Net Neutrality
Net Neutrality — Definition of Monopoly – FCC public Comment – Preventing Cable Company F^ckery.
Comcast Exempts Itself From Its Data Cap, Violates (at least the) Spirit of Net Neutrality 2012
Stagg Newman of the FCC Broadband discussion with the Educational CyberPlayground.
Tag: wireless broadband services
EPIC Freedom Awards to Allen, Amash, The Guardian, Snowden
EPIC is honored to recognize these Champions of Freedom who have worked to safeguard privacy, some at great personal risk,” said Marc Rotenberg, EPIC’s President and Executive Director.
EPIC Freedom Awards to Allen, Amash, The Guardian, Snowden
On June 2 the Electronic Privacy Information Center will celebrate 20
years of privacy advocacy with the 2014 EPIC Champions of Freedom
Awards.
Established in 1994, EPIC was created to focus public attention on
emerging privacy issues. EPIC maintains two of the most popular privacy
websites in the world – epic.org and privacy.org – and pursues policy
research, litigation, public education, and advocacy. EPIC’s Advisory
Board includes leading experts in law, technology and public policy.
EPIC established the Champion of Freedom Awards to recognize
individuals and organizations that safeguard the right to privacy with
courage and integrity. Internationally renowned security technologist
Bruce Schneier will host the 2014 EPIC celebration.
EPIC will honor University of Pennsylvania Law Professor Anita L.
Allen for her work as the nation’s leading privacy law scholar. A
longtime EPIC Advisory Board member, Professor Allen has helped shape
the modern understanding of the right to privacy.
EPIC will honor Congressman Justin Amash (R-MI) for his campaign to
defund the NSA’s telephone record collection program.
EPIC will recognize The Guardian newspaper for publishing documents
obtained by Edward Snowden that provided the basis for EPIC’s petition
to the US Supreme Court to end the bulk collection of Americans’
telephone records.
Edward Snowden will also receive an award from EPIC for disclosing the
secret court that documented the unlawful surveillance of Americans and
for transforming the debate about privacy protection.
“EPIC is honored to recognize these Champions of Freedom who have
worked to safeguard privacy, some at great personal risk,” said Marc
Rotenberg, EPIC’s President and Executive Director.
Previous recipients of the Champion of Freedom Award include Senators
Rand Paul (R-KY) and Ron Wyden (D-OR), and journalist Martha Mendoza
(2013); Senator Al Franken (D-MN), Judge Alex Kozinski of the 9th
Circuit, and journalists Dana Priest and William Arkin (2012);
Representatives Jason Chaffetz (R-UT) and Rush Holt (D-NJ), former
Miss USA Susie Castillo, and the Wall Street Journal (2011);
Representative Joe Barton (R-TX), former FTC Commissioner Pamela
Jones Harbour, and the Rose Foundation (2010); Senator Ed Markey
(D-MA), director D.J. Caruso, philanthropist Addison Fischer, and
attorney Paul M. Smith (2009); and Senator Patrick Leahy (D-VT) (2004).
EPIC has previously presented the Lifetime Achievement award to David
Flaherty (2013), Whitfield Diffie (2012), and Willis Ware (2012).
Opportunities, Threats, Internet Governance and the Future of Freedom
Opportunities, Threats, Internet Governance and the Future of Freedom
Robert M. McDowell
Last Friday, the U.S. Commerce Department’s National Telecommunications and Information Administration (NTIA) announced it intended to start the process of severing its last tether to the non-profit organization that manages Internet domain names and addresses, such as dot com and dot org. These technical functions, that help people’s computers and mobile devices find what they seek on the Net, are administered through the Internet Corporation for Assigned Names and Numbers (ICANN).
If all goes according to NTIA’s plan, the U.S. government will relinquish its contractual oversight of ICANN by September 2015. In its ideal form, this evolution could help reverse a growing tide of increased state interference into the Net’s affairs. If events don’t unfold as NTIAintends, however, Internet freedom, global prosperity and international political reform will be at risk.
Due to the complexities of the Internet ecosystem, and the manner in which it has thrived, before reacting impulsively, observers should pause and thoughtfully examine the nuances that abound in the wake of this development.
A best case scenario for the NTIA plan would have existing, non-profit, private sector Internet governance groups oversee ICANN’s management of these critical technical functions, just as they have other technical aspects of the Net for decades – with a perfect track record of success.
The worst case scenario would include foreign governments, either directly or through intergovernmental bodies, snatching the soon-to-be untethered technical functions for their own purposes. Keep in mind that Vladimir Putin plainly asserted in 2011 that his goal is to have “international control of the Internet” through the International Telecommunication Union (ITU), a treaty-based arm of the U.N. Given Mr. Putin’s proclivity for expansionism, especially lately, we should regard his statement as a promise he intends to keep.
This concern is more than theoretical. Countries such as China, Russia, Saudi Arabia, Iran, and their client states, have worked for years to absorb many aspects of Internet governance into multilateral organizations such as the ITU rather than the non-profit private sector. They succeeded in gaining a toehold in the Internet’s affairs during the 2012 World Conference on International Telecommunications, a treaty negotiation in Dubai. They will be back to expand the ITU’s authority further at its plenipotentiary meeting this fall, which is another treaty negotiation as well as a “constitutional convention” for the ITU.
Context is everything with this scenario. Internet freedom has been under siege for years. Authoritarian regimes resent the free flow of information an unfettered Net brings – even if increased Net-based commerce is catapulting developing world economies to new heights. The U.S. government’s role with the contract for the technical functions operated through ICANN has been used as Talking Point Number One by those who seek to expand intergovernmental organizations’ reach into the Net’s operations to counter what these regimes contend is, essentially, American domination of the Internet.
Add to the mix the recent revelations by Edward Snowden regarding the breadth of the U.S. National Security Agency’s data gathering, and pro-international regulation forces have something stronger than mere rhetoric to make their case for their proposed power grab. The timing of NTIA’s announcement, however, comes at a crucial time and has the potential to change the trajectory of the debate, with no cost to the U.S. – unless the Administration weakens its stance.
NTIA’s Friday announcement was not a complete surprise to those who follow these esoteric but important matters. Working toward removing NTIA’s formal role in this area is consistent with the arc of actions taken by the U.S. government since the 1990s when it formalized the privatization of the Internet and its governance. In short, the Net has migrated further away from government control over the past three decades. As a result, it has become the greatest deregulatory success story of all time.
For instance, in the late 1980s, only a paltry 88,000 people – mainly government users and academics – had access to the Internet. Today, due to the government taking its hands off of the Net, more than 3 billion people across the globe have Web access through mobile devices alone. Accordingly, the Net is fundamentally and rapidly improving the human condition by boosting living standards and raising political expectations as it strengthens the sovereignty of the individual. The evidence is irrefutable that both domestic and international government policies to leave the private sector alone to innovate and invest were the direct cause of this beautiful explosion of entrepreneurial brilliance.
With Friday’s announcement, NTIA is taking its last steps down a path that was paved over two decades ago: a path intended to get the government out of the Internet governance business. In that spirit,NTIA has put forth several conditions before it would allow its contract overseeing ICANN to expire in September 2015. The most important condition is that no governmental, intergovernmental or multilateral bodies would be allowed to have a role in overseeing any technical functions. Implicitly, if foreign governments or treaty-based organizations were to insert themselves into this realm, NTIA would renew its contract with ICANN in 2015, thus keeping the status quo and ending the argument for at least few more years.
To show that it is resolute, the Administration should vehemently underscore the conditionality of its plan. It cannot soften its stance on this crucial issue, event slightly. If it does, chaos will reign unlike any other time in the Internet’s history. Internet freedom and prosperity would get caught in an international regulatory death spiral.
The best case scenario would involve sticking with what has worked in the Internet space since its inception: allowing the non-profit, non-governmental, private sector, multi-stakeholder Internet governance structure to keep doing what it has been doing so well without the “help” of governments. Diverse, loosely-knit and “bottom up” run technical groups such as the Internet Architecture Board, the Internet Engineering Task Force, the Internet Society, and regional and local engineers, academics and user groups, are the best stewards of these technical functions – not anyone’s government. These private sector groups will keep the Internet governance structure dispersed and free from bottle necks to ensure that no entity can control the Net or shut it down.
Accomplishing the complex task of modernizing the multistakeholder model of Internet governance, including the administration of critical technical functions, will be difficult and risky. U.S. policy in this space should be to keep governments out of the Net’s technical affairs. But we can’t have it both ways. The Administration must not waver, even symbolically. Internet freedom and prosperity hang in the balance. To be continued …
Who Controls The Internet?
Seven people control the system at the heart of the web: the domain name system, or DNS.
NSA's automated hacking engine offers hands-free pwning of the world
NSA’s automated hacking engine offers hands-free pwning of the world
With Turbine, no humans are required to exploit phones, PCs, routers, VPNs.
by Sean Gallagher – Mar 12 2014, 3:20pm EDT
Since 2010, the National Security Agency has kept a push-button hacking system called Turbine that allows the agency to scale up the number of networks it has access to from hundreds to potentially millions. The news comes from new Edward Snowden documents published by Ryan Gallagher and Glenn Greenwald inThe Intercept today. The leaked information details how the NSA has used Turbine to ramp up its hacking capacity to “industrial scale,” plant malware that breaks the security on virtual private networks (VPNs) and digital voice communications, and collect data and subvert targeted networks on a once-unimaginable scale.
Turbine is part of Turbulence, the collection of systems that also includes the Turmoil network surveillance system that feeds the NSA’s XKeyscore surveillance database. While it is controlled from NSA and GCHQ headquarters, it is a distributed set of attack systems equipped with packaged “exploits” that take advantage of the ability the NSA and GCHQ have to insert themselves as a “man in the middle” at Internet chokepoints. Using that position of power, Turbine can automate functions of Turbulence systems to corrupt data in transit between two Internet addresses, adding malware to webpages being viewed or otherwise attacking the communications stream.
Since Turbine went online in 2010, it has allowed the NSA to scale up from managing hundreds of hacking operations each day to handling millions of them. It does so by taking people out of the loop of managing attacks, instead using software to identify, target, and attack Internet-connected devices by installing malware referred to as “implants.” According to the documents, NSA analysts can simply specify the type of information required and let the system figure out how to get to it without having to know the details of the application being attacked.
<snip>