Language Selection

English French German Italian Portuguese Spanish

Calls to end US domination of the internet

Filed under
Web

WHENEVER you surf the web, send emails or download music, an unseen force is at work in the background, making sure you connect to the sites, inboxes and databases you want. The name of this brooding presence? The US government.

Some 35 years after the US military invented the internet, the US Department of Commerce retains overall control of the master computers that direct traffic to and from every web and email address on the planet.

But a group convened by the UN last week to thrash out the future of the net is calling for an end to US domination of the net, proposing that instead a multinational forum of governments, companies and civilian organisations is created to run it.

The UN's Working Group on Internet Governance (WGIG) says US control hinders many developments that might improve it. These range from efforts to give the developing world more affordable net access to coming up with globally agreed and enforceable measures to boost net privacy and fight cybercrime.

US control also means that any changes to the way the net works, including the addition of new domain names such as .mobi for cellphone-accessed sites, have to be agreed by the US, whatever experts in the rest of the world think. The flipside is that the US could make changes without the agreement of the rest of the world.

In a report issued in Geneva in Switzerland on 14 July, the WGIG seeks to overcome US hegemony. "The internet should be run multilaterally, transparently and democratically. And it must involve all stakeholders," says Markus Kummer, a Swiss diplomat who is executive coordinator of the WGIG.

So why is the internet's overarching technology run by the US? The reason is that the net was developed there in the late 1960s by the Pentagon's Advanced Research Projects Agency (ARPA) in a bid to create a communications medium that would still work if a Soviet nuclear strike took out whole chunks of the network. This medium would send data from node to node in self-addressed "packets" that could take any route they liked around the network, avoiding any damaged parts.

Today the internet has 13 vast computers dotted around the world that translate text-based email and web addresses into numerical internet protocol (IP) node addresses that computers understand. In effect a massive look-up table, the 13 computers are collectively known as the Domain Name System (DNS). But the DNS master computer, called the master root server, is based in the US and is ultimately controlled by the Department of Commerce. Because the data it contains is propagated to all the other DNS servers around the world, access to the master root server file is a political hot potato.

Currently, only the US can make changes to that master file. And that has some WGIG members very worried indeed.

Full Article.

two words

Fuck that.

If they think the US will hand over control after inventing the 'Net in the first place, they're even dumber then most of the politicians in America.

Let them build their own damn Internet.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Why the Open Source Stars Must Align

Open source projects like OpenStack, Docker, OPNFV and OpenDaylight are more supported and better funded than ever before. They mark a broader trend of large, active and well-resourced open source projects that are among the leaders in Big Data, cloud computing, operating systems and development practices. Open source has come a long way in 30 years – and its success marks a new era for the overall OSS community. But success does not come without potential pitfalls. One of the greatest obstacles to project success isn’t the proprietary competition – it’s the lack of communication between large open source projects like OpenStack and Docker. Read more

Myth Busting the Open-Source Cloud Part 1

On the contrary, open-source cloud computing products are designed from the outset with security in mind. For example, there are features such as identity management to monitor who has access to content, and data encryption to safeguard information while it’s at rest or in transit. Furthermore, open-source cloud software is peer-reviewed by community participants, leading to continuous improvements in the quality of security features and mechanisms. This community also monitors and rapidly discloses vulnerabilities and issues, and provides security updates to address them. Read more

What does an adult look like in an open source community?

You're no longer "just an adult." You're now trusted and looked to for opinions on how the community should grow. You're a community elder. You embody the history. You keep the history. You work together with other adults and elders to guide and make the community stronger. And to a certain extent, the community once again looks after you, just as it did in the first phase. Read more