[governance] Re: IG questions that are not ICANN [was: Irony]

Carlos Afonso ca at rits.org.br
Mon Dec 10 18:14:16 EST 2007


You can sure include the caucus in the list, Ian. Nobody is perfect... :)

--c.a.

Ian Peter wrote:
> What Bill said – if we are going to do anything in the field of Internet
> governance, we have to deal with less than perfect organizations such as UN,
> governments, corporations, ITU, ICANN, IGP, and, dare I say it, the civil
> society caucus.
> 
>  
> 
> If we can find a way to participate, we should. We should at least follow
> Bill’s suggestion that we ask for CS participation on the Committee of
> Experts. We could submit a raft of names for consideration asking that at
> least one be appointed (all submitted candidates should be people who we
> know would report back and liaise with CS)
> 
>  
> 
> Ian Peter
> 
> Ian Peter and Associates Pty Ltd
> 
> PO Box 10670 Adelaide St  Brisbane 4000
> 
> Australia
> 
> Tel (+614) 1966 7772 or (+612) 6687 0773
> 
> www.ianpeter.com
> 
> www.internetmark2.org
> 
> www.nethistory.info
> 
>  
> 
>    _____  
> 
> From: William Drake [mailto:drake at hei.unige.ch] 
> Sent: 10 December 2007 19:54
> To: Governance
> Subject: Re: [governance] Re: IG questions that are not ICANN [was: Irony]
> 
>  
> 
> Good morning, sunshine,
> 
> On 12/10/07 3:14 AM, "Milton L Mueller" <mueller at syr.edu> wrote:
> 
>>> -----Original Message-----
>>> From: William Drake [HYPERLINK
> "mailto:drake at hei.unige.ch%5d"mailto:drake at hei.unige.ch]
>>> See above.  Re: flawed yes, but fatally---this obviously depends on the
>>> issue, the industry players involved, their degree of consensus and
>>> support
>>> for the approach taken and their ability to implement it, which with
>>> respect
>>> to security I wouldn't make a sweeping statement about before actually
>>> investigating.  When law enforcement, national security, and intelligence
>>> agencies work with major telcos, manufacturers, applications providers
> etc
>>> it seems odd to just assume this cannot matter at all. 
>> That kind of work is going on in many places, and the ITU is not the most 
>> significant place for it. Indeed, the ITU is rather marginalized these
> days. 
> 
> This authoritative pronouncement is based on what, precisely?  You've mapped
> the topology of all the work being done on all the security issues in all
> the relevant institutions, examined the ITU work program in relation to
> this, and determined that there is no interface and cross-pollination
> between these efforts, and that the routine practice of bringing work from,
> e.g. regional and tech-specific forums into ITU for multilateral adoption at
> the global level is of no significance to anything, and hence all the
> thousands of people involved from every government, major network operator,
> manufacturer, etc that are constantly over here just come to go shopping?
> Or are you really saying that you don't follow these things and therefore
> they don't matter?
> 
> I have, as you know, written quite a bit over the years about the historical
> evolution and contemporary decline of the telecom regime, so I not only get
> the marginalization argument, but have made it.  However, it's worth noting
> that this marginalization is relative; for example, while the telecom
> regulation treaty directly shapes a declining share of activity, carriers
> from the US alone (just one of 191 member states) still settle over $7
> billion a year under its terms and are fairly concerned about current
> proposals for change.  But that doesn't matter I guess, since it's not about
> domain names.  The extent of marginalization is also highly variable: for
> spectrum management it's non-existent, for standards, including
> security-related aspects, it depends on a host of factors per previous. In
> some cases the main action is elsewhere, in some it's not.
> 
>> And if civil society critics succeeded, after the kind of HUGE effort that
> it 
>> would take, in getting an influential seat at some ITU table then the
> chances 
>> are great that certain parties would forum-shift to somewhere else. 
> 
> I have absolutely no illusions that CS would make a HUGE effort and wasn't
> proposing this.  But since the Argentine-Swiss proposals to open the door to
> CS are the focus of active debate right now, it'd be nice if CS wasn't
> entirely silent, which just makes it easier for the more retrograde
> governments to say why bother, they don't care anyway.  At a post-WSIS ITU
> meeting a couple years ago, I presented a quickly assembled statement that
> was signed by two dozen caucus people criticizing the CS lock out and saying
> this is one of the reasons CS doesn't want ITU near IG, and it did get their
> attention.  But now that friendly governments are actually trying to do
> something about the matter, we're not there to offer any support.  Wille and
> I made presentations on CS inclusion at a meeting this year that were
> perceived I think as sort of solo views, not supported by any broader
> constituency demand.  It'd have been nice if we'd had a sign on or
> something, which is not all that hard to do, except when the gestalt is, who
> cares, it's not ICANN.
>  
>> No one said the issues of lawful intercept and cybersecurity "don't
> matter." 
>> Indeed, if you've been paying attention to IGP's work at all you should
> know 
>> that we've been focusing on that quite a bit, with some relatively good 
>> results in the DNSSEC sphere. 
> 
> Like all good citizens, I am a dutiful student and hang on IGP's every word.
> Brendan's DNSSEC stuff is interesting and important, but it's a piece of a
> much larger puzzle, which is what we're talking about.
> 
>> But this kind of politics is trench warfare and it makes little sense for
> CS 
>> groups to enter into a battle on the terms and conditions set by industry
> and 
>> govts, which is precisely what you are inviting us to do. 
> 
> Then why did we/you participate in WSIS?  Why, for that matter, do you
> participate in ICANN if this is a disqualifier?  That's the way the world
> is, so why not pack up our tents and go home?
>  
>>> processes are nonetheless consequential, no?  Re: top down, ok if by this
>>> you mean CS is excluded and a number of segments of relevant Internet
>>> industries opt not to get involved.  But for those industry groupings
> that
>>> opt to be involved, it is as bottom up as any other standards process.
>> Sure. But think of resource allocation. Scarce time, labor money. I don't
> see 
>> the case for CS involvement in ITU processes, or for fighting a process
> battle 
>> in that forum. 
>>
>> You give me a specific issue worth fighting for, and show me that ITU is
> the 
>> best place to fight it, then I'll be there. But if you want me to knock my
> 
>> head against the wall of a 150 year old bureaucracy trying to gain some 
>> generic recognition for something called "civil society" no thanks. 
> 
> Ok, restrict your head banging to a nine year old bureaucracy instead.
> 
> FYI, today begins a four day meeting of WP 2 of SG 17 and there's a ton of
> people from irrelevant outfits like VeriSign over there.  Here's the piffle
> WP 2 is currently working on:
> 
> 
> 
> *	Supplement 1 to X.800-X.849 series on security: Security baseline
> for network operators 
> *	Security architecture aspects of end users and networks in
> telecommunications 
> *	Framework for creation, storage, distribution and enforcement of
> policies for network security 
> *	Network security assessment/guidelines based on ITU-T Recommendation
> X.805 
> *	Framework for EAP-based authentication and key management 
> *	Guidelines for implementing system and network security 
> *	Overview of cybersecurity 
> *	A vendor-neutral framework for automatic notification of security
> related information and dissemination of updates 
> *	Guidelines for telecommunication service providers for addressing
> the risk of spyware and potentially unwanted software 
> *	Guideline on preventing worm spreading in a data communication
> network 
> *	User control enhanced digital identity interchange framework 
> *	Identity management use cases and gap analysis 
> *	Identity management framework for global interoperability 
> *	Supplement to X-series Recommendations on identity management:
> Identity management lexicon 
> *	Requirements for global interoperable identity management 
> *	Network security management framework 
> *	Privacy guideline for RFID 
> *	Requirement of security information sharing framework 
> *	Service oriented architecture framework 
> *	Service oriented architecture security 
> *	Information security management guidelines for telecommunications
> based on ISO/IEC 27002 
> *	Risk management guidelines for telecommunications 
> *	Security incident management guidelines for telecommunications 
> *	Telebiometrics related to human physiology 
> *	BioAPI interworking protocol 
> *	Telebiometrics authentication infrastructure 
> *	Telebiometrics digital key framework 
> *	A guideline of technical and managerial countermeasures for
> biometric data security 
> *	A guideline for secure and efficient transmission of multibiometric
> data 
> *	Telebiometrics system mechanism - General biometric authentication
> protocol and profile on telecommunication system 
> *	Telebiometrics system mechanism - Protection profile for client
> terminals 
> *	Device certificate profile for the home network 
> *	Guideline on user authentication mechanism for home network services
> 
> *	Differentiated security service for secure mobile end-to-end data
> communication 
> *	Authentication architecture in mobile end-to-end data communication 
> *	Correlative reacting system in mobile network 
> *	Security architecture for message security in mobile web services 
> *	Guideline on secure password-based authentication protocol with key
> exchange 
> *	Authorization framework for home network 
> *	Security requirements and framework in multicast communication 
> *	Privacy protection framework for networked RFID services 
> *	Security requirements for peer-to-peer communications 
> *	Security architecture for peer-to-peer network 
> *	Secure end-to-end data communication techniques using TTP services 
> *	Requirement and Framework for USN 
> *	Requirement on countering spam 
> *	Technical framework for countering email spam 
> *	Framework of countering IP multimedia spam 
> *	Guideline on countering email spam 
> *	Overview of countering spam for IP multimedia applications 
> *	Technical means for countering spam 
> *	Interactive countering spam gateway system 
> *	SMS filtering system based on users’ rules
> 
> 
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.5.503 / Virus Database: 269.16.17/1179 - Release Date: 09/12/2007
> 11:06
> 
> 
> 
> No virus found in this outgoing message.
> Checked by AVG Free Edition. 
> Version: 7.5.503 / Virus Database: 269.16.17/1179 - Release Date: 09/12/2007
> 11:06
>  
> 
> 

____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.cpsr.org
To be removed from the list, send any message to:
     governance-unsubscribe at lists.cpsr.org

For all list information and functions, see:
     http://lists.cpsr.org/lists/info/governance



More information about the Governance mailing list