Posts Tagged ‘privacy’
Cloud computing holds great promise for customers and entrepreneurs in the United States and around the world. It offers users – including governments and enterprises – the opportunity to pay only for the computing they use rather than maintaining all their computing needs and resources themselves. For innovators, the cloud offers a greatly reduced cost of entry into a market heretofore dominated by big players. However, there are policy challenges to be addressed. Fully realizing this potential requires unprecedented cooperation between industry, consumers and governments to ensure individual privacy and data security and ensure confidence in the remote storage of critical information. Not all are optimistic about the future of cloud computing because of the centralization of personal information, concentrated threats to security and the questions it raises about national sovereignty. This panel, moderated by Jonathan Zuck, president of the Association for Competitive Technology, explored opportunities and challenges of “the cloud.”
Details of the session:
There is a need for discussion about the opportunities and challenges of cloud computing in the public policy arena because of the popularity of platforms like Flickr, Facebook, fantasy sports leagues, Google and Amazon, according to panelists in a cloud computing workshop at the IGF-USA conference July 21 in Washington, D.C.
- John Morris, general counsel, Center for Democracy and Technology
- Dan Castro, senior analyst, Information Technology and Innovation Foundation
- Jack Suess, vice president of information technology, University of Maryland
- Evan Burfield, chief executive officer, Synteractive
- Marc Berejka, policy advisor, office of the secretary, U.S. Department of Commerce
Cloud computing offers users — including governments and enterprises — the opportunity to pay only for the computing they use rather than maintaining all their computing needs and resources themselves. This allows innovators to have increased access to the market at a reduced price, increasing competition in the market.
“There is a definite trend to using cloud computing,” Castro said. “There are much lower start-up costs because they don’t have to pay for the infrastructure. It gives you the ability to scale up or scale down. “
A common question is if data posted on cloud computing platforms is secure. The risks to data security and integrity rise with transnational cloud computing. Cloud users often do not know which law enforcement rules apply to their data.
“They don’t even know for sure where the data is; they don’t know exactly what country the data is in,” Morris said. “The challenges of being a cloud computing service provider and how to respond to law enforcement requests are very significant.”
If a cloud customer lives in the United States, but her data is stored on a server in another country, does that make her data more or less secure? Will the laws of the other country alter her rights regarding the actions she takes online?
“I think we will move to seeing risks to free speech on the Internet due to cloud computing,” Morris said. “I think that cloud computing could lead to repression.”
The panel also discussed issued tied to cloud computing and intellectual property.
“As we do move into the cloud there is a question about if we want to protect copyright protection,” Castro said. “Can service providers do a better job? We have a lot of intellectual property in the United States that we care about.”
Panelists noted that cloud computing presents completely new challenges in regard to cybersecurity, copyright protection and free flow of information on the Internet. “In the 1990s, during the version 1.0 era, the government philosophy on the Internet was ‘hands off,’” Berejka said. “We are now truly globally interconnected; it’s not a theory any more. Our philosophy is still to do no harm, but that might not necessarily translate into doing nothing.”
Higher education is one industry that has found a way to take advantage of cloud computing platforms. The outsourcing of student e-mail is becoming common, broadband and advanced networking are available to many more participants and vendor and government support for federations like InCommon is increasing.
“A lot of universities are coming together and thinking about community cloud services,” Suess said. “Higher education likes to collaborate with one another but one of the things that is holding the cloud back is stability. And trust is another question.”
Small businesses are also able to take advantage of cloud computing platforms. Burfield’s company, Synteractive, has 45 employees. He said they have no servers, conduct all their e-mail business in the cloud, use Skype for meetings and use Facebook for marketing. His company created recovery.gov for President Obama’s administration. They built the platform on an Amazon-provided server in about a week, creating the entire platform in the cloud.
“For a small business like ours it’s a great competitive advantage that never existed before,” Burfield said.
Cloud computing is allowing small businesses to be competitive, but there are still limits to what cloud computing services can do.
“For the cloud computing revolution to really work for consumers we need for the industry to move to a world of robust data portability,” Morris said. “The real promise of cloud computing for consumers is innovation and competition. I hope that there is data portability so when a new service comes online I can take my data and try the new service.”
-Rebecca Smith, www.imaginingtheinternet.org
The online world and the Internet are continuing to expand at exponential rates. As more and more users and more applications move into the online world with the expansion of broadband and mobile, concerns about online crimes and malicious threats to the Internet and to users also grow. This workshop was established to examine the range and scope of online crimes and malicious use of the Domain Name System. For instance, scam artists host websites with false information or a phisher registers a domain intended to resemble a famous brand. Consumers and businesses can be victims of abuse, and legitimate service providers are seeing crime and fraud in the network. The use of DNS security (DNSSEC) is part of a mitigation strategy.
Details of the session:
Every time an individual pulls up a webpage or website, the Domain Name System is used.
Moderators and industry leaders met at an IGF-USA 2010 workshop titled E-Crimes and Malicious Use in the DNS: Implications and Observations.
Panelists participating in the discussion noted that malicious use and criminal behavior in the DNS is not acceptable, but they did not come up with any clear conclusions regarding new ways to better control these problems.
The moderator of the event was Jim Galvin, director of strategic relationships and technical standards for Afilias. Panelists included Garth Bruen, founder of KnujOn; Doug Isenberg, attorney at law with GigaLaw Firm; Shaundra Watson, counsel for international consumer protection at the Federal Trade Commission; John Berryhill, intellectual property lawyer; Bobbie Flaim, special agent with the FBI; Margie Milam, senior policy advisor for ICANN; and Matt Serlin, senior director of domain management at MarkMonitor.
The panelists agreed the abuse of the DNS is not a regional issue nor is it confined to a particular sector of the Internet. The crimes occur across multiple jurisdictions and affect a variety of individuals.
Some shared anecdotes about incidents where collaboration with other entities gave way to resolving a major DNS violation.
-Anna Johnson, http://www.imaginingtheinternet.org
This 2009 IGF-USA session description: “Young Internet users, entrepreneurs and advocates are the expert respondents in this session which is aimed at illuminating current and future issues. Discussion points will include the positives and negatives of hyperconnectivity, online security/safety, copyright, the future of the media and information, and the future of identity and privacy.”
Nathaniel James, executive director for OneWebDay was the panel moderator. Participants on the panel included Sebastian Bernal, a student in the School of International Service at American University; Aaron Eilbott, a sophomore at Yorktown High School in Arlington, Va.; Randy Gyllenhaal, and Alex Trice, both from Elon University’s School of Communications; and Kim Ngyuyen, consumer privacy fellow at the Electronic Privacy Information Center (EPIC).
How they use the Internet
The panelists started out by describing their personal use of the Internet and online tools. Aaron Eilbott, age 14, noted he has more than 300 Facebook friends and at any moment at least 100 of them are online. Randy Gyllenhaal spoke with enthusiasm about his Blackberry. “There’s a reason they call them Crackberries,” he said as he noted that he is checking it all the time.
Moderator Nathan James, director of OneWebDay, asked the young panelists to share stories about how they work online. Eilbott said he keeps Facebook on when he does homework every day. “One day last week it went completely offline and I felt deserted,” he said. “I had to do my homework by myself. I didn’t realize I was kind of addicted to it until I didn’t have it.”
Kim Ngyuyen, a consumer privacy fellow for EPIC in her mid-20s said that she disagrees with older adults that the Internet is a distraction for young people.
It is actually more distracting when the Internet is down because you keep clicking on it and checking and checking when it’s gone. You are trying to do everything you can to get that Internet back. It’s a security blanket. You always need to feel connected. - Kim Ngyuyen
She also spoke about being online while in class at her university. “It’s not a distraction there. When you are called on in classes, friends might ‘chat’ you answers to help you if you have trouble answering a professor’s question,” she said, adding with a smile, “I’m not saying all of the conversations are academic, you know.” The room filled with laughter.
Being hyperconnected, now and in the future
Discussant Stephen Balkam, director of the Family Online Safety Institute, brought up a current BBC report titled “Tech Addiction Harms Learning.” It noted that 63 percent of the students surveyed indicated that they are addicted to Internet. “Obviously this was written by adults with a different point of view,” he told the panelists, noting that it might be a slanted perspective. “The world you guys are going to inherit is an interconnected world… Whether we like it or not we are going to a world where there is this constant need and desire to be connected.”
Panelist Alex Trice, 19, agreed. “I had to do an assignment for class where I had to go through a whole day without being connected to media, and I was constantly thinking about it… For our generation, being connected is important.”
Sebastian Bernal, a freshman from American University, noted that the hyperconnectedness we have now is “just foreshadowing what we will have in the future.”
Discussant Balkam noted that some people anticipate that brain implants of information devices may be only five years away. “When your kids come to you and ask for a brain implant,” he asked rhetorically, “what are you going to do about that?”
Young people tough on right age for starting on the ‘net
The group of young people began to discuss the appropriate age to begin going online. Trice said she started using the Internet at age 7, researching dinosaurs, fairies and unicorns. “I would say don’t get an e-mail address and Facebook until you are 13,” she said.
Randy Gyllenhaal, a senior at Elon University, said he read a report that 11 is the average age of a child encountering a porn site. “There are certain things in the digital world like pornography that worry me,” he said. “They should be exposed to the Internet, but don’t become addicted to it until you are rational about it like we are.”
Bernal said 13 is the age he would suggest to delineate as the divider before a child goes online. “If a 2-year-old or 4-year-old is online all the time, he won’t be able to develop social skills.” Ngyuyen said she suggests children should not go online before the age of 13. “The risk of stumbling upon pornography or something that is harmful to children is higher every year,” she said. “The Internet poses a specific danger to younger children. It is up to parents to make sure their children are using the Internet the right way.”
Eilbott declined to set a particular age for starting on the Internet. “I wouldn’t want to expose my children to the Internet until they have a reason to use it for educational purposes,” he said.
Privacy as an opt-in choice
The topic of online privacy was introduced by the moderator. “We don’t have to give up our privacy,” Ngyuyen said. “Users have to have control over their information. You should have a choice. EPIC favors an opt-in approach not opt-out. So you should start with no information available about you and then have to opt-in to allowing it to be shared.”
Eilbott said he generally knows the people who are seeing information about him on social networks. “I have met 90 to 95 percent of the people who are my friends on Facebook,” he said.
On Facebook, it’s not about being friends with them as it is with friends in real life. On Facebook, the definition of a friend is anyone you have met in your life for at least two seconds. - Aaron Eilbott
How young people get their information
The panel began discussing how they get information. “I am probably the only person in my age group who watches network news,” he said, adding that he thinks the “flattening world of media” – in regard to so many unreliable sources getting into the mix, with some being considered to be producing ‘news’ – is dangerous. “I think most people still trust CNN, the Associated Press the New York Times, and I feel the mainstream media has been flattened to include bloggers.
“It is important to have professional and verifiable journalists doing work and Twitter and those tools will help spread that information out to those who are not looking at traditional news.”
Trice noted that she gets news through her social networks. “I find out a lot of news on Facebook and on Twitter rather than watching television, I find it all out on the Internet,” she noted, and she added, “We all know how to use the technology and it gives us more power as individuals. We can share what we see from our perspectives from all over the world. Rather than just the mainstream media you can see news as a person sees it from an eyewitness viewpoint.”
A member of the audience, Derrick Cogburn of American University, asked the panelists what techniques they have developed or adopted “to vet the information that’s coming at you so fast today. How do you know that Michael Jackson died?” Trice told a story about being out with friends one night when she got a text message that Matt Damon had died. She and her friends began texting other people to ask if it was true and didn’t hear any verification. Next, they checked the LA Times. “We didn’t see anything from a source we trusted,” she said, “so we didn’t believe he died.”
Copyright and IP gets audience going
The moderator brought up the topic of intellectual property and copyright. “Think about the people you know and how they are using content,” James said. “Tell us from your perspective in a world where information flows so quickly it is simpler to get it without paying. Where is the intellectual property debate going?”
Eilbott said teens are aware of copyright but they don’t care about it. “We are aware of what can happen if you are caught, but there’s not much fear of any legal consequences,” he said. “The fee if you get caught is so high that it seems almost mythical – $80,000 if you download one song, yeah right. “
Trice observed that hackers who enable illegal downloaders always seem to find a way around any barriers raised to deter them.
No matter how many ways they try to make people pay, they are going to find ways to circumvent it and find ways to hack into it and get it free. - Alex Trice
Susan Anthony from the U.S. Patent and Trademark Office was among many audience members with a keen interest and questions tied to this topic. “If it’s my ox you’re goring I care, if it isn’t, I don’t,” she noted. “In the United States we talk about the university age as the ‘lost generation’ in regard to respecting other people’s copyrights. We have an ongoing debate over how early you should start teaching children about copyright. Some say in elementary school, but I don’t know how I think about that.”
Gyllenhaal jumped into the discussion. “I agree with you completely,” he said. “I think it comes down to the moral issue that you are taking someone else’s work. Personally, a song means more to me if I pay for it. It’s the principle of it – you are taking something that’s not yours. From the moral level of it, if more people treated the Internet that way we’d be better off.”
Several of the young people on the panel agreed that they would pay a flat rate to cover all downloads of copyright-protected content, such as $5 per month paid to their ISP.
Anonymity is valued by young people
When asked by an audience member about anonymity, all of the panelists said they have an anonymous e-mail account. “I call it my spam e-mail account,” Gyllenhaal said. “I don’t have a secret life. It is my Yahoo account. I send my Facebook stuff there and anytime I have to register for a site I use it to avoid spam.”
Ngyuyen also said she uses an extra e-mail address for dealing with spam. “I also use it when I want to make comments on blogs and I want to stay anonymous,” she said. “In general, I do think people have the right to be anonymous online. It would create a chilling effect to lose that right.”
Gyllenhaal brought up Juicy Campus, a currently defunct site on which all posts were anonymous and people were being subjected to bullying and hate speech. And online bullying was briefly discussed.
What are adults all wrong about?
A member of the audience asked, “When you hear adults talk about these ‘universal truths’ about young people online, are any of them really true?”
My parents assume that just because I am on the Internet while I’m doing homework I’m not getting anything done. They don’t give us enough credit for the fact that we are able to multitask. - Alex Trice
Ngyuyen also said her ability to work on other tasks while online was misunderstood. “My parents had the misconception that the Internet is really an entertainment world when in fact I would say having fun on the Internet is maybe 30 percent. I am learning something.”
Eilbott admitted some distraction, noting his parents “do have a point, I will get home from school, start my homework and an hour later not have done anything but talk to 12 friends.”
-Janna Anderson, http://www.imaginingtheinternet.org
Panelists shared their philosophical differences about online confidentiality and self-regulation in a discussion about privacy and security implications for Web 2.0 at the Internet Governance Forum-USA conference Oct. 2, 2009, in Washington, D.C.
All panelists agreed that online privacy remains an important issue, and that corporations have an ethical and legal responsibility to ensure that their consumers continue to enjoy some level of anonymity and confidentiality online. But they disagreed about whether self-regulation or government-enforced standards are the best method to achieve that end.
Ginger McCall, EPIC staff counsel, said companies’ privacy policies are often overwrought with technical and legal jargon, making them difficult for users to comprehend. They become too robust that users often click through them without much acknowledgement.
Privacy policies, in my experience, are generally just disclosure policies. They don’t exist to protect users’ privacy. They exist to protect companies from liability. - Ginger McCall
McCall said an overriding concern is that the policies often allow companies to change their guidelines at any time often with no notice to the users.
A bigger problem, still, is that companies are able to collect information about users without ever providing them with the information they have gathered.
“One creative suggestion that I might make is that businesses just give consumers everything they know about them,” said Michelle Demooy, a senior associate of consumer-action.org. “If you’re not a bad actor, it can’t hurt you to give consumers everything you know about them. It can only strengthen your brand going forward.”
Both McCall and Demooy specifically expressed growing anxiety about cloud computing, which allows Web hosting services to house the documents and data of users on their corporate servers. (Think of Google Docs and Gmail, for example.) So what used to be on a person’s personal computer is now on a larger server.
“It’s great for information sharing and collaboration, but not for privacy,” McCall said. “But it allows companies or outsiders to create detailed profiles of users. We need to see a stronger security system and we need to see companies are following through. There needs to be a strong regulation of cloud computing. There should be binding legal standards, terms of services have to be revised and privacy policies must be more transparent.”
Kathryn D. Ratte, from the division of Privacy and Internet Protection of the Federal Trade Commission, said the FTC supports self-regulation not government directives. She says allowing technologies to emerge promotes innovation.
“Our policy has been to enforce self-regulation,” Ratte said. “We analyze what’s going on in the market and put forth standards to adhere to. The flexibility allows us in some ways to act more quickly. We can just address these issues as they raise issues for consumers.”
Jeff Brueggeman, vice president of public policy for AT&T, said the FTC has laid down an ample baseline for legal protection on the Internet that certainly needs continual monitoring but not government intervention.
The FTC is taking a proactive but engaged approach. We don’t give consumers enough credit for the value they place on their privacy. More and more privacy is going to be a marketing advantage that companies are going to assert on the Internet. What we want to have is competition to maintain and secure your privacy, as well. - Jeff Brueggeman
McCall, though, said self-regulation is not a strong enough policy and that legislation with teeth is definitely possible.
“Self-regulation in the Internet context fails because there’s not really enough transparency about what’s going on and what harm is happening,” she said. “A lack of transparency allows companies to act in whatever manner it wants in the short term to make money. It also suffers from the problem in that it only allows for possible remedies after the fact. Having a real comprehensive regulatory system would allow companies to know what’s permissible and not permissible.”
The FTC has come out strongly saying that the rules that apply at time of the collection of data have to continue to apply and if there’s a change. The company should go back to the customer and get opt-in consent. - Kathryn D. Ratte
But McCall and Demooy both said vigorous legislation is possible, and if companies are acting in good faith and treating consumers with respect and responsibility, then they shouldn’t be worried about governmental regulations.
“Privacy policies have their place, but they aren’t really helping consumers,” Demooy said. “If they’re not working, let’s not bang our hammer against that stone. Let’s try to build something that does.”
-Colin Donohue, http://www.imaginingtheinternet.org
CONCLUSIONS: ‘What We Don’t Know About the Future of the Internet’ Rainie and morning plenary respondents finish the session
The panelists answered questions about finding ways to satisfy desires of people to share freely but somehow pay an appropriate price for the information they gain. “Most in my generation won’t want to pay for things because they are used to things being free,” Gyllenhaal said. “Young people will pay for things we use. I guarantee young people would pay for Facebook. It has become that important for us.”
Andrew McLaughlin came into this discussion in support of the principles many, including Chris Anderson (author of “Free: The Future of a Radical Price” and originator of the “Long Tail” idea in Internet economics), have brought to the forefront of the discussion of Internet economics. “Free doesn’t really mean ‘free,’” he said. “We have lots of media now that is free to the end-consumer in exchange for attention or something that benefits someone else. There will be things you are asked to pay for and things that third parties are asked to pay for.” He added it is important to find ways to properly “vindicate intellectual property rights” online and also address privacy, anonymity and authentication in the right way. “I find the ‘free’ debate to be kind of dissatisfying,” he said. “Free to the end-user still leaves you a broad way to pay for things.”
Lee McKnight noted that the issue is complicated. “It’s not just an issue of free and for-pay, there are barter arrangements that come into play as Internet governance has been progressing in these historic days,” he said. “Economic and competition policy will come to the fore… This is a ripe area for policy analysis and discussion at IGF in Egypt and over time as we continue to grapple over challenges.”
Rainie was asked about education and the Internet as an audience member noted how far behind education is in implementing the advantages of the Internet. “Participation matters,” he noted, saying it has been shown that students enjoy the ways in which they can be more active participants in their education when they can go online in classrooms.
McLaughlin chimed in. “The federal government is a disaster when it comes to using these new tools,” he said, noting that it blocks employees’ use of social networks.
“I hope that people less freaked out by these networks and systems will start running things,” he said, adding that every government employee should have a home page offering information they want to share and affording them the ability to collaborate with others in government. “That would drive a culture change that would be unstoppable,” he said, “and you would get the efficient task-oriented government we are trying to achieve.”
-Janna Anderson, http://www.imaginingtheinternet.org
Response from Marc Rotenberg, EPIC, to Lee Rainie’s ‘What We Don’t Know About the Future of the Internet’
Marc Rotenberg of the Electronic Privacy Information Center noted that he began working more than 15 years ago through a group called The Public Voice to promote positive decisions about the Internet – before the WSIS and IGF processes began – in order to get civil society involved in global decisions. “We felt it was important to have the voice of civil society in these discussions,” he said.
He joked that Lee Rainie’s talk was an unusual thing to see in Washington, D.C., because he admitted to the things he didn’t know about. Then he got serious. “Lee’s survey is particularly helpful, because it helps us understand both what we know about the Internet, people using the Internet, where the gaps – for example – exist in access to broadband – and then on some of the more difficult questions, really what we don’t know yet. These are questions we need to ask and look more closely at, and that’s enormously helpful.” he said. “I am very glad Lee used the ‘P word,’ which is not ‘privacy,’ it is ‘paradox.’ Because, increasingly, as we look at issues related to Internet policy we see a lot of paradox.”
He noted the conflicting desires people have to share things while also maintaining privacy online. “Try to friend your kids on Facebook,” he joked, “and you will get an instant lesson on the ongoing value of privacy.
Even though people put out all of this personal information, they still feel that they want to exercise some control over it. They don’t have a view that, ‘Oh, gee, I’m a data exhibitionist – everyone come and take a look.’ Their view is much more like, ‘Here’s a photo of my friend from the party last week, you four guys gotta check this out.’ It’s this desire to want to exercise some control over digital identity that is actually framing many of the big debates that are happening today in the online world. - Marc Rotenberg
He said when young people formed a protest group to dispute changes in Facebook’s terms of service it was a sign of their conflicted feelings. “To me, that was entirely a debate about privacy,” he said. “I don’t mean to go all Habermas on you, but this ability to negotiate public and private spaces is an essential part of the human condition and we’ve been doing it forever, from the village to the city to new communication networks to online communities and I don’t think anything there has changed. I just think you’re seeing it presented in a new way.”
He said transparency of government should be accompanied by government respect for individuals’ privacy. “A second paradox is the relationship between privacy and transparency,” he noted, saying that governments should be making their work more transparent.
There’s no contradiction whatsoever between saying a government should be open and accountable for what it does and it still has to respect the privacy of the personal information it collects about its citizens about the information it collects about citizens. That’s one of the big challenges we face in the information age – not letting the desire to ensure that the accountability for decision-makers – which is critical for democratic institutions – become an excuse to reveal the private facts of individuals, which really don’t relate to the activities of government. - Marc Rotenberg
He noted that there is a convergence of all of these concerns that leads to a need for a declaration of rights. “There has to be a discussion about a bill of rights for Internet users – we have to begin the discussion about protecting the fundamental rights and freedoms of people who go online,” he concluded. “It’s a overdue debate.”
-Janna Anderson, http://www.imaginingtheinternet.org
Response from Lee McKnight, Wireless Grids, to Lee Rainie’s ‘What We Don’t Know About the Future of the Internet’
Lee McKnight spoke to the conference remotely, by audio. He noted that this week’s announcement about the U.S. government’s recent decision about how it relates to ICANN is extremely important. “It’s impressive to see some things moving at Internet speed,” he said. “I want to highlight that while this is a first meeting of the Internet Governance Forum-USA, it is a historic day both for that and because of the announcement from NTIA and ICANN in relation to internationalization of the oversight of ICANN. It is a particularly poignant time for us to be coming together.”
He asked the audience to think back a few decades to the days when the Internet was not yet an infrastructure used for commerce, politics and general social interaction. “There was at least a glimmer in Vint Cerf’s eye about where things and how things might evolve, and the Internet Society was created,” he recalled. “I have witnessed and have been fortunate to have played a small part in many new organizations that have come along over time.”
He noted that the Caribbean Internet Forum – a multistakeholder group – has been meeting since 2002. “You can learn from them how to grow the US Internet Governance Forum, which has been sort of a late-comer,” he said. “I want to highlight the value and centrality of the multistakeholder model for global governance in general, and how policy can be made in a flexible manner.”
He noted that there are now many advances being made in the development of personal wireless grids.
The future of the Internet is not the Internet as we think of it now. What I mean is that we are focusing now on the network infrastructure level, which is absolutely central and critical, but where people live is in a world of devices, digital machines around them that are on and off the Internet. They are on mobile devices, on TVs, computers, printers, everywhere around them, and this Internet of things – or all those things and the Internet are merging through mobile and wireless connectivity. This new capability of creating essentially a personal cyberstructure, a personal cloud of your machines, your devices, your content, associated with you through your known identity and trust, securely, is something I have been working on for seven or eight years, and it’s still in its mid- to early days. - Lee McKnight
McKnight shared briefly about his work with the testing and rollout of personal wireless grids. He noted that in the next few years the Wireless Grid Innovation Testbed, or WIDGIT, will release new technologies for trial, first through universities including Virginia Tech and Syracuse and later to end-users.
He said this could alter the horizon for concerns over privacy and other issues.
“This offers a new capability of creating a personal, trusted, community of your own machines, your own devices, your own friends, across mobile and wireless devices,” he said. “As this comes into the marketplace and enhances user experience, I expect some of these trust and identity issues that are so challenging at the scale of the whole Internet will be addressed. In this personal world, this future architecture is not about securing the entire Internet, it’s about trusting your friends and your friends’ machines.”
- Janna Anderson, http://www.imaginingtheinternet.org
Response from Andrew McLaughlin, White House, to Lee Rainie’s ‘What We Don’t Know About the Future of the Internet’
“Let me drill down on one issue,” McLaughlin responded. “I am pleased Lee highlighted these architectural issues because they tend to not get a lot of attention. The Internet we have today started out as a research network that is now being treated – properly so – as critical infrastructure. The basic considerations that led to the construction of the TCP and IP protocols were to solve a set of issues that arise from the kind of shared data from universities. There are a lot of components that were not built in that, as Lee outlined, would potentially be quite useful for some of the activities that we would like to take place on the Internet. We are now confronting some fundamental choices about, for example, authentication on the Internet.”
He noted that if you want to secure routing you want to know the places you do want to get packets from and those from which you don’t want to get packets, “where, for example, malware or virus attacks might be.” Yet in places where authoritarian structures control infrastructure complete authentication of identity behind and origins of information becomes problematic.
One of the great features of the Internet is that is facilitating a profound flourishing of direct citizen-to-citizen speech in places that don’t have much of a tradition of that or have a tradition of centralized control over information. So you would alter that architecture and build in that authentication at great peril. - Andrew McLaughlin
He noted that one of the best results of the IGF and ICANN processes is the ways in which they illuminate discussions about the architecture, protocols and principles of the Internet to a much wider audience.
“It was not exactly the original intention for ICANN,” he noted, “but it has been the effect. The project of inculcating a way of thinking about problems with the Internet architecture is profoundly important,” he said, noting that you have to know the language of the architecture to operate in today’s political and economic environment. “Without that understanding, you can’t talk intelligently about cybersecurity, how to protect privacy, how to facilitate authenticated business and governmental transactions, and so forth – well, you can talk intelligently about it, but you will be missing something.”
He noted that the efforts of multistakeholder organizations in shaping an understanding and knowledge of information networks and the people building and scaling them is important.
The role of the IGF and the value of the ICANN process extends beyond the agendas that are typically before them. - McLaughlin
“The reason these issues are conundrums – the security, authentication, privacy, identity issues,” he said, “is that the Internet is a voluntarily interconnected set of networks. There is no central controlling authority; there is no body, no government that can decree what the technical implementations of the network will be. That fact is part of the fundamental strength of the Internet, part of what made it scale so fast, part of what’s made it so powerful, part of what made it facilitate so much speech and free expression in so many surprising ways in every culture around the world.”
He said in this decentralized environment change must now be accomplished “in terms of nudges, in terms of incentives, in terms of persuasion, rather than by decree.” He added that while the Internet architecture at this point may protect the speech of a “dissident in a repressive society or in our own society,” but there are many Internet transactions now threatened by spoofing, DNS attacks and other threats that would not occur if we had a better authentication system.
Understanding how to be precise about those balances and how to get them implemented in a voluntarily interconnected set of networks is a central problem that confronts us over the next few years. From the [Obama] administration’s perspective, the goal of an open Internet that supports free expression, that supports the kind of array, vast wave of human creativity and free expression that we see coursing over the nerves and veins of the Internet every day – maintaining that, accelerating that, enabling that is fundamentally important. - McLaughlin
He also noted that moving forward in encouraging the principles of open government “will guide the administration’s efforts to make progress on these problems.”
He noted that the Obama administration is working to make more information accessible to everyone.
“We want to be a more open government and free the data,” he said, “to make the government a platform for citizen innovation, citizen activities, new business models, and so forth that ride over the data the government has and the taxpayers pay for. The federal government sits on a staggering amount of data, and it can be incredibly valuable if it’s made public in machine-readable formats and can be remixed and reused and combined with other kinds of data. That’s a fundamental commitment.”
-Janna Anderson, http://www.imaginingtheinternet.org