Question 1: The Distribution of Authority in Cyberspace

Similar documents
Fall 2015 INTERNATIONAL RELATIONS in the CYBER AGE. The Course is in Three Parts

Internet Governance and G20

Evolving the Ecosystem: Institutional Innovation in Global Internet Governance

ICANN Reform: Establishing the Rule of Law

Lessons from ICANN: Is self-regulation of the Internet fundamentally flawed?

IT for Change's Contribution to the Consultations on Enhanced Cooperation being held at the United Nations Headquarters in New York in December 2010

INTERNET SOCIETY -ISOC COMMENTS ON THE REPORT OF THE WGIG

EXPERT GROUP ON THE INTERNATIONAL TELECOMMUNICATION REGULATIONS

The Strategic Significance of the Internet Commons

Framing the Question, "Who Governs the Internet?"

The political economy of the Internet Governance: why is Africa absent

Optimize Web Presence in China

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

Internet Governance An Internet Society Public Policy Briefing

INTERNET GOVERNANCE: STRIKING THE APPROPRIATE BALANCE BETWEEN ALL STAKEHOLDERS

REVISOR FULL-TEXT SIDE-BY-SIDE

SECURITY, INTERNET RIGHTS AND PRINCIPLES: POWER SHIFTS AND IMPLICATIONS FOR INTERNET POLICY-MAKING IN INDIA

Internet Governance and the Domain Name System: Issues for Congress

CANADIAN INTERNET FORUM

Independence and Accountability: The Future of ICANN. Comments of the Center for Democracy & Technology. submitted to

Internet Governance and the Domain Name System: Issues for Congress

End user involvement in Internet Governance: why and how

Improving the lives of migrants through systemic change

regard the current stewardship of the Internet as inadequate to meet the public interest, or in some cases, as a source of risk.

CRS Report for Congress

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996)

Plaintiff SCOTT STEPHENS (hereinafter Plaintiff ) through his attorney respectfully alleges: INTRODUCTION

A Democratic Framework to Interpret Open Internet Principles:

The Importance of International Cooperation on Internet Governance

TELECOMMUNICATIONS ACT Seal of Liberia REPUBLIC OF LIBERIA

Internet Governance and the Domain Name System: Issues for Congress

HERDING SCHRÖDINGER S CATS: SOME CONCEPTUAL TOOLS FOR THINKING ABOUT INTERNET GOVERNANCE

Debating privacy and ICT

COUNCIL OF EUROPE AND THE INTERNET

Addressing the ultimate form of cyber security control: a multiple case study for the Internet kill switch

Internet Governance and the Domain Name System: Issues for Congress

Panel 2: National Data Governance in a Global Economy

A BILL 1. This Act may be cited as the Cyberspace Privacy Act of.

Netizen Participation in Internet Governance

The Electronic Communications Act (2003:389)

OPPORTUNITIES FOR INVESTMENT IN THE ICT AND COMMUNICATIONS TECHNOLOGY SECTOR OF THE SADC REGION

Internet Governance and the Domain Name System: Issues for Congress

Internet Governance and the Domain Name System: Issues for Congress

THE FREE FLOW OF KNOWLEDGE AND A SPACE FOR A PARTNERSHIP IN MONGOLIA

AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT

The Diffusion of ICT and its Effects on Democracy

Role of Governments in Internet Governance. MEAC-SIG Cairo 2018

Internet Policy and Governance Europe's Role in Shaping the Future of the Internet

THE SLIPPERY SLOPE. David W. Maher Senior Vice President - Law & Policy Public Interest Registry

The State of Multi-stakeholderism in International Internet Governance Internet Governance Task Force September 11, 2014 Chicago

on the Commission Communication on Internet Policy and Governance - Europe`s role in shaping the future of Internet Governance

Internet Domain Names: Background and Policy Issues

Terms & Conditions of Entry (the Official Rules )

Competition Rules for the Visa d or franceinfo: Award for the best Digital news story 2018 sponsored by

The freedom of expression and the free flow of information on the Internet

REMARKS AT THE DIGITAL BROADBAND MIGRATION: EXAMINING THE INTERNET S ECOSYSTEM

The Role of Non-State Actors in Regime Formation

INFORMATION PRIVACY STATUTES AND REGULATIONS

How can new media strengthen. 16th Operation Lifesaver International Symposium Navigating Rail Safety

WEBSITE TERMS OF USE AGREEMENT

Regional Integration as a Conflict Management Strategy in the Balkans and South Caucasus

What s All This Internet Governance Talk and Why do I Care? Welcome to ISO Layer 9.and Above Suzanne Woolf, ISC 2005 OARC Workshop

CONNECTING THE DOTS: INTERACTIONS IN INTERNET RIGHTS AND SECURITY IN INDIA

Ownership of Site; Agreement to Terms of Use

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

In this unit we are going to speak about globalization.

LEGAL TERMS OF USE. Ownership of Terms of Use

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

NATIONAL FFA ORGANIZATION 2016 CHAPTER T-SHIRT DESIGN CONTEST OFFICIAL RULES

DRAFT RECOMMENDATION ON THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE OUTLINE

Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan

Thinking Clearly about Multistakeholder Internet Governance

PREVENTING VIOLENT EXTREMISM ONLINE


IP JUSTICE JOURNAL: Internet Governance and Online Freedom Publication Series

Contribution of the International College of AFNIC to the WSIS July 2003

Beyond Internet Universalism: A Framework for Addressing Cross-Border Internet Policy

Finland's response

TITLE 44 PUBLIC PRINTING AND DOCUMENTS

The Future of Internet Governance: Should the U.S. Relinquish Its Authority Over ICANN?

ICANN s GAC and the Global Governance of the Internet: The role of the EU in bringing government back to Internet governance DRAFT

This is for everyone: how to govern the internet as a global commons

The Future of Internet Governance: Should the United States Relinquish Its Authority over ICANN?

Data, Social Media, and Users: Can We All Get Along?

VI.7. Media Policy and the Public Interest. Introduction. Globalisation and New Regulatory Paradigm. Marc Raboy

Sovereign Difference and Sovereign Deference on the Internet

WITSA s Statement of Policy on International Trade in ICT Goods and Services: April 2016

Resolution adopted by the General Assembly on 23 December [without reference to a Main Committee (A/69/L.49 and Add.1)]

Application of David Easton s Model of Political System to the World Wide Web

Information & Communications Technology Committee (ICT) FAQ Document Social Media

THE WASHINGTON DECLARATION

Internet Governance 5+ years after Tunis. Yrjö Länsipuro

Introduction to Global Internet Governance. Internet Week Guyana 9/13 October 2017

Uses and Effects of New Media on Political Communication in the United States of America, Germany, and Egypt

THE CITY OF NEW YORK DEPARTMENT OF INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS

GUIDELINE 6: Communicate effectively with migrants

Justice Needs in Uganda. Legal problems in daily life

Framework of engagement with non-state actors

EVALUATION OF AMNESTY INTERNATIONAL S EGYPT CRISIS AND TRANSITION PROJECT

What if we all governed the Internet?

Transcription:

Question 1: The Distribution of Authority in Cyberspace 1 MIT Student Cyberpolitics in IR Professor Choucri December 10, 2015

Today, 3.3 billion Internet users about 45% of the world s population sent 149 billion emails, ran 3 billion Google searches, and wrote 412 million Tweets. 1 For contrast, approximately 1.2 billion active phone lines existed worldwide in 2014. 2 Unlike other, less powerful forms of communication such as radio, television, or landline telephones the Internet has no clear authority or single governance structure. Yet given the importance and ubiquity of the Internet as a tool for communication and potential harm, questions of Internet governance are crucial in the study of global politics. Despite the emergence of other actors, such as private corporations, non-state terrorist groups, or international NGOs, international politics today is still dominated by nation-states demarcated by territorial boundaries. Notably, however, the influence of states does not map directly onto the cyber domain. Instead, a plurality of actors clamor for authority, including states, nonprofit institutions such as the Internet Corporation for Assigned Names and Numbers (ICANN), epistemic communities such as the Internet Engineering Task Force (IETF) and the Internet Society, multinational Internet service providers, private companies, and civil society. In this diverse topography of actors, where is authority located? This paper will seek to answer the question of how authority is dispersed across the Internet. I will utilize a layered model of the Internet, and argue that different types of authority, coming from different sources, are present at each layer. I will discuss how traces of realism, institutionalism, and contructivism at the code layer of the Internet contribute to the structure of authority. Finally, I will put this analysis in the context of the debate about multilateral versus multistakeholder models of Internet governance, and discuss the implications for governance at each layer of the Internet if one or the other position prevailed. Ultimately, I argue that while state governments have primary authority over the content layer of the Internet, non-state institutions such as ICANN and the World Wide Web Consortium (W3C) have authority over the code layer. Authority over the physical underpinnings of the Internet is primarily in the hands of corporations, tightly regulated by state governments. Clark describes the Internet as a layered construction with seven distinct levels. At the base, the physical layer of the Internet comprises the copper fibers, the radio waves, the undersea 1 According to Internet Live Stats, a website which gathers data on Internet users and web traffic. Internet Live Stats has been cited by the World Wide Web Consortium and by Tim Berners Lee, and can be found at http://www.internetlivestats.com/ 2 The World Factbook 2013-14. Washington, DC: Central Intelligence Agency, 2013. 2

cables, and all physical infrastructures needed to support the Internet. Above that, the datagram layer, transport layer, and three protocol layers govern the packaging, coordination, and transport of data. The sixth layer comprises the language with which Internet users navigate the content of the Internet, and the seventh and highest-level layer is the content of the Internet itself the usergenerated Tweets, web pages, photographs, and other information that is generated and distributed on the Internet. In analyzing the locations of authority in the Internet, it will be useful to abstract from Clark s detailed depiction to Lessig s three-layered model of the Internet. Slightly less refined, Lessig s model comprises a physical layer (corresponding to the first layer in Clark s model), a content layer (corresponding to the seventh layer in Clark s model), and a code layer, which subsumes the remainder of Clark s model. Though each layer of the Internet has its own distinctive features which pose unique challenges to governance, the overall governance structures operating in the middle five layers are similar enough that to abstract to Lessig s model does not entail too great a loss of detail. This paper will therefore examine the dynamics of authority and governance at each of the three layers of the Internet. However, it is first useful to clarify the concept of authority, and in particular, to distinguish between authority and power. It is also useful to describe the conditions under which an actor such as a government might delegate authority to an agent, ceding its own control, and the potential consequences of doing so. Hall and Biersteker describe an authority as an actor which perform[s] the role of authorship over some important issue or domain. They claim to be, perform as, and are recognized as legitimate by some larger public as authors of policies, of practices, of rules, and of norms. They set agendas, they establish boundaries or limits for action, they certify, they offer salvation, they guarantee contracts, and they provide order and security. 3 Crucially differentiating authority from power is the legitimacy of claims of authority, which derives from consent. 4 Cowey and Mueller argue that governments are likely to delegate to nongovernmental authorities in order to reap efficiency gains and to create gains from specialization and expert 3 Hall, Bruce and Thomas Biersteker "The Emergence of Private Authority in Global Governance," Ch. 1. The Emergence of Private Authority in Global Governance. Cambridge University Press. 2002. Page 4. 4 Ibid, p. 5. 3

knowledge. 5 Cowey and Mueller also describe two distinct processes by which a principal may come to delegate to an agent. First, a principal may delegate to an agent by a formal act of deliberative delegation. However, it may also be the case that a principal becomes interested in an area where there is a preexisting agent who emerged for other reasons. 6 In this case, the principal, such as a state government, could accept the existing agent as an authority, could try to modify the agent s scope of authority, or could try to replace the agent altogether. In the context of the Internet, these claims are consistent with Cerny s argument that a growing gap between the capacity of the state to provide and the demands for public goods will result in an erosion of state power and a curtailment of state activities, since the sheer volume of demand for Internet services overwhelms the capacity of a single state. 7 But to who could the state delegate authority and what consequences might delegation entail? Haas argues that under conditions of uncertainty when the state seeks to create gains from expert knowledge epistemic communities may gain authority as legitimate international actors. 8 Epistemic communities may provide information, or take part in setting and enforcing policy. Haas argues that epistemic communities may bound the range of collective choice by excluding options from policy debate, or help identify state interests. However, Cowey and Mueller describe several strategies by which states might reduce the autonomy of such agents, including through stacking the deck in the agency s personnel system or in outside advisory processes to ensure that people favorable to the goals of the principals have a disproportionate role. 9 Thus, even before analyzing the dynamics of Internet authority, several predictions can be made. First, non-state organizations may have more authority in areas that require technical knowledge or expertise. Second, even in cases where non-state actors appear to have authority, state governments may have taken steps to curtail their autonomy. Finally, authority may be most contested in areas where pre-existing agents accrued authority prior to the involvement of the state. 5 Cowey, Peter and Milton Mueller. "Delegation, Networks and Internet Governance" in Kahler, Networked Politics: Agency, Power, and Governance. Cornell University Press. 2009. Pages 174-175. 6 Ibid, p. 176. 7 Cerny, Philip G. 1995. "Globalization and the Changing Logic of Collective Action." International Organization 49 (4): 595-625. 8 Haas, Peter M. 1989. The Fourth Image Reversed: Epistemic Communities and Knowledge Based Bargaining as a Response to Uncertainty." prepared for delivery at the 1989 Annual Meeting of the American Political Science Association, Atlanta, Georgia. August 30-September 3, 1989. 9 Cowey and Mueller, p. 176. 4

Authority in the Content Layer The content layer of the Internet comprises the content of webpages, Tweets, blog posts, videos, photographs, and all user-generated material. Policy objectives of authority in the content layer include controlling illegal and harmful content, consumer protection, data protection, and control of spam. 10 These objectives mainly fall into the domain of authority of the state controlling crime and protecting citizens from criminal activity is a well-established prerogative of state governments, and the legitimate authority of the state to protect its citizens in the real world extends into the cyber domain as well. In addition, the instruments available for achieving the policy objectives, combined with the prevailing standards and enforcement mechanisms, create an environment where state governments exercise most authority, though their jurisdiction is fragmented across territories. To protect data and consumer information, and to control spam and illegal content, organizations can implement certification systems, encryption schemes, and programs to filter unwanted content. 11 While the creation of these programs may be delegated to private authorities, state governments are the primary standard setters when it comes to Internet content. To demonstrate this, consider the following legislation passed by U.S. Congress: the Communications Decency Act (1997), the No Electronic Theft Act (1997), the Children s Online Privacy Protection Act (1999), the Digital Millennium Copyright Act (1998), the Anti- Cybersquatting Consumer Protection Act (200), the Electronic Communications Privacy Act (2000), and the USA Patriot Act (2001). These policies set the standards for appropriate Internet content, protecting users from harmful content, from malicious attacks, and enforcing intellectual property law. Since these standards are encoded in law, enforcement also falls to the state. Authority in the Code Layer The code layer of the Internet is the area in which the state had the least pre-existing legitimacy. In comparison, organizations such as ICANN, W3C, and IETF had both the technical knowledge and the capacity to establish themselves as legitimate authorities. In some cases, the 10 Caral, J. "Lessons from ICANN: is self-regulation of the Internet fundamentally flawed?' International Journal of Law and Information Technology, Volume 12 (1) 1-31. Page 12. 11 Ibid, p. 13. 5

state was content to delegate authority to these institutions. However, where the interests of the state conflict with the established interests of these non-state institutions, contestation over authority comes to a head. The IETF, W3C, and ICANN are the primary standard-setters for the code layer of the Internet, with the IETF developing communications standards, W3C developing document standards for the World Wide Web to ensure that text, graphics, audio, and video are accessible and displayable, and ICANN developing standards for the Internet s domain name and addressing system. 12 Delegation to these institutions is predicted by Haas s theory of epistemic communities, and indeed, the U.S. government did recognize its own inability to act as a standard-setter for the Internet. The Framework for Global Electronic Commerce, developed by the Clinton administration in 1997, delegated standard-setting authority away from the government, establishing that: The marketplace, not governments, should determine technical standards and other mechanism for interoperability on the Internet. Technology is moving rapidly and governments attempts to establish technical standards to govern the Internet would only risk inhibiting technological innovation. 13 Caral argues that because of the technical expertise required to effectively govern the code layer, and because non-compliance with set standards results in non-inclusion in the Internet, that government enforcement is not necessary and self-regulation among the three principal non-state actors is the source of authority in the code layer. However, this depiction belies the contestation between global, decentralized governance and the interests of the nationstate system. In particular, contentions have arisen around delegation of authority over critical Internet resources, defined by Mueller as the governance of Internet standards, domain names, and IP addresses as well as the interconnection and routing arrangements among Internet service providers. 14 These critical Internet resources are the choke points of the Internet among the 12 Caral, p. 9. 13 President William J. Clinton & Vice President Albert Gore, Jr., A Framework for Global Electronic Commerce. July 1, 1997. 14 Mueller, Milton L. Networks and States, 2010. Cambridge, MA.: MIT Press, Chapter 8. 6

few points of global leverage, according to Mueller, and the points of the networks that states had almost no control over. 15 However, as predicted previously, the United States government constructed ICANN in a way that would give it a disproportionate influence it stacked the deck in favor of its priorities. 16 In particular, the U.S. government disproportionately empowered the Internet technical community and intellectual property owners. In addition, it retain[ed] policy authority over the root zone file, requiring ICANN to submit any proposed changes to the Department of Commerce for approval, and any approved changes are implemented by a U.S. corporation. Thus, non-state actors are the primary authorities in the code layer of the Internet, but state governments in general, and the U.S. government in particular, still exert low levels of control. The code layer of the Internet is relevant to the content layer, since the architecture of the code layer determines how, when, and to whom content is accessible. It is in the code layer that ideals from constructivism, institutionalism, or realism would have the most impact on how people use the Internet. The architecture of the Internet was built to ensure free and rapid communication. It was intentionally designed to allow the spread of ideas, and innovation within the network, close to ideals of constructivism, which views the spread of ideas as a causal agent for change. One effect of the Internet, to promote new forms of collaboration and overcome problems of collective action, is identified with the institutionalist mode of thought. Absent from the design of the Internet were concerns for security, jurisdiction, and identity of individuals key realist concerns. It is relevant that the state, which has authority in the content layer, has diminished authority in the layer of the Internet where design choices are made that affect the ability of the state to regulate its borders, provide for its security, and identify its citizens. Presumably, had the state more influence in the code layer of the Internet, realist concerns about security and jurisdiction would be more strongly manifest in the underlying architecture of the Internet. Authority in the Physical Layer 15 Ibid, p. 216. 16 Cowey and Mueller, p. 187. 7

There is precedent for the state to have authority in matters of national infrastructurebuilding. The state has a history in overseeing the development by private companies of railroads, telephone lines, and telecommunications networks, and this precedent creates the legitimate authority for the state to regulate the infrastructure of the Internet. However, the private companies which build the infrastructure for the Internet differ from historical examples in that they are multinational, and their operations cross through multiple jurisdictions. Nevertheless, there are mechanisms for states to regulate private companies even ones which cross jurisdictions. Caral looks to the example of international banking to see how governments have imposed order on entities which cross territorial borders, and suggests that the level of co-operation among public and privates regulators be increased to deal with ambiguities arising from unclear jurisdiction. Thus, at the physical layer of the Internet, private companies have a large role in building infrastructure, but state governments have the authority to regulate and oversee these companies. A Multilateral Model of Governance Given this structure of authority distribution in the Internet, a multistakeholder versus multilateral model of Internet governance would most likely be manifest at the code layer. A multilateral model of governance, in which states are the primary authorities, might see a fundamental shift in the organization of the DNS system and root zone files. The current arrangement represents a multistakeholder model, and is what allows for relatively free and open communication. States, which are generally more concerned with issues of security and jurisdiction, might arrange the domain name system to support a number of separate networks, corresponding to each territorial state, connected at a few, tightly controlled, bottleneck points. This would clarify the issue of jurisdiction, and give states a monopoly over the ability to control access to their network by non-citizens. Conclusion Ultimately, authority it distributed in different ways at different levels of the Internet. At the content layer and physical layer, the state can rely on its legitimate power to protect its 8

citizens and control crime, and regulate corporations, respectively. However, at the code layer, where the state has neither the technical expertise nor the preexisting mandate, non-state nonprofit organizations have accrued authority. Nevertheless, the state has tried to reassert its authority over these institutions, and the United States government in particular retains some key elements of control over crucial Internet resources. The distribution of authority in the Internet may shape key functionalities of the Internet itself, and if it were to change, could be reflected in changes to the underlying design of the Internet which would alter how it could be used. Yet in some sense, checks and balances of power exist between authorities at different layers of the Internet, since each layer depends on all others to operate to its full potential. 9

Works Cited Caral, J. "Lessons from ICANN: is self-regulation of the Internet fundamentally flawed?' International Journal of Law and Information Technology, Volume 12 (1) 1-31. Page 12. Cerny, Philip G. 1995. "Globalization and the Changing Logic of Collective Action." International Organization 49 (4): 595-625. President William J. Clinton & Vice President Albert Gore, Jr., A Framework for Global Electronic Commerce. July 1, 1997. Cowey, Peter and Milton Mueller. "Delegation, Networks and Internet Governance" in Kahler, Networked Politics: Agency, Power, and Governance. Cornell University Press. 2009. Pages 174-175. Haas, Peter M. 1989. The Fourth Image Reversed: Epistemic Communities and Knowledge Based Bargaining as a Response to Uncertainty." prepared for delivery at the 1989 Annual Meeting of the American Political Science Association, Atlanta, Georgia. August 30-September 3, 1989. Hall, Bruce and Thomas Biersteker "The Emergence of Private Authority in Global Governance," Ch. 1. The Emergence of Private Authority in Global Governance. Cambridge University Press. 2002. Page 4. Mueller, Milton L. Networks and States, 2010. Cambridge, MA.: MIT Press, Chapter 8. 10

MIT OpenCourseWare http://ocw.mit.edu 17.445 / 17.446 International Relations Theory in the Cyber Age Fall 2015 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.