Paper No.206web PDF
Paper No.206web PDF
Four Internets:
The Geopolitics of
Digital Governance
Kieron O’Hara and Wendy Hall
CIGI Papers No. 206 — December 2018
Four Internets:
The Geopolitics of
Digital Governance
Kieron O’Hara and Wendy Hall
CIGI Masthead
Executive
President Rohinton P. Medhora
Deputy Director, International Intellectual Property Law and Innovation Bassem Awad
Chief Financial Officer and Director of Operations Shelley Boettger
Director of the Global Economy Program Robert Fay
Director of the International Law Research Program Oonagh Fitzgerald
Director of the Global Security & Politics Program Fen Osler Hampson
Director of Human Resources Laura Kacur
Deputy Director, International Environmental Law Silvia Maciunas
Deputy Director, International Economic Law Hugo Perezcano Díaz
Director, Evaluation and Partnerships Erica Shaw
Managing Director and General Counsel Aaron Shull
Director of Communications and Digital Media Spencer Tripp
Publications
Publisher Carol Bonnett
Senior Publications Editor Jennifer Goyder
Senior Publications Editor Nicole Langlois
Publications Editor Susan Bubak
Publications Editor Patricia Holmes
Publications Editor Lynn Schellenberg
Graphic Designer Melodie Wakefield
Communications
For media enquiries, please contact [email protected].
@cigionline
1 Executive Summary
1 Introduction
3 Openness
13 Conclusion
14 Works Cited
17 About CIGI
17 À propos du CIGI
About the Authors
Kieron O’Hara is an associate professor in
electronics and computer science at the University
of Southampton, UK. His interests are in the
philosophy and politics of digital modernity,
particularly the World Wide Web; key themes
are trust, privacy and ethics. He is the author
of several books on technology and politics, the
latest of which, The Theory and Practice of Social
Machines (Springer, with Nigel Shadbolt, David
De Roure and Wendy Hall), will appear in 2019.
He has also written extensively on political
philosophy and British politics. He is one of the
leads on the UK Anonymisation Network, which
disseminates best practices in data anonymization.
vi CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
About the Global Security Acronyms and
& Politics Program Abbreviations
The Global Security & Politics Program at CIGI AI artificial intelligence
focuses on a range of issues in global security,
conflict management and international governance CNIL Commission Nationale de
— a landscape that continues to change l’Informatique et des Libertés
dramatically. Such changes are widely evident in
DNS domain name system
the growing rivalry between China and the United
States in the Asia-Pacific and the emergence of new FCC Federal Communications Commission
economic powers in the region, such as Indonesia;
the divergent ways Canada, Russia and the GDPR General Data Protection Regulation
United States perceive Arctic security as melting
ice opens up the Northwest Passage; continuing IETF Internet Engineering Task Force
debates about the humanitarian imperative as
IP Internet Protocol
the world confronts new crises in Africa and the
Middle East; and new areas of concern such as IPv4 IP version 4
cyber warfare and the security of the internet.
IPv6 IP version 6
With experts from academia, national agencies,
international institutions and the private ISPs internet service providers
sector, the Global Security & Politics Program
supports research in the following areas: Arctic SNSs social networking sites
governance; Asia and the Pacific; fixing climate
VoIP Voice over Internet Protocol
governance; governance of conflict management,
with a focus on Africa; global politics and W3C World Wide Web Consortium
foreign policy; and internet governance.
2 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
offers, and each becomes normative — the internet
Internet governance bodies are reflexively open. The most famous statement of this philosophy
The Internet Engineering Task Force (IETF), is John Perry Barlow’s “Declaration of the
which develops open internet standards, is highly Independence of Cyberspace,” which rejects
participatory and transparent. Participation any idea that cyberspace needs real-world
is not restricted by credentials, and the IETF’s institutions and remedies, arguing:
documentation and records are open and freely
available, allowing oversight and accountability. Cyberspace consists of transactions,
The IETF prefers to approve standards that do not relationships, and thought itself, arrayed
rest on intellectual property and patents; where like a standing wave in the web of
these do exist, it prefers royalty-free licensing. our communications. Ours is a world
The World Wide Web Consortium, or W3C, has a that is both everywhere and nowhere,
similar policy with open standards and opposition but it is not where bodies live.
to royalties, although it has a membership model
and accepts institutions of any kind as members. We are creating a world that all may
enter without privilege or prejudice
Openness of governance begets openness accorded by race, economic power,
of technology. Until relatively recently, the military force, or station of birth.
operation of the network ignored the content
of the packets of information that were routed We are creating a world where anyone,
around it. Routing algorithms applied to all anywhere may express his or her beliefs,
packets indiscriminately, and the routers had no matter how singular, without fear of
no access to the content to derive grounds for being coerced into silence or conformity.
discrimination. The headers of the packets, which
Your legal concepts of property, expression,
contain the metadata about, for example, where
identity, movement, and context do
the packets are headed, were the only things
not apply to us. They are all based on
read. In this sense, there was no interference with
matter, and there is no matter here.
the flow of information around the internet.
…The only law that all our constituent
Support for this open system is often very idealistic.
cultures would generally recognize
Yochai Benkler argues in his book The Wealth of
is the Golden Rule. (Barlow 1996)
Networks (2006, 131) that “the emergence of less
capital-dependent forms of productive social
organization [offers] the possibility that the Concerns about Openness
emergence of the networked information economy Until recently, it was assumed that this philosophy
will open up opportunities for improvement in of openness and liberty would carry all before it,
economic justice, on scales both global and local.” but many of the challenges facing authoritarian
opponents of openness 10 years ago (O’Hara 2009)
Hence, admiration of the technical brilliance of the have been overcome. Benkler’s warm approval is
internet design combines with an idealistic view of not the only possible reflection on the design of the
its affordances (what it, as an environment, offers internet, especially when we think of that design
the individual), a view which itself bifurcates. as a socio-technical construct rather than as a set
The admirer of the technology approves not only of elegant technical protocols. Most obviously,
of the speed and efficiency with which data can the very idea of openness — in trade, migration,
travel from A to B, but also more generally of capital movements and so on — is under threat
free speech, free association and other aspects across the globe following the 2008 financial
of individual liberty. The result is a libertarian crisis, and of course the open internet has been a
vision of the internet focused on its affordances, key part of globalization. Furthermore, openness
somewhat divorced from any messiness resulting does not always guarantee equitable outcomes —
from its collision with quotidian offline existence. Silicon Valley has been called “a monoculture of
On this view, the brilliant and elegant design white male nerds” in which companies founded
complements the excitement of the freedom it
3 Described at www.w3.org/P3P/ and now obsolete. It demanded rather a A coda: the internet requires design, standards
lot of investment from users for only equivocal gains.
and cooperative behaviour. This necessity
4 See www.w3.org/TR/tracking-dnt/; at the time of writing, this is a W3C implies one final response to the internet, a
recommendation, but it remains unclear what exactly it means when a
user asks an application not to track her.
human response that elaborate systems tend to
4 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
invite — subversion. Plain vandalism is a possible for the information they carry, fall directly
response to the complexity and elegance of the within governments’ remit to legislate or not.
internet, and it appears in the form of deliberate
and malicious information pollution — trolling Governments, therefore, do have power to
being perhaps the most obvious manifestation. shape the internet and to reconfigure the trust
However, subversion has an aesthetic of its own, relationships on it, perhaps through what DeNardis
a hacking aesthetic that is pleased to undermine calls the “dark arts” of internet governance
the basic functions or promises of a system, often (2014a, 199–221). For example, trusting the
by using those basic functions against the system websites we access depends on the maintenance
itself. Accordingly, ideas such as fake news or the by Web browsers of lists of trusted certifying
spreading of malware — interventions that would and authenticating authorities. However, such
not be possible without the very infrastructure they lists do not solve the problem of online trust,
are there to undermine — are important parts of but rather shift it toward the authorities, which
the subversive’s arsenal. The subversive aesthetic provide economies of scale in evaluating the
also drives a global position on the internet, trustworthiness of websites, but which also
originally a dispersed and ad hoc response that create the greater systemic risk of a global rather
manifested itself as cybercrime and hacking, but than a local model of trust (O’Hara 2004). Such
which in more recent years has itself attracted a system is only as secure as the least common
institutional backers at the level of the nation state. denominator. A government could compel a
browser-trusted authority to certify an imposter
mail server, for instance, to support surveillance
of its citizens or residents in its territory (DeNardis
2014a, 95). In 2008, the Pakistani government took
down YouTube in Pakistan using the tactic of
The Geopolitics of requesting Pakistan Telecom to redirect YouTube’s
IP addresses (Hunter 2008). Routing systems
Internet Ideals were set up for a smaller and more socially
homogeneous internet, where trust, good faith
The ideals sketched above are not the only and similar aims could be assumed. Of course,
responses to the Silicon Valley ideology of the internet community responds to trust deficits
openness, but they are important in 2019 as they all with improvements in security technology,
have institutional backing at the level of the nation but any technical solution lives in some social,
state or supranational entity. Much of the internet political and economic context as part of a socio-
revolves around standards, and an accountable, technical system that is much harder to predict
open and transparent standard-setting process. or control than its technological component.
However, this does not mean that governments
are not under pressure to intervene, as either There are certain types of content that most
regulators or developers, or via procurement governments try to curb, such as child pornography
(DeNardis 2014a, 84). Many nations, at least when or pirated intellectual property. There are other
going through idealistic and optimistic periods areas, such as political discussion, Holocaust denial
(often coinciding with economic growth), have or blasphemy, where (a) only some governments
supported open standards, as, for example, India wish to intervene, and (b) typically they do not
and Brazil in recent years. However, many social agree on what to censor. However, this does not
effects of the internet, including the spread of mean that they will not try. An important means
social media, the perceived threats to individuals’ for governments to control or censor the content
(in particular, children’s) psychological well-being, distributed on the internet is to intervene in
cybercrime, cyberwarfare and a coarsening of the protocols, the systems or the technology,
public debate, have led some governments to as with the Pakistani takedown of YouTube.
step in more assertively. Above all, the perception Such censorship is not unavoidable — the “dark
that the internet is of necessity a disseminator Web” often provides technologies to circumvent
of liberal and democratic ideals has caused such interventions — but it is pretty effective in
pushback (Morozov 2011). Certain issues, such as stopping messages being disseminated through
net neutrality (see below), or the extent of liability audiences whose interest is more casual.
of content platforms or information intermediaries
Silicon Valley’s Open Internet of its positive effects on the network’s efficiency.
Other supporters, however, have been motivated
Silicon Valley’s open internet is mainly driven by by business reasons; Google, Amazon and eBay
the technology. Problems are expected to have want as much access to their popular sites as
technical solutions primarily, even if there may be possible, while companies that offer VoIP services
issues about how to implement these. For instance, (such as Microsoft, which owns Skype), and
WhatsApp is making strides in slowing down the streaming companies such as Netflix need to avoid
viral spread of fake news and dangerous rumours their content being throttled or slowed down.
with technical means (which may be easier because
it does not rely on an advertising model; see The
Economist 2018l). With respect to privacy, the most
Brussels’ Bourgeois Internet
prevalent view is to see a privacy breach as a Europe’s political attitudes differ from those of
tort (Prosser 1960), requiring the victim to show the United States, whose political and public
evidence of harm.5 This common law approach space are defined by a liberal creed. In Europe,
to privacy fits in nicely with the Silicon Valley history plays a much larger role — nation states
credo of “move fast and break things” — innovate have learned, through war, to focus on peace,
until the innovation is shown to be harmful. prosperity and cohesion. The European Union
was originally posited as an end point to these
However, not all regulation is bad, on this integrative processes, and, in cyberspace, it has
view; regulation may be needed to ensure the taken it upon itself to defend a civilized bourgeois
unfettered flow of information. Net neutrality public space against incivility, taking action, for
is a signature policy of the Silicon Valley open example, against disruptors such as Airbnb, which
internet. It is the principle that internet providers is blamed for swamping beautiful cities with
should not discriminate between different types tourists (The Economist 2018k). The European Union’s
of packets of information transmitted over the Competition Commissioner Margrethe Vestager
internet, to give preferential treatment to some has extended the Commission’s anti-trust work
types over others. Discrimination might happen against dominant firms, based on article 102 of
for engineering reasons (certain information- the EU treaty,6 to pursue American tech giants on
heavy and time-sensitive uses, such as video or the ground that they might swallow rivals or force
game streaming, might clog up the network), them out of business, leaving consumers with a
economic reasons (a mobile operator might poorer standard of service (The Economist 2017b).
not wish to provide the infrastructure for free
Voice over Internet Protocol [VoIP] services), or The bourgeois world rests upon virtuous behaviour,
ideological reasons (an operator might wish to civility and prudence (McCloskey 2006), and
discriminate against child pornography, say, or Western European governments by and large
the messaging of an opposition political party). attempt together with the European Union to
secure this world. Only in such an atmosphere
Net neutrality has more of an impact on the last of trust in government would it be likely that,
mile of internet delivery than on global governance. for example, Swedes would take to inserting
In countries with sufficient competition between
6 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
microchips in their bodies so enthusiastically (The European Union — it is a leader in data protection
Economist 2018n). European thinking on ethics because it is too large a market to ignore. It is also
and privacy focuses on dignity, whereas the totemic: “This new data protection ecosystem
American tradition looks toward liberty (Whitman stems from the strong roots of another kind of
2004), so it is not surprising to find an EU Ethics ecosystem: the European project itself, that of
Advisory Group worrying about the relationship unifying the values drawn from a shared historical
between personhood and personal data, the risks experience with a process of industrial, political,
of discrimination as a result of data processing, economic and social integration of States, in order
and the risks of undermining the foundations of to sustain peace, collaboration, social welfare and
democracy (EDPS Ethics Advisory Group 2018). economic development” (EDPS Ethics Advisory
Group 2018, 6). The jury is out; the GDPR has
European courts are regulating the internet certainly been influential worldwide. However,
increasingly aggressively. To take one prominent it may handicap Europe in the development of
example, the Court of Justice of the European artificial intelligence (AI). Where China and the
Union ruled against Google Spain in 2014 in a United States are each large centralized markets,
case brought by a man who wanted outdated enabling the gathering of giant quantities of
information about him removed from Google’s data to fuel their algorithms, Europe is more
search results.7 The original decision was a fragmented, both in terms of markets and in
compromise, and a controversial one, although terms of the dominant tech companies, and this
welcomed by many commentators, including decentralization is exacerbated by the GDPR’s
the present authors (O’Hara 2015; O’Hara and stern regulation of data sharing (China’s data
Shadbolt 2015; O’Hara, Shadbolt and Hall 2016), advantage is discussed in the next section).
as allowing the European Union to police its own
jurisdiction without imposing its own restrictive Privacy is not, of course, the only area where the
view of privacy upon the world. However, since European Union’s instinct is skeptical of market
the judgment, the French data protection regulator forces, which are sometimes perceived as too
CNIL (Commission Nationale de l’Informatique disruptive, creating social costs, and sometimes
et des Libertés) has tried to push back against perceived as producing an incoherent or inefficient
searches for EU citizens in any jurisdiction, and internet where private gain crowds out public
the General Data Protection Regulation (GDPR) gain. A satisfactory set of arrangements is simply
of 2018 has enshrined that universalism into EU inconceivable without a regulator. For instance,
law, even switching the emphasis from delisting the European Union’s update of its copyright laws8
to erasure (Politou, Alepis and Patsakis 2018). has attracted opprobrium because of its aggressive
stance on copyright breaches (The Economist
Many suspect it will be harder to innovate in 2018u). Characteristic of the European Union’s
Brussels’ bourgeois internet, thanks to a preference attitude toward technology firms is its assumption
for incumbents and distaste for disruptive that complaints about regulation threatening
newcomers. For example, the GDPR is perceived the freewheeling, entrepreneurial internet are
as a threat to the model of free services for exaggerated. Article 13 of the new copyright
surveillance (The Economist 2018c). The GDPR is a law compels internet firms to work closely
paradigm case of the European Union’s drive to a with copyright holders to bring down copyright
bourgeois level of safety. In contrast to American materials as soon as possible, which (given the
law, it covers every kind of data processing, imprecise nature of copyright identification
whether shown to be harmful or not, and tries algorithms) is likely to result in overzealous
to anticipate and minimize risk (although it has policing. Article 11 requires aggregators to obtain
been argued that the box-ticking mentality it has a licence from publishers if they display excerpts
promoted is in practice no more protective of from content. A similar rule introduced in Spain
privacy than the tort-based approach of the United in 2014 led Google to withdraw its aggregation
States; see Bamberger and Mulligan [2015]). Yet, service from there; the bet underlying article 11
the GDPR remains a source of advantage for the is that Google could not afford to do the same
7 Google Spain SL and Google Inc v Agencia Española de Protección 8 The Directive of the European Parliament and of the Council on copyright
de Datos (AEPD) and Mario Costeja González (13 May 2014), Doc in the Digital Single Market, at www.consilium.europa.eu/media/35373/
C-131/12, ECLI:EU:C:2014:317 (CJEU). st09134-en18.pdf.
8 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
noticeable public demand for privacy, data is Such an internet might easily be supported by
gathered from many other sources, including poorer countries for which the internet has proved
closed circuit television. This data is immensely problematic — for instance, countries including
important to Chinese science but also augmented Mauretania, Algeria, Uzbekistan, Iraq and Ethiopia
by various schemes in which Chinese citizens rate have been forced to turn the internet off during
each other as citizens on social networks. China school exam time, because of the prevalence of
hopes to lead in AI and has made advances in cheating (The Economist 2018h). While Chinese
areas such as face recognition and autonomous companies have been increasingly targeted by
vehicles. Its less-developed status helps as well, nationalists in the United States, and major US
in terms of social and industrial adaptability; firms apart from Amazon and Apple are pretty
whereas the United States is restricting the use of well barred from China, the major Chinese and
self-driving cars and worrying about pedestrian American firms compete in other markets, such
deaths (The Economist 2018b), China is building as Brazil, Indonesia, India and Africa. In January
a city to accommodate them (Lee 2018). 2019, the planet is on course to achieve a figure
of 50 percent of its population connected to the
Beyond its borders, China’s influence on American internet, but with much of the remaining 50
firms is growing. In 2018, it forced Apple to transfer percent in rural China, India and Africa. China has
its iCloud data about Chinese users to a Chinese a considerable financial influence in Africa and will
data centre (The Economist 2018r). Of course, this seek to influence the governance of the internet
kind of nationalism is common across the world, there. It may do this under the radar; while US firms
including in the European Union, but it does mean tend to transplant their usual services into the new
that the government can certainly get hold of this markets under their own names, tweaking where
valuable data more easily. Business in the lucrative necessary, Chinese firms have a somewhat more
Chinese market will have to be done on Chinese covert strategy of buying stakes in promising start-
terms. In 2010, Google quit China in order to avoid ups (as they have even in the United States before
having to censor search results. At the time of getting pushback from the Trump administration)
writing, it is reported that Google is testing a mobile — 2017 saw US$5 billion invested in Indian start-
search app called “Dragonfly,” which would filter ups by Chinese tech firms (The Economist 2018i).
websites blocked by China’s “Great Firewall,” and
provide instead a notice that some results might
have been removed. If it goes ahead, it would have
DC’s Commercial Internet
to compete with Baidu, which carries out 75 percent The characteristics of what might be called the
of searches in China, and which has cemented “DC commercial internet” — the vision of the
its dominance by ensuring that its own apps are commercial internet as espoused by leaders in the
pre-installed on Chinese smartphones (ibid.). US Capitol — are similar to those of the Silicon
Valley open internet — and indeed, commercial
In 2013, President Xi Jinping unveiled an and technology interests have always cooperated
infrastructure and trade initiative, entitled the strongly through the internet’s history, helped
Silk Road Economic Belt and the Twenty-first- by their geographical concentration in the
Century Maritime Silk Road, often called “The Belt same nation. However, the United States is now
and Road Initiative.” This aims to link together the polarized to an unprecedented degree, and the
Eurasian world with connectivity and cooperative champions of the DC model, in particular the
ventures, as a route for future Chinese (and other) Republicans, notably President Trump, are at
trade, by developing infrastructure across Asia, loggerheads (over a tremendous number of issues)
Europe and Africa. The authoritarian internet could with the champions of the Silicon Valley model,
well become part of this project, leading to a Belt, in particular the Democrats and Barack Obama,
Road and Information Superhighway Initiative, whose White House hosted a number of present
comprising the technological areas where China and former technologists. Most prominently, the
sees potential advantage, including AI, big data, Federal Communications Commission (FCC) voted
quantum computing and cloud storage. The city in December 2017 by three to two to repeal its
of Xi’an in Shaanxi province, a bastion of the commitment to net neutrality that it had brought
original medieval Silk Road, has already positioned in under the previous administration in 2015. The
itself as a tech centre (The Economist 2018e). Star Wars actor Mark Hamill criticized the FCC
for siding with large corporations against the
10 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
this case, manage one’s private property, that is, Addendum: Moscow’s
the internet infrastructure owned by providers).
Spoiler Model
More widely, this property-based model threatens As noted above, geopolitical shifts have led to
the interoperability that was a fundamental a lessening of the constraints on Russia and a
principle of the internet and, subsequently, the reassertion of the imperial geography of the past
Web — Berners-Lee in his 2018 Turing Lecture9 (Kaplan 2018). Russia under President Vladimir
argued that the universality of identifiers for Putin has exploited this to engineer an ideological
online resources was key for the added value space opposed to the West, based on a mystical
of the Web. As early as 2008, Zittrain sounded mélange of nationalism and destiny, ressentiment
an alarm about what he called non-generative and victimhood, power and calculation, cynicism
models of the internet, which created walled and conspiracy theories (Snyder 2018). Given
gardens and undermined innovation (Zittrain this vision, the decentralized internet, with no
2008). Since Zittrain wrote, the extraordinary institutionalized editing or fact-checking, has been
growth of social networking has built the walls an ally. Indeed, the polarization of politics in the
around the gardens still higher, while arguably West, notably in the United States but also in the
making the gardens prettier and more habitable. European Union, has provided the opportunity
to import the uncertainties and obfuscations
In particular, social networking sites (SNSs) bypass routine in Russian politics into Western politics,
some of the internet’s interoperability mechanisms. by cheaply importing narratives, arguments
They do not particularly support cross-platform and conspiracies using the power of bots. Much
compatibility (so that interacting between two of this has been revealed by Robert Mueller’s
SNSs is not as simple as, say, sending an email inquiry into Russian interference in the 2016 US
from Gmail to an .edu address). Personal data is presidential election (The Economist 2018a).
not portable between sites, although the GDPR
is attempting to change this. Search is restricted. There are several other instances of this, which
Resources are not identified or located by universal appear strategically inexplicable except as a means
formalisms (DeNardis 2014b). As Berners-Lee of sowing division and mistrust. For instance, David
wrote in 2010, “connections among data exist only A. Broniatowski et al. (2018) report that Russian
within a site. So the more you enter, the more you bots and trolls regularly tweet about vaccination in
become locked in. Your [SNS] becomes…a closed divisive terms, linking the issues to controversies
silo of content…The more this kind of architecture in American politics. The tweets are both pro- and
gains widespread use, the more the Web becomes anti-vaccination, but the purpose appears to be less
fragmented, and the less we enjoy a single, to establish a position as to create, by the volume
universal information space” (quoted in DeNardis of tweets, the impression of strong and partisan
2014a, 241). Zittrain and Berners-Lee defend the debate, and to recruit partisan campaigners by
Silicon Valley open internet, but the DC commercial associating vaccination with the several other
response is that SNSs provide services that people wedge issues in America’s dysfunctional politics.
actually wish to access, in large numbers, and
that the only responsibilities SNS owners have This is not just a Russian tactic (although the term
are to their customers, assuming that they do not “disinformation” was indeed originally a Russian
interfere with the running of the internet as a term, coined during the Stalin era). No doubt
whole. As with other types of property, if someone all nations indulge in deliberately propagating
wishes to build a wall around their garden, they falsehood. However, disinformation is a particularly
should be allowed to do so as long as they cause no potent weapon against the West, where speech is
harms elsewhere. They should be the best judge of freer (and it is easier to spread ideas), and where
the value to be obtained from their property. The controlling the public sphere is seen as rather alien.
single, universal information space that Berners- A recent report from the Oxford Internet Institute
Lee advocates cannot and should not be imposed, argued that “computational propaganda is now
on this view, against the will of someone to one of the most powerful tools against democracy”
monetize their intellectual property via restriction. (Woolley and Howard 2017, 7) and found evidence
that, for instance, 45 percent of Twitter activity
in Russia was automated for the creation of
disinformation (ibid., 4), and that political debate in
9 See https://amturing.acm.org/vp/berners-lee_8087960.cfm. Germany, the United States, Poland, Brazil, Ukraine
12 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
of global affairs (Clegg 2018). Such cross-fertilization
may also result in bringing the Eurocrats closer to
the Americans; Margrethe Vestager’s decision in
Conclusion
2017 to order Apple to pay back-taxes to the Irish
In 2002, when the world seemed unipolar under
government (that did not want the money) was
a benign if stern American hegemony, and the
criticized by one of her predecessors, Neelie Kroes,
recent terrorist attacks in New York had created an
who had been appointed to Uber’s Public Policy
imperative to reassert American moral ascendency,
Advisory Board in 2016 (The Economist 2017b).
President George W. Bush described an “Axis
Even Tim Berners-Lee, a consistent apostle of of Evil.” In today’s very different world, we can
openness, has a vision of the Web that looks much discern a somewhat scarier “Axis of Incivility,”
closer to Brussels’ bourgeois internet than Silicon of nation states jostling for narrow advantage,
Valley’s open one, in which polite conversation is with a view of international relations, including
not drowned out by the roughhouse — consistent economic relations, as zero sum. Unlike the Axis of
with the Web’s birth as a means of disseminating Evil, which reflected US foreign policy concerns,
scientific research (Berners-Lee 2018). The initiatives the Axis of Incivility has at its foundations the
he has championed — ranging from the Web three major superpowers, the United States, China
We Want,11 a project of the World Wide Web and Russia, each of which in its different ways at
Foundation, to a “Magna Carta for the Web” (Kiss the time of writing pursues aggressive nationalist
2014; Sample 2018), to the Solid platform, which is policy goals while showing impatience with
intended to “re-decentralize” the Web guided by due process both internally and internationally.
the principle of “personal empowerment through Many other nations, including Egypt, Hungary,
data”12 — aim to promote human rights, privacy, India, Iran, Israel, the Philippines, Poland, Saudi
anti-discrimination and trolling, and bear a closer Arabia and Turkey, are following this lead.
resemblance to the European Commission’s vision
In such a world, it is inconceivable that these
than to John Perry Barlow’s. The Solid vision sees
competing visions of the internet will not
individuals curating their own data responsibly
become entangled in the drive for international
and managing read/write permissions via “PODs”
recognition, power and coalition-building.
— personal online data stores — thereby meeting
Neither the benefits of cooperation and openness,
one of Berners-Lee’s own worries about the Web
nor those of privacy and bourgeois stability,
(that we have lost control of our personal data), but
are likely to cut much ice with rational actors
maybe not dealing with some of the by-products of
with such a mindset. Hence, the competition
openness, specifically the spread of misinformation
to establish which, if any, of the four internets
and the lack of transparency (Berners-Lee 2017).
will prevail (however temporarily) is likely to be
The Global Commission on Internet Governance
strong, and not always focused on win-wins.
(2016) adopts a similar position of combining
openness with a respectful environment.
11 See https://webwewant.org/.
12 See https://solid.mit.edu/.
Bamberger, Kenneth A. and Deirdre K. Mulligan. ———. 2014b. “The social media challenge to
2015. Privacy on the Ground: Driving Internet governance.” In Society and the
Corporate Behavior in the United States and Internet: How Networks of Information and
Europe. Cambridge, MA: MIT Press. Communication Are Changing Our Lives, edited
by Mark Graham and William H. Dutton,
Barlow, John Perry. 1996. “A Declaration of
348–59. Oxford, UK: Oxford University Press.
the Independence of Cyberspace.”
Davos, Switzerland, February 8. EDPS Ethics Advisory Group. 2018. Towards a
www.eff.org/cyberspace-independence. Digital Ethics. European Data Protection
Supervisor. https://edps.europa.eu/sites/edp/
Benkler, Yochai. 2006. The Wealth of Networks:
files/publication/18-01-25_eag_report_en.pdf.
How Social Production Transforms Markets and
Freedom. New Haven, CT: Yale University Press. Global Commission on Internet Governance.
2016. One Internet. Waterloo, ON: CIGI.
Berlin, Isaiah. 2002. “Two concepts of liberty.”
www.cigionline.org/publications/one-internet.
In Liberty, edited by Henry Hardy, 166–217.
Oxford, UK: Oxford University Press. Hunter, Philip. 2008. “Pakistan YouTube block
exposes fundamental Internet security
Berners-Lee, Tim. 2017. “I invented the web. Here are
weakness: Concern that Pakistani action
three things we need to change to save it.” The
affected YouTube access elsewhere in world.”
Guardian, March 12. www.theguardian.com/
Computer Fraud and Security 4: 10–11.
technology/2017/mar/11/tim-berners-
https://doi.org/10.1016/S1361-3723(08)70065-4.
lee-web-inventor-save-internet.
Iñiguez, Gerardo, Tzipe Govezensky, Robin
———. 2018. “One Small Step for the Web…”
Dunbar, Kimmo Kaski and Rafael A.
Inrupt.com, September 28. www.inrupt.com/
Barrio. 2014. “Effects of deception in
blog/one-small-step-for-the-web.
social networks.” Proceedings of the Royal
Berners-Lee, Tim, Wendy Hall, James A. Society B: Biological Sciences 281 (1790).
Hendler, Kieron O’Hara, Nigel Shadbolt and https://doi.org/10.1098/rspb.2014.1195.
Daniel J. Weitzner. 2006. “A Framework
Kaplan, Robert D. 2018. The Return of Marco
for Web Science.” Foundations and
Polo’s World: War, Strategy, and American
Trends in Web Science 1 (1): 1–134.
Interests in the Twenty-First Century.
Blum, Andrew. 2012. Tubes: Behind the Scenes New York, NY: Random House.
at the Internet. London, UK: Viking.
Kiss, Jemima. 2014. “An online Magna Carta:
Broniatowski, David A., Amelia M. Jamison, SiHua Berners-Lee calls for bill of rights for web.”
Qi, Lulwah AlKulaib, Tao Chen, Adrian Benton, The Guardian, March 12. www.theguardian.com/
Sandra C. Quinn and Mark Dredze. 2018. technology/2014/mar/12/online-magna-carta-
“Weaponized health communication: Twitter berners-lee-web.
bots and Russian trolls amplify the vaccine
Kolodny, Lora. 2018. “Former Google CEO predicts
debate.” American Journal of Public Health 108
the internet will split in two — and one part
(10): 1378–84. https://ajph.aphapublications.
will be led by China.” CNBC Tech, September 20.
org/doi/10.2105/AJPH.2018.304567.
www.cnbc.com/2018/09/20/eric-schmidt-ex-
Clegg, Nick. 2018. “I’m joining Facebook to build google-ceo-predicts-internet-split-china.html.
bridges between politics and tech.” The
Lee, Kai-Fu. 2018. AI Superpowers: China, Silicon
Guardian, October 19. www.theguardian.com/
Valley and the New World Order. New
commentisfree/2018/oct/19/nick-clegg-
York, NY: Houghton Mifflin Harcourt.
facebook-politics-tech.
14 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
McCloskey, Deirdre N. 2006. The Bourgeois O’Hara, Kieron, Nigel Shadbolt and Wendy Hall.
Virtues: Ethics for an Age of Commerce. 2016. A Pragmatic Approach to the Right to Be
Chicago, IL: University of Chicago Press. Forgotten. Global Commission on Internet
Governance Paper Series No. 26. Waterloo,
Morozov, Evgeny. 2011. The Net Delusion: How Not to ON: CIGI. www.cigionline.org/publications/
Liberate the World. London, UK: Allen Lane. pragmatic-approach-right-be-forgotten.
Nunziato, Dawn C. 2009. Virtual Freedom: Net Politou, Eugenia, Efthimios Alepis and Constantinos
Neutrality and Free Speech in the Internet Age. Patsakis. 2018. “Forgetting personal data and
Stanford, CA: Stanford University Press. revoking consent under the GDPR: challenges
and proposed solutions.” Journal of Cybersecurity.
Nyberg, Sten. 1997. “The honest society: stability
http://doi.org/10.1093/cybsec/tyy001.
and policy considerations.” Journal of Public
Economics 64 (1): 83–99. https://doi.org/ Prosser, William L. 1960. “Privacy.”
10.1016/S0047-2727(96)01608-8. California Law Review 48: 383–423.
O’Hara, Kieron. 2004. Trust: From Socrates Sample, Ian. 2018. “Tim Berners-Lee launches
to Spin. Duxford, UK: Icon Books. campaign to save the web from abuse.” The
Guardian, November 4. www.theguardian.com/
———. 2009. “Web engineering in the
technology/2018/nov/05/tim-berners-lee-
Chinese context: ‘Let a hundred flowers
launches-campaign-to-save-the-web-
bloom, a hundred schools of thought
from-abuse.
contend.’” In China’s Information and
Communications Technology Revolution: Schumpeter, Joseph. 2010. Capitalism, Socialism and
Social changes and state responses, edited Democracy. Abingdon, UK: Routledge Classics.
by Xiaoling Zhang and Yongnian Zheng,
121–35. Abingdon, UK: Routledge. Snyder, Timothy. 2018. The Road to Unfreedom.
London, UK: Bodley Head.
———. 2015. “The Right to Be Forgotten:
The Good, the Bad, and the Ugly.” IEEE Solove, Daniel. 2014. “Privacy and Data Security
Internet Computing 19 (4): 73–79. http://doi. Violation: What’s the Harm?” TeachPrivacy
ieeecomputersociety.org/10.1109/MIC.2015.88. (blog), July 2. https://teachprivacy.com/
privacy-data-security-violations-whats-harm/.
———. 2018. “The contradictions of digital
modernity.” AI and Society, April 25. Thaler, Richard H. and Cass R. Sunstein.
https://doi.org/10.1007/s00146-018-0843-7. 2008. Nudge: Improving Decisions About
Health, Wealth, and Happiness. New
O’Hara, Kieron, Noshir S. Contractor, Wendy Haven, CT: Yale University Press.
Hall, James A. Hendler and Nigel Shadbolt.
2013. “Web Science: understanding the The Economist. 2017a. “Another debate about net
emergence of macro-level features on neutrality in America.” The Economist, April 22.
the World Wide Web.” Foundations and
Trends in Web Science 4 (2-3): 1–165. ———. 2017b. “Is Margrethe Vestager
championing consumers or her political
O’Hara, Kieron and Wendy Hall. 2013. “Web career?” The Economist, September 14.
Science.” In The Oxford Handbook of Internet
Studies, edited by William H. Dutton, 48–68. ———. 2017c. “A vote on ‘net neutrality’ has
Oxford, UK: Oxford University Press. intensified a battle over the internet’s
future.” The Economist, December 23.
O’Hara, Kieron and Nigel Shadbolt. 2015. “The
right to be forgotten: its potential role ———. 2018a. “Russian disinformation distorts
in a coherent privacy regime.” European American and European democracy.”
Data Protection Law Review 1 (3): 178–89. The Economist, February 24.
https://doi.org/10.21552/EDPL/2015/3/5.
———. 2018b. “A pedestrian has been killed by a
self-driving car.” The Economist, March 24.
———. 2018d. “China has turned Xinjiang into a ———. 2018u. “A controversial new copyright
police state like no other.” The Economist, June 2. law moves a step closer to approval.”
The Economist, September 15.
———. 2018e. “China talks of building a ‘digital
Silk Road.’” The Economist, June 2. ———. 2018v. “America’s government is
putting foreign cyber-spies in the
———. 2018f. “American tech giants are making dock.” The Economist, September 15.
life tough for startups.” The Economist, June 2.
The Guardian. 2018. “US justice department sues
———. 2018g. “Xiaomi’s forthcoming IPO California over new net neutrality law.” The
shows how the rules of business are Guardian, October 1. www.theguardian.com/
changing.” The Economist, June 9. technology/2018/oct/01/us-justice-department-
sues-california-to-over-new-net-neutrality-law.
———. 2018h. “Why some countries are
turning off the internet on exam Timberg, Craig. 2018. “Facebook, Twitter
days.” The Economist, July 7. remove hundreds of disinformation pages
created by Russia, Iran.” The Sydney Morning
———. 2018i. “Chinese and US tech giants go at it
Herald, August 22. www.smh.com.au/
in emerging markets.” The Economist, July 7.
world/north-america/facebook-removes-
———. 2018j. “China’s new $15bn tech 652-disinformation-pages-created-by-
fund emulates SoftBank’s Vision russia-iran-20180822-p4zyyi.html.
Fund.” The Economist, July 14.
Whitman, James Q. 2004. “The two Western
———. 2018k. “The backlash against cultures of privacy: dignity versus
Airbnb.” The Economist, July 21. liberty.” Yale Law Journal 113: 1151–221.
———. 2018l. “WhatsApp suggests a cure Woolley, Samuel C. and Philip N. Howard. 2017.
for virality.” The Economist, July 28. Computational Propaganda Worldwide: Executive
Summary. Working Paper 2017.11. Oxford, UK:
———. 2018m. “America and the EU Oxford Internet Institute. http://comprop.oii.
are both toughening up on foreign ox.ac.uk/wp-content/uploads/sites/89/2017/06/
capital.” The Economist, July 28. Casestudies-ExecutiveSummary.pdf.
———. 2018n. “Why Swedes are inserting Working Group on Internet Governance. 2005.
microchips into their bodies.” Report from the Working Group on Internet
The Economist, August 4. Governance. Document WSIS-II/PC-3/DOC/5-E,
August 3. www.itu.int/net/wsis/docs2/pc3/off5.pdf.
———. 2018o. “Britain’s spies get
entrepreneurial.” The Economist, August 4. Zhang, Yue. 2008. “The effects of perceived
fairness and communication on honesty
———. 2018p. “Alibaba and Tencent have and collusion in a multi-agent setting.”
become China’s most formidable Accounting Review 83 (4): 1125–46. https://
investors.” The Economist, August 4. doi.org/10.2308/accr.2008.83.4.1125.
———. 2018q. “Silicon Valley gets queasy about Zittrain, Jonathan. 2008. The Future of
Chinese money.” The Economist, August 11. the Internet: And How to Stop It. New
Haven, CT: Yale University Press.
———. 2018r. “Plans for a return to China has
many up in arms.” The Economist, August 25.
16 CIGI Papers No. 206 — December 2018 • Kieron O’Hara and Wendy Hall
About CIGI
We are the Centre for International Governance Innovation: an
independent, non-partisan think tank with an objective and
uniquely global perspective. Our research, opinions and public
voice make a difference in today’s world by bringing clarity and
innovative thinking to global policy making. By working across
disciplines and in partnership with the best peers and experts, we
are the benchmark for influential research and trusted analysis.
À propos du CIGI
Au Centre pour l'innovation dans la gouvernance internationale (CIGI),
nous formons un groupe de réflexion indépendant et non partisan
doté d’un point de vue objectif et unique de portée mondiale. Nos
recherches, nos avis et nos interventions publiques ont des effets
réels sur le monde d'aujourd’hui car ils apportent de la clarté et
une réflexion novatrice pour l’élaboration des politiques à l’échelle
internationale. En raison des travaux accomplis en collaboration et
en partenariat avec des pairs et des spécialistes interdisciplinaires
des plus compétents, nous sommes devenus une référence grâce
à l’influence de nos recherches et à la fiabilité de nos analyses.
@cigionline