A Deference to Protocol: Fashioning a Three-Dimensional Public Policy Framework for the Internet Age

Total Page:16

File Type:pdf, Size:1020Kb

A Deference to Protocol: Fashioning a Three-Dimensional Public Policy Framework for the Internet Age Whitt_Galley_7.11_FINAL (Do Not Delete) 7/12/2013 4:48 PM A DEFERENCE TO PROTOCOL: FASHIONING A THREE-DIMENSIONAL PUBLIC POLICY FRAMEWORK FOR THE INTERNET AGE RICHARD S. WHITT* Abstract This Article discusses how public policy grounded in the Internet’s architecture can best ensure that the Net fully enables tangible benefits such as innovation, economic growth, free expression, and user empowerment. In particular, recognizing that the Internet is rapidly becoming society’s chief operating system, this Article shows how an overarching public policy framework should be faithful to the multifaceted nature of the online world. As part of such a framework, this Article will explore one key aspect of the Internet: the “logical” Middle Layers functions, its inner workings derived from open software protocols and inclusive, decentralized processes. Adhering to the deferential principle of “respect the functional integrity of the Internet,” in combination with the appropriate institutional and organizational implements, can help ensure that any potential regulation of Internet- based activities enables, rather than hinders, tangible and intangible benefits for end users. In brief, optimal public policy solutions can come from fitting the correct Code (Net target) to the most effective Rules (institutions) and Players (organizations). I. INTRODUCTION .............................................................................. 691 A. No Nerds Allowed ............................................................ 691 B. Accepting Kingdon’s Challenge ....................................... 694 II. THE INTERNET’S FUNDAMENTAL DESIGN FEATURES .................... 697 A. The Net’s Framing Years ................................................. 697 Permission is hereby granted for noncommercial reproduction of this Article in whole or in part for education or research purposes, including the making of multiple copies for classroom use, subject only to the condition that the name of the author, a complete citation, and this copyright notice and grant of permission be included in all copies. * Global Head of Public Policy & Government Relations at Motorola Mobility LLC, a wholly owned subsidiary of Google Inc. This Article reflects only my own views and not those of present or past employers. Special thanks to Max Senges in Google’s Berlin office for his unfailing enthusiasm and insights about polycentric governance and other pertinent matters. Thank you also to Vint Cerf, Brett Frischmann, and Marvin Ammori for providing considerable helpful feedback on an earlier version of this Article. © 2013 Richard S. Whitt. 689 Whitt_Galley_7.11_FINAL (Do Not Delete) 7/12/2013 4:48 PM 690 CARDOZO ARTS & ENTERTAINMENT [Vol. 31:689 1. From Top-Down Government Management to Bottom-Up Guidance ................................................ 698 2. From Government Roots to Market Reality ............ 700 3. Rough Consensus and Running Code ...................... 701 B. The Internet’s Designed Architecture ............................ 704 C. The Internet Design Model: Four Functional Attributes 706 1. The Law of Code: Modularity .................................. 708 2. Smart Edges: End-to-End ......................................... 709 3. A Network of Networks: Interconnection................. 711 4. Agnostic Protocols: IP .............................................. 714 C. The End Result: A Simple, General, and Open Feedback Network .......................................................................... 716 III. INTERNET DESIGN AS FOUNDATIONAL, DYNAMIC, AND COLLECTIVE ........................................................................... 717 A. The Internet as General Platform Technology .............. 718 B. The Internet as Complex Adaptive System .................... 719 C. The Internet as Common Pool Resource ........................ 721 IV.THE EMERGENCE OF NET EFFECTS: BENEFITS AND CHALLENGES 722 A. Engine of Innovation ...................................................... 723 B. Spur to Economic Growth .............................................. 725 C. Conduit for Free Flow of Information ............................ 726 D. Tool for User Empowerment and Human Flourishing ... 727 E. Net Challenges ............................................................... 729 V.DEFERENCE AHEAD: RESPECTING THE INTERNET’S FUNCTIONAL INTEGRITY .............................................................................. 732 A. Revisiting the Layers Model .......................................... 732 1. Matching functions to layers..................................... 732 2. The Middle Layers: Defining the logical layers functions ................................................................... 733 B. Introducing The Internet Policy Principle ...................... 735 1. From layers model to layers principle ...................... 735 2. Expanding the layers principle to other Internet functions ................................................................... 736 3. Sketching out the first dimension of an Internet policy framework ...................................................... 738 4. Meeting potential objections ..................................... 740 VI.TWO OTHER DIMENSIONS: MATCHING CODE TO RULES AND PLAYERS ................................................................................ 743 A. The Institutional Implements: Rules of the Game .......... 744 B. The Organizational Entities: Players of the Game ......... 744 C. The Basics of Multistakeholder Governance ................. 745 1. The Rise of Multistakeholder Models ...................... 745 2. A working definition of polycentric groups and practices .................................................................... 747 Whitt_Galley_7.11_FINAL (Do Not Delete) 7/12/2013 4:48 PM 2013] A DEFERENCE TO PROTOCOL 691 D. Polycentrism in the Internet Space ................................. 748 1. Harnessing Rules and Players for Middle Layers Functions ................................................................... 748 E. A Modest Proposal: Modular Governance ..................... 754 VII. PUTTING IT ALL TOGETHER: EXAMPLES OF INTERNET POLICY IN THREE DIMENSIONS ................................................................ 756 A. Copyright Protection over Rogue Websites: SOPA and PIPA ............................................................................... 757 B. Global Internet Governance(s) ....................................... 760 C. Broadband Network Management .................................. 763 CONCLUSION ..................................................................................... 766 Truth happens to an idea.1 — William James I. INTRODUCTION A. No Nerds Allowed In late 2011, the United States Congress was heavily involved in debating legislation aimed at stopping foreign websites from hosting content that violates U.S. copyright laws. The House bill, called the Stop Online Piracy Act (“SOPA”), and the Senate bill, known as the Protect Intellectual Property Act (“PIPA”), shared a common element: they sought to impose certain technical requirements on website owners, search engines, Internet Service Providers (“ISPs”), and other entities, in order to block the dissemination of unlawful content on the Internet.2 On November 16, 2011, the House Judiciary Committee held a public hearing on SOPA.3 Representatives from the affected content industries were on hand to testify in favor of the legislation. A lone voice in opposition was Google’s copyright counsel, Katie Oyama.4 1 WILLIAM JAMES, THE MEANING OF TRUTH x (Prometheus Books 1997) (1911). 2 See generally Stop Online Piracy Act, H.R. 3261, 112th Cong. (2011) (SOPA); Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, S. 968, 112th Cong. (2011) (PROTECT IP Act, also known as “PIPA”). 3 Stop Online Piracy Act: Hearing on H.R. 3261 Before the H. Comm. On the Judiciary, 112th Cong. (2011). 4 David S. Levine, Bring in the Nerds: Secrecy, National Security, and the Creation of International Intellectual Property Law, 30 CARDOZO ARTS & ENT. L.J. 105, 139 (2012) (“While there was one Congressional hearing on SOPA that was dominated by entities that were pro- SOPA, the dire need for expert ‘nerd’ input was expressed by members of Congress. Indeed, during the hearing, members of Congress stated that they were not ‘nerds,’ highlighting their lack of expertise to assess SOPA’s DNS provisions. From the perspective of the concerns raised by this Article, and in comparison to the closed processes involving ACTA and TPP . the opportunity to bring in the nerds to offer useful public input was absent.”). Whitt_Galley_7.11_FINAL (Do Not Delete) 7/12/2013 4:48 PM 692 CARDOZO ARTS & ENTERTAINMENT [Vol. 31:689 Notably there were no witnesses called to provide expert testimony about how the legislation would actually affect the Internet—including technical experts on the inner workings of the Net.5 No software engineers, no hardware engineers, no technologists, no scientists, no economists, no historians.6 This apparent oversight was particularly surprising in light of the fact that many prominent Internet engineers were actively speaking out against the legislation. For example, in May 2011, various network- engineering experts produced a straightforward technical assessment of the many infirmities of the legislation.7 The engineers took no issue with the goal of lawfully removing infringing content from Internet hosts with suitable due process.8 Instead, they pointed out
Recommended publications
  • OES 2 SP3: Novell CIFS for Linux Administration Guide 9.2.1 Mapping Drives from a Windows 2000 Or XP Client
    www.novell.com/documentation Novell CIFS Administration Guide Open Enterprise Server 2 SP3 May 03, 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the Novell International Trade Service Web page (http://www.novell.com/info/exports/) for more information on exporting Novell software.
    [Show full text]
  • Shared Resource Matrix Methodology: an Approach to Identifying Storage and Timing Channels
    Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels RICHARD A. KEMMERER University of California, Santa Barbara Recognizing and dealing with storage and timing channels when performing the security analysis of a computer system is an elusive task. Methods for discovering and dealing with these channels have mostly been informal, and formal methods have been restricted to a particular specification language. A methodology for discovering storage and timing channels that can be used through all phases of the software life cycle to increase confidence that all channels have been identified is presented. The methodology is presented and applied to an example system having three different descriptions: English, formal specification, and high-order language implementation. Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General--se- curity and protection; D.4.6 ]Operating Systems]: Security and Protection--information flow controls General Terms: Security Additional Key Words and Phrases: Protection, confinement, flow analysis, covert channels, storage channels, timing channels, validation 1. INTRODUCTION When performing a security analysis of a system, both overt and covert channels of the system must be considered. Overt channels use the system's protected data objects to transfer information. That is, one subject writes into a data object and another subject reads from the object. Subjects in this context are not only active users, but are also processes and procedures acting on behalf of the user. The channels, such as buffers, files, and I/O devices, are overt because the entity used to hold the information is a data object; that is, it is an object that is normally viewed as a data container.
    [Show full text]
  • Shared Resource
    Shared resource In computing, a shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network.[1][2] It is a device or piece of information on a computer that can be remotely accessed from another computer transparently as if it were a resource in the local machine. Network sharing is made possible by inter-process communication over the network.[2][3] Some examples of shareable resources are computer programs, data, storage devices, and printers. E.g. shared file access (also known as disk sharing and folder sharing), shared printer access, shared scanner access, etc. The shared resource is called a shared disk, shared folder or shared document The term file sharing traditionally means shared file access, especially in the context of operating systems and LAN and Intranet services, for example in Microsoft Windows documentation.[4] Though, as BitTorrent and similar applications became available in the early 2000s, the term file sharing increasingly has become associated with peer-to-peer file sharing over the Internet. Contents Common file systems and protocols Naming convention and mapping Security issues Workgroup topology or centralized server Comparison to file transfer Comparison to file synchronization See also References Common file systems and protocols Shared file and printer access require an operating system on the client that supports access to resources on a server, an operating system on the server that supports access to its resources from a client, and an application layer (in the four or five layer TCP/IP reference model) file sharing protocol and transport layer protocol to provide that shared access.
    [Show full text]
  • A Letter to the FCC [PDF]
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15­170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM­11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15­170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, off­the­shelf home or small­business routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a Wi­Fi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in Wi­Fi ​ ​ devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from Wi­Fi equipment. We understand there are significant concerns regarding existing users of the Wi­Fi ​ spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing non­updatable devices into the field.
    [Show full text]
  • Resource Management in Multimedia Networked Systems
    University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science May 1994 Resource Management in Multimedia Networked Systems Klara Nahrstedt University of Pennsylvania Ralf Steinmetz University of Pennsylvania Follow this and additional works at: https://repository.upenn.edu/cis_reports Recommended Citation Klara Nahrstedt and Ralf Steinmetz, "Resource Management in Multimedia Networked Systems ", . May 1994. University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-94-29. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_reports/331 For more information, please contact [email protected]. Resource Management in Multimedia Networked Systems Abstract Error-free multimedia data processing and communication includes providing guaranteed services such as the colloquial telephone. A set of problems have to be solved and handled in the control-management level of the host and underlying network architectures. We discuss in this paper 'resource management' at the host and network level, and their cooperation to achieve global guaranteed transmission and presentation services, which means end-to-end guarantees. The emphasize is on 'network resources' (e.g., bandwidth, buffer space) and 'host resources' (e.g., CPU processing time) which need to be controlled in order to satisfy the Quality of Service (QoS) requirements set by the users of the multimedia networked system. The control of the specified esourr ces involves three actions: (1) properly allocate resources (end-to-end) during the multimedia call establishment, so that traffic can flow according to the QoS specification; (2) control resource allocation during the multimedia transmission; (3) adapt to changes when degradation of system components occurs.
    [Show full text]
  • Novell Cluster Services,. for Linux. and Netware
    Novell Cluster Services,. for Linux. and NetWare. ROB BASTIAANSEN SANDER VAN VUGT Novell PRESS. Novell. Published by Pearson Education, Inc. 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 CHAPTER 1: Introduction to Clustering and High Availability 5 Novell Cluster Services Defined 5 Shared Disk Access 6 Secondary IP Addresses 7 Clustering Terminology 8 High-Availability Solutions Overview 12 Novell Cluster Services 12 Business Continuity Clustering 13 PolyServe Matrix Server 15 Heartbeat Subsystem for High-Availability Linux 16 When Not to Cluster Applications 16 Availability Defined 18 High Availability Defined 18 Calculating Average Downtime 21 Avoiding Downtime 22 Hardware 22 Environment 23 Software 23 Procedures 24 Novell Cluster Services Requirements 24 Hardware Requirements 24 Software Requirements 26 CHAPTER 2: Examining Novell Cluster Services Architecture 27 Novell Cluster Services Objects and Modules 27 Cluster eDirectory Objects 28 Cluster Modules 31 IH Novell Cluster Services for Linux and NetWare Heartbeats, Epoch Numbers, and the Split Brain Detector 35 Removing a Failing Slave Node 36 Removing a Failed Master Node 37 Summary 37 CHAPTER 3: Clustering Design 39 Cluster Design Guidelines 39 How Many Nodes to Choose 39 Using a Heartbeat LAN or Not 40 Use NIC Teaming 41 Choosing Storage Methods 42 Mirror the Split Brain Detector Partition 48 Selecting Applications to Run in a Cluster 48 eDirectory Cluster Guidelines 50 Creating a Failover Matrix 52 Application-Specific Design Guidelines
    [Show full text]
  • The Internet and Isi: Four Decades of Innovation
    THE INTERNET AND ISI: FOUR DECADES OF INNOVATION ROD BECKSTROM President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) 40th Anniversary of USC Information Sciences Institute 26 April 2012 As prepared for delivery It’s an honor to be here today to mark the 40th anniversary of the University of Southern California’s Information Sciences Institute. Thank you to Herb Schorr for inviting me to speak with you today and participate in the day’s events. When he steps down he will leave some very large shoes to fill. When I received Herb’s invitation, I seized upon it as an opportunity to come before you to express the sincere gratitude that my colleagues and I feel for the work and support of ISI. When I think of ICANN and its development, and all we have accomplished, I never forget that we stand upon the shoulders of giants, many of whom contributed to my remarks today. In fact, I owe a special debt of gratitude to Bob Kahn, who has been a mentor to me. I am honored that he took the time to walk through a number of details in the history I have been asked to relate. The organizers asked me to speak about the history of ISI and ICANN. They also invited me to talk a bit about the future of the Internet. In my role as President and CEO of ICANN, I have many speaking engagements that are forward looking. They are opportunities to talk about ICANN’s work and how it will usher in the next phase in the history of the global, unified Internet that many of you have helped to create.
    [Show full text]
  • Site Finder and Internet Governance
    345 Site Finder and Internet Governance Jonathan Weinberg* 347 INTRODUCTION 348 PART 1. 354 PART 2. 361 PART 3. 366 PART 4. 375 CONCLUSION Copyright © 2004 by Jonathan Weinberg. * Professor of Law, Wayne State University. I am grateful to Michael Froomkin, Mark Lemley, David Maher, Milton Mueller, and Jessica Litman for their comments, and to Susan Crawford and Bret Fausett for answer- ing questions along the way. None of them, of course, is responsible for anything I say here. This essay reflects developments taking place through 30 November 2003. 347 Site Finder and Internet Governance Jonathan Weinberg INTRODUCTION ON SEPTEMBER 15, 2003, VeriSign, Inc.—the company that operates the data- bases that allow internet users to reach any internet resource ending in “.com” or “.net”—introduced a new service it called Site Finder. Less than three weeks later, after widespread protest from the technical community, at least three law- suits, and a stern demand from ICANN (the Internet Corporation for Assigned Names and Numbers, which has undertaken responsibility for managing the internet domain name space), VeriSign agreed to shut Site Finder down.1 In between those dates the internet community saw a passionate debate over the roles of ICANN, VeriSign, and the internet’s technical aristocracy in managing the domain name space. VeriSign has charged that its opponents’ reactions were the product of “obsolete thinking” that would disable it from “build[ing] a commercial busi- ness.”2 ICANN, for its part, is seeking to enact a procedure under which top-level domain name registry operators such as VeriSign must seek ICANN’s approval before offering new services or taking any “significant actions that...could affect the operational stability, reliability, security or global interoperability of...the Internet.”3 Some see fault on all sides: “It’s hard to say,” writes one commenta- tor, “in this case who is being more anti-competitive, ICANN or VeriSign.”4 In this essay, I will try to unpack the Site Finder story.
    [Show full text]
  • To the Members of the Senate Judiciary Committee: We, The
    To the members of the Senate Judiciary Committee: We, the undersigned, have played various parts in building a network called the Internet. We wrote and debugged the software; we defined the standards and protocols that talk over that network. Many of us invented parts of it. We're just a little proud of the social and economic benefits that our project, the Internet, has brought with it. We are writing to oppose the Committee's proposed new Internet censorship and copyright bill. If enacted, this legislation will risk fragmenting the Internet's global domain name system (DNS ), create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. In exchange for this, the bill will introduce censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' ability to communicate. All censorship schemes impact speech beyond the category they were intended to restrict, but this bill will be particularly egregious in that regard because it causes entire domains to vanish from the Web, not just infringing pages or files. Worse, an incredible range of useful, law-abiding sites can be blacklisted under this bill. These problems will be enough to ensure that alternative name-lookup infrastructures will come into widespread use, outside the control of US service providers but easily used by American citizens. Errors and divergences will appear between these new services and the current global DNS, and contradictory addresses will confuse browsers and frustrate the people using them.
    [Show full text]
  • IDN-OSS Project
    IDN-OSS Project ICANN 2004 Cape Town – IDN Workshop 1st December 2004 William Tan NeuLevel Consultant IDN and NeuLevel • NeuLevel has recognized the need for application plug-ins to realize the benefit of IDN work by any registry – Web browsers, email clients, IM, etc. • Need for a project to implement plug-ins that is – Open source, external to NeuLevel – Community controlled and developed – Standards compliant, not registry-specific 2 Chartering IDN-OSS • NeuLevel collaboration with James Seng to begin IDN-OSS – Conceived at ICANN Montreal – Discussion between Richard Tindal and James Seng • James Seng wrote business plan, kick-started the project. • Advisory Council: Vint Cerf, Mark Davis, Martin Dürst, John Klensin, and Paul Hoffman • Project is hosted by Internet Systems Consortium 3 IDN Open Source Software Project • Goals – Develop open source, standards-compliant software to enable IDN functionality in applications – Target web browser initially – Internet Explorer – Provides a bridge until IDN functionality is native to applications • Timeline – Summer 2003: Project begins – Fall 2003: ISC begins hosting project – Spring 2004: First IE plug-in released – Summer 2004: Internal code improvements 4 IDN-OSS Products • IDNTool • Performs IDNA ToASCII and ToUnicode operations. • Useful for developers, domain administrators, etc. • Uses JPNIC idnkit library internally • Plug-in for Internet Explorer • Allows users to navigate using IDN URLs – by typing into address bar or clicking on links. • New name: echIDNA • Uses JPNIC idnkit library
    [Show full text]
  • The Consensus Protocol
    8/5/2020 The Consensus Protocol FEATURE AUGUST 2020 The Consensus Protocol How a radical process, invented to build the ARPANET, spawned history's greatest tool for collaborative work BY STEVE CROCKER UCLA’s Boelter Hall housed one of the four original ARPANET nodes. ach March, July, and November, we are reminded that the Internet is not Equite the mature, stable technology that it seems to be. We rely on the Internet as an essential tool for our economic, social, educational, and political lives. But when the Internet Engineering Task Force meets every four months at an open conference that bounces from continent to continent, more than 1,000 people from around the world gather with change on their minds. Their vision of the global network that all humanity shares is dynamic, evolving, and continuously improving. Their efforts combine with the contributions of myriad others to ensure that the Internet always works but is never done, never complete. The rapid yet orderly evolution of the Internet is all the more remarkable considering the highly unusual way it happens: without a company, a government, or a board of directors in charge. Nothing about digital communications technology suggests that it should be self-organizing or, for that matter, fundamentally reliable. We enjoy an Internet that is both of those at once because multiple generations of network developers have embraced a principle and a https://read.nxtbook.com/ieee/spectrum/spectrum_na_august_2020/the_consensus_protocol.html?mkt_tok=eyJpIjoiTmpWh h b i i h hi f h l haVpXSmxOMll6TURZeSIsInQiOiIyc280i i l i h … 1/12 8/5/2020 The Consensus Protocol process that have been quite rare in the history of technology.
    [Show full text]
  • July 18, 2012 Chairman Julius Genachowski Federal Communications Commission 445 12Th Street SW Washington, DC 20554 Re
    July 18, 2012 Chairman Julius Genachowski Federal Communications Commission 445 12th Street SW Washington, DC 20554 Re: Letter, CG Docket No. 09-158, CC Docket No. 98-170, WC Docket No. 04-36 Dear Chairman Genachowski, Open data and an independent, transparent measurement framework must be the cornerstones of any scientifically credible broadband Internet access measurement program. The undersigned members of the academic and research communities therefore respectfully ask the Commission to remain committed to the principles of openness and transparency and to allow the scientific process to serve as the foundation of the broadband measurement program. Measuring network performance is complex. Even among those of us who focus on this topic as our life’s work, there are disagreements. The scientific process happens best in the sunlight and that can only happen when as many eyes as possible are able to look at a shared set of data, work to replicate results, and assess its meaning and impact. This ensures the conclusions from the broadband measurement allow for meaningful, data-driven policy making. Since the inception of the broadband measurement program, those of us who work on Internet research have lauded its precedent-setting commitment to open-data and transparency. Many of us have engaged with this program, advising on network transparency and measurement methodology and using the openly-released raw data as a part of our research. However, we understand that some participants in the program have proposed significant changes that would transform an open measurement process into a closed one. Specifically, that the Federal Communications Commission (FCC) is considering a proposal to replace the Measurement Lab server infrastructure with closed infrastructure, run by the participating Internet service providers (ISPs) whose own speeds are being measured.
    [Show full text]