THE STATE of INTERNET SHUTDOWNS AROUND the WORLD the 2018 #KEEPITON REPORT the #Keepiton Campaign Unites and Organizes the Global Effort to End Internet Shutdowns

Total Page:16

File Type:pdf, Size:1020Kb

THE STATE of INTERNET SHUTDOWNS AROUND the WORLD the 2018 #KEEPITON REPORT the #Keepiton Campaign Unites and Organizes the Global Effort to End Internet Shutdowns 01 THE #KEEPITON REPORT 2018 THE STATE OF INTERNET SHUTDOWNS AROUND THE WORLD THE 2018 #KEEPITON REPORT The #KeepItOn campaign unites and organizes the global effort to end internet shutdowns. The coalition is growing rapidly, and so far 191 organizations from 68 countries around the world, ranging from research centers to rights and advocacy groups, detection networks, foundations, and media organizations, have joined the movement. This report is a publication of Access Now for the #KeepItOn coalition and was written by Berhan Taye with the collaboration of Access Now’s team. The author would like to specially thank Peter Micek, Melody Patry, Donna Wentworth, Gustaf Björksten, Akash Singh, and Sage Cheng for their contributions. Overview The 2018 internet shutdown trends “When the shooting and looting happened in Jijiga, we wanted to get more information about what was happening, we wanted to share with the world that we have been victims. We were not able do that The number of internet Official justifications vs. because they cut off the internet. We couldn’t leave our house, we can hear gun shots and people shutdowns worldwide actual causes of internet screaming. We had to call people in Addis Ababa 600 km away to find out what was happening in our city.” is on the rise shutdowns in 2018 — Anonymous, Ethiopia, April 2018 196 Official Actual 106 Political Instability 75 196 Public Safety Documented shutdowns in 2018 Protest 2016 2017 2018 25 National Security Communal Countries Violence Most affected regions More people are Fake News/ Other Hate Speech pushing back Elections Asia 191 68 Unknown Information Control Exam Cheating #KeepItOn countries School Exams Sabotage/ Africa coalition members worldwide Third-party Action Unknown * Data from the Shutdown Tracker Optimization Project (STOP) 2016-2018 Table of Contents 1. Introduction: internet shutdowns in 2018 2 1.1 What is an internet shutdown? 2 2. Governments continue to normalize shutdowns 3 2.1 Governments rarely acknowledge shutdowns 3 2.2 When they do, they use umbrella terms to justify shutdowns despite details and nuances of what actually happened 3 2.3 Increased shutdowns to “fight ‘fake news,’ hate speech, and related violence” 6 3. Governments continue using shutdown as a measure in critical events 6 3.1 Elections 6 3.2 Protests 7 3.3 Cheating during school exams 7 4. Who from the government orders shutdowns? Who’s affected? 8 4.1 Shutdown orders and scope 8 4.2 Grounds for shutdowns 10 5. Anatomy of shutdowns 11 5.1 Bandwidth throttling 11 5.2 Broadband internet shutdowns 12 5.3 Mobile internet shutdowns 12 5.4 “Internet blackouts” or blanket internet shutdowns 13 5.5 Mobile phone call and text message network shutdowns 13 5.6 Service-specific (platform) shutdown 13 6. Human rights violations during shutdowns? 13 7. Challenging shutdowns from global governmental and industry bodies 14 8. Challenging shutdowns on legal grounds 15 9. Circumventing and measuring shutdowns in 2018 15 THE STATE OF INTERNET SHUTDOWNS AROUND THE WORLD 2 3 THE #KEEPITON REPORT 2018 1.1 passed a series of important resolutions[5] to of expression. At the same time, members of the 1. Introduction: condemn shutdowns and caution states against global #KeepitOn coalition have been working What is an internet shutdown? imposing them. together to help internet shutdowns victims gather An internet shutdown can be defined as an Shutdowns are Notably, in a variety of cases, technical evidence in 2018 “intentional disruption of internet or electronic ordered under a of shutdowns and communications, rendering them inaccessible or variety of state governments never publicly in some cases, effectively unusable, for a specific population or structures. Typically, In 2018, the global #KeepItOn coalition [1] acknowledge that they are also helping them within a location, often to exert control over the the orders come from to circumvent the documented more than 196[2] internet shutdowns [3] flow of information.” They include blocks of authorities in local around the world. Just as it has been since 2015, responsible for a shutdown. shutdowns. social media platforms, and are also referred to as governments, state/ India was responsible for the majority: 67% of “blackouts,” “kill switches,” or “network disruptions.” the world’s documented shutdowns took place in regional governments, the judiciary, and executive Importantly, the community that dedicates its bodies of governments. The entity that orders a invaluable time to fighting shutdowns continues India in 2018, with 134 incidents. The remaining In Access Now’s work documenting shutdowns 33% took place in a diverse range of countries: shutdown can impact the scope and effect of the to grow and diversify. There are now civil society in 2018 and in this report, we identify the key shutdown. The geographic reach of a shutdown coalition members from more than 68 countries Algeria, Bangladesh, Cameroon, Chad, Côte d’Ivoire, trends that defined shutdowns and show the Democratic Republic Congo, Ethiopia, Indonesia, could extend beyond a country’s borders, or be working to keep the internet on, all across the globe. nature and official rationales for shutdowns in as localized as a few cellular towers on a protest Iraq, Kazakhstan, Mali, Nicaragua, Nigeria, Pakistan, the year. Perpetrators of internet shutdowns Philippines, and Russia. route. Some countries have legislation that historically use similar justifications for ordering facilitates and legitimizes shutdowns, while others shutdowns, but these justifications rarely match issue arbitrary orders that are not necessarily 2. Governments 2018 number of internet shutdowns by country what observers can conclude is the real grounded in or supported by law. motivation. This year the official rationales have continue to normalize included combating “fake news” (properly called In ordering shutdowns, government authorities disinformation and misinformation), hate speech, shutdowns 12 employ a range of tactics to support specific goals and related violence, securing public safety and in a particular context. A government might use national security, precautionary measures, and bandwidth throttling to slow internet access, or 2.1 134 Pakistan preventing cheating during exams, among others. alternate between shutting down mobile internet Governments rarely acknowledge 7 and cutting broadband service internet together, shutdowns 6 Whether they are ordered in Ethiopia, Chad, or it may block specific apps and services, such as 7 Venezuela, or India, and whether they are justified social media or messaging services. Notably, in Out of the more than 200 incidents of Yemen Ethiopia as a measure to fight “fake news” and hate a veriety of cases, governments never publicly shutdowns reported in 2018, only 77 were 5 India Iraq speech or to stop cheating during exams, the acknowledge that they are responsible for a acknowledged by the government or entities facts remain the same: internet shutdowns violate Bangladesh 3 2 shutdown. That shifts the burden of proof to that ordered the shutdowns. human rights, put people in danger, and harm the 2 Mali the victims, making it harder to push back or DR Congo economy. Internet shutdowns curtail freedom 2 Chad seek redress for harm done. That is all the more 2.2 Russia 1 2 of expression, cut access to information, and can troubling because there appears to be a correlation 1 Algeria Philippines inhibit people from assembling and associating When they do, they use umbrella 1 Indonesia between suspension of the internet and human 1 Cameroon 1 peacefully, online and off. In addition, during Côte d'Ivoire rights violations that take place in the dark. terms to justify shutdowns 1 Nicaragua shutdowns, many victims are unable to reach their 1 Kazakhstan 1 families, get accurate information to stay safe, or despite details and nuances of Nigeria 1 The good news is that the increased global 1 SouthKorea SriLanka reach emergency services. Shutdowns disrupt spotlight on internet shutdowns appears to what actually happened SierraLeone 1 businesses, schools, and ordinary lives, often 1 Sudan making an impact. Even though there were [4] When governments shut down the internet, 1 Syria exacting a significant financial cost . The United more documented shutdowns in 2018 than we Togo 1 Nations and other intergovernmental bodies have whether through a memo, directive, or just a phone Turkey recorded in previous years, there were also call, authorities will sometimes provide the public [1] #Keepiton, Access Now, 2019, https://www.accessnow.org/keepiton/ more documented court challenges to stop with some form of public rationale or justification. them. Public interest lawyers, activists, ordinary [2] The number of shutdowns in 2018 is estimated to be more than 196. This number indicates only the incidents we The most common justifications cited in 2018, as have been able to verify and confirm through our partners on the ground and via the media. It is highly likely that the citizens, and civil society groups have been forcing shown below: public safety, “fake news” (which as number of shutdowns is much higher than what we have documented. telcos, communications regulators, and others we have noted, is properly called disinformation [3] This definition was developed at RightsCon Brussels in 2016 in collaboration with a diverse set of stakeholders including to defend network disruptions in court, asserting or misinformation) or hate speech and related technologists, policy makers, activists, and others. Read more: https://www.accessnow.org/no-internet-shutdowns-lets-keepiton/ the rights to access to information and freedom violence, national security, and school exams. [4] West, D. Internet shutdowns cost countries $2.4 billion last year, Brookings, 2016. Available at: https://www.brookings.edu/wp- content/uploads/2016/10/intenet-shutdowns-v-3.pdf [5] See page 14. THE STATE OF INTERNET SHUTDOWNS AROUND THE WORLD 4 5 THE #KEEPITON REPORT 2018 Observation can reveal more information for region in India), elections, during communal violence, It is rare for government justifications to match the whether online or off.
Recommended publications
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • NET NEUTRALITY Work Operator
    Database NET NEUTRALITY work operator. In October 2007, Comcast was ac- cused of secretly deploying filtering technologies to manage its network in order to keep some peer-to- Net neutrality denotes the neutral transmission of peer traffic from overloading its network and hence data via the Internet, i.e., every packet of data, affecting the accessing speeds of its other Internet regardless of its content, origin and the application subscribers. The FCC deemed it unreasonable for that created it, is treated the same way and the best Comcast to discriminate against particular Internet effort should always be made to forward it.This con- applications and not to disclose its practice ade- cept is often regarded as a fundamental characteris- quately to its customers and therefore ruled against tic of the Internet. However, the amount of data that Comcast’s practices of throttling Internet traffic and is transported via the Internet is increasing rapidly, delaying peer-to-peer traffic. Comcast appealed to especially because of applications like music and vi- the US Court of Appeals, claiming that no legally deo downloads, Internet TV,and Internet telephony. enforceable standards or rules on the matter existed. All these applications require large capacities. This In April 2010 the federal appeals court ruled that the may lead to a capacity overload and delays of data FCC had limited power over Internet traffic under transmissions.The current technological state allows current law. This decision allows network operators for assigning different priorities to different data to block or slow specific sites and charge sites to packets. Therefore, the discussion has emerged deliver their content faster to users.
    [Show full text]
  • Never Agains IV February 2010
    the Availability Digest www.availabilitydigest.com More Never Agains IV February 2010 It is once again time to reflect on the damage that IT systems can inflict on us mere humans. We have come a long way in ensuring the high availability of our data-processing systems. But as the following stories show, we still have a ways to go. During the last six months, hardware/software and network faults shared responsibility, each causing about one-third of the outages. The rest of the outages were caused by a variety of problems such as power failures, construction mishaps, and hacking. Rackspace Hit with Another Outage Techcrunch, June 20, 2009 – On June 20, Rackspace suffered yet another outage1 due to a power failure. The breaker on the primary utility feed powering one of its nine data centers tripped, causing data center’s generators to start up. However, a field excitation failure escalated to the point that the generators became overloaded. An attempt by Rackspace to fail over to its secondary utility feed failed because the transfer switch malfunctioned. When the data center’s batteries ran out, the data center went down. Failovers do fail. Have a contingency plan no matter the extent of your redundancy. NYSE Suffers Several Outages in Less Than a Month Reuters, July 2, 2009 – On Thursday morning, July 2, brokers on the floor of the New York Stock Exchange found that they could not route orders, causing the NYSE to halt trading in some stocks and to extend the trading day. During the previous month, a software glitch halted trading; and an order-matching problem affected timely order reconciliation.
    [Show full text]
  • Availability Digest
    the Availability Digest www.availabilitydigest.com Help! My Data Center is Down! Part 3: Internet Outages December 2011 Long gone are the days of the isolated data center. Back then, batch jobs were submitted to update databases and to generate reports. Back then, turn-around times were measured in hours or even days. In today’s competitive environment, IT services are online; and instant response times are expected. What good is a data center if no one can talk to it? Orders can’t be placed or tracked. Medical records can’t be accessed. Online banking comes to a halt. Today’s data centers must be connected. They depend upon the networks that allow users to access them online reliably and with fast response times. In the old days, a company had control over its communication network. It leased lines that it used exclusively for its purposes. If it lost communications, it had direct access to its communication carrier for rapid repair. For critical applications, companies installed redundant communication facilities so that they could continue in operation even in the presence of a communications failure on one of their lines. Not so true today. More and more, companies are relying on the public Internet to connect their users with company data centers. But how reliable is the Internet? In our previous articles in this series, we related horror stories of unimaginable power failures and storage failures that took down the best-designed data centers. In this article, we explore some notable Internet failures that rendered data centers useless even though they were otherwise fully operational.
    [Show full text]
  • Potential Human Cost of Cyber Operations
    ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS REPORT ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Report prepared and edited by Laurent Gisel, senior legal adviser, and Lukasz Olejnik, scientific adviser on cyber, ICRC THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Table of Contents Foreword............................................................................................................................................. 3 Acknowledgements ............................................................................................................................. 4 Executive summary ............................................................................................................................. 5 Introduction....................................................................................................................................... 10 Session 1: Cyber operations in practice .………………………………………………………………………….….11 A. Understanding cyber operations with the cyber kill chain model ...................................................... 11 B. Operational purpose ................................................................................................................. 11 C. Trusted systems and software supply chain attacks ...................................................................... 13 D. Cyber capabilities and exploits ..................................................................................................
    [Show full text]
  • AB 1699 Page 1
    AB 1699 Page 1 Date of Hearing: April 30, 2019 ASSEMBLY COMMITTEE ON PRIVACY AND CONSUMER PROTECTION Ed Chau, Chair AB 1699 (Levine) – As Amended April 22, 2019 SUBJECT: Telecommunications: public safety customer accounts: states of emergency SUMMARY: This bill would prohibit, among other things, a mobile internet service provider (ISP) from impairing or degrading the lawful internet traffic of its public safety customer accounts, subject to reasonable network management, as specified, during a state of emergency declared by the President or the Governor, or upon the declaration of a local emergency by an official, board, or other governing body vested with authority to make such a declaration in any city, county, or city and county. This bill would state that the Legislature finds and declares that this bill is adopted pursuant to the police power granted to the State of California under the United States Constitution and cannot be preempted by the Federal Communications Commission (FCC), and that the bill ensures police and emergency services personnel have access to all of the resources necessary for them to operate effectively during a state of emergency. EXISTING LAW: 1) Declares it unlawful for a fixed or mobile ISP, insofar as the provider is engaged in providing fixed broadband internet access service, to engage in certain activities, including, among other things: Blocking lawful content, applications, services, or nonharmful devices, subject to reasonable network management. Impairing or degrading lawful internet traffic on the basis of internet content, application, or service, or use of a nonharmful device, subject to reasonable network management. Unreasonably interfering with, or unreasonably disadvantaging, either an end user’s ability to select, access, and use broadband internet access service or the lawful internet content, applications, services, or devices of the end user’s choice, or an edge provider’s ability to make lawful content, applications, services, or devices available to end users, subject to reasonable network management.
    [Show full text]
  • Zscaler Bandwidth Control Ensures Your Mission-Critical Applications, Like Office 365, Don’T Take a Back Seat to Youtube, OS Updates, and Streaming Content
    DATA SHEET Zscaler™ Bandwidth Control Prioritize business applications over recreational traffic Zscaler Bandwidth Control ensures your mission-critical applications, like Office 365, don’t take a back seat to YouTube, OS updates, and streaming content. The challenge of managing bandwidth in a UTM/Firewall Appliance Sprawl cloud world Leading organizations are moving toward local Internet breakouts to ensure a fast user experience and realize the full agility and cost-saving benefits of the cloud. With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, Spotify, and other recreational traffic like live-streaming sporting events. One way to route traffic locally and police bandwidth is to deploy next- generation firewalls or UTM appliances in each location, but this approach creates costly, unmanageable appliance sprawl. User experience also HQ DATA CENTER suffers with an appliance-based approach because appliances are not designed for bandwidth shaping and will drop packets and interrupt streaming video. And, because this approach is implemented in the last mile, instead of the cloud, the enterprise itself remains vulnerable to bottlenecks and bandwidth contention. Break Free with Zscaler A better approach: Zscaler Bandwidth Control With the majority of your users and applications in the cloud, and most of your traffic now bound for the Internet, it makes sense to move your security and controls to the cloud, too. By implementing Zscaler Bandwidth Control — part of the Zscaler Cloud Security Platform — you can route traffic locally to the Internet, providing great performance and the same level of protection for all users, across all locations.
    [Show full text]
  • No Internet? February 2008
    the Availability Digest What? No Internet? February 2008 On Wednesday, January 30, 2008, North Africa, the Middle East, and India experienced a massive Internet outage that was destined to last for several days or even weeks.1 How did this happen? How did companies cope? Could it happen in other areas such as Europe or the United States? The Failure The bulk of data traffic from North Africa, from the Middle Eastern countries, and from India and Pakistan is routed through North Africa. There, it is carried by a set of three submarine cables that lie under the Mediterranean Sea. The cables link Alexandria, Egypt, with Palermo, Italy, where the traffic then moves on to Europe, the UK, and the Eastern United States. On January 30, 2008, two of these three cables were severed. It is not yet known why, but the predominant theory is that the cables were severed by the anchor of a huge freighter. Heavy storms had hit the area the previous day and forced Egyptian authorities to close the northern entrance to the Suez Canal at Alexandria. As a result, ships had to anchor offshore in the Mediterranean Sea, dropping their anchors to ride out the storm. It is suspected that one of the freighters dropped its anchor on top of the cables. Reportedly, the two severed cables were a kilometer apart. The storm may have dragged the freighter’s anchor across the sea bed, thus taking out both cables. The result of this catastrophe was that 75% of channel capacity was lost from the Mideast to Europe and beyond.
    [Show full text]
  • FCC Jurisdiction Over ISPS in Protocol-Specific Bandwidth Throttling Andrew Gioia University of Michigan Law School
    Michigan Telecommunications and Technology Law Review Volume 15 | Issue 2 2009 FCC Jurisdiction over ISPS in Protocol-Specific Bandwidth Throttling Andrew Gioia University of Michigan Law School Follow this and additional works at: http://repository.law.umich.edu/mttlr Part of the Administrative Law Commons, Communications Law Commons, and the Internet Law Commons Recommended Citation Andrew Gioia, FCC Jurisdiction over ISPS in Protocol-Specific Bandwidth Throttling, 15 Mich. Telecomm. & Tech. L. Rev. 517 (2009). Available at: http://repository.law.umich.edu/mttlr/vol15/iss2/7 This Note is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Telecommunications and Technology Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. NOTE FCC JURISDICTION OVER ISPS IN PROTOCOL-SPECIFIC BANDWIDTH THROTTLING Andrew Gioia* Cite as: Andrew Gioia, FCC Jurisdictionover ISPs in Protocol-SpecificBandwidth Throttling, 15 MICH. TELECOMM. TECH. L. REV. 517 (2009), available at http://www.mttlr.org/volfifteen/gioia.pdf I. INTRODUCTION ......................................................................... 518 I. TECHNICAL AND PROCEDURAL BACKGROUND ......................... 519 A . The BitTorrent Protocol..................................................... 519 B. Comcast's Protocol-SpecificDiscrimination Policy .......... 520 III. THE FCC
    [Show full text]
  • Oxygen-3 User Guide
    Oxygen-3 User Guide Model Oxygen-3 3066 Beta Avenue | Burnaby, B.C. | V5G 4K4 Sales: 1.877.985.2878 \ 604.294.4465 Revision Rev 1.9 Support: 1.844.462.9773 \ 778.462.9773 [email protected] Firmware Rev 5.0 Revision Control 2 Revision Control Description Revision Date Release Update 1.1 04-Mar-2015 Minor Update 1.2 23-Sep-2015 Update for firmware rev. 4.3 1.3 29-Sep-2015 Update for firmware rev. 4.4 - 4.5 1.4 18-Dec-2015 Update for firmware rev. 4.6 - 4.7 1.5 09-Jun-2016 Update for firmware rev. 4.8 1.6 11-Aug-2016 Added Chapter on WLAN 1.7 21-Sept-2016 Update for firmware rev. 4.9 1.8 09-Jan-2017 Update for firmware rev. 5.0 1.9 10-July-2017 Contents Revision Control .............................................................................................................................................. 2 Contents .......................................................................................................................................................... 2 1 Legal Notices ........................................................................................................................................... 6 1.1 Regulatory Restrictions ................................................................................................................... 6 1.2 Electromagnetic Interference (EMI) – United States FCC Information ........................................... 7 1.3 Electromagnetic Interference (EMI) – Canada Information ........................................................... 7 1.4 Li-Ion Battery ..................................................................................................................................
    [Show full text]
  • Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance
    Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance Extended Project Report from the Frederick S. Pardee Center for International Futures Josef Korbel School of International Studies University of Denver www.pardee.du.edu September 2015 Barry B. Hughes, David Bohl, Mohammod Irfan, Eli Margolese-Malin, and José Solórzano In project collaboration with and the Table of Contents Executive Summary 4 Conceptualizing Benefits and Costs 4 Using the IFs System for Analysis 4 Background Research Foundations 5 Forecasts and Findings 9 Conclusion 11 A Final Note on Study Contributions 12 1. Introduction: Understanding and Anticipating Change in the Benefits and Costs of Cyber Technology 13 2. ICT and Cyber Development Indices 18 Indices Replicated in the IFs Forecasting System 18 ICT Development Index 18 Global Cybersecurity Index 19 Additional Indices of Importance in Cyber Security Analyses 21 Digitization Index 21 Digital Economy Ranking Index 21 Networked Readiness Index 22 3. Benefits 23 Competing Schools of Thought on Economic Benefits 23 Pessimism Versus optimism concerning ICT’s economic production impacts 23 ICT as a general-purpose technology 25 ICT’s Economic Impact: The Production Side 26 ICT as a growth sector in the economy 26 ICT investment and capital services 29 ICT and multifactor productivity 32 Comparing the Productivity Impacts of GPTs: Steam, Electricity, ICT 33 Variation in ICT Impact across Time/Pervasiveness and Countries 36 Drivers of variation in ICT impact: ICT (especially broadband) pervasiveness 36 Drivers of variable ICT impact: Beyond PCs and broadband 39 Drivers of variable ICT impact: Country development level 41 Consumer Surplus 42 Consumer surplus forecasts 46 Summary of Knowledge Concerning Cyber Risk Benefits: Modeling Implications 47 4.
    [Show full text]
  • Study on Net-Neutrality Regulation
    BoR (17) 159 Final public report for BEREC Study on net-neutrality regulation 18 September 2017 James Allen, Andrew Daly, J. Scott Marcus, David de Antonio Monte, Robert Woolfson Ref: 2009152-254 . Study on net-neutrality regulation Contents 1 Executive summary 1 1.1 Background and purpose of the work 1 1.2 Overview of approach to tackling net neutrality in each country 1 1.3 Case studies of monitoring tools and techniques 3 1.4 Lessons learnt and concluding remarks 4 2 Introduction 6 2.1 Aim of the study 6 2.2 Summary of net neutrality 6 2.3 Approach to conducting the study 7 2.4 Structure of this document 7 3 Approach to tackling net neutrality in benchmark countries 8 3.1 The evolution of net-neutrality rules over time 8 3.2 Non-net-neutral practices 11 3.3 Transparency obligations on ISPs in relation to practices which may affect net neutrality 19 3.4 Monitoring and supervision by NRAs 22 3.5 Legal mechanisms for enforcement of net neutrality by NRAs 24 3.6 Reporting by NRAs 25 4 Case studies 26 4.1 Chile: Adkintun 26 4.2 Chile: Sistema de Transferencia de Información (STI) 27 4.3 USA: Netalyzr 28 4.4 USA: Measuring Broadband America programme 28 5 Lessons learnt and concluding remarks 33 Annex A Tools and techniques available to detect and characterise non-net-neutral practices Ref: 2009152-254 . Study on net-neutrality regulation Copyright © 2017. Analysys Mason Limited has produced the information contained herein for BEREC. The ownership, use and disclosure of this information are subject to the Commercial Terms contained in the contract between Analysys Mason Limited and BEREC.
    [Show full text]