recommended reading

Senators push to monitor ICANN-government relationship

Senators are pressing Commerce Secretary Locke and Assistant Secretary-Designate Larry Strickling to pay close attention to the relationship between the U.S. government and the Internet Corporation for Assigned Names and Numbers, a private entity based in California that administers the Internet addressing system.

A joint project agreement that has allowed Commerce oversight of ICANN is slated to sunset on Sept. 30 amid accountability and transparency concerns.

Sens. Olympia Snowe, R-Maine, and Bill Nelson, D-Fla., wrote to Locke on Tuesday urging him to be a prominent player in finding a permanent accountability mechanism as the Commerce-based National Telecommunications and Information Administration seeks public comment on the issue.

The senators worry much of the progress ICANN has made could be jeopardized if its historic link to the United States is diminished.

The letter pointed out that some stakeholders have suggested a temporary extension of the JPA to allow time to design and deploy a framework. The Internet consists of 174 million Web sites, 570 million computers and more than 1.5 billion users, all of whom utilize the domain name system in some way, Snowe and Nelson said.

Strickling, a former director of the FCC's Common Carrier Bureau who worked on Obama's campaign, answered written ICANN questions from Senate Commerce Committee members after his Tuesday confirmation hearing. Responding to queries by Snowe and Sen. David Vitter, R-La., he pledged to preserve Internet security and stability and said his decision regarding the JPA will be consistent with that goal. He said comments received through NTIA's April notice of inquiry will inform his assessment.

"Regardless of whether the JPA is terminated, modified or extended, it is my belief that NTIA will continue to be an active participant in ICANN by representing the United States government in ICANN's Governmental Advisory Committee as well as filing comments, as needed, in ICANN's various public consultation processes," Strickling said. If confirmed, he said, NTIA's views on Internet governance will be based on "robust and meaningful consultation" with U.S. industry and international partners.

On Wednesday, the Commerce Committee approved Strickling's nomination, but it was unclear at press time how soon the full Senate could vote. Meanwhile, the House Energy and Commerce Committee is interested in ICANN oversight and House Communications Subcommittee Chairman Rick Boucher, D-Va., could hold a hearing this summer.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.