This may not be of interest to anyone but me, but on the theory that it’s better to post them all and let Google sort them out, here are the books I read for my forthcoming paper on network neutrality.
This may not be of interest to anyone but me, but on the theory that it’s better to post them all and let Google sort them out, here are the books I read for my forthcoming paper on network neutrality.
The Australian Communications and Media Authority (ACMA), Australia’s content and communications regulatory agency, has just released a comprehensive new report on “Developments in Internet Filtering Technologies and Other Measures for Promoting Online Safety.” It’s 120 pages long and contains a survey of all the various tool and methods that Australians can use to deal objectionable online content or communications.
What I like best about the report is that the ACMA ultimately came to the exact same conclusion that I did after conducting a thorough review of these issues in my “Parental Controls and Online Child Protection” report. Namely, (1) there is no single “silver-bullet” technical solution (rather, some combination of many tools and methods must be used), and (2) education is essential. Here’s how they put it on page 91 of the report:
“there is no single mitigation measure that is effective against all online risks. Neither is there a single mitigation measure that is effective in addressing even one category of online risks, that is, content risks, e-security risks and communications risks”… “Education campaigns appear to be effective in addressing a broad range of online risks. Of the range of alternative risk mitigation measures, education is to the most effective measure in addressing risks associated with illegal online contact. Education is a viable alternative or supplement to filtering in targeting risks associated with inappropriate content, particularly for older children who may endeavor to circumvent filtering that they perceive to be restrictive. There is evidence from programs deployed in other countries that eduction can be deployed to address bullying.”
Absolutely correct. As I argued in my report, “there isn’t any one, silver bullet tool or method that will get the job done on its own. … [W]e will need to adopt a ‘layered’ approach to parental controls and online child protection to do the job right” that involves a combination of “rules, tools, schools, and talk” with education at the heart of all those strategies.
I suspect many of these issues will be considered by the new Internet Safety Technical Task Force that I will be serving on and which I discussed here this week. The Australian report will serve as a good resource for us as we begin our review.
Despite the similarity in our names, I’m afraid we at TLF can’t take credit for the Billboard Liberation Front’s prank on AT&T. I’m normally a stickler for property rights, but I can’t get too worked up about this:
AT&T initially downplayed its heroic efforts in the War on Terror, preferring to serve in silence behind the scenes. “But then we realized we had a PR win on our hands,” noted AT&T V.P. of Homeland Security James Croppy. “Not only were we helping NSA cut through the cumbersome red tape of the FISA system, we were also helping our customers by handing over their e-mails and phone records to the government. Modern life is so hectic – who has time to cc the feds on every message? It’s a great example of how we anticipate our customers’ needs and act on them. And, it should be pointed out, we offered this service free of charge.” Commenting on the action, and responding to questions about pending privacy litigation and the stalled Congressional effort to shield the telecoms from these lawsuits, NSA spokesperson [REDACTED] remarked: “[REDACTED] we [REDACTED] condone [REDACTED] warrantless [REDACTED], [REDACTED] SIGINT intercepts, [REDACTED] torture [REDACTED] information retrieval by [REDACTED] means necessary.”
Hat tip: Brian Doherty via Julian
I really enjoyed attending the Collective Intelligence FOO Camp, sponsored by Google and O’Reilly Media, last weekend. I’d been expecting a sort of geek slumber party, and had looked forward to rolling out my awesome Darth Vader impersonation. I was all set to cut loose with a growling, “I’m your father, Luke.” It didn’t quite come to that, but I still had a blast, meeting lots of smart, informed, articulate, creative, and successful people. Friendly people, too.
I described how to establish the legality of real money, open-access prediction markets under U.S. law. I called my presentation, Getting from Collective Intelligence to Collective Action [PPT file]. In very brief, I proposed this algorithm:
This account of the FCC’s Boston meeting on Comcast’s network management policies, from Tom Giovannetti.
Somewhere, there are more sophisticated arguments for net neutrality:
The setting where a monopoly infrastructure business, in pursuit of its own ends, could take arbitrary steps that would ruin one business and make another succeed, were regarded as inimical to a really free market. It resembled far too much the widely disliked markets without property rights, dominated by a capricious political power. So what followed was a long period of increasingly stringent regulation.
One might conclude from this discussion of historical precedents for regulation of networks that something like network neutrality ought to be attempted. My take in brief is that that Andrew’s paper understates the aspects of the cure that are worse than the disease and neglects the history of networks beyond a simple pricing story. It is time to try another approach. But there could be some interesting discussion.
Interestingly, though, the current trend in the Comcast proceeding bears no resemblance to a reasoned attempt to provide a real solution to any real problem, to consider the history of networks, or to consider a range of solutions and their tradeoffs. It seems to be an exercise in pure faddish populism. Curious. One wonders what a court will make of it. Mincemeat, I suspect.
The Berkman Center for Internet & Society at Harvard Law School has just announced the formation of the Internet Safety Technical Task Force, and they were kind enough to ask me to serve as a member. According to the press release they sent out this morning:
The Task Force will evaluate a broad range of existing and state-of-the-art online safety technologies, including a review of identity authentication tools to help sites enforce minimum age requirements. The Task Force is a central element of the Joint Statement on Key Principles of Social Networking Safety announced in January 2008 by MySpace and the Attorneys General Multi-State Working Group on Social Networking. Fifty Attorneys General adopted the “Joint Statement” with the goal of improving online safety standards industry-wide.
[I discussed the details of that My Space-AG “joint statement in this report back in January.] The Task Force is composed of industry-leading Internet businesses, non-profit organizations, and technology companies, including: AOL, Aristotle, AT&T, Bebo, Center for Democracy & Technology, Connectsafely.org, Comcast, Enough is Enough, Facebook, Google, the Family Online Safety Institute, iKeepSafe, the Institute for Policy Innovation, Linden Lab, Loopt, IDology, Microsoft, MySpace, NCMEC, Progress and Freedom Foundation, Sentinel Tech, Symantec, Verizon, WiredSafety.org, Xanga, and Yahoo! The Task Force will be chaired by John Palfrey, executive director of the Berkman Center.
Over the past year, I have been very active on many of the issues that will be at the core of the task force’s mission, including the identify authentication / age verification debate. For those who might be interested, I’ve included the relevant PFF studies and links down below the fold. I’m looking forward to working with the other members of the Task Force to conduct a comprehensive review of these issues. I’m sure I will be reporting here occasionally on our progress.
As I mentioned way back in 2005, the specter of FCC content controls for cell phone and other mobile media devices is growing. And, according to this new Radio Ink report, it’s now under serious consideration at the FCC:
FCC Commissioner Deborah Taylor Tate says the FCC is looking into how its indecency regulations could extend to the increasing availability of audio and video content delivered to mobile devices. In a recent speech delivered at the Association of National Advertisers Advertising Law and Business Affairs Conference, Tate said, “As we enter the age of content delivery over mobile devices, there is a whole new set of questions to address regarding how to provide ratings, how to block objectionable content, and whether the FCC has a role to play in this arena.”
To be fair, Commissioner Tate also praised the voluntary steps that industry has already taken to empower parents to deal with this privately. And Tate also said that, “market-based solutions are the best way to achieve our shared goals and to provide parents the tools they need to be the first line of defense for their children.” But the threat of more aggressive intervention by the FCC still looms in light of her earlier comments. Stay tuned; much more to come on this front.
Dominance in the broadband market is a battle of both technology and politics. Right now Comcast, America’s leading cable company, is losing on both counts.
Comcast Executive Vice President David Cohen emerged from the Federal Communications Commission’s hearing on Internet practices in Cambridge, Mass., as unable to defend himself and his company against charges of blocking the peer-to-peer (P2P) Internet application BitTorrent.
Comcast also came out looking like the kind of bullying corporation that resorts to packing the auditorium with its own employees.
Besides, Comcast is not a very good FOK, or Friend of Kevin — as in Kevin Martin, the chairman of the agency. Martin has done nearly everything in his power to harm Comcast and the cable industry since he took over the FCC in March 2005.