Internet DRAFT - draft-hill-itr-non-accession-harmful
draft-hill-itr-non-accession-harmful
General Area R. Hill
Internet-Draft Hill & Associates
Intended status: Informational
Expires: June 17, 2014 December 17, 2013
"Non Accession to the ITRs Considered Harmful"
draft-hill-itr-non-accession-harmful-01.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on June 17, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is based on a more detailed legal analysis [Hill-2013]
and the author wishes to acknowledge Oxford University Press for
their permission to publish this summarized version. The full
version is at http://ijlit.oxfordjournals.org/content/early/2013/06/
10/ijlit.eat008.full?ijkey=otqkCXVOAelJUPy&keytype=ref
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Hill Expires June 17, 2014 [Page 1]
Internet-Draft Non Accession Harmful December 2013
Abstract
One of the treaties administered by the International
Telecommunications Union is the International Telecommunications
Regulations (ITRs), whose purpose is to promote the development of
telecommunication services. The 1988 version of the ITRs opened the
way for privatisation, liberalization, and the growth of the Internet
and mobile networks. [Hill-2013a, p. 8] Given the subsequent
significant structural and technological changes, the ITU Member
States agreed to meet in 2012 to revise the ITRs. While consensus
was found on an overwhelming majority of the treaty text, some
provisions proved to be controversial, leading to a split in the
membership and sharp criticism of selected provisions.
As a result, some ITU Member States did not sign the treaty. This
document analyses that criticism and attempts to place it in context;
it identifies problems that may arise if states to not accede
to the treaty, and suggests a way forward, concluding that not
acceding may have undesirable results for the citizens of
non-signatory countries and for interoperability in general.
Hill Expires June 17, 2014 [Page 2]
Internet-Draft Non Accession Harmful December 2013
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. The 2012 ITRs . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Criticism of the 2012 ITRs . . . . . . . . . . . . . . . . . 5
4. Analysis of the Criticism . . . . . . . . . . . . . . . . . . 5
4.1. Analysis of Criticism of Specific Provisions . . . . . . . 6
5. A Way Forward? . . . . . . . . . . . . . . . . . . . 7
6. IANA considerations . . . . . . . . . . . . . . . . . . . . . 8
7. Security considerations . . . . . . . . . . . . . . . . . . . 8
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8
9. Informative references . . . . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
Hill Expires June 17, 2014 [Page 3]
Internet-Draft Non Accession Harmful December 2013
1. Introduction
The World Conference on International Telecommunications (WCIT-12)
was convened in December 2012 at the request of the ITU members in
order to revise the International Telecommunication Regulations
(ITRs), which had been agreed in 1988 and which opened the way for
the privatisation and liberalization that has since characterized the
telecommunications sector, paving the way for the growth of the
Internet. [WCIT-12], [ITRs-2012]
The purpose of the ITRs is to establish general principles which
relate to the provision and operation of international
telecommunication services offered to the public as well as to the
underlying international telecommunication transport means used to
provide such services. And this with a view to attaining the
purposes of the International Telecommunication Union in promoting
the development of telecommunication services and their most
efficient operation while harmonizing the development of facilities
for worldwide telecommunications.
The ITU Member States felt that it was necessary to revise the ITRs
in light of the significant changes structural and technological
changes that have taken place since 1988, in particular
privatisation, liberalization, and the growth of mobile and IP-based
networks. [Hill-2013a]
Unlike previous ITU conference, the ITU membership failed to reach
consensus, with the result that the treaty agreed at WCIT was not
signed by all the states present and having the right to sign: 89
signed and 55 did not. Countries that did not sign the ITR may
accede to them at any time.
A refusal by some countries to accede to the new ITRs could deprive
their citizens of certain benefits (such as transparency of roaming
prices, prevention of numbering misuse, transmission of calling party
identification, improved accessibility for people with disabilities,
and best practices regarding energy efficiency and e-waste).
Further, non-uniform implementation could create difficulties for
companies operating worldwide, if different regulatory regimes
emerge.
In the limit, refusal to implement the new ITRs might result in the
development of non-harmonized national practices which might lead to
an undesired fragmentation of the Internet.
These undesirable consequences can be avoided if all countries accede
to the ITRs with the understanding that the controversial clauses do
not in fact have the negative effects which have been attributed to
them by some commentators.
Hill Expires June 17, 2014 [Page 4]
Internet-Draft Non Accession Harmful December 2013
2. The 2012 ITRs
Much of the 1988 ITRs were retained with some editorial revisions to
bring them up to date. In particular, the article on charging and
accounting was significantly streamlined and brought into alignment
with modern practices. In addition, new provisions were added to
prevent misuse of telephone numbers, to ensure transmission of
calling line identification, to ensure transparency of international
roaming prices, to improve network security, to combat spam, to
improve energy-efficiency and reduce e-waste, and to facilitate use
of telecommunications by people with disabilities. [ITRs-2012]
Most of the treaty text was not controversial, but certain specific
provisions of the treaty were controversial. Those provisions are
contained in 6 paragraphs out of a total of 77 paragraphs that
comprise the main text of the treaty. One Resolution adopted by
WCIT was also controversial. If that is included, then the
controversial text comprises less than 2 pages out of the total 24
pages approved at the conference. [Hill-2013]
3. Criticism of the 2012 ITRs
It has been said that the WCIT outcomes establish a new
international regulatory regime for the Internet and give new powers
to the ITU. This new regime threatens the current multi-stakeholder
model for Internet governance which has proven its worth, and it
threatens economic growth and freedom of speech around the world.
[EC-2012], [US-2013], [New-2013]
In particular a provision in the Preamble of the ITRs creates new
rights for states (which threaten established individual rights);
new articles on security and spam invite governments to take
content-based action which could result in regulation of speech on
the Internet; a new Resolution represents a direct extension of
ITU's role and scope into the Internet and shifts the emphasis from
community and consensus to centralization through government action.
4. Analysis of the Criticism
The criticism of the 2012 ITRs appears to be based on a superficial
and out-of-context reading of the provisions in question. When
analysed correctly from the legal point of view, it can be seen that
the new provision in the Preamble does not conflict with existing
rights of individuals or of states; that the new provisions on
security and spam cannot be understood to related to content; and
that the new Resolution does not in any way expand ITU's role and
scope, while it does recognize the multi-stakeholder model agreed at
the World Summit on the Information Society (WSIS). [Hill-2013]
Hill Expires June 17, 2014 [Page 5]
Internet-Draft Non Accession Harmful December 2013
Thus it is incorrect to conclude that the WCIT outcomes establish a
new international regulatory regime for the Internet and give new
powers to the ITU. Nor do they threaten the current
multi-stakeholder model for Internet governance or free speech.
4.1. Analysis of Criticism of Specific Provisions
Regarding criticism of specific provisions [Hill-2013]:
* The new provision in the Preamble does not create any additional
rights or obligations, it merely recognizes the rights and
obligations that already existed under the Constitution, see in
particular its Article 35.
* New language in Article 1 regarding "authorized operating
agencies" merely aligns the ITRs with the ITU Constitution (which
has precedence over the ITRs) and thus does not extend the scope
of the ITRs.
* Article 5A on security and 5B on spam must be interpreted in light
of Article 1, which defines the scope of the treaty and states
that it does not address the content-related aspects of
telecommunications. Since the ITRs do not address content, those
articles cannot be seen to be addressing content. Thus, those
articles are about measures that do not depend on content. There
are such security measures and such measures to combat spam.
* Those who argue, in the alternative, that there are no possible
non-content-related measures regarding security and spam are in
effect arguing that the two articles are inoperative, because
Article 1 (Purpose and Scope) excludes content-related aspects and
prevails over Articles 5A and 5B. The usual approach to such a
situation would be to sign the treaty with a reservation of the
form "we will not apply Article 5B because we believe that it is
inconsistent with the Purpose and Scope".
* In any case, by virtue of the "no content" provision of Article 1,
no country could invoke the ITRs as justification for imposing
content-filtering. That is, since content is outside the scope of
the ITRs, so is content-filtering. Of course a country might impose
content-filtering, but it could not invoke the ITRs as a legal
basis for doing so. That is, the "necessary measures" referred to
in Article 5B cannot be understood to include content-filtering.
* Paradoxically, those who refuse to implement Article 5B on the
grounds that it is related to content are in effect arguing against
limitations on measures to counter spam. Indeed at present there
aren't (to the author's knowledge) any international treaties that
limit what states can do regarding spam, apart from obligations
relating to human rights. If it is understood that Article 5B
does not relate to content, then that article puts an obligation on
states not to deal with the content-related aspects of spam. That
is a significant restriction. Those who state that Article 5B
applies to content are in effect denying the restriction and opting
for the status quo, where there are no restrictions (apart from
human rights) regarding how to deal with spam. And they are in
Hill Expires June 17, 2014 [Page 6]
Internet-Draft Non Accession Harmful December 2013
effect creating a situation where there is no basis in
international law (apart from human rights) to complain regarding
anti-spam measures. Similar considerations apply regarding Article
5A on security: refusal to accept this article is tantamount to
refusing to accept restrictions on security measures (apart from
those arising out of human rights obligations).
* Articles 5A and 5B call for cooperation amongst ITU Member States,
a call which also appears in WTSA Resolutions 50 and 52. Many
countries have initiatives regarding security and spam. Presumably
it would be desirable for countries to cooperate to adopt "best
practices" in these area. That is, practices that clearly do not
impinge on human rights and that respect due process. So it would
appear that the call for cooperation is positive, because it
should make it less likely that some country would (perhaps
unwittingly) adopt inappropriate measures. That is, the call for
cooperation appears to make it more likely that security measures
would follow the best-practices models that are generally agreed.
* The operative part of Resolution 3 invites ITU Member States to
discuss Internet-related technical, development and public-policy
issues within the mandate of ITU at various ITU forums; to engage
with all their stakeholders in this regard. And it instructs the
Secretary-General of ITU to continue to take the necessary steps
for ITU to play an active and constructive role in the development
of broadband and the multi-stakeholder model of the Internet as
expressed in paragraph 35 of the Tunis Agenda; and to support the
participation of Member States and all other stakeholders, as
appropriate, in the activities of ITU in this regard. The
Resolution cannot (and does not) expand ITU's role and scope, and
it cannot (and does not) modify the WSIS outcomes. It does not
shift the emphasis from the multi-stakeholder model towards
top-down government action, on the contrary, it promotes
multi-stakeholder consultations.
5. A Way Forward?
A refusal by some countries to implement the new ITRs could deprive
their citizens of certain benefits (such as transparency of roaming
prices, prevention of numbering misuse, transmission of calling party
identification, improved accessibility for people with disabilities,
and best practices regarding energy efficiency and e-waste).
[Hill-2013]
Further, non-uniform implementation could create difficulties for
companies operating worldwide, if different regulatory regimes
emerge.
In the limit, refusal to implement the new ITRs might result in the
development on non-harmonized national practices which might lead to
an undesired fragmentation of the Internet. [LS-2013]
Hill Expires June 17, 2014 [Page 7]
Internet-Draft Non Accession Harmful December 2013
There are various scenarios regarding what could happen in the future:
* Most countries agree to be bound by the ITRs
* Most countries do not agree to be bound by the ITRs
* Most countries implement the ITRs in a non-controversial manner:
- Recognize that Preamble does not prevent suspension of services
or otherwise modify existing rights and obligations
- Recognize that there is no extension of the covered entities or
of the scope
- Recognize that the security and spam provisions do not relate to
content
- Recognize that Resolution 3 does not change the mandate of the ITU
Implementation of the 2012 ITRs in a non-controversial manner might
appear to be the solution that is most consistent with a legal
analysis of the treaty and the solution that is most likely to avoid
undesirable consequences. [Hill-2013]
6. IANA considerations
There are no requests for IANA allocation of code-points in this
document, nor are any other IANA actions required.
7. Security considerations
The uncoordinated development of networks poses a risk of harm to
the Internet. A persisting split between signatories and non-
signatories of the ITRs could pose such a risk.[Raymond-2013]
Indeed, the recently revealed United States PRISM program
[Savage-2013] is an example of unilateral surveillance of foreign
Internet communications that some [ISOC-2013] consider inappropriate.
And surely most would consider the Iranian control of Internet
[Musil-2013] to be inappropriate.
At the 88th IETF meeting, there was consensus that steps should be
taken to counter pervasive surveillance (such as
encryption). [Housley-2013] However, such technical means can only
be implemented if they are legally allowed, thus governments should
agree to allow such steps.
8. Acknowledgments
This document is based on a more detailed legal analysis [Hill-2013]
and the author wishes to acknowledge Oxford University Press for
their permission to publish this summarized version. This summarized
version was presented at the GiGaNet workshop in Geneva on "The
global governance of the Internet: Intergovernmentalism,
multistakeholderism and networks", 17-18 May 2013.
Hill Expires June 17, 2013 [Page 8]
Internet-Draft Non Accession Harmful December 2013
9. Informative references
[EC-2012] European Commission, "No change to telecoms and internet
governance - EU Member States amongst dozens not signing
proposed new International Telecommunications Regulations
(ITR) Treaty, remain 100% committed to open internet"
(memo 12/992 of 14/12/2012), http://europa.eu/rapid/
press-release_MEMO-12-991_en.htm
[Hill-2013]
Richard Hill, "WCIT: failure or success, impasse or way
forward", International Journal of Law and Information
Technology, vol. 21, no. 3, p. 313,
http://ijlit.oxfordjournals.org/content/21/3/313
[Hill-2013a]
Richard Hill, The New International Telecommunication
Regulations and the Internet: A Commentary and Legislative
History (Schulthess/Springer),
http://www.springer.com/law/international/book/
978-3-642-45415-8
[Housley-2013]
Russ Housley, "IETF88 Technical Plenary Hums", E-Mail.
https://www.ietf.org/mail-archive/web/ietf/current/
msg83857.html
[ISOC-2013]
Internet Society, "Statement on the Importance of Open
Global Dialogue Regarding Online Privacy", 12 June 2013,
http://www.internetsociety.org/news/internet-society-
statement-importance-open-global-dialogue-regarding-
online-privacy
[ITRs-2012]
ITU, "International Telecommunication Regulations",
http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-
12.pdf
[LS-2013] L.S., "Internet Regulation: A digital cold war?", The
Economist, http://www.economist.com/blogs/babbage/2012/
12/internet-regulation
[Musil-2013]
Steven Musil, "Iran develops software to control social
networks", 6 January 2013, CNET, http://news.cnet.com/8301
-1023_3-57562295-93/iran-develops-software-to-control-
access-to-social-networks/
Hill Expires June 17, 2013 [Page 9]
Internet-Draft Non Accession Harmful December 2013
[New-2013] William New, "European Commission VP Kroes Urges Open
Internet, Prods Copyright Owners", Intellectual Property
Watch, 21 March 2013, <http://www.ip-watch.org/2013/03/21/
european-commission-vp-kroes-urges-open-internet-prods-
copyright-owners
[Raymond-2013]
Raymond, M. and Smith, G., 2013. "Reimagining the
Internet: The Need for a High-level Strategic Vision for
Internet Governance," Centre for International Governance
Innovation, Internet Governance Papers, Paper No. 1, July
2013, http://www.cigionline.org/sites/default/files/
no1_4.pdf
[Savage-2013]
Charlie Savage, Edward Wyatt, and Peter Baker, "U.S.
Confirms that it Gathers Online Data Overseas", The New
York Times, June 6, 2013, http://www.nytimes.com/2013/06/
07/us/nsa-verizon-calls.html?_r=0
[US-2013] Witness statements made at the 5 February 2013 Hearing
"Fighting for Internet Freedom, Dubai and Beyond", U.S.
House of Representatives Committee on Energy and
Commerce's Subcommittee on Communications and Technology
http://energycommerce.house.gov/hearing/fighting-for-
internet-freedom-dubai-and-beyond
[WCIT-12] ITU "World Conference on International Telecommunications"
http://www.itu.int/wcit. See in particular the
presentation http://www.itu.int/en/wcit-12/Documents/
wcit-myth-buster-en.pptx
Authors' Addresses
Richard Hill
Hill & Associates
Geneva, Switzerland
Phone:
Fax:
Email: rhill@hill-a.ch
URI: www.hill-a.ch
Hill Expires June 17, 2013 [Page 10]