The Narrative – January 26, 2021

The impact of social media on political communication remains a top concern worldwide. A request for comment on disinformation policy has been issued by the UN Special Rapporteur on freedom of expression. Biden's incoming Director of National Intelligence is being pushed to support mandatory cybersecurity information sharing by the private...

The Narrative (January 13, 2021)

We focus on India and Europe, where frameworks for the regulation of non-personal data are emerging. We add a bit of SolarWinds followup, and peek at ICANN hiding in the corner Governance of Non-Personal Data Although most data governance efforts in recent years have been focused on the collection, storage,...

The Narrative (December 30, 2020)

This time we analyze the SolarWinds intrusion and challenge some narratives being spun around it. We also look at Europe’s whirlwind of legislative activity in the EU around cybersecurity and the digital economy. And oh, happy New Year. It’s an idiot (solar) wind... The biggest event shaping Internet governance discussions...

Why we must push back against the FCC’s harassment of China Telecom (Americas)

Under Chairman Ajit Pai, the U.S. Federal Communications Commission made itself a tool of the Trump administration's assault on economic relations with China. One part of this was an attempt to expel China Telecom (Americas) from the U.S. market. The FCC issued an order to China Telecom of the Americas (CTA)...

The Narrative (December 14, 2020)

The Narrative is a twice-monthly survey of key developments in Internet governance. This time we explain how the American National Defense Authorization Act contains some highly undesirable internet governance measures and survey the geopolitics of 5G. The Militarization of Everything The American National Defense Authorization Act (NDAA) authorizes nearly $750...

China’s Data Security Initiative: Still Stuck in the Sovereignty Box

The Trump administration has unleashed a number of aggressive actions blocking China from access to those parts of the transnational digital economy anchored in the United States. These actions are based on the premise that exposure to Chinese ICT products and services are national security threats, because China’s Communist government...