<h1 style="font-weight:normal"><font>We want TD64! ITU transparency begins at home: <a href="http://www.internetgovernance.org/2012/06/05/we-want-td64-itu-transparency-begins-at-home/">http://www.internetgovernance.org/2012/06/05/we-want-td64-itu-transparency-begins-at-home/</a></font></h1>

<h1 style="font-weight:normal"><font>TD 64 for breakfast: <a href="http://www.internetgovernance.org/2012/06/06/td-64-for-breakfast/">http://www.internetgovernance.org/2012/06/06/td-64-for-breakfast/</a></font></h1><h1 style="font-weight:normal">

<font>Threat analysis of WCIT part 2: Telecommunications vs. Internet: <a href="http://www.internetgovernance.org/2012/06/07/threat-analysis-of-wcit-part-2-telecommunications-vs-internet/">http://www.internetgovernance.org/2012/06/07/threat-analysis-of-wcit-part-2-telecommunications-vs-internet/</a></font></h1>

<h1><font style="font-weight:normal" size="2"><a href="http://www.internetgovernance.org/2012/06/09/threat-analysis-of-wcit-part-3-charging-you-charging-me/" title="Permalink to Threat Analysis of WCIT Part 3: Charging you, charging me">Threat Analysis of WCIT Part 3: Charging you, charging me</a>: <a href="http://www.internetgovernance.org/2012/06/09/threat-analysis-of-wcit-part-3-charging-you-charging-me/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=threat-analysis-of-wcit-part-3-charging-you-charging-me">http://www.internetgovernance.org/2012/06/09/threat-analysis-of-wcit-part-3-charging-you-charging-me/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=threat-analysis-of-wcit-part-3-charging-you-charging-me</a></font><br>

</h1>