Following Foucault, Boyle noticed that
the method of regulation by code on the Internet is a form of discipline.[145] On this view, regulation by the architecture
of DNS makes such regulation invisible
and automatic. It provides a method of individuating registrants
and encoding them into a network whose behaviour can thereafter be monitored.
Boyle notes that if we understand the methods of “surveillance . .
. which presupposes a tightly knit grid of material coercion” rather than
an overbearing sovereign who can rule only as far as his/her sword reaches,
then we might understand the indirect and hidden regulability of the Internet.[146] This hidden regulability
can also allow non-state actors to achieve influence through influence over
the “grid of coercion.” For example, the recent threat by ICANN to terminate
Verisign’s contract to manage the .com because it is not ensuring
the accuracy of registrant information[147] is grounded in
the concern of trademark interests, and others, to be able to know the identity
of domain name holders for litigation purposes.
{75}
Unfortunately, it is beyond
the scope of this paper (and the expertise of the authors) to provide a full
technical explanation of how to achieve technical independence.
However, a very short summary should suffice for the purposes of this
paper.
{76}
The ability to declare independence
of ccTLDs hinges on the fact that it is possible
to create alternate roots.[148] More correctly, alternate roots already exist
and operate without disrupting the stability of the DNS. It has been maintained that alternate roots
“provide an important check on abuses or bad economic policies of the dominant
root operator.”[149] As Mueller has further argued, banning alternative
roots is “inadvisable [or it] may not even be possible.”[150] These inclusive alternate roots have the information
from the A root and alternative TLDs.[151]
{77}
Ironically, the source of
the authority of the A root server and those who control it is the fact that
it is accepted as an authority by the Internet community. In particular, it is accepted as an authority
by major ISPs throughout the world. Those
ISPs and their name servers are in turn recognized as authoritative by individual
computer users. In order to achieve
independence, then, there is a need to renounce the authority of ICANN and
the A root server. In fact, the U.S.
government power over the DNS via its A root will and can continue only as
long as the other twelve Secondary Root Servers copy and rely on the A root.
{78}
One method of attaining
independence begins with “enlarging the root.” In order to accomplish this, it should be recognized
that the legacy DNS is not physically hierarchical. There is a unique root only in a logical or
virtual sense.[152] For, while the A root server is technically
a root for those servers that accept it as authoritative, other servers accept
one or more of the other thirteen root servers as authoritative. Thus, individual nations can take it upon themselves
to enlarge the root by creating an additional authoritative root server.
The national government could then require domestic ISPs to recognize
the national root as authoritative. Essentially,
instead of relying on the idea of an authoritative root which is controlled
by an independent entity, each country retains authority for its own domain. In this sense, the national government would
have control over its own root. As
mentioned, however, present technical limitations limit the root to thirteen
servers. The issue that then arises
is whether the national root will recognize the A root as authoritative.
{79}
A second step involves splitting
the root.[153] This step requires that the national authority
no longer recognizes the A root as an authority. Instead national roots may directly recognize
other national roots as authoritative peers.
This peer-to-peer approach can be extended to other name servers as
well. Currently, if a local name server
cannot provide the answer to a query, such as donaldduck.com, the query is
sent to the root which returns the address of the authoritative server for
the .com domain. On a peer – to - peer
account, each name server would point to the 243 ccTLD
root servers as authoritative for ccTLDs and the
thirteen Legacy root servers (or the fourteen gTLD
servers) as authoritative for gTLDs. Therefore, if someone in
{80}
This proposal to share the A root assists
with the problem of lessening single points of failure and increases the scalability
of the DNS. Two common methods are used to increase the
scale of DNS services: caching and server replication.[157] Caching is a technique allowing frequently accessed
names to be cached on a local name server. Replication is a method of distributing
databases to multiple name servers. For example, replication could allow for a root
server to provide several ccTLD (such as .uk, .ca, or .de) name server addresses. Likewise, a name server could provide for the
addresses of several root servers. Unfortunately,
the names and address of root servers under the current DNS protocol must
fit into a single 512–byte packet and this limits the number of root servers
to thirteen.[158] After reaching its maximum number of servers,
the only method to increase the load of the root is to boost the capacity
and processing power of the root servers.
It appears that there must be an effort to enlarge the number of root
servers in order to cope with increased DNS queries.
{81}
Perhaps a form of a single
physical international root listing all the addresses of authoritative ccTLD
servers would emerge, but such a root would not likely be controlled by a
single country and would not be authoritative.
For example, such a root may be a database with shared access rights
according to which each country is able to exclusively manage its information
regarding the authoritative ccTLD address. This
method of a p2p-based DNS for ccTLDs would allow
each country a choice whether to participate or not.[159] A non-participating country would continue to
recognize the legacy root.
{82}
This paper has argued that the
{83}
Emerging national concerns of sovereignty
over their own ccTLDs have not been met by the privatization
of the DSN. Placing the management of the DNS in ICANN’s
hands has further decreased the ability of most nations to control domestic
policies affected by the DNS. In order to acquire greater control of the DNS,
nations must refuse to recognize the authority of ICANN and the A root server.
Instead, the authority over the A root should be shared by a mutual
acknowledgment that nations are authoritative for their respective ccTLDs. Such sharing
will require increasing the root server system to include national DNS roots
and the introduction of a peer-to-peer protocol into the DNS.
{84}
On this approach, multilateral collaboration
is required to create a new DNS political framework and computer architecture,
including protocols, standards, and uniform policies within which mutual recognition
of national ccTLD authorities can exist. Such collaboration would ensure that an international
DNS policy organization or framework would be accountable to sovereign nations.
Sovereign domains would ensure that the power over national policy and law
is retained by the country itself and not invisibly housed in technology controlled
by a foreign entity.
[*] Kim G. von Arx is Legal Counsel to the Canadian
Internet Registration Authority (www.cira.ca) and Gregory R. Hagen is Replacement
Assistant Professor, Faculty of Law,
[1] Governmental Advisory Committee, ICANN, Principles for Delegation and Administration
of ccTLDs, at
http://www.icann.org/committees/gac/gac-cctldprinciples-23feb00.htm
(
[2]
See David G. Post,
The Great Internet Give-Away?, at http://www.temple.edu/lawschool/dpost/icann/ccTLD.html
(Mar. 2, 2000); Milton L. Mueller, Governments
and Country Names: ICANN’s Transformation into
an Intergovernmental Regime, at
http://istweb.syr.edu/~mueller/gacnames.pdf
(last visited Sept. 19, 2002) (presenting the paper at PCT 2002 Conference
in Honolulu, Hawaii and critiquing an increasing international involvement
in the DNS).
[3] M. Stuart Lynn, President’s Report: ICANN – The Case for Reform,
at http://www.icann.org/general/lynn-reform-proposal-24feb02.htm (
[4] David G. Post, Governing Cyberspace, or Where is James Madison When We Need Him?, at http://www.temple.edu/lawschool/dpost/icann/comment1.html
(June 1998) (referring to David G. Post, Cyberspace’s Constitutional Moment, THE
AMERICAN LAYWER (Nov. 1999)), available at http://www.temple.edu/lawschool/dpost/DNSGovernance.htm).
[5] Hearing
Before the Senate Comm. on Commerce, Sci., and Transp., Subcomm. on Sci.,
Tech., and Space, at http://www.icann.org/correspondence/lynn-testimony-12jun02.htm
(
[6] BBC News, Berlusconi Says Italy Committed to Europe,
at http://news.bbc.uk/1/hi/world/europe/1760325.stm
(last visited
[7] Management of Internet
Names and Addresses, 63 Fed. Reg. 31,741 (proposed
[8] Benjamin R. Barber, Globalizing Democracy, 11 AMERICAN PROSPECT
ONLINE 20 (
see also Alejandro Colás,
The Promises of International Civil
Society: Global Governance, Cosmopolitan Democracy and the End of Sovereignty?,
at http://www.theglobalsite.ac.uk/press/107colas.pdf (
[9]
[10] See
Michael Geist, Fair.com?: An Examination
of the Allegations of Systemic Unfairness in the ICANN UDRP, at http://aix1.uottawa.ca/~geist/geistudrp.pdf
(last visited Aug. 2001); Milton Mueller, An
Analysis of ICANN's Uniform Dispute Resolution
Policy, at http://www.acm.org/usacm/IG/roughjustice.pdf
(last visited
[11] A. Michael Froomkin & Mark A. Lemley, ICANN and Antitrust, at http://www.law.miami.edu/~froomkin
/articles/icann-antitrust.pdf (last visited
[12] A. Michael Froomkin,
Wrong Turn in Cyberspace: Using ICANN
to Route Around the APA and the Constitution, 50 DUKE
L.J. 17, at 45-46 (2000), available at http://www.law.miami.edu/~froomkin/articles/icann.pdf
(last visited Sept. 19, 2002); Jonathan Weinberg, ICANN and the Problem of Legitimacy, 50 DUKE
L.J. 187, 188 (2000), available at
http://www.law.wayne.edu/weinberg/legitimacy.pdf
(last visited Sept. 19, 2002).
[13] Internet Assigned Numbers Authority, Generic Top-Level Domains, at http://www.iana.org/gtld/gtld.htm
(last modified
[14] Internet Assigned Numbers Authority, Root-Zone Whois Information,
at http://www.iana.org/cctld/cctld-whois.htm
(last modified
[15] Internet Assigned Numbers
Authority, Infrastructure Top-Level
Domain, at http://www.iana.org/arpa-dom/ (last modified
[16] See
generally DNS Resources Directory, at
http://www.dns.net/dnsrd/
(last visited
[17] The
[18] Greek Research & Technology Network,
Root Name Servers, at http://netmon.grnet.gr/stathost/rootns/ (last modified
[19] Froomkin, supra
note 12, at 45-46.
[20] Jon Postel, the
“creator” and “safekeeper” of the DNS, seemed
to have been revered by the world as being, arguably, the most influential,
trustworthy, and dedicated management person since the inception of the
non-military Internet.
[21] See
President’s and Vice-President’s Report on Global Electronic Commerce, A Framework For Global Electronic Commerce,
Information Technology Management Web, at
http://www.itmweb.com/essay541.htm
(July 1, 1997) (issued by William J. Clinton & Albert Gore, Jr., this
document is also known as the “E-commerce White Paper”).
[22] Management of Internet
Names and Addresses, 63 Fed. Reg. 31,741 (proposed
[23] Interestingly, Froomkin
and Lemley commented that, “[t]he White Paper did not actually
mandate the creation of this corporation, but . . . only said how nice it
would be if someone would form it to undertake certain specified tasks so
that the government could strike a deal with it.” Froomkin & Lemley, supra note
11, at 7-8.
[24] Id at 8..
[25] See
[26] Memorandum of Understanding, Dep’t of Commerce
and ICANN, at www.ntia.doc.gov/ntiahome/domainname/icann-memorandum.htm
(last visited
[27] Cooperative Research &
Development Agreement, U.S. Dep’t of Commerce & ICANN, at www.icann.org/committees/dns-root/crada.htm
(last visited
[28] "IANA (Internet Assigned Numbers Authority)
is the organization . . . that, under a contract from the
[29] Froomkin &
Lemley,
supra note 11, at 13; Memorandum of Understanding,
Dep’t of Commerce and ICANN, supra
note 26.
[30] Management of Internet Names and Addresses,
supra note 7.
[31]
[32]
[33] Allan Gregg, Presentation to the Annual General
Meeting of the Canadian Internet Registration Authority, Canadian Attitudes Toward
the Dot-ca Domain, at www.cira.ca/official-doc/104.cira_tsc_en.pdf (
[34] Id.;
see also Press Release, Canadian Internet Registration Authority, Results
of a CIRA Study of Canadian Companies, at
www.cira.ca/news-releases/72.html (May 28, 2002). It appears that the WIPO Standing Committee
on Trademarks, Industrial Designs and Geographical Indicators is going to
recommend to the WIPO General Assembly that country codes should be protected
as geographical indications. Both the long name and short name of the country,
appearing in the UN and the ISO 3166 lists, plus any other "common"
names (like "Holland," "Ceylon," "Burma" in
the six official languages of the UN (English, French, Spanish, Russian,
Arabic, and Chinese), in all those alphabets/characters, plus the official
language(s) of the country (South Africa has eleven). Protection is to be
given in all gTLDs, existing and future, as well as all ccTLDs. If that was
not enough, not only are the exact names protected, but any misleading spellings.
See also World Intellectual Property Organization, Standing Committee
on Trademarks, Industrial Designs and Geographical Indicators, Second Special
Session on the Report of the Second WIPO Internet Domain Name Process, The
Protection of Country Names in Domain Name System, at http://www.wipo.int/sct/en/documents/special_session/pdf/sct_s2_3.pdf (Mar. 29, 2002).
[35] Letter from Michael Binder, Assistant Deputy
Minister, Industry Canada, to Robert Hall, Chair, Canadian Internet Registration
Authority, at www.iana.org/reports/industry-canada-letter-11mar99.htm
(last visited Mar. 11, 1999).
[36] Press Release, NeuStar,
Inc., U.S. Government Selects Neustar To Manage
[37] Commission Working Paper,
The Creation of the .EU Internet Top Level Domain, at 5, at http://europa.eu.int/comm
/information_society/policy/internet/pdf/doteu_en.pdf (
[38]
[39] Letter from Richard Alston, Senator and Minister
for Communications, Information Technology and the Arts, Australia, to M.
Stuart Lynn, President and Chief Executive Officer, Internet Corporation
for Assigned Names and Numbers, at
www.iana.org/cctld/au/alston-to-lynn-04jul01.htm (July 4, 2001).
[40] Electronic Communications
and Transactions Bill No. 23195, GOV'T
GAZETTE,
[41]
[42] Namespace, Government Involvement in ccTLD Administration,
CCTLD REVIEW,
at http://www.namespace.org.za/cctld_review.html (Mar. 26, 2002); see also Nominet .UK News, Annual General Meeting 2000, at www.nominet.org.uk/members/agm2000
.html (last visited Sept. 20,
2002); Nominet.UK News, Reflections
on the AGM 2001, at www.nominet.org.uk/news/agm-reflect.html
(last visited Sept. 20, 2002).
[43] Governmental Advisory Committee, supra note 1.
[44] Communiqué of the Government
Advisory Committee, ICANN, at
http://cyber.law.harvard.edu/icann/santiago/archive/GAC-Comminuque-mtg3.html
(last visited
[45] Internet Coordination Policy,
ICANN, ICP-1: Internet Domain Name System Structure and Delegation
(ccTLD Administration and Delegation), at
www.icann.org/icp/icp-1.htm
(May 1999) (containing a summary of current practices of the ICANN).
[46]
[47] ICANN. ICANN: A Blueprint for Reform, at http://www.icann.org/committees/evol-reform/blueprint-20jun02.htm
(last visited
[48] Elliot Noss, et
al., A New Approach to ICANN Reform:
The Heathrow Declaration, at http://www.byte.org/heathrow/heathrow-declaration-v0r0d5-032502.html
(
[49] New.Net, A Proposal for More Realistic Domain Name Governance,
at http://www.new.net/WhitePaper_v2.html
(last visited Mar. 2002).
[50] John Perry Barlow, The Accra Manifesto, at http://lists.essential.org/pipermail/random-bits/2002-March/000792.html
(last visited
[51] John Perry Barlow, A Declaration of the Independence of Cyberspace,
at http://www.eff.org/~barlow/
Declaration-Final.html (Feb. 8, 1996).
[52] Barlow, supra note 50.
[53]
[54] Steve Kettmann,
Will US Release Grip on ICANN?, WIRED NEWS,
at http://www.wired.com/news/infostructure/0,1377,49836,00.html
(
[55]
[56]
[57] Improvement of Technical Mgmt. of Internet Names and Addresses,
63 Fed. Reg. 8826
(
[58] Management of Internet Names and Addresses,
supra note 7.
[59] Angela Proffitt,
Drop the Government, Keep the Law: New International Body for Name Assignment Can
Learn from
[60] Industry Canada, Reform of the Domain Name System: Current Developments & Statement
of Principles: An Information Paper Prepared by Industry Canada with the
assistance of Omnia Communications Inc., at http://e-com.ic.gc.ca/english/strat/651d2.html (Sept. 1998).
[61] Management of Internet Names and Addresses,
supra note 7.
[62] ICANN, Proposed TLD Sponsorship Agreement, at http://www.icann.org/tlds/agreements/sponsored
/sponsorship-agmt-16oct01.htm (
[63] See, e.g., ICANN, Registrar Accreditation Agreement, at www.icann.org/registrars/ra-agreement-17may01.htm
(
[64] ICANN, ccTLD Sponsorship Agreement (.au), at www.icann.org/cctlds
/au/sponsorship-agmt-25oct01.htm (
[65] ICANN, ccTLD Sponsorship Agreement (.jp),
at www.icann.org/cctlds/jp
/sponsorship-agmt-27feb02.htm (
[66]
[67] CcTLD Sponsorship Agreement (.au),
supra note 64, art.
6.2; ccTLD Sponsorship Agreement (.jp),
supra note 65, art. 6.2.
[68] CcTLD Sponsorship Agreement (.au),
supra note 64, art.
6.2; ccTLD Sponsorship Agreement (.jp),
supra note 65, art. 6.2.
[69] CcTLD Sponsorship Agreement
(.jp), supra note 65, art. 6.3; ccTLD Sponsorship Agreement (.au), supra note
64, art. 6.3.
[70]
[71]
[72] ICANN, Preliminary Report, Special Meeting of the
Board, at http://www.icann.org/minutes/prelim-report-25sep00.htm
(
[73] See,
e.g., ICANN, Memorandum of Understanding between the Department of Commerce
and the Internet Corporation for Assigned Names and Numbers, amend. 2, at http://www.icann.org/general/amend2-jpamou-07sep00.htm
(
[74] IANA, IANA
Report on Request for Redelegation of the .au
Top-Level Domain, at
www.iana.org/reports/au-report-31aug01.htm
(
[75] J. Postel, Domain
System Structure and Delegation, Memo in response to Request for Comments,
No. 1591, at www.isi.edu/in-notes/rfc1591.txt
(Mar. 1994) (J. Postel is associated with the
University of Southern California, Information Sciences Institute).
[76] Internet Coordination Policy, supra note 45.
[77] Governmental Advisory Committee, supra note 1.
[78] IANA, IANA
Report on Request for Redelegation of the .ca
Top-Level Domain, at http://ww.iana.org/reports/ca-report-01dec00.htm
(Dec. 1, 2000); see also Letter from Maureen Cubberley,
Chair, Canadian Internet Registration Authority, to Michael Roberts, President
and Chief Executive Officer, Internet Corporation for Assigned Names and
Numbers, at http://www.iana.org/reports
/cira-letter-30nov00.htm (Nov. 30, 2000).
[79]
IANA, supra note 78.
[80] See
generally Letter from Derek A. Newman, attorney, Newman & Newman
LLP, to Louise Touton, Vice President and General
Counsel, IANA, at www.wwtld.org/Tracking_IANA/CX_Touton_Nameserver_Changes_20011213.pdf (Dec. 13, 2001) (regarding the .cx Christmas Islands). To
this date, there has still not been a redelegation
of .cx.
[81] ICANN, Announcement, Redelegation of .us Country-Code Top-Level Domain, at www.icann.org/announcements/announcement-19nov01.htm
(
[82]
[83]
[84] ICANN, Articles
of Incorporation, para. 3,
at http://www.icann.org/general/articles.htm
(Nov. 21, 1998).
[85] ISO 3166 Maintenance Agency,
English Country names and Code Elements, at www.din.de/gremien/nas/nabd/iso3166ma/codlstp1/en_listp1.html
(last modified
[86] ISO 3166 Maintenance Agency, ISO 3166-1 and Country Coded Top-Level Domains
(ccTLDs), at http://www.iso.org/iso/en/prods-services/iso3166ma/04background-on-iso-3166/iso3166-1-and-ccTLDs.html
(last visited
[87] Sergey
[88] ICANN, Internet
Assigned Numbers Authority Report on Request for Delegation of the .ps Top-Level Domain, at http://www.iana.org/reports/ps-report-22mar00.htm
(
[89] Commission Working Paper, supra note 37.
[90] Letter from Erkki
Liikanen, Member of the European Commission, to
Mike Roberts, President and Chief Executive Officer Internet Corporation
for Assigned Names and Numbers, at
http://europa.eu.int/ISPO/eif
/InternetPoliciesSite/DotEU/LetterLiikanenRoberts.html (July 6, 2000).
[91] Letter from Michael M. Roberts, President
and Chief Executive Officer Internet Corporation for Assigned Names and
Numbers, to Erkki Liikanen,
Member of the European Commission,
at www.icann.org/correspondence/roberts-letter-to-liikanen-10aug00.htm
(Aug. 10, 2000).
[92] ICANN, Preliminary
Report, Special Meeting of the Board, supra
note 72; see also Posting of Ant
Brooks, ant@hivemind.net, to cctld-discuss@wwtld.org, at http://www.wwtld.org/mailarchive/cctld-discuss/vol01/msg00287.html
(discussing Andrew McLachlin’s interpretation
of the resolution) (Sept. 30, 2000).
[93] See
Commission of the European Communities, Proposal for a Regulation of the
European Parliament and of the Council on the Implementation of the Internet
Top Level Domain “.EU,” at http://europa.eu.int/eur-lex/en/com/pdf
/2000/en_500PC0827.pdf (Dec.
12, 2000).
[94] See
Press Release, European Commission, Commission Welcomes Adoption of Regulation
for “.eu” Internet Domain Names, at
http://europa.eu.int/rapid/start/cgi/guesten.ksh?p_action.gettxt=gt&doc=IP/02/468 |0|RAPID&lg=EN
(last visited
[95] David McGuire, ICANN Has Final Say on Dot-EU Internet Domain – Update, NEWSBYTES
(
[96] ICANN, Preliminary
Report, Special Meeting of the Board, supra
note 72.
[97] This may raise an interesting issue of undue
influence.
[98] ICANN, Model
ccTLD Sponsorship Agreement – Triangular Situation,
para. 4.5.1, at http://www.icann.org/cctlds/model-tscsa-31jan02.htm
(
[99] See
also MILTON L. MUELLER,
RULING THE ROOT: INTERNET
GOVERNANCE AND THE TAMING
OF CYBERSPACE 211-26 (The MIT Press 2002).
[100] Milton L. Mueller, An Analysis of ICANN's
Uniform Dispute Resolution Policy, at
http://www.acm.org/usacm/IG/roughjustice.pdf
(last visited
[101] MUELLER,
supra note 99, at 228-53.
[102] Heathmount A.E. Corp. v. Technodome.com, No. CA-00-00714-A, 2000
[103]
[104]
[105] Rep. Howard Coble, To Provide Criminal Penalties for Providing False Information in Registering
a Domain Name on the Internet (introduced 5/2/2002), at http://thomas.loc.gov/cgi-bin/query/z?c107:h.r.4640:
(last visited Nov. 14, 2002).
[106] See
The Accuracy and Integrity of the
Whois Database: Hearing Before the Subcomm.
on Courts, the Internet, and Intellectual Prop.
of the House Comm. on the Judiciary, 107th Cong. (statement
of Michael D. Palage), at http://www.house.gov/judiciary/palage052202.PDF (2002) (last visited
[107] ICANN, Model
ccTLD Sponsorship Agreement – Triangular Situation,
supra note 98, at para. 4.2.
[108] Dan Bart, Nations and a World at Risk, Report of
the Telecommunications Standards Advisory Council of Canada 3, available at http://www.tiaonline.org/standards/cip/ciptsacc.pdf
(Mar. 24, 1999).
[109] United
States Commission on National Security/21st Century, New World Coming: American
Security in the 21st Century, Supporting Research and Analysis 52
(1999), available at http://www.nssg.gov/NWR_A.pdf (Sept.
15, 1999).
[110] Froomkin, supra
note 12, at 48-49.
[111] See
Glenn H. Takemoto, Information Warfare in the Cyber Domain, at 3-5 (2001), at http://www.infowar.com/mil_c4i/01/IWinCyberDomain.pdf
(last visited
[112] CHAIRMAN OF THE JOINT
CHIEFS OF STAFF, JOINT
VISION 2020, at 8, available
at http://www.dtic.mil/jv2020/jv2020.doc
(June 2000).
[113]
[114] See
generally Dorothy E. Denning, Activism,
Hacktivism, and Cyberterrorism:
The Internet as a Tool for Influencing Foreign Policy, at
http://www.nautilus.org/info-policy/workshop/papers/denning.html
(last visited
[115] See
generally Mike Balough, Army Digitization
Overview, Report to the Defence Industry Association, available at http://www.dtic.mil/ndia/cannon/balough.pdf
(
[116] Letter from Billy Tauzin, et al, Chairman,
House Committee on Energy and Commerce, to Donald L. Evans, Secretary of
Commerce, at http://www.politechbot.com/p-03268.html
(Mar. 13, 2002).
[117] New.net, supra note 49.
[118]
[119] Takemoto, supra note 111, at 3-5.
[120] There does not appear to be an active .iq registry.
[121] Executive Summary, President’s Commission
on Critical Infrastructure Protection, Critical Foundations: Protecting
America’s Infrastructures, available
at http://www.ciao.gov/resource/pccip/PCCIP_Report.pdf (Oct. 1997).
[122]
[123] ICANN, ICANN DNS Security
Update #1, at http://www.icann.org/committees/security/dns-security-update-1.htm
(
[124]
[125]
[126]
[127]
[128] Matrix Systems, Distributed Denial of Service Attack, available
at http://www.matrixnetsystems.com/ea/advisories/20021022_instant_alert.jsp.
(last visited
[129]
[130] Reuters, Experts: Hackers Could Easily Shut Down
[131] NATIONAL
RESEARCH COUNCIL, COMMITTEE
ON THE INTERNET IN THE EVOLVING
INFORMATION INFRASTRUCTURE,
COMPUTER SCIENCE AND TELECOMMUNICATIONS
BOARD, THE INTERNET'S COMING
OF AGE 63 (National Academy Press 2001),
available at http://www.nap.edu/books/0309069920/html
(last visited Sept. 19, 2002).
[132] Governmental Advisory Committee, supra note 1.
[133] This issue is more fully discussed in G.
Hagen, Sovereign Domains and Property
Claims, INT'L
J.L. TECH. (forthcoming
Spring, 2003).
[134] See Froomkin & Lemley,
supra note 11, at 1-2; Froomkin, supra
note 12, at 29-32.
[135] Barber, supra note 8.
[136]
[137]
[138] See
G. Hagen & K. G. von Arx, Patriation of the .ca,
CAN. J.L. & TECH. 1:3
(November 2002).
[139] Management of Internet
Names and Addresses, 63 Fed. Reg. 31,741 (proposed
[140] Management of Internet Names and Addresses,
supra note 7.
[141] James Boyle, Foucault In Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors,
at http://www.wcl.american.edu/pub/faculty/boyle/foucault.htm
(1997) (emphasis added).
[142] James Boyle, A Nondelegation Doctrine For The Digital Age?, 50 DUKE
L.J. 5, 8-9 (Oct. 2000), available at http://www.law.duke.edu/shell/cite.pl?50+Duke+L.+J.+5.
[143] Froomkin, supra note 12, at 143.
[144] Boyle, supra
note 142 at 13-14.
[145] Id.
[146]
[147] David McGuire, ICANN Threatens to Take Away VeriSign's '.com'
Privileges, WASHINGTON POST,
Sept. 4, 2002, at E05, available at
http://www.washingtonpost.com/wp-dyn/articles/A34373-2002Sep3.html;
David McGuire, ICANN Threatens To
Revoke VeriSign's Right To Sell Dot-Com Names, WASHINGTON
POST, Sept. 3, 2002, available at http://www.washingtonpost.com/ac2/wp-dyn/A33395-2002Sep3?language=printer.
[148] This conflicts with ICANNs
assertion in ICP-3, that it is the “single, authoritative public root for
the Internet Domain Name System.” Indeed,
its claim is that “[f]rom the inception of the
DNS, its most fundamental design goal has been to provide the same answers
to the same queries issued from any place on the Internet.” ICANN, ICP-3: A Unique, Authoritative Root for the DNS, at http://www.icann.org/icp/icp-3.htm
(
[149] Milton L. Mueller, Competing DNS Roots: Creative Destruction or Just Plain Destruction?, at 16, at http://www.itu.int/osg/spu/seminars/mueller/tprc2001.pdf
(
[150]
[151] See,
e.g., New.net, supra note
49.
[152] See,
e.g., Simon Higgs, Routing Around
a Single Point of Failure, at
http://www.icannwatch.org/article.php?sid=198
(last visited Sept. 19, 2002); Simon Higgs, Alternative
Roots and the Virtual Inclusive Root, at
http://www.higgs.com/publications/id/draft-higgs-virtual-root-00.txt
(May 2001); Simon Higgs, Root Server
Definitions, at http://www.higgs.com/publications/id/draft-higgs-root-defs-00.txt
(Feb. 2001).
[153] Recently Stuart Lynn contended that, “it
is simply unthinkable that a large fraction of the TLDs
in the root zone file should be permitted to operate independently of the
global community and of policies established by the global community. In
each case, it is essential that these critical entities formally agree not
to break the DNS, and to abide by standard global operational practices
arrived at through the ICANN process.”
[154] See
generally Hagen & von Arx, supra
note 138.
[155]MUELLER, supra
note 99, at 48.
[156] This simple outline of a p2p based system seems to confirm the judgment
of the ICANN Protocol Supporting Organization that it is technically to
devise a multiple root DNS. “Although, it would be technically possible
to devise and standardize a fully compliant alternative multiple root server
system, there appears no technical reason for changing from the present
working system, as this would require the development of a new set of protocols
for use by the DNS.” ICANN Protocol
Standards Organization, Minutes,
at http://www.pso.icann.org/PSO_Minutes/PSO-Minutes-4Sept2001.txt
(
[157] NATIONAL RESEARCH
COUNCIL, supra
note 131.
[158]
[159] Of course, the above scheme could also apply
to all TLDs. We
have not proposed such a solution in this paper. However, as time goes on,
the DNS may have 257 root servers. In
other words, each gTLD and ccTLD would have its own root server, which points to other
authoritative root servers.