Technical and Social Foundations of the Internet Compsci 182s, Spring 2011 Overview overview.1 IP2: Two points of view Inte[llectual|rnet] Pro[perty|tocol] What is the Internet Protocol? Who made it, how did they make it Why has it been successful What is its future, what are the issues What is Intellectual Property? From a US-centric point of view From a WIPO/world point of view Compsci 182s, Spring 2011 Overview overview.2 Internet: Who, What, Where, When What is IPv4? Who created it? IPv6? Who governs the Internet? What is a domain name? What is a cookie? What is the DMCA? What is DNS? ICANN? What is common to: IP, SMTP, BGP, HTTP? Compsci 182s, Spring 2011 Overview overview.3 Technical and Social Foundations What is the Internet? According to … Wikipedia According to Jon Stewart and Ted Stevens A collection of autonomous systems (AS)s Network of networks How do these networks communicate? Country level, company level, … Until 2007, 16-bit AS numbers, now 32 bits Compsci 182s, Spring 2011 Overview overview.4 Communication on the Internet AS level, communication between AS's Send email from Duke to Malaysia visualroute.visualware.com What names and numbers are involved? Duke has ASN 13371 what is an ASN for YouTube? AS communicates with neighbors using BGP Computers on the internet communicate with IP Mail works because of SMTP Compsci 182s, Spring 2011 Overview overview.5 Can the Internet break? Internet Glitch Can Strand You Similar incidents in the past What about this phrasing? The upstream carrier accepted the routing message, and passed it along to other carriers across the world, which started sending all requests for YouTube videos to Pakistan Telecom. Soon, even Internet users in the U.S. were deprived of videos of singing cats and skateboarding dogs for a few hours. Did Pakistan hijack YouTube intentionally? Compsci 182s, Spring 2011 Overview overview.6 Internet Protocol RFC 791, 1981 http://www.ietf.org/rfc/rfc791.txt The internet protocol is specifically limited in scope to provide the functions necessary to deliver a package of bits (an internet datagram) from a source to a destination over an interconnected system of networks. There are no mechanisms to augment end-to-end data reliability, flow control, sequencing, or other services commonly found in host-to-host protocols. The internet protocol can capitalize on the services of its supporting networks to provide various types and qualities of service. Compsci 182s, Spring 2011 Overview overview.7 Internet Protocol RFC 791, 1981 http://www.ietf.org/rfc/rfc791.txt A distinction is made between names, addresses, and routes [4]. A name indicates what we seek. An address indicates where it is. A route indicates how to get there. The internet protocol deals primarily with addresses. Compsci 182s, Spring 2011 Overview overview.8 An address indicates where it is IPv4 address: dotted quad dig www.cnn.com : 157.166.224.25 Why do we use name and not address? Quad part: 0-255, note that 28=256 Why is this a 32-bit address? What’s a bit? Limitations of 32 bits? DNS: map name to address Routers: map address to route Compsci 182s, Spring 2011 Overview overview.9 Internet Addresses and Routing Thinkgeek.com Compsci 182s, Spring 2011 Overview overview.10 Jon Postel Size matters DNS Names Numbers ICANN U.S.A. v World Photo by Irene Fertik, USC News Service. Copyright 1994, USC. Permission granted for free use and distribution, conditioned upon inclusion of the above attribution and copyright notice. Froomkin, Wrong Turn in Cyberspace Compsci 182s, Spring 2011 Overview overview.11 What is IPv6? What is the 6 in IPv6? Is Vint Cerf in on it? When will the Internet stop growing? What did Chicken Little say? Who made up IPv4 and IPv6? Difference between 32 bits and 128 bits? 232 = 4,294,967,296 2128 =340,282,366,920,938,463,463,374,607,431,768,211,456 Compsci 182s, Spring 2011 Overview overview.12 Google and Scale # Queries/day? How does Google make money? What about privacy? Picture of Original Server (Stanford) What about gmail? Compsci 182s, Spring 2011 Overview overview.13 Who are Sergey and Larry? What is google.org? Compsci 182s, Spring 2011 Overview overview.14 Niklas Zennstrom and Janus Friis Kazaa, Skype, Rdio Transforming Society Buy, Sell, Buy, Sue Google phone Compsci 182s, Spring 2011 Overview eBay and Skype August 26, 2010! overview.15 Estimates and Sources How many packages does Fedex ship a day through Memphis, TN? How many packets are sent each day over the Internet? Verifiable? Verifiable? How many cell phone calls made each day? Verifiable? Compsci 182s, Spring 2011 Overview overview.16 Questions Compsci 182s, Spring 2011 Overview overview.17 Bits and Atoms How do send a letter? A phone call? A certified letter? An Internet Packet? I want to watch Hot Tub Time Machine Are there differences? Right now vs. tomorrow, in my living room Netflix, Amazon, Pirate Bay/isohunt, Rapidshare Shipping bits or atoms? Differences? Negroponte's Being Digital http://bit.ly/12xV0f “Worse, a book can go out of print. Digital books never go out of print. They are always there.” overview.18 Compsci 182s, Spring 2011 Overview Bits and Atoms again Amazon, Kindle, 1984 July, 2009 Compsci 182s, Spring 2011 Overview overview.19 Comparing Bits and Atoms Number of atoms in the observable universe Where do you find an answer to this? What about atoms on Earth? Different? Number of IPv6 addresses Where do you find this out? How does compare to IPv4? What is the v in IPv? Compsci 182s, Spring 2011 Overview overview.20 Aside: Akamai for neophytes http://www.akamai.com/html/about/company_history.html http://www.youtube.com/watch?v=d2E3NfcomVI How do cnn.com and facebook.com cope? 15,000 servers; 69 countries; 1,000 networks What was traffic like at 10:00 pm EST? Web/Internet cope with flash crowds? Richmedia, software, e-commerce, … 70%? Of CDN market Customized DNS, overlay network, patented Location, Server, … Compsci 182s, Spring 2011 Overview overview.21 Akamai and other CDNs Referenced in local/cache YouTube article Facebook has and uses CDNs Redirect URL to distributed hosting service Leverages capabilities in HTTP (what's the P?) Largest photo-site on the web Custom and commercial CDNs Patent: Limelight law suit How do lawsuits work? Compsci 182s, Spring 2011 Overview overview.22 IP: Intellectual Property Copyright, Patent, Trade Secret: IP IP term is pervasive, so we will use it Differences from "real" property? What does IP mean to Cisco employee? In US, and most other countries, IP similar Copyright: fixed/expressed, not an idea Patent: idea/invention, non-obvious, useful Trade-secret: not-disclosed, secret Compsci 182s, Spring 2011 Overview overview.23 Patents and the Internet Internet built on open standards and source What are open standards? Why? cf: patented, licensed, proprietary standards? Is IP2 an oxymoron with Internet’s start? Why was there a change (e.g., patents)? Court system and economics/business Why does the world change? Compsci 182s, Spring 2011 Overview overview.24 Key Patent Aspects US: First to File Provisional Patent (protect invention) $1500 provisional to $15K full (legal fees) Lasts 20 years from date of filing • Requires paying “maintenance fees” Non-obvious to one skilled-in-the-art Must examine prior art, who must? Must be useful, must exist! No speculative patents Compsci 182s, Spring 2011 Overview overview.25 Why patent something? Effectively grants monopoly: invention/idea Not expression as copyright, but novel concept Different protection than trade secret • If it stays secret, good forever, but once out, gone! Defensive patent Keep invention accessible/available Lessen concerns about infringement More common with software, esp. Open Source Compsci 182s, Spring 2011 Overview overview.26 Software Patent: Brief History State Street Bank & Trust, 1998 Software running mutual funds State Street asks to invalidate patent Patent upheld: useful, concrete and tangible result should be considered patentable. Beginning of huge number of software patents being filed Prior to this no algorithms patented Compsci 182s, Spring 2011 Overview overview.27 Amazon One-Click What does patent cover? How to find this? USPTO online, Google Patents Essentially store credit card Sues B&N 23 days/issue Some claims invalidated What’s a claim? Compsci 182s, Spring 2011 Overview overview.28 Patents: good, bad, ugly, other? USPTO examiners not always “expert” Defensive patenting: Red Hat, IBM, Sun Procure patents, no enforcement, why? Patent trolls as business model Are they skilled-in-the-art? Getting better, but… Buy patents, not “in business” per se http://bit.ly/bd73tt http://pubpat.org/ What are the stories here? Compsci 182s, Spring 2011 Overview overview.29 test.com, Patent 6513042 One may appreciate that although the invention has been shown and described with respect to a certain preferred embodiment, obvious and/or equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification. The present invention includes all equivalent alterations and modifications and is limited only by the scope of the following claims. Compsci 182s, Spring 2011 Overview overview.30 Patent issues Repeal: prior art ignored License to infringers, MP3 Robert Silvers: photo mosaic Law/Lawyers can intervene For free!: H.264: http://bit.ly/ajs4EP Sue infringers Google query: patent suit. Settled or in court Compsci 182s, Spring 2011 Overview overview.31 Questions Compsci 182s, Spring 2011 Overview overview.32 Copyright Infringement? ice ice baby (youtube) Under Pressure (youtube) Compsci 182s, Spring 2011 Overview overview.33 Copyright, DMCA, Intellectual Property Compsci 182s, Spring 2011 Overview overview.34 Article I, Section 8 To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries. Copyright and patent From Constitution to US Code (section??) Can’t copyright ideas Is this class copyrighted? Notes? Lecture? Who “owns” the rights, does it matter? Compsci 182s, Spring 2011 Overview overview.35 Copyright Basics What can by copyrighted? US Code Title 17, Section 102 Ideas? No. Fixed in tangible medium? Yes. https://www.eff.org/cases/electric-slide-litigation Software and computer programs, facts and data, parodies and copies, … What about Fair Use? What about infringement? Compsci 182s, Spring 2011 Overview overview.36 From IP to IP via copyright Intellectual Property What does this mean? Can we own it? when Jefferson and his fellow creatures of the Enlightenment designed the system that became American copyright law, their primary objective was assuring the widespread distribution of thought, not profit. Profit was the fuel that would carry ideas into the libraries and minds of their new republic. Libraries would purchase books, thus rewarding the authors for their work in assembling ideas; these ideas, otherwise "incapable of confinement," would then become freely available to the public. But what is the role of libraries in the absence of books? How does society now pay for the distribution of ideas if not by charging for the ideas themselves? Economy of Ideas Compsci 182s, Spring 2011 Overview overview.37 Software, Copyright (towards Patents) Software the code v. software the program Competitor’s viewpoint, user’s viewpoint Tangible medium when written • What about when running on a machine? What a program does, rather than the code Whelan v Jaslow 1985/6 Lotus v Borland (1995) • Supreme Court goes 4/4, look and feel not copyrighted More cases that change interpretation of laws Compsci 182s, Spring 2011 Overview overview.38 Facts not subject to copyright http://mlb.mlb.com/mediacenter/ http://bit.ly/bDnKry Rotisserie Baseball? http://bit.ly/a3d1Bc Since facts do not owe their origin to an act of authorship, they are not original, and thus are not copyrightable. Feist v Rural (Wikipedia and others) Compsci 182s, Spring 2011 Overview overview.39 Sunglasses or recipes copyrighted? http://amzn.to/aTtcTy $189.99 at Amazon http://bit.ly/9kBXsp $9.99 at … Molten Chocolate Cakes Recipe by Jean-Georges Vongerichten Compsci 182s, Spring 2011 Overview overview.40 Copyrights and Licensing Most software is licensed rather than sold Why isn’t it sold? First-sale doctrine Are EULAs valid? According to whom? Can I back up my software? DVD/CD? Tale of three logos Linux Compsci 182s, Spring 2011 Overview Windows SQlite overview.41 Toward Open Source http://tinyurl.com/yqfcq (Groklaw) Copyright law, guarantees protections Exclusive right to copy Exclusive right to create derivative works Exclusive right to distribute work Exclusive right to perform/display work Fair use exceptions, First Amendment tension, facts and ideas vs their expression Compsci 182s, Spring 2011 Overview overview.42 Fair use, face-to-face education Educational Exceptions What about YouTube videos? What about Social Network Torrent? Clip from Ferris Bueller? Four prongs copy/use copyrighted work: (1) For commercial or non-profit use (2) Nature of copyrighted work, e.g., original? (3) How much of work used (4) Effect on market or value Compsci 182s, Spring 2011 Overview overview.43 Digital Millennium Copyright Act,DMCA Copyright law of United States DMCA I: Rules against circumvention Passed in 1998, general industry support What's different about digital copyright? Can’t try to bypass DRM, CSS, … What about Bittorrent, Rapidshare, Elliott’s server, Youtube DMCA II: Safe Harbor provisions Protect online service providers (blogs?) Compsci 182s, Spring 2011 Overview overview.44 DMCA: Chilling Effects (according to?) Anti-circumvention (1201) aspects of DMCA Prevents legitimate back-up/archive Fair use “under siege” Inhibits free speech Impedes innovation, science, invention, … Despite research exceptions What happens on violation or threat of? Review and comments every three years • Why Library of Congress? Compsci 182s, Spring 2011 Overview overview.45 DMCA: Safe Harbor DMCA saved the web (2.0) Safe harbor provision (512) is indispensable No knowledge of offense! Take down notices Counter notice Eligible for safe-harbor? If I post a video to YouTube that infringes… Who gets in trouble? Compsci 182s, Spring 2011 Overview overview.46 DMCA and chilling effects Dmitry Sklyarov, Elcomsoft, 2001 Ed Felten, SDMI, 2001 Arrested? Conference? RIAA urges reconsideration Princeton Profs anti-circumvention song Alex Halderman, Sony rootkit Ben Edelman and CIPA (children’s internet protection act) Research, tools, distribution, “just sue” Compsci 182s, Spring 2011 Overview overview.47 Jon Lech Johansen (DVD Jon) DeCSS How does DVD encryption work? What is GPL issue with original code? Brute force attack on 40-bit key beyond DeCSS Apple, iTunes, Fairplay, DRM Digital Rights Management iPhone Hacker Jon Compsci 182s, Spring 2011 Overview overview.48 Copyright infringement in a nutshell Vicarious infringement Contributory infringement Ability to control users, financial benefit Liability without knowledge, Napster? You know it, you did it (abet piracy) Host forum for others to post What about DMCA safe harbor provisions? Compsci 182s, Spring 2011 Overview overview.49 Questions Compsci 182s, Spring 2011 Overview overview.50 Background on Bits Bit is a “binary” “digit” What’s binary? What’s a digit? It’s all zeros and ones in computers on Internet? What about MP4, MP3, .aac, .jpg, .pdf, … Compsci 182s, Spring 2011 Overview overview.51 Scale and Bits: Binary Digits Number of IPv4, 32-bit addresses? If you use a 32-bit encryption key, and computers can test one billion keys/second How many 33-bit addresses? # seconds to break with brute force? If we add 1 bit, how many seconds? # seconds for 128-bit encryption key? Skype uses 256-bit encryption key!? Compsci 182s, Spring 2011 Overview overview.52 Can we double every two years? Explaining Moore’s Law: http://www.youtube.com/watch?v=bLSMn0cNWAw http://www.youtube.com/watch?v=D3dKbq5AXz8 Compsci 182s, Spring 2011 Overview overview.53 Moore’s Law meets Hurley's Law See Wikipedia entry for complete Info http://en.wikipedia.org/wiki/Moore's_law All things digital, Sept 16, 2008: “Hurley’s Law: Like Moore’s Law, but With Doltish Video Clips” http://tinyurl.com/6n7kqv 13 hrs/min in 2008 http://bit.ly/cw9DNy 35 hrs/min in 2010 “Over the next decade, people will be at the center of their video and media experience. More and more consumers will become creators. We will continue to help give people unlimited options and access to information, and the world will be a smaller place.” http://googleblog.blogspot.com/2008/09/future-of-online-video.html Compsci 182s, Spring 2011 Overview overview.54 Questions Compsci 182s, Spring 2011 Overview overview.55 Compsci 182s, Spring 2011 Overview overview.56 Internet Censorship Compsci 182s, Spring 2011 Overview overview.57 Skype, TOM-Skype, China http://skype.com http://skype.tom.com http://www.nartv.org/2008/10/01/breaching-trust-tom-skype/ Our investigation reveals troubling security and privacy breaches affecting TOMSkype—the Chinese version of the popular voice and text chat software Skype. It also raises troubling questions regarding how these practices are related to the Government of China’s censorship and surveillance policies. Compsci 182s, Spring 2011 Overview overview.58 Internet (and other) Censorship What is censorship? Does venue matter? Cigarette commercials on TV, profanity, military and national-security documents, Google Earth images, Super Bowl commercials, What about Internet censorship? Nationwide: where and why School-wide: where and why Family-wide: where and why Compsci 182s, Spring 2011 Overview overview.59 “Censorship” Internet laws in the US Communications Decency Act: ACLU v Reno “offensive” material off-limits to minors 1997 SCOTUS, unanimously unconstitutional. Section 230 survives: blogger/ISP immunity Children’s Internet Protection Act: CIPA Schools, libraries must install and use filtering software (e-rate: Duke? Durham?...) Affirmed by SCOTUS in 2003, filters must be “disableable”, though not by minors Compsci 182s, Spring 2011 Overview overview.60 Censorship in Australia (Denmark,…) Blacklists for ISPs at the country level Domain name censorship Wikileaks hosts site, threatened with fines Started with good intentions (perhaps), but … How does a domain name get on the list? Off? Compsci 182s, Spring 2011 Overview overview.61 Internet/Web Censorship Blacklists, client, ISP, country, other? How are these implemented? Possible to bypass with 79.141.34.22 Counteract with whitelist? Can we block, filter, or examine IP address? Where is the IP address? • ISP-wide, bottlenecks, technologically feasible? What about “deep packet inspection”? Compsci 182s, Spring 2011 Overview overview.62 Firewalls and Proxies Golden Shield Personal/Corporate Firewall Great Firewall of China Atlantic on firewall.cn IP packet layer, Application layer Stop or allow, based on … Port numbers used for granularity Proxy server For firewall, for content, for censorship? Compsci 182s, Spring 2011 Overview overview.63 Software filters, what do they do? (2002) Peacefire, open access for net gen.http://www.religioustolerance.org/cyberpat3.htm http://www.peacefire.org/BaitAndSwitch/ Does where a message comes from affect the status of whether it’s ok? China: Green Dam/Youth Escort Uproar 7/09-8/09!: all laptops in China must have filtering software installed! preliminary Green Dam analysis Compsci 182s, Spring 2011 Overview overview.64 http://opennet.net Straightforward state regulation of speech without technological components can, of course, result in censorship; our work here is designed to focus on regulation that, when implemented through code, seems more a force of nature than an exercise of political or physical power. Thus it is entirely possible that a state that does not require or inspire technical filtering can possess a set of regulations or social norms or market factors that render its information environment less free than a state with fairly extensive technical filtering. Compsci 182s, Spring 2011 Overview overview.65 Cyber-dissidents and Bloggers Unlike some hosting companies which become accomplices to governments in repressive countries by surrendering their bloggers’ personal data, we undertake never to provide any information about your identity as long as all you are doing is exercise your right to free expression. Reporters sans Frontièreshttp://www.rsf.org/ Compsci 182s, Spring 2011 Overview overview.66 Laws in Other Countries Compsci 182s, Spring 2011 Overview overview.67 Yahoo!, France, Nazi Memorabilia Ligue contre le racisme et l'antisémitisme et Union des étudiants juifs de France c. Yahoo! Inc. et Société Yahoo! France (LICRA v. Yahoo!) http://en.wikipedia.org/wiki/LICRA_v._Yahoo! http://www.lapres.net/yahweb.html French student groups sue Yahoo! Sue in US, take down material Violation of French law, but what about US First Amendment rights? Court case complicated by “ripeness” Compsci 182s, Spring 2011 Overview overview.68 Turkey, YouTube, Ataturk YouTube hosts videos deemed “insulting”, so Turkey orders their removal Remove in Turkey Remove worldwide Ban YouTube in Turkey http://arama.hurriyet.com.tr/arsivnews.aspx?id=10441126 Other countries and YouTube Why? How? Compsci 182s, Spring 2011 Overview overview.69 Adnan Oktar Adnan Oktar is a prominent Turkish intellectual. Completely devoted to moral values and dedicated to communicating the sacred values he cherishes to other people, http://www.harunyahya.com/theauthor.php A Muslim creationist has succeeded in having Richard Dawkins’s website banned in Turkey, after complaining that its atheist content was blasphemous. (2008) http://tinyurl.com/5d6bv5 Boston Globe, October 2009 Compsci 182s, Spring 2011 Overview overview.70 What’s wrong with this picture? Compsci 182s, Spring 2011 Overview overview.71 Google buys … Postini: web, email security, malware filters DoubleClick: online advertising, rich media 2008/$3.1B advertising juggernaut? On2: video codecs, Theora, others 2007/$625M, malware filtering by Google Oct 2009, Postini Fails 2009/$106M, video is everywhere? Recaptcha: web security? OCR? Compsci 182s, Spring 2011 Overview overview.72 Does Google Have Too Much Power? Google's Gatekeepers Nicole Wong The Decider Google as Monopoly Harbinger? Compsci 182s, Spring 2011 Overview overview.73 www.globalnetworkinitiative.org EFF, Berkman Center, CDT, Human Rights Watch Google, Microsoft, Yahoo kld.com, domini.com, bostoncommonasset.com,… Who are these stakeholders? What are their goals? …a multi-stakeholder group of companies, civil society organizations (including human rights and press freedom groups), investors and academics spent two years negotiating and creating a collaborative approach to protect and advance freedom of expression and privacy in the ICT sector, and have formed an Initiative to take this work forward. Compsci 182s, Spring 2011 Overview overview.74 Legal v Technical: Courts of Law Perfect 10 v everyone Blizzard v BNETD and MDY Mostly copyright: fair-use, infringement Copyright, licensing, section 117 Blumenthal v Drudge and AOL Who is liable for libel online? Compsci 182s, Spring 2011 Overview overview.75 Perfect 10 v Google (and others) Thumbnails “transformative” History of Perfect 10 Anatomy of Google results Who is sued and why? Who files Amicus Briefs? Compsci 182s, Spring 2011 Overview overview.76 Blizzard v BNETD and MDY Blizzard: $100Million/month on WOW MMO, how is it played? Licensed? Purchased Network and updates (currently Bittorrent!) BNETD, open source, network alternative MDY, “Glider”, autoplayer Warden as either spyware or protection Tremendous implications if Blizzard wins Compsci 182s, Spring 2011 Overview overview.77 Blumenthal v Drudge and AOL Drudge alleges spousal abuse Blumenthal sues both Retracts “immediately” Why is AOL dismissed? What recourse here? Good Samaritan clause • Section 230 of CDA Compsci 182s, Spring 2011 Overview overview.78