In this month’s VoM, we highlight Dave Clark’s recent presentation, concerning the role of the IETF in Internet protocols and human rights, made to the plenary at IETF 98 in Chicago. Clark reflects on the recent efforts proposing guidelines for human rights considerations in IETF standards work. He recalls earlier efforts (RAVEN) to prevent legal intercept requirements from being standardized by the IETF, and compares that to other SDOs like 3GPPP which took a more active role to facilitate demands of LEAs. He concludes with strong support for the use of human rights as a foundational value in considering technological design considerations, but asks do we design for a preferred outcome and let the “tussle” happen in a way which we have little control, or do we design for a range of outcomes some which we (individually or collectively) may not prefer?

Smearing Section 230: A counterattack

Recently, the Internet Association, a trade group for online service providers, introduced a praiseworthy idea into the NAFTA re-negotiation. It asked for the revised trade agreement to include a principle that online platform providers should be immunized from liability for the content that some of their users post. As the IA put it,

NAFTA should prohibit governments from making online services liable for third-party content. Mexico and Canada lack a clear legal principle like Section 230, creating increased risks for U.S. internet service exporters. In fact, Mexico has proposed increasing liability for e-commerce companies.

Section 230 is widely credited with enabling innovative, free and open online services. Sadly, however, it’s become impossible to talk about Section 230 without also talking about human trafficking, and in particular sex trafficking of minors.

Child sex trafficking and Section 230? How on earth did these two things become linked? That’s a long story – and unfortunately, it’s a story of conscious media manipulation, politicized “facts,” and intellectual dishonesty in the service of an ideological construct. Continue reading

After Charlottesville: Registrars, content regulation and domain name policy

The Internet governance implications of Charlottesville are becoming clearer. When a white supremacist protest resulted in the murder of Helen Heyer, the Daily Stormer published repugnant, hate-filled content about her on its website. This provoked numerous Internet service providers (domain name registrars, DNS proxy services, a DDoS mitigation service and a hosting provider) to terminate Daily Stormer’s services for a variety of alleged Terms of Service (ToS) violation(s). Attempts to register new related domains in different TLDs (e.g., or similar strings (e.g., are being refused or similarly met with termination of service. Until recently, the Daily Stormer website was only accessible on the “dark web” via a .onion address.

Is this all to the good, an example of how the Internet’s private actor-driven governance model responds to abuse and problems on the web? Or is it a worrisome deviation from net neutrality that may come back to bite us? We’ve been following these developments, and in this post we look more closely at the role of domain name registrars and policies in regulating content and domain names.

Continue reading

IGP New Paper: Digital Object Architecture and the Internet of Things

Nowadays the Internet community has a laundry list of things to be frightened about. In the Internet Governance Project’s new paper, we try to reduce that list by one. With the governments’ attempts to localize data, increase surveillance and curb freedom of expression, civil society especially is concerned with how the governance of IoT will play out. Since the ITU-T SG 20 meeting on IoT is forthcoming, we are receiving calls for civil society to fight against the adoption of the Digital Object Architecture as the IoT standard at ITU. But is this really an issue we should be worried about? Karim Farhat’s paper “Digital Object Architecture and the Internet of Things: Getting a ‘handle’ on techno-political competition“, provides a more realistic look at ITU standard setting for IoT devices. Continue reading