{"id":1203,"date":"2013-10-29T16:49:14","date_gmt":"2013-10-29T20:49:14","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?p=1203"},"modified":"2014-03-20T01:00:30","modified_gmt":"2014-03-20T05:00:30","slug":"hip-pocket-analysis-of-res-1305-internet-related-public-policy","status":"publish","type":"post","link":"https:\/\/internetdistinction.com\/wsisimpacts\/2013\/10\/29\/hip-pocket-analysis-of-res-1305-internet-related-public-policy\/","title":{"rendered":"Hip Pocket Analysis of Res 1305: Internet-Related Public Policy"},"content":{"rendered":"<p>&#8212;&#8212;&#8212;- Forwarded message &#8212;&#8212;&#8212;-<br \/>\nFrom: Seth Johnson <seth.p.johnson@gmail.com><br \/>\nDate: Tue, Oct 29, 2013 at 4:49 AM<br \/>\nSubject: Fwd: IPP: Hip Pocket Analysis of Res 1305: Internet-Related Public Policy<br \/>\nTo: &#8220;ITAC@LMLIST.STATE.GOV&#8221; <ITAC@lmlist.state.gov>, &#8220;Minard, Julian E&#8221; <MinardJE@state.gov><\/p>\n<p>Attached please find the below commentary in Word and PDF formats<br \/>\nalong with the original Resolution 1305.  With my apologies, please<br \/>\nuse these copies instead of the ones I sent within the last hour.<br \/>\n<a href='https:\/\/internetdistinction.com\/wsisimpacts\/files\/2014\/03\/Notes-on-Annex-to-Res-1305.pdf'>Notes on Annex to Res 1305<\/a><\/p>\n<p>(Revisions in a couple of places reflect my preference to use careful<br \/>\nlanguage treating the types of networks more even-handedly.)<\/p>\n<p>Seth<\/p>\n<p>On Mon, Oct 28, 2013 at 6:55 PM, Seth Johnson <seth.p.johnson@gmail.com> wrote:<br \/>\n> Hi all, there are actually a good many more &#8220;mandate&#8221; sources that one<br \/>\n> could list in the Res 1305 Annex&#8217;s second column.  But I don&#8217;t think<br \/>\n> adding those would do much to add insight to the IPP group&#8217;s efforts.<br \/>\n><br \/>\n> In the following, I offer comments on the IPP areas that can serve as<br \/>\n> the &#8220;hip pocket&#8221; analysis Paul suggested you&#8217;d want to bring.  I&#8217;ll<br \/>\n> turn this into a pdf tomorrow, but for now, use the following text<br \/>\n> version.<br \/>\n><br \/>\n> The following points are meant to present the point that the CWG may<br \/>\n> undermine their own purposes if they proceed to present this list of<br \/>\n> policy areas without recognizing the distinction between competing and<br \/>\n> interoperating providers creating an Internet, and networks that may<br \/>\n> be IP-based but are governed by a core authority that sets common<br \/>\n> policy across routers that it controls.<br \/>\n><br \/>\n> The policy areas in the Annex fall into three sets:<br \/>\n><br \/>\n> I) Items 4, 5, 6, 7, 11 and 12 are all cybersecurity-related.  They<br \/>\n> cover security, safety, continuity, sustainability, and robustness,<br \/>\n> cybercrime, spam, misuse of the Internet, privacy and personal<br \/>\n> information, and protecting children online.  These emphases reflect<br \/>\n> the points of Geneva Action Line C5, on &#8220;Building confidence and<br \/>\n> security in the use of ICTs.&#8221;<br \/>\n><br \/>\n> The Cybersecurity resolutions generally speak in terms of \u201cICTs\u201d and<br \/>\n> \u201ctelecommunications\/ICTs,\u201d and only refer to the Internet, IP-based<br \/>\n> networks or Next-generation networks in a few instances. They use the<br \/>\n> term Internet in relation to spam and child online protection and in<br \/>\n> reference to these various areas as being Internet-related public<br \/>\n> policy areas within the scope of ITU, including Council Resolution<br \/>\n> 1305, which I am analyzing.<br \/>\n><br \/>\n> Spam, child online protection, and general categories of concerns such<br \/>\n> as security, safety, continuity, sustainability, robustness, and<br \/>\n> misuse of the Internet, whether related to Internet resources such as<br \/>\n> domain names and addresses or more general concerns related to the<br \/>\n> Internet, can arguably be addressed by approaches that accord<br \/>\n> responsibility to end users or individual networks.  Enforcement of a<br \/>\n> policy by a central authority across networks may have effects on the<br \/>\n> autonomy and liberty of end users and network providers and the<br \/>\n> flexibility of the platform produced when they interoperate.<br \/>\n><br \/>\n> WTSA 50 and PP 130 refer to work being undertaken by ITU-T Study Group<br \/>\n> 17 on \u201cNational IP-based Public Network Security Centers.\u201d IP-Based<br \/>\n> networks constituted of routers that are under a core policy or<br \/>\n> authority can implement security measures in ways that are very<br \/>\n> different from the kinds of approaches that may be taken among<br \/>\n> autonomous, competing providers interoperating through the use of IP.<br \/>\n> If confidence and security policies depend on forms of oversight like<br \/>\n> those available within a managed service framework, the platform that<br \/>\n> results will be subject to those policies rather than relying on the<br \/>\n> participants in the network providing for the same purposes<br \/>\n> themselves.<br \/>\n><br \/>\n> No distinction is made in the ITU framing documents between these two<br \/>\n> types of networks.  Proceeding with implementing public policy for<br \/>\n> confidence and security without recognizing the nature of the Internet<br \/>\n> as distinct from an intranet that may transmit packets in specialized<br \/>\n> ways among the routers it controls, will not only impact the nature of<br \/>\n> the platform, but it will affect numerous WSIS goals.<br \/>\n><br \/>\n><br \/>\n> 2) Items 2, 8, 9 and 10 are more &#8220;developmental.&#8221; Items 9 and 10, on<br \/>\n> &#8220;Developmental aspects of the Internet&#8221; and &#8220;capacity building for<br \/>\n> Internet governance in developing countries,&#8221; both reference WTDC<br \/>\n> Resolutions 17 and 20.  Given that WTDC 17 is cited by Plenipotentiary<br \/>\n> Resolution 137, which promotes &#8220;next-generation network deployment in<br \/>\n> developing countries,&#8221; we can easily see that failing to distinguish<br \/>\n> the special characteristics of the Internet while addressing policy on<br \/>\n> &#8220;developmental aspects of the Internet&#8221; will easily encourage the<br \/>\n> implementation of NGNs without recognizing the difference.  WTDC 20<br \/>\n> addresses non-discriminatory access to telecom facilities and<br \/>\n> applications as well as the pursuit of partnerships, and is referenced<br \/>\n> by WTDC Resolutions in the areas of the enabling environment, capacity<br \/>\n> building and digital inclusivity and ICT applications in general.<br \/>\n> While non-discriminatory access is a critical value, competition among<br \/>\n> autonomous providers can serve these same purposes through a flexible<br \/>\n> and open Internet platform, supporting infrastructure development,<br \/>\n> empowerment of communities and sustainability and diversity of<br \/>\n> applications on a stronger basis. Non-discrimination policy is more<br \/>\n> applicable to intranet offerings or a vertically integrated<br \/>\n> telecommunications context, and cannot offer the advantages of real<br \/>\n> competition among independent providers producing an Internet<br \/>\n> platform.<br \/>\n><br \/>\n> Item 2, on International Internet Connectivity, does not list WTDC 23<br \/>\n> under the ITU mandate column.  This should be added and it should be<br \/>\n> pointed out that the provision under &#8220;recognizing&#8221; should add language<br \/>\n> that recognizes that not all commercial practices to reduce costs are<br \/>\n> associated with the general purpose transmissions of packets that<br \/>\n> enable independent networks to interoperate.  Connectivity to the<br \/>\n> broader international Internet does not necessarily mean the network<br \/>\n> at the national level supports general purpose internetworking between<br \/>\n> autonomous network providers:<br \/>\n><br \/>\n> Adding one paragraph to WTDC 23<br \/>\n> (internetdistinction.com\/wsisimpacts\/wsis\/wtdc\/wtdc_23\/ )<br \/>\n><br \/>\n> recognizing<br \/>\n>     a) that commercial initiatives by service providers have the<br \/>\n> potential to deliver cost savings for Internet access, for example<br \/>\n> through the development of more local content and the optimization of<br \/>\n> Internet traffic routing patterns in a manner that provides for a<br \/>\n> greater proportion of traffic to be routed locally;<br \/>\n> <Add><br \/>\n>     b) that charging principles for international Internet<br \/>\n> connectivity must recognize that some commercial initiatives by<br \/>\n> providers of international connectivity to the broader Internet may<br \/>\n> take the form of practices within their networks that must be<br \/>\n> distinguished from Internet connectivity, notwithstanding cost<br \/>\n> advantages of these practices, since they are not consistent with the<br \/>\n> flexible mode of interoperability among competitive, autonomous<br \/>\n> Internet providers that the Internet protocols make possible,<br \/>\n> <\/Add><br \/>\n><br \/>\n> Item 8, on &#8220;availability, affordability, reliability, and quality of<br \/>\n> service, especially in the developing world,&#8221; references values that<br \/>\n> are often offered as advantages that managed or specialized service<br \/>\n> network frameworks make possible.  The ITU will easily misrepresent<br \/>\n> the nature of the open Internet platform if it does not distinguish it<br \/>\n> from specialized service offerings.<br \/>\n><br \/>\n><br \/>\n> 3) And Items 1 and 3 fit are &#8220;more technical,&#8221; addressing<br \/>\n> internationalized domain names and international public policy issues<br \/>\n> pertaining to Internet resources such as domain names and addresses.<br \/>\n> Under this heading, WTSA 47 and 48 note in connection with ccTLDs and<br \/>\n> IDNs that intergovernmental organizations have had and should continue<br \/>\n> to have a role in coordination of Internet-related public policy<br \/>\n> issues, and that international organizations have had and should<br \/>\n> continue to have a role in development of Internet-related technical<br \/>\n> standards and relevant policies.  WTSA 49, on ENUM, valorizes<br \/>\n> convergence in reference to the integration of telecommunications and<br \/>\n> the Internet.  WTSA 64 refers to IP addresses as fundamental resources<br \/>\n> key to the development of IP-based networks and the world economy.<br \/>\n><br \/>\n> For these resolutions, we simply note that networks do not necessarily<br \/>\n> afford the key characteristics and advantages of the Internet simply<br \/>\n> by dint of their using IP addresses, and it is critical to recognize<br \/>\n> that the Internet addresses the problem of interoperating between<br \/>\n> autonomous networks, while other types of IP-based networks seek to<br \/>\n> implement functions that do not use the Internet Protocol in this way.<br \/>\n><br \/>\n><br \/>\n> That&#8217;s it!  I didn&#8217;t go into specific impacts on WSIS purposes so<br \/>\n> much, but the point should be plain: that it doesn&#8217;t serve the ITU or<br \/>\n> the WSIS project well to fail to recognize how the Internet is unique.<br \/>\n>  The oversight can be shown to directly undermine numerous values that<br \/>\n> the WSIS ostensibly supports.<br \/>\n><br \/>\n><br \/>\n> Seth<br \/>\n <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;&#8212;&#8212;- Forwarded message &#8212;&#8212;&#8212;- From: Seth Johnson Date: Tue, Oct 29, 2013 at 4:49 AM Subject: Fwd: IPP: Hip Pocket Analysis of Res 1305: Internet-Related Public Policy To: &#8220;ITAC@LMLIST.STATE.GOV&#8221; , &#8220;Minard, Julian E&#8221; Attached please find the below commentary in Word and PDF formats along with the original Resolution 1305. With my apologies, please use [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1203","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/posts\/1203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1203"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/posts\/1203\/revisions"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/categories?post=1203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/tags?post=1203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}