The Internet

Total Page:16

File Type:pdf, Size:1020Kb

The Internet •• TEN THINGS SHOULD KNOW LAWYERS ABOUT THE INTERNET .. The COMMONS Initiative: Cooperative Measurement and Modeling of Open Networked Systems KIMBERLY CLAFFY .. CAIDA: Cooperative Association for Internet Data Analysis BASED AT THE SAN DIEGO SUPERCOMPUTER, CENTER AT UCSD .. table of contents .. .... about the author 01 07 Table of contents, Point #6 -08 Author biography How data is KC Claffy being used Kimberly Claffy Point #1 02 Point #7 08 received her Ph. D. Updating legal -10 in Computer Science frameworks Normal regulatory responses doomed from UCSD. She is Director and a prin- Point #2 02 -03 10 cipal investigator Obstacles to progress Point #8 -16 Problematic responses for CAIDA, and an Point #3 03 Adjunct Professor Available data: -05 Point #9 16 of Computer Science a dire picture The news is -19 and Engineering at UCSD. Kimberly’s not all bad research interests include Internet Point #4 05 measurements, data analysis and vi- -06 The problem is not so 20 sualization, particularly with respect new Point #10 Solutions will cross -23 to cooperation and sharing of Internet data. She advocates the use of quanti- Point #5 06 boundaries An absurd situation tative analysis to objectively inform Sponsors, Credits 24 public Internet policy discussions. Her email is [email protected]. Adapted from: http://www.caida.org/publications/papers/2008/10_things_Lawyers_Should_Know_About_The_Internet 1 2 Last year Kevin Werbach invited me to his Supernova 2007 conference to give a 15- minute vignette on3 the challenge of getting empirical data to inform telecom4 policy. They posted5 the video of my talk last year, and my favorite tech podcast ITConversations , posted the mp3 as an episode last week. I clearly needed more than 15 minutes... In response to my “impassioned plea”, I was invited to6 attend a meeting in March 2008 hosted by Google and Stanford Law School — Legal Futures — a “conversation between some of the world’s leading thinkers about the future of privacy, intellectual property, competition, in- novation, globalization, and other areas of the law undergoing rapid change due to technological advancement.’’ There I had 5 minutes to convey the most important data points I knew about the Internet to lawyers thinking about how to update legal frameworks to best accommodate informa- tion technologies in the 21st century. With a few more months of thought, here is my current top ten list of the most important things lawyers need to understand about the Internet. All content in this booklet (including text, photographs, graphics, and any other original works), is licensed under7 a Creative Commons Attribution-No Derivatives 3.0 license. 1 Kevin Werback bio, http://werbach.com/about.html 2 Supernova 07 Conference archive, http://conversationhub.com/category/supernova07/ 3 “Closing the Interactive Loop”, http://conversationhub.com/category/supernova07/ 4 ITConversations, http://itc.conversationsnetwork.org/ 5 “No Access To Internet Data”, Jun 2007, http://itc.conversationsnetwork.org/shows/detail3440.html 6 Legal Futures Conference, Mar 2008, http://www.law.stanford.edu/calendar/details/1594/ 7 Creative Commons Attribution-No Derivative 3.0, 2008, http://creativecommons.org/ licenses/by-nd/3.0/ 01 point one point two Science Foundation’s program for Internet secu- Another caveat: most security-related studies rity research13 spends ~$35M/year on dozens of are published or funded by companies trying to I. Updating legal frameworks to II. Our scientific knowledge about the research projects, none of which have data from sell more security software, their objectivity is Internet is weak, and the obstacles to accommodate technological ad- operational Internet infrastructure. also in dispute. Again, EOT factors render truth vancement requires first updating progress are primarily issues of econom- other legal frameworks to accommo- ics, ownership, and trust (EOT), rather elusive. date empirically grounded research than technical. C. Not only is traffic data off limits, but sharing into what we have built, how it is data on the structure of the network is forbid- point three used, and what it costs to sustain. Economically, network research is perpetually den too — commercial ISPs are typically not behind network evolution — basic instrumen- even allowed to disclose the existence of peer- III. Despite the methodological limi- tations of Internet science today, the \ tation can increase in cost 10X with one net- ing agreements, much less their terms. So when There is increasing recognition that various legal work upgrade, while network research budgets developing tools for accurate Internet mapping, few data points available suggest a dire picture: frameworks (from copyright to privacy to wire- are lucky to stay even. But the ownership and researchers cannot validate the connectivity tapping to common carriage) need updating in trust obstacles are even greater: policy support inferences they make, since the information is light of technological developments of the last for scientific Internet research has deteriorated typically intended to be secret. few decades. Unfortunately, the light is too dim 10 A. We’re running out of IPv4 addresses that can along several dimensions since the National 16 to really understand Internet behavior, usage 11 be allocated (there are Science Foundation left the scene in 1995 , and many allocated addresses patterns, architectural limitations, and econom- that are not in observed use17 , but there is no further when DARPA pulled out of funding ac- 18 ic constraints, because current legal frameworks 12 policy support (yet) for reclamation or reuse) , ademic networking research after 9/11 . Some 19 for network provisioning also prevent sharing of data points exposing the state of “Internet sci- and the purported technology solution ( IPv6 8 data with researchers to scientifically investigate ence”: ) requires investment that most ISPs are not pre- any of these questions. Even for data that is legal pared to make20. Regardless of whether Internet to share, there are overwhelming counter incen- A. Two decades of Internet research have failed growth is supported by IPv6 or a concerted ef- tives to sharing any data at all in the competi- to produce generally usable tools for band- fort to scrape more lifetime out of the current tive environment we have chosen — although width estimation, traffic modeling, usage char- IPv4 protocol, it will induce growth of core not achieved9 — for the network provisioning acterization, traffic matrix estimation, topol- Internet routing tables relying on a routing industry. ogy mapping, or realistic Internet simulation, system that is increasingly inappropriate for with progress primarily blocked on the ability the Internet’s evolving structure. So while it’s So while I support updating legal frameworks to test them out in realistic network and traffic fair to say that we need a new routing system21, to be congruent with reality, I think we need to scenarios. A few researchers who do manage to D. OECD published a 53-page report: Measur- no institution or agency has responsibility for first confront that we have no basis for claiming get data via relationships of mutual trust (in- ing security and trust in the online environment: developing one much less the global economic what reality is yet. 14 cluding CAIDA) are not allowed to share data a view using official data . As you may have and political challenge of deploying it. “no aphorism is more frequently repeated… with other researchers, inhibiting reproducibil- guessed by now, the report about ‘measuring se- than that we must ask Nature few questions, ity of any result. Compared to established fields curity’ is based on no measurements from any B. Pervasively distributed end-to-end peering or ideally, one question at a time. The writer is of science, it is hard to defend what happens in networks, only survey data reflecting user per- to exchange information is not only threatening convinced that this view is wholly mistaken. the field of Internet research as science at all. ceptions of their own security, which other stud- the integrity of the routing system, but also the ies15 have shown to be uncorrelated with reality. 22. Although it bears Nature, he suggests, will best respond to a logi- B. U.S. (and other) government agencies con- business models of the ISPs cally and carefully thought out questionnaire; tinue to spend hundreds of millions of dollars indeed if we ask her a single question, she will per year on network research — with cyber se- 13 NSF Trusted Computing program, http://www.nsf.gov/funding/pgm_summ.jsp?pims_ often refuse to answer until some other topic curity research being the most fashionable this id=503326&org=NSF has been discussed.” Sir Ronald A. Fisher, 14 Measuring Security and Trust in the Online Environment, Jan 2008, http://www.oecd.org/ decade — funding researchers who almost nev- dataoecd/47/18/40009578.pdf Perspectives in Medicine and Biol- er have any data from realistic operational net- 15 McAfee/NCSA Cyber Security Survey, Oct 2007, http://download.mcafee.com/products/manuals/en- , 1973. ogy works. An illustrative example: the National us/McAfeeNCSA_Analysis09-25-07.pdf 16 ANT Censuses of the Internet Address Space, Jun 2008, http://www.isi.edu/ant/address/ 17 Mapping The IPV4 Address Space, Mar 2008, http://maps.measurement-factory.com/ 8 “Toward a Culture of Cybersecurity Research”, 2008, http://papers.ssrn.com/sol3/papers. 18 ARIN’s Number Resource Policy Manual, Aug 2008, http://www.arin.net/policy/nrpm.html#eight1
Recommended publications
  • D10.3: Description of Internet Science Curriculum
    D10.3: Description of Internet Science Curriculum Sorana Cimpan, Kavé Salamatian, Thomas Plagemann, Meryem Marzouki, Žiga Turk, Jonathan Cave, Tamas David-Barrett, Marco Prandini To cite this version: Sorana Cimpan, Kavé Salamatian, Thomas Plagemann, Meryem Marzouki, Žiga Turk, et al.. D10.3: Description of Internet Science Curriculum. [Research Report] European Commission. 2014. hal- 01222260 HAL Id: hal-01222260 https://hal.archives-ouvertes.fr/hal-01222260 Submitted on 12 Apr 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives| 4.0 International License Description of Internet Science Curriculum ICT - Information and Communication Technologies FP7-288021 Network of Excellence in Internet Science D10.3: DESCRIPTION OF INTERNET SCIENCE CURRICULUM Due Date of Deliverable: 31/05/2014 Actual Submission Date: 12/07/2014 Revision: FINAL Start date of project: December 1st 2011 Duration: 42 months Organisation name of lead contractor for this deliverable: UoS Authors: Sorana
    [Show full text]
  • Network Science, Web Science and Internet Science: Comparing Interdisciplinary Areas
    Network Science, Web Science and Internet Science: comparing interdisciplinary areas Thanassis Tiropanis1, Wendy Hall1, Jon Crowcroft2, Noshir Contractor3, Leandros Tassiulas4 1 University of Southampton 2 University of Cambridge 3 Northwestern University 4 University of Thessaly ABSTRACT In this paper, we examine the fields of Network Science, Web Science and Internet Science. All three areas are interdisciplinary, and since the Web is based on the Internet, and both the Web and the Internet are networks, there is perhaps confusion about the relationship between them. We study the extent of overlap and ask whether one includes the others, or whether they are all part of the same larger domain. This paper provides an account of the emergence of each of these areas and outlines a framework for comparison. Based on this framework, we discuss these overlaps and propose directions for harmonization of research activities. INTRODUCTION The observation of patterns that characterise networks, from biological to technological and social, and the impact of the Web and the Internet on society and business have motivated interdisciplinary research to advance our understanding of these systems. Their study has been the subject of Network Science research for a number of years. However, more recently we have witnessed the emergence of two new interdisciplinary areas: Web Science and Internet Science. Network Science Network science can be traced to its mathematical origins dating back to Leonard Euler’s seminal work on graph theory (Euler, 1741) in the 18th century and to its social scientific origins two centuries later by the psychiatrist Jacob Moreno’s (1953) efforts to develop “sociometry.” Soon thereafter, the mathematical framework offered by graph theory was also picked up by psychologists (Bavelas, 1950), anthropologists (Mitchell, 1956), and other social scientists to create an interdiscipline called Social Networks.
    [Show full text]
  • Downloading a Webpage
    UCLA UCLA Electronic Theses and Dissertations Title Time Constructs: The Origins of a Future Internet Permalink https://escholarship.org/uc/item/133926p6 Author Paris, Britt Publication Date 2018 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Time Constructs: The Origins of a Future Internet A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Information Studies by Brittany Paris 2018 © Copyright by Brittany Paris 2018 ABSTRACT OF THE DISSERTATION Time Constructs: The Origins of a Future Internet by Brittany Paris Doctor of Philosophy in Information Studies University of California, Los Angeles, 2018 Professor Leah A. Lievrouw, Chair Technological time has been a topic of much theorization and dread, as both intellectuals and laypeople fear that human life is increasingly becoming secondary to the technological world. Feelings of despair and nihilism, perhaps attributable to social, political and economic upheavals brought by the synchronization of human life with technology, have been theorized by numerous scholars in a plethora of overlapping disciplines. What is left undertheorized is how technology develops in ways that might or might not actually foster these sensations of synchronicity, or speed. Technological development includes patterns of social coordination and consumption, as well as individual use and goals, that all relate to a sense of lived time. But what of the ways that technical design fosters these relations? What is the discourse of time in technological projects? This dissertation investigates the aforementioned questions in the context of NSF-funded Future Internet Architecture (FIA) projects—Named Data Networking (NDN), eXpressive Internet Architecture (XIA), and Mobility First (MF)—which are currently underway.
    [Show full text]
  • 2016 Conference Report
    2016 Conference Report www.igf-usa.org #igfusa2016 Table of Contents About the 2016 IGF-USA ........................................................................................................................................ 2 Key Metrics ................................................................................................................................................................ 3 Sessions ....................................................................................................................................................................... 4 Opening Plenary: Beyond Mere Access To Enhanced Connectivity For the Next Billion Online ............... 4 Session Report ....................................................................................................................................................................... 5 Morning Breakout Sessions .................................................................................................................................. 9 Expanding Access, Adoption, And Digital Literacy Through Technology And Local Solutions .................. 9 Session Report .................................................................................................................................................................... 10 Content and Conduct: Countering Violent Extremism and Promoting Human Rights Online ................. 12 Session Report ...................................................................................................................................................................
    [Show full text]
  • Travelbehavior.Com Activity Approaches to Modeling the Effects of Information Technology on Personal Travel Behavior
    TRAVELBEHAVIOR.COM ACTIVITY APPROACHES TO MODELING THE EFFECTS OF INFORMATION TECHNOLOGY ON PERSONAL TRAVEL BEHAVIOR Thomas F. Golob Institute of Transportation Studies University of California Irvine, California 92697-3600 USA 1. OBJECTIVES This paper puts forth some ideas for extending travel behavior modeling to account for interactions between travel and telecommunications. Information technology (IT, sometimes referred to as communications and information technology, or CIT) is burgeoning, providing unlimited business opportunities for entrepreneurs to develop and sell IT products and services. While most of these products and services are not specifically designed to affect travel behavior, they do, often in subtle and unexpected ways. The connectivity of the Internet and the proliferation of capable and affordable home computers and communication devices have encouraged flexible work arrangements and made e-commerce the fastest growing sector of most western economies. For many people, the home has become a viable site for the conduct of certain activities that formerly could only be conducted at non-home locations. In addition, cellular telephones and other portable computer and communications devices have redefined our ability to conduct business and dynamically schedule activities while traveling or at locations away from home or workplace. The wave of technological advances that brought us the Internet, mobile phone, and personal digital assistants (PDA’s) is not slowing down. The future will bring a next-generation Internet with higher speed, multimedia capability and intelligent agent technology. It will be accessible by both PC’s and “Internet appliances” such as television set-top boxes, videogame consoles and smart handheld devices. Accessibility can no longer be measured only in terms of travel time, distance or generalized travel cost.
    [Show full text]
  • ANDREA M. MATWYSHYN [email protected] @Amatwyshyn
    ANDREA M. MATWYSHYN [email protected] https://www.amatwyshyn.com @amatwyshyn Research: Technology policy and law (specifically information security/“cybersecurity” and privacy law, workforce creation policy), the “Internet of Things,” the “Internet of Bodies” and consumer protection (legal and policy implications of body-attached/embedded devices), “artificial intelligence”/machine learning and software liability, digital copyright, and cryptocurrency/ICO/ blockchain regulation Teaching: Internet law, information law (information security/“cybersecurity” and privacy law), introduction to intellectual property, secured transactions, corporations/business associations, securities regulation, contracts I. EDUCATION ............................................................................................................................... 1 II. EMPLOYMENT ........................................................................................................................... 2 III. PUBLICATIONS ......................................................................................................................... 6 IV. COURSES TAUGHT ................................................................................................................. 11 V. COMMITTEES AND SERVICE ............................................................................................... 13 VI. SELECTED KEYNOTES AND PRESENTATIONS ............................................................... 14 VII. CONGRESSIONAL TESTIMONY AND OTHER GOVERNMENT SERVICE
    [Show full text]
  • BY Kathleen Stansberry, Janna Anderson and Lee Rainie
    FOR RELEASE OCTOBER 28, 2019 BY Kathleen Stansberry, Janna Anderson and Lee Rainie FOR MEDIA OR OTHER INQUIRIES: Lee Rainie, Director, Internet and Technology Research Kathleen Stansberry, Elon’s Imagining the Internet Center Shawnee Cohn, Communications Manager 202.419.4372 www.pewresearch.org RECOMMENDED CITATION Pew Research Center, October 2019, “Experts Optimistic About the Next 50 Years of Digital Life” 1 PEW RESEARCH CENTER About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It does not take policy positions. It conducts public opinion polling, demographic research, content analysis and other data-driven social science research. The Center studies U.S. politics and policy; journalism and media; internet, science and technology; religion and public life; Hispanic trends; global attitudes and trends; and U.S. social and demographic trends. All of the center’s reports are available at www.pewresearch.org. Pew Research Center is a subsidiary of The Pew Charitable Trusts, its primary funder. For this project, Pew Research Center worked with Elon University’s Imagining the Internet Center, which helped conceive the research and collect and analyze the data. © Pew Research Center 2019 www.pewresearch.org 2 PEW RESEARCH CENTER Experts Are Optimistic About the Next 50 Years of Life Online The year 1969 was a pivot point in culture, science and technology. On Jan. 30, the Beatles played their last show. On July 20, the world watched in awe as Neil Armstrong and Edwin “Buzz” Aldrin become the first humans to walk on the moon.
    [Show full text]
  • Community Connectivity: Building the Internet from Scratch
    Community Connectivity: Building the Internet from Scratch Annual Report of the UN IGF Dynamic Coalition on Community Connectivity Edition produced by FGV Direito Rio Praia de Botafogo, 190 | 13th floor Rio de Janeiro | RJ | Brasil | Zip code: 22250-900 55 (21) 3799-5445 www.fgv.br/direitorio Community Connectivity: Building the Internet from Scratch Annual Report of the UN IGF Dynamic Coalition on Community Connectivity Edited by Luca Belli Preface by Bob Frankston FGV Direito Rio Edition Licensed in Creative Commons Attribution – NonCommercial - NoDerivs Printed in Brazil 1st edition finalized in 2016, December This book was approved by the Editorial Board of FGV Direito Rio, and is in the Legal Deposit Division of the National Library. The opinions expressed in this work are the responsibility of the authors. Coordination: Rodrigo Vianna, Sérgio França e Thaís Mesquita Book cover: S2 Books Layout: S2 Books Reviewer: Luca Belli Catalographic card prepared by Mario Henrique Simonsen Library / FGV Community connectivity : building the Internet from scratch : annual report of the UN IGF Dynamic Coalition on Community Connectivity / Edited by Luca Belli ; preface by Bob Frankston. – Rio de Janeiro : FGV Direito Rio, 2016. 203 p. ISBN: 9788563265753 Internet - Administration, Computer networks, Social Aspects I. Belli, Luca. II. Internet Governance Forum. III. Dynamic Coalition on Commu- nity Connectivity. IV. Escola de Direito do Rio de Janeiro da Fundação Getulio Vargas. V. Título: Community Connectivity: Building the Internet from Scratch.
    [Show full text]
  • INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick Mckelvey
    INTERNET DAEMONS ELECTRONIC MEDIATIONS Series Editors: N. Katherine Hayles, Peter Krapp, Rita Raley, and Samuel Weber Founding Editor: Mark Poster 56 INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick McKelvey 55 WHAT IS INFORMATION? Peter Janich 54 DECONSTRUCTION MACHINES: WRITING IN THE AGE OF CYBERWAR Justin Joque 53 METAGAMING: PLAYING, COMPETING, SPECTATING, CHEATING, TRADING, MAKING, AND BREAKING VIDEOGAMES Stephanie Boluk and Patrick LeMieux 52 THE PERVERSITY OF THINGS: HUGO GERNSBACK ON MEDIA, TINKERING, AND SCIENTIFICTION Hugo Gernsback, Edited by Grant Wythoff 51 THE PARTICIPATORY CONDITION IN THE DIGITAL AGE Darin Barney, Gabriella Coleman, Christine Ross, Jonathan Sterne, and Tamar Tembeck, Editors 50 MIXED REALISM: VIDEOGAMES AND THE VIOLENCE OF FICTION Timothy J. Welsh 49 PROGRAM EARTH: ENVIRONMENTAL SENSING TECHNOLOGY AND THE MAKING OF A COMPUTATIONAL PLANET Jennifer Gabrys 48 ON THE EXISTENCE OF DIGITAL OBJECTS Yuk Hui 47 HOW TO TALK ABOUT VIDEOGAMES Ian Bogost 46 A GEOLOGY OF MEDIA Jussi Parikka 45 WORLD PROJECTS: GLOBAL INFORMATION BEFORE WORLD WAR I Markus Krajewski 44 READING WRITING INTERFACES: FROM THE DIGITAL TO THE BOOKBOUND Lori Emerson 43 NAUMAN REITERATED Janet Kraynak 42 COMPARATIVE TEXTUAL MEDIA: TRANSFORMING THE HUMANITIES IN THE POSTPRINT ERA N. Katherine Hayles and Jessica Pressman, Editors (continued on page 321) INTERNET DAEMONS Digital Communications Possessed FENWICK McKELVEY Electronic Mediations 56 University of Minnesota Press Minneapolis London The University of Minnesota Press gratefully acknowledges the generous assis- tance provided for the open access version of this book by the Concordia Open Access Author Fund. Portions of chapter 7 were published in a different form in “Algorithmic Media Need Democratic Methods: Why Publics Matter,” Canadian Journal of Com- munication 39, no.
    [Show full text]
  • Role of Internet in Dissemination of Information
    ROLE OF INTERNET IN DISSEMINATION OF INFORMATION A select annotated bibliography DISSERTATION SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF Musittv of Hibrarp & Snformation ^titntt 1996-97 BY SHADAN UDDIN Sell. No. 96 LSM - 04 Eiir*l. No. Y - 3139 UNDER THE SUPERVISION OF Prof. Shabahat Husain CHAIRMAN DEPARTMENT OF LIBRARY 8c INFORMATION SCIENCE ALIGARH MUSLIM UNIVERSITY ALIGARH (INDIA) S^* ^ ^ - DS3008 *io i Phone : ( 0571 ) 400039 Tehx : 564—230 AMU IN Fax .-91-0571-400523 DEPARTMENT OF LIBRARY & INFORMATION SCIENCE ALIGARH MUSLIM UNIVERSITY, ALIGARH-202002 (U.P ), INDIA ^o /7^//.wQr.+r>ho-p n^, 10 07 This is to certify that the M.L. 8. I.Sc.' dissertation of Ms. Shadan Uddin on *Role of INTERNET in dissemination of information: A select annotated bibliography* was compiled under my supervision and guidance. "lA-L. (Prof. Shabahat Husain) CONTENTS ACKNOVJLEDGEMENT 1-11 • • • « • SCOPE AND METHODOLOGY lll-Vll PART I 1. C0NCEPT:0E INTERNET 1-4 2. HISTORY OE INTERNET 5 3. INEORMATION HIGHWAY AND INTERNET 6-8 4. SOME TOOLS AND UTILITIES OF THE INTERNET 8-16 5. ROLE OF INTERNET IN THE DISSEMINATION OF 17-21 INFORMATION 6. WER ADDRESSES AND HOME PAGES 22-25 7. INTERNET FOR LIBRARIES AND LTBRAIANS 26-29 8. INTERNET FOR DEVELOPMENT WITH REFERENCE 30-34 TO INDIA 9. INTERNET IN INDIA 35-36 10. THE FUTURE OF THE INTERNET 36-38 11. INTERNET SECURITY AND CENSORSHIP 39-40 12. CONCLUSION 41-42 13. SOME WEB ADDRESSES 43-51 PART II 1. BIBLIOGRAPHY 52-158 PART Til 1. LIST OF SUBJECT HEADINGS 159-165 2.
    [Show full text]
  • Secrecy Versus Openness — Internet Security and the Limits of Open
    SECRECY VERSUS OPENNESS Internet security and the limits of open source and peer production Andreas Schmidt Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal inter- action more open, more social, and more democratic. However, we also need to be mindful of the limits of these models. How could they function in environments hostile to openness? Security is a societal domain more prone to secrecy than any other, except perhaps for romantic love. In light of the destructive capacity of contemporary cyber attacks, how has the Internet survived without a comprehensive security infrastructure? Secrecy versus Openness describes the realities of Internet security production through the lenses of open source and peer production theories. The study offers a glimpse into the fascinating communities of technical experts, who played a pivotal role when the chips were down for the Internet after large-scale attacks. After an initial flirtation with openness in the early years, operational Internet security communities have put in place a form of social production that resembles the open source model in many aspects, but is substantially less open. ISBN 978-90-8891-988-6 Image Copyright Rafal Olbinski, Courtesy Patinae, Inc. www.patinae.com SECRECY VERSUS OPENNESS Internet security and the limits of open source and peer production Proefschrift ter verkrijging van de graad van doctor aan de Technische Universiteit Delft, op gezag van de Rector Magnificus prof. ir. K.C.A.M.
    [Show full text]
  • Representation and Legitimacy in Internet Governance
    University of Pennsylvania ScholarlyCommons Center for Global Communication Studies Internet Policy Observatory (CGCS) 2-2014 Finding a Formula for Brazil: Representation and Legitimacy in Internet Governance Milton Mueller Ben Wagner Follow this and additional works at: https://repository.upenn.edu/internetpolicyobservatory Part of the Communication Commons Recommended Citation Mueller, Milton and Wagner, Ben. (2014). Finding a Formula for Brazil: Representation and Legitimacy in Internet Governance. Internet Policy Observatory. Retrieved from https://repository.upenn.edu/internetpolicyobservatory/1 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/internetpolicyobservatory/1 For more information, please contact [email protected]. Finding a Formula for Brazil: Representation and Legitimacy in Internet Governance Abstract In the summer of 2013, Edward Snowden’s extraordinary leaks about U.S. National Security Agency (NSA) surveillance destabilized the foundations of international Internet governance. Speaking at the UN General Assembly on September 24, 2013, Brazilian President Dilma Rousseff denounced NSA spying in the strongest terms, and, together with ICANN, started planning conference in Sao Paulo in April 2014 to reinvent Internet governance. This article analyses these events and tries to make sense of what they might mean for the future of global Internet governance. It begins by looking at how the Brazil-ICANN initiative alters the political alignment of actors in the world. Second, it places these developments into a longer historical context, showing how it echoes recurring attempts to develop legitimacy and principles for Internet governance. Third, it applies critical political analysis to the process of organizing and managing the summit itself, with a particular focus on legitimacy and representation.
    [Show full text]