Internet Governance Overview
Internet Governance Overview
Today’s lecture
Part 1
Part 2
Part 3
Can it be governable?
Who sets the rules and standards, who develops and implements policies?
How?
1
Why Internet Governance?
- In the past, people drafted the internet and did not know how it worked.
- Proposal for digital sovereignty by the European Union might change internet in the
way we know it.
- The Internet governance community, which was much more flexible and much more
open to by the stakeholders and has influenced the Cybersecurity community as
well.
2
Course roadmap
(see slide)
Approach
Explanation
Argument
Tool
Practical information
3
Literature
- Readings add to the lecture, but most questions from the exam will rely on the
lecture.
Acronyms
- These are important within Internet Governance.
4
Internet governance: in search of a definition
“Internet governance is a difficult horse to catch”. – Ziewitz and Pentzold, (2014).
- Once we start unpacking, we discover new aspects and new players and these
players have been constantly changing. the domains and the governments have
been constantly changing.
Why “governance”?
- This is the usage of the internet, the bottom level has no idea what is going on on the
top as it is just transmitting. these two layers depend on each other
5
- Computers can speak to each other because of protocols, which values need to be
recorded somewhere such as dictionaries.
- You need to identify the unique identifier, which is the IP address we humans
cannot remember this. we need letters since we are humans. somebody has to
keep the record of this and assign it which is happening on the technical/logical layer
this is where it becomes unambiguous and agnostic it does not care what is
happening on the top.
- It is also the vulnerability stealing a computer the technology will not care; it
just transmits information. to develop it, you do not need to negotiate with those
layers you can innovate without needing any permissions this is what it makes
great the standards are open and free.
6
Why “governance”? Why not “regulation”?
Governance as a concept
State “command-and-control” models: outdated increasing complexity
Changing role of state authorities you need some mechanisms of social control
governance cannot control everything anymore.
7
Internet + Governance: scoping the issue
Governance of what?
Infrastructure
8
Defining Internet governance: narrow approach
Narrow approach
- However, others would argue that Internet Governance should include the broader
approach.
Broad approach
9
Scope: governance “of” and “on” the Internet
Governance of the Internet
Cybersecurity
Cybercrime
Child protection
Jurisdiction
Development
- The difference between these two lies in infrastructure, connectivity and the usage
of the Internet itself, of the network, and on this network.
10
Internet governance: narrow vs broad scope
“A complete analysis of Internet governance requires that we address both narrow issues
implicated by the institutions that govern the technical infrastructure and architecture of
the Internet and the broader issues that are implicated by the ways in which the Internet
transforms policy” (Solum, 2009, p. 52).
Internet evolution will refer to how infrastructure develops, how the standards
develop, how technical bodies are governed in the network itself.
Whereas the use of Internet will refer to this upper layer, will refer to application
and to all the plethora of issues from Cybersecurity and jurisdiction to
development and parliament.
11
Internet governance: other definitions (1)
“Internet governance’ describes an open and constructive decision-making and
dialogue process of all social groups that serves to raise awareness of problems and
to find possible solutions” (German Federal Ministry for Economic Affairs and
Energy).
- The definition above is very much focused on the process itself. On the openness of
it, they say this is for all social groups that serves to raise awareness of problems and
to find possible solutions.
- The definition does not say what is governed, it only answers the question “how”.
- The definition above is not about “who governs” for example, it is about the final
outcome of rule, policies, standards and practices.
So probably this definition covers Governance “on” and “of” the Internet as well.
- The author of the definition above refers Governance to issues, not given its process
or the stakeholders, but policy and technical coordination issues related to the
exchange of information over the Internet.
12
Which definition to use?
Contested term Internet Governance
No single correct answer you can use whatever definition you want
For this course, we adopt a concept rather than a definition: the broad scope of
Internet governance
- We have the issue of critical Internet resources of how technical bodies govern the
Internet. but we will also see how geo-political tensions influence this. how
some other issues influence this technical government and how these two are
connected to each other.
We are not just going to learn about some geography behind Internet
Governance and its standards We are going to learn the multitude of geo-
political issues and tensions and look much broader than just the technical layer
of the Internet.
1. The article puts the issue of Internet governance into the broader concept of
governance and regulation and tries to frame Internet governance not only as
governance itself or some regulatory tools, but as a form of coordination not only
coordination, but reflexive coordination not only how we develop the protocols of
the Internet, but how the Internet community is able to stop and rethink what are
the triggers for this? you do not have to agree with the concept of reflexive
coordination, but it covers the concept from quite an interesting perspective.
2. This article refers to the evolution of Internet governance, however, this article is
about the evolution of academic thinking and scholarship approaches to Internet
governance. It just shows you how the academic thinking and approaches
developed in this field.
13
Part 3: Guest lecture: Evolution of Internet Governance
Internet Corporation for Assigned Names and Numbers
Responsible for the unique assignment of names and numbers, the Domain Name
System, and policies for Generic top-level domains (gTLDs) and Country code top-
level domains (ccTLDs)
- We as human beings will not remember the series of numbers, which will be used by
computers across the Internet in which they also use other protocols that will tell
computers how to respond to particular requests. these things are coordinated by
ICANN assigning names and numbers to Internet service providers and other
people that build networks.
- These names remain stable over time. however, the technical infrastructure that
is represented by their protocols and numbers and others changes massively.
The “address book” of the Internet also used by us and the networks themselves
the transmission layer between the technical layer and the content layer on top,
it is the logical infrastructure that connects us between those two parts.
14
What are Internet Identifiers?
The Internet is a mesh of networks whose operators agree to communicate using
predefined protocols (“TCP/IP”) (“Transmission Control Protocol”/”Internet
Protocol”)
Internet protocols are developed and defined by the Internet Engineering Task
Force (IETF) which is composed out of a volunteer group.
Publications called Requests For Comments (RFCs), are the equivalent of a technical
manual of the Internet they describe different elements of the Internet
15
Why do we engage? The Internet
RFC1310: “The Internet, a loosely-organized international collaboration of
autonomous, interconnected networks, supports host-to-host communication
through voluntary adherence to open protocols and procedures defined by Internet
Standards.” (around 70.000 autonomous networks)
The media is one of the highest regulated things within our society, such as news
papers and television which were always already regulated (about media).
once the Internet evolved, random anybody can do it which is the notion of
permissionless innovation.
16
- It is partially true that the Internet has its roots in the Cold War.
- The idea of a system where information could flow from the dots to the other dots.
- The traffic may bounce across the network instead of going straight.
- If one of the central nodes is taken out, it will not work is the idea.
- ARPA network defend the US department? It is more about the money rather
than defense finding funding is important.
17
Vast complexity (IPv4 only):
18
NSFnet
Domain Names
120,000 names in 1995, NSF allowed NSI to charge for name registration
Creation of ICANN
June 1998 Statement of Policy: Management of Internet Names and Addresses “to
facilitate its [USG] withdrawal from DNS management”
(2nd quarter 2021, 367.3 million domain name registrations across all TLDs)
19
Q. Earlier 1990s, who is in control:
Sets prices?
Two phases Geneva (2003) and Tunis (2005) (“prep comms” from 2002)
Internet governance: introduced to the WSIS process during the West Asia regional
prep comm in February 2003 – context was ICANN: equitable access to “critical
Internet resources”
Internet governance would be one of two most contentious issues in the Tunis phase
(other was finance and digital divide)
20
The Geneva phase gave us a definition of Internet governance
Important, not just about “critical Internet resources” – the realm of digital and
cyber
Geneva to Tunis
The WSIS Tunis Agenda for the Information Society elaborated on the question of
Internet governance and adopted a definition
The Agenda lists Internet governance issues, and establishing the Internet
Governance Forum (IGF), a multistakeholder body and space for dialogue among
equals, but convened by the UN Secretary General
These are still contested, anticipate will be the subject of discussion during WSIS+20
(2025)
21
72. We ask the UN Secretary-General, in an open and inclusive process, to convene,
by the second quarter of 2006, a meeting of the new forum for multi-stakeholder
policy dialogue – called the Internet Governance Forum (IGF). …
Interesting organizational structure for its main events and workshops, national and
regional IGF initiatives
Critics: IGF was only a ‘talk show’ without any tangible results in the form of a final
document or plan of action
Truth: IGF doesn’t really produce tangible outcomes, but it has provided valve to
release pressure to discuss governance mechanisms in other forums (this period now
ended)
22
July 2018: UN Secretary-General High Level Panel on Digital Cooperation, to
consider:
The social, ethical, legal and economic impact of digital technologies in order to
maximize their benefits and minimize their harm
UN process to “outline shared principles for an open, free and secure digital
future for all”
- The technical function of the Internet works well. Governments can influence
this?
23
- It is a primarily state process over the General Assembly?
24
Lecture 2: Internet governance: models, actors, and
processes
Today’s lecture
Part 1: Models of Internet governance
Governance vs Governments
Balance of power between sovereign nation-state governance and non-territorial
and privatized mechanisms
25
Traditional mechanisms: sovereignty and territoriality
Traditional command-and-control mechanisms
Sovereignty
Territoriality
- Governments are still trying to bring the best service to their customers
Decentralised
Owned/managed by private actors
Transborder
Global
26
Governance: how to “rule”?
“Internet governance is about governance, not governments” (Laura DeNardis, (2014). The
Global War for Internet Governance. P. 11)
Multistakeholder model
27
Emerged as a compromise between private and public interests
Open
Consensus-based
Transparent
“Equal footing” every stakeholder has the same weight. into the processes, not
only in speaking.
Command-and-control
Hierarchical structures
Multistakeholder model
Non-hierarchical
Consensus-driven
Equal footing
Open participation
- According to Mueller, these models cannot coexist. However, actually they do.
Models: drawbacks?
28
Multilateral & traditional model
- Minority of other stakeholders are not hurt.
Multistakeholder model
- Consensus takes longer including its implementation
Drawbacks
Multilateral model
Exclusive
Non-transparent
Not always able to meet the challenges of Internet governance
Multistakeholder model
29
Example: Freedom Online Coalition (FOC)
Multistakeholder governance
30
Cybersecurity most of the time relates to national security issues/multilateral
model
Part 1: Acronyms
IGF – Internet Governance Forum
31
Internet governance: “official” definition
“Internet governance is the development and application by governments, the private
sector and civil society, in their respective roles, of shared principles, norms, rules, decision-
making procedures, and programmes that shape the evolution and use of the Internet”.
(World Summit on the Information Society (WSIS), 2005)
- However, there is a small ticking bomb in the respective rules, what are they?
Governance by whom?
No unilateral system
32
Who is developing policies and performing other tasks?
Industry
“New” institutions such as ICANN (Internet Corporation for Assigned Names and
Numbers) or IETF (Internet Engineering Task Force)
International organisations
How?
- Internet is the decentralized governance, you have to remember this, the variety of
stakeholders dealing with different issues.
Variety of processes
- Various types of regulation not only by law, but also by various standards.
33
Trans-sectorality not only public or private, it is about more sectors
Fluidity new actors are coming into these spaces; new processes are being
created
No final arbiter there is no real kill switch for the whole world, ICANN is regulated
by various stakeholders. one of the weaknesses since you can mitigate issues?
Processes vs institutions
“For empirical work, studying a centralized institution is a lot more convenient than
having to identify and study a wealth of disjoined, messy and globally distributed
processes that together produce governance.” (van Eeten & Mueller (2013). Where
is the Governance in Internet Governance. New Media & Society. 15. P. 729
34
Interconnection how to connect it transborder
Universal access how to bring access to internet to remote villagers and
ensure everyone has it
Adoption of new technologies
Standardisation of this physical network
Telecommunication regulation (spectrum, competition, etc.)
Industry Associations
35
Names
Numbers
Protocols and standards?
ICANN
Internet Assigned Numbers Authority (IANA)
Number Resource Organisation]
(NRO) + 5 Regional Internet Registries (RIRs)
IETF
Standard development organisations (ETSI, W3C…)
36
Harmful content
Human Rights
E-commerce and trade
Intellectual property and copyright (and many others)
National governments
Intergovernmental organisations
Civil Society
NGOs
Industry
And many others
37
Example: key issue, human rights
38
Mapping actors and processes (don’t forget about fluidity!)
Infrastructure layer: ICT regulators, industry, standardization bodies
Logical layer: ICANN, IANA, IETF, RIRs, W3C (protocols on the top of core standards)
Economical/societal layer:
- No need to build infrastructure, new players are entering (for example: connectivity
provided to Ukraine by Elon Musk).
- Infrastructure was locked to certain actors, however, are open to new actors now.
39
Who is responsible? Who takes the leading role in the process? Is there an
institutional actor?
- Despite all the fears that Internet could not cope with everything during COVID, the
logical layer seems robust.
- Zoom in a particular issue, look in more detail to stakeholders. Try to think who has a
stake.
40
Acronyms
41
IGF – Internet Governance Forum
42
1. DeNardis, L. & Raymond, M. (2013). Thinking Clearly About Multistakeholdeer
Internet Governance
Remember: under the current regulations, the lecturer is not in the capacity to make
decisions on granting individual extensions. Contacting the lecturer directly will delay
the process of granting you extension, so please contact the study advisors first.
Assignment grading is anonymous. Therefore, you are asked not to include your
name in the document you submit.
To what extent is this definition accurate? How well, in your opinion*, does it
reflect the nature of Internet governance?
To what extent do you agree or disagree with this definition? Or with some of its
elements?
43
Think about the elements of this definition: what are they? What does each of them
mean?
Do they all – together and separately – reflect the nature of Internet governance
properly?
Is every one of these elements necessary? Does the definition include all (in your
opinion) essential concepts/elements? Are there any critical elements missing?
Note: You don’t have to answer all of these questions. They are just pointers.
Feel free to ask your questions!
You can use both sources that agree and disagree with your argument.
Remember: there is no right or wrong answer, it’s the quality of your arguments
that counts.
Grading criteria
44
Important: plagiarism
You are expected to abide by the norms governing academic honesty.
Whenever you take an idea, findings, or passage from another author, you must cite
accordingly, i.e., referencing in the text or in footnotes.
When a passage is literally copied into your work, quotation marks must be used.
Administration of the domain name system and Internet protocol addresses (IP
addresses)
Administration of the root server system
Technical standards
Peering and interconnection
Telecommunications infrastructure, including innovative and convergent
technologies
46
Internet standards
Internet standards
“The Internet works because it is based on a universal technical language”
Standard-setting
“Powerful seat of authority” (DeNardis, 2014, P.65)
Technical standards
Authority: traditional organisations and private bodies
47
IETF (no formal membership)
ITU (intergovernmental)
W3C (membership-based)
IEEE (membership-based)
Transmission control protocol and Internet protocol (TCP/IP) and other crucial
protocols: setting the technical and governance standards (IETF)
Not all of them become standards (RFCs evolve, can compete, be informational...)
Following the standards: your autonomous network can connect, share resources
and access (you can be sender or recipient)
48
Unique identifiers
- Computers need to know where to send it and where to find it.
Internet identifiers
Internet: a mesh of networks
Networks use identifiers to name or number individual computers so that these can
communicate
Names
Numbers
50
Protocol parameters: what are they?
Internet devices use predefined protocols to communicate (e.g. TCP/IP)
Example: “404” (not found): computers “know” that 404 is a special answer that
something can’t be found
Important: root zone file (here is the record in) (a database to translate all the
unique top-level names into IP addresses)
51
Who governs?
Internet Assigned Numbers Authority (IANA):
Protocol parameters
IP addresses (numbers)
Domain names
IANA: governance?
IANA functions are strictly technical
It is a database
Numbers
Names
Protocol parameters
Goal: to enable communications for equipment and software from various vendors
Computers have to know that “404” is a special answer that something can’t be
found
Somebody has to keep a record of it and let everybody know that “404” is used
52
Protocol parameters: who governs?
Policy: Internet Engineering Task Force (IETF)
Numbers
Internet protocol addressing system (IP addresses)
53
IP addresses allocation: IANA to Regional Internet Registries (RIRs)
- It takes a block of IP addresses and passes it you have to develop policies for this
keep it between regional communities
54
Who governs? Putting pieces of the puzzle together (2)
55
Domain name system (DNS)
- It is a very hierarchical thing.
Internationalised domain names (ccTLDs and gTLDs) .6r they are not written in
Latin script
The file is the main index of the Internet’s “address book” It has all the names and
numbers and know how to resolve all the domain names?
- Stability comes from redundance you should not store at one place.
- Root zone servers try to find the fastest way/route therefore it is not regional in
any form.
56
Names: who governs?
Policy and advice: ICANN community of volunteers
Contracts, policy implementation and compliance with policies and standards: ICANN
Org.
57
IANA is a function of ICANN
58
Power and control
Transnational institutions: policy development and technical coordination
Governance vs government
Part 2: Case study: ICANN and multistakeholder governance of critical internet resources
Where are we now?
IANA
Protocol parameters
IP addresses (numbers)
Domain names
59
ICANN and the US government stewardship: historical context (1998-2016)
- ICANN was in a way under the US government
- ICANN itself was created and under symbol control of the US government
A bit of history
Legend: Jon Postel was keeping a list of unique identifiers in his notebook
History
Early Internet: name resolution used a host file named HOSTS.TXT
HOSTS.TXT: problems
Naming contention
Synchronization
No centralized way to ensure that people were using the same version of the file
Bandwidth
60
Domain names
Early: 1990s unique names identifiers system: controlled by the US government
(Postel got money from the US government for a research project)
Creation of ICANN
1993: US National Science Foundation subcontracted domain name system to
Network Solutions Inc. (5-year contract)
1995: National Science Foundation allowed Network Solutions Inc. to charge a fee
for domain name registration (competition and introduction of new top=level
domain names)
1998: Creation of Internet Cooperation for Assigned Names and Numbers (ICANN)
61
US and ICANN (1998-2016): symbolic oversight or real control?
Three instruments to (potentially) control ICANN:
Any changes in the root zone file must be audited and approved by the US
Department of Commerce (The most important!)
(3) Contract between US Department of Commerce and VeriSign Inc. (US company)
on root servers
- Not only had the US control over the root zone file, but also over some resources?
Post-Snowden (2013): issues power and control over ICANN became a big
controversy so for the US it became problematic to maintain this control as the
US government created IANA?
- US government tried to negotiate since they do not wanted to have veto? ICANN
Board made the decision.
62
National Telecommunications and Information Administration’s (NTIA) requirements:
IANA transition
Transition proposal must have broad community backing and:
- 2) policies created by IANA itself can affect IANA community had to come up with
checks and balances, if it goes wrong with IANA what do we do?
63
Process 1. Transition of the IANA stewardship: PTI (Public Technical Identifiers)
- When something goes wrong they can break the contract and choose another
organization.
64
Process 2. Accountability: new community powers
- Create community powers without US Government having to approve?
- ICANN also functions as an organization on the bylaws which the community can
reject?
- If ICANN Board want to change bylaws, they need the majority to approve.
- Separate parts of the community can come together and launch a new process?
65
Transition: community effort
- ICANN Board consist of 21 people (half of them are chosen by the community)
half community, half broad pool?
66
IANA transition, governments and political battle
Inside ICANN: debates on ICANN “immunity” (not possible) and the role of the
governments
- The root zone file is US property and cannot be given away? We did not know if
the transition would happen.
1. Coordinates the allocation and assignment of names in the root zone of the Domain
Name System
3. Facilitates the coordination of the operation and evolution of the DNS root name
server system
4. Coordinates the allocation and assignment at the top-most level of Internet Protocol
numbers and Autonomous System numbers
67
ICANN: ccTLDs and gTLDs
Country code top-level domain names (ccTLDs):
68
ICANN: not only contracts
ICANN Ecosystem
Global Multistakeholder Community of volunteers
69
ICANN Ecosystem: multistakeholder community
Supporting organisations (SOs):
Making policy
70
ICANN’s multistakeholder community
Making policy
IP addresses
Country Code Top-level domains (ccTLDs)
Generic Top-level domains (gTLDs)
Providing advice
ASO
ccNSO
GNSO
71
ACs give advice and make recommendations
72
Governments: “just another stakeholder”: Mechanisms for limiting governments’
power/influence at ICANN
Participation only in an advisory capacity via GAC (Governmental Advisory
Committee)
GAC provides advice only on public policy aspects within ICANN mission
73
Participation in GNSO policy development processes and calls for consensus on the
GNSO level
The ICANN Board cannot simply reject the GAC consensus advice:
Higher threshold for rejection (may only be rejected by a vote of no less than
60% of the Board)
Trademarks protection
Accountability?
Inclusion?
Replication?
Threats?
Lessons learnt?
74
Food for thought: Russia’s war in Ukraine and “Internet sanctions”
28 February 2022: Ministry of Digital Transformation of Ukraine sent the request to
ICANN and RIPE NCC (Réseaux IP Européens Network Coordination Centre, one of
the RIRs):
to remove the Russian top-level domain names from the DNS root zone
75
“Our mission does not extend to taking punitive actions, issuing sanctions, or
restricting access against segments of the Internet – regardless of the
provocations. <...> To make unilateral changes would erode trust in the
multistakeholder model and the policies designed to sustain global Internet
interoperability.”
This is an outcome that would play into the hands of those who want a less open
Internet that can be used to enforce political decisions rather than allow open
communications across the globe”.
Acronyms
76
Lecture 4: Internet Governance and Human Rights
77
Today’s lecture
Part 1: Final exam: what to expect and how to prepare. Information and Q&A.
Part 3: Human Rights in the context of internet architecture and unique identifiers
(Guest lecturer: Avri Doria)
78
Where are we?
- We are at the issues part. the other issues will relate to this the issue of human
rights as it is the main issue.
79
Human rights: basics
Inherent to every human being, universal and inalienable
Right to life, dignity, equality, prohibition on slavery and torture, and many other
80
Individuals are entitled to human rights
However:
Freedom of expression
Privacy
Right to liberty
Positive:
Negative:
81
Obligations of states vs the role of corporations?
“Principle 11.
Business enterprises should respect human rights. This means that they should
avoid infringing on the human rights of others and should address adverse
human rights impacts with which they are involved.”
One of the steps to make the world better
In a nutshell
States: duties to protect and fulfil human rights and refrain from violations
“Everyone has the right to freedom of opinion and expression; this right includes
freedom to hold opinions without interference and to seek, receive and impart
information and ideas through any media and regardless of frontiers”.
82
How can the Internet enable human rights?
Freedom of expression
Political rights
Increased transparency
Privacy this can also be broken by the Internet
- The right of privacy can be used to violate privacy on the Internet in terms of data,
intercepting/monitoring communications, etc.
Internet can enable human rights but also facilitate violation on a scale?
Internet and human rights: what is affected most of all? (Important to remember)
83
Freedom of expression
Net Neutrality this is argued to be the basic human right in the debate
Resolution in 2018: “same rights that people have offline must also be protected
online, in particular freedom of expression, which is applicable regardless of frontiers
and through any media of one’s choice, in accordance with article 19 of <..>
How?
84
Internet shutdowns (limiting access via infrastructure) violate freedom of
expression, freedom to peaceful assembly, freedom of association
Surveillance (mass and targeted, governmental and private) violates the right to
privacy
“private actors establish boundaries to human rights online – most notably freedom
of expression, data protection, and privacy – in accordance with their respective
business models” (Zalnieriute, M & Milan, S. (2019))
GDPR
EU Digital Services Act
85
Why the logical layer?
Human rights:
Internet architecture/unique identifiers: what are the implications for human rights?
Belief: take human rights into account while shaping/designing internet architecture
Opening the doors for litigations and making ICANN an enforcer of human rights?
Human rights are affected by ICANN’s policy-making (policies can violate privacy,
enhance surveillance practices, restrict freedom of expression via restriction on the
use of generic domain names or content regulation initiatives)
- If ICANN develop a policy like this, they will violate freedom of expression.
ICANN and human rights: solution
86
Solution: human rights as a core value in the ICANN bylaw (to complete the IANA
transition)
How to implement it? Still a work in progress even 60 years after transition
- Community has to figure out how to take human rights into account when they
develop policies.
87
ICANN’s policy development process and human rights?
Internet protocols can enable human rights (not enforce and not protect)
Example: enable privacy through including privacy considerations in RFCs
88
More about IETF, ICANN and human rights in Part 3 (guest lecturer: Avri Doria)
2) Mueller, M. & Badiei, F. (2018). Requiem for a Dream: On Advancing Human Rights via
Internet Architecture.
89
Part 3: Guest Lecture Avri Doria: HR & ICANN & IETF
Human rights
Universal Declaration of Human Rights (1948)
90
Key Human Right Treaties
2016
Private entities should ensure the greatest possible transparency in their policies,
standards and actions that implicate the freedom of expression and other
fundamental rights.
91
Relevance of human rights to internet protocols and policy
WSIS Tunis Agenda (2005)
42. We reaffirm our commitment to the freedom to seek, receive, impart and
use information, in particular, for the creation, accumulation and dissemination
of knowledge. We affirm that measures undertaken to ensure Internet stability
and security, to fight cybercrime and to counter spam, must protect and respect
the provisions for privacy and freedom of expression as contained in the relevant
parts of the Universal Declaration of Human Rights and the Geneva Declaration
of Principle.
NetMundial (2014)
Rights that people have offline must also be protected online , in accordance
with international human rights legal obligations, including the International
Covenants on Civil and Political Rights and Economic, Social and Cultural Rights,
and the Convention on the Rights of Persons with Disabilities.
92
Acronyms
IETF: Internet Engineering Task Force
RFC: Name for IETF/IRTF repository documents – historical: request for comments
Fundamental questions
Are Engineering decisions value neutral?
When engineering tradeoffs are considered, what is the role of human rights?
How does one design a protocol such that it is an enabler of human rights?
Trust by users in security and privacy on the Internet is a critical part of its
success. A range of components, including robust implementations, careful
deployment, and appropriate use of security technologies, is required to create a
trusted Internet.
The IETF Security Area, with more than 20 active Working Groups
Helping collect, verify, understand, and update the state of network end-points;
and
93
RFC 6973
Abstract
The research group takes as its starting point the problem statement that human-
rights-enabling characteristics of the Internet might be degraded if they are not
properly defined, described and sufficiently taken into account in architecture and
protocol development. Not protecting these characteristics could result in (partial)
loss of functionality and connectivity.
94
Guidelines for Human Rights Considerations
95
Mapping example 1
Connectivity
Privacy
Security
Content Agnosticism
Internationalization
Censorship resistance
Open Standards
Heterogeneity support
Freedom of Expression
96
Mapping example 2
Connectivity
Decentralization
Censorship resistance
Pseudonymity
Anonymity
Security
97
Other HRPC topics under discussion
Freedom of Association
https://datatracker.ietf.org/doc/draft-irtf-hrpc-association/
Ongoing discussions
Anonymity
Internet Filtering
RFC 6973 Privacy considerations for Internet Protocols l RFC 7626 DNS
Privacy Considerations
RFC
98
IRTF
https://datatracker.ietf.org/doc/draft-irtf-hrpc-guidelines/
GAIA-GlobalAccesstotheInternetforAll https://datatracker.ietf.org/rg/gaia/about/
Acronyms
99
ICANN: Internet Corporation for Assigned Names and Numbers
From Bylaws
100
Human Rights & GPI
Section 27.2 HUMAN RIGHTS
(a) The Core Value set forth in Section 1.2(b)(viii) shall have no force or effect
unless and until a framework of interpretation for human rights ("FOI-HR") is (i)
approved
Completed Human Rights as a Core value is now fully part of the Bylaws and of the
definition of ICANN’s GPI commitment
Board is required to take the GPI into account with every decision it makes, and must
include the explanation as part of recording the decision
The Human Rights Bylaws is a fundamental part of the GPI Framework that should
be considered in the creation of recommendation and decision making.
101
Status on GPI
The GPI Framework, including a specific task for Human Rights, is integral to the
analysis being done on major projects. Currently it is a Board project though it
attempts to be transparent and involve the community.
At the end of the year the framework will be reviewed and updated, if necessary,
after community comment.
Since GPI, including Human Rights analysis, should come from the bottom up
processes, we are in the process of trying to integrate the framework into the
bottom up multistakeholder processes, i.e. the Policy Development Process (PDP)
October 2019
August 2022
102
There is a lot of opportunity for those who want to write HRIAs
103
Lecture 5: Cybersecurity, Internet fragmentation, and future
challenges for Internet governance
Today’s lecture
Part 1: Internet governance and cybersecurity
Part 3: Internet governance: future challenges and emerging issues (Guest lecturer)
“Security has been a recurring theme in the ongoing debates about internet governance,
especially as a tool for national governments seeking to claim greater authority in the
multistakeholder system”.
Way of governments to put their foot into the door. Governments are responsible for
security as a public rule. – Wolff, J. (2016)
104
Cybersecurity and Internet governance: conceptualizing the issue
- There is no agreed definition of cybersecurity, there is no conceptualization of this
issue.
Cybersecurity
different way of thinking, there is a gap in terms of how security is perceived and
conceptualized and how this conceptualization fits the model of governance.
105
Conceptualisation problems: alternative concepts?
- Cybersecurity is just one problem of making internet safe, robust, and other
processes. Internet governance community perceives cybersecurity as one
problem of many others.
Internet governance is part of the cybersecurity topic. It looks through their own lens.
- They are trying to hold the ground very firmly.
106
Conceptualising cybcersecurity in the context of Internet governance (1)
Broadening the concept of Internet governance: evolution and use of the Internet
- The notion of cybersecurity extents to ransomware, data breaches, and many other
issues. it gets very broad as it relates to every use of the Internet.
107
Conceptualising cybersecurity in the context of Internet governance (3)
Internet governance in the context of military domain and geopolitics, broader scope
of “cybersecurity”
Examples:
During the IANA transition, debates in the US over losing a strategic military
point of control (cyber) giving away IANA, the root zone server
Russia’s proposal: “Member States shall have equal rights to manage the Internet,
including in regard to the allotment, assignment and reclamation of Internet
numbering, naming, addressing and identification resources”*.
Arab states’ proposal: a state shall know where the traffic is routed
Czech Republic, Ministry of Industry and Trade’s comment on the outcome of the WCIT
2012
108
“The fundamental contradiction was shown at the very beginning, when the
Western countries refused to discuss the Internet and its governance, while China
and Russia, Arab and African countries under the guise of human rights and states’
rights were trying to tackle these issues.
<…>
Countries such as Russia and China via vassal countries were clearly promoting state
control over this media, regardless of the fact that it is currently in the scope of
business of several international organizations (e.g. UN, ICANN) and multilateral
cooperation among the various stakeholders (governmental and non-governmental
organizations, industry).”
“Stresses that some ITR reform proposals being presented by the ITU member
states would negatively impact the internet, its architecture, operations, content
and security, business relations, internet governance and the free flow of
information online”.
109
ITRs 1988 are still in force
If there is a conflict between ITRs 2012 and ITRs 1988, the earlier ITRs 1988 prevail
110
“Cybersecurity claims based on national security perspective intersected with and
almost transformed internet governance policy”. (Mueller (2017), P.418)
Emanuel Macron, IGF 2018 (Paris): data protection, security, and content regulation
“if we do not regulate Internet, there is the risk that the foundations of democracy
will be shaken”
“who better than these governments can set the law? That means that implicitly, we
accept that players, on the basis of economic dominance, or that a system has never
been discussed in practical terms, would be more legitimate than government with
regard to its own citizens <…>”
111
“At the same time, there is increased reliance on the core functions of the global and
open Internet, such as the Domain Name System (DNS), and essential Internet
services for communications and hosting, applications and data. These services are
more and more concentrated in the hands of a few private companies.
This leaves the European economy and society vulnerable to disruptive geopolitical
or technical events which affect the core of the Internet or one or more of these
companies”.
Regional and national initiatives with global impact, especially those that aim at the
technical/logical layer
Cybersecurity and the technical (logical) layer: how does cybersecurity affect governance
of the Internet?
112
Security on the technical (logical) layer: a successful story?
“Internet security governance has arguably been one of the most successful areas of
Internet governance because, despite high-profile security breaches, the Internet
overall has continued to operate”. (DeNardis. (2014). P. 106.)
However
The pressure on the technical layer is increasing:
Geopolitical tensions
concern that citizens are not safe (societal interest) spills out to the
technical layer. DNS will be affected for example Politicians have to show
that they deliver
Example 1
Example 1: ITU Council working group, Russia, and internet public core
ITU Council Working Group on International Internet-related Public Policy Issues
(CWG-Internet)
Russian proposal: Conduct the following open consultations with all stakeholders on
the topic “The role of states in ensuring the integrity, resilience and stability of the
public core of the Internet and the need for international legal acts to guarantee the
integrity, resilience and stability of the public core of the Internet”.
113
Some of these proposals may even cite or reference the GCSC definition of the public
core and reproduce the norm in full, but ignore that, for reasons detailed in the
GCSC final report, the Commission considers the multistakeholder model to be a
cornerstone of cyberstability, as well as Internet governance.”
“Operators of critical elements of the Internet basic core may be forced to comply
with the sanctions imposed by a national administration under which jurisdiction
they are located. The State is not independent in managing its online resources (IP
addresses, domain names)”.
Example 2
Example 2: EU regulatory proposals, December 2020
NIS2: extension of cybersecurity regulation to DNS and root zone servers
Upholding and preserving a reliable, resilient and secure domain name system
(DNS) is a key factor in maintaining the integrity of the Internet and is essential
for its continuous and stable operation, on which the digital economy and society
depend. Therefore, this Directive should apply to all providers of DNS services
along the DNS resolution chain, including operators of root name servers, top-
level domain (TLD) name servers, authoritative name servers for domain names
and recursive resolvers.
114
Root zone servers: stability in redundancy (a lot of instances)
- If all 13 of root servers are down, it does not make sense as the instances (copies)
will stay online?
115
- Root zone servers will not be regulated by a Parliament.
The EU’s Cybersecurity Strategy for the Digital Decade (2020): DNS root system
“The Commission intends to develop a contingency plan, supported by EU funding,
for dealing with extreme scenarios affecting the integrity and availability of the
global DNS root system.
It will work with ENISA, the Member States, the two EU DNS root server operators
and the multistakeholder community, to assess the role of these operators in
guaranteeing that the Internet remains globally accessible in all circumstances”.
Example 3
Example 3: ICANN and content regulation
116
ICANNN: narrow technical mission no content?
E.g. ccTLDs in some countries define it also as illegal content (in contrast to
technical threats)
Debates at ICANN: how much can/should ICANN coordinate registries and registrars’
responses to DNS abuse? Is it a mission creep?
some of the DNS abuse is purely technical, this is where ICANN coordinates, but it
also overlaps with other layers?
“(c) ICANN shall not regulate (i.e., impose rules and and restrictions on) services
that use the Internet's unique identifiers or the content that such services carry
or provide, outside the express scope of <ICANN’s mission>. For the avoidance of
doubt, ICANN does not hold any governmentally authorized regulatory
authority”.
117
2020: ICANN attempts to introduce the notion of “technical internet governance”
(ICANN) as being distinct from “internet governance”
Probable reasons:
States taking leading role in cybersecurity governance: how would this influence
Internet governance?
“sovereign” internets
118
WCIT: World Conference on International Telecommunications
Is Internet “fracturing”?
“A growing number of thought leaders have expressed concerns over the past two
years that the Internet is in some danger of splintering or breaking up into loosely
coupled islands of connectivity”.
Internet “fragmentation”?
119
Internet “fragmentation”: a growing concern in the absence of agreed terms and
definitions
Splintering
Fragmentation
Balkanisation
- Mueller, M. (2017)
Fragmented Internet?
The internet is now and always has been fragmented;
- Mueller, M. (2017)
120
The Internet was created as a network of networks
They use the same system of names, addresses, and routing standards
121
A question for you: What should happen to make the Internet lose this connectivity
that makes it “united”?
“A growing number of thought leaders have expressed concerns over the past
two years that the Internet is in some danger of splintering or breaking up into
loosely coupled islands of connectivity”. – Drake, Cerf & Kleinwachter (2016)
If the Internet is not fragmenting, what is the danger? Why is there an ongoing
debate?
122
Fragmentation debates: the types of fragmentation
Fragmentation on the technical/logical layer:
Of the Internet
Commercial fragmentation:
On the Internet
123
Technical/logical layer: concerns
The loss of interoperability: the creation of incompatible standards, adoption of
alternative protocols or alternatives to domain name system, or other
incompatibilities
Have these concerns become a reality? Has there been a real danger of
”splinternets”?
Solutions: dual stack (hardware runs IPv4 and IPv6 simultaneously), tunnel
(encapsulating IPv6 packets in IPv4 packets), Network Address Translation-Protocol
Translation (translates IPv6 packets into IPv4 packets)
Examples:
New Nations: domains to unrecognised states/regions that don’t have ccTLD: .ko
(Kosovo), .ku (Kurdish people), .ti (Tibet). DNS resolution via OpenNIC
124
New IP: concept proposed by Huawei and Futureway at the ITU (2019):
IETF to the ITU: “We have not seen any evidence of the need for a monolithic “New
IP” designed from the top down”
Due to the lack of specification, it is worth noting that it is difficult to see New IP as a
candidate for a protocol standard. Rather, it appears to be a list of perceived issues
about the current Internet architecture and a list of desired features”.
Commercial fragmentation
Commercial fragmentation: concerns
Geo-restrictions and geo-blocking.
“Walled gardens”: application or service provider has full control of its own digital
space via imposing Terms of Service, ”locking” the customer.
125
“The most common imagery of “governmental fragmentation” is of the global public
Internet being divided into so-called “Balkanized” or digitally bordered “national
Internets”. Movement in the direction of national segmentation could entail, inter
alia, establishing barriers that impede Internet technical functions, or block the flow
of content and transactions over the infrastructure.” - Drake, Cerf, and Kleinwachter,
2016
Digital protectionism
Great Firewall:
Filtering data flows into and outside the country with the use of Deep Packet
Inspection and IP blacklisting.
126
Data localization requirements
“Kill switch”: external concept, adversaries can disconnect Russia from the global
network
”It is a question of making choices that will be decisive for the future of our fellow
citizens by developing European technologies and alternatives, without which there
can be neither autonomy nor sovereignty.”
“The EU should include an action plan for a digital cloud – a European Internet –
in the Digital Services Act. <…> Setting up such a network would promote many
European companies and therefore boost business and drive innovation.
Like the Chinese firewall, this European internet would block off services that
condone or support unlawful conduct from third party countries”.
The EU’s Cybersecurity Strategy for the Digital Decade (2020): DNS4EU initiative
127
“The Commission also intends to contribute to secure Internet connectivity by
supporting the development of a public European DNS resolver service. This
‘DNS4EU’ initiative will offer an alternative, European service for accessing the global
Internet.”
DNS4EU:
Filtering capabilities
Blocking capabilities
Sovereign internets
Drivers/reasons are different (democratic vs authoritarian regimes):
Authoritarian regimes: silence dissent and protect the survival of the political
system.
Whatever the reasons are (democratic vs authoritarians regimes), the tools are
similar:
Removal of applications
“Sovereign” internets
128
Does “sovereign” Internet mean separated Internet?
Is Internet splintering?
Is fragmentation a myth?
Does regulation “break” (or fragment) the Internet?
Jack Goldsmith (2019):
“The normative challenges of internet governance are hard to resolve. But they
are not challenges that can fruitfully be addressed or even understood through
the scary-sounding but in fact empty notion of “fragmentation,” which is a
universal condition of the internet.”
We may think that pulling a hair or two is OK, but at some point, we’ll be bald.” -
Olaf Kolkman, Internet Society
“Alignment” (Mueller)
129
“Most of what people are now mislabeling as “fragmentation” should be called
“alignment”—an attempt to force the round peg of global communications into the
square hole of territorial states. This does not threaten the internet protocol’s
dominance, but it does erode and impair the enormous value generated by a
globally interconnected, largely selfgoverning space for trade and communication.”
Content filtering
Do you agree with M. Mueller that the term “alignment” should be used instead of
“fragmentation”?
130
Part 3: Internet governance: future challenges and emerging issues (Guest lecturer: Jan
Aart Scholte)
Outline
The (global) Internet
Governance apparatus
Governance challenges
131
Just technical?
Highly political!
Access: inclusion/exclusion
Big money
Regulatory issues
Military applications
Personal liberties
Cultural sensitivities
Democracy
Ecological effects
Bandwidth
Disability
Literacy, skillsets
Information/communications/platform/digital capitalism
Distributive justice – fair sharing of benefits and harms from the Internet
Regulation: Infrastructure
Global unity or regional and national diversities?
Splits from the existing DNS with ‘RuNet’, EU regulation of the root zone, etc.?
133
Data storage and localization
Algorithms
Privacy concerns
Dis/misinformation
Child protection
Intellectual property
Cybersecurity
Technical resiliency – keeping the Internet operational
Hacking
Phishing
Criminal networks
Democracy
134
Due participation and control by all affected parties in the policies that shape their
joint destiny
Empowerment
Involvement
Ecology
Carbon footprints (of data centres, etc.)
E-waste
Poststructuralism → ’governmentality’
Governing Actors
135
Public
Private
Global
Regional
Country
Local
136
Institutional Polycentrism
1) Transscalarity (interlinking global, regional, national and local agencies)
5) Overlapping mandates (multiple agencies claim competence over the same issues)
137
Structured Polycentrism
’It’s chaos, but it’s organised chaos.’
‘I was the only old white guy from North America among the rapporteurs, so I’m
here [on the podium].’
Actions and policy outcomes shaped by structural forces, which encourage broad
probabilities if not precise predictability
Cultural hierarchy of ritual: dress code; mode of meeting; style of debate (open mike
and confrontation); insider codes; legal cultures
138
Future challenges for Internet governance in sum
Effectiveness
Democracy
Fairness
Peace
Sustainability
139
Lecture 7: Governing the global Internet in a fragmented
world
Today’s lecture
Part 1
Part 2
140
One Net in a fragmented world?
- Fragmentation is an important concept right now.
We have “One Net”, and due to its technical layer, it can still fulfil its promise of
global connectivity
We do not live in one world: our world is fragmented by social, economic, and
geopolitical tensions
It is based on trust of various stakeholders (in DNS, in protocols and other standards)
However: in the future, various regulatory efforts can lead to competing standards
and the creation of a different “Internet”
141
- Unique identifiers internet protocols based on trust by various stakeholders
evolved because of trust historical legitimacy and trust by a wide spread
adoption.
- It might lead to the creation of a different net of networks the breach of trust in
the multistakeholder model governance might have a point here as there is a lot
of crime and it is hard to control issue of trust and control what is under
threat? = the multistakeholder model
- The actions show the lack of trust break of the global multistakeholder model.
- No questions about the first lecture on the exam as we had the essay.
- Jan Aart Scholte’s lecture will be asked on polycentrism, other guest lectures will be
less important.
- Exam questions she is sure we discussed and about materials she gave and is sure of.
142
Wrap-up: conceptual framework
State, territoriality and sovereignty in conflict with borderless networks, shared
digital spaces, and the new transnational governing bodies
Who and how sets the rules? Who has legitimacy to set the rules?
Who and how implements the rules? what kind of extraterritorial effects? How
far can states go with their rules?
Who and how enforces the rules? morality crimes and harmful content on the
Internet. cannot enforce rules further than your borders
Governance vs governments what are those respective roles within the definition
of Internet governance? Roles of the government and other stakeholders is a real
problem.
143
Topic and issues: what is shaping the future of internet governance?
Technical layer: the “survivability” of the multistakeholder model
Legitimacy
Accountability
Diversity
Inclusion
redress is in the hand of the state basically as companies just of the respect
human rights and governments have to fulfil and protect human rights.
144
Trends to watch
Digital platforms, their role in internet governance, and efforts to counter their
dominance
National regulatory developments that tackle the technical layer of the Internet
145
Governance “of” and “on” the Internet
ICANN
NRO
IETF
IANA
IGF
IGF’s policy networks: not binding, but will produce research and advice (not formal):
146
Need for reform?
UN Secretary-General Roadmap for Digital Cooperation:
1. Connect
2. Respect
3. Protect
The future of the IGF: was there a need for another high-level body?
Civil society response:
“No separate new structure should be created outside of the IGF architecture
that determines or shapes the IGF, its processes and procedures. Any body
created should be structured as peer and complementary to the MAG [IGF
Multistakeholder Advisory Group] and should not take decisions on behalf of the
IGF community”
“Outline shared principles for an open, free and secure digital future for all”
147
Reforming Internet Governance: other proposals
Blair Institute, report “The Open Internet on the Brink: A Model to Save Its Future”
D10 countries should create a Digital Infrastructure & Defence Alliance (DIDA):
Australia, Canada, France, Germany, India, Italy, Japan, South Korea, the UK and
US.
The UN, D10 and Strategic Geopolitical Status firms should form a Multi-
Stakeholder Panel on Internet Policy (MPIP), modelled on the Intergovernmental
Panel on Climate Change, to oversee the ecosystem.
148
David Clark, IETF, 1992
Coexistence?
Interdependence?
149
Open-Ended Working Group on security in the use of information and
communications technologies: multilateral process at the UN.
Challenge:
“Reconciling” multilateral and multistakeholder governance on the Internet
The Internet affects so many areas of our life that no government can know enough
150