{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:55:13Z","timestamp":1760597713510,"version":"3.38.0"},"reference-count":63,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2016,8,8]],"date-time":"2016-08-08T00:00:00Z","timestamp":1470614400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p> One of the most contentious and longstanding debates in Internet governance involves the question of oversight of the Domain Name System (DNS). DNS administration is sometimes described as a \u201cclerical\u201d or \u201cmerely technical\u201d task, but it also implicates a number of public policy concerns such as trademark disputes, infrastructure stability and security, resource allocation, and freedom of speech. A parallel phenomenon involves governmental and private forces increasingly altering or co-opting the DNS for political and economic purposes distinct from its core function of resolving Internet names into numbers. This article examines both the intrinsic politics of the DNS in its operation and specific examples and techniques of co-opting or altering DNS\u2019 technical infrastructure as a new tool of global power. The article concludes with an analysis of the implications of this infrastructure-mediated governance on network security, architectural stability, and the efficacy of the Internet governance ecosystem. <\/jats:p>","DOI":"10.1177\/1461444816662932","type":"journal-article","created":{"date-parts":[[2016,8,9]],"date-time":"2016-08-09T02:03:54Z","timestamp":1470708234000},"page":"332-350","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":25,"title":["The politicization of the Internet\u2019s Domain Name System: Implications for Internet security, universality, and freedom"],"prefix":"10.1177","volume":"20","author":[{"given":"Samantha","family":"Bradshaw","sequence":"first","affiliation":[{"name":"Centre for International Governance Innovation, Canada"}]},{"given":"Laura","family":"DeNardis","sequence":"additional","affiliation":[{"name":"American University, USA"}]}],"member":"179","published-online":{"date-parts":[[2016,8,8]]},"reference":[{"key":"bibr1-1461444816662932","unstructured":"Anishchuk A (2014) Russia eyes measures to fend off western internet threat: Kremlin. Reuters, 19 September. Available at: http:\/\/www.reuters.com\/article\/2014\/09\/19\/us-russia-internet-idUSKBN0HE1F320140919"},{"key":"bibr2-1461444816662932","doi-asserted-by":"crossref","unstructured":"Bortzmeyer S (2015) IETF draft: DNS privacy considerations. Available at: https:\/\/tools.ietf.org\/html\/draft-ietf-dprive-problem-statement-01","DOI":"10.17487\/RFC7626"},{"key":"bibr3-1461444816662932","doi-asserted-by":"crossref","unstructured":"Bradshaw S, DeNardis L, Hampson F, et al. (2015) The emergence of contention in global internet governance. In: Global commission on internet governance paper series, paper no. 16. Available at: https:\/\/www.cigionline.org\/sites\/default\/files\/no17.pdf","DOI":"10.2139\/ssrn.2634604"},{"key":"bibr4-1461444816662932","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811426741"},{"key":"bibr5-1461444816662932","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139004145"},{"key":"bibr6-1461444816662932","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199561131.001.0001"},{"key":"bibr7-1461444816662932","unstructured":"Crocker S, Dagon D, Kaminsky D, et al. (2011) Security and other technical concerns raised by the DNS filtering requirements in the PROTECT IP bill. Available at: http:\/\/www.circleid.com\/pdf\/PROTECT-IP-Technical-Whitepaper-Final.pdf"},{"key":"bibr8-1461444816662932","doi-asserted-by":"crossref","unstructured":"Daigle L (2004) WHOIS protocol specification, RFC 3912. Available at: https:\/\/www.rfc-editor.org\/info\/rfc3912","DOI":"10.17487\/rfc3912"},{"key":"bibr9-1461444816662932","unstructured":"Daigle L (2015) On the nature of the internet. In: Global commission on internet governance paper series, paper no. 7. Available at: https:\/\/www.cigionline.org\/sites\/default\/files\/gcig_paper_no7.pdf"},{"key":"bibr10-1461444816662932","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262042574.001.0001"},{"key":"bibr11-1461444816662932","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.659199"},{"key":"bibr12-1461444816662932","doi-asserted-by":"publisher","DOI":"10.12987\/yale\/9780300181357.001.0001"},{"key":"bibr13-1461444816662932","unstructured":"Diao Y, Lia M (2012) DNS extension for autonomous internet (AIP): IETF internet draft. Available at: https:\/\/tools.ietf.org\/html\/draft-diao-aip-dns-00"},{"key":"bibr14-1461444816662932","doi-asserted-by":"crossref","unstructured":"F\u00e4ltstr\u00f6m P, Hoffman P, Costello A (2003) Internationalizing domain names in applications, RFC 3490. Available at: https:\/\/www.rfc-editor.org\/info\/rfc3490","DOI":"10.17487\/rfc3490"},{"key":"bibr15-1461444816662932","unstructured":"Geist M (2012) Bodog.com case sends warning to all Canadian websites: Geist. The Star, 3 March. Available at: http:\/\/www.thestar.com\/business\/2012\/03\/03\/bodogcom_case_sends_warning_to_all_canadian_websites_geist.html"},{"key":"bibr16-1461444816662932","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809342738"},{"volume-title":"Who Controls the Internet? Illusions of a Borderless World","year":"2008","author":"Goldsmith J","key":"bibr17-1461444816662932"},{"key":"bibr18-1461444816662932","unstructured":"Grossman L (2009) Iran Protests: Twitter, the Medium of Movement. Time Magazine, 17 June. Available at: http:\/\/content.time.com\/time\/world\/article\/0,8599,1905125,00.html"},{"key":"bibr19-1461444816662932","unstructured":"Grothaus M (2014) What it\u2019s like to use North Korea\u2019s internet. Fast Company, 24 September. Available at: http:\/\/www.fastcolabs.com\/3036049\/what-its-like-to-use-north-koreas-internet"},{"key":"bibr20-1461444816662932","unstructured":"Hallam-Baker P (2014) Internet-draft expiring 11 May 2015 (DNS privacy and censorship: use cases and requirements)."},{"key":"bibr21-1461444816662932","unstructured":"Harlan C (2010) South Korea tries to block Twitter messages from North. The Washington Post, 21 August. Available at: http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2010\/08\/20\/AR2010082005741.html"},{"key":"bibr22-1461444816662932","unstructured":"Higgs S (2001) Alternate roots for domain names explained in IETF draft. Politech: Politics & Technology. Available at: http:\/\/www.politechbot.com\/p-02077.html"},{"key":"bibr23-1461444816662932","unstructured":"IAB (2000) IAB technical comment on the unique DNS root. Available at: https:\/\/www.ietf.org\/rfc\/rfc2826.txt"},{"key":"bibr24-1461444816662932","unstructured":"ICANN (1999) Uniform domain name dispute resolution policy. Available at: https:\/\/www.icann.org\/resources\/pages\/policy-2012-02-25-en"},{"key":"bibr25-1461444816662932","unstructured":"ICANN (2009) Internationalized domain names. Available at: https:\/\/www.icann.org\/resources\/pages\/idn-2012-02-25-en"},{"key":"bibr26-1461444816662932","unstructured":"ICANN (2012) New generic top-level domains-application comment details. Available at: https:\/\/gtldcomment.icann.org\/comments-feedback\/applicationcomment\/commentdetails\/6191"},{"key":"bibr27-1461444816662932","unstructured":"ICANN (2014) \u2018Motion to quash writ of attachment\u2019 in the US district court for the District of Columbia. Available at: www.icann.org\/.\/ben-haim-motion-to-quash-writs-1-29jul14-en.pdf"},{"key":"bibr28-1461444816662932","unstructured":"Kravets D (2012) Uncle Sam: if It ends in.com, it\u2019s seizable. Wired, 6 March. Available at: http:\/\/www.wired.com\/2012\/03\/feds-seize-foreign-sites\/"},{"key":"bibr29-1461444816662932","doi-asserted-by":"crossref","unstructured":"Klensin J (2005) National and local characters for DNS top level domain (TLD) names, RFC 4185. Available at: https:\/\/www.rfc-editor.org\/info\/rfc4185","DOI":"10.17487\/rfc4185"},{"key":"bibr30-1461444816662932","doi-asserted-by":"crossref","first-page":"45","DOI":"10.7551\/mitpress\/8066.003.0006","volume-title":"Opening Standards: The Global Politics of Interoperability","author":"Kuerbis B","year":"2011"},{"key":"bibr31-1461444816662932","doi-asserted-by":"publisher","DOI":"10.4324\/9780203123256"},{"volume-title":"Code and Other Laws of Cyberspace","year":"1999","author":"Lessig L","key":"bibr32-1461444816662932"},{"key":"bibr33-1461444816662932","unstructured":"Lowe G, Winters P, Marcus ML (2007) The great DNS wall of China. Available at: https:\/\/censorbib.nymity.ch\/pdf\/Lowe2007a.pdf"},{"key":"bibr34-1461444816662932","unstructured":"Lynn S (2001) Discussion draft: a unique authoritative root for the DNS. Available at: http:\/\/archive.icann.org\/en\/meetings\/stockholm\/unique-root-draft.htm"},{"key":"bibr35-1461444816662932","unstructured":"MacKinnon R (2006) China's New Domain Names: Lost in Translation. Available at: http:\/\/www.circleid.com\/posts\/chinas_new_domain_names_lost_in_translation\/"},{"volume-title":"Consent of the Networked: The Worldwide Struggle for Internet Freedom","year":"2012","author":"MacKinnon R","key":"bibr36-1461444816662932"},{"key":"bibr37-1461444816662932","unstructured":"McMillan R (2010) China\u2019s great firewall spreads overseas. Computerworld, 25 March. Available at: http:\/\/www.computerworld.com\/article\/2516831\/security0\/china-s-great-firewall-spreads-overseas.html"},{"key":"bibr38-1461444816662932","unstructured":"McMillan R (2014) Verizon\u2019s perma-cookie is a privacy killing machine. Wired, 27 October. Available at: http:\/\/www.wired.com\/2014\/10\/verizons-perma-cookie\/"},{"key":"bibr39-1461444816662932","unstructured":"Marsan CD (2006) Native language domains threaten \u2018Net. NetworkWorld, 27 March. Available at: http:\/\/www.networkworld.com\/article\/2310065\/lan-wan\/native-language-domains-threaten\u2013;net.html?page=1"},{"key":"bibr40-1461444816662932","doi-asserted-by":"publisher","DOI":"10.4324\/9780203946084"},{"key":"bibr41-1461444816662932","unstructured":"Metz C (2009) Comcast trials domain helper service DNS hijacker here to stay. The Register, 28 July. Available at: http:\/\/www.theregister.co.uk\/2009\/07\/28\/comcast_dns_hijacker\/"},{"key":"bibr42-1461444816662932","unstructured":"Miller J (2014) Iraq blocks Facebook and Twitter in bid to restrict Isis. BBC News, 26 June. Available at: http:\/\/www.bbc.com\/news\/technology-27869112"},{"key":"bibr43-1461444816662932","doi-asserted-by":"crossref","unstructured":"Mockapetris P (1987a) Domain names: concepts and facilities, RFC 1034. Available at: https:\/\/www.rfc-editor.org\/info\/rfc1034","DOI":"10.17487\/rfc1034"},{"key":"bibr44-1461444816662932","doi-asserted-by":"crossref","unstructured":"Mockapetris P (1987b) Domain names: implementation and specification, RFC 1035. Available at: https:\/\/www.rfc-editor.org\/info\/rfc1035","DOI":"10.17487\/rfc1035"},{"key":"bibr45-1461444816662932","unstructured":"Mueller M (2001) Competing DNS Roots: creative destruction or just plain destruction? Available at: http:\/\/arxiv.org\/ftp\/cs\/papers\/0109\/0109021.pdf"},{"key":"bibr46-1461444816662932","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262014595.001.0001"},{"key":"bibr47-1461444816662932","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812462850"},{"key":"bibr48-1461444816662932","unstructured":"Musiani F (2012) A decentralized domain name system? User-controlled infrastructure as alternative internet governance. Available at: http:\/\/web.mit.edu\/comm-forum\/mit8\/papers\/Musiani_DecentralizedDNS_MiT8Paper.pdf"},{"key":"bibr49-1461444816662932","unstructured":"NTIA (2014) Keynote Address by Lawrence E. Strickling Assistant Secretary of Commerce for Communications and Information \u2018Who Governs the Internet? A Conversation on Securing the Multistakeholder Process\u2019. Washington, DC. Available at: https:\/\/www.ntia.doc.gov\/speechtestimony\/2014\/keynote-address-assistant-secretary-strickling-american-enterprise-institute"},{"key":"bibr50-1461444816662932","unstructured":"Plante NA (2004) Practical domain name system security: a survey of common hazards and preventative measures. Available at: http:\/\/www.infosecwriters.com\/text_resources\/pdf\/dns-security-survey.pdf"},{"key":"bibr51-1461444816662932","unstructured":"SSAC (2006) Alternative TLD name systems and roots: conflict, control and consequences. Available at: https:\/\/www.icann.org\/en\/system\/files\/files\/alt-tlds-roots-report-31mar06-en.pdf"},{"key":"bibr52-1461444816662932","unstructured":"SSAC (2012) SSAC advisory impacts of content blocking via the domain name system. Available at: https:\/\/www.icann.org\/en\/system\/files\/files\/sac-056-en.pdf"},{"key":"bibr53-1461444816662932","doi-asserted-by":"crossref","unstructured":"Seltzer W (2011) Exposing the flaws of censorship by domain name. IEEE Security & Privacy. Available at: http:\/\/wendy.seltzer.is\/writing\/COICA-IEEE.pdf","DOI":"10.1109\/MSP.2011.8"},{"key":"bibr54-1461444816662932","unstructured":"Siegler MG (2011) Twitter confirms that they\u2019re being blocked in Egypt. TechCrunch, 25 January. Available at: http:\/\/techcrunch.com\/2011\/01\/25\/twitter-blocked-in-egypt\/"},{"key":"bibr55-1461444816662932","unstructured":"Singel R (2008) Pakistan\u2019s accidental YouTube re-routing exposes trust flaw in net. Wired, 25 February. Available at: http:\/\/www.wired.com\/2008\/02\/pakistans-accid\/"},{"key":"bibr56-1461444816662932","unstructured":"Tuysuz G, Watson I (2014) Turkey blocks YouTube days after Twitter crackdown. CNN, 27 March. Available at: http:\/\/www.cnn.com\/2014\/03\/27\/world\/europe\/turkey-youtube-blocked\/"},{"key":"bibr57-1461444816662932","unstructured":"Ungerleider N (2012) Iran\u2019s \u2018second internet\u2019 rivals censorship of China\u2019s \u2018great firewall\u2019. Fast Company, 23 February. Available at: http:\/\/www.fastcompany.com\/1819375\/irans-second-internet-rivals-censorship-chinas-great-firewall"},{"key":"bibr58-1461444816662932","doi-asserted-by":"publisher","DOI":"10.26512\/lstr.v7i1.21538"},{"key":"bibr59-1461444816662932","unstructured":"Ward M (2014) Tor\u2019s most visited hidden sites host child abuse images. BBC News: Technology, 30 December. Available at: http:\/\/www.bbc.com\/news\/technology-30637010"},{"volume-title":"Shaping Internet Governance: Regulatory Challenges","year":"2009","author":"Weber R","key":"bibr60-1461444816662932"},{"issue":"1","key":"bibr61-1461444816662932","first-page":"121","volume":"109","author":"Winner L","year":"1980","journal-title":"Daedalus"},{"key":"bibr62-1461444816662932","unstructured":"Zittrain J, Edelman B (2003) Internet filtering in China. IEEE Internet Computing. Available at: http:\/\/unpan1.un.org\/intradoc\/groups\/public\/documents\/apcity\/unpan011043.pdf"},{"volume-title":"The Future of the Internet and How to Stop it","year":"2008","author":"Zittrain J","key":"bibr63-1461444816662932"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816662932","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816662932","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816662932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T06:16:23Z","timestamp":1740896183000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816662932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,8]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1177\/1461444816662932"],"URL":"https:\/\/doi.org\/10.1177\/1461444816662932","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"type":"print","value":"1461-4448"},{"type":"electronic","value":"1461-7315"}],"subject":[],"published":{"date-parts":[[2016,8,8]]}}}