A Deference to Protocol
A Public Policy Framework for the Internet Era
Richard S. Whitt
Motorola Mobility LLC

CITI Conference -- September 24, 2012
I) Introduction



Stage Setting: No nerds allowed
Status Check: Danger signs ahead


                         ITU

                               You
                                are
                               here



               PIPA / SOPA




       Start
The Challenge: Confusion about
“The Cloud”
II) The Emergent Effects




Net Benefits
               Innovation


                 Economic Growth


                 Free Flow of Information


               User Empowerment and
               Human Flourishing
III) The Net’s Fundamental Architecture


Micro-Phenomenon: The
Internet’s basic design features

                 What               • Modular Assembly

                                    • End-to-End
                 Where                Principle
                                    • Network of
                  Why                 Networks

                  How               • Agnostic Protocols
III) The Net’s Fundamental Architecture




Defining the Net’s Functions


                             Upper Layers
                             (Apps / Content Functions)
                             Middle Layers
                             (Logical Functions)

                             Lower Layers
                             (Physical Functions)
IV) The Internet Policy Principle




Above all else…
Respect the functional integrity of the
Internet
V) A Grounded Public Policy Framework




Policy Solutions in Three Dimensions


                                   Players




                           Rules
     Functions
VI) Putting It All Together




An Internet Policy Framework
            Upper    •
                     •
                         Applications / Content Functions
                         Private / Public Goods
                     •   Multi-Stakeholder approach (FTC)
            Layers   •   Cautious stance



            Middle   •
                     •
                         Logical Functions
                         Public Goods
                     •   Polycentric Governance (NIST?)
            Layers   •   Deferential stance



            Lower    •
                     •
                         Physical Functions
                         Private / Public Goods
                     •   Multi-Stakeholder approach (FCC)
            Layers   •   Cautious stance
VII) Real Life Examples


• PIPA / SOPA
• Internet Governance




          ???             ???

        Policy           Policy
       Concern          Solution
Thanks!

More Related Content

PDF
Gérald Santucci
PPT
Down the Rabbit Hole
PPT
Media & Limits To Free Speech in the 21st Century
PDF
Recalculating: how we design the internet of things from the user up and the ...
PPT
Internet Society Hong Kong -- Chapter introduction
PDF
Tata kelola internet workshop 2013
ODP
Introduction to Internet Governance and Cyber-security
PDF
Lecture 2011.05B - FOSS Communities and the Spread of Free (Digital Sustainab...
Gérald Santucci
Down the Rabbit Hole
Media & Limits To Free Speech in the 21st Century
Recalculating: how we design the internet of things from the user up and the ...
Internet Society Hong Kong -- Chapter introduction
Tata kelola internet workshop 2013
Introduction to Internet Governance and Cyber-security
Lecture 2011.05B - FOSS Communities and the Spread of Free (Digital Sustainab...

What's hot (13)

PDF
Copyright in the Internet of Things
PPT
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
PDF
Dissent as strategy - Cathleen Berger
PPTX
Internet Governance by Its History (1966-2000)
ODP
KIoT - Kit for the internet of things
PPT
Presentation computer
PDF
Emerging internet trends that will shape the global economy
PPTX
Making Better Internet Policy: An Analysis of the National Information Infras...
PPTX
Open data MISA_ON November 2011
PPT
20130103 cedar symposium durable data infraastructure
PPT
NGI Mobile Identity Utility
Copyright in the Internet of Things
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Dissent as strategy - Cathleen Berger
Internet Governance by Its History (1966-2000)
KIoT - Kit for the internet of things
Presentation computer
Emerging internet trends that will shape the global economy
Making Better Internet Policy: An Analysis of the National Information Infras...
Open data MISA_ON November 2011
20130103 cedar symposium durable data infraastructure
NGI Mobile Identity Utility
Ad

Similar to Whitt citi conference presentation.final.10.17 (20)

PDF
20100120 Pvm Cherchez La Federation
PDF
Internet Science
PPT
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
PDF
Canberra Gov2 0 Oct09 Pm
PPT
New ICT Governance and the Resilience Principles
PDF
Qo E E2 E4 Net Neutrality Leo Van Audenhove
PDF
14b concord and-fines-damaskopoulos
PDF
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
PDF
Jacques Bus F I I R L Presentation J B
PPTX
Regulating Code - EUI Workshop
PDF
Seserv concertation-01
PDF
Presentation at ENISA summer school
PDF
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
PDF
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
PPT
Towards a Future Internet
PDF
Osimopolitika20v2
PPTX
Rebooting digital identity: how the social web is transforming citizen behavi...
PPTX
Marsden #icis2013
PPT
Strategic Relevance of the Internet Science Network of Excellence to Future I...
PPT
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
20100120 Pvm Cherchez La Federation
Internet Science
Seserv workshop costas courcoubetis - introduction to tussle analysis metho...
Canberra Gov2 0 Oct09 Pm
New ICT Governance and the Resilience Principles
Qo E E2 E4 Net Neutrality Leo Van Audenhove
14b concord and-fines-damaskopoulos
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Jacques Bus F I I R L Presentation J B
Regulating Code - EUI Workshop
Seserv concertation-01
Presentation at ENISA summer school
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
Towards a Future Internet
Osimopolitika20v2
Rebooting digital identity: how the social web is transforming citizen behavi...
Marsden #icis2013
Strategic Relevance of the Internet Science Network of Excellence to Future I...
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Ad

Whitt citi conference presentation.final.10.17

  • 1. A Deference to Protocol A Public Policy Framework for the Internet Era Richard S. Whitt Motorola Mobility LLC CITI Conference -- September 24, 2012
  • 3. Status Check: Danger signs ahead ITU You are here PIPA / SOPA Start
  • 4. The Challenge: Confusion about “The Cloud”
  • 5. II) The Emergent Effects Net Benefits Innovation Economic Growth Free Flow of Information User Empowerment and Human Flourishing
  • 6. III) The Net’s Fundamental Architecture Micro-Phenomenon: The Internet’s basic design features What • Modular Assembly • End-to-End Where Principle • Network of Why Networks How • Agnostic Protocols
  • 7. III) The Net’s Fundamental Architecture Defining the Net’s Functions Upper Layers (Apps / Content Functions) Middle Layers (Logical Functions) Lower Layers (Physical Functions)
  • 8. IV) The Internet Policy Principle Above all else… Respect the functional integrity of the Internet
  • 9. V) A Grounded Public Policy Framework Policy Solutions in Three Dimensions Players Rules Functions
  • 10. VI) Putting It All Together An Internet Policy Framework Upper • • Applications / Content Functions Private / Public Goods • Multi-Stakeholder approach (FTC) Layers • Cautious stance Middle • • Logical Functions Public Goods • Polycentric Governance (NIST?) Layers • Deferential stance Lower • • Physical Functions Private / Public Goods • Multi-Stakeholder approach (FCC) Layers • Cautious stance
  • 11. VII) Real Life Examples • PIPA / SOPA • Internet Governance ??? ??? Policy Policy Concern Solution

Editor's Notes

  • #2: Good morning. I’m pleased to be here today to briefly discuss some thoughts on a new framework that policymakers can employ to tackle many of today’s most pressing online issues.The chief purpose is to base the framework on a deep grounding in the Internet’s actual design architecture.The primary takeaway is straightforward: Policymakers should do what they can to understand and respect the Net’s structural and functional integrity.
  • #3: Many of you will remember last fall, as Congress was considering legislation to block the online dissemination of unlawful content -- SOPA and PIPA. Both bills were based on the same premise: impose certain technical requirements on website owners, search engines, ISPs, and other entities.Dozens of notable network engineers had pointed out, however, that the proposed means of filtering the Internet’s Domain Name System, and interfering with routine naming and routing functions, was problematic on at least two scores. First, it could be easily circumvented by people with the right technical know-how. Second, both the tech mandates and the circumventions would adversely affect countless innocent online activities. In other words, the pending legislation suffered from both ineffectiveness, or under-inclusion, and collateral damage, or over-inclusion. It was a bad functional fit to the goal of minimizing online content piracy. Strangely, those voices were not heard in any of the Congressional debates. Instead, the bills moves forward in both chambers and appeared close to passage.Of course many of you know what happened next. On January 18th a host of online companies participated in “Internet Blackout Day.” In protest over the SOPA/PIPA bills, over 115,000 websites committed what was the Web’s version of a collective work stoppage. Lawmakers received some 14 million email messages from users. The response was swift – the legislation would not be brought to the floor of either chamber. Despite their absence in the deliberations, the Internet nerds, it seems, had won the day.So why is that not the end of the story?
  • #4: Despite the Internet Blackout Day, it is fair to say that many in Congress still do not have an informed appreciation for the structural and functional nature of the Net. Instead, the debate turned into a classic political battle, won only by unconventional but straightforward lobbying tactics, rather than the power of legitimate ideas. The SOPA/PIPA battle is just one of the major policy bookends for 2012. This December, the International Telecommunication Union (ITU) will be considering dozens of member-nation proposals that could have the effect of imposing government regulations on Internet activities.With SOPA/PIPA, politics as usual won the moment. Frankly this is not a desirable outcome. Such shows of political force are usually difficult to replicate, complicated to harness, and can quickly lose their novelty and impact. Moreover, while most impressive and effective, at least for the moment, the show of force convinced politically, without convincing intellectually.
  • #5: For all practical purposes, the Internet is becoming the chief operating system for society. And yet, confusion and misapprehension about how the Net functions – its basic design attributes and architecture– remains frighteningly high. Perhaps the Net community shares some of the blame for this predicament. For too long we urged policymakers simply to look the other way whenever talk about Internet regulation surfaced. After all, many of us simply laughed when a certain US Senator railed about the Net as a “series of tubes,” or a certain US President referred to “the internets” and “the Google” We were convinced that ignorance about the Net – just a big mysterious, amorphous cloud, right? – would lead our politicians to shy away from imposing law and rules. Just “don’t regulate the Internet,” whatever that means, and all would be fine. Unfortunately it has become painfully obvious that the days of easy sloganeering are over. It is time for the Internet community to explain itself. A new slogan may now be appropriate. A more modest but well-grounded one, to “respect the functional integrity of the Internet.”
  • #6: Obviously the Internet has fostered numerous collective “Net benefits.” In brief these include: -- user innovation. Years of research show that the Internet actually provides the optimal background conditions for the creation and dissemination of innovations. Cerf: “innovation without permission.”-- economic growth. As economist Paul Romer puts it, “technological change is the heart of economic growth.” If it were a national economy, the Internet would rank in the world’s top five.-- the free flow of information. The Internet facilitates free expression and the marketplace of ideas.-- user empowerment and human flourishing. We should not overlook the very real benefits at what some call “the social layer.” Consumers are now empowered users and entrepreneurs and digital citizens.Of course, we also have what could be called “Net Challenges,” bad acts like dissemination of child pornography and denial of service attacks and online content theft. Importantly, the fundamental design features built into the Internet’s architecture actually facilitate the background conditions necessary to produce and enhance both the many beneficial properties, and the not-so-beneficial ones as well.And what are those basic design features that fuel both Net benefits and Net challenges?
  • #7: The policy framework I have in mind takes seriously the design attributes built into the Internet. There are four of them, by my count:-- modular assembly (the “what” function); layering is the overall structural architecture of the Net, in which functional tasks are divided up and assigned to different software-based protocol layers – physical, logical, apps, etc.-- end-to-end control (the “where” function); this translates to some as “smart edges, dumb core,” but the basic point is that many functions can be more completely and correctly implemented at the network end points.-- interconnected networks (the “why” function); the overall rationale of moving traffic from Point A to Point B, using a network of networks; open and voluntary interoperability is the baseline goal embedded in the architecture.-- agnostic protocols (the “how” function); IP acts as the ubiquitous bearer protocol, supporting countless user activities and networks alike.These design features were derived organically and bottom-up, in open and transparent standards processes, through years of rough consensus from well-understood engineering principles.I use the term “integrity” to describe how these design elements fit together and function cohesively to create the user’s overall experience of the Internet.
  • #8: So, how can we get more precise in terms of defining what we are trying to promote?Here I will employ the martini glass, rather than the more traditional hour glass, to explore the Net’s functions by using the modular model built into its structure. In short, you are what you do. Of the seven layers of the original OSI stack, one can delineate between three groupings of functions: those in the Lower Layers, the Middle Layers, and the Upper Layers. The Middle Layers functions constitute the narrow yet essential waist of the martini glass. These are the basic addressing and routing functions of the Internet:Layer 5: Session (HTTP, DNS)Layer 4: Transport (TCP)Layer 3: Network (IP)They constitute the demarcation between software facing inward and talking to the network, and software facing outward and talking to users; the “glue” that holds the Internet together. All four of the basic design attributes run through, and help define, these crucial Middle Layers. This also constitutes the place in the network where the various Internet standards bodies like IETF and W3C do their thing.The Lower Layers functions are the world of telecom networks and standards. They define the communications standards, protocols, and interfaces, such as Ethernet, WiFi, DSL, and DOCSIS, as well as the physical infrastructure itself. Upper Layers functions reside in Layers 6 and 7. Layer 6 is the world of end user applications, while Layer 7 is all the content and services generated by these interactions.
  • #9: The overarching principle I am proposing is that policymakers should respect the functional integrity of the Internet, and resist government regulation that would violate or compromise the Net’s fundamental design attributes, located in the Middle Layers. My reasoning is that over the years the Internet was designed in a certain way, with certain standards processes, for very sound engineering reasons, and that its functionality has produced a raft of user benefits. Those design attributes and standards processes remain in place today.Where policymakers need to deal with Net challenges – the bad acts and actors – they should avoid adopting legal mandates that violate the Net’s functional integrity.Such tech mandates often represent a poor fit to the perceived policy challenge. In particular, this lack of fitness threatens to be under-inclusive (and thus not effective) and/or over-inclusive (and thus imposing collateral damage on innocent activities). In short, the ends and the means should align.
  • #10: We need a way to frame correctly the policy debates involving the Internet. Here, I suggest using three different dimensions: the right functional target (Code), the right institutions (Rules), and the right organizations (Players).Just as important as what you do is how you do it. In assessing how to approach a perceived policy concern involving the Internet, there is more than just figuring out which functional aspect of the network to target. The policymaker also must determine the institutional tool to utilize, and the organizational entity to carry it out. A key takeaway is that there is a wide range of both institutions and organizations available to help structure market relationships.As long as we are sensitive to the tradeoffs involved with each of the three dimensions of Code, Rules, and Players, we can come up with some optimal policy solutions.
  • #11: Here is a concise summary of my suggested Internet policy framework, as represented by a flaming adult beverage. Layers here provides the framing; the focus is on the three dimensions of the relevant functions and players and processes.One implication is clear: national and international political bodies should defer to the Middle Layers functions of the Internet, the pure “public commons.” The technical community there is actively engaged – via an impressive degree of transparency, participation, expertise, and accountability -- in figuring out where and how to draw the line between the way the Net has been operating, and where it will go from here. Policymakers should practice what Benkler calls “regulatory abstinence.”At the same time we should recognize a more explicit system of national overlays and underlays (aimed respectively at Upper and Lower Layers activities).
  • #12: Finally, let’s talk quickly about two real-life examples.We’ve already touched on SOPA/PIPA. Both bills suffered from the same common defect: they sought to regulate functions in all three Layers , in order to address concerns about specific Upper Layers activities. This constitutes a classic layers-violation, one that is both over-inclusive (by harming substantial innocent uses) and under-inclusive (by failing to address technically-feasible alternatives). One also could see the proposed action as a violation of end-to-end design.A solution suggested by some, “follow the money,” has the virtue of targeting the basis for the concern – the lucrative nature of selling stolen content – without creating either functional undertargeting or overtargeting concerns. It may not be the right overall solution, but it is the right type of solution.A second example is the ITU, poised for the first time to regulate Internet-based activities. As an arm of the UN, the ITU engages in government-to-government negotiations over int’l telecom traffic. But in the WCIT conference in December, the ITU will be considering a host of troubling nation-member proposals. Some would make the telecom recommendations mandatory, thus supplanting the existing multi-stakeholder bodies for standards development. Other proposals would override existing methods of Internet naming, numbering, and addressing; regulate IP routing; and extend the scope of the regs to include Internet companies. The European telecom carriers have submitted their own proposal to expand the regs to include Internet connectivity, and seeking a “sending party network pays” compensation scheme that essentially levies a content fee on foreign websites. All of these proposals would impose telecom-style regulation of the Internet’s Middle Layers activities.In addition to possibly adopting bad substance, the ITU is also far from a multistakeholder model of openness and transparency. Thus the ITU seems to violate all three dimensions of the Internet policy framework: the wrong functional targets (Upper Layers activities and Middle Layers protocols), the wrong institutional tool (an international telecom treaty), and the wrong organizational body (the UN’s chief telecom regulator). The solution here is straightforward: the ITU should stick to its telecom knitting.
  • #13: Thank you very much.