Home / Blogs

Precrime Regulation of Internet Innovation

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

In the sci-fi movie Minority Report, a ‘precrime’ police unit relies on the visions of psychics to predict future crimes, then arrests the potential perpetrators before they do anything wrong. In the world of Internet governance, the future is now, as regulators want online services to predict and prevent safety threats before they actually occur.

Online child safety is a hot topic at the Internet Governance Forum (IGF) last week in Lithuania, where I attended a workshop on those new location-based services that allow users to publish their mobile phone location info to their parents or social network pages (think: Foursquare, Loopt, and Facebook Places).

According to some privacy advocates and lawmakers, the precrime problem here is that location data might be seen by someone with bad intentions. In the name of protecting children, panelists here favor a policy framework that would require innovators to clear new location-based services with regulators before making them available to users.

Think of the irony with this regulatory approach. Lawmakers are not likely to predict all the ways that bad people can abuse a good service, and regulatory approvals are notoriously slow and inflexible. On the other hand, Internet innovation is marked by rapid development of new services and quick reactions to fine-tune new features or fix unexpected problems. For example:

  • When Google rolled out its “Buzz” social networking product, users and privacy advocates responded quickly and vociferously to features that exposed information without appropriate notice and user control. Within days, Google changed the way the service worked and gave users more control.
  • And when the privacy lobby criticized Facebook’s privacy practices, the social-networking giant responded within days by unveiling new privacy controls that allowed users to fine-tune their info sharing and what advertisers see about them.

Contrast the speed of these changes with the average time it takes to pass a new law, or—since these problems are global—with the time it takes to negotiate an international treaty. The fastest solution to the problems raised by technological innovation usually comes in the form of more technological innovation.

Earlier this week at IGF, White House Deputy Chief Technology Officer Andrew McLaughlin said that one of the best aspects of the Internet is how it enables innovation without permission.

Innovators treasure this ability to experiment, and in return, know that they must quickly find solutions when their innovations cause unintended consequences for users. They get that innovation without permission does not mean innovation without responsibility. And online services should improve their design and testing methods so that there are fewer post-release problems to deal with.

But surely we don’t want to require developers to seek permission before innovating. As a Swiss government official said at IGF today:

Maybe for some functions you need an ex-ante regulation that is proscriptive. For other functions you let people act and then if something bad happens, you have an ex-post regulation.—Thomas Schneider, Switzerland’s rep at the Council of Europe and ICANN.

More sage advice came from young people—the anticipated victims of precrimes that might use location-based info. Joonas Makinen of the Youth Coalition on Internet Governance told the IGF, “It is better to focus on fighting ignorance and building digital literacy than applying safety strategies based on restriction.”

At the end of Minority Report, the precrime unit is shut down, but only after it had ruined many lives with faulty predictions. Before online precrime advocates gather too much steam, I suggest we take a scene out of their own movie, and shut them down before they begin.

By Steve DelBianco, Executive Director at NetChoice

Filed Under

Comments

Exceellen points, with a much broader application value Volker Greimann  –  Sep 21, 2010 9:16 AM

This also applies to other areas of current discussion on the future of the internet, such as the debate on the topic of the Vertical Integration of Registries and Registrars in the field of new gTLDs.

While many favor a regime of strict restrictions and barriers from entry into this market simply to prevent some, as yet unknown harms from occurring (which may or may not occur despite the restrictions), the focus should rather lie on building a stronger system to react to such abuse when it is detected and better detect abuse in the first place.

To adapt your conclusion to this debate:
“It is better to focus on fighting abuse and building reactive and strong compliance structures than applying safety strategies based on restriction.”

Let us consider the source of these comments Neil Schwartzman  –  Sep 26, 2010 7:16 PM

Since Steve forgot to tell us who he is representing ...

Search for Steve Delbianco

Oh look, he is with Netchoice, an industry advocacy group.

Who are they precisely? http://www.netchoice.org/about/

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com