Welcome!

Open Source Cloud Authors: Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan, Yeshim Deniz

Related Topics: IBM Cloud, Microservices Expo, Linux Containers, @CloudExpo

IBM Cloud: Blog Feed Post

A CTO Analysis of Hillary Clinton’s Speech on Internet Freedom

This is a very good presentation of policy worth a complete read by all

On 21 January 2010 Secretary of State Clinton delivered a speech on the topic of Internet Freedom.

This is a very good presentation of policy worth a complete read by all, but I looked through it for statements indicating what we technologists should focus on. 

I tried to find the phrases indicating what the Secretary was saying the US should or will do, since that should drive many other government actions and should help technologists think through what we may be asked to do/support.

Key points of this speech include:

  • “We stand for a single internet where all of humanity has equal access to knowledge and ideas.”
  • “We believe it’s critical that its users are assured certain basic freedoms. Freedom of expression is first among them. This freedom is no longer defined solely by whether citizens can go into the town square and criticize their government without fear of retribution. Blogs, emails, social networks, and text messages have opened up new forums for exchanging ideas, and created new targets for censorship. “
  • “We do not tolerate those who incite others to violence.”
  • “Those who use the internet to recruit terrorists or distribute stolen intellectual property cannot divorce their online actions from their real world identities.”
  • “These challenges must not become an excuse for governments to systematically violate the rights and privacy of those who use the internet for peaceful political purposes.”
  • “We must work to advance the freedom of worship online just as we do in other areas of life.”
  • “States, terrorists, and those who would act as their proxies must know that the United States will protect our networks. “
  • “Countries or individuals that engage in cyber attacks should face consequences and international condemnation.”
  • “The freedom to connect – the idea that governments should not prevent people from connecting to the internet, to websites, or to each other. “

My first general thought upon reviewing those compelling actions is- “I’m on board!” It is good getting policy guidance from the Secretary of State on this.  It is fine, of course, for academics and citizens to scrutinize those and offer opinions and thoughts and argue.  That is just the nature of democracy.  But we lack so much official vision in the cyber domain I’m going to default towards following the leader here, at least for now.  My hope is we can all pull behind the Secretary of State and others and execute on these goals (but hey give me time and I may decide to mount some arguments for change… just for now I think it is best to salute and follow).

My second general thought is that the Internet was not designed to be a platform to enable any of those actions.  Oh boy, that is going to make it tough.  And since there is huge lock-in on the current standards and design we are not going to be able to simply build a new Internet with new design criteria and then switch everyone to that.  Nope, we are going to have to find ways to change the fabric of the current Internet to make it possible to achieve these objectives.

Some other non-technical thoughts I think relevant to follow-on work:

  • Meeting these goals will require connection to “all of humanity.”  That piece is more achievable than it may sound.  There are already 4B cell phones active in the globe for about 6B people.  So we are two-thirds of the way there.   This will require much more infrastructure work but we can do this.  And in places where ground-based infrastructure is not possible then space-based access is also possible (maybe via Cisco’s IRIS?).
  • We must have ways to protect anonymity of good people, but not allow anonymity of bad people.   This is going to be much harder to do than it is to say.  I believe a structure could be put in place, with massive engineering, where all people are given some means to stay anonymous but when a certain key is applied their cloak can be peeled back.  Hmmm.  Who wants to keep those keys?
  • The US is now on the record saying we will protect our networks.  How, I wonder, will we do that?  This is not the first time this question has been asked.  I know many great thinkers have been noodling over that one for a long lone time and that one is also easier said than done.  I know we can engineer in more security and have heard of some powerful ideas on how to do it.  But we have to move the ideas to action quick.  And we need to do that not just for the federal government but the entire US infrastructure.

Who can make these goals real?

The many technologists who design and field components of the modern Internet come together in multiple forums, many of which are key standards bodies.  A short list of standards bodies is here.

A few standards bodies particularly relevant to designing Security into the Internet fabric are:

  • ANSI – American National Standards Institute
  • IEEE – Institute of Electrical and Electronics Engineers
    IETF
    – Internet Engineering Task Force
  • ISO – International Organization for Standardization
  • ITU – The International Telecommunication Union
    • ITU-R – ITU Radiocommunications Sector (formerly known as CCIR)
    • ITU-T – ITU Telecommunications Sector (formerly known as CCITT)
    • ITU-D – ITU Telecom Development (formerly known as BDT)
  • OMA – Open Mobile Alliance

Another key body is ICAAN.

So, what’s next?  I don’t know but I expect to see follow on action to be coordinated across the federal government and expect to see continued action on making these policies real.

Any thoughts on that?

Related posts:

  1. CTOs: Keep your focus on security and functionality
  2. Current Internet Explorer security flaw even worse than usual ones: Use Firefox or Chrome
  3. One to watch regarding standards and security

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...