P172 POLITICS OF THE INTERNET:
TABLE OF LINKS


D I R E C T O R Y
Colored Panels are Hot Links to:
DOCUMENT
RELATED SITE
A SPECIAL NOTE!
This index displays the ten instructional weeks of the course Politics 172: Politics of the Internet [Winter Quarter 2002]. The hot links lead to material supporting the lectures. The syllabus shows required reading and course requirements. Last revised: 2002.03.03.

TOPICS TOPICS TOPICS
Week Topic
0 INTRODUCTION
1 ORIGINS OF THE INTERNET
2 ACCESS
3 PRIVACY
4 SECURITY OF THE NET
5 SECURE COMMERCE?
Week Topics
6 SECURITY OF SOCIETY
7 INTELLECTUAL
PROPERTY RIGHTS
8 FREE SPEECH
9 TAXATION & REGULATION
10 POLITICAL DESIGN
§ Online Sources
A JOURNALS &c.
B eMAIL LISTS &c.

Assigned Works:

Abbate, Janet. Inventing the Internet (Cambridge, Massachusetts: MIT Press, 1999).

Brown, John Seely and Paul Duguid. The Social Life of Information (Cambridge, Massachusetts: Harvard University Press, 2001).

Diffie, Whitfield and Susan Landau. Privacy on the Line: The Politics of Wiretapping and Encryption (Cambridge, Massachusetts: MIT Press, 1998).

Franda, Michael. Governing the Internet: The Emergence of an International Regime (Boulder: Lynne Rienner, 2001).

Karmack, Elaine Ciulla and Joseph S. Nye, Jr. [eds]. governance.com: Democracy in the Information Age (Washington, DC: Brookings, 2002).

Lessig, Lawrence. Code: And Other Laws of Cyberspace (New York: Basic Books, [1999] 2000).

Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World (New York: Random House [2001], Vintage Books, 2002).

Further Reading

Berners-Lee, Tim [with Mark Fischetti]. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web (San Francisco: HarperSanFrancisco, 1999).

Cairncross, Frances. The Death of Distance (Boston: Harvard Business School Press, 1997).

Dodge, Martin and Rob Kitchin. Atlas of Cyberspace (Addison-Wesley, 2001). Highly recommended. This is not at the Baytree Bookstore, but can be ordered from sources such as Amazon.com.Q

Everard, Jerry. Virtual States: The Internet and the Boundaries of the Nation-State (London: Routledge, 1999).

Grossman, Lawrence K. The Electronic Republic: Reshaping Democracy in the Information Age (Penguin, 1996).

Grossman, Wendy M. net.wars (New York: New York University Press, 1997).

Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier (New York: Simon and Schuster, 1991).

Hargittai, Eszter and Manuel Cinteno [eds]. AMERICAN BEHAVIORAL SCIENTIST, Vol. 44 No. 10, June 2001. Special issue of ABS titled "Mapping Globalization". [See their introductory chapter on line.]

Lanham, Richard A. The Electronic World: Democracy, Technology, and the Arts (Chicago: University of Chicago Press, 1993).

Liberty [The National Council for Civil Liberties] ed. Liberating Cyberspace: Civil Liberties, Human Rights & the Internet [London and Sterling, Virginia: Pluto Press, 1999].

Loader, Brian [ed]. The Governance of Cyberspace: Politics, Technology, and Global Restructuring (London and New York: Routledge, 1997).

Lyon, Matthew and Katie Hafner. Where Wizards Stay Up Late: The Origins of the Internet (New York: Simon and Schuster, 1996).

Margolis, Michael and David Resnick. Politics as Usual: The Cyberspace “Revolution” (Thousand Oaks, California: Sage, 2000).

Reporters Sans Frontières. Enemies of the Internet. 2001. Highly recommended. This is not at the Baytree Bookstore, but can be purchased directly as an on-line PDF document from the RSF website at http://www.rsf.fr/uk/html/internet/ennemis.html for €7. To buy click on the link to 00h00. If you do not want the French version, click on “Existe aussi en version anglaise”.



0 Introduction
DOCUMENT
RELATED SITE
SPECIAL NOTE!

Overview. The syllabus: topics and reading list. Lectures and on-line documents. What will we study? How to approach the material? What performances are required?

SYLLABI
AND NOTES
RELATED
PAGES
FRIDAY
January 4

Item Link
0 The Study Guide [Note 0.1]
1 The Bibliography [Note 0.2]
2 The syllabus describes the course, required books, and assignments.
3 Bruce Larkin's personal entry page gives you access to his site, including more on his professional interests.
1 To see how this course fits into the Politics curriculum, consult Politics' synoptic schedule for 2002-2003.
2 You can contact Professor Larkin by email to larkin@learnworld.com.
Item Link
1 UCSC students with computer network questions might start at the CATS Information Resource Center web page.
2 CATS also explains its Instructional Computing Labs: list and schedules.
3 The UC Library Catalog [Melvyl] is accessible on the web. But you may find contacting Melvyl by telnet faster and easier to save search results: log in to your UNIX or Athena account and at the prompt write "telnet melvyl" and then a return.
4
Added
1998
7 Nov
You will find helpful for following current issues the daily-archived version of Red Rock Eater News Service, a mailing list organized by Phil Agre of UCLA. You can also subscribe to receive despatches by email.
Item Link
1 Here are some prime sites for this course, with material on every topic. You might begin by noting what’s available at the Harvard Law School’s Berkman Center for Internet and Society.
2 For a list of search engines and reference sources, see The New York Times The New York Times CyberNavigator.
3 Internet Society
4 Electronic Frontier Foundation
5 Center for Democracy and Technology
6
Added
2001
2 SDec
Washington Internet Project [CyberTelecom]
7 TechWeb: "the technology news site."
8 Gary Chapman's syllabus for the graduate seminar PAF388K Public Policy and the Internet taught at the LBJ School of Public Affairs, University of Texas, and his Resources on the Internet and Public Policy: A selected guide. See how to subscribe to Chapman's email announcements of published columns [Note.00.3].
9
Added
1999
7 Oct
civic.com: information for IT professionals in state and local government.


1 Origins
DOCUMENT
RELATED SITE
SPECIAL NOTE!

Political origins of the Internet. Design of the Web. The World Wide Web Consortium (W3). The domain name controversy. "North-South" differences. Standards. HTML. Browser competition [MicroSoft vs. Netscape].


MONDAY
January 7
WEDNESDAY
January 9
FRIDAY
January 11

Item Link
0 Lecture Notes [Notes 01.1] on historical steps.
1 Michael Hauben and Ronda Hauben, "Behind the Net: The Untold Story of the ARPANET and Computer Science," Chapter 7 of Netizens: On the History and Impact of Usenet and Internet (IEEE Computer Society, 1997). This and other chapters were issued on-line by First Monday.
2 W3C: the World Wide Web Consortium, where the Web began.
3 An elementary summary of the web & how it works [W3C].
4
Added
1999
28 Nov
Simson L. Garfinkel, “The Web’s Unelected Government”, in Technology Review, November-December 1998.
5 The original 1991 HTML, described by Tim Berners-Lee.
6 Tim Berners-Lee talking points at launch of W3C.
7 David Jones' internet history.
8 Internet Society list of internet histories.
9 Hobbes' Internet Timeline with graphs of internet and web growth.
10 Descriptions of the key groups governing the Internet.
11 Internet Assigned Numbers Authority
12 Internet Architecture Board page "What Does the IAB Do, Anyway?" [Brian Carpenter]
13 The Internet Engineering Task Force [IETF]. More at "The Tao of the IETF," more fully explaining what the IETF does.
14 The International Congress of Independent Internet Users champions people who "buy Internet services and do not sell them."
15 World Internetworking Alliance (WIA). This page contains many links on the domain name controversy, and a chart [& link to table] of groups in Internet governance.
16 Detailed 1972- .. list of the activity which is the Internet Assigned Numbers Authority [IANA].
17 Table of Communities and Parties of the Internet.
Item Link
0 Lecture Notes [Note 1.2], on the Domain Name System, including the DNS Path graphic used in class.
1 IHAC: International ad Hoc Committee, which developed the gTLD-MoU (generic Top Level Domains-Memorandum of Understanding) proposal on domain names. Concluded 1 May 1997.
2 gTLD-MoU: entity anticipated by the Memorandum of Understanding. Excellent documents and links on the domain name issue.
3 The Berkman Center at Harvard Law School maintains a White Paper Working Drafts Comparison Site on similarities and differences among domain name proposals.
4 International Forum on the White Paper on the domain issue.
5 A 15 December 1997 report on expanding membership of the US policy body working on domain names.
6 Internet Society report on corporate funding of domain name group.
7 World Intellecutal Property Organization [WIPO] schedule of consultations in Sep & Oct 1998 on domain name issues.
8 US Department of Commerce, 20 February 1998, proposed rule on the Internet Domain Name System. Who will allocate domains?
9 The Joint Statement of 17 September 1998 issued by IANA and NSI, introducing their agreed proposals [By-Laws and Articles of Incorporation] for a new entity assigning internet addresses.
10
Added
1998
27 Nov
Jeri Clausing, "New Internet Board Could Shake Up Country Domains" The New York Times, 27 November 1998.
11
Added
1998
29 Nov
Network Working Group RFC 1591, "Domain Name System Structure and Designation" [July 1994], Jon Postel, Information Sciences Institute, University of Southern California.
12
Added
2000
31 Mar
Unicode Consortium and its character chart index.
Item Link
1 The Thursday 8 October New York Times published a detailed review of charges that Microsoft has misused its market position.
2 How do browsers differ? Check out Netscape Communicator and
3 MicroSoft Internet Explorer.
4 Of course, there are others, for example Opera.
5 Links on Microsoft competition charges [Yahoo!].
6 Prepared testimony of witnesses at the 3 March 1998 Senate Judiciary Committee Hearings on "Market Power and Structural Change in the Software Industry." [Gates, Barksdale, McNealy &c.]
7 On the Microsoft suit, Week 5 has some additional links.
8 North-South issues are treated as 'Access' questions in Week 2.
9
Added
2001
22 Nov
Lawrence Lessig, “The Internet Under Siege,” Foreign Policy, November-December 2001.


2 Access
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Access. "Citizenship." Exclusion. Costs. One net, or several nets? Marginalisation. English-language hegemony? "North-South" differences?


MONDAY
January 14
WEDNESDAY
January 16
FRIDAY
January 18

Item Link
1 MIDS' Map of the Internet [hosts by country].
2 Network Wizards' Internet Domain Survey. The July 1998 survey returned an estimated 36,739,000 hosts on the Net. July 1999 survey estimated 56,218,000 hosts. The most recent July 2001 survey: 125,888,197 hosts. Method. Graph 1991-1999. Table by top-level domain names.
3 Falling Through the Net: A Survey of the 'Have-Nots' in Rural and Urban America. This is the 1995 report, cited as Falling Through the Net I", which preceded the report cited above. [First in a series.]
4 Falling Through the Net II. July 1998. US Department of Commerce. Census-based findings on differential access by ethnic identity, urban-rural location, income, &c. [Second in the series.]
5
Added
1999
28 Nov
Falling Through the Net: Defining the Digital Divide . 8 July 1999. US Department of Commerce. Cited as Falling Through the Net III More on access. [Third in the series.] [This page includes links to factsheets.]
6
Dated
2000
Oct
Falling Through the Net: Toward Digital Inclusion. October 2000. US Department of Commerce. Cited as Falling Through the Net IV More on access. [Fourth in the series.]
7
Dated
2002
5 Feb
A NATION ONLINE: How Americans Are Expanding Their Use of the Internet. February 2002. US Department of Commerce. This marks the Bush shift in focus from “digital divide” to “digital nation.”. See next item.
8
Dated
2002
27 Feb
Yochi J. Dreazen, “White House Spurns Tech Programs Left Over from Clinton Presidency”. Wall Street Journal, 27 February 2002.
9 Press release announcing the study The Internet and Poverty: Real Help or Real Hype? on third world access to the net.
Item Link
1 "Bridging the Digital Divide: The Impact of Race on Computer Access and Internet Use" . Thomas P. Novak and Donna L. Hoffman. A briefer version was published in Science 18 April 1998.
2 A New York Times report of the Hoffman-Novak study was published on 17 April 1998.
3 Michel Marriott, "As More Non-English Speakers Log On, Many Languages Thrive." The New York Times, 18 June 1998. [Free registration will be required to access this and other Times articles.]
4 Mark Landler, The New York Times 3 August 1998, writes about the China Internet Corporation and its plan for a China Wide Web unconnected to the Web we know.
5 Another Mark Landler piece from The New York Times [13 April 1998] on Richard Li's plans to bring the Internet to Asia, with a table showing home computer ownership and Net use in selected Asian countries.
Item Link
0
Added
1998
18 Oct
Lecture Note 02.3: What is Politics? in Larkin's world. Politics as negotiation.
1 US Secretary of Education Richard W. Riley letter to the FCC on the E-rate [subsidizing school internet access]. 31 July 1997.
2 Education and Networks Coalition (EdLiNC) on the e-rate controversy.
3 Political Controls [Note 02.1]
4
Added
2002
8 Dec
Jonathan Zittrain and Benjamin Edelman, “Empirical Analysis of Internet Filtering in China”. This page contains links to lists of blocked sites, a form for a real-time test if a site is blocked, and a technical appendix, among others.


3 Privacy
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Privacy. Concealing identity. Encryption. Personal communication. Communication in aid of criminal acts. State interception. State assertion of authority.


WEDNESDAY
January 23
FRIDAY
January 25

Item Link
0
Added
1999
7 Oct
Electronic Privacy Information Center Key source. Current.
1 Marketing vs. Privacy US-Japan agreement [Note.03.2].
2 EFF critique [16 September 1998] of modification in US cryptography export policy, which "fails to address the real issue: privacy."
3 Unfortunately, this is not on line. Philip R. Zimmermann, "Cryptography for the Internet," Scientific American, October 1998, pp.110-115.
4 RSA Data Security, a prime vendor of encryption products.
5 PGP [Pretty Good Privacy], Philip Zimmermann's encryption product, is now merged with Network Associates. Their freeware page links to the MIT PGP page from which the freeware version can be downloaded [in Windows, Mac, and UNIX versions].
6 Philip Zimmermann's biographic page [with photo].
7 The Global Internet Liberty Campaign (GILC)call statement [15 September 1998] calling for removal of encryption from controls of the Wassenaar Arangement, under which it is treated as a weapon.
8 Encryption is for sale abroad. [Note 3.4]
9 This 25 September 1998 New York Times article asks "Can a Web Link Break Copyright Laws?" And we'll observe whether, or how long, the Times keeps up links to articles like this 25 September 1998 despatch! Still available, at a slightly-altered URL, on 8 January 2000.
10
Added
2001
22 Mar
FIPR Regulation of Investigatory Powers Information Centre. On the 2000 UK Regulation of Investigatory Powers Act, a police-powers act. [Foundation for Information Policy Research] Extensive links.
Item Link
11
Added
2000
17 Jan
Summary of Supreme Court decision in Reno v. Condon, rejecting unanimously a suit against the Driver’s Privacy Protection Act of 1994 (DPPA), which restricted States from disclosing a driver’s personal information without the driver’s consent. Or see the full text of Chief Justice Rehnquist’s decision.
12
Added
2000
17 Jan
“Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure,” by Carl Ellison and Bruce Schneier.
13
Added
2002
30 Jan
Association of Research Libraries, “The Search and Seizure of Electronic Information: The Law Before and After the USA Patriot Act” [a pdf document] Wilding Rein & Fielding LLP, working draft, 18 January 2002.
14
Added
2002
31 Jan
Electronic Frontier Foundation analysis of the USA-PATRIOT Act. [The site may take you to their ‘surveillance'’ page; there choose ‘terrorism_militias’ and find this analysis [dated 31 October 2001]].

1
Added
1999
20 Nov
ACLU site on Echelon, the far-reaching secret communications intercept system now facing US Congressional inquiry. Many document links.
2 US extends wiretap deadline [CALEA] to 30 June 2000.
3 Peter Wayner article "Technology That Tracks Cell Phones Draws Fire", The New York Times 23 February 1998. [Registered students only.]
4
Added
1998
17 Oct
Reuter's Aaron Pressman: "FCC to Propose Resolving Digital Wiretap Debate". 16 October 1998.
5 John Markoff article "A Call for Digital Surveillance Is Delayed", in The New York Times 14 September 1998. [Registered students only.]
6 Links to FCC Order, Comment, &c. on delay of CALEA to 2000.
7
Added
2001
9 Apr
Links to Cryptome search page. Try search on ‘SHAMROCK’, ‘UKUSA’, ‘NSA’, ‘ECHELON’, or simply ‘interception’ or ‘surveillance’.
8
Added
2001
23 Nov
“FBI Develops Eavesdropping Tools.” Associated Press. Washington Post, 22 November 2001.
9
Added
2001
27 Nov
US Senate, Select Committee to Study Governmental Operations with Respect to Intelligence Activities. “Intelligence Activities: The National Security Agency and Fourth Amendment Rights”. Testimony of NSA Director Lt. Gen. Lew Allen, Jr. 29 October 1975. See further testimony: next item.
10
Added
2001
27 Nov
US Senate, Select Committee to Study Governmental Operations with Respect to Intelligence Activities. “Intelligence Activities: The National Security Agency and Fourth Amendment Rights,” including testimony of Attorney General Edward H. Levi, 6 November 1975, on the “relationship between electronic surveillance and the Fourth Amendment of the Constitution.”. [Levi is better known as former Dean of the University of Chicago Law School.] See NSA testimony: previous item.
11
Added
2002
14 Feb
US Department of Commerce. Safe Harbor Workbook. [And see next item:]
12
Dated
2002
13 Feb
European Union. Commission Staff Working Paper on implementation of Safe Harbour Privacy Principles. 13 February 2002.


4 Security of the Net
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Internet security. Attacks. Preventions. Responses. Deterrents. State authority. Can the Net ever be safe from attack?


MONDAY
January 28
WEDNESDAY
January 30
FRIDAY
February 1

Item Link
1 Unfortunately not on line, this is a vivid, concise [composite] account of a hacking episode: Carolyn P. Meinel, "How Hackers Break In . . . and How They Are Caught," Scientific American, October 1998, pp.98-105.
2 . . . and in the same issue, under title "How Computer Security Works," descriptions of firewalls [William Cheswick and Steven M. Bellovin], digital certificates [Warwick Ford], and 'The Java Sandbox' [James Gosling], pp. 106-109.
3 Lecture Note on Crashes? [Note.04.1]
4 Look ahead to Week 6, which focuses not on security of the Net itself, but on how Net failure or abuse could have harmful effects on society and "critical infrastructure."
5 Network Associates posts a page of links to papers on corporate digital security strategies from several sources, including major accounting and consulting firms.
6
Added
2001
23 Nov
Cyberspace Seen as Potential Battleground,” The New York Times, 23 November 2001.
7
Added
2001
23 Nov
Attacks at Hubs Could Disrupt Phone Lines,” The New York Times, 23 November 2001.
Item Link
1 "ESTABLISHING A COMPUTER SECURITY INCIDENT RESPONSE CAPABILITY," COMPUTER SYSTEMS LABORATORY BULLETIN. Advising users on computer systems technology. February 1992.
2 Computer Security Incident Response and Computer Emergency Response Teams. [See next.]
3 To see how emergency response is addressed in Germany, check out The DFN-CERT Project: the Computer Emergency Response Team for the German Research Network DFN and its services.
4 Campus Computer Incident Response Team "Strawman" of the University of Wisconsin.
5
Added
1998
17 Oct
CERT/CC at the Software Engineering Institute, Carnegie Mellon University. To "coordinate communication among experts during security emergencies . . ."
6
Added
1998
17 Oct
FIRST list of CERTs worldwide.
5
Added
1998
17 Oct
The text of NWG RFC 2350, June 1998, "Expectations for Computer Security Incident Response." Strongly recommended.
Item Link
1 Computer Security Resource Clearinghouse, National Institute of Standards and Technology (NIST).
2 Example of a vendor--Global Networking and Computing, Inc.--providing commercial computer security services. As a service, they also maintain a page on firewalls.
3 Internet Firewalls FAQ, maintained by Marcus J. Ranum and Matt Curtin.
4
Added
2002
17 Jan
From Fortune, June 2001, an article on the VeriSign head, Stratton Sclavos, “The Man Who Bought the Internet.” Strongly recommended.
5
Added
2002
5 Feb
Lenny Zeltzer, “The Evolution of Malicious Agents”, in two parts: Part 1 and Part 2. [April 2000] Registered students only.


5 Secure Commerce?
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Commercial transactions. Scams. Frauds. Secure payments. Digital signatures. Commercial tie-ins. Advertising. Spam: is there no answer to spam? Commerce: will money shape the Web to serve profit? Anti-trust. US v. Microsoft.


MONDAY
February 4
WEDNESDAY
February 6
FRIDAY
February 8

Item Link
1 US Encryption Standards. [Note 05.4].
2 The NIST Advanced Encryption Standard and the several candidate algorithms.
3 The firm Tristrata Security claims to have developed a system "based on the only theoretically unbreakable encryption - the Vernam Cipher." Their "self-escrowed Key Management Infrastructure (KMI)" meets US Government conditions for export. Report of a critique: Jim Kerstetter, eWEEK, 9 October 1998, “TriStrata’s ‘Unbreakable Crypto’ Draws Rebuke”.
4
Added
1998
7 Nov
US DoJ filing, the charge against MicroSoft in US v. MicroSoft.
5
Added
1998
7 Nov
MicroSoft filing in response to the US DoJ filing in US v. MicroSoft.
6
Added
2002
17 Jan
From Fortune, June 2001, an article on the VeriSign head, Stratton Sclavos, “The Man Who Bought the Internet.”
Item Link
1 US v. MicroSoft [Note 05.1]
2 TechWeb coverage of the MicroSoft suit.
3
Added
1998
7 Nov
Selections from the US Code, Title 15, Chapter 1. §§ 1, 2, 13 and 14, bearing on monopoly and actions in restraint of trade. [Note 05.6.]
4 Note many other items on the MicroSoft suit in Week 1.
5 Amy Harmon, "For Sale: Free Operating System" on Red Hat Linux and open source software. The New York Times, 28 September 1998.
6
Added
1998
7 Nov
A page of postings by Eric S. Raymond on MicroSoft intentions [the ‘Halloween memos’], including an annotated internal MicroSoft memo on open-source software and a second [annotated] internal MicroSoft memo on Linux.
7
Added
1998
7 Nov
Tim O’Reilly’s comment on MicroSoft’s disposition toward open-source software.
8
Dated
1999
5 Nov
US v. MicroSoft. Findings of Fact.
9
Dated
2000
3 Apr
US v. MicroSoft.Conclusions of Law.
10
Dated
2000
6 Jun
US v. MicroSoft. MicroSoft's final reply.
11
Dated
2000
5 Jun
US v. MicroSoft. US Department of Justice. Final Proposal. [pdf]
12
Dated
2000
7 Jun
US v. MicroSoft. Judgment and Court Order. The US District Court judge, Thomas Penfield Jackson, ordered MicroSoft split into two parts, one centered on the operating system, the other on applications.
13
Dated
2001
28 Jun
US v. MicroSoft. Court ruling by a US Court of Appeals reversing Judge Thomas Penfield Jackson’s order to break up MicroSoft. [pdf]
14
Added
2002
7 Feb
US v. MicroSoft. Washington Post Timeline.
15
Dated
2001
1 Nov
US v. MicroSoft. Washington Post reporting expected US-MicroSoft deal to settle the suit. Ariana Eunjung Cha, “Accord Called Win for Software Giant”.
16
Dated
2002
9 Feb
US v. MicroSoft. The New York Times, Steve Lohr, “MicroSoft and 9 States Spar in Filings”.
Item Link
1 On the Murkowski-Torricelli legislative approach to SPAM [Note 05.2].
2 EFF letter to Governor Pete Wilson [9 September 1998] [California] calling for a veto of the California anti-SPAM bill [AB 1629].
3 Sendmail, Inc.'s anti-SPAM measures: Can smart programs and procedures halt spam? [Note 05.3]
4 Coalition Against Unsolicited Commercial Email.
5 Excerpts from Bill Mills' letter "Free-Speech Rights a Bogus Spam Issue", in the San Jose Mercury News, 13 September 1998. [Registered students only]. [Note 5.5]
6 Jeri Clausing, "House Backs Away From Regulating Spam", The New York Times, 28 September 1998.


6 Security of Society
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Infrastructure vulnerabilities. Banking transactions. Power transmission. Air traffic. Databases. Internet as instrument of war. Communication in aid of criminal acts. State interception. State assertion of authority.


MONDAY
February 11
WEDNESDAY
February 13
FRIDAY
February 15

Item Link
1 Executive Order 13010 [15 July 1996] establishing the President's Commission on Critical Infrastructure.
2 President's Commission on Critical Infrastructure Protection
5 The full text of the Report of the President's Commission on Critical Infrastructure Protection, October 1997. [PDF].
6 In May 1998, following the report of the President's Commission on Critical Infrastructure Protection, President Clinton created the Critical Infrastructure Assurance Office [CIAO].
7 Computer Crime and Intellectual Property Section (CCIPS), Department of Justice, on Critical Infrastructure Protection: Critical Infrastructure Protection, including a link to Presidential Decision Directive 63, “Protecting the Nation’s Critical Infrastructure.”
8
Added
2000
8 Jan
Defending America’s Cyberspace. National Plan for Information System Protection. Version 1.0. An Invitation to a Dialogue. January 2000. [In pdf format.]
9
Added
2003
19 Jan
Center for Democracy and Technology [CDT] critical infrastructure protection page. Useful links.
Item Link
9
Added
2002
1 Feb
Robert O’Harrow, Jr., “Intricate Screening of Fliers in Works,” The Washington Post, 1 February 2002. Transaction analysis of combined databases.
10
Added
2002
12 Feb
Legislation introduced 13 Dec 2001: Cyber Security Enhancement Act of 2001.
11
Added
2002
12 Feb
Declan McCullogh discussion of CSEA 2001: “Cybercrime Bill Ups the Ante”.

1 On child molestation. [Note 06.1]
2
Added
1998
30 Nov
Text of the Child Online Protection Act [October 1998], as posted by EPIC.
3
Added
1998
30 Nov
Text of the Children's Online Privacy Protection Act of 1998, as posted by the Federal Trade Commission. [pdf format]
4 Nathaniel Nash, in The New York Times [15 January 1996], "How Bavarian Proscutors Forced Compuserve's Hand on Censorship," notes the legal precedent of laws against Nazi propaganda.
Item Link
1 Erik Eckholm, The New York Times [31 December 1997], "China Cracks Down on Dissent in Cyberspace."
2 Matt Richtel, The New York Times [1 July 1998], "China Embraces the Internet--But Not as a Forum for Dissent."
3 RAND Research Review, Fall 1995, v 19 n 2, issue title: Information War and Cyberspace Security. The RAND Corporation.
4 Roger C. Molander, Andrew S. Riddile, and Peter A. Wilson, Strategic Information Warfare: A New Face of War RAND Corporation, 1996. [in pdf format]
5 Report of the Defense Science Board Task Force on Information Warfare -- Defense (IW-D) November 1996. Office of the Under Secretary of Defense for Acquisition & Technology.
6
Added
1999
6 Oct
Excerpts of US DoD doctrinal statements on Information Warfare. [Note 06.2]
7
Added
1999
6 Oct
Reuters article by Neil Winton [6 October 1999] on Y2K and Cyberwar [Registered students only]. [Note 6.3] .


7 Property Rights?
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Intellectual property rights: software, music, graphics, text. Illich thresholds. State authority. Enforcement. A ‘free public library’? or copyrighting history?


MONDAY
[February 18]
WEDNESDAY
February 20
FRIDAY
February 22

Item Link
1 Digital Future Coalition, an advocacy organization.
2 Testimony of Professor Peter Jaszi, on behalf of the Digital Future Coalition, before the US Senate Foreign Relations Committee, 10 September 1998. [And see below.]
3 Jaszi Testimony [above] with added highlighting. [Note 07.2].
4 WIPO Copyright Treaty [text].
5
Added
1998
19 Nov
Stanford University's fair use site, with links to statutes, texts and sites on fair use under copyright.
6
Added
1998
19 Nov
Stanford University Provost Condaleeza Rice's summary of fair use, with special reference to University classes.
Item Link
1 Floyd E. Bloom, "The Rightness of Copyright," Science Editorial, 4 September 1998, p. 1451. [Registered students only].
2 Bachrach et al., "Who Should Own Scientific Papers?". This proposal from the American Association for the Advancement of Science Working Group on the "Transition From Paper" was published in Science, 4 September 1998. [Registered students only].
3
Atlantic Monthly Roundtable [29 September] Round Three on "What is at stake in the battle over intellectual property in the information age?, with contributions by Charles C. Mann, John Perry Barlow, Lawrence Lessig, and Mark Stefik.
4
Added
2002
5 Mar
The Free Software Foundation’s GNU General Public License and their extensive FAQ page.
5
Added
2002
5 Mar
The Open Source Initiative, a capsule history of the open source initiative, and a FAQ Page in which OSI defines itself as “a marketing program for free software.”
6
Mozilla and Netscape Public Licenses.
7
FreeBSD.
8
MySQL.
9
OpenOffice.org.
10
sendmail.org.
Item Link
1 World Intellectual Property Organization
2 Texts of WIPO-administered treaties.
3 WIPO Standing Committee on Information Technologies [SCIT]
4 WIPO SCIT First Plenary, Geneva, 22-26 June 1998 [pdf document] Details on tasks, process, and methods of work.
5
Added
2002
17 Jan
Andy Oram, “Copy Controls and Circumvention: Don’t Get Around Much any More,” O’Reilly Network, 17 January 2002, on the DeCSS lawsuits.


8 Free Speech
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Free speech. Pornography. Filtering. Copyright law. State censorship (China, Germany). Do duties rightly fall on Internet Service Providers?


MONDAY
February 25
WEDNESDAY
February 27
FRIDAY
March 1

Item Link
1 Janelle Brown article on free speech & legislation in Congress which, she argues, carry many of the same consequences as the Communications Decency Act.
2 Electronic Privacy Information Center
3 Internet Free Expression Alliance
4 HR 3783. Child Online Protection Act [Oxley bill].
5 Internet Free Expression Alliance Statement for the Record on Legislative Proposals to Protect Children from Inappropriate Materials on the Internet [11 September 1998], on bills termed by critics CDA II (Computer Decency Act II).
6 Center for Democracy and Technology. Constitutional analysis of HR 3783 [the Oxley bill].
7 Center for Democracy and Technology report: "Regardless Of Frontiers: Protecting The Human Right To Freedom Of Expression On The Global Internet." [15 September 1998]
8
Added
1998
30 Nov
Text of the Child Online Protection Act [October 1998], as posted by EPIC.
9
Added
1998
30 Nov
Text of the Children's Online Privacy Protection Act of 1998, as posted by the Federal Trade Commission. [pdf format]
Item Link
1 Peacefire. "We are a teen run organization which is against censorship of youth on the internet. Our concerns range from self-rating internet systems, to legislation, to internet filtering products."
2 NetNanny, a commercial filtering product.
3 Cybersitter, another commercial product, with filters not only for "sexually oriented" sites but also "radical activities."
4 A TechWeb despatch [29 September 1998] on British filtering plans. [See next entry!]
5 Report titled Converging Technologies: The Consequences For The New Knowledge-Driven Economy, compiled by the Future Unit of Britain's Department of Trade and Industry.
6 Courtesy of the New York Times site, you can access Human Rights Watch, May 1996, v 8 n 2: Silencing the Net: The Threat to Freedom of Expression On-line, prepared by Worldwide, Internet Restrictions are Growing."
1 On copyright law, testimony of Professor Peter Jaszi, on behalf of the Digital Future Coalition, before the US Senate Foreign Relations Committee, 10 September 1998. [And see below.]
2 Jaszi Testimony [above] With Added Comments
Item Link


9 Taxation? Regulation?
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Taxation. Regulation. Jurisdiction. Courts. International agreements. Import-export of digital files?


MONDAY
March 4
WEDNESDAY
March 6
FRIDAY
March 8

Item Link
1 "Why is Taxation an Issue?" [Note 09.1]
2
Added
2000
8 Jan
Information Technology Association of America. Public Policy Report, Fall-Winter 1999. On taxation: Taxation.
3
Added
1998
29 Nov
Jeri Clausing, "Internet Commerce Study Stresses Self-Regulation," The New York Times, 30 November 1998, sets the context for anticipated release of White House report on electronic commerce.
Item Link
1 GFOA Fact Sheet: Internet Taxation. Government Finance Officers Association (GFOA) opposes legislation that fails to preserve the right of state and local governments to enact and administer their own tax laws without intervention from or preemption by federal authorities.
2 US Congressman Christopher Cox (R-California) maintains a Internet Tax Freedom Home Page celebrating his proposal for "keeping Internet access tax-free, stopping governments from imposing special or discriminatory taxes on the 'Net, and keeping foreign tariffs off of Internet commerce."
12 A major White House policy document Framework for Global Electronic Commerce [1 July 1998].
Item Link
1 Bruno Giussani, in The New York Times [17 June 1997, reports that "Germany, Advancing Communications Law, Seeks to Give Internet a Legal Framework." The full text [in English] of the act is at http://www.iid.de/rahmen/iukdge.html.
2 Alan Cowell, in The New York Times [29 May 1998], reports "Ex-Compuserve Head Sentenced in Germany," the bizarre outcome of holding an ISP responsible for pornography posted by subscribers.


10 Design?
DOCUMENT
RELATED SITE
SPECIAL NOTE!
Political design questions. Universal email? Conduct transactions with the state [queries, tax payments, voting, social security, census] by email? [See below] Are the Net and the State compatible? Should there be Web access to all state documents?


MONDAY
March 11
WEDNESDAY
March 13
FRIDAY
[last March 13th]

Item Link
1 The Internet Archive. This group undertakes to collect and store public information on the Web, some of it politically relevant.
2 Description of The Internet Archive.
3 Web Archive 96: the 1996 US Presidential Election materials on the Internet. This project of The Internet Archive was undertaken in conjunction with the Smithsonian Institution. [Not at this URL on 2000.01.08.]
4 Internet Multicasting Service pries data from the US government. [Note 10.1]
Item Link
1 A RAND Corporation study: UNIVERSAL ACCESS TO E-MAIL: Feasbility and Societal Implications. Robert H. Anderson, Tora K. Bikson, Sally Ann Law, Bridger M. Mitchell with Christopher Kedzie, Brent Keltner, Constantijn Panis, Joel Pliskin, Padmanabhan Srinagesh. 1995.
2 Reading list for the course 450CI Community Information Systems, Graduate School of Library and Information Science, University of Illinois at Champaign-Urbana. [3 May 1997]
Item Link
1 Joseph Alper, "Digital Libraries:" Assembling the World's Biggest Library on Your Desktop," Science, 18 September 1998]. [Registered students only.]
2 The 21st Century Project [Gary Chapman] (affiliated with the Lyndon Baines Johnson School of Public Affairs at the University of Texas) reflects its strong interests in community networking, computers in schools, and public policy.
3
Added
1999
26 Nov
Parts 1-3 of David F. Noble's account of Digital Diploma Mills. [Critique of ‘distance education’.]



JOURNALS

Sites & Pages
Item Link
1 Telepolis
2 First Monday



eMAIL LISTS &c.

Sites & Pages
Item Link
1 Subscribe to Declan McCullough’s Politech. Consult its archive.
2 Phil Agre’s Red Rock Eater News Service. To subscribe. To unsubscribe. Agre is associate professor of Library & Information Science at UCLA.
3 Eszter Hargittai’s Eszter’s List, specializing in social and political issues of the Net and Web.
4 Steven Aftergood’s SECRECY NEWS from the Federation of American Scientists' Project on Government Secrecy.
5 Dave Farber’s IP list, with postings relevant to the Net and Web. Farber is Professor of Computer Science at the University of Pennsylvania.


Please forward comments and identify lost links by email to
Bruce D. Larkin.
The URL of this page is http://www.learnworld.com/COURSES/P172/P172.Links.html
Revised 26 February 2003
© 1998-2003 Bruce D. Larkin