A major contributor to this article appears to have a close connection with its subject.(May 2022) |
Bill Woodcock | |
---|---|
Born | William Edward Woodcock IV 16 August 1971 |
Alma mater | University of California, Santa Cruz (B.A. in Book Arts), 1993 Berkeley High School, 1989 |
Occupation(s) | Executive Director, Packet Clearing House President, WoodyNet Chairman, Quad9 CEO, EcoTruc and EcoRace |
Known for |
|
Spouse | Audrey Plonk (m. 2010) |
Parents |
|
ASN |
Bill Woodcock (born August 16, 1971 in San Francisco, California, United States) is the executive director of Packet Clearing House, [1] the international organization responsible for providing operational support and security to critical Internet infrastructure, including Internet exchange points and the core of the domain name system; the chairman of the Foundation Council of Quad9; [2] the president of WoodyNet; [3] and the CEO of EcoTruc and EcoRace, [4] companies developing electric vehicle technology for work and motorsport. Bill founded one of the earliest Internet service providers, and is best known for his 1989 development of the anycast routing technique that is now ubiquitous in Internet content distribution networks and the domain name system. [5] [6]
Woodcock entered the computer industry via the advent of desktop publishing. He was doing prepress work for the University of California Press when the Macintosh computer was released in 1984, and he switched to the then-nascent field of desktop publishing and electronic prepress. In 1985, he began working with AppleTalk networks, necessary to interconnect Macintosh computers running desktop publishing software with the digital imagesetters which produce the plates from which books are printed, and by 1986 he was speaking on the subject of desktop publishing and electronic prepress at conferences. [6]
Beginning in 1985, Woodcock volunteered with the Berkeley Macintosh Users Group (BMUG), providing technical assistance to its members, working on the production of its biannual newsletters, and assisting Bernard Aboba with the administration of its FidoNet-node BBS and moderating the global MacNetAdmin echo. [7] [8] In 1989, he collaborated with BMUG Programming SIG chair Greg Dow to produce what may be the first instance of Database publishing: a catalog of BMUG's shareware archive, printed directly from a FileMaker database to negatives on a LinoTronic 300 PostScript imagesetter.
Woodcock continued his interest in publishing through college and beyond, studying Book Arts at the UC Santa Cruz Cowell Press under George Kane, [6] [9] doing the illustrations for his book Networking the Macintosh, [10] and subsequently collaborating with his publisher parents [11] [12] [13] to provide book designs and cover art for some of their books. Woodcock was one of the founders of Netsurfer Digest, the first online periodical about the World Wide Web, and served as its production manager from 1994 through 2005. [14]
In 1987, Woodcock began building the dot-com era Internet backbone network Zocalo, [15] which had its origins in the toasternet [16] he began constructing while working at Farallon Computing in the mid-1980s. When the network grew to encompass Santa Cruz as well as Berkeley in 1989, he began using anycast routing to distribute network traffic between the servers in the two locations. [6] Throughout the 1990s, he continued to pioneer IP anycast IGP and EGP-based topological load-balancing techniques. [17] Together with Mark Kosters he proposed at the 1996 Montreal IEPG that the root DNS servers be migrated to IP anycast, and this work has provided the basis upon which root DNS servers have been deployed since the late 1990s. [18] [19]
In the early 2000s, Woodcock was an early proponent of reputation-based routing security and encapsulated much of that work in the "Prefix-List Sanity Checker" toolset which was used by most of the largest Internet networks to validate proposed BGP routing announcements in the interregnum between the RPSL and RPKI eras. [20] [21]
In 2010 and 2011, with Rick Lamb, who had previously built the signing system that places DNSSEC cryptographic signatures on the DNS root zone, Woodcock built the first global-scale FIPS 140-2 Level 4 DNSSEC signing infrastructure, with locations in Singapore, Zurich, and San Jose. [22] [23] [24] [25] Woodcock has also done networking protocol development work, [26] [27] and has developed networking products for Cisco, Agilent, [28] and Farallon.
In 2001, together with Sean Donelan and John Todd, Woodcock constructed the "Inter-Network Operations Center Dial-By-Autonomous-System-Number" (INOC-DBA) infrastructure protection hotline communications system. [29] At its peak, it interconnected more than 2,800 NOCs and CERTs, and was notably the first inter-carrier SIP VoIP network, and the first telephone network of any kind to provide service on all seven continents. [30]
Woodcock was one of the two international liaisons in Estonia assisting Hillar Aarelaid and the CERT-EE during Russia's 2007 cyberattacks on Estonia by coordinating the international effort to intercept and block inbound attack traffic before it reached the Estonian border. [31] [32] [33]
When Russia conducted a subsequent cyber-attack against Georgia in 2008, in parallel with a conventional military attack, Woodcock was widely quoted in the press as an analyst of nation-state cyber warfare, stating that military cyber attacks would likely continue, because "you could fund an entire cyberwarfare campaign for the cost of replacing a tank tread," [34] [35] and that "any modern warfare will include a cyber-warfare component," [36] but cautioning that precise attribution is difficult: "You'll never be able to establish who was sitting in front of a computer from which an attack originates." [37]
In 2017, Woodcock was appointed to the Global Commission on the Stability of Cyberspace, and served on the commission until its successful conclusion in 2019, participating in the drafting of its eight norms related to non-aggression in cyberspace.
In the wake of the six major Caribbean hurricanes of 2017, which included two Category 5 hurricanes and destroyed critical communications infrastructure in ten Caribbean countries, Woodcock worked with Bernadette Lewis, Bevil Wooding and others to establish the Commission on Caribbean Communications Resilience, served as a commissioner for two years, and assisted in the drafting of its final recommendations. [38] [39]
Woodcock has become an outspoken advocate of regulation of the use of artificial intelligence in the public interest, taking positions against the use of AI to exploit human psychological weaknesses, [40] [41] against delegating "kill chain" decisions to military AI, and regarding AI and increasing socioeconomic inequities, saying, for example,
...and regarding the use of AI to intermediate human communication through "filter bubbles":
Woodcock advocates in favor of regulation in the public interest, particularly regulation of constrained resources like IPv4 addresses [44] and public rights-of-way. [45] At the same time, he has advocated for permissionless new market entry in cases like those of Internet service providers [46] and Internet exchange points, [47] where no constrained resources are inherently consumed and the value of innovation is high. He has advocated for a nuanced view of "Internet Balkanization" or fragmentation since at least 2013, as in this reference to Brazil's rapid construction of Internet infrastructure:
...and has argued in favor of less heated rhetoric regarding national Internet infrastructure initiatives and controls in China, Russia, Egypt, [49] Iran, [50] Georgia, and Estonia [51] as well.
Woodcock is a noted advocate for competitive telecommunication marketplaces, frequently speaking and publishing on the topics of new market entry and the benefits which increased competition in Internet access markets bring to users, in the form of improved performance and lower costs. These positions have informed and generally been adopted as best-practices by the OECD in its recommendations to member countries on telecommunications regulation and legislation. [52] [53] Supporting that work, in 2011 he produced the first-ever survey of the peering connections between Internet networks, characterizing more than 142,000 such agreements, [54] and followed up with a second survey of 1.9 million peering connections in 2016. [55] [56]
In 1997 and 1998, Woodcock and J.D. Falk worked with the California legislature [57] [58] to enact the world's first anti-spam legislation, Assembly Bill 1629, which was enacted as California Business and Professions Code 17538.45, and was subsequently used as the basis for the United States federal anti-spam law. [59] [60]
In the wake of the ITU's December 2012 World Conference on International Telecommunications, which he characterized as an attempted take-over of the institutions of Internet governance, Woodcock published a number of secret ITU budget documents and acted as point-person in an effort to redirect USD 11M in U.S. government funds from ITU contributions to support of the multistakeholder model of Internet governance. [61] This effort centered on a "We the People" petition and an explanatory web site, [62] and, although ultimately unsuccessful, received much favorable attention in the press and Internet governance community. [63]
In 2019 and 2020, Woodcock organized the successful opposition to the attempted $1.1bn sale of the .ORG top-level domain to private equity firm Ethos Capital, and serves on the board of directors of the Cooperative Corporation of dot-Org Registrants (CCOR). [64] [65] [66]
In March, 2022, Woodcock was one of the lead authors, along with Bart Groothuis, Eva Kaili, Marina Kaljurand, Steve Crocker, Jeff Moss, Runa Sandvik, John Levine, Moez Chakchouk and some eighty other members of the Internet governance and cybersecurity community, of an open letter entitled Multistakeholder Imposition of Internet Sanctions. [67] The letter outlines a set of principles governing the imposition of Internet-related sanctions and describes the mechanism being built to operationalize the sanction mechanism. The letter was occasioned by a request from the Ukrainian Ministry of Digital Transformation to ICANN and RIPE, requesting that Russia's top-level domains and IP addresses be revoked. [68] The letter advocates more effective sanctions, more narrowly-focused on military and propaganda targets, and avoiding collateral effects upon civilians [69] [70] [71] and features a four-page annex evaluating different technical mechanisms by which Internet-related sanctions could be imposed.
Woodcock's published work includes many PCH white-papers, [95] the 1993 McGraw-Hill book Networking the Macintosh, [10] the report of the ANF AppleTalk Tunneling Architectures Working Group, which he chaired in 1993 and 1994, many articles in Network World , MacWorld , MacWEEK , Connections, and other networking journals and periodicals. [96] In addition, he was principal author of the Multicast DNS [26] and Operator Requirements of Infrastructure Management Methods [27] [97] IETF drafts, and contributed to the IP anycast RFC.
The Internet Corporation for Assigned Names and Numbers is a global multistakeholder group and nonprofit organization headquartered in the United States responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the Internet's stable and secure operation. ICANN performs the actual technical maintenance work of the Central Internet Address pools and DNS root zone registries pursuant to the Internet Assigned Numbers Authority (IANA) function contract. The contract regarding the IANA stewardship functions between ICANN and the National Telecommunications and Information Administration (NTIA) of the United States Department of Commerce ended on October 1, 2016, formally transitioning the functions to the global multistakeholder community.
A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet after the root domain. The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last non-empty label of a fully qualified domain name. For example, in the domain name www.example.com, the top-level domain is .com. Responsibility for management of most top-level domains is delegated to specific organizations by the ICANN, an Internet multi-stakeholder community, which operates the Internet Assigned Numbers Authority (IANA), and is in charge of maintaining the DNS root zone.
In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority or control. Domain names are often used to identify services provided through the Internet, such as websites, email services and more. Domain names are used in various networking contexts and for application-specific naming and addressing purposes. In general, a domain name identifies a network domain or an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, or a server computer.
A root name server is a name server for the root zone of the Domain Name System (DNS) of the Internet. It directly answers requests for records in the root zone and answers other requests by returning a list of the authoritative name servers for the appropriate top-level domain (TLD). The root name servers are a critical part of the Internet infrastructure because they are the first step in resolving human-readable host names into IP addresses that are used in communication between Internet hosts.
The DNS root zone is the top-level DNS zone in the hierarchical namespace of the Domain Name System (DNS) of the Internet.
The Domain Name System Security Extensions (DNSSEC) are a suite of extension specifications by the Internet Engineering Task Force (IETF) for securing data exchanged in the Domain Name System (DNS) in Internet Protocol (IP) networks. The protocol provides cryptographic authentication of data, authenticated denial of existence, and data integrity, but not availability or confidentiality.
Internet exchange points are common grounds of IP networking, allowing participant Internet service providers (ISPs) to exchange data destined for their respective networks. IXPs are generally located at places with preexisting connections to multiple distinct networks, i.e., datacenters, and operate physical infrastructure (switches) to connect their participants. Organizationally, most IXPs are each independent not-for-profit associations of their constituent participating networks. The primary alternative to IXPs is private peering, where ISPs directly connect their networks to each other.
Anycast is a network addressing and routing methodology in which a single IP address is shared by devices in multiple locations. Routers direct packets addressed to this destination to the location nearest the sender, using their normal decision-making algorithms, typically the lowest number of BGP network hops. Anycast routing is widely used by content delivery networks such as web and name servers, to bring their content closer to end users.
An internationalized domain name (IDN) is an Internet domain name that contains at least one label displayed in software applications, in whole or in part, in non-Latin script or alphabet or in the Latin alphabet-based characters with diacritics or ligatures. These writing systems are encoded by computers in multibyte Unicode. Internationalized domain names are stored in the Domain Name System (DNS) as ASCII strings using Punycode transcription.
Site Finder was a wildcard DNS record for all .com and .net unregistered domain names, run by .com and .net top-level domain operator VeriSign between 15 September 2003 and 4 October 2003.
The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to take action against what they allege to be spammers. The correctness of this assessment by Spamhaus is regularly disputed. If the assessment is based on objective characteristics or on standards set by Spamhaus itself is disputed. The name spamhaus, a pseudo-German expression, was coined by Linford to refer to an internet service provider, or other firm, which spams or knowingly provides service to spammers. Spamhaus has been criticized to purposely hide all direct methods of contact from its webpages to avoid transparency, while asking transparency from others
Internet Systems Consortium, Inc., also known as ISC, is a Delaware-registered, 501(c)(3) non-profit corporation that supports the infrastructure of the universal, self-organizing Internet by developing and maintaining core production-quality software, protocols, and operations. ISC has developed several key Internet technologies that enable the global Internet, including: BIND, ISC DHCP and Kea. Other software projects no longer in active development include OpenReg and ISC AFTR.
Distributed denial-of-service attacks on root nameservers are Internet events in which distributed denial-of-service attacks target one or more of the thirteen Domain Name System root nameserver clusters. The root nameservers are critical infrastructure components of the Internet, mapping domain names to IP addresses and other resource record (RR) data.
Internet governance consists of a system of laws, rules, policies and practices that dictate how its board members manage and oversee the affairs of any internet related-regulatory body. This article describes how the Internet was and is currently governed, some inherent controversies, and ongoing debates regarding how and why the Internet should or should not be governed in future.
Average Per-Bit Delivery Cost, or APBDC, is the cost accounting method by which Internet Service Providers (ISPs) calculate their cost of goods sold.
Packet Clearing House (PCH) is the international organization responsible for providing operational support and security to critical Internet infrastructure, including Internet exchange points and the core of the Domain Name System. The organization also works in the areas of cybersecurity coordination, regulatory policy and Internet governance.
Nepal Internet Exchange is Nepal's only Internet exchange point, established to keep local traffic local and improve local web surfing with local content while saving international bandwidth. It was established in 2002 with the help of Packet Clearing House.
In networking, a black hole refers to a place in the network where incoming or outgoing traffic is silently discarded, without informing the source that the data did not reach its intended recipient.
Avalanche was a criminal syndicate involved in phishing attacks, online bank fraud, and ransomware. The name also refers to the network of owned, rented, and compromised systems used to carry out that activity. Avalanche only infected computers running the Microsoft Windows operating system.
Quad9 is a global public recursive DNS resolver that aims to protect users from malware and phishing. Quad9 is operated by the Quad9 Foundation, a Swiss public-benefit, not-for-profit foundation with the purpose of improving the privacy and cybersecurity of Internet users, headquartered in Zürich. Quad9 is entirely subject to Swiss privacy law, and the Swiss government extends that protection of the law to Quad9's users throughout the world, regardless of citizenship or country of residence.
In 1989, Bill developed the anycast routing technique that now protects the domain name system.
Woodcock put modem banks and servers in his basement and started a business doing e-mail forwarding for corporations, billing them monthly. "I remember the first month, I made 50 bucks," Woodcock recalls. "I was happy about that." He named his little Internet company Zocalo, a pun in Spanish, meaning both "marketplace" and "wall jack." In the fall of 1989, Woodcock started college at the University of California at Santa Cruz; Zocalo, then a stack of hardware that fit on a desk, moved to his dorm room.
Consumer groups are trying to fill the void. The Berkeley Macintosh Users Group, BMUG, has 10,000 members, about half in California. Weekly meetings in the Bay Area attract several hundred people. The BMUG booth had an unvarnished hackers' quality that seemed a throwback to Apple's early days. 'We provide technical support to end users that Apple doesn't provide any more,' said Bill Woodcock, a volunteer, who works at Farallon Computing and volunteers two to three hours a day. Dealing with Apple is hard, he says. 'We don't buy thousands of machines every year, and we don't make millions of dollars.'
I met Bill Woodcock back in the 1980s when he was Archaeology Editor for Academic Press.
O'Brien et al. (2005) give a great deal of credit to a single individual, Bill Woodcock, the acquisition editor for Academic Press during this period.
...Charlene Woodcock, the architecture editor at the University of California Press...
{{cite journal}}
: Cite journal requires |journal=
(help)MultiPoint Access Internet connections are available throughout the United States and Northern Europe at speeds ranging from 56 kilobits per second to full T1, 1.544 megabits per second.
Border gateway protocol (BGP) tables and data flow statistics sorted by destination address are collected from a plurality of routers. The BGP tables and the data flow statistics are aggregated and correlated by a correlation node. The correlation node produces autonomous system (AS) transit volumes and AS terminating volumes by AS number. The AS transit volumes and the AS terminating volumes can be used to evaluate the suitability of transit providers and potential peers.
At 10 pm on Tuesday, May 8, Lindqvist, Fältström, and Woodcock arrived at the downtown Tallinn office building that housed CERT headquarters. It was a geek dream team, with the attitude to match. Woodcock, who had spent years traveling through Europe, Africa, and Asia helping to set up Internet infrastructures, sauntered into the operations center wearing bison-skin boots handcrafted for him in Montana. Woodcock hoisted his laptop into the air. He called Aarelaid and Lindqvist over, took a picture with the built-in camera, and sent it out to the network to prove to the Vetted that Aarelaid was for real... As Aarelaid identified a specific address, Woodcock and Lindqvist sent rapid-fire emails to network operators throughout the world asking for the IP to be blocked at the source. One by one, they picked off the bots, and by dawn they had deflected the attackers. "I was very, very lucky that Kurtis, Patrik, and Bill were here," Aarelaid says.
Three world-renowned IT experts were visiting Estonia, and they assisted the Estonian Computer Emergency Response Team with defenses against ping attacks, botnets, and hackers. The experts were Kurtis Lindqvist, Patrik Fältström, and Bill Woodcock, research director of Packet Clearing House and member of the board of directors of the American Registry of Internet Numbers.
It was the first time a known cyberattack had coincided with a shooting war, but it will likely not be the last, said Bill Woodcock. He said cyberattacks are so inexpensive and easy to mount, with few fingerprints, they will almost certainly remain a feature of modern warfare. 'It costs about 4 cents per machine,' Mr. Woodcock said. 'You could fund an entire cyberwarfare campaign for the cost of replacing a tank tread.'
Woodcock found evidence that the attacks had originated from the Abkhazia region, a territory on the Black Sea disputed between Russia and Georgia. Mr. Woodcock said the disruptions did not appear to have been caused by a botnet, rather, at about 10:30 a.m. E.S.T., millions of people worldwide received spam e-mail messages containing links to Twitter and other sites. When recipients clicked on the links, those sites were overwhelmed with requests to access their servers. 'It's a vast increase in traffic that creates the denial of service,' he said.
Bill Woodcock, research director with the Internet infrastructure group Packet Clearing House, is cautious about assigning blame. 'You'll never be able to establish who was sitting in front of a computer from which an attack originates,' he says.
The 2017 hurricane season in the Caribbean was particularly destructive as six major hurricanes assailed the region. Ten Caribbean countries were devastated by the most dangerous of these, Irma and Maria, both of which were classified as Category 5. Many communications networks were severely damaged and critical communications services, including broadcast and internet, were badly disrupted. The Commission on Caribbean Communications Resilience is tasked to examine the region's communications vulnerabilities, with specific focus on nature-related hazards, and to recommend actionable strategies for increased resilience to governments, regulators and other stakeholders.
In short-term, pragmatic ways, learning algorithms will save people time by automating much of tasks like navigation and package delivery and shopping for staples. But that tactical win comes at a strategic loss as long as the primary application of AI is to extract more money from people, because that puts them in opposition to our interests as a species, helping to enrich a few people at the expense of everyone else. In AI that exploits human psychological weaknesses to sell us things, we have for the first time created something that effectively predates our own species. That's a fundamentally bad idea and requires regulation just as surely as would self-replicating biological weapons.
AI is already being used principally for purposes that are not beneficial to the public nor to all but a tiny handful of individuals. The exceptions, like navigational and safety systems, are an unfortunately small portion of the total. Figuring out how to get someone to vote for a fascist or buy a piece of junk or just send their money somewhere is not beneficial. These systems are built for the purpose of economic predation, and that's unethical. Until regulators address the root issues – the automated exploitation of human psychological weaknesses – things aren't going to get better.
The current model of Internet traffic exchange can only exist in an environment that stimulates market entry and investment. This requires that regulators allow telecommunication and non-telecommunication operators to enter into the market, to compete and to interconnect. Indeed where development of the Internet has been less than satisfactory this often stems from a lack of sufficient liberalization.
According to a February presentation made by Bill Woodcock, research director of Packet Clearing House to the Department of Homeland Security's Infosec Technology Transition Council, obtained by Wired.com, the Egyptian Communications Ministry acted quite responsibly in the procedure it used to cut ties from the net, after the shutdown was ordered by Egypt's much-feared intelligence service.
Iran also has engaged in on-again, off-again talks about building an Internet exchange point, which would allow much faster data connections, said Bill Woodcock, research director of the Packet Clearing House. The San Francisco-based nonprofit has built Internet exchange points throughout much of the world. 'All they're trying to do is be like us,' Woodcock said. 'They're trying to build as much Internet as they can, as quickly as they can.'
These are two slides from a briefing I gave NATO at the end of 2008 on what happened in Estonia and Georgia. At the time the Russians attacked Estonia it came with a little warning. The Russians took the Chinese playbook very literally. They went to Estonia and said, 'who are the Russians in Estonia that can help us conduct this attack inside Estonia?' But that's an attack against law and order; that's an insurgency. Which means the Estonians were conducting a counter insurgency; an appeal to law and order. The Estonians said: 'Hey, your cousins in Moscow have trouble finding groceries in the grocery store. Their plumbing doesn't work all the time. The electricity is not reliable. Law enforcement isn't that good. You have it really good here in Estonia, right? Why would you attack that?' And at the same time they found the Russian agent who was running around recruiting, threw him in jail. This is effective counter insurgency. You say: 'Here are the benefits of what we are offering.' That's the carrot. The stick is: 'If you violate the societal compact, you get thrown in jail.' So when the attack came there was no domestic participation. There were not ethnic Russian Estonian hackers running botnets inside Estonia. That made the attack much simpler to deal with.
Another attempt to deal with the junk e-mail problem, which seems even stronger than the Washington law, goes into effect in California on Jan. 1, 1999. AB 1629 takes a broader aim in trying to eliminate unsolicited commercial e-mail in general by allowing California ISPs to publish a notice forbidding the use of their equipment to send or deliver spam. Violators can be sued. 'We think it's a much better bill than anything that's been considered at the federal level,' said Bill Woodcock, the president of Zocalo, a Berkeley, Calif., ISP, and representative of the Consortium of Interneet Service Providers, in testimony before the California legislature. 'It's the first one that's good enough to get support from the Internet industry.'
J.D. Falk and I put a lot of work into getting tough anti-spam legislation passed, and we were successful. Here in California we now have jail time for second-offense spammers.
The basis for the new bill sitting before Congress is anti-spam legislation adopted in California last year (AB 1629). Under the federal "Can Spam Act" (HR 3113), co-authored by Rep. Gary Miller, R-Calif., Internet service providers would be allowed to take civil action against spammers -- those who send unsolicited commercial e-mail -- for $50 per message, up to $25,000 per day. Observers say the bill has a strong chance of being approved by Congress.
By and For Non-Profits: The Cooperative Corporation of dot-org Registrants, or CCOR, is the cooperative organization that seeks to embody and collectively represent the community of dot-org domain name registrants. The CCOR is an organization created by nonprofits for nonprofits to maximize the security and stability of the open and non-commercial Internet.
We believe it is the responsibility of the global Internet governance community to weigh the costs and risks of sanctions against the moral imperatives that call us to action in defense of society, and we must address this governance problem now and in the future. We believe the time is right for the formation of a new, minimal, multistakeholder mechanism, similar in scale to NSP-Sec or Outages, which after due process and consensus would publish sanctioned IP addresses and domain names in the form of public data feeds in standard forms (BGP and RPZ), to be consumed by any organization that chooses to subscribe to the principles and their outcome.
{{cite web}}
: CS1 maint: bot: original URL status unknown (link)"Packet Clearing House is honoured to be participating in this effort," said Bill Woodcock, who is the executive director of PCH, and one of the ten commissioners. "The scale of the devastation wrought by this season's hurricanes is unmatched in recent communications history. Having two entire countries go offline through the critical period of evacuation and humanitarian relief is a failure that cannot be allowed to happen again, and the challenge that climate change presents in the Caribbean will continue to increase in future years."