Internet Realities Watch, vol. 6
Telecommunication Partnerships, Content Moderation, Data Privacy Laws, and More
This is the sixth blog in our Internet Realities Watch series, where we use our Idealized Internet vs. Internet Realities framework to track changes to the internet reality around the world. Read the previous post here.
| Governance Tier Element | Changes |
|---|---|
| Laws & Regulations | 6 |
| Social Norms | 0 |
| Standards | 0 |
| Markets | 2 |
| Architecture Tier Element | Changes |
|---|---|
| Content | 6 |
| Application & Presentation | 3 |
| Session | 1 |
| Transport | 0 |
| Network | 3 |
| Data Link | 0 |
| Physical | 1 |
Argentina: Jujuy, one of the poorest provinces in Argentina, with crime rates above the national average, will soon begin installing surveillance systems purchased from Chinese telecommunications corporation ZTE. Argentina will receive its following a contract agreed between operator Cotecal (Co-operative Telefonica Calafate) and ZTE Corporation. ZTE landed a nearly $30 million surveillance contract with Jujuy in March to provide cameras, monitoring centers, emergency services, and telecommunications infrastructure. The local Jujuy government anticipates that the installation of these cameras will result in less local crime. In announcing the partnership, the local government said Jujuy can now be 鈥.鈥 Argentina is the latest Latin American country to work with Chinese telecommunication giant ZTE on the acquisition of surveillance technology, following in the footsteps of Venezuela and Brazil.
Ethiopia: The government the opening of its telecommunications market, which is the largest in Africa, through the awarding of licenses to two telecom operators. This regulatory shift opens up the market and has the potential to greatly impact internet architecture in the process.
France: The French National Assembly a bill that would require social media firms to implement tools to detect 鈥渃learly illicit鈥 content, which could be anything that is discriminatory or prejudiced in nature. The National Assembly Member who proposed the bill has the measure is meant to protect people from speech online that they would otherwise be protected from offline (e.g., shouting racist or homophobic abuse in the street). Unsurprisingly, as with other proposals that have cropped up in this vein of late, critics such as human rights organizations are about the 24-hour time limit to remove content and whether the bill鈥檚 provisions may encourage over-censorship on the part of platforms, undermining free speech in the process. This proposed legislation would impact online content, and it could also impact the network and application layers of the internet should companies modify their platforms to meet content detection and removal requirements.
Indonesia: The Information and Communications Ministry is banning Virtual Private Networks that don鈥檛 have a local license. Amidst concerns that VPNs can be used to circumvent Indonesian censorship, the government has argued that VPNs are like ISPs, and therefore must be regulated akin to how ISPs are regulated in the country: 鈥淭he rule is that they must be licensed. VPNs are like ISPs in that they provide internet connections by way of users being connected to their servers. Whoever it is, we can just block them if they aren鈥檛 licensed.鈥 Indonesia has previously during social unrest. If implemented, these regulatory measures would impact how VPN-connected sessions are handled, and likely how network mechanisms are filtered by the state (e.g., to detect usage of unlicensed VPNs). They would also impact content and applications in the process.
Kazakhstan: On July 17, 2019 the Kazakhstani government started intercepting all HTTPS internet traffic inside its borders. When trying to access the internet, Kazakh users are now redirected to web pages that contain instructions on how to install the government鈥檚 root certificate in their desktops and mobile devices. The certificate allows government agencies to decrypt users鈥 HTTPS traffic, look at its content, encrypt it again with their certificate, and send it to its destination. Ministry officials claimed the mandatory certificate installation was to be confined to Kazakhstan's capital of Nur-Sultan; however, local media that Kazakh users from around the country are being required to install the certificate in order to access the internet.
United States: The governor of Maine the Act to Protect the Privacy of Online Consumer Information into law, shortly after Nevada implemented a similar law in late May. Its measures include restrictions on the data practices of internet service providers (ISPs), requiring them to obtain consumer consent prior to 鈥渦sing, disclosing, selling or permitting access鈥 to their data with a third party. It goes into effect in January 2020. While some observers similarities to California鈥檚 relatively new privacy law, The Hill鈥檚 Maggie Miller that the Maine law forces companies to require customer opt-in and therefore, stricter than its Californian counterpart. A coalition of broadband providers, meanwhile, have criticized the law on the grounds that 鈥淒ata does not recognize state borders, and a fragmented, state-by-state approach sets uneven and inconsistent protections for consumers that are difficult, and sometimes impossible to implement.鈥 This law impacting network and data elements of internet architecture is sure to inform broader U.S. debates and emerging regulations on data privacy and consumer protection.
United States (2): A bill introduced by Senator Josh Hawley, 鈥,鈥 would 鈥渆ncourage providers of interactive computer services to provide content moderation that is politically neutral.鈥 The proposal, which would alter Section 230 of the Communications Decency Act (good legal analysis ) would impact how online platforms interact with content on their platforms, including content that may violate existing terms of service. The proposal has from both parties, with criticisms including claims of flagrant First Amendment violations, unjustly forcing private firms into certain content decisions about their own platforms, and placing too much power in the hands of the government (鈥渃entral planning鈥). At the same time, however, IBM has in support of changes to what it calls a 鈥渓iability shield鈥 via the Communications Decency Act for platforms to avoid responsibility for hosting and not removing harmful content.
United States (3): The Senate is looking to vote on the , which would 鈥渆stablish an alternative dispute resolution program for copyright small claims, and for other purposes.鈥 The Electronic Frontier Foundation the bill 鈥渨ould create a brand new quasi-court for copyright infringement claims鈥 and that 鈥渟erious problems inherent with the bill have not been remedied by Congress before moving it forward,鈥 such as enabling patent trolls who desire to file as many copyright claims as possible to make income through statutory damage provisions in the legislation.
In other news, Lily Hay Newman writes for on the hijacking of BGP, the Border Gateway Protocol; Justin and Arindrajit Basu write for on fostering strategic convergence in U.S.-India tech relations, including on issues like cyber norms and data governance; and Justin analyzes India鈥檚 data protection bill, which includes requirements on data localization in geopolitical context.
Keith B. Richburg writes in about how Chinese leaders are likely thinking 鈥渢old you so鈥 in response to growing Western realizations that the internet could probably do with some degree of regulation. Mozilla in the U.K. for its proposal to use DNS-over-HTTPS, which is an encryption mechanism for better protecting internet traffic from hackers (i.e., man-in-the-middle attacks) alongside better traffic performance; privacy advocates are concerned it could enable easier circumvention of U.K. web filtering. 23 civil society groups the internet shutdowns in Sudan, writing that 鈥渟hutdowns disrupt the free flow of information and create a cover of darkness that allows repression to occur without scrutiny.鈥 The German government Facebook for failing to adequately disclose information鈥攁 requirement of its NetzDG law which, among other things, requires social media companies operating in Germany to publish biannual transparency reports. This arrives just as the U.S. Federal Trade Commission Facebook with a $5 billion fine for mishandling users鈥 personal information.
Additionally, political science professor Kevin Munger argues in that the so-called Palo Alto Consensus, where a one-size-fits-all internet is well-suited for the world, is increasingly crumbling:
Part of the appeal of the Palo Alto Consensus was that it would create a dilemma for states: They could not restrict online information flows without upsetting their populations鈥 social and economic lives. The assumption was that states would be prevented from shutting down information flows about, say, corruption or police brutality. That has been a success. But everyone seems to have underestimated the demand for information about how white nationalism is good and vaccines are bad. The downsides of information flows controlled by powerful institutions are obvious, but now people are coming to recognize their upsides.
Two final pieces to note: Liam Tung in on a recent spurt of cloud service provider outages, and what that says about the resiliency vulnerabilities in contemporary web infrastructure; and a read-out in on 5G, spectrum, and infrastructure discussions at the 7th Latin American Telecommunications Congress held in Argentina.