By David G. Post – August 1, 2015 Full Article as .PDF
“Many scholars and other observers of developments in Internet governance, law, and policy have commented upon an unusual and important phenomenon that has become more widespread in recent years: using control over access to critical portions of the Internet’s technical infrastructure – the system comprising the underlying protocols for routing, naming, and addressing, along with related technical standards and the agreements, formal and informal, through which they are implemented across the Internet, what Laura DeNardis calls “Critical Internet Resources” (CIRs) – to enforce private and public law. Three examples illustrate the nature of this new phenomenon…”