Samir Saran explains India's position in advance of the 2014 ITU conference, arguing that India believes that the ITU has a role to play in Internet governance, although Delhi does not oppose a multistakeholder approach.
Christian Schaller and Johannes Thimm analyze Germany's policy priorities at the ITU conference in Busan, South Korea, arguing that Germany will go to Busan opposed to the expansion of the ITU mandate, but in search of ways to increase the ITU's technical capabilities to broaden access.
Adam Segal explains the U.S. approach at the ITU Plenipotentiary Conference in Busan, South Korea, where the United States is looking to defend its approach to Internet governance. Washington and its allies favor the "multistakeholder" model: a bottom-up policy process that includes organizations representing technical experts, governments, businesses, civil society, and individual users.
Congressional Representatives Raúl Grijalva and Keith Ellison sent a letter to Federal Communications Commission Chair Tom Wheeler, before a May 15, 2014 FCC meeting to propose new Internet speed and pricing policies. The cosigners of the letter support preservation of Net Neutrality and equal access to the Internet, to prevent companies from paying higher fees to Internet service providers and in turn having their online content favored. The FCC voted on February 26, 2015, on rules governing regulation of U.S. broadband networks.
Brazilian Internet Steering Committee and /1Net organized NETmundial: Global Multistakeholder Meeting on the Future of Internet Governance, which was attended by ministerial representatives of Argentina, Brazil, France, Ghana, Germany, India, Indonesia, South Africa, South Korea, Tunisia, Turkey and United States of America, members of the European Commission, and members of the UN's International Telecommunication Union (ITU) and Department of Economic and Social Affairs (DESA). Held April 23-24, 2014, the conference focused on creating principles of Internet governance to extend ICANN's work.
Following the revelation of USAID's deployment of a secret Twitter-inspired communications platform in Cuba, Julia Sweig reflects, in her column, on U.S.-Cuba relations and on the loose definition of democracy-promotion in foreign policy.
How can the United States protect cyberspace "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
This meeting of the Roundtable Series on Digital Policy discusses U.S. efforts to work with countries in the developing world on increasing their connectivity, content, and capacity to participate in global efforts to safeguard the open Internet.
Authors: Steven Tepp, Kal Raustiala, and Christopher Sprigman
In their essay "Fake It Till You Make It" (July/August 2013), Kal Raustiala and Christopher Sprigman urged the United States to "relax" when it comes to the flagrant disregard for intellectual property laws in China.
"'Google believes very strongly in a free internet. The mainland just passed the law about the 500-reposts thing. Then you will definitely think about it before you write. It's a problem, (it) means your voice is not fully heard,' said Schmidt."
Earlier this month, Taiwanese Internet advocacy groups succeeded in shutting down an anti-piracy bill similar to the U.S. Stop Online Piracy Act (SOPA). Opposition to recent legislation shows that interest in internet and press freedoms remains strong.
The G8 leaders met in the U.K. during June 17–18, 2013, for their thirty-nineth summit. They released a joint communique, the Lough Erne Declaration on private enterprise responsibilities, and signed the Open Data Charter, which covers the regular publication of government data from a variety of departments.
Speakers: John D. Negroponte, Samuel J. Palmisano, and Adam Segal Introductory Speaker: Anya Schmemann Presider: Thomas Gjelten
The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks.
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
Koblentz argues that the United States should work with other nuclear-armed states to manage threats to nuclear stability in the near term and establish processes for multilateral arms control efforts over the longer term.
The authors argue that it is essential to begin working now to expand and establish rules and norms governing armed drones, thereby creating standards of behavior that other countries will be more likely to follow.
Learn more about CFR’s mission and its work over the past year in the 2014 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »