International Cyber Society - Governing the Internet Nils G

Total Page:16

File Type:pdf, Size:1020Kb

International Cyber Society - Governing the Internet Nils G International Cyber Society - Governing the Internet Nils G. Indahl To cite this version: Nils G. Indahl. International Cyber Society - Governing the Internet. 2009. hprints-00396381 HAL Id: hprints-00396381 https://hal-hprints.archives-ouvertes.fr/hprints-00396381 Preprint submitted on 17 Jun 2009 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives| 4.0 International License FACULTY OF SOCIAL SCIENCES UNIVERSITY OF COPENHAGEN Master’s thesis Nils G. Indahl International cyber society Governing the Internet Academic advisor: Noel Parker Submitted: 28/11/08 Summary The thesis analyses the Internet, a political space that transcends state borders. The Internet is not chaos, but has emerged as an efficient system of governance with clear standards, norms and values. At the same time, it is a system without a centralised state authority. The three classical paradigms of realism, rationalism and revolutionism are applied in analysing the Internet as an evolving case. The following two research questions are explored: 1. Which of the three classical approaches best explains the development of the Internet? 2. Is the emergence of the Internet enhancing the power of the individual at the expense of the state? Using the three classical paradigms, pluralist theories of democracy, and Austrian coordination theory, the agenda is to find out whether the Internet has shifted the balance of power between the individual and the state. Has the Internet as a political space, in other words, given the individual opportunities to bypass state power? Has it enhanced the ability of the citizen to coordinate and act? Finally, the thesis addresses the possible reactions of the state to this apparent challenge to state sovereignty in the image of the individual, the state, and the international society of states. The Internet emerged as a spontaneous order between 1973 and 2003 as the result of contributions by various members of the international scientific community. The first phase in the evolution of the Internet is aimed at the world society, mankind, in what is mainly a revolutionist normative approach. A rationalist approach can be detected in the attempt by the Internet pioneers to transfer control of the Root file to the International Telecommunications Union - a part of the UN system - in 1997. As the economic and political importance of the Internet increases, a decidedly realist approach becomes evident. Should a national or world government destroy the efficient and free working of the Internet, the netizen may make use of his inaliable right to establish new information spaces outside state control. The technical standards – as well as norms and values – that have emerged as the Internet over the last 35 years, makes it possible for mankind to establish as a digital commonwealth what Kant called the ius cosmopoliticum. 2 Table of content INTRODUCTION .........................................................................................................................................4 THE THREE APPROACHES .....................................................................................................................7 PROBLEM DEFINITION ............................................................................................................................9 METHODOLOGY ........................................................................................................................................9 APPROACHES TO SOCIAL STUDIES........................................................................................................10 THE INTERNET AS A POLITICAL SPACE..........................................................................................11 HUMAN ACTION AND THE COORDINATION PROCESS.........................................................................13 THE EMERGENCE OF THE INTERNET..............................................................................................14 THE TECHNICAL LAYER .........................................................................................................................15 THE ECONOMIC LAYER ..........................................................................................................................16 THE POLICY LAYER.................................................................................................................................16 THE INTERNET INFRASTRUCTURE...................................................................................................18 THE DREAM MACHINE............................................................................................................................18 ARPA ........................................................................................................................................................18 INTERCONNECTIVITY .............................................................................................................................20 THE DNS (DOMAIN NAME SYSTEM).....................................................................................................21 THE INTERNET SYSTEM OF GOVERNANCE – AND THE REVOLT ...........................................23 SYNTHETIC AND PRAGMATIC INSTITUTIONS ......................................................................................24 THE INTERNET SOCIETY.........................................................................................................................26 THE WORLD WIDE WEB ..........................................................................................................................28 THE STATE OF NATURE AND THE SOCIAL CONTRACT .............................................................30 LAW AND THE CREATION OF SOCIETY.................................................................................................32 RATIONAL AND SOCIAL INTERNET FOUNDERS...................................................................................33 THE STATE OF NATURE IN THE THREE PARADIGMS ...........................................................................34 THE INTERNET IN A STATE OF INTERNATIONAL ANARCHY ..............................................................35 TRYING TO ESTABLISH A SOCIAL CONTRACT .....................................................................................37 US GOVERNMENT INTERVENTION........................................................................................................39 ICANN ......................................................................................................................................................41 FAILING TO EMERGE FROM THE STATE OF NATURE................................................................46 MULTI-STAKEHOLDER DEMANDS.........................................................................................................46 REALISTS..................................................................................................................................................48 RATIONALISTS.........................................................................................................................................53 REVOLUTIONISTS....................................................................................................................................56 TECHNOLOGIES OF FREEDOM IN ALL THREE PARADIGMS ...................................................58 INDIVIDUAL ACCESS TO INFORMATION...............................................................................................59 SPLINTERNETS.........................................................................................................................................61 NON-STATE SYSTEMS OF COORDINATION ....................................................................................64 INDIVIDUAL SOVEREIGNTY ...................................................................................................................64 STATE SOVEREIGNTY .............................................................................................................................65 LEVIATHAN VERSUS THE INDIVIDUAL.................................................................................................66 SOCIAL SYSTEMS AS INFORMATION SYSTEMS....................................................................................67 3 AN ANALOGY TO THE ECONOMIC PROBLEM.......................................................................................67 THE PRICE MECHANISM - THE WORLD’S MOST ADVANCED INFORMATION SYSTEM ....................68 INFORMATION SYSTEMS AND INFORMATION TECHNOLOGY ............................................................69 WORLD POWER........................................................................................................................................70 THE ICELANDIC COMMONWEALTH ......................................................................................................71 CONCLUSION ............................................................................................................................................73
Recommended publications
  • A History of End-To-End Encryption and the Death of PGP
    25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment".
    [Show full text]
  • Battle of the Clipper Chip - the New York Times
    Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp... https://nyti.ms/298zenN Battle of the Clipper Chip By Steven Levy June 12, 1994 See the article in its original context from June 12, 1994, Section 6, Page 46 Buy Reprints VIEW ON TIMESMACHINE TimesMachine is an exclusive benefit for home delivery and digital subscribers. About the Archive This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them. Occasionally the digitization process introduces transcription errors or other problems; we are continuing to work to improve these archived versions. On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers. The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems 1 of 19 11/29/20, 6:16 PM Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp..
    [Show full text]
  • Zfone: a New Approach for Securing Voip Communication
    Zfone: A New Approach for Securing VoIP Communication Samuel Sotillo [email protected] ICTN 4040 Spring 2006 Abstract This paper reviews some security challenges currently faced by VoIP systems as well as their potential solutions. Particularly, it focuses on Zfone, a vendor-neutral security solution developed by PGP’s creator, Phil Zimmermann. Zfone is based on the Z Real-time Transport Protocol (ZRTP), which is an extension of the Real-time Transport Protocol (RTP). ZRTP offers a very simple and robust approach to providing protection against the most common type of VoIP threats. Basically, the protocol offers a mechanism to guarantee high entropy in a Diffie- Hellman key exchange by using a session key that is computed through the hashing several secrets, including a short authentication string that is read aloud by callers. The common shared secret is calculated and used only for one session at a time. However, the protocol allows for a part of the shared secret to be cached for future sessions. The mechanism provides for protection for man-in-the-middle, call hijack, spoofing, and other common types of attacks. Also, this paper explores the fact that VoIP security is a very complicated issue and that the technology is far from being inherently insecure as many people usually claim. Introduction Voice over IP (VoIP) is transforming the telecommunication industry. It offers multiple opportunities such as lower call fees, convergence of voice and data networks, simplification of deployment, and greater integration with multiple applications that offer enhanced multimedia functionality [1]. However, notwithstanding all these technological and economic opportunities, VoIP also brings up new challenges.
    [Show full text]
  • Transnationality, Morality, and Politics of Computing Expertise
    UNIVERSITY OF CALIFORNIA Los Angeles Transnationality, Morality, and Politics of Co!"#ting Ex"ertise A dissertation s#%!i&ed in partial satis action o t'e re(#ire!ents for t'e degree )octor o P'iloso"'y in Anthro"ology %y L#is Feli"e Rosado M#rillo *+,- . Co"yright by L#is Feli"e Rosado M#rillo 2+,- A/STRACT OF T0E DISSERTATION Transnationality, Morality, and Politics o Co!"#ting E$"ertise %y L#is Feli"e Rosado M#rillo )octor o P'iloso"'y in Anthro"ology Uni1ersity o Cali ornia, Los Angeles, 2+,- Pro essor C'risto"'er M2 Kelty, C'air In this dissertation I e$amine t'e alterglo%alization o co!"#ter e$"ertise 5it' a oc#s on t'e creation o "olitical, econo!ic, !oral, and tec'nical ties among co!"#ter tec'nologists 5'o are identi6ed %y "eers and sel 7identi y as 8co!"#ter 'ac9ers2: ;e goal is to in1estigate 'o5 or!s o collaborati1e 5or9 are created on a local le1el alongside glo%al "ractices and disco#rses on co!"#ter 'ac9ing, linking local sites 5it' an e!ergent transnational do!ain o tec'nical e$c'ange and "olitical action. In order to ad1ance an #nderstanding o the e$"erience and "ractice o 'ac9ing %eyond its !ain axes o acti1ity in <estern Euro"e and the United States, I descri%e and analy4e "ro=ects and career trajectories o program!ers, engineers, and hac9er acti1ists w'o are ii !e!%ers o an international networ9 o co!!#nity s"aces called 8'ac9ers"aces: in the Paci6c region.
    [Show full text]
  • Pgpfone Pretty Good Privacy Phone Owner’S Manual Version 1.0 Beta 7 -- 8 July 1996
    Phil’s Pretty Good Software Presents... PGPfone Pretty Good Privacy Phone Owner’s Manual Version 1.0 beta 7 -- 8 July 1996 Philip R. Zimmermann PGPfone Owner’s Manual PGPfone Owner’s Manual is written by Philip R. Zimmermann, and is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Pretty Good Privacy™, PGP®, Pretty Good Privacy Phone™, and PGPfone™ are all trademarks of Pretty Good Privacy Inc. Export of this software may be restricted by the U.S. government. PGPfone software is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Phil’s Pretty Good engineering team: PGPfone for the Apple Macintosh and Windows written mainly by Will Price. Phil Zimmermann: Overall application design, cryptographic and key management protocols, call setup negotiation, and, of course, the manual. Will Price: Overall application design. He persuaded the rest of the team to abandon the original DOS command-line approach and designed a multithreaded event-driven GUI architecture. Also greatly improved call setup protocols. Chris Hall: Did early work on call setup protocols and cryptographic and key management protocols, and did the first port to Windows. Colin Plumb: Cryptographic and key management protocols, call setup negotiation, and the fast multiprecision integer math package. Jeff Sorensen: Speech compression. Will Kinney: Optimization of GSM speech compression code. Kelly MacInnis: Early debugging of the Win95 version. Patrick Juola: Computational linguistic research for biometric word list. -2- PGPfone Owner’s
    [Show full text]
  • Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution A
    University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2000 Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution A. Michael Froomkin University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Constitutional Law Commons, and the Internet Law Commons Recommended Citation A. Michael Froomkin, Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 Duke L.J. 17 (2000). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. WRONG TURN IN CYBERSPACE: USING ICANN TO ROUTE AROUND THE APA AND THE CONSTITUTION A. MICHAEL FROOMKINt ABSTRACT The Internet relies on an underlying centralized hierarchy built into the domain name system (DNS) to control the routing for the vast majority of Internet traffic. At its heart is a single data file, known as the "root." Control of the root provides singular power in cyber- space. This Article first describes how the United States government found itself in control of the root. It then describes how, in an attempt Copyright © 2000 by A. Michael Froomkin. t Professor, University of Miami School of Law. E-mail: [email protected]. Research and writing of this Article was supported by a Summer Grant from the University of Miami School of Law.
    [Show full text]
  • Tunisia: Freedom of Expression Under Siege
    Tunisia: Freedom of Expression under Siege Report of the IFEX Tunisia Monitoring Group on the conditions for participation in the World Summit on the Information Society, to be held in Tunis, November 2005 February 2005 Tunisia: Freedom of Expression under Siege CONTENTS: Executive Summary p. 3 A. Background and Context p. 6 B. Facts on the Ground 1. Prisoners of opinion p. 17 2. Internet blocking p. 21 3. Censorship of books p. 25 4. Independent organisations p. 30 5. Activists and dissidents p. 37 6. Broadcast pluralism p. 41 7. Press content p. 43 8. Torture p. 46 C. Conclusions and Recommendations p. 49 Annex 1 – Open Letter to Kofi Annan p. 52 Annex 2 – List of blocked websites p. 54 Annex 3 – List of banned books p. 56 EXECUTIVE SUMMARY The International Freedom of Expression Exchange (IFEX) is a global network of 64 national, regional and international freedom of expression organisations. This report is based on a fact-finding mission to Tunisia undertaken from 14 to 19 January 2005 by members of the IFEX Tunisia Monitoring Group (IFEX-TMG) together with additional background research and Internet testing. The mission was composed of the Egyptian Organization of Human Rights, International PEN Writers in Prison Committee, International Publishers Association, Norwegian PEN, World Association of Community Radio Broadcasters (AMARC) and World Press Freedom Committee. Other members of IFEX-TMG are: ARTICLE 19, Canadian Journalists for Free Expression (CJFE), the Centre for Human Rights and Democratic Studies (CEHURDES), Index on Censorship, Journalistes en Danger (JED), Media Institute of Southern Africa (MISA), and World Association of Newspapers (WAN).
    [Show full text]
  • Tunisia Digital Rights & Inclusion 2020 Report.Cdr
    LONDA TUNISIA DIGITAL RIGHTS AND INCLUSION A PARADIGM INITIATIVE PUBLICATION REPORT LONDA TUNISIA DIGITAL RIGHTS AND INCLUSION REPORT A PARADIGM INITIATIVE PUBLICATION Published by Paradigm Initiative Borno Way, Yaba, Lagos, Nigeria Email: [email protected] www.paradigmhq.org Published in April Report written by Yosr Jouini Editorial Team: ‘Gbenga Sesan, Kathleen Ndongmo, Koliwe Majama, Margaret Nyambura Ndung’u, Mawaki Chango, Nnenna Paul-Ugochukwu and Thobekile Matimbe. Design & Layout by Luce Concepts This publication may be reproduced for non-commercial use in any form provided due credit is given to the publishers, and the work is presented without any distortion. Copyright © Paradigm Initiative Creative Commons Attribution . International (CC BY .) CONTENTS INTRODUCTION LONDA INTERNET ACCESS TUNISIA DIGITAL RIGHTS AND INCLUSION REPORT A PARADIGM INITIATIVE PUBLICATION IMPACT OF COVID- REGULATIONS ON DIGITAL RIGHTS AND INCLUSION PRIVACY AND SURVEILLANCE ONLINE FREEDOM OF SPEECH Civil society organizations continue to work to advance digital rights and inclusion in Africa, ensuring best practices are adopted into policy and legislation. This report analyses the state of digital rights and inclusion in Tunisia, examining MISINFORMATION LAWS violations and gaps, investigating the use and application of policy and legislation, highlighting milestones and proffering recommendations for the digital landscape in CONCLUSION AND Tunisia. This edition captures among other issues, the RECOMMENDATIONS digital divide worsened by the COVID- pandemic and unearths infractions on different thematic areas such as privacy, access to information, and freedom of expression with the legislative and policy background well enunciated. @ParadigmHQ TUNISIA DIGITAL RIGHTS AND INCLUSION 2020 REPORT Tunisia is a North African country with a population of .
    [Show full text]
  • China in the Era of the Netizen by Ronda Hauben, Feb. 14, 2010 I
    China in the Era of the Netizen by Ronda Hauben, Feb. 14, 2010 I recently returned home from a trip to China. Back in New York City, I was left with the feeling that there is something significant happening in China. Some have referred to Beijing as the equivalent in the 21st century of the interesting environment that Prague symbolized for the 1990s. In the air in Beijing one senses that something new is emerging, something that must build on the old but will emerge with its new characteristics. In Beijing, I had many interesting conversations trying to understand the significance of what is happening there. One was with a friend who is from China but who has lived outside of China over 20 years. She was back visiting China for a special event and also planned to visit her parents who live in China, as she does every year. Comparing current day Beijing with the Beijing she knew as a university student, she observed that Beijing, as a world class city, has grown and developed in the Era of the Internet. Her observation helped me to realize that not only was Beijing being developed as a world class city with the benefit of the Internet's contribution, but also that Beijing is a world class city developing in the Era of the Netizen. Some notes I wrote as I left Beijing observed, "The insight of the trip was that Beijing is a city being developed in the Netizen Era. It is perhaps one of the first world class cities of the Netizen Era.
    [Show full text]
  • Impact of Social Media in Arab Spring: Special Emphasis on Tunisia’S Uprising
    Available online at http://www.journalijdr.com ISSN: 2230-9926 International Journal of Development Research Vol. 07, Issue, 08, pp.14227-14231, August, 2017 REVIEW ARTICLE Open Access ORIGINAL RESEARCH ARTICLE IMPACT OF SOCIAL MEDIA IN ARAB SPRING: SPECIAL EMPHASIS ON TUNISIA’S UPRISING *Saifuzzaman Research Scholar, Department of West Asian studies and North African studies, AMU, Aligarh ARTICLE INFO ABSTRACT Article History: Almost immediately after the Arab uprisings began, there was debate over the role and influence Received 19th May, 2017 of social media in the overthrow of Tunisian president Zine al-Abidine Ben Ali and the imminent Received in revised form coup of Mubarak. In covering what some deemed the Facebook or Twitter revolutions, the media 15th June, 2017 focused heavily on young protesters mobilizing in the streets in political opposition, smartphones Accepted 16th July, 2017 in hand. And since then, the violent and sectarian unrest in Syria has brought increased attention Published online 30th August, 2017 to the role of citizen journalism. Social media indeed played a part in the Arab uprisings. Networks formed online were crucial in organizing a core group of activists. Civil society leaders Keywords: in Arab countries emphasized the role of "the internet, mobile phones, and social media” in the protests. Additionally, digital media has been used by Arabs to exercise freedom of speech and as Social Media a space for civic engagement. This paper aims to demonstrate why the role of social media in the Arab Spring Arab Spring cannot be disregarded. This paper does not argue that social media caused the Arab Facebook Spring but was an essential tool impacting the way in which the Arab Spring occurred.
    [Show full text]
  • Update 6: Internet Society 20Th Anniversary and Global INET 2012
    Update 6: Internet Society 20th Anniversary and Global INET 2012 Presented is the latest update (edited from the previous “Update #6) on the Global INET 2012 and Internet Hall of Fame. Executive Summary By all accounts, Global INET was a great success. Bringing together a broad audience of industry pioneers; policy makers; technologists; business executives; global influencers; ISOC members, chapters and affiliated community; and Internet users, we hosted more than 600 attendees in Geneva, and saw more than 1,300 participate from remote locations. Global INET kicked off with our pre‐conference programs: Global Chapter Workshop, Collaborative Leadership Exchange and the Business Roundtable. These three programs brought key audiences to the event, and created a sense of energy and excitement that lasted through the week. Of key importance to the program was our outstanding line‐up of keynotes, including Dr. Leonard Kleinrock, Jimmy Wales, Francis Gurry, Mitchell Baker and Vint Cerf. The Roundtable discussions at Global INET featured critical topics, and included more than 70 leading experts engaged in active dialogue with both our in‐room and remote audiences. It was truly an opportunity to participate. The evening of Monday 23 April was an important night of celebration and recognition for the countless individuals and organizations that have dedicated time and effort to advancing the availability and vitality of the Internet. Featuring the Internet Society's 20th Anniversary Awards Gala and the induction ceremony for the Internet Hall of Fame, the importance of the evening cannot be understated. The media and press coverage we have already received is a testament to the historic nature of the Internet Hall of Fame.
    [Show full text]
  • NSFNET: the Partnership That Changed the World
    NSFNET: The Partnership that Changed the World Celebrating 20 Years of Internet Innovation and Progress November 29-30, 2007 Crystal Gateway Marriott, Arlington, Virginia Contents: Event Supporters 2 Program at a Glance 3 Detailed Agenda 4 - 8 Speaker Biographies 9 - 16 NSFNET: The Partnership that Changed the World 1 The organizers wish to thank the following organizations for supporting this event: Advanced Network & Services, Inc. www.advanced.org Cisco Systems, Inc. www.cisco.com IBM www.ibm.com Internet2 www.internet2.edu Juniper Networks www.juniper.net Merit Network, Inc. www.merit.edu National Science Foundation www.nsf.gov 2 Program at a Glance (see pages 4 - 8 for detailed program) Thursday, November 29, 2007 - General Program 7:30 - 8:30 a.m. Registration and Continental Breakfast 8:30 - 9:15 Welcome Speakers: Eric M. Aupperle and Jane Caviness The Internet History Archive Speaker: Doug Gale Introductory Comments Speaker: John H. Marburger, III Keynote - NSFNET: The Phenomenon Speaker: Douglas E. Van Houweling 9:20 - 10:35 Panel - NSFNET: The Beginnings Moderator: Lawrence Landweber 10:35 - 11:00 Break 11:00 - 11:55 Panel - NSFNET: The Solicitation & The Merit Partnership Moderator: Jane Caviness 11:55 - 12:45 Lunch 12:45 - 1:45 Panel - NSFNET: The T1—The Internet Comes of Age Moderator: Eric M. Aupperle 1:50 - 2:50 Panel - NSFNET: The T3 Backbone Service—The Internet Matures Moderator: Allan H. Weis 2:50 - 3:15 Break 3:15 - 4:35 Panel - NSFNET: The Community Moderator: Doug Gale 4:40 - 5:30 Panel - NSFNET: The Impact on Research and Science Moderator: George O.
    [Show full text]