ILP Lectures
ILP Lectures
ILP Lectures
GENERAL INFORMATION
- 2h seminars on Monday 4-6pm
o Discuss material
o Look at legal concepts
- 4x 1h tutorials per semester
o Light preparation
o Apply knowledge from the lecture
o Real life examples (legislation, discussion on policy, cases…)
- Put questions on the Q&A instead of emailing them, he won’t reply by mail
o It is ok to answer to other people’s questions
- Formative essays
o Mid-late Nov
o Late Feb
- Summatives
o Coursework (2500 word, due at beginning of Term 2) 50%
We can suggest our own questions and pick questions suggested by
others
o Take-home exam (48h – 2 essays of 1250 words, Term 3) 50%
Apply content from the whole module
Not problem questions, but essays that you can approach from the angle
that you like most (technical, social, legal…)
1
Belén Luengo Palomino
2
Belén Luengo Palomino
o Tor Browser uses the TOR Hidden Service Protocol to connect computers that
are also connected to the Internet
Created by a group of encryption enthusiasts, it was designed to
anonymize data using voluntary relays and routers that mask the users’
identities
With this browser, one accesses websites that are not available in
common browsers like Chrome and Firefox
o Possible to post any type of content due to anonymity, and buy almost anything
using decentralized payment methods like Bitcoin
Trial of Ross Ulbricht, operator of the Silk Road website (marketplace
for any sort of illegal material)
- Contributes to the idea that the Internet is so vast that it cannot be regulated
B) Snowden’s Internet
- Former NSA contractor who revealed the mass surveillance conducted by NSA in the
US and GCHQ in the UK
o Issues he uncovered:
1. Link layer NSA’s hacking unit known as the Tailored Access Operations
(TAO) capable of breaking into a target’s communications by tapping into
people’s connections to the network at the point of origin
2. Transport layer communications in the transport layer are not encrypted by
default, and the NSA was able to tap into underwater cable systems
3. Internet layer one of the fathers of the Internet, Vint Cerf, reported that the
NSA stopped him from including an encrypted protocol into the transport layer.
Thus, there is a lack of encryption in these protocols (TCP/IP)
4. Application layer NSA was able to collaborate with technology firms to
conduct surveillance like Skype
- This is a much-controlled vision of the Internet, using collusion by the industry and
surveillance
C) Real Internet
- Truth lies in the middle The Internet presents a space that is difficult to regulate
despite the existence of the surveillance apparatus previously explained
o Relatively easy to identify most people, but there is still some level of
anonymity, and it would grow if faced with any attempt at exercising
enforcement online
When regulators tried to curb file-sharing, the number of users of
anonymous services and virtual private networks rose
- There is still infringement of copyright, but a more centralized experience is emerging
for most users:
o State control is possible China is censored
o Everyday experience of most users depends on that private enterprises show
them experience is defined by app developers
- A minority of technically-oriented users operate in heavily encrypted spaces with near-
impunity from regulation, while a large number of people suffer constant regulation
through censorship, blocking and filtering of content
o A person’s experience of the Internet will depend on their education, resources
and geographical location
3
Belén Luengo Palomino
Regulation Theories
A) The more things change, the more they stay the same
- When the Internet was created, many thought that it would herald a new golden era of
prosperity and global understanding, an age of ‘computer-aided peace’ without
nationalism
o Yet, this has not been the case.
o Historically, the invention of the telegraph was followed by a misuse for
fraudulent purposes and the creation of a highly skilled technical class of users
which brought social changes
o In 1970~80s people were already concerned about the end of privacy or
whether censorship was acceptable.
o Braman what has changed is that the Internet has democratized applications,
and its regulation has shifted from concerns about direct regulation to
discussion about intermediary liability. Before, only professional entities were
subject to regulation, now everyone uses social media.
- Many of the themes remain the same, but the Internet has some key unique features that
raise the question of whether is possible to regulate it
B) The Return of Cyber-Libertarianism
- Idea that the Internet is a separate space subject to different laws; in words of Barlow:
4
Belén Luengo Palomino
5
Belén Luengo Palomino
6
Belén Luengo Palomino
- Visions about how the Internet should be known as ‘sociotechnical imaginaries’, these
tend to be ‘libertarian imaginaries of an identity-free and bodiless sociotechnical future
shaped the Internet’ (Paris 2020,8)
o The history of the internet has been shaped by the imaginaries of just a few
people, mostly white male scientists = insensitive to human rights concerns
o At least, that’s the liberatory history that is mostly told but author believes there
is not a single history, but many parallel ones
- Author takes an anthropological stance of the history of the Internet, telling the stories
of the people who created it who were influenced by the culture they were living in
A Brief History of the Internet
- the Internet’s technical functions are inextricably linked to its social functions
o force of the Internet’s sociotechnical imaginaries of individual liberation and
optimism in shaping its material design
- Networking protocols are the rules, or blueprints, that enable interoperability among
technologies made by different manufacturers (the Internet is made of hundreds of
them)
o These are developed in industry-led standard-setting bodies, like the IETF.
o Made by predominantly white, male and Western, technically savvy and
university educated individuals who favored matters of surveillance, individual
freedom and liberty over social justice, equity or anti-discrimination
The Moonshot Internet: The intergalactic computer network
- The Internet was born within ARPA (Advanced Research Projects Agency), working
for the USA Department of Defense during the Cold War
o Licklider was the first director of the Information Processing Technology
Office (IPTO) there, where he highlighted some barriers to creating a network
of computers such as the creation of norms regarding a shared language for the
network
o He recognized that the aspirations of the individuals involved and the network
were intertwined, blurring technology’s social and technical functions
o There were discussions about the function it would fulfill, proving that its
origin is social rather than technically constructed
- Moonshot thinking a utopian view of technology as able to foment positive change
in society by solving current and future problems through technology
o It makes engineers overlook how their technologies might exacerbate social
inequities on earth.
o Licklider mentioned that the Internet reflected research and military interests,
but he overlooked the social aspect
- It was decided that the Internet would work based on packet-switching technology and
protocols because…
o Baran wanted to create a technology that would survive a nuclear attack
o Davies wanted to make accessing time-sharing computer resources more
efficient (universities and other institutions were sharing computers at the time)
o Kleinrock published the first paper on packet-switching theory
7
Belén Luengo Palomino
8
Belén Luengo Palomino
9
Belén Luengo Palomino
- USENET started in the late 1970s and it was a precursor to internet forums
o Users would post articles to their local server, which would periodically be
synced with other servers as a decentralized system
IMDB started on USENET before the Web even existed
o Emails are basically the same, invented in 1971 by Tomlinson, they already
used the @ character to separate username and host
o Whole Earth ‘Lectronic Link (WELL) was used by people involved in 1960-
70s countercultural movements, computer enthusiasts, journalists…
- Most internet users were researchers
o They were not trying to create something that would be used by the entire
world, but simply make their tasks more efficient
10
Belén Luengo Palomino
o PCs make use of Operative Systems (OS) which makes it easy to run new
software
PCs were made to run software not foreseen by the manufacturer
High-level programming increases accessibility PCs are not more
leveraged but they make PCs more accessible to a wider audience of
programmers = a PC all programmers can program
o Market in third party software developed
Such a range of developers enhanced the variety of applications that
were written not only because accessibility arguably increased the sheer
number of people coding, but also because people coded for different
reasons
11
Belén Luengo Palomino
12
Belén Luengo Palomino
Dispersed third parties could and did write clients and servers
for instant messaging, web browsing, e-mail exchange, and
Internet searching
o Internet remained broadly accessible
anyone could cheaply sign on, immediately becoming a node on the
Internet equal to all others in information exchange capacity, limited
only by bandwidth
The resulting Internet is a network that no one in particular owns and
that anyone can join.
- Hourglass figure a simple set of narrow and slow-changing protocols in the middle,
resting on an open stable of physical carriers at the bottom and any number of
applications written by third parties on the top
o It is better to keep the basic network operating protocols simple because error
correction in data transmission (for instance) are best executed by client-side
applications
Rather than changing the way routers on the Internet work
D) The Generative Grid
- Both noncommercial and commercial enterprises have taken advantage of open PC and
Internet technology, developing a variety of Internet-enabled applications and services
o Significantly, the last several years have witnessed a proliferation of PCs
hosting broadband Internet connections
o The generative PC has become intertwined with the generative Internet, and the
whole is now greater than the sum of its parts
- generativity is vulnerability in the current order
o millions of machines are connected to networks that can convey reprogramming
in a matter of seconds means that those computers stand exposed to near-
instantaneous change
i.e. opens PCs to the prospect of mass infection by a computer virus
o Eliminate those vulnerabilities comes at the expense of generativity of the grid
Generative Discontent
- identify three powerful groups that may find common cause in seeking a less generative
grid:
a) regulators (in part driven by threatened economic interests, including those of
content providers)
b) mature technology industry players
c) consumers
A) Generative Equilibrium
- Professors such as David Johnson and David Post maintained that cyberspace is
different and therefore best regulated by its own sets of rules
o Professor Lessig argued that policymakers should typically refrain from using
the powers of regulation through code (this is, they should regulate)
“Code is Law” as it deeply affects people’s behavior
Fear that it will constraint people’s freedom
o The three branches of cyberlaw (first one is simply more regulation) can be
reconciled with:
Locked-down PCs are possible but undesirable.
- Trusted systems systems that can be trusted by outsiders against the people who use
them.
13
Belén Luengo Palomino
14
Belén Luengo Palomino
15
Belén Luengo Palomino
16
Belén Luengo Palomino
17
Belén Luengo Palomino
o In turn, the more service-oriented and less generative the platform, the more
legal responsibility we should impose on the technology provider to guarantee a
functioning system.
Conclusions
- Generativity has produced extraordinary progress in information technology =
extraordinary progress in the development of forms of artistic and political expression
o Now concerned with too much generativity; two alternatives
Create two separate internets with distinct audiences = appliancized
fate = little innovation since less competitive pressure
Maintain fundamental generativity while controlling threats
o Some limitations are required but make them without
creating centralized gatekeepers
o Create accountability for software creators while
keeping the Internet open
18
Belén Luengo Palomino
19
Belén Luengo Palomino
(In)Security Everywhere
- Architectures designed to promote security are driven by a shared logic
o security is promoted by pervasively embedding technologies and protocols for
identification and authentication by cross-linking those capabilities with
pervasive, large-scale information collection and processing and by promoting
related (though arguably inconsistent) norms of ready disclosure and unceasing
vigilance.
monitoring of movement in physical space
trend of privatization of public spaces (surveilled gated communities)
o surveillance of networked digital communications
inspecting data packets in transit, for monitoring wireless
transmissions, and for locating wireless users
required telecommunications carriers to implement surveillance
capabilities that could be activated “expeditiously” following receipt of
a properly authorized request from law enforcement
ISPs voluntarily do so to (without government push)
o processing of information about individuals and groups
governments routinely use data mining and profiling technologies to
identify suspected threats
o racial and ethnic
huge scope of data-processing activities occurring in the private sector
o growing market for personal information
o an industry devoted to data mining and “behavioral
advertising” has arisen
In Europe, where data-protection laws are
stricter, there is less private-sector trade in
personal information, but also more
government freedom to collect and store data
about citizens.
o real-time identification and authentication of individuals across a wide range of
devices
This strategy gains added momentum as it becomes linked with
strategies in the first three groups
o ordinary people who are the subjects of enhanced security measures
inculcate appropriate beliefs about personal information management
(continue providing information)
o shape public opinion on issues related to terrorism, identity theft, and other
security threats
20
Belén Luengo Palomino
21
Belén Luengo Palomino
22
Belén Luengo Palomino
- Understanding the technical, social, and institutional changes now underway requires a
theoretical tool kit that encompasses the regulatory functions of institutions, artifacts, and
discourses
23