ISPs, Advocates, and Framing at the 2011 Telecom Summit

3183290111_989c5b1bec_bEach year Canada’s leaders in telecommunications gather at the Canadian Telecommunications Summit to talk about ongoing policy issues, articulate their concerns about Canada’s status in the world of telecommunications, and share lessons and experiences with one another. This years Summit was no exception. While some commentators have accused this year’s event of just rehashing previous years’ content – it is true that each Summit does see similar topics on the conference agenda, with common positions taken each year – there are some interesting points that emerged this year.

Specifically, discussions about the valuation of telecom services regularly arose, discussions of supply and demand in the Canadian ISP space, as well as some interesting tidbits about the CRTC. For many people in the industry what I’ll be talking about isn’t exactly new; those not inside the industry’s fold, however, may find elements of this interesting. After outlining some of the discussions that took place I will point to something that was particularly striking throughout the Summit events I attended: Open Media loomed like a spectre throughout, shaping many of the discussions and talking points despite not having a single formal representative in attendance.

Continue reading

Publications in OpenMedia’s ‘Casting an Open Net’

Openmedia.caFor the past several months I’ve been working away at a series of ‘traditional’ publication-type writings. One of those pieces included major sections of OpenMedia.ca’s report that was released today, entitled “Casting an Open Net: A Leading Edge Approach to Canada’s Digital Future.”

More specifically, I worked as the lead author on the economic section of the report, arguing that obtrusive network management practices, bandwidth speeds, and download/upload capacities that unduly favor one party over another are damaging to innovation in Canada. I’m also third author of the technical section, where I brought my expertise around deep packet inspection and usage based billing to the group of excellent authors who led that section. I’ve included the introduction, below, as well as links to download the report. Comments are, of course, welcome.

The Open Internet: Open for Business and Economic Growth

The Internet is widely regarded as one of the modern era’s greatest engines of economic growth and innovation. Ensuring ubiquitous, affordable, and open access to the Internet across all social sectors supports and promotes economic growth. By providing a reliable platform for applications development, communications improvements, and content distribution, we create the potential for greater efficiencies and growth in business-to-business, business-to-consumer, peer-to-peer, and consumer-to-business transactions.

In this section, we delve deeper into the essential role that the open Internet plays in the Canadian economy as an engine of innovation and growth. The unique characteristics of the Internet have allowed Canadians to create some of the world’s leading websites and applications. We argue that when businesses and citizens are forced to pay more for Internet access in Canada, or face other restrictions on use — especially compared to our global counterparts — we have fewer opportunities to invest in and develop the kind of innovations that make our economy flourish.

In Section One, we argue that co-invention and web-based entrepreneurship flourish best in neutral networks and that the Internet’s innate openness enables a democratization (i.e. of access and success) that fosters creativity, competition, and innovation. In Section Two, we argue that Canadian Internet Service Providers (ISPs) are transitioning towards technical architectures that discriminate against and seek to control certain applications, and we warn that this gradual enclosure of the Internet threatens to restrict user access, choice, and innovation, and thus threatens to reduce the value of the Internet overall. In particular, we discuss how ISPs use the practice of bandwidth throttling of specific applications (e.g. P2P file sharing) and usage-based pricing to discriminate against certain types of online activities in an effort to centralize control. Finally, we conclude by emphasizing that ISP interference undermines the core values of equality and neutrality operating at the heart of the Internet and that this interference threatens the Internet’s invaluable role as an engine of innovation and economic growth.

The ability for Canadians to innovate is more and more central to our economic well-being and competitiveness. As we explain below, the open Internet is an essential engine of innovation; without a fast, ubiquitous, and open Internet, Canada will continue to fall behind in economic productivity. E-commerce, the information and communications technologies (ICT) sector, and increasingly, traditional businesses, depend heavily on open access to the Internet. Any barrier to Internet use is a barrier to business development in general.

Review: Network Nation – Inventing American Telecommunications

Image courtesy of Harvard University Press

I spend an exorbitant amount of time reading about the legacies of today’s telecommunications networks. This serves to historically ground my analyses of today’s telecommunications ecosystem; why have certain laws, policies, and politics developed as they have, how do contemporary actions break from (or conform with) past events, and what cycles are detectable in telecommunications discussions. After reading hosts of accounts detailing the telegraph and telephone, I’m certain that John’s Network Nation: Inventing American Telecommunications is the most accessible and thorough discussion of these communications systems that I’ve come across to date.

Eschewing an anachronistic view of the telegraph and telephone – seeing neither through the lens that they are simply precursors to contemporary digital communications systems – John offers a granular account of how both technologies developed in the US. His analysis is decidedly neutral towards the technologies and technical developments themselves, instead attending to the role(s) of political economy in shaping how the telegraph and telephone grew as services, political objects, and zones of popular contention. He has carefully poured through original source documents and so can offer insights into the actual machinations of politicians, investors, municipal aldermen, and communications companies’ CEOs and engineers to weave a comprehensive account of the telegraph and telephone industries. Importantly, John focuses on the importance of civic ideals and governmental institutions in shaping technical innovations; contrary to most popular understandings that see government as ‘catching up’ to technicians post-WW I, the technicians have long locked their horns with those of government.

Continue reading

Released: Literature Review of Deep Packet Inspection

Scholars and civil advocates will be meeting next month in Toronto at the Cyber-surveillance in Everyday Life workshop. Participants will critically interrogate the surveillance infrastructures pervading daily life as well as share experiences, challenges, and strategies meant to to rein in overzealous surveillance processes that damage public and private life. My contribution to the workshop comes in the form of a modest overview of literature examining Deep Packet Inspection. Below is an abstract, as well as a link to a .pdf version on the review.

Abstract

Deep packet inspection is a networking technology that facilitates intense scrutiny of data, in real-time, as key chokepoints on the Internet. Governments, civil rights activists, technologists, lawyers, and private business have all demonstrated interest in the technology, though they often disagree about what constitutes legitimate uses. This literature review takes up the most prominent scholarly analyses of the technology. Given Canada’s arguably leading role in regulating the technology, many of its regulator’s key documents and evidentiary articles are also included. The press has been heatedly interested in the technology, and so round out the literature review alongside civil rights advocates, technology vendors, and counsel analyses.

Downloadable .pdf version of the literature review.

Security, Hierarchy, and Networked Governance

UnlockedThe capacity for the Internet to route around damage and censorship is dependent on there being multiple pathways for data to be routed. What happens when there are incredibly few pathways, and when many of the existing paths contain hidden traps that undermine communications security and privacy? This question is always relevant when talking about communications, but has become particularly topical given recent events that compromised some of the Internet’s key security infrastructure and trust networks.

On March 22 2011, Tor researchers disclosed a vulnerability in the certificate authority (CA) system. Certificates are used to encrypt data traffic between parties and to guarantee that security certificates are actually issued to the parties holding them. The CA system underpins a massive number of the Internet’s trust relationships; when individuals log into their banks, some social networking services, and many online email services, their data traffic is encrypted to prevent a third-party from listening into the content of the communication. Those encrypted sessions are made possible by the certificates issued by certificate authorities. The Tor researchers announced that an attacker had compromised a CA and issued certificates that let the attacker impersonate the security credentials associated with many of the world’s most prominent websites. Few individuals would ever detect this subterfuge. In effect, Tor researchers discovered that a central element of the Internet’s trust network was broken.

In this post I want to do a few things. First, I’ll briefly describe the attack and its accompanying risks. This will, in part, see me briefly discuss modes of surveillance and motivations for different gradients of surveillance. I next address a growing problem for today’s Internet users: the points of trust we depend on, such as CAs and the DNS infrastructure, are increasingly unreliable. As a result, states can overtly or subtly manipulate to disrupt or monitor their citizens’ communications. Finally, I suggest that in spite of these points of control, states are increasingly limited in their capacities to unilaterally enforce their will. As a consequence of networked governance, and its accompanying power structures, citizens can impose accountability on states and limit their ability to (re)distribute power across and between nodes of networks. Thus, networked governance not only transforms state power but redistributes (some) power to non-state actors, empowering those actors to resist illegitimate state actions.

Continue reading

Technology and Politics in Tunisia and Iran: Deep Packet Surveillance

Middleeast-IranFor some time, I’ve been keeping an eye on how the Iranian government monitors, mediates, and influences data traffic on public networks. This has seen me write several posts, here and elsewhere, about the government’s usage of deep packet inspection, the implications of Iranian government surveillance, and the challenges posed by Iranian ISPs’ most recent network updates. Last month I was invited to give a talk at the Pacific Centre for Technology and Culture about the usage of deep packet inspection by the Iranian and Tunisian governments.

Abstract

Faced with growing unrest that is (at least in part) facilitated by digital communications, repressive nation-states have integrated powerful new surveillance systems into the depths of their nations’ communications infrastructures. In this presentation, Christopher Parsons first discusses the capabilities of a technology, deep packet inspection, which is used to survey, analyze, and modify communications in real-time. He then discusses the composition of the Iranian and Tunisian telecommunications infrastructure, outlining how deep packet inspection is used to monitor, block, and subvert encrypted and private communications. The presentation concludes with a brief reflection on how this same technology is deployed in the West, with a focus on how we might identify key actors, motivations, and drivers of the technology in our own network ecologies.

Note: For more information on the Iranian use of deep packet inspection, see ‘Is Iran Now Actually Using Deep Packet Inspection?