The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 1 to 4.
101 Ways of Starting an ISP:* No. 53 - Conversation, Content and Weird Fiction
https://cis-india.org/raw/blog_101-ways-of-starting-an-isp-no-53-conversation-content-weird-fiction
<b>This essay by Surfatial is part of the 'Studying Internet in India' series. It argues that the internet has created a space for philosophical questioning among contemporary Indian participants which can develop further, despite common assertions that online spaces are largely uncivil and abusive. It actively explores how anonymous and pseudonymous content production may offer a method for exploring and expressing the internet in India, with a certain degree of freedom, and how spam-like methods may prove effective in puncturing filter bubbles.</b>
<p> </p>
<h4>* ISP stands for Internal Surface Provider.</h4>
<hr />
<p>Mainstream institutions for learning, as we see them, are not concerned with the substance and gravity
of the present moment <a href="#B1">[B1]</a>. The professing of experience to aid learning or skill development is largely a perverted claim. There is no actual intention of enabling, nor is there even a desire to personally experience any immersion or penetration <a href="#B2">[B2]</a>. Added to this is the spectre of commodification of experience and learning today, where education has turned into a consumer product. The ivory tower of aloofness is too comfortable to deviate from. The institutionalisation of aloof posturing and the masks of professorships are too smugly fitting the exhausted bodies of those running the ship.</p>
<blockquote>Academics are like <strong>fruit on an inaccessible tree</strong>. It is there, but we cannot eat it. The moon is spoken of by poets and lovers because it is so far away and experientially inaccessible. <strong>Love is a stream</strong> and will never be in a state of harmony forever. It will remain tumultuous and <strong>rocky like the sea</strong> into which an asteroid has just fallen.</blockquote>
<p>We observe that disinterest in engaging in the immediacy of our continuing experience invariably leads us to holding on to selective bits while the rest passes. These selections then get shaped into some semblance of narratives. But how do we talk about the experience of the moment or even acknowledge the presence of what has not been selected? How does an individual’s perception and response direct to a better understanding of experiences that can harbour empathy?</p>
<blockquote>When <strong>telephones get cross-connected</strong>, we hear voices that do not belong to the conversation. What if these voices were to become a part of the conversation? We can talk to strangers. We don’t really need to talk about anything in particular - <a href="https://www.youtube.com/watch?v=bS0VCi6Jd7s">we can just get used to each other’s voice</a>.</blockquote>
<p>Surfatial is concerned with knowledge production and has been exploring the format of conversations both online and offline as a space to perform personally experienced sequences of knowledge, and talk about these to others. Somewhere in this process learning emerges. We are currently seeding a platform for the sharing and dissemination of alternate pedagogies and self-woven visions of the world. This desire responds to academia's hangover with the past and its inability to instil processes and incubate practices that can help students in a continual production of content.</p>
<img src="https://github.com/cis-india/website/raw/master/img/Surfatial_2016_Image001.png" alt="Can we talk about here and now?" width="250px" align="right" />
<blockquote>Narrative is processed from raw experience and so it is more easy to deal with than the complex mass of experience.</blockquote>
<h3><strong><em>Harnessing Anonymity</em></strong></h3>
<p>The internet offers you a morphing cloak - you can be selective about your identity, you can be online with selective vision and selective speech <a href="#B3">[B3]</a>. What do you choose to see online? What do you choose to reveal? And how much? <a href="#B4">[B4]</a> If you wear the cloak that covers you altogether, are you truly anonymous, or could it be that your true self leaks out as you put your hands against your eyes in an attempt to hide yourself?</p>
<blockquote>Think about a day when <strong>you want to say something</strong> and you feel that the Internet feels like too distant a medium. The Internet is so close to us, so intertwined in our lives that the perception of distance feels like a make-believe construct.</blockquote>
<p>Anonymity has potential to offer <strong>a voice to the invisible identity</strong>, the silenced perspective, the overlooked persona, the taboo desire. Could it also be harnessed for accessing and expressing that which is experienced in the present? Could anonymity be that filter which stands with the least amount of obstruction to experiencing the present as it unfolds, does it offer that means to experience more freely?</p>
<blockquote><em>Why are you online? What are you looking for online? <strong>What do you see?</strong> How does a visually impaired person experience the internet? What does that feel like? And then, what do you say online?</em></blockquote>
<p>From awkwardness and discomfort as the minimum level of experience, we are moving to anger, disinterest and boredom <a href="#B5">[B5]</a>. This social reality is being exacerbated by the manifestation of our realities on the internet. Anger is a mode of communication that rejects existing <strong>content in the pipeline</strong> and allows a relentless push mode of transmission. Disinterest is a lack of empathy that we are privileged to employ, while, at the same time, displacing and dismantling existing systems of falsehood and decay that are populating the system. Boredom is disengagement that comes from an immunity to words that don't mean anything - <strong>floating in the air</strong>, timed to music or masquerading as knowledge.</p>
<blockquote>If we keep an open mic near a flock of passionate birds, will the flapping and other sounds become a cacophony to form an interesting soundscape? Do <strong>birds become conscious</strong> of an open mic?</blockquote>
<p>Surfatial works for the frustrated seeker, seeking nourishing clarifying content on the internet. The
internet has become a shopping mall, but this doesn't mean that we can't walk around and talk to people.</p>
<p><a href="https://soundcloud.com/surfatial/production">What to do? How to act? What to produce?</a> What should the lost and wandering tribes of the world do to express with diversity? <strong>Is there some secret pathway</strong> to knowing what to do that is only accessible to deviants?</p>
<blockquote>Production means to render an output, from the flux that we encounter in our experience. We can also choose not to produce but then we end up with a mass of material and no narrative.</blockquote>
<p>Does deviation from the norm guarantee some kind of clarity? Why can't ordinary people know? Why do
they have <strong>to be inspired and awake</strong>ned and creative to know? Is there nothing that flows in the narrow channels of propriety?</p>
<blockquote>Deviation does guarantee a unique pool of content being made for us to access. But the question is
how this access is setup <strong>for a kind of secondary process</strong> - one that is possible only after the ordinary has been dealt with and has led to something. Deviant content leads us further away from the sugar-coated annals of the plain world that is meant for mass-consumption.</blockquote>
<p>We live in echo chambers online and off. An infrastructure needs to be in place for the flow of a lubricant
<a href="#B6">[B6]</a> within echo chambers so that the <strong>conversation in the closed loop</strong> becomes smooth enough, and when a disassociation from the self or a disparate viewpoint happens, it is less painful. The echo-chamber becomes the social space when multiple levels of echoes are able to inter-mingle in ambiguous
contexts and containers.</p>
<blockquote><em>If we were not productive beings we would not be able to deal with ourselves. We would be strangers to our own legacies.</em></blockquote>
<h3><em>Spaces for Speculative Content Production</em></h3>
<p>Surfatial offers an online stage for self-enactment, where there can be friction without producing sparks. As a producer of assembly line infrastructure around access to knowledge, we find denial very useful. Denial of identity, denial of social constructions, denial of expected modes of speaking in conversations. We find that we create even the room for conversation around the need for alternatives after allegiances have stopped being in existence.</p>
<blockquote>The internet is not a pool, it is a cesspool. Everyone who is trying to navigate the space feels stuck and lost. So we avoid navigation and jump from node to node in order to escape from the boiling cesspool that gets too hot if we remain in the same place for a long time.</blockquote>
<p>When the shadows of dependencies on systemic corruptions have disappeared the real possibility of ‘being’ arises. We care about this possibility. We are making access to knowledge universal, since access based on the question of privilege and capacity sets a very low bar for conversations in terms of what is allowed to be spoken, which directions of verbal exploration are politically acceptable, and who gets to abuse whom with which epithets. We are concerned with formats that are open to every participant’s perspective equally and their individual approach to contributing to the collective voice.</p>
<blockquote><a href="https://soundcloud.com/surfatial/denial"><em>The play never ends. Laugh at yourself<br />
Seek a new denial... the shift of power is a natural process</em></a>.</blockquote>
<p>Anonymous and pseudonymous forms of content production offer a method for exploring and expressing with a certain degree of <a href="http://www.museumofvestigialdesire.net/sanctuary/freedom/freedom-to-be-deluded">freedom</a>. How free we feel depends partly on how free we are allowed to feel <a href="#B7">[B7]</a>, and depends in equal parts on the level of our own disinhibition. Through degrees in the opening up, passionate potentialities are demonstrated.</p>
<blockquote>Who are you? And who are we? We do not know, we are nobody at all sometimes and then we wake from our slumber and feel like doing something again.</blockquote>
<p>Anonymity is a double edged sword. Can virtual freedom of expression lead to any insight that can transfer into real life interaction? How difficult is this jump from virtual to real life? Virtuality has evolved beyond the world of simulation, where it is now possible to experience multiple mechanisms of meaningful relationships with people. We believe there is a level of balance between virtual and physical engagements that can be struck in order for bringing one closer to a semblance of self-realisation.</p>
<blockquote>Why do players choose anonymity, if they do? Fake profiles sometimes are an expression of a desire to
play. Those who play can succumb to joy. Joy becomes a tempting emotional state. The more joyful you are, the more comfortable you feel in any garb. This could be a liberating experience, when the blurring of identities occur.</blockquote>
<blockquote>“Putting aside the baggage of ego and identity has a freeing effect on which part of our persona we
express.”<br />— Mithya J., a fake profile on Facebook.</blockquote>
<h3><strong><em>Harnessing pseudonimity</em></strong></h3>
<p>Being playful becomes possible if role-play and make-believe are accepted as valid forms of narrative ploy with a functional purpose in the everyday. The role assumed during play sometimes becomes more enjoyable than the dry person of absolute dimensions. As the rules of play are adopted, disassociation and immersion happen. The player has a choice to deny their outside-play persona and remain fully entrenched in the dynamics of play. This denial helps in the player’s engagement with our system of accessing knowledge. If the gravity and consciousness of your plain existence is lost, then communicating with you becomes easier. In short, your shadow becomes what you could never become. The being and presence of your playtime persona are much stronger than what you can ordinarily muster.
In our space, you get to deny the world outside play and conversely render your world as play.</p>
<blockquote>“being fictional is you without your physical being. If we take away the physical beings from this world, we are left with imagination, ideas and their interpretations.”<br />— Raavi Georgian, a Facebook user.</blockquote>
<img src="https://github.com/cis-india/website/raw/master/img/Surfatial_2016_Image002.png" alt="Play tricks." width="250px" align="left" />
<p>The garb of comedy allows you to listen with a certain distance. The Indian internet landscape is no stranger to this choice of presentation. Several personas dot the scene, there is Norinder Mudi, there is Gabbar Singh or the Cows of Benaras. In an era of cathartic sharing, where all manner of mental chatter finds channels of expression, comedy can be a balm for controlled experiments in taking potshots at sociopolitical power structures. Some platforms incentivise identity in order to legitimise the online experience, for instance, Facebook seems to place a premium on profile pictures by giving them a default public setting, and the user-base is advised by sundry guidelines about the “perfect profile pic” to adopt clear frontal images for maximum effect. Others have a policy of anonymity, like Reddit.</p>
<blockquote><a href="https://soundcloud.com/surfatial/denial"><em>Forget who you are. Just be someone else.<br />
And then you can be the one,<br />
Holding the mic in your hand</em></a><em>.</em></blockquote>
<p>The existing mechanism of algorithms make it seem like there is free and open access to information, even customised for the user’s convenience. But this customisation in fact filters information based on working out the user’s bubble. One way to beat the bubble is to role-play. This would require receivers to adopt pseudonymous/ alternate roles to have access to content outside of their own filters. A loosening of the self can expand the algorithm.</p>
<blockquote>Loosening of the self is a safe idea. The ideal is to have no cognisance of one’s identity. The network
converts you into an IP - an anonymous VPN blurs your IP, nobody knows who you are. Behaviours found in the online community show that there are several aspects of blurring in identity and the presentation of information.</blockquote>
<h3><strong><em>Harnessing disinhibition</em></strong></h3>
<p>Disinhibition is not necessarily rendered as a condition of the external ecosystem (physical and virtual
ecosystems). It has more to do with the actor’s persona and how she has framed and declared her persona. What is the pitch of the actor’s voice? What does it say? What kind of response becomes necessary?</p>
<p>The opportunity for denial emerges from the confidence gained from play. If random social play does not
cause huge rescissions of norms and contracts already in place, its extension to become a fundamental
behavioural pattern changes nothing.</p>
<blockquote><a href="https://dl.dropboxusercontent.com/u/26683259/SURFATIAL_public/Denial-(text).pdf"><em>We will convince you that when we step on your toes and snap back at you in response to your idiotic and subservient social conduct, <strong>we are just playing</strong>. And if you accept it, then we can tell you the harshest and most unpleasant truth about you on your face and get away with it</em></a>.</blockquote>
<img src="https://github.com/cis-india/website/raw/master/img/Surfatial_2016_Image003.png" alt="flip & blip" width="250px" align="right" />
<p>Surfatial designed a conversation game called flip & blip <a href="#A2">[A2]</a> which has the objective of enhancing empathy and sociability, via role play and assuming personas. The purpose of role-play is to help people step put of themselves and play out situations <strong>through alternate lenses</strong>. In any situation, how does another feel? <a href="#B8">[B8]</a> We are either intuitive, or we are clueless. This game opens up the space between. It uses question cards and persona cards as triggers to present scenarios to the players. The goal was to have a conversation while wearing a persona, and then to have the same conversation while being oneself. The players then reflected on the occurrence of any shifts in perspective during this process <a href="#B9">[B9]</a>.</p>
<p>A game is a format <strong>for play that has rules</strong> <a href="#B10">[B10]</a>. Even while these rules are very important, sometimes it becomes possible to play with them. The extent to which we enjoy the game depends on our interpretation of these rules. Now, socially acceptable rules of conduct are considered to be good behaviour. And if our physical social lives are viewed as some kind of a game with rulesets and interpersonal <strong>protocols of engagement</strong> (a game with heavy consequences for not playing by the rules), perhaps our online lives offer that outlet for exercising freedom from this oppressive structure, and perhaps the freeing online experience can translate into incorporating playfulness into strict routine interactions?</p>
<blockquote>“Human social structures built upon transactional attitudes don't have space for free expression, since free expression means disregarding façades and notions of "propriety" as well as hierarchy"<br />— Mithya J., a fake profile on Facebook.</blockquote>
<img src="https://github.com/cis-india/website/raw/master/img/Surfatial_2016_Image004.png" alt="Even if the rules keep changing, it is still a game." width="250px" align="left" />
<p>Access might supposedly <strong>require a filtration system</strong>. But we are opposed to the construction and use of filters. We are of the opinion that we need to be able to access the core content directly - no envelopes, no braces, and no reduced-sets. <a href="https://dl.dropboxusercontent.com/u/26683259/SURFATIAL_public/Access%25252520(Lyric).pdf">People fear dealing with the naked world because they fear engagement, immersion and getting overwhelmed</a>, while at the same time craving first hand knowledge, craving a removal of gatekeepers who shield them from <strong>the naked truth</strong> using agenda-coloured filters.</p>
<p>Surfatial has been working with several formats for harnessing anonymous content production and for playful engagement, via our structured study groups that actively discourage the elaboration of direct personal identification. The emergence <strong>of individual identities occurs</strong> only through the exchange of perspectives during conversation <a href="#B11">[B11]</a>.</p>
<blockquote>The study group derives itself from a group of individuals who are interested in remaining sharp as a group. The group’s concern will always be to aid others as well as itself by challenging every perspective that seems superfluous.</blockquote>
<h3><em>Our study groups</em></h3>
<p>Our study groups <a href="#A1">[A1]</a> are webinars hosted on Google Hangouts on Air, with a framework of philosophical questioning and <strong>a self-reflective exchange</strong> of individual experiences. These are structured conversations that are completely open to participation and listening, with one to three anchors. Each study group is centred around a topic, and three pre-determined questions relating to that topic are posed to the participants. The tone is detached, with not much encouragement for sharing of personal information. <strong>The conversation is fluid</strong> and anyone who has anything to say is able to start speaking. We do not follow the common conventional etiquette of introducing the guests or apologising for intrusion. Due to this it becomes rather freeing and divorced from any mode of social behaviour. The illusion we often chase is of the study group being just a set of <strong>“voices in the head”</strong>.</p>
<p> </p>
<iframe src="https://www.youtube.com/embed/lOSvW84GMM8" frameborder="0" height="315px" width="560px"></iframe>
<p> </p>
<blockquote>When an idea oversteps the terrain that it has been assigned to, it acquires the garb of being a trespasser. Ideas trespass when they uncover surprising connections. which they might otherwise not be related to in any direct way. Such connections cannot be predicted. They emerge out of the process of exploring something else. Trespass happens at perspective boundaries—one never meant to hear another’s perspective, but now that they are in a space together, one must; encroachment will invariably happen.</blockquote>
<p>Study groups have anchors who stand with markers for conversation transition points. Anchors could be Surfatial members or guests. Guest anchors are invited with the intent of extending Surfatial’s sphere of engagement and to alter the threads that connect the conversations.</p>
<blockquote>Anchors are not moderators. They are literally anchors for the discussion. They make sure that the discussion deals with the issues that it raises before moving onto other issues. Anchors seek out questions and figure if they have been answered. They are like accountants of a currency of ideas.</blockquote>
<p>The archive of all these study group conversations <a href="#A8">[A8]</a> is treated as a dynamic space for re-engagement in order to consistently pursue alternate methods of presenting it—through text, posters, books, soundtracks, videos and <a href="https://soundcloud.com/surfatialposters">conversation games</a>.</p>
<h3><em>How messages are presented</em></h3>
<p>When we start seeding a message, we feel the pull of invisible attractors. The vestiges of messages are either offered at their face value or they are so thin, light and loosely packed that they do not offer sufficient <strong>flesh to sink teeth into</strong> <a href="#B12">[B12]</a>. The least we demand from the producers of noise and meaninglessness in our environment is that they give us sufficient depth of material to bite into and suck the juice out. Density is the key.</p>
<blockquote>In compression lies our only hope. If you have to speak, speak less and mean more. If you have to produce material of any kind, make sure it is densely packed with fissile material which can all combust together to yield a message.</blockquote>
<p>By packaging our formats in diverse forms they become appealing to people in different ways.</p>
<p>But there is a danger of package and content being divorced in the process of design. Design facilitates skimming of content by packaging its appearance as eye-candy; packaging runs the danger of dissuading immersion into content. We look to destabilise this tendency, and offer value in the packaging itself. We are interested in packages with embedded content, to save the viewer the trouble of unwrapping any external cover.</p>
<blockquote><a href="https://soundcloud.com/surfatial/access">Access to free exchange is sometimes denied</a>. Free exchange ensures that ideas get modified and challenged. They grow and so it is an essential process that is needed in order for them to be change and offer strength garnered from this free exchange.</blockquote>
<p>Then what is the way? How do you get past institutional filters? If limits have been drawn, if the surfaces of knowledge are guarded, how do messages get out of the perimeter of control? Spam—unsolicited communication, yielding messages where none are requested or expected—is the answer. Spam and spam-like methods are the only tools that can get past the filters. There are no constraints which are fine enough for the <strong>fine specks of spam</strong> to be swatted out.</p>
<blockquote>We are going to populate compressed messages of the whole world's knowledge onto surfaces of mass display and then circulate them like spam.</blockquote>
<p>Posters <a href="#A9">[A9]</a> are posts that linger <a href="#B13">[B13]</a>. Posters are not just lozenges of information, they are pieces and fragments of a song that gets completed in the reader’s mind. The poster is already present on social media as a format. But not all designers use the poster in the same way. For some it is just a clever punch-line. We believe in the punch but not in the merit of <strong>clever punch-lines</strong>. We attempt a sharp contrast between the text that we write and the general experience offered by the environment for consumption of media. This sharp contrast is conveyed through our choice of the posters’ visual format as well as through the auditory means of a soundscape.</p>
<blockquote>What is a song? Who is singing? A song speaks when words are weak, when humming gets through, when drumming has no beat.</blockquote>
<p>Our tracks <a href="#A7">[A7]</a> emerge out of our words and texts. We put together sounds and speech sometimes post-fact, sometimes in the moment with everyone there in the room. We believe that fragments of words and speech can be agents of perspective shifts if placed within altered contexts and rhythms. We think of our sounds as soundscapes more than music.</p>
<h3><strong><em>Conversation as Currency</em></strong></h3>
<p>To sell, one needs to be invisible. No business survives on recurrent sales to family and friends. Businesses survive and grow because they create markets within which strangers can transact with confidence. For strangers to <strong>transact with confidence</strong>, value needs to be stable and fixed into the form of the product. And for that, products need to develop an intensely tangible form. Value of the product starts and finishes with the form. The form cannot be soft or intangible. It needs to be concrete.</p>
<p>To fix the value for a thing, one needs to have a conversation. The price of a commodity can be arrived at through conversation. But we do not care about the price. Because once we sell, <strong>our conversation is over</strong>. We do not want to end it. Besides, we will all keep having more to say and would like others to have access to it too. These are things of value for all of us. This is what we want to exchange and so, conversation is our currency. We will only transact through conversations.</p>
<p>To buy, one must be desirous. There must be a desire for change, for a perturbation of the status quo. A desire that drives motivation for the mouth to open and the hand to move towards a device that dispenses currency. All this takes a lot of effort. The seller and the buyer both have desires and motivations, but the anxiety of the approach to the final push off of the cliff-face of the mountain of the transaction must be overcome. This is the difficult part. It involves a leap of faith. Can a push be made as effortlessly as possible? Sure. We only need to find a way. Efficiency is a way. We introduce efficiency into the system by reducing steps. If we take away the step of the hand moving, we have already reduced effort. Now only the mouth has to open.</p>
<img src="https://github.com/cis-india/website/raw/master/img/Surfatial_2016_Image005.png" alt="You are tired of buying, we are tired of selling. Conversation as currency is the only notion of value we know." width="250px" align="right" />
<p>We have made the determination of value into a game, which is in the form of a Book of Conversation Triggers <a href="#A3">[A3]</a>. In this game, we will read each sentence in our book to you and we will ask you if you agree. After we have performed all the sentences to you, we will ask you if you feel like holding on to any sentence, or if any sentence led you to experience a new kind of thought. If you think so, we will offer those sentences to you. You may if you like, in turn play this game with whomever you choose to play it with, in order to have another conversation. You owe yourself that much at least. If conversation is a currency, it wants to grow and spread like a virus. So, <strong>why not go forth and multiply?</strong></p>
<p>What will you, the player, win? You win a sentence you can post on your fridge door or your Facebook wall, you win an insight you can talk about further. You win the memory of a delightful conversation you had with us, which we guarantee you will have again with whomever you choose to play with. This game will give you victory again and again. <a href="#C">Are you game?</a></p>
<blockquote>A poster can also be a person who posts. A post-writer is often one who reaches the point of saturation, which pushes them to producing compressed text. This act places them in a new period in the timeline of history, of being post-writers.</blockquote>
<h3><em>Publishing sans credits</em></h3>
<p>We work with the idea of credit-less production. post_writer <a href="#A5">[A5]</a> is a twitter-based monthly journal. Each issue consists of six tweets. Four by humans, one by a bot and one by a sponsor. There are only issue-wide credits but no individual credits. Which tweet is by whom is an ambiguity.</p>
<p> </p>
<img src="https://github.com/cis-india/website/raw/master/img/Surfatial_2016_Image006.png" alt="Twitter - Post-Writer" />
<p> </p>
<blockquote>As an actor, you can <strong>choose to disengage</strong> from every story you assume you are a part of, then <strong>you deal with the anxiety</strong> of performing for free in an under-documented and under-credited fashion. When this anxiety subsides, awakening might happen.</blockquote>
<p>We look to expand the study group format to have anchors interested in exploring their own questions in a nondescript manner. We are also looking at shorter capsules of study groups which will be podcast, with a question dedicated for an individual’s consideration, to capture their particular perspective of experience sharing.</p>
<p>We would rather model the world as a space swarming with individuals who actively produce content, rather than as a space with an abundance of consumers and a scarcity of commercially viable producers enveloped in the gloss of the culture of page-hits and celebrity <a href="#B14">[B14]</a> <a href="#B15">[B15]</a>. Today we have a competitive marketplace of market-validated content that goes into profiling our consumption. Our profiles are then further recycled as fodder by the market, <strong>to be fed back to us</strong> <a href="#B16">[B16]</a>. We are not valued as producers; we are valued as consumers of products, and vessels for marketing those very products.</p>
<p>The current state of the world has many different sources of validation but does not have a space for the self-validated. If we choose to be blind to the sociality of the content we see, then we have nothing at all. Every package of content is socialised, everything is floating in mediated space <a href="#B17">[B17]</a>. The isolated, untouched (by mind or hand) content has no place in the world. We are surrounded by content which has no fidelity, coils through minds at will, and yields their message to anyone who enquires. There is no knowledge personally reserved for you in this pool of content. Reading is supposed to lead to synthesis and this synthesis is meant to culminate into a development of personal perspectives and opinions. However, in a pool of commonly read content there is more likelihood for the development of <strong>cliques and clouds</strong> of common belief and little space for individualised synthesis. Some get hit more directly by some threads of content and identify the hit as a personal facet of discovery.</p>
<blockquote>“The smart way to keep people passive and obedient is to strictly limit the spectrum of acceptable opinion, but allow very lively debate within that spectrum....”<br />— <a href="http://www.goodreads.com/work/quotes/38115">Noam Chomsky, <em>The Common Good</em></a></blockquote>
<p>To hit upon a truly personal facet of content that doesn’t belong to a popular cesspool, a flow of production has to be initiated and self-validated. Entire knowledge-systems need be constructed without any building blocks but with content generated from the knowledge of the moment <a href="#B18">[B18]</a>. Insights gleaned from here and there come together as a granular pool of content that is personal, special and hitherto unseen in our context. A unique association between the individual and message gets formed. And this association is incoherent and unfamiliar in ways, because it doesn't belong to the popularly socialised frameworks of knowledge. This weird fiction gets overlooked and thereby remains safe from being intruded upon or being misconstrued. <strong>The obscure and the hidden</strong> breed mysteries waiting to be tapped.</p>
<p>Time to break <a href="#B19">[B19]</a> from packaged commodified sound byte capsules.</p>
<hr />
<h3><strong>A) Index of Surfatial Projects</strong></h3>
<p><a id="A1"></a>1. Study groups on Google Hangouts on Air</p>
<ol type="a">
<li>Study groups with Surfatial anchors</li>
<li>Study groups with guest anchors</li></ol>
<p><a id="A2"></a>2. Conversation based games: <a href="https://www.dropbox.com/sh/cz23jdonfo9ebs5/AACyd1mrUdpxRHL9l2XEQSWfa?dl=0">flip & blip</a></p>
<p><a id="A3"></a>3. Book of Conversation Triggers: <a href="https://dl.dropboxusercontent.com/u/26683259/SURFATIAL_public/Can%25252520we%25252520talk%25252520about%25252520here%25252520and%25252520now.pdf">PDF</a></p>
<p><a id="A4"></a>4. Online Residency on Surfatial’s Facebook page</p>
<p><a id="A5"></a>5. Post-writer: <a href="https://twitter.com/post_writer">https://twitter.com/post_writer</a>.</p>
<ol type="a">
<li>Each issue is based on public contributions</li></ol>
<p><a id="A6"></a>6. Interactive performances and exhibitions</p>
<p><a id="A7"></a>7. Tracks based on our archives of text and audio: <a href="https://soundcloud.com/surfatial/tracks">Soundcloud</a></p>
<p><a id="A8"></a>8. Digital archives of games, performance and study-groups: <a href="https://www.youtube.com/channel/UCjekKNce4kvdoHSyDBmP03g">YouTube</a></p>
<p><a id="A9"></a>9. Poster: <a href="https://web.facebook.com/surfatial/photos/?tab=album&album_id=236317999892398">Facebook</a></p>
<h3><strong>B) References <a href="#B20">[B20]</a></strong></h3>
<p><a id="B1"></a>1. Pulp - “Glory Days” - This is Hardcore (1998)</p>
<p><a id="B2"></a>2. Pink Floyd - “The Happiest Days of Our Lives” - The Wall (1979)</p>
<p><a id="B3"></a>3. Weezer - “The Futurescope Trilogy” - Everything Will Be Alright In The End (2014)</p>
<p><a id="B4"></a>4. Radiohead - “How to Disappear Completely” - Kid A (2000)</p>
<p><a id="B5"></a>5. Nirvana - “Smells Like Teen Spirit” - Nevermind (1991)</p>
<p><a id="B6"></a>6. Pink Floyd - “Empty Spaces” - The Wall (1979)</p>
<p><a id="B7"></a>7. Metallica - “The Unforgiven” - Metallica (The Black Album) (1991)</p>
<p><a id="B8"></a>8. Backstreet Boys - “Quit Playing Games with My Heart” - Backstreet Boys (1995)</p>
<p><a id="B9"></a>9. Sting - “Shape of My Heart” - Ten Summoner’s Tales (1993)</p>
<p><a id="B10"></a>10. Kenny Rogers - “Rules of the Game” - The Gambler (1978)</p>
<p><a id="B11"></a>11. Boyzone - “If We Try” - BZ20 (2013)</p>
<p><a id="B12"></a>12. Bangles - “Mixed Messages” - Doll Revolution (2003)</p>
<p><a id="B13"></a>13. Cranberries - “Linger” - Everybody Else's Doing It, So Why Can't We? (1993)</p>
<p><a id="B14"></a>14. Lady Gaga - “Paparazzi” - The Fame (2008)</p>
<p><a id="B15"></a>15. Eminem - “The Real Slim Shady” - The Marshal Mathers LP (2000)</p>
<p><a id="B16"></a>16. Kraftwerk - “Hall of Mirrors” - Trans-Europe Express (1977)</p>
<p><a id="B17"></a>17. Marshall McLuhan - “The Medium is the Message” - The Medium is the Message (1967)</p>
<p><a id="B18"></a>18. Chicks on Speed - “Utopia” - UTOPIA (2014)</p>
<p><a id="B19"></a>19. Queen - I Want to Break Free - The Works (1984)</p>
<p><a id="B20"></a>20. DJ Shadow - “Right Thing / GDMFSOB” - The Private Press (2002)</p>
<h3><strong>C) Game - 101 Ways of starting an ISP: No. 54</strong></h3>
<p>Instructions for playing:</p>
<ol>
<li><a href="http://bots.post-writer.xyz/RiTaJS-master%202/examples/p5js/HaikuGrammar/">Click here to access the game</a>.<br /><br /></li>
<li>On every left-click, you will receive a new poster.<br /><br /></li>
<li>If you like what you see, right-click and save as an image. (This works on the Google Chrome and Firefox browsers).<br /><br /></li>
<li>You can then choose to share the image on your Facebook or Twitter pages and tag <a href="https://paper.dropbox.com/?q=%25252523Surfatial">#Surfatial</a>. We use conversation as currency, so we will contact you and converse with you to complete the transaction process.</li></ol>
<h3><strong>Authors' Profile</strong></h3>
<p>Surfatial is a trans-local collective that operates through the internet. We use conversations to aid learning outside established structures. We are concerned with enabling disinhibition through the internet, for expressing what may not be feasible in physical reality. We organise internet-based audio conferences called study-groups where we deal with philosophical questions and a self-reflective exchange of individual experiences. We have previously presented our work at <em>Soundphile 2016</em>, Delhi; <em>play_book</em> (in collaboration with Thukral & Tagra), Gurgaon; CONA, Mumbai, and Mumbai Art Room. Our upcoming engagement is with ZK/U, Berlin.</p>
<p>Facebook - <a href="https://www.facebook.com/surfatial">https://www.facebook.com/surfatial</a></p>
<p>Website - <a href="http://www.museumofvestigialdesire.net/offices/surfatial">http://www.museumofvestigialdesire.net/offices/surfatial</a></p>
<p>Twitter - <a href="https://twitter.com/surfatial">https://twitter.com/surfatial</a></p>
<p>Surfatial is Malavika Rajnarayan, Prayas Abhinav, Satya Gummuluri, and No.55, a bot.</p>
<h4>Prayas Abhinav</h4>
<p>Prayas is an artist and teacher. He works on his capacity to learn through performance. He has worked in the last few years on numerous pieces of speculative fiction, software, games, interactive installations, public interventions and curatorial projects. He is the initiator of the <a href="http://museumofvestigialdesire.net/">Museum of Vestigial Desire</a>. He has developed his practice with the support of fellowships by Sarai, Openspace, the Center for Experimental Media Arts (CEMA), TED and Lucid. He has been in residencies at Khoj (India), Coded Cultures (Austria) and dis-locate (Japan). He has shared his work at festivals including Transmediale, 48c, Futuresonic, ISEA and Wintercamp.</p>
<h4>Satya Gummuluri</h4>
<p>Satya is an artist originally from Bombay currently based in Germany. She works with music, writing and photography as well as doing freelance translation, editorial and research work. She has lived in Chicago for several years, collaborating, recording, performing and traveling with musicians and dancers in Chicago, NYC and Lisbon, and has appeared with them at the Chicago Jazz and World Music Festivals, and Austin’s SXSW. As a writer and translator, her work has appeared in online and print journals such as Almost Island and SAADA’s Tides magazine. She also works with activist groups engaged with feminism and urban issues in India and the US.</p>
<h4>Malavika Rajnarayan</h4>
<p>Malavika is an artist based in India. Her paintings use the human figure to explore larger issues of collective consciousness. Her works have also been exhibited in Mumbai, Delhi, Bangalore, Chennai and Ahmedabad in India and at the 2007 Sosabeol Art Expo in South Korea. She has presented lectures at EWHA University in Seoul, South Korea, College of Fine Arts, Karnataka Chitrakala Parishath, SITE art space, Baroda and conducted short workshops at NID, Ahmedabad and at non-profit organisations for women and children. She has been an artist-in-residence at The Collective Studio Baroda, The Contemporary Artists Centre, Troy, New York and at CAMAC Centre for Art in Marnay sur-Seine, France, supported by the K. K. Hebbar Art foundation and the Indian Council for Cultural Relations.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/blog_101-ways-of-starting-an-isp-no-53-conversation-content-weird-fiction'>https://cis-india.org/raw/blog_101-ways-of-starting-an-isp-no-53-conversation-content-weird-fiction</a>
</p>
No publisherSurfatialAnonymityInternet StudiesRAW BlogResearchers at Work2016-08-03T12:47:31ZBlog EntrySummary Report Internet Governance Forum 2015
https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015
<b>Centre for Internet and Society (CIS), India participated in the Internet Governance Forum (IGF) held at Poeta Ronaldo Cunha Lima Conference Center, Joao Pessoa in Brazil from 10 November 2015 to 13 November 2015. The theme of IGF 2015 was ‘Evolution of Internet Governance: Empowering Sustainable Development’. Sunil Abraham, Pranesh Prakash & Jyoti Panday from CIS actively engaged and made substantive contributions to several key issues affecting internet governance at the IGF 2015. The issue-wise detail of their engagement is set out below. </b>
<p align="center" style="text-align: left;"><strong>INTERNET
GOVERNANCE</strong></p>
<p align="justify">
I. The
Multi-stakeholder Advisory Group to the IGF organised a discussion on
<em><strong>Sustainable
Development Goals (SDGs) and Internet Economy</strong></em><em>
</em>at
the Main Meeting Hall from 9:00 am to 12:30 pm on 11 November, 2015.
The
discussions at this session focused on the importance of Internet
Economy enabling policies and eco-system for the fulfilment of
different SDGs. Several concerns relating to internet
entrepreneurship, effective ICT capacity building, protection of
intellectual property within and across borders were availability of
local applications and content were addressed. The panel also
discussed the need to identify SDGs where internet based technologies
could make the most effective contribution. Sunil
Abraham contributed to the panel discussions by addressing the issue
of development and promotion of local content and applications. List
of speakers included:</p>
<ol>
<li>
<p align="justify">
Lenni
Montiel, Assistant-Secretary-General for Development, United Nations</p>
</li><li>
<p align="justify">
Helani
Galpaya, CEO LIRNEasia</p>
</li><li>
<p align="justify">
Sergio
Quiroga da Cunha, Head of Latin America, Ericsson</p>
</li><li>
<p align="justify">
Raúl
L. Katz, Adjunct Professor, Division of Finance and Economics,
Columbia Institute of Tele-information</p>
</li><li>
<p align="justify">
Jimson
Olufuye, Chairman, Africa ICT Alliance (AfICTA)</p>
</li><li>
<p align="justify">
Lydia
Brito, Director of the Office in Montevideo, UNESCO</p>
</li><li>
<p align="justify">
H.E.
Rudiantara, Minister of Communication & Information Technology,
Indonesia</p>
</li><li>
<p align="justify">
Daniel
Sepulveda, Deputy Assistant Secretary, U.S. Coordinator for
International and Communications Policy at the U.S. Department of
State </p>
</li><li>
<p align="justify">
Deputy
Minister Department of Telecommunications and Postal Services for
the republic of South Africa</p>
</li><li>
<p align="justify">
Sunil
Abraham, Executive Director, Centre for Internet and Society, India</p>
</li><li>
<p align="justify">
H.E.
Junaid Ahmed Palak, Information and Communication Technology
Minister of Bangladesh</p>
</li><li>
<p align="justify">
Jari
Arkko, Chairman, IETF</p>
</li><li>
<p align="justify">
Silvia
Rabello, President, Rio Film Trade Association</p>
</li><li>
<p align="justify">
Gary
Fowlie, Head of Member State Relations & Intergovernmental
Organizations, ITU</p>
</li></ol>
<p align="justify">
Detailed
description of the workshop is available here
<a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">http</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">://</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">www</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">.</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">intgovforum</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">.</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">org</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">/</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">cms</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">/</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">igf</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">2015-</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">main</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">-</a><a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">sessions</a><u>
</u></p>
<p align="justify">
Transcript
of the workshop is available here
<u><a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room</a></u></p>
<p align="justify">
Video
link Internet
economy and Sustainable Development here
<a href="https://www.youtube.com/watch?v=D6obkLehVE8">https://www.youtube.com/watch?v=D6obkLehVE8</a></p>
<p align="justify"> II.
Public
Knowledge organised a workshop on <em><strong>The
Benefits and Challenges of the Free Flow of Data </strong></em>at
Workshop Room
5 from 11:00 am to 12:00 pm on 12 November, 2015. The discussions in
the workshop focused on the benefits and challenges of the free flow
of data and also the concerns relating to data flow restrictions
including ways to address
them. Sunil
Abraham contributed to the panel discussions by addressing the issue
of jurisdiction of data on the internet. The
panel for the workshop included the following.</p>
<ol>
<li>
<p align="justify">
Vint
Cerf, Google</p>
</li><li>
<p align="justify">
Lawrence
Strickling, U.S. Department of Commerce, NTIA</p>
</li><li>
<p align="justify">
Richard
Leaning, European Cyber Crime Centre (EC3), Europol</p>
</li><li>
<p align="justify">
Marietje
Schaake, European Parliament</p>
</li><li>
<p align="justify">
Nasser
Kettani, Microsoft</p>
</li><li>
<p align="justify">
Sunil
Abraham, CIS
India</p>
</li></ol>
<p align="justify">
Detailed
description of the workshop is available here
<a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">http</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">://</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">www</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">.</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">intgovforum</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">.</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">org</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">/</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">cms</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">/</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">workshops</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">/</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">list</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">of</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">published</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">workshop</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">proposals</a><u>
</u></p>
<p align="justify">
Transcript
of the workshop is available here
<a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5</a></p>
<p align="justify">
Video link https://www.youtube.com/watch?v=KtjnHkOn7EQ</p>
<p align="justify"> III.
Article
19 and
Privacy International organised a workshop on <em><strong>Encryption
and Anonymity: Rights and Risks</strong></em>
at Workshop Room 1 from 11:00 am to 12:30 pm on 12 November, 2015.
The
workshop fostered a discussion about the latest challenges to
protection of anonymity and encryption and ways in which law
enforcement demands could be met while ensuring that individuals
still enjoyed strong encryption and unfettered access to anonymity
tools. Pranesh
Prakash contributed to the panel discussions by addressing concerns
about existing south Asian regulatory framework on encryption and
anonymity and emphasizing the need for pervasive encryption. The
panel for this workshop included the following.</p>
<ol>
<li>
<p align="justify">
David
Kaye, UN Special Rapporteur on Freedom of Expression</p>
</li><li>
<p align="justify">
Juan
Diego Castañeda, Fundación Karisma, Colombia</p>
</li><li>
<p align="justify">
Edison
Lanza, Organisation of American States Special Rapporteur</p>
</li><li>
<p align="justify">
Pranesh
Prakash, CIS India</p>
</li><li>
<p align="justify">
Ted
Hardie, Google</p>
</li><li>
<p align="justify">
Elvana
Thaci, Council of Europe</p>
</li><li>
<p align="justify">
Professor
Chris Marsden, Oxford Internet Institute</p>
</li><li>
<p align="justify">
Alexandrine
Pirlot de Corbion, Privacy International</p>
</li></ol>
<p align="justify"><a name="_Hlt435412531"></a>
Detailed
description of the workshop is available here
<a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">http</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">://</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">www</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">.</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">intgovforum</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">.</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">org</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">/</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">cms</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">/</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">worksh</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">o</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">ps</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">/</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">list</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">of</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">published</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">workshop</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">-</a><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">proposals</a><u>
</u></p>
<p align="justify">
Transcript
of the workshop is available here
<a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1</a></p>
<p align="justify">
Video link available here https://www.youtube.com/watch?v=hUrBP4PsfJo</p>
<p align="justify"> IV.
Chalmers
& Associates organised a session on <em><strong>A
Dialogue on Zero Rating and Network Neutrality</strong></em>
at the Main Meeting Hall from 2:00 pm to 4:00 pm on 12 November,
2015. The Dialogue provided access to expert insight on zero-rating
and a full spectrum of diverse
views on this issue. The Dialogue also explored alternative
approaches to zero rating such as use of community networks. Pranesh
Prakash provided
a
detailed explanation of harms and benefits related to different
approaches to zero-rating. The
panellists for this session were the following.</p>
<ol>
<li>
<p align="justify">
Jochai
Ben-Avie, Senior Global Policy Manager, Mozilla, USA</p>
</li><li>
<p align="justify">
Igor
Vilas Boas de Freitas, Commissioner, ANATEL, Brazil</p>
</li><li>
<p align="justify">
Dušan
Caf, Chairman, Electronic Communications Council, Republic of
Slovenia</p>
</li><li>
<p align="justify">
Silvia
Elaluf-Calderwood, Research Fellow, London School of Economics,
UK/Peru</p>
</li><li>
<p align="justify">
Belinda
Exelby, Director, Institutional Relations, GSMA, UK</p>
</li><li>
<p align="justify">
Helani
Galpaya, CEO, LIRNEasia, Sri Lanka</p>
</li><li>
<p align="justify">
Anka
Kovacs, Director, Internet Democracy Project, India</p>
</li><li>
<p align="justify">
Kevin
Martin, VP, Mobile and Global Access Policy, Facebook, USA</p>
</li><li>
<p align="justify">
Pranesh
Prakash, Policy Director, CIS India</p>
</li><li>
<p align="justify">
Steve
Song, Founder, Village Telco, South Africa/Canada</p>
</li><li>
<p align="justify">
Dhanaraj
Thakur, Research Manager, Alliance for Affordable Internet, USA/West
Indies</p>
</li><li>
<p align="justify">
Christopher
Yoo, Professor of Law, Communication, and Computer & Information
Science, University of Pennsylvania, USA</p>
</li></ol>
<p align="justify">
Detailed
description of the workshop is available here
<a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top">http://www.intgovforum.org/cms/igf2015-main-sessions</a></p>
<p align="justify">
Transcript
of the workshop is available here
<a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2</a></p>
<p align="justify"> V.
The
Internet & Jurisdiction Project organised a workshop on
<em><strong>Transnational
Due Process: A Case Study in MS Cooperation</strong></em>
at Workshop Room
4 from 11:00 am to 12:00 pm on 13 November, 2015. The
workshop discussion focused on the challenges in developing an
enforcement framework for the internet that guarantees transnational
due process and legal interoperability. The discussion also focused
on innovative approaches to multi-stakeholder cooperation such as
issue-based networks, inter-sessional work methods and transnational
policy standards. The panellists for this discussion were the
following.</p>
<ol>
<li>
<p align="justify">
Anne
Carblanc Head of Division, Directorate for Science, Technology and
Industry, OECD</p>
</li><li>
<p align="justify">
Eileen
Donahoe Director Global Affairs, Human Rights Watch</p>
</li><li>
<p align="justify">
Byron
Holland President and CEO, CIRA (Canadian ccTLD)</p>
</li><li>
<p align="justify">
Christopher
Painter Coordinator for Cyber Issues, US Department of State</p>
</li><li>
<p align="justify">
Sunil
Abraham Executive Director, CIS India</p>
</li><li>
<p align="justify">
Alice
Munyua Lead dotAfrica Initiative and GAC representative, African
Union Commission</p>
</li><li>
<p align="justify">
Will
Hudsen Senior Advisor for International Policy, Google</p>
</li><li>
<p align="justify">
Dunja
Mijatovic Representative on Freedom of the Media, OSCE</p>
</li><li>
<p align="justify">
Thomas
Fitschen Director for the United Nations, for International
Cooperation against Terrorism and for Cyber Foreign Policy, German
Federal Foreign Office</p>
</li><li>
<p align="justify">
Hartmut
Glaser Executive Secretary, Brazilian Internet Steering Committee</p>
</li><li>
<p align="justify">
Matt
Perault, Head of Policy Development Facebook</p>
</li></ol>
<p align="justify">
Detailed
description of the workshop is available here
<a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals">http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals</a></p>
<p align="justify">
Transcript
of the workshop is available here
<a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4</a></p>
<p align="justify">
Video
link Transnational
Due Process: A Case Study in MS Cooperation available here <a href="https://www.youtube.com/watch?v=M9jVovhQhd0">https://www.youtube.com/watch?v=M9jVovhQhd0</a></p>
<p align="justify"> VI.
The Internet Governance Project organised a meeting of the
<em><strong>Dynamic
Coalition on Accountability of Internet Governance Venues</strong></em>
at Workshop Room 2 from 14:00
– 15:30 on
12 November, 2015. The coalition
brought together panelists to highlight the
challenges in developing an accountability
framework
for internet governance
venues that include setting up standards and developing a set of
concrete criteria. Jyoti Panday provided the perspective of civil
society on why acountability is necessary in internet governance
processes and organizations. The panelists for this workshop included
the following.</p>
<ol>
<li>
<p>
Robin
Gross, IP Justice</p>
</li><li>
<p>
Jeanette
Hofmann, Director
<a href="http://www.internetundgesellschaft.de/">Alexander
von Humboldt Institute for Internet and Society</a></p>
</li><li>
<p>
Farzaneh
Badiei,
Internet Governance Project</p>
</li><li>
<p>
Erika
Mann,
Managing
Director Public PolicyPolicy Facebook and Board of Directors
ICANN</p>
</li><li>
<p>
Paul
Wilson, APNIC</p>
</li><li>
<p>
Izumi
Okutani, Japan
Network Information Center (JPNIC)</p>
</li><li>
<p>
Keith
Drazek , Verisign</p>
</li><li>
<p>
Jyoti
Panday,
CIS</p>
</li><li>
<p>
Jorge
Cancio,
GAC representative</p>
</li></ol>
<p>
Detailed
description of the workshop is available here
<a href="http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&w=&sidebar=yes&bg=no">http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&w=&sidebar=yes&bg=no</a></p>
<p>
Video
link https://www.youtube.com/watch?v=UIxyGhnch7w</p>
<p> VII.
Digital
Infrastructure
Netherlands Foundation organized an open forum at
Workshop Room 3
from 11:00
– 12:00
on
10
November, 2015. The open
forum discussed the increase
in government engagement with “the internet” to protect their
citizens against crime and abuse and to protect economic interests
and critical infrastructures. It
brought
together panelists topresent
ideas about an agenda for the international protection of ‘the
public core of the internet’ and to collect and discuss ideas for
the formulation of norms and principles and for the identification of
practical steps towards that goal.
Pranesh Prakash participated in the e open forum. Other speakers
included</p>
<ol>
<li>
<p>
Bastiaan
Goslings AMS-IX, NL</p>
</li><li>
<p>
Pranesh
Prakash CIS, India</p>
</li><li>
<p>
Marilia
Maciel (FGV, Brasil</p>
</li><li>
<p>
Dennis
Broeders (NL Scientific Council for Government Policy)</p>
</li></ol>
<p>
Detailed
description of the open
forum is available here
<a href="http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf">http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf</a></p>
<p>
Video
link available here <a href="https://www.youtube.com/watch?v=joPQaMQasDQ">https://www.youtube.com/watch?v=joPQaMQasDQ</a></p>
<p>
VIII.
UNESCO, Council of Europe, Oxford University, Office of the High
Commissioner on Human Rights, Google, Internet Society organised a
workshop on hate speech and youth radicalisation at Room 9 on
Thursday, November 12. UNESCO shared the initial outcome from its
commissioned research on online hate speech including practical
recommendations on combating against online hate speech through
understanding the challenges, mobilizing civil society, lobbying
private sectors and intermediaries and educating individuals with
media and information literacy. The workshop also discussed how to
help empower youth to address online radicalization and extremism,
and realize their aspirations to contribute to a more peaceful and
sustainable world. Sunil Abraham provided his inputs. Other speakers
include</p>
<p>
1.
Chaired by Ms Lidia Brito, Director for UNESCO Office in Montevideo</p>
<p>
2.Frank
La Rue, Former Special Rapporteur on Freedom of Expression</p>
<p>
3.
Lillian Nalwoga, President ISOC Uganda and rep CIPESA, Technical
community</p>
<p>
4.
Bridget O’Loughlin, CoE, IGO</p>
<p>
5.
Gabrielle Guillemin, Article 19</p>
<p>
6.
Iyad Kallas, Radio Souriali</p>
<p>
7.
Sunil Abraham executive director of Center for Internet and Society,
Bangalore, India</p>
<p>
8.
Eve Salomon, global Chairman of the Regulatory Board of RICS</p>
<p>
9.
Javier Lesaca Esquiroz, University of Navarra</p>
<p>
10.
Representative GNI</p>
<p>
11.
Remote Moderator: Xianhong Hu, UNESCO</p>
<p>
12.
Rapporteur: Guilherme Canela De Souza Godoi, UNESCO</p>
<p>
Detailed
description of the workshop
is available here
<a href="http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&w=&sidebar=yes&bg=no">http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&w=&sidebar=yes&bg=no</a></p>
<p>
Video
link to the panel is available here
<a href="https://www.youtube.com/watch?v=eIO1z4EjRG0">https://www.youtube.com/watch?v=eIO1z4EjRG0</a></p>
<p> <strong>INTERMEDIARY
LIABILITY</strong></p>
<p align="justify">
IX.
Electronic
Frontier Foundation, Centre for Internet Society India, Open Net
Korea and Article 19 collaborated to organize
a workshop on the <em><strong>Manila
Principles on Intermediary Liability</strong></em>
at Workshop Room 9 from 11:00 am to 12:00 pm on 13 November 2015. The
workshop elaborated on the Manila
Principles, a high level principle framework of best practices and
safeguards for content restriction practices and addressing liability
for intermediaries for third party content. The
workshop
saw particpants engaged in over lapping projects considering
restriction practices coming togetehr to give feedback and highlight
recent developments across liability regimes. Jyoti
Panday laid down the key details of the Manila Principles framework
in this session. The panelists for this workshop included the
following.</p>
<ol>
<li>
<p align="justify">
Kelly
Kim Open Net Korea,</p>
</li><li>
<p align="justify">
Jyoti
Panday, CIS India,</p>
</li><li>
<p align="justify">
Gabrielle
Guillemin, Article 19,</p>
</li><li>
<p align="justify">
Rebecca
McKinnon on behalf of UNESCO</p>
</li><li>
<p align="justify">
Giancarlo
Frosio, Center for Internet and Society, Stanford Law School</p>
</li><li>
<p align="justify">
Nicolo
Zingales, Tilburg University</p>
</li><li>
<p align="justify">
Will
Hudson, Google</p>
</li></ol>
<p align="justify">
Detailed
description of the workshop is available here
<a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals</a></p>
<p align="justify">
Transcript
of the workshop is available here
<a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9</a></p>
<p align="justify">
Video link available here <a href="https://www.youtube.com/watch?v=kFLmzxXodjs">https://www.youtube.com/watch?v=kFLmzxXodjs</a></p>
<p align="justify"> <strong>ACCESSIBILITY</strong></p>
<p align="justify">
X.
Dynamic
Coalition
on Accessibility and Disability and Global Initiative for Inclusive
ICTs organised a workshop on <em><strong>Empowering
the Next Billion by Improving Accessibility</strong></em><em>
</em>at
Workshop Room 6 from 9:00 am to 10:30 am on 13 November, 2015. The
discussion focused on
the need and ways to remove accessibility barriers which prevent over
one billion potential users to benefit from the Internet, including
for essential services. Sunil
Abraham specifically spoke about the lack of compliance of existing
ICT infrastructure with well established accessibility standards
specifically relating to accessibility barriers in the disaster
management process. He discussed the barriers faced by persons with
physical or psychosocial disabilities. The
panelists for this discussion were the following.</p>
<ol>
<li>
<p align="justify">
Francesca
Cesa Bianchi, G3ICT</p>
</li><li>
<p align="justify">
Cid
Torquato, Government of Brazil</p>
</li><li>
<p align="justify">
Carlos
Lauria, Microsoft Brazil</p>
</li><li>
<p align="justify">
Sunil
Abraham, CIS India</p>
</li><li>
<p align="justify">
Derrick
L. Cogburn, Institute on Disability and Public Policy (IDPP) for the
ASEAN(Association of Southeast Asian Nations) Region</p>
</li><li>
<p align="justify">
Fernando
H. F. Botelho, F123 Consulting</p>
</li><li>
<p align="justify">
Gunela
Astbrink, GSA InfoComm</p>
</li></ol>
<p align="justify">
Detailed
description of the workshop is available here
<u><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals</a></u></p>
<p align="justify">
Transcript
of the workshop is available here
<u><a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3</a></u></p>
<p align="justify">
Video
Link Empowering
the next billion by improving accessibility <a href="https://www.youtube.com/watch?v=7RZlWvJAXxs">https://www.youtube.com/watch?v=7RZlWvJAXxs</a></p>
<p align="justify"> <strong>OPENNESS</strong></p>
<p align="justify">
XI.
A
workshop on <em><strong>FOSS
& a Free, Open Internet: Synergies for Development</strong></em>
was organized at Workshop Room 7 from 2:00 pm to 3:30 pm on 13
November, 2015. The discussion was focused on the increasing risk to
openness of the internet and the ability of present & future
generations to use technology to improve their lives. The panel shred
different perspectives about the future co-development
of FOSS and a free, open Internet; the threats that are emerging; and
ways for communities to surmount these. Sunil
Abraham emphasised the importance of free software, open standards,
open access and access to knowledge and the lack of this mandate in
the draft outcome document for upcoming WSIS+10 review and called for
inclusion of the same. Pranesh Prakash further contributed to the
discussion by emphasizing the need for free open source software with
end‑to‑end encryption and traffic level encryption based
on open standards which are decentralized and work through federated
networks. The
panellists for this discussion were the following.</p>
<ol>
<li>
<p align="justify">
Satish
Babu, Technical Community, Chair, ISOC-TRV, Kerala, India</p>
</li><li>
<p align="justify">
Judy
Okite, Civil Society, FOSS Foundation for Africa</p>
</li><li>
<p align="justify">
Mishi
Choudhary, Private Sector, Software Freedom Law Centre, New York</p>
</li><li>
<p align="justify">
Fernando
Botelho, Private Sector, heads F123 Systems, Brazil</p>
</li><li>
<p align="justify">
Sunil
Abraham, CIS
India</p>
</li><li>
<p align="justify">
Pranesh
Prakash, CIS
India</p>
</li><li>
<p align="justify">
Nnenna
Nwakanma- WWW.Foundation</p>
</li><li>
<p align="justify">
Yves
MIEZAN EZO, Open Source strategy consultant</p>
</li><li>
<p align="justify">
Corinto
Meffe, Advisor to the President and Directors, SERPRO, Brazil</p>
</li><li>
<p align="justify">
Frank
Coelho de Alcantara, Professor, Universidade Positivo, Brazil</p>
</li><li>
<p align="justify">
Caroline
Burle, Institutional and International Relations, W3C Brazil Office
and Center of Studies on Web Technologies</p>
</li></ol>
<p align="justify">
Detailed
description of the workshop is available here
<u><a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top">http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals</a></u></p>
<p align="justify">
Transcript
of the workshop is available here
<u><a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7" target="_top">http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7</a></u></p>
<p align="justify">
Video
link available here <a href="https://www.youtube.com/watch?v=lwUq0LTLnDs">https://www.youtube.com/watch?v=lwUq0LTLnDs</a></p>
<p align="justify">
<br /><br /></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015'>https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015</a>
</p>
No publisherjyotiAccess to KnowledgeBig DataFreedom of Speech and ExpressionEncryptionInternet Governance ForumIntermediary LiabilityAccountabilityInternet GovernanceCensorshipCyber SecurityDigital GovernanceAnonymityCivil SocietyBlocking2015-11-30T10:47:13ZBlog EntryGood Intentions, Recalcitrant Text - I: Why India’s Proposal at the ITU is Troubling for Internet Freedoms
https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms
<b>The UN's International Telecommunications Union (ITU) is hosting its Plenipotentiary Conference (PP-14) this year in South Korea. At PP-14, India introduced a new draft resolution on ITU's Role in Realising Secure Information Society. The Draft Resolution has grave implications for human rights and Internet governance. Geetha Hariharan explores.</b>
<p style="text-align: justify; "> </p>
<p style="text-align: justify; ">At the 2014 Plenipotentiary Conference (‘PP-14’ or ‘Plenipot’) of the International Telecommunications Union (ITU), India has tabled <a href="https://cis-india.org/internet-governance/blog/india-draft-resolution-itus-role-in-securing-information-security/at_download/file">a draft proposal</a> on “ITU’s Role in Realising Secure Information Society” [Document 98, dated 20 October 2014] (“<strong>Draft Resolution</strong>”). India’s proposal has incited a great deal of concern and discussion among Plenipot attendees, governments and civil society alike. Before offering my concerns and comments on the Draft Resolution, let us understand the proposal.</p>
<p style="text-align: justify; ">Our Draft Resolution identifies 3 security concerns with exchange of information and resource allocation on the Internet:</p>
<ul style="text-align: justify; ">
<li><i>First</i>, it is troubling for India that present network architecture has “<i>security weaknesses</i>” such as “<i>camouflaging the identity of the originator of the communication</i>”;<a href="#_ftn1">[1]</a> random IP address distribution also makes “<i>tracing of communication difficult</i>”;<a href="#_ftn2">[2]</a></li>
<li><i>Second</i>, India is concerned that under the present allocation system of naming, numbering and addressing resources on the Internet, it is impossible or at the very least, cumbersome to identify the countries to which IP address are allocated;<a href="#_ftn3">[3]</a> </li>
<li><i>Third</i>, India finds it insecure from the point of view of national security that traffic originating and terminating in the same country (domestic traffic) often routes through networks overseas;<a href="#_ftn4">[4]</a> similarly, local address resolution also routes through IP addresses outside the country or region, which India finds troubling.<a href="#_ftn5">[5]</a></li>
</ul>
<p style="text-align: justify; ">In an effort to address these concerns, the Draft Resolution seeks to instruct the ITU Secretary General:</p>
<ul style="text-align: justify; ">
<li><i>First</i>,<i> </i>to develop and recommend a ‘traffic routing plan’ that can “<i>effectively ensure the traceability of communication</i>”;<a href="#_ftn6">[6]</a></li>
<li><i>Second</i>, to collaborate with relevant international and intergovernmental organisations to develop an<i> </i>“<i>IP address plan</i>”<i> </i>which facilitates identification of locations/countries to which IP addresses are allocated and coordinates allocation accordingly;<a href="#_ftn7">[7]</a></li>
<li><i>Third</i>, to develop and recommend “<i>a public telecom network architecture</i>” that localizes both routing<a href="#_ftn8">[8]</a> as well as address resolution<a href="#_ftn9">[9]</a> for local/domestic traffic to “<i>within the country</i>”.</li>
</ul>
<p style="text-align: justify; ">Admittedly, our Draft Resolution is intended to pave a way for “<i>systematic, fair and equitable allocation</i>” of, <i>inter alia</i>, naming, numbering and addressing resources,<a href="#_ftn10">[10]</a> keeping in mind security and human rights concerns.<a href="#_ftn11">[11]</a> In an informal conversation, members of the Indian delegation echoed these sentiments. Our resolution does not, I was told, raise issues about the “<i>concentration of control over Internet resources</i>”, though “<i>certain governments</i>” have historically exercised more control. It also does not, he clarified, wish to make privacy or human rights a matter for discussion at the ITU. All that the Draft Resolution seeks to do is to equip the ITU with the mandate to prepare and recommend a “<i>roadmap for the systematization</i>” of allocation of naming, numbering and addressing resources, and for local routing of domestic traffic and address resolution. The framework for such mandate is that of security, given the ITU’s role in ‘building confidence and security in the use of ICTs’ under Action Line C5 of the <a href="http://www.itu.int/wsis/docs/geneva/official/poa.html">Geneva Plan of Action</a>, 2003.</p>
<p style="text-align: justify; ">Unfortunately, the text of our Draft Resolution, by dint of imprecision or lack of clarity, undermines India’s intentions. On three issues of utmost importance to the Internet, the Draft Resolution has unintended or unanticipated impacts. <strong><i>First</i></strong>, its text on tracing communication and identity of originators, and systematic allocation of identifiable IP address blocks to particular countries, has impacts on privacy and freedom of expression. Given Edward Snowden’s <a href="http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded">NSA files</a> and the absence of adequate protections against government incursions or excesses into privacy,<a href="#_ftn12">[12]</a> either in international human rights law or domestic law, such text is troublesome. <strong><i>Second</i></strong>, it has the potential to undermine multi-stakeholder approaches to Internet governance by proposing text that refers almost exclusively to sovereign monopolies over Internet resource allocation, and <strong><i>finally</i></strong>, displays a certain disregard for network architecture and efficiency, and to principles of a free, open and unified Internet, when it seeks to develop global architecture that facilitates (domestic) localization of traffic-routing, address resolution and allocation of naming, numbering and addressing.</p>
<p style="text-align: justify; ">In this post, I will address the first concern of human rights implications of our Draft Resolution.<span> </span></p>
<h3 style="text-align: justify; ">Unintended Implications for Privacy and Freedom of Expression:</h3>
<p style="text-align: justify; ">India’s Draft Resolution has implications for individual privacy. At two different parts of the preamble, India expresses concerns with the impossibility of locating the user at the end of an IP address:</p>
<ul style="text-align: justify; ">
<li>Pream. §(e): “<i>recognizing</i>… that the modern day packet networks, which at present have many security weaknesses, <i>inter alia</i>, camouflaging the identity of originator of the communication”;</li>
<li>Pream. §(h): “<i>recognizing</i>… that IP addresses are distributed randomly, that makes the tracing of communication difficult”.</li>
</ul>
<p style="text-align: justify; ">The concerns here surround difficulties in tracking IP addresses due to the widespread use of NATs, as also the existence of IP anonymisers like Tor. Anonymisers like Tor permit individuals to cover their online tracks; they conceal user location and Internet activity from persons or governments conducting network surveillance or traffic analysis. For this reason, Tor has caused much discomfort to governments. <a href="http://www.wired.com/2014/10/laura-poitras-crypto-tools-made-snowden-film-possible/">Snowden used Tor</a> while communicating with Laura Poitras. Bradley (now Chelsea) Manning of Wikileaks fame is<i> </i><a href="http://belfercenter.ksg.harvard.edu/files/maurer-dp-2011-10-wikileaks-final.pdf">reported</a> to have used Tor (page 24). Crypto is increasingly the safest – perhaps the only safe – avenue for political dissidents across the world; even Internet companies were <a href="http://gizmodo.com/the-nsa-was-going-to-fine-yahoo-250k-a-day-if-it-didnt-1633677548">coerced</a> into governmental compliance. No wonder, then, that governments are doing all they can to dismantle IP anonymisers: the <a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/">NSA</a> and <a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/">GCHQ</a> have tried to break Tor; the Russian government has <a href="http://www.bloomberg.com/news/2014-07-29/putin-sets-110-000-bounty-for-cracking-tor-as-anonymous-internet-usage-in-russia-surges.html">offered a reward</a> to anyone who can.</p>
<p style="text-align: justify; ">Far be it from me to defend Tor blindly. There are reports <a href="http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption">suggesting</a> that Tor is being <a href="http://news.softpedia.com/news/Tor-Attracts-More-and-More-Cybercriminals-Experts-Warn-430659.shtml">used by offenders</a>, and not merely those of the Snowden variety. But governments must recognize the very obvious trust deficit they face, especially after <a href="http://www.statewatch.org/news/2014/may/ep-LIBE-Inquiry-NSA-Surveillance.pdf">Snowden’s revelations</a>, and consider the implications of seeking traceability and identity/geolocation for every IP address, in a systematic manner. The implications are for privacy, a right guaranteed by Article 17 of the International Covenant on Civil and Political Rights (ICCPR). Privacy has been <a href="http://www.hrw.org/sites/default/files/related_material/UNGA_upload_0.pdf">recognized</a> by the UN General Assembly as applicable in cases of surveillance, interception and data collection, in Pream. §4 of its resolution <i>The Right to Privacy in the Digital Age</i>. But many states do not have robust privacy protections for individuals and data. And while governments may state the necessity to create international policy to further effective criminal investigations, such an aim cannot be used to nullify or destroy the rights of privacy and free speech guaranteed to individuals. Article 5(1), ICCPR, codifies this principle, when it states that States, groups or persons may not “<i>engage in any activity or perform any act aimed at the destruction of any of the rights and freedoms recognized herein…</i>”.</p>
<p style="text-align: justify; "><span>Erosion of privacy has a chilling effect on free speech [</span><i><a href="http://www.law.cornell.edu/supremecourt/text/376/254">New York Times v. Sullivan</a></i><span>, 376 U.S. 254], so free speech suffers too. Particularly with regard to Tor and identification of IP address location and users, anonymity in Internet communications is at issue. At the moment, most states already have anonymity-restrictions, in the form of identification and registration for cybercafés, SIM cards and broadband connections. For instance, Rule 4 of India’s </span><a href="http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf">Information Technology (Guidelines for Cyber Cafe) Rules, 2011</a><span>, mandates that we cannot not use computers in a cybercafé without establishing our identities. But our ITU Draft Resolution seeks to </span><i>dismantle</i><span> the ability of Internet users to operate anonymously, be they political dissidents, criminals or those merely acting on their expectations of privacy. Such dismantling would be both violative of international human rights law, as well as dangerous for freedom of expression and privacy in principle. Anonymity is integral to democratic discourse, held the US Supreme Court in </span><i><a href="http://www.law.cornell.edu/supct/html/93-986.ZO.html">McIntyre v. Ohio Elections Commission</a></i><span> [514 U.S. 334 (1995)].</span><a href="#_ftn13">[13]</a><span> Restrictions on Internet anonymity facilitate communications surveillance and have a chilling effect on the free expression of opinions and ideas, </span><a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf">wrote Mr. Frank La Rue</a><span>, Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression (¶¶ 48-49).</span></p>
<p style="text-align: justify; ">So a law or international policy for blanket identification and traceability of IP addresses has grave consequences for and <i>prima facie </i>violates privacy, anonymity and freedom of speech. But these rights are not absolute, and can be validly restricted. And because these human rights are implicated, the ITU with its lack of expertise in the area may not be the adequate forum for discussion or study.</p>
<p style="text-align: justify; "><span>To be valid and justified interference, any law, policy or order interfering with privacy and free speech must meet the standards of reasonableness and proportionality, even if national security were the government’s legitimate aim, laid down in Articles 19(3) and 17 of the Covenant on Civil and Political Rights (CCPR) [</span><i><a href="http://www1.umn.edu/humanrts/undocs/html/vws488.htm">Toonen v. Australia</a></i><span>, Communication No. 488/1992, U.N. Doc CCPR/C/50/D/488/1992 (1994), ¶6.4]. And as the European Court of Human Rights found in </span><i><a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-76586">Weber & Saravia v. Germany</a></i><span> [Application no. 54934/00, 29 June 2006 (ECHR), ¶95], law or executive procedure that </span><i>enables</i><span> surveillance without sufficient safeguards is </span><i>prima facie</i><span> unreasonable and disproportionate. Re: anonymity, in </span><i><a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-126635">Delfi AS v. Estonia</a></i><span> [Application no. 64569/09, 17 February 2014, ¶83], while considering the liability of an Internet portal for offensive anonymous comments, the ECHR has emphasized the importance of balancing freedom of expression and privacy. It relied on certain principles such as “</span><i>contribution to a debate of general interest, subject of the report, the content, form and consequences of the publication</i><span>” to test the validity of government’s restrictions.</span></p>
<p style="text-align: justify; ">The implications of the suggested text of India’s Draft Resolution should then be carefully thought out. And this is a good thing. For one must wonder why governments need perfect traceability, geolocation and user identification for <i>all</i> IP addresses. Is such a demand really different from mass or blanket surveillance, in scale and government tracking ability? Would this not tilt the balance of power strongly in favour of governments against individuals (citizens or non-citizens)? This fear must especially arise in the absence of domestic legal protections, both in human rights, and criminal law and procedure. For instance, India’s Information Technology Act, 2000 (amended in 2008) has Section 66A, which criminalizes offensive speech, as well as speech that causes annoyance or inconvenience. Arguably, arrests under Section 66A have been <a href="http://timesofindia.indiatimes.com/city/bangalore/Man-arrested-for-allegedly-sending-offensive-MMS-against-Modi-confirmed-innocent-by-police-released/articleshow/35624351.cms">arbitrary</a>, and traceability may give rise to a host of new worries.</p>
<p style="text-align: justify; "><span>In any event, IP addresses and users can be discerned under existing domestic law frameworks. Regional Internet Registries (RIR) such as APNIC allocate blocks of IP addresses to either National Internet Registries (NIR – such as IRINN for India) or to ISPs directly. The ISPs then allocate IP addresses dynamically to users like you and me. Identifying information for these ISPs is maintained in the form of </span><a href="http://www.irinn.in/whoisSearchform.action">WHOIS records</a><span> and </span><a href="file://localhost/pub/stats/apnic">registries</a><span> with RIRs or NIRs, and this information is public. ISPs of most countries require identifying information from users before Internet connection is given, i.e., IP addresses allocated (mostly by dynamic allocation, for that is more efficient). ISPs of some states are also regulated; in India, for instance, ISPs require a </span><a href="http://www.dot.gov.in/licensing/data-services">licence</a><span> to operate and offer services.</span></p>
<p style="text-align: justify; ">If any government wished, on the basis of some reasonable cause, to identify a particular IP address or its user, then the government could first utilize WHOIS to obtain information about the ISP. Then ISPs may be ordered to release specific IP address locations and user information under executive or judicial order. There are also technical solutions, such as <a href="http://traceroute.monitis.com/">traceroute</a> or <a href="http://ip-lookup.net/">IP look-up</a> that assist in tracing or identifying IP addresses. Coders, governments and law enforcement must surely be aware of better technology than I.</p>
<p style="text-align: justify; ">If we take into account this possibility of geolocation of IP addresses, then the Draft Resolution’s motivation to ‘systematize’ IP address allocations on the basis of states is unclear. I will discuss the implication of this proposal, and that of traffic and address localization, in my next post.</p>
<p style="text-align: justify; "> </p>
<hr size="1" style="text-align: justify; " width="33%" />
<p style="text-align: justify; "><a href="#_ftnref1">[1]</a> Pream. §(e), Draft Resolution: “recognizing… that the modern day packet networks, which at present have many security weaknesses, inter alia, camouflaging the identity of originator of the communication”.</p>
<p style="text-align: justify; "><a href="#_ftnref2">[2]</a> Pream. §(h), Draft Resolution: “recognizing… that IP addresses are distributed randomly, that makes the tracing of communication difficult”.</p>
<p style="text-align: justify; "><a href="#_ftnref3">[3]</a> Op. §1, Draft Resolution: “instructs the Secretary General… to collaborate with all stakeholders including International and intergovernmental organizations, involved in IP addresses management to develop an IP address plan from which IP addresses of different countries are easily discernible and coordinate to ensure distribution of IP addresses accordingly”.</p>
<p style="text-align: justify; "><a href="#_ftnref4">[4]</a> Pream. §(g), Draft Resolution: “recognizing… that communication traffic originating and terminating in a country also many times flows outside the boundary of a country making such communication costly and to some extent insecure from national security point of view”.</p>
<p style="text-align: justify; "><a href="#_ftnref5">[5]</a> Pream. §(f), Draft Resolution: “recognizing… that even for local address resolution at times, system has to use resources outside the country which makes such address resolution costly and to some extent insecure from national security perspective”.</p>
<p style="text-align: justify; "><a href="#_ftnref6">[6]</a> Op. §6, Draft Resolution: “instructs the Secretary General… to develop and recommend a routing plan of traffic for optimizing the network resources that could effectively ensure the traceability of communication”.</p>
<p style="text-align: justify; "><a href="#_ftnref7">[7]</a> Op. §1, Draft Resolution; <i>see</i> note 3.</p>
<p style="text-align: justify; "><a href="#_ftnref8">[8]</a> Op. §5, Draft Resolution: “instructs the Secretary General… to develop and recommend public telecom network architecture which ensures that effectively the traffic meant for the country, traffic originating and terminating in the country remains within the country”.</p>
<p style="text-align: justify; "><a href="#_ftnref9">[9]</a> Op. §4, Draft Resolution: “instructs the Secretary General… to develop and recommend public telecom network architecture which ensures effectively that address resolution for the traffic meant for the country, traffic originating and terminating in the country/region takes place within the country”.</p>
<p style="text-align: justify; "><a href="#_ftnref10">[10]</a> Context Note to Draft Resolution, ¶3: “Planning and distribution of numbering and naming resources in a systematic, equitable, fair and just manner amongst the Member States…”</p>
<p style="text-align: justify; "><a href="#_ftnref11">[11]</a> Context Note to Draft Resolution, ¶2: “…there are certain areas that require critical attention to move in the direction of building the necessary “Trust Framework” for the safe “Information Society”, where privacy, safety are ensured”.</p>
<p style="text-align: left; "><a href="#_ftnref12">[12]</a> <i>See, for instance</i>, Report of the Office of the High Commission for Human Rights (“OHCHR”), <i>Right to Privacy in the Digital Age</i>, A/HRC/27/37 (30 June 2014), ¶34-35, <a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf">http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf</a>. <i>See esp. </i>note 30 of the Report, ¶35.</p>
<p style="text-align: justify; "><a href="#_ftnref13">[13]</a> Many thorny political differences exist between the US and many states (including India and Kenya, who I am told has expressed preliminary support for the Draft Resolution) with regard to Internet governance. Irrespective of this, the US Constitution’s First Amendment and judicial protections to freedom of expression remain a yardstick for many states, including India. India, for instance, has positively referred to the US Supreme Court’s free speech protections in many of its decisions; <i>ex. see</i> Kharak Singh v. State of Uttar Pradesh, 1963 Cri. L.J. 329; R. Rajagopal v. State of Tamil Nadu, AIR 1995 SC 264.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms'>https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms</a>
</p>
No publishergeethaCryptographyPrivacyCybersecurityInternet GovernanceFreedom of Speech and ExpressionChilling EffectMulti-stakeholderAnonymityITU2014-11-02T15:13:45ZBlog EntryFacebook and its Aversion to Anonymous and Pseudonymous Speech
https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech
<b>Jessamine Mathew explores Facebook's "real name" policy and its implications for the right to free speech. </b>
<p style="text-align: justify; ">The power to be unidentifiable on the internet has been a major reason for its sheer number of users. Most of the internet can now be freely used by anybody under a pseudonym without the fear of being recognised by anybody else. These conditions allow for the furtherance of free expression and protection of privacy on the internet, which is particularly important for those who use the internet as a medium to communicate political dissent or engage in any other activity which would be deemed controversial in a society yet not illegal. For example, an internet forum for homosexuals in India, discussing various issues which surround homosexuality may prove far more fruitful if contributors are given the option of being undetectable, considering the stigma that surrounds homosexuality in India, and the recent setting-aside of the Delhi High Court decision reading down Section 377 of the Indian Penal Code. The possibility of being anonymous or pseudonymous exists on many internet fora but on Facebook, the world’s greatest internet space for building connections and free expression, there is no sanction given to pseudonymous accounts as Facebook follows a real name policy. And as the <a href="http://www.nytimes.com/2014/06/27/technology/facebook-battles-manhattan-da-over-warrants-for-user-data.html?_r=0">recent decision</a> of a New York judge, disallowing Facebook from contesting warrants on private information of over 300 of its users, shows, there are clear threats to freedom of expression and privacy.</p>
<p style="text-align: justify; ">On the subject of using real names, Facebook’s Community Standards states, “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.” Facebook’s Marketing Director, Randi Zuckerberg, <a href="http://www.dailymail.co.uk/news/article-2019544/Facebook-director-Randi-Zuckerberg-calls-end-internet-anonymity.html">bluntly dismissed</a> the idea of online anonymity as one that “has to go away” and that people would “behave much better” if they are made to use their real names. Apart from being a narrow-minded statement, she fails to realise that there are many different kinds of expression on the internet, from stories of sexual abuse victims to the views of political commentators, or indeed, whistleblowers, many of whom may prefer to use the platform without being identified. It has been decided in many cases that humans have a right to anonymity as it provides for the furtherance of free speech without the fear of retaliation or humiliation (<i>see </i>Talley v. California).<i> </i></p>
<p style="text-align: justify; ">While Facebook’s rationale behind wanting users to register for accounts with their own names is based on the goal of maintaining the security of other users, it is still a serious infraction on users’ freedom of expression, particularly when anonymous speech has been protected by various countries. Facebook has evolved from a private space for college students to connect with each other to a very public platform where not just social connections but also discussions take place, often with a heavily political theme. Facebook has been described as <a href="http://www.thenational.ae/news/uae-news/facebook-and-twitter-key-to-arab-spring-uprisings-report">instrumental</a> in the facilitation of communication during the Arab Spring, providing a space for citizens to effectively communicate with each other and organise movements. Connections on Facebook are no longer of a purely social nature but have extended to political and legal as well, with it being used to promote movements all through the country. Even in India, Facebook was the <a href="http://timesofindia.indiatimes.com/home/news/Facebook-Twitter-Google-change-face-of-Indian-elections/articleshow/34721829.cms">most widely adopted medium</a>, along with Twitter and Facebook, for discourse on the political future of the country during, before and after the 2014 elections. Earlier in 2011, Facebook was <a href="https://cis-india.org/news/web2.0-responds-to-hazare">used intensively</a> during the India Against Corruption movement. There were pages created, pictures and videos uploaded, comments posted by an approximate of 1.5 million people in India. In 2012, Facebook was also used to <a href="http://timesofindia.indiatimes.com/tech/social-media/Delhi-gang-rape-case-FacebookTwitter-fuels-rally-at-India-Gate/articleshow/17741529.cms">protest against the Delhi gang rape</a> with many coming forward with their own stories of sexual assault, providing support to the victim, organising rallies and marches and protesting about the poor level of safety of women in Delhi.</p>
<p style="text-align: justify; ">Much like its content policy, Facebook exhibits a number of discrepancies in the implementation of the anonymity ban. Salman Rushdie found that his Facebook account had been <a href="http://www.nytimes.com/2011/11/15/technology/hiding-or-using-your-name-online-and-who-decides.html?pagewanted=all&_r=0">suspended</a> and when it was reinstated after he sent them proof of identity, Facebook changed his name to the name on his passport, Ahmed Rushdie instead of the name he popularly goes by. Through a series of tweets, he criticised this move by Facebook, forcing him to display his birth name. Eventually Facebook changed his name back to Salman Rushdie but not before serious questions were raised regarding Facebook’s policies. The Moroccan activist Najat Kessler’s account was also <a href="https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact=8&ved=0CD8QFjAE&url=http%3A%2F%2Fjilliancyork.com%2F2010%2F04%2F08%2Fon-facebook-deactivations%2F&ei=O1KxU-fwH8meugSZ74HgAg&usg=AFQjCNE7oUt2dyrSjpTskK7Oz3Q1OYXudg&sig2=bsOu46nmABTUhArhdjDCVw&bvm=bv.69837884,d.c2E">suspended</a> as it was suspected that she was using a fake name. Facebook has also not just stopped at suspending individual user accounts but has also removed pages and groups because the creators used pseudonyms to create and operate the pages in question. This was seen in the case of Wael Ghonim who created a group which helped in mobilizing citizens in Egypt in 2011. Ghonim was a Google executive who did not want his online activism to affect his professional life and hence operated under a pseudonym. Facebook temporarily <a href="http://www.newsweek.com/how-wael-ghonim-sparked-egypts-uprising-68727">removed</a> the group due to his pseudonymity but later reinstated it.</p>
<p style="text-align: justify; ">While Facebook performs its due diligence when it comes to some accounts, it has still done nothing about the overwhelmingly large number of obviously fake accounts, ranging from Santa Claus to Jack the Ripper. On my own Facebook friend list, there are people who have entered names of fictional characters as their own, clearly violating the real name policy. I once reported a pseudonymous account that used the real name of another person. Facebook thanked me for reporting the account but also said that I will “probably not hear back” from them. The account still exists with the same name. The redundancy of the requirement lies in the fact that Facebook does not request users to upload some form identification when they register with the site but only when they suspect them to be using a pseudonym. Since Facebook also implements its policies largely only on the basis of complaints by other users or the government, the real name policy makes many political dissidents and social activists the target of abuse on the internet.</p>
<p style="text-align: justify; ">Further, Articles 21 and 22 of the ICCPR grant all humans the right to free and peaceful assembly. As governments increasingly crack down on physical assemblies of people fighting for democracy or against legislation or conditions in a country, the internet has proved to be an extremely useful tool for facilitating this assembly without forcing people to endure the wrath of governmental authorities. A large factor which has promoted the popularity of internet gatherings is the way in which powerful opinions can be voice without the fear of immediate detection. Facebook has become the coveted online space for this kind of assembly but their policies and more particularly, faulty implementation of the policies, lead to reduced flows of communication on the site.</p>
<p style="text-align: justify; ">Of course, Facebook’s fears of cyberbullying and harassment are likely to materialise if there is absolutely no check on the identity of users. A possible solution to the conflict between requiring real names to keep the community safe and still allowing individuals to be present on the network without the fear of identification by anybody would be to ask users to register with their own names but still allowing them to create a fictional name which would be the name that other Facebook users can see. Under this model, Facebook can also deal with the issue of safety through their system of reporting against other users. If a pseudonymous user has been reported by a substantial number of people for harassment or any other cause, then Facebook may either suspend the account or remove the content that is offensive. If the victim of harassment chooses to approach a judicial body, then Facebook may reveal the real name of the user so that due process may be followed. At the same time, users who utilise the website to present their views and participate in the online process of protest or contribute to free expression in any other way can do so without the fear of being detected or targeted. Safety on the site can be maintained even without forcing users to reveal their real names to the world. The system that Facebook follows currently does not help curb the presence of fake accounts and neither does it promote completely free expression on the site.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech'>https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech</a>
</p>
No publisherJessamine MathewSocial MediaPrivacyFreedom of Speech and ExpressionFacebookChilling EffectAnonymityPseudonimityArticle 19(1)(a)2014-07-04T07:53:07ZBlog Entry