What If We All Governed the Internet?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
North Korean Cyber Capabilities: in Brief
North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting. -
The Future of Internet Governance: Should the United States Relinquish Its Authority Over ICANN?
The Future of Internet Governance: Should the United States Relinquish Its Authority over ICANN? Lennard G. Kruger Specialist in Science and Technology Policy September 1, 2016 Congressional Research Service 7-5700 www.crs.gov R44022 The Future of Internet Governance: Should the U.S. Relinquish Its Authority over ICANN Summary Currently, the U.S. government retains limited authority over the Internet’s domain name system, primarily through the Internet Assigned Numbers Authority (IANA) functions contract between the National Telecommunications and Information Administration (NTIA) and the Internet Corporation for Assigned Names and Numbers (ICANN). By virtue of the IANA functions contract, the NTIA exerts a legacy authority and stewardship over ICANN, and arguably has more influence over ICANN and the domain name system (DNS) than other national governments. Currently the IANA functions contract with NTIA expires on September 30, 2016. However, NTIA has the flexibility to extend the contract for any period through September 2019. On March 14, 2014, NTIA announced the intention to transition its stewardship role and procedural authority over key Internet domain name functions to the global Internet multistakeholder community. To accomplish this transition, NTIA asked ICANN to convene interested global Internet stakeholders to develop a transition proposal. NTIA stated that it would not accept any transition proposal that would replace the NTIA role with a government-led or an intergovernmental organization solution. For two years, Internet stakeholders were engaged in a process to develop a transition proposal that will meet NTIA’s criteria. On March 10, 2016, the ICANN Board formally accepted the multistakeholder community’s transition plan and transmitted that plan to NTIA for approval. -
Challenging Conventional Wisdom: Development Implications of Trade in Services Liberalization
UNITED NATIONS CONFERENCE ON TRADE AND DEVELOPMENT TRADE, POVERTY AND CROSS-CUTTING DEVELOPMENT ISSUES STUDY SERIES NO. 2 Challenging Conventional Wisdom: Development Implications of Trade in Services Liberalization Luis Abugattas Majluf and Simonetta Zarrilli Division on International Trade in Goods and Services, and Commodities UNCTAD UNITED NATIONS New York and Geneva, 2007 NOTE Luis Abugattas Majluf and Simonetta Zarrilli are staff members of the Division on International Trade in Goods and Services, and Commodities of the UNCTAD secretariat. Part of this study draws on policy-relevant research undertaken at UNCTAD on the assessment of trade in services liberalization and its development implications. The views expressed in this study are those of the authors and do not necessarily reflect the views of the United Nations. The designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the United Nations Secretariat concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Material in this publication may be freely quoted or reprinted, but acknowledgement is requested, together with a reference to the document number. It would be appreciated if a copy of the publication containing the quotation or reprint were sent to the UNCTAD secretariat: Chief Trade Analysis Branch Division on International Trade in Goods and Services, and Commodities United Nations Conference on Trade and Development Palais des Nations CH-1211 Geneva Series Editor: Khalilur Rahman Chief, Trade Analysis Branch DITC/UNCTAD UNCTAD/DITC/TAB/POV/2006/1 UNITED NATIONS PUBLICATION ISSN 1815-7742 © Copyright United Nations 2007 All rights reserved ii ABSTRACT The implications of trade in services liberalization on poverty alleviation, on welfare and on the overall development prospects of developing countries remain at the hearth of the debate on the interlinkages between trade and development. -
Internet Universality Indicators: Online Consultation Phase II March 15, 2018
Comments of the ELECTRONIC PRIVACY INFORMATION CENTER UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION Internet Universality Indicators: Online Consultation Phase II March 15, 2018 The Electronic Privacy Information Center (“EPIC”) submits the following comments to the United Nations Educational, Scientific and Cultural Organization (“UNESCO”), pursuant to the request for public comment on “Developing UNESCO’s Internet Universality Indicators: Help UNESCO Assess and Improve the Internet.”1 EPIC was established in 1994 to focus public attention on emerging privacy and civil liberties issues. 2 Since that time, EPIC has worked on a range of international policy issues concerning the future of the Internet. EPIC established the Public Voice project in 1996 to enable civil society participation in decisions concerning the future of the Internet.3 EPIC also helped establish the .ORG domain and the International Domain Name system to facilitate broad use of the Internet by people of all linguistic and cultural backgrounds.4 EPIC has worked with UNESCO for more than twenty years.5 In 2015, at a presentation at UNESCO’s headquarters in Paris, EPIC stated that algorithmic transparency should be regarded as a fundamental human right.6 In 2017 in Hong Kong, EPIC participated in UNESCO’s first consultation on Internet Universality indicators.7 EPIC also maintains a webpage on Internet Universality.8 1 PHASE 2 CONSULTATION ON UNESCO’S INTERNET UNIVERSALITY INDICATORS, https://en.unesco.org/internetuniversality 2 See, About EPIC, EPIC, https://epic.org/epic/about.html. 3 See, About the Public Voice, The Public Voice, http://thepublicvoice.org/about-us/ 4 ISOC, Minutes of the 30th Board Meeting (Nov 16-17, 2002) (“We will together start a new non-commercial Internet.”) (Remarks of Marc Rotenberg), https://www.internetsociety.org/board-of-trustees/minutes/30 5 UNESCO, Report of the Experts Meeting on Cyberspace Law (Feb. -
About the Internet Governance Forum
About the Internet Governance Forum The Internet Governance Forum (IGF) – convened by the United Nations Secretary-General – is the global multistakeholder forum for dialogue on Internet governance issues. BACKGROUND AND CONTEXT 1 The IGF as an outcome of WSIS 2 IGF mandate 2 THE IGF PROCESS 3 IGF annual meetings 3 Intersessional activities 4 National, regional and youth IGF initiatives (NRIs) 5 PARTICIPATION IN IGF ACTIVITIES 6 Online participation 6 COORDINATION OF IGF WORK 7 Multistakeholder Advisory Group 7 IGF Secretariat 7 UN DESA 7 FUNDING 7 IMPACT 8 LOOKING AHEAD: STRENGTHENING THE IGF 8 The IGF in the High-level Panel on Digital Cooperation’s report 8 The IGF in the Secretary-General’s Roadmap for Digital Cooperation 9 9 1 BACKGROUND AND CONTEXT The IGF as an outcome of WSIS Internet governance was one of the most controversial issues during the first phase of the World Summit on the Information Society (WSIS-I), held in Geneva in December 2003. It was recognised that understanding Internet governance was essential in achieving the development goals of the Geneva Plan of Action, but defining the term and understanding the roles and responsibilities of the different stakeholders involved proved to be difficult. The UN Secretary-General set up a Working Group on Internet Governance (WGIG) to explore these issues and prepare a report to feed into the second phase of WSIS (WSIS-II), held in Tunis in November 2005. Many elements contained in the WGIG report – developed through an open process and multistakeholder consultations – were endorsed in the Tunis Agenda for the Information Society (one of the main outcomes of WSIS-II). -
The Internet Beyond Borderless Versus Balkanized
POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable. -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
Vp01 16¢63뼉 Olor
Discontinuance of Publication To our readers, First and foremost, I, as the president of Yonhap News Agency, would like to give our readers many thanks for the deep interest shown in our Vantage Point magazine for many years. With your great interest and encouragement, Yonhap has done its utmost to make Vantage Point, South Korea's sole North Korea-only monthly in English, a quality magazine over the years. However, Yonhap has very regrettably decided to discontinue the publication of the maga- zine, making the January issue in 2016 its last. This discontinuance, however, will never mean weakening Yonhap’s North Korea news ser- vice. On the contrary, Yonhap, as a leading news agency in South Korea, has the grave obligation to play a part in helping materialize the Korean people’s ardent wish for the reunification of the Korean Peninsula by providing our readers at home and abroad with accurate news on the reality of the communist North and the South Korean government’s North Korea policy. Hence, Yonhap promises to continuously meet our Vantage Point readers’ keen interest in and high demand for stories on Korean Peninsula issues by providing you with a quicker, fairer, more accurate and stronger North Korean news service via its Web page (www.yonhapnews.co.kr). I would like to express my deep appreciation to our faithful readers once again, and hope you will continuously maintain interest in Korean issues down the road. Best regards, Park No-hwang President-publisher Yonhap News Agency 폐간사 독자여러분들에게, 우선 그동안 연합뉴스 Vantage Point를 애독해주신 독자 여러분들에게 깊은 감사의 말씀을 드립니다 그동안 연합뉴스는 독자 여러분들의 높은 관심과 격려 속에서 한국의 유일한 북한 전문 영문월간지인 Vantage Point를 품격있는 잡지로 만들기 위해 최선 을 다해왔습니다. -
Data Localization Requirements Across Different Jurisdictions 70
The Localisation Gambit Unpacking Policy Measures for Sovereign Control of Data in India 19th March, 2019 By Arindrajit Basu, Elonnai Hickok, and Aditya Singh Chawla Edited by Pranav M Bidare, Vipul Kharbanda, and Amber Sinha Research Assistance Anjanaa Aravindan The Centre for Internet and Society, India Acknowledgements 2 Executive Summary 3 Introduction 9 Methodology 10 Defining and Conceptualizing Sovereign Control of Data 11 Mapping of Current Policy Measures for Localization of Data in India 13 The Draft Personal Data Protection Bill, 2018 13 Draft E-commerce Policy (s) 17 RBI Notification on ‘Storage of Payment System Data’ 19 Draft E-Pharmacy Regulations 20 FDI Policy 2017 20 National Telecom M2M Roadmap 21 Unified Access License for Telecom 21 Companies Act, 2013 and Rules 21 The IRDAI (Outsourcing of Activities by Indian Insurers) Regulations, 2017 22 Guidelines on Contractual Terms Related to Cloud Services 22 Reflecting on Objectives, Challenges and Implications of National Control of Data 24 Enabling Innovation and Economic Growth 24 Enhancing National Security and Law Enforcement Access 34 Law Enforcement Access 34 Protecting Against Foreign Surveillance 36 Threat to fibre-optic cables 37 Widening Tax Base 40 Data Sovereignty and India’s Trade Commitments 41 A Survey of Stakeholder Responses 48 Data Localisation Around the World 49 Conclusions and Recommended Approaches 61 Annexure I 70 Mapping Data Localization Requirements Across Different Jurisdictions 70 Annexure 2 75 A survey of stakeholder responses 75 1 Acknowledgements The authors would like to thank Pranav MB, Vipul Kharbanda, Amber Sinha, and Saumyaa Naidu for their invaluable edits and comments on the draft. -
The Wisdom of the Few a Collaborative Filtering Approach Based on Expert Opinions from the Web
The Wisdom of the Few A Collaborative Filtering Approach Based on Expert Opinions from the Web Xavier Amatriain Neal Lathia Josep M. Pujol Telefonica Research Dept. of Computer Science Telefonica Research Via Augusta, 177 University College of London Via Augusta, 177 Barcelona 08021, Spain Gower Street Barcelona 08021, Spain [email protected] London WC1E 6BT, UK [email protected] [email protected] Haewoon Kwak Nuria Oliver KAIST Telefonica Research Computer Science Dept. Via Augusta, 177 Kuseong-dong, Yuseong-gu Barcelona 08021, Spain Daejeon 305-701, Korea [email protected] [email protected] ABSTRACT 1. INTRODUCTION Nearest-neighbor collaborative filtering provides a successful Collaborative filtering (CF) is the current mainstream ap- means of generating recommendations for web users. How- proach used to build web-based recommender systems [1]. ever, this approach suffers from several shortcomings, in- CF algorithms assume that in order to recommend items cluding data sparsity and noise, the cold-start problem, and to users, information can be drawn from what other similar scalability. In this work, we present a novel method for rec- users liked in the past. The Nearest Neighbor algorithm, ommending items to users based on expert opinions. Our for instance, does so by finding, for each user, a number of method is a variation of traditional collaborative filtering: similar users whose profiles can then be used to predict rec- rather than applying a nearest neighbor algorithm to the ommendations. However, defining similarity between users user-rating data, predictions are computed using a set of ex- is not an easy task: it is limited by the sparsity and noise in pert neighbors from an independent dataset, whose opinions the data and is computationally expensive. -
Internet Governance and the Move to Ipv6
Internet Governance and the move to IPv6 TU Delft April 2008 Alex Band & Arno Meulenkamp Internet Governance Community Policies Internet Resource Statistics IPv6 2 Internet Governance ISOC IETF ICANN / IANA RIRs 4 The 5 RIRs 5 What is RIPE NCC? RIPE NCC is –a Network Coordination Center –an independent organisation –a not-for-profit membership association –one of the 5 Regional Internet Registries 6 Registration 7 Goals of the IR System: Registration Why? Ensure uniqueness of IP address space usage Provide contact information for network operators How? RIPE Database Results: IP address space allocated uniquely Contact information available for Internet resources 8 Aggregation 9 Goals of the IR System: Aggregation Why? Routing table grows fast Provide scalable routing solution for the Internet How? Encourage announcement of whole allocations (min /21) Introduction of Classless Inter Domain Routing (CIDR) Results: Growth of routing table slowed down 10 Conservation 11 Goals of the IR System: Conservation Why? IP address space is limited resource Ensure efficient usage How? Introduction of CIDR Community based policies to ensure fair usage Results: IP address space consumption slowed Address space allocated on ‘need to use’ basis 12 IP address distribution IANA RIR LIR /23 /25 /25 End User Allocation PA Assignment PI Assignment 13 Community Policies Policy Development Cycle Need Evaluation Proposal Execution Discussion Consensus 15 How policy is made ICANN / IANA ASO AfriNIC RIPEReach NCC consensus ARIN across communitiesAPNIC LACNIC AfriNIC -
Tunisia: Freedom of Expression Under Siege
Tunisia: Freedom of Expression under Siege Report of the IFEX Tunisia Monitoring Group on the conditions for participation in the World Summit on the Information Society, to be held in Tunis, November 2005 February 2005 Tunisia: Freedom of Expression under Siege CONTENTS: Executive Summary p. 3 A. Background and Context p. 6 B. Facts on the Ground 1. Prisoners of opinion p. 17 2. Internet blocking p. 21 3. Censorship of books p. 25 4. Independent organisations p. 30 5. Activists and dissidents p. 37 6. Broadcast pluralism p. 41 7. Press content p. 43 8. Torture p. 46 C. Conclusions and Recommendations p. 49 Annex 1 – Open Letter to Kofi Annan p. 52 Annex 2 – List of blocked websites p. 54 Annex 3 – List of banned books p. 56 EXECUTIVE SUMMARY The International Freedom of Expression Exchange (IFEX) is a global network of 64 national, regional and international freedom of expression organisations. This report is based on a fact-finding mission to Tunisia undertaken from 14 to 19 January 2005 by members of the IFEX Tunisia Monitoring Group (IFEX-TMG) together with additional background research and Internet testing. The mission was composed of the Egyptian Organization of Human Rights, International PEN Writers in Prison Committee, International Publishers Association, Norwegian PEN, World Association of Community Radio Broadcasters (AMARC) and World Press Freedom Committee. Other members of IFEX-TMG are: ARTICLE 19, Canadian Journalists for Free Expression (CJFE), the Centre for Human Rights and Democratic Studies (CEHURDES), Index on Censorship, Journalistes en Danger (JED), Media Institute of Southern Africa (MISA), and World Association of Newspapers (WAN).