SlideShare a Scribd company logo
1 of 23
THE REALITY OF INTERNET GOVERNANCE Ian Brown, Oxford Internet Institute
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Legitimacy and Internet governance ,[object Object],[object Object],[object Object]
National Security Agency ,[object Object],[object Object],[object Object],[object Object]
Encryption control timeline 1976:  New Directions in Cryptography , Diffie & Hellman 1978:  A Method for Obtaining Digital Signatures and Public-Key Cryptosystems , Rivest/Shamir/Adleman:  c  =  m e  mod  n ;  m  =  c d  mod  n 1990: PGP software released via Usenet. Author Phil Zimmerman pursued through courts for 3 years 1977-: NSA attempts to ban publication of cryptographic publications; to control funding of cryptography research; and to ban export of cryptographic software 1993: Al Gore leads US  attempts to mandate key escrow 1992: AT&T announce DES phone Matt Blaze
Encryption rhetoric ,[object Object],[object Object],[object Object]
Encryption realpolitik ,[object Object],[object Object],[object Object]
Encryption control unravels 1995: Netscape adds encrypted links, enabling e-commerce boom  1997: OECD rejects attempts to mandate key escrow in its  Guidelines for Cryptography Policy 1996: IETF declares: “Cryptography is the most powerful single tool that users can use to secure the Internet. Knowingly making that tool weaker threatens their ability to do so, and has no proven benefit.” 1997: European Commission declares key escrow should be limited to that which is “absolutely necessary” 2001: US essentially abandons export controls
NSA summary ,[object Object],[object Object],[object Object]
WIPO ,[object Object],[object Object]
© rhetoric ,[object Object],[object Object],[object Object]
Technological Protection Measures ,[object Object],[object Object]
Implementations ,[object Object],[object Object],[object Object],[object Object]
TPM realpolitik ,[object Object],[object Object],[object Object]
WIPO summary ,[object Object],[object Object]
ICANN ,[object Object],[object Object],[object Object]
ICANN governance ,[object Object],[object Object],[object Object]
ICANN rhetoric ,[object Object],[object Object],[object Object]
ICANN realpolitik ,[object Object],[object Object],[object Object]
ICANN summary ,[object Object],[object Object]
Comparison Encryption control Anti-circumvention Identifier management Policy objective Maintain intelligence and law enforcement intercept capability Maintain excludability of information goods Maintain a stable and secure addressing system Stakeholders SIGINT agencies, law enforcement (US: NSA, NSC, DoJ), software co s Copyright holders, trade and IP agencies, consumer electronics firms Registrants, registrars, trademark holders Legitimacy Source; little transparency Source, some process Multi-source, extreme process, result Framing Terrorists, paedophiles Piracy is killing music Private-sector innovation Sites COCOM/Wassenaar, OECD, G8, special envoy WIPO, US-EU-Japan coordination, FTAs, special 301 procedure  The travelling circus Counter-framing Anti-Big Brother, US business interests Defective by design, anti-innovation, anti-competitive, anti-fair use Anti-democratic, US-dominated Main challenges Open source software, 1 st  amendment, economic espionage, consumer preferences, campaigners Open source software, P2P networks, consumer preferences, Apple market power, campaigners Finding consensus across extreme range of stake-holders; legitimacy
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612rswhitt1
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the InternetJon Lebkowsky
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Who's Who in Internet Politics
Who's Who in Internet PoliticsWho's Who in Internet Politics
Who's Who in Internet Politicsaugustodefranco .
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 

What's hot (19)

Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612
 
Rkcsi2012
Rkcsi2012Rkcsi2012
Rkcsi2012
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Isa12a
Isa12aIsa12a
Isa12a
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
TH Privacy 8-15
TH Privacy 8-15TH Privacy 8-15
TH Privacy 8-15
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Polinter11
Polinter11Polinter11
Polinter11
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
 
Polinter10
Polinter10Polinter10
Polinter10
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Polinter08
Polinter08Polinter08
Polinter08
 
Polinter08
Polinter08Polinter08
Polinter08
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Who's Who in Internet Politics
Who's Who in Internet PoliticsWho's Who in Internet Politics
Who's Who in Internet Politics
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 

Viewers also liked

ICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governanceICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governanceJohn Macasio
 
GIC Introduction to Internet Governance
GIC   Introduction to Internet GovernanceGIC   Introduction to Internet Governance
GIC Introduction to Internet GovernanceDiploFoundation
 
Building Awareness of "Internet Governance" in Indonesia
Building Awareness of "Internet Governance" in IndonesiaBuilding Awareness of "Internet Governance" in Indonesia
Building Awareness of "Internet Governance" in IndonesiaIndriyatno Banyumurti
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet GovernanceDiploFoundation
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview Glenn McKnight
 
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunNode 科技創業新聞網
 

Viewers also liked (6)

ICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governanceICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governance
 
GIC Introduction to Internet Governance
GIC   Introduction to Internet GovernanceGIC   Introduction to Internet Governance
GIC Introduction to Internet Governance
 
Building Awareness of "Internet Governance" in Indonesia
Building Awareness of "Internet Governance" in IndonesiaBuilding Awareness of "Internet Governance" in Indonesia
Building Awareness of "Internet Governance" in Indonesia
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet Governance
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
 
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
PunProbe x NII 協進會《網路治理 Internet Governance》——吳國維執行長
 

Similar to Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Governance

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Policing Piracy 2011
Policing Piracy 2011Policing Piracy 2011
Policing Piracy 2011Rob Jewitt
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)Felipe Prado
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.BarCamp Lithuania
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 

Similar to Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Governance (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Policing Piracy 2011
Policing Piracy 2011Policing Piracy 2011
Policing Piracy 2011
 
Software piracy
Software piracySoftware piracy
Software piracy
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Chapter2
Chapter2Chapter2
Chapter2
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 

Recently uploaded

Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...mitaliverma221
 
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime YamunanagarYamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagarmeghakumariji156
 
I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397Riya Singh
 
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries""Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"Aarisha Shaikh
 
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
 UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATIONChandrakantDivate1
 
Tinted Sunscreen For Soft and Smooth Skin
Tinted Sunscreen For Soft and Smooth SkinTinted Sunscreen For Soft and Smooth Skin
Tinted Sunscreen For Soft and Smooth SkinUniqaya Lifestyle
 
💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...
💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...
💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...Sheetaleventcompany
 
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...rajveerescorts2022
 
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service ZirakpurZirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service ZirakpurSheetaleventcompany
 
Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...Nitya salvi
 
📞 Contact Number 8617370543VIP Hardoi Call Girls
📞 Contact Number 8617370543VIP Hardoi Call Girls📞 Contact Number 8617370543VIP Hardoi Call Girls
📞 Contact Number 8617370543VIP Hardoi Call GirlsNitya salvi
 
Chicwish Clothing: A Critical Review of Quality, Fit, and Style
Chicwish Clothing: A Critical Review of Quality, Fit, and StyleChicwish Clothing: A Critical Review of Quality, Fit, and Style
Chicwish Clothing: A Critical Review of Quality, Fit, and Stylechicwishreview
 
Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...
Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...
Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...Nitya salvi
 
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime TirunelveliTirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelvelimeghakumariji156
 
Top 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechTop 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechStelon Biotech
 
Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...
Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...
Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...rajveermohali2022
 
9867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x7
9867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x79867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x7
9867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x7Pooja Nehwal
 
Introduction to Fashion Designing for all
Introduction to Fashion Designing for allIntroduction to Fashion Designing for all
Introduction to Fashion Designing for allMuhammadDanishAwan1
 
Payal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace Colaba
Payal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace ColabaPayal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace Colaba
Payal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace ColabaPooja Nehwal
 
9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...
9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...
9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...Pooja Nehwal
 

Recently uploaded (20)

Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
 
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime YamunanagarYamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
 
I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397
 
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries""Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
"Paltr Packaging: Streamlined Order Process for Seamless Deliveries"
 
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
 UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
UNIVERSAL HUMAN VALUES - INTRODUCTION TO VALUE EDUCATION
 
Tinted Sunscreen For Soft and Smooth Skin
Tinted Sunscreen For Soft and Smooth SkinTinted Sunscreen For Soft and Smooth Skin
Tinted Sunscreen For Soft and Smooth Skin
 
💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...
💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...
💚Call Girl In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girls No💰Advance Cash...
 
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
 
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service ZirakpurZirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
 
Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In Raigad Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
 
📞 Contact Number 8617370543VIP Hardoi Call Girls
📞 Contact Number 8617370543VIP Hardoi Call Girls📞 Contact Number 8617370543VIP Hardoi Call Girls
📞 Contact Number 8617370543VIP Hardoi Call Girls
 
Chicwish Clothing: A Critical Review of Quality, Fit, and Style
Chicwish Clothing: A Critical Review of Quality, Fit, and StyleChicwish Clothing: A Critical Review of Quality, Fit, and Style
Chicwish Clothing: A Critical Review of Quality, Fit, and Style
 
Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...
Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...
Escorts Service Model Hathras 👉 Just CALL ME: 8617697112 💋 Call Out Call Both...
 
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime TirunelveliTirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
 
Top 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechTop 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon Biotech
 
Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...
Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...
Kharar Call Girls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort Se...
 
9867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x7
9867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x79867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x7
9867746289 - Payal Mehta Book Call Girls in Versova and escort services 24x7
 
Introduction to Fashion Designing for all
Introduction to Fashion Designing for allIntroduction to Fashion Designing for all
Introduction to Fashion Designing for all
 
Payal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace Colaba
Payal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace ColabaPayal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace Colaba
Payal Mehta 9867746289, Escorts Service Near The Taj Mahal Palace Colaba
 
9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...
9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...
9867746289, Unveiling the Secrets of Russian Escort Services in Mumbai, Vashi...
 

Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Governance

  • 1. THE REALITY OF INTERNET GOVERNANCE Ian Brown, Oxford Internet Institute
  • 2.
  • 3.
  • 4.
  • 5. Encryption control timeline 1976: New Directions in Cryptography , Diffie & Hellman 1978: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems , Rivest/Shamir/Adleman: c = m e mod n ; m = c d mod n 1990: PGP software released via Usenet. Author Phil Zimmerman pursued through courts for 3 years 1977-: NSA attempts to ban publication of cryptographic publications; to control funding of cryptography research; and to ban export of cryptographic software 1993: Al Gore leads US attempts to mandate key escrow 1992: AT&T announce DES phone Matt Blaze
  • 6.
  • 7.
  • 8. Encryption control unravels 1995: Netscape adds encrypted links, enabling e-commerce boom 1997: OECD rejects attempts to mandate key escrow in its Guidelines for Cryptography Policy 1996: IETF declares: “Cryptography is the most powerful single tool that users can use to secure the Internet. Knowingly making that tool weaker threatens their ability to do so, and has no proven benefit.” 1997: European Commission declares key escrow should be limited to that which is “absolutely necessary” 2001: US essentially abandons export controls
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Comparison Encryption control Anti-circumvention Identifier management Policy objective Maintain intelligence and law enforcement intercept capability Maintain excludability of information goods Maintain a stable and secure addressing system Stakeholders SIGINT agencies, law enforcement (US: NSA, NSC, DoJ), software co s Copyright holders, trade and IP agencies, consumer electronics firms Registrants, registrars, trademark holders Legitimacy Source; little transparency Source, some process Multi-source, extreme process, result Framing Terrorists, paedophiles Piracy is killing music Private-sector innovation Sites COCOM/Wassenaar, OECD, G8, special envoy WIPO, US-EU-Japan coordination, FTAs, special 301 procedure The travelling circus Counter-framing Anti-Big Brother, US business interests Defective by design, anti-innovation, anti-competitive, anti-fair use Anti-democratic, US-dominated Main challenges Open source software, 1 st amendment, economic espionage, consumer preferences, campaigners Open source software, P2P networks, consumer preferences, Apple market power, campaigners Finding consensus across extreme range of stake-holders; legitimacy
  • 22.
  • 23.