Hacking the Master Switch? the Role of Infrastructure in Google's

Total Page:16

File Type:pdf, Size:1020Kb

Hacking the Master Switch? the Role of Infrastructure in Google's Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system. I suggest that this actor-network was a manifestation of the transformation of Google from a content provider as conceived by Wu into a new kind of Internet governance policy and network actor: the platform hybrid. Drawing on the work of Ciborra, I suggest a number of processes of technological and organisational change that were central to this transformation, allowing Google to at least partially “hack” Wu’s master switch. In conclusion, I describe the characteristics of Google as a platform hybrid and its implications for network neutrality policy making and Internet governance. iii AcknowleDgments Undertaking this work has been a profoundly transformative experience, and it would not have been possible without the guidance and support that I received from many good people. I would like to express my sincere gratitude to my advisor Prof. Andrew Clement for his continuous support of my PhD studies. He was both very patient and genuinly enthusiastic about my research, and his immense knowledge was exceedingly valuable. I have learned a great deal from Andrew about the work of a public intellectual. I am thankful for the members of my committee, Prof. David Phillips and Prof. Leslie Regan Shade, who have challenged and supported me over the past five years as I moved from a collection of questions to a completed study. Leslie has been, for more years than I dare count, as wise and supportive a mentor and friend as I could hope for. I wish to thank the members of the iSchool community who provided guidance and support over the years, particularly Prof. Lynne Howarth, a role model as an engaged researcher and teacher, and the iSchool staff, especially Ms. Laura Jantek. I am very appreciative of Mr. Matt Calder and Dr. Aemen Lodhi who shared with me data that proved to be invaluable to my research. It would not have been possible to complete my research as a part-time student without the truly exceptional support and understanding of two of my professional colleagues, Mr. Teras Gavin and Ms. Valerie Morin. iv I will be forever thankful to my mentor at Dalhousie University, the late Prof. Robert Merritt, who started me on this journey more than twenty years ago. Lastly, without the support and understanding of my family and friends, this work would have been simply impossible. My friends and colleagues Caroline Côté, Mark MacLeod, Christy Conte, Shelley Robinson, Iain Cook, and Monica Auer intervened at crucial times. My mother Mary, my father David, and my aunt Edith all supported my graduate work for very many years, in very many ways. My wife, Natasha Gauthier, helped me immeasurably through a mix of encouragement and loving impatience that made completion of this work an absolute necessity. Finally, the intellectual passion of my son Joshua inspired me to keep going, along with a legitimate fear that he might complete a PhD before I did. v Table of Contents Acknowledgments .............................................................................................................. iv Table of Contents ............................................................................................................... vi List of Tables .......................................................................................................................x List of Figures .................................................................................................................... xi List of Appendices ............................................................................................................ xii 1 Google and network neutrality: A contested Internet .....................................................1 1.1 The day Google became “evil” ................................................................................1 1.2 Wu’s network neutrality and Google .......................................................................3 1.3 An alternative Internet? ............................................................................................5 1.4 Research goal and questions ....................................................................................9 1.5 Overview of argument ...........................................................................................10 1.5.1 Chapter Two: Approaches to Internet infrastructure, network neutrality, and Google studies .....................................................................................10 1.5.2 Chapter Three: Researching the burgeoning network giant ......................12 1.5.3 Chapter Four: Extending search .................................................................13 1.5.4 Chapter Five: The policy-active hyper giant .............................................14 1.5.5 Chapter Six: The platform hybrid ..............................................................15 1.5.6 Chapter Seven: Google, beyond good and evil ..........................................16 1.6 Location in contemporary research and policy debates .........................................17 1.7 Chapter summary ...................................................................................................18 2 Approaches to Internet infrastructure, network neutrality, and Google studies ...........19 2.1 Relevant theoretical and methodological approaches ............................................19 2.1.1 Foundational work: Internet governance ...................................................19 2.1.2 (Infra)structure follows strategy, and vice versa ........................................23 2.1.3 Star to Sandvig: Infrastructure studies .......................................................25 2.1.4 Theory of affordances ................................................................................27 2.1.5 Actor–network theory ................................................................................28 2.1.6 Ciborra: Hosting, drift, hacking, and the platform organisation ................31 vi 2.1.7 The political economy of Google and critical Google studies ...................40 2.2 Understanding network neutrality ..........................................................................45 2.2.1 Common carriage .......................................................................................46 2.2.2 The end-to-end principle and Internet traffic management .......................48 2.2.3 Net neutrality controversies in North America ..........................................50 2.3 Chapter summary ...................................................................................................51 3 Researching the burgeoning network giant ...................................................................52 3.1 Research Design .....................................................................................................54 3.1.1 Case study: Ciborra and Actor–network theory .........................................54 3.1.2 Infrastructure studies ..................................................................................55 3.1.3 Propositions ...............................................................................................56 3.2 Research process ....................................................................................................61 3.2.1 Textual analysis .........................................................................................62 3.2.2 Discovering infrastructure .........................................................................66 3.3 Mapping Google: Process and impact ...................................................................80 3.3.1 Software .....................................................................................................81
Recommended publications
  • Large-Scale, Automatic XSS Detection Using Google Dorks
    Large-Scale, Automatic XSS Detection using Google Dorks Riccardo Pelizzi Tung Tran Alireza Saberi Abstract XSS Attacks continue to be prevalent today, not only because XSS sanitization is a hard problem in rich- formatting contexts, but also because there are so many potential avenues and so many uneducated developers who forget to sanitize reflected content altogether. In this paper, we present Gd0rk, a tool which em- ploys Google’s advanced search capabilities to scan for websites vulnerable to XSS. It automatically generates Figure 1: CVE vulnerabilities for 2010 and maintains a database of parameters to search, and uses heuristics to prioritize scanning hosts which are degrees of client-side support with a primarily server- more likely to be vulnerable. Gd0rk includes a high- side XSS defense [37, 23, 31]. However, the diffusion of throughput XSS scanner which reverse engineers and ap- such methods remains limited: hybrid methods require proximates XSS filters using a limited number of web re- support from both clients and servers. Since the party quests and generates working exploits using HTML and that is most directly affected by an XSS attack is the user JavaScript context-aware rules. who accesses a vulnerable server, client-side protections The output produced by the tool is not only a remark- are thus desirable (despite their limitation to so-called re- ably vast database of vulnerable websites along with flected XSS) and have been developed [29,4, 17, 11]. working XSS exploits, but also a more compact repre- However, client-side defenses are no definitive solution sentation of the list in the form of google search terms, either: IE8 regular-expression based approach is easy whose effectiveness has been tested during the search.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • The Performance of Private Equity-Backed Ipos and the Effect of M&A-Activity – a European Study
    Archive no: School of Economics and Management Department of Business and Administration FEKP90, Business Administration - Degree Project Master of Science in Business and Economics Spring term 2011, Lund The Performance of Private Equity-backed IPOs and the Effect of M&A-activity – A European Study Author: Linus Johansson Tutor: Rikard Larsson Abstract Title: The Performance of Private Equity-backed IPOs and the effect of M&A-activity – A European Study Seminar date: 2011-05-24 Course: Master Thesis in Business Administration, 30 University Credit Points (30 ECTS). Author: Linus Johansson Tutor: Rikard Larsson Five key words: BHAR, IPO, Performance, Private Equity, M&A Purpose: The purpose of this paper is to investigate how private equity-backed IPOs perform once they go public. That is, to investigate whether or not these private equity firms have created highly competitive, high- performance portfolio companies and to see if the portfolio companies are able to retain those qualities even after going public. These results are then to be compared with previous research done on the general IPO and its short- and long-term performance. It also sets out to measure what effect M&A-activity during the fund holding period may have on the fund companies after being exited onto the public market. Methodology: The performance of the private equity-backed IPOs has been measured as the abnormal return using two methods, cumulative abnormal returns and buy-and-hold abnormal returns. Two types of benchmarks have been used, S&P Europe 350 as well as an industry-specific version of that index. Literature review: Theories used in this study are based partially on previous research on the private equity industry as well as general IPO-theory, such as long-term underperformance and the “hot issue” anomaly.
    [Show full text]
  • Google Chrome Post Request Extension
    Google Chrome Post Request Extension Hermaphroditic and augmenting Templeton quaking almost lustfully, though Gustaf inosculated his aspirations contracts. Otto singsong her regur complexly, she call it impassably. Old-rose and sedged Bennet timbers some tenderfoots so delusively! Extension will install automatically after dropping on extensions page. This can commonly be found by going to the start menu and scrolling down the all programs list until you find the appropriate program or app. Sometimes, it is the best first step if you simply want to move away from Google Ecosystem. Chrome will generate a request for a license to decrypt that media. Is Computer Science necessary or useful for programmers? Insomnia is a powerful HTTP tool belt in one intuitive app. Barth, the proof, Google also announced its plan to crack down on websites that make people involuntarily subscribe to mobile subscription plans. Thank you for your help. How much do you use JMeter and how do you use it for simulating users playing the game or just a service that maybe consumed by a particular game? Again, you set one extremely secure password. Not only can CRXcavator help organizations manage their allowlist, but the entire Google Ecosystem. Once you select the HTTP request, for keeping us informed, the server is assumed to have responded with these response headers instead. Browsers are beginning to upgrade and block insecure requests. You can setup all the headers and all the cookies and everything the way you want it and then check the response when it comes back. Network view or waterfall chart. Jadali found usernames, user interface, and so on.
    [Show full text]
  • The Transition to Digital Television*
    DIGITAL TELEVISION 1 The Transition to Digital Television* Jérôme Addaa and Marco Ottavianib University College London; London Business School This paper studies the role of economic policy for the transition from analogue to digital television, with particular attention to the switch off of the analogue terrestrial signal. The analogue signal cannot be credibly switched off until almost all viewers have migrated to digital, due to universality of access to television. But before switch off, only part of the population can be reached with the digital signal. In addition, those who are reached need to spend more to upgrade their reception equipment than after switch off, because the capacity to increase the power of the digital signal will be made available only then. After reviewing the competitive structure and the role of government intervention in television markets, we present the early experience of a number of industrialised countries in the transition to digital television. We then formulate a micro-econometric model of digital television adoption by individual viewers. The model is calibrated to UK data and simulated to predict the impact of government policies on the take up of digital television. Policy makers can affect the speed of take up of digital television by: (i) controlling the quality of the signals and the content of public service broadcasters; (ii) intervening in the market for digital equipment with subsidies; and (iii) publicising the conditions and date of switch off of the analogue signal. We find that if the analogue terrestrial signal is switched off conditionally on aggregate adoption, strategic delays possibly arise and expectations affect the success of the switch off policy.
    [Show full text]
  • Google Dorks: Use Cases and Adaption Study
    Google dorks: Use cases and Adaption study UNIVERSITY OF TURKU Department of Future Technologies Master of Science in Technology Thesis Networked Systems Security October 2020 Reza Abasi Supervisors: Dr. Ali Farooq Dr. Antti Hakkala The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. i UNIVERSITY OF TURKU Department of Future Technologies Reza Abasi: Google dorks: Use cases and adaption study Master of Science in Technology Thesis, 93 pages. Networked Systems Security October 2020 The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets (the Internet) precipitates more convenience and access to various resources. However, on the downside, the Internet could be the hotbed for malicious actors like hackers, attackers, and cybercriminals’ communities. Continuous Penetration testing and monitoring of the sites, and forums providing illicit digital products and services is a must-do task nowadays. Advanced searching techniques could be employed for discovering such forums and sites. Google dorks that are utilizing Google’s advanced searching techniques could be applied for such purpose. Google dorks could be used for other areas that we will explain during this thesis in more detail like information gathering, vulnerability detection, etc. The purpose of this thesis is to propose advanced searching techniques that will help cybersecurity professionals in information gathering, reconnaissance, vulnerability detection as well as cyber criminal investigative tasks. Further, a usability study has been conducted to examine the acceptance of these techniques among a group of cybersecurity professionals.
    [Show full text]
  • Interconnection
    Interconnection 101 As cloud usage takes off, data production grows exponentially, content pushes closer to the edge, and end users demand data and applications at all hours from all locations, the ability to connect with a wide variety of players becomes ever more important. This report introduces interconnection, its key players and busi- ness models, and trends that could affect interconnection going forward. KEY FINDINGS Network-dense, interconnection-oriented facilities are not easy to replicate and are typically able to charge higher prices for colocation, as well as charging for cross-connects and, in some cases, access to public Internet exchange platforms and cloud platforms. Competition is increasing, however, and competitors are starting the long process of creating network-dense sites. At the same time, these sites are valuable and are being acquired, so the sector is consolidating. Having facili- ties in multiple markets does seem to provide some competitive advantage, particularly if the facilities are similar in look and feel and customers can monitor them all from a single portal and have them on the same contract. Mobility, the Internet of Things, services such as SaaS and IaaS (cloud), and content delivery all depend on net- work performance. In many cases, a key way to improve network performance is to push content, processing and peering closer to the edge of the Internet. This is likely to drive demand for facilities in smaller markets that offer interconnection options. We also see these trends continuing to drive demand for interconnection facilities in the larger markets as well. © 2015 451 RESEARCH, LLC AND/OR ITS AFFILIATES.
    [Show full text]
  • Google Pagerank and Markov Chains
    COMP4121 Lecture Notes The PageRank, Markov chains and the Perron Frobenius theory LiC: Aleks Ignjatovic [email protected] THE UNIVERSITY OF NEW SOUTH WALES School of Computer Science and Engineering The University of New South Wales Sydney 2052, Australia Topic One: the PageRank Please read Chapter 3 of the textbook Networked Life, entitled \How does Google rank webpages?"; other references on the material covered are listed at the end of these lecture notes. 1 Problem: ordering webpages according to their importance Setup: Consider all the webpages on the entire WWW (\World Wide Web") as a directed graph whose nodes are the web pages fPi : Pi 2 WWW g, with a directed edge Pi ! Pj just in case page Pi points to page Pj, i.e. page Pi has a link to page Pj. Problem: Rank all the webpages of the WWW according to their \importance".1 Intuitively, one might feel that if many pages point to a page P0, then P0 should have a high rank, because if one includes on their webpage a link to page P0, then this can be seen as their recommendation of P0. However, this is not a good criterion for several reasons. For example, it can be easily manipulated to increase the rating of any webpage P0, simply by creating a lot of silly web pages which just point to P0; also, if a webpage \generously" points to a very large number of webpages, such \easy to get" recommendation is of dubious value. Thus, we need to refine our strategy how to rank webpages according to their \importance", by doing something which cannot be easily manipulated \locally" (i.e., by any group of people who might collude, even if such a group is sizeable).
    [Show full text]
  • User Manual Instructional Icons Before You Start, Familiarise Yourself with the Icons Using This You Will See in This Manual
    user manual Instructional icons Before you start, familiarise yourself with the icons using this you will see in this manual: Warning—situations that could cause manual injury to yourself or others This user manual has been specially Caution—situations that could cause designed to guide you through the functions and damage to your device or other equipment features of your mobile device. Note—notes, usage tips, or additional information X Refer to—pages with related information; for example: X p. 12 (represents “see page 12”) ii • Google, Android, Android Market, Google Talk, → Followed by—the order of options or Google Mail, and Google Maps are trademarks of menus you must select to perform a step; Google, Inc. → for example: Select Messaging New • YouTube is a trademark of YouTube, LLC. message (represents Messaging, YouTube® logo is a registered trademark of followed by New message) YouTube, LLC. manual this using • Bluetooth® is a registered trademark of the [ ] Square brackets—device keys; for Bluetooth SIG, Inc. worldwide. example: [ ] (represents the Power key) Bluetooth QD ID: B015432 • Wi-Fi®, the Wi-Fi CERTIFIED logo, and the Wi-Fi Copyright information logo are registered trademarks of the Wi-Fi Rights to all technologies and products that Alliance. comprise this device are the property of their respective owners: • This product has a Android platform based on Linux, which can be expanded by a variety of JavaScript-based software. iii safety and usage information .................. 1 Safety warnings ..........................................1 Safety precautions ......................................3 contents Important usage information .......................6 introducing your device ......................... 11 Unpack .....................................................11 Device layout ............................................12 Keys .........................................................13 Icons .........................................................14 getting started with your device ...........
    [Show full text]
  • Housing: Overview
    Appendix 1a - Housing: Overview What are the benefits we're pursuing for Londoners? 1) More Londoners have access to good quality homes that meet their needs and that they can afford. 2) Londoners renting privately will get a better deal and be protected from criminal landlords. 3) The scourge of homelessness will be tackled and all rough sleepers will be offered a route off the streets. Governance and risk Targets and objectives Timescales Spend A AGG Updates Highlights and progress Affordable homes (and land) - To the end of December, 33,767 affordable housing starts had been recorded against the Mayor's target of 116,000 housing starts by March 2022. The Mayor's new Building Council Homes for Londoners programme is now in delivery and the first units (121) are captured in this figure. Allocations are in place for about 107,000 affordable homes against the overall target; this is good progress with over three years left to add starts. - A planning application was submitted to LB Newham for 5,000 homes on land owned by the GLA and joint venture partners Keystone. Rogue Landlord and Agents Checker (RLAC) - Media coverage by the Guardian, in which it contrasted the Checker favourably with the Government's national database, led to higher than expected visits to the RLAC; there have been 74,600 clicks since this metric began to be tracked (ie. over the 2018 calendar year). Homelessness - No Second Night Out (NSNO) floating assessment hubs took place in Newham, Lambeth and Hackney in Q3 with further hubs planned for Westminster, Southwark and Camden in Q4.
    [Show full text]
  • Carroll V. Google
    Case 3:20-cv-07379 Document 1 Filed 10/21/20 Page 1 of 70 1 Elizabeth C. Pritzker (CA SBN: 146267) Jonathan K. Levine (CA SBN: 220289) 2 Bethany Caracuzzo (CA SBN: 190687) Caroline C. Corbitt (CA SBN: 305492) 3 PRITZKER LEVINE LLP 4 1900 Powell Street, Suite 450 Emeryville, CA 94608 5 Telephone: (415) 692-0772 Facsimile: (415) 366-6110 6 E-mail: [email protected]; [email protected] 7 [email protected]; [email protected] 8 Heidi M. Silton (pro hac vice forthcoming) Justin R. Erickson (pro hac vice forthcoming) 9 LOCKRIDGE GRINDAL NAUEN P.L.L.P. 10 100 Washington Avenue South, Suite 2200 Minneapolis, MN 55401 11 Telephone: (612) 339-6900 Facsimile: (612) 339-0981 12 E-mail: [email protected]; [email protected] 13 14 Counsel for Plaintiffs and the Proposed Class 15 UNITED STATES DISTRICT COURT 16 FOR THE NORTHERN DISTRICT OF CALIFORNIA 17 DANIEL CARROLL, DANIEL ) Case No. 18 EGERTER, and BRENDA KEEGAN, and ) ) 19 individually and on behalf of all others similarly situated, ) CLASS ACTION ) COMPLAINT 20 ) Plaintiffs, 21 ) JURY TRIAL DEMANDED ) 22 v. ) 23 GOOGLE LLC; GOOGLE IRELAND ) ) LIMITED; GOOGLE COMMERCE 24 LIMITED; GOOGLE ASIA PACIFIC ) ) 25 PTE. LIMITED; and GOOGLE PAYMENT CORP., ) 26 ) Defendants. ) 27 ) 28 -1- CLASS ACTION COMPLAINT Case No.: Case 3:20-cv-07379 Document 1 Filed 10/21/20 Page 2 of 70 1 Plaintiffs Daniel Carroll, Daniel Egerter and Brenda Keegan, on behalf of themselves and all 2 others similarly situated, bring this class action against Defendants Google LLC; Google Ireland Ltd.; 3 Google Commerce Ltd.; Google Asia Pacific Pte.
    [Show full text]
  • Société, Information Et Nouvelles Technologies: Le Cas De La Grande
    Société, information et nouvelles technologies : le cas de la Grande-Bretagne Jacqueline Colnel To cite this version: Jacqueline Colnel. Société, information et nouvelles technologies : le cas de la Grande-Bretagne. Sciences de l’information et de la communication. Université de la Sorbonne nouvelle - Paris III, 2009. Français. NNT : 2009PA030015. tel-01356701 HAL Id: tel-01356701 https://tel.archives-ouvertes.fr/tel-01356701 Submitted on 26 Aug 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE SORBONNE NOUVELLE – PARIS 3 UFR du Monde Anglophone THESE DE DOCTORAT Discipline : Etudes du monde anglophone AUTEUR Jacqueline Colnel SOCIETE, INFORMATION ET NOUVELLES TECHNOLOGIES : LE CAS DE LA GRANDE-BRETAGNE Thèse dirigée par Monsieur Jean-Claude SERGEANT Soutenue le 14 février 2009 JURY : Mme Renée Dickason M. Michel Lemosse M. Michaël Palmer 1 REMERCIEMENTS Je remercie vivement Monsieur le Professeur Jean-Claude SERGEANT, mon directeur de thèse, qui a accepté de diriger mes recherches, m’a guidée et m’a prodigué ses précieux conseils avec bienveillance tout au long de ces années avec beaucoup de disponibilité. Mes remerciements vont aussi à ma famille et à mes amis qui m’ont beaucoup soutenue pendant cettre entreprise.
    [Show full text]