irtf rg human rights protocol considerations hrpc
play

IRTF RG Human Rights Protocol Considerations (hrpc) IETF 99 - PowerPoint PPT Presentation

IRTF RG Human Rights Protocol Considerations (hrpc) IETF 99 Friday July 21 2017 9:30 11:30 Co-Chairs: Niels ten Oever Article19 Avri Doria APC Administrivia Mailinglist https://www.irtf.org/mailman/listinfo/hrpc Github


  1. IRTF RG Human Rights Protocol Considerations (hrpc) IETF 99 Friday July 21 2017 9:30 – 11:30 Co-Chairs: Niels ten Oever – Article19 Avri Doria – APC

  2. Administrivia Mailinglist ● https://www.irtf.org/mailman/listinfo/hrpc Github ● https://github.com/nllz/IRTF-HRPC ● Meetecho (remote participation) http://www.meetecho.com/ietf99/hrpc/ ● Minutes http://etherpad.tools.ietf.org:9000/p/notes-ietf-99-hrpc ● Intro website https://hrpc.io

  3. Agenda - Beginning Jabber scribe, note takers Agenda Bashing Notewell Introduction - Context of research - Presentation + Q&A - Milton Mueller - Requiem for a Dream (50 mins) - Discussion of draft-tenoever-hrpc-anonymity-00 - Discussion of draft-tenoever-hrpc-association-01 - Discussion of draft-tenoever-hrpc-political-00/1 - Report back on Hackathon on HTTP status code 451 + HR considerations - Update on status draft-irtf-hrpc-research - Open discussion other drafts, papers, ideas - Next steps - AOB

  4. Note Well Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any ● Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any ● statement made within the context of an IETF activity is considered an "IETF Contribution". Such statements include oral statement made within the context of an IETF activity is considered an "IETF Contribution". Such statements include oral statements in IETF sessions, as well as written and electronic communications made at any time or place, which are addressed statements in IETF sessions, as well as written and electronic communications made at any time or place, which are addressed to: to: • The IETF plenary session • The IETF plenary session • The IESG, or any member thereof on behalf of the IESG • The IESG, or any member thereof on behalf of the IESG • Any IETF mailing list, including the IETF list itself, any working group or design team list, or any other list functioning under • Any IETF mailing list, including the IETF list itself, any working group or design team list, or any other list functioning under IETF auspices IETF auspices • Any IETF working group or portion thereof • Any IETF working group or portion thereof • Any Birds of a Feather (BOF) session • Any Birds of a Feather (BOF) session • The IAB or any member thereof on behalf of the IAB • The IAB or any member thereof on behalf of the IAB • The RFC Editor or the Internet-Drafts function • The RFC Editor or the Internet-Drafts function All IETF Contributions are subject to the rules of RFC 5378 and RFC 8179. All IETF Contributions are subject to the rules of RFC 5378 and RFC 8179. Statements made outside of an IETF session, mailing list or other function, that are clearly not intended to be input to an IETF Statements made outside of an IETF session, mailing list or other function, that are clearly not intended to be input to an IETF activity, group or function, are not IETF Contributions in the context of this notice. Please consult RFC 5378 and RFC 8179 for activity, group or function, are not IETF Contributions in the context of this notice. Please consult RFC 5378 and RFC 8179 for details. details. A participant in any IETF activity is deemed to accept all IETF rules of process, as documented in Best Current Practices RFCs A participant in any IETF activity is deemed to accept all IETF rules of process, as documented in Best Current Practices RFCs and IESG Statements. and IESG Statements. A participant in any IETF activity acknowledges that written, audio and video records of meetings may be made and may be A participant in any IETF activity acknowledges that written, audio and video records of meetings may be made and may be available to the public. available to the public.

  5. Document Review Request • Document quality relies on reviews, please review documents in your working group and at least one other document from another working group. • If you’d like documents you care about reviewed, put the efgort in to review other documents.

  6. Status of research group October, 27, 2014 - Publication of Proposal for research on human rights protocol consideration ● IETF91 - November, 13, 2014: Presentation during saag session ● March 9, 2015 - Publication of Proposal for research on human rights protocol considerations - 01 ● January 2015 - Proposed research group in the IRTF ● IETF92 - March 22 to 27, 2015 – Session & Interviews with members from the community ● June 2015 - Interim Meeting ● July 2015 - Publication of Methodology and Glossary drafts ● IETF93 - July 2015 – Session ● IETF94 November 2015 – Screening of fjlm Net of Rights, updates of Glossary, Methodology, Report drafts, ● Users draft, paper, session December 2015 – Research Group chartered ● IETF95 April 2016 – Session, new Research draft, updated Report and Censorship draft, & 3 talks ● IETF96 July 2016 – Session, new Research Draft – road tests, reviews, text & 3 talks ● IETF97 November 2016 – Session, new Research Draft – reviews, talk ● February 2017 – Research Group Consensus on draft-irtf-hrpc-research-11 ● IETF98 March 2017 – Session, two news drafts, four talks, plenary talk ● IETF99 July 2017 – Session, four new drafts, one talk, running code, draft passed IRSG poll ●

  7. Context and objective of the RG ● T o expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly. ● T o propose guidelines to protect the Internet as a human-rights-enabling environment in future protocol development, in a manner similar to the work done for Privacy Considerations in RFC 6973. ● T o increase the awareness in both the human rights community and the technical community on the importance of the technical workings of the Internet and its impact on human rights.

  8. Presentation + Q&A: Milton Mueller on: Requiem for a Dream: on advancing human rights through internet architecture

  9. Requiem for a Dream On Advancing Human Rights via Internet Architecture Farzaneh Badii and Milton Mueller

  10. Summary • Critical assessment of the belief that we can promote or protect HR through protocol standards and “architecture” • This tendency oversimplifies the complex relationship between technology and society • Human rights are primarily a political and institutional accomplishment, not a matter of technical design • There are contradictions, limitations and potentially negative effects of trying to make policy or protect/enable rights by “design”

  11. What they assert • Human rights can be protected “by design” or “through Internet protocols” • Technologists have a moral and legal responsibility to do so (Cath & Floridi, 2017) • Universal Declaration of Human Rights (UDHR) can be enabled through Internet protocols (Cath and Floridi, 2017) or “baked into the architecture at design time” (Brown et al, 2010). • Internet connectivity is “an enabler of human rights,” and “its architectural design converges with the human rights framework.” (IRTF HRPC, 2017) • The ”human-rights-enabling characteristics of the Internet might be degraded if they are not properly defined, described and sufficiently taken into account in protocol development.” (IRTF HRPC, 2017)

  12. Two distinct positions • A stronger “code is law” claim • A weaker claim that Internet architecture/infrastructure “mediate” human rights

  13. Differences in the two perspectives Code is law Architecture mediates rights • Focuses on ex ante initial design • Focuses on ex post attempts to leverage infrastructure to regulate • Linear and deterministic: • More of a two-way relationship: • Whoever makes the design makes • Infrastructure as site of struggle the rules

  14. Critique Requiem for a dream

  15. Problem 1: The Internet is already “designed” • New IETF protocols and standards work make marginal adjustments and modifications to the general architecture of the internet • If new standards are needed to protect human rights, it means that its architecture does not necessarily protect human rights

  16. Problem 2: The UDHR is too complex and too laden with baggage • Not all rights are relevant to ICTs or connectivity • Even the most relevant rights contain internal conflicts • Free expression vs privacy • Free expression vs. intellectual property • Due process for accused vs. swift justice for victims • The HPRC recognizes this, but its response is lame: • “the different affected rights need to be balanced. “ • “decisions on design and deployment need to take [rights conflicts] into account.”

  17. Problem 3: Code is not law • Where does code come from? • Code and architecture can be, and often are, overridden by laws and regulations

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend