[hrpc] new draft methodology

Niels ten Oever <niels@article19.org> Thu, 17 September 2015 21:51 UTC

Return-Path: <niels@article19.org>
X-Original-To: hrpc@ietfa.amsl.com
Delivered-To: hrpc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7ED581A8787 for <hrpc@ietfa.amsl.com>; Thu, 17 Sep 2015 14:51:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.323
X-Spam-Level: **
X-Spam-Status: No, score=2.323 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HOST_EQ_NL=1.545, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g1bevjScRYgO for <hrpc@ietfa.amsl.com>; Thu, 17 Sep 2015 14:51:36 -0700 (PDT)
Received: from mail.article19.io (vps784.greenhost.nl [213.108.108.114]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAD741A87C0 for <hrpc@irtf.org>; Thu, 17 Sep 2015 14:51:35 -0700 (PDT)
Received: from mail.article19.io (localhost [127.0.0.1]) by mail.article19.io (Postfix) with ESMTPS id 990FD19C000 for <hrpc@irtf.org>; Thu, 17 Sep 2015 21:51:34 +0000 (UTC)
Received: from mail.article19.io (localhost [127.0.0.1]) by mail.article19.io (Postfix) with ESMTPS id 8B30219C00A for <hrpc@irtf.org>; Thu, 17 Sep 2015 21:51:34 +0000 (UTC)
Received: from [192.168.1.65] (sd5112335.adsl.online.nl [213.17.35.53]) by mail.article19.io (Postfix) with ESMTPSA id 7491D19C000 for <hrpc@irtf.org>; Thu, 17 Sep 2015 21:51:34 +0000 (UTC)
Message-ID: <55FB35E6.8010208@article19.org>
Date: Thu, 17 Sep 2015 23:51:34 +0200
From: Niels ten Oever <niels@article19.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.8.0
MIME-Version: 1.0
To: "hrpc@irtf.org" <hrpc@irtf.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/hrpc/x6vtN5zeU5-9kAnbG4mDx7uO-8E>
Subject: [hrpc] new draft methodology
X-BeenThere: hrpc@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "niels@article19.org" <hrpc.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/hrpc>, <mailto:hrpc-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hrpc/>
List-Post: <mailto:hrpc@irtf.org>
List-Help: <mailto:hrpc-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hrpc>, <mailto:hrpc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Sep 2015 21:51:39 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Looking forward to the discussion! For a more readable format, check
here: http://digitaldissidents.org/draft-methodology.html

For changes I also accept pull requests at
https://github.com/nllz/IRTF-HRPC/blob/master/draft-methodology.md but
let's have the discussion on the list instead of on Github.

- ---
title: Human Rights Protocol Considerations Methodology
abbrev: hrpcm
docname: draft-varon-hrpc-methodology-01
category: info

ipr: trust200902
area: General
workgroup: Human Rights Protocol Considerations Research Group
keyword: Internet-Draft

stand_alone: yes
pi:
  rfcedstyle: yes
  toc: yes
  tocindent: yes
  sortrefs: yes
  symrefs: yes
  strict: yes
  comments: yes
  inline: yes
  text-list-symbols: -o*+

author:
- -
       ins: J. Varon
       name: Joana Varon
       organization: Coding Rights
       email: joana@codingrights.org
- -
       ins: C.J.N. Cath
       name: Corinne Cath
       organization: Oxford Internet Institute
       email: corinne.cath@oii.ox.ac.uk

- -
       ins: N. ten Oever
       name: Niels ten Oever
       organization: Article19
       email: niels@article19.org


normative:

informative:

   RFC1958:
   RFC1984:
   RFC2026:
   RFC2639:
   RFC2919:
   RFC3365:
   RFC5890:
   RFC5891:
   RFC5892:
   RFC5893:
   RFC6162:
   RFC6783:
   RFC6973:
   RFC7230:
   RFC7231:
   RFC7232:
   RFC7234:
   RFC7235:
   RFC7236:
   RFC7237:
   RFC7258:


   UDHR:
     title: The Universal Declaration of Human Rights
     date: 1948
     author:
        org: United Nations General Assembly
     target: http://www.un.org/en/documents/udhr/

   HRPC-GLOSSARY:
     title: Human Rights Protocol Considerations Glossary
     date: 2015
     author:
        - ins: N. ten Oever
        - ins: A. Doria
        - ins: D. K. Gillmor
     target: https://www.ietf.org/id/draft-dkg-hrpc-glossary-00.txt

   ID:
     title: Proposal for research on human rights protocol consideration
s
     date: 2015
     author:
        - ins: N. ten Oever
        - ins: A. Doria
        - ins: J. Varon
     target: http://tools.ietf.org/html/draft-doria-hrpc-proposal


- --- abstract

This document presents steps undertaken for developing a methodology
to map engineering concepts at the protocol level that may be related
to promotion and protection of Human Rights, particularly the right to
freedom of expression and association.  It feeds upon and is intended
to facilitate the work done by the proposed Human Rights Protocol
Considerations research group, as well as other authors within the IETF.

Exemplary work {{RFC1984}} {{RFC6973}} {{RFC7258}} has already been
done in the IETF on privacy issues that should be considered when
creating an Internet protocol. But, beyond privacy considerations,
concerns for freedom of expression and association were also a strong
part of the world-view of the community involved in developing the
first Internet protocols. Indeed, promoting open, secure and reliable
connectivity is essential for these rights. But how are this concepts
addressed in the protocol level? Are there others? This ID is intended
to explain research work done so far and to explore possible
methodological approaches to move further on exploring and exposing
the relations between standards and protocols and the promotion and
protection of the rights to freedom of expression and association.

Discussion on this draft at: hrpc@irtf.org //
https://www.irtf.org/mailman/admindb/hrpc


- --- middle

Introduction
============

In a manner similar to the work done for {{RFC6973}} on Privacy
Consideration Guidelines, the premise of this research is that some
standards and protocols can solidify, enable or threaten human rights.

As stated in {{RFC1958}}, the Internet aims to be the global network
of networks that provides unfettered connectivity to all users at all
times and for any content. Our research hypothesis is that Internet's
objective of connectivity makes it an enabler of human rights and that
its architectural design tends to converge in protecting and promoting
the human rights framework.

Open, secure and reliable connectivity is essential for human rights
such as freedom of expression and freedom of association, as defined
in the Universal Declaration of Human Rights {{UDHR}}.  Therefore,
considering connectivity as the ultimate objective of the Internet,
makes a clear case that the Internet is not only an enabler of human
rights, but that human rights lie at the basis of, and are ingrained
in, the architecture of the network.

But, while the Internet was designed with freedom and openness of
communications as core values, as the scale and the commercialization
of the Internet has grown greatly, the influence of such world-views
started to compete with other values. Therefore, decisive and human
rights enabling characteristics of the Internet might be degraded if
they're not properly defined, described and protected as such. And, on
the other way around, not protecting these characteristics could also
result in (partial) loss of functionality and connectivity, thus, in
the internet architecture design itself.

An essential part of maintaining the Internet as a tool for
communication and connectivity is security. Indeed, "development of
security mechanisms is seen as a key factor in the future growth of
the Internet as a motor for international commerce and communication"
{{RFC1984}} and according to the Danvers Doctrine {{RFC3365}}, there
is an overwhelming consensus in the IETF that the best security should
be used and standardized.

In {{RFC1984}}, the Internet Architecture Board (IAB) and the Internet
Engineering Steering Group (IESG), the bodies which oversee
architecture and standards for the Internet, expressed: "concern by
the need for increased protection of international commercial
transactions on the Internet, and by the need to offer all Internet
users an adequate degree of privacy."  Indeed, the IETF has been doing
a significant job in this area {{RFC6973}} {{RFC7258}}, considering
privacy concerns as a subset of security concerns.

Besides privacy, it should be possible to highlight other aspects of
connectivity embedded in standards and protocols that can have human
rights considerations, such as freedom of expression and the right to
association and assembly online. This ID is willing to explain
research work done so far and explore possible methodological
approaches to move further on exploring and exposing these relations
between standards and protocols and the promotion and protection of
the rights to freedom of expression and association.

To move this debate further, information has been compiled at the
https://datatracker.ietf.org/rg/hrpc/ and discussions are happening
through the list hrpc@irtf.org

This document builds on the previous IDs published within the
framework of the proposed hrpc research group {{ID}}

Research Topic
==============

The growing impact of the Internet on the lives of individuals makes
Internet standards and protocols increasingly important to society.
The IETF itself, in {{RFC2026}}, specifically states that the
‘interests of the Internet community need to be protected’. There are
various examples of protocols and standards having a direct impact on
society, and by extension the human rights of end-users. Privacy is
just one example. Therefore, this proposal for research methodology is
addressing as research topics the rights to freedom of expression and
association and it's relations to standards and protocols.

These two rights are described in the Universal Declaration of Human
Rights:


Article 19 - Freedom of Expression (FoE)
"Everyone has the right to freedom of opinion and expression; this
right includes freedom to hold opinions without interference and  to
seek, receive and impart information and ideas through any  media and
regardless of frontiers."

Article 20 - Freedom of Association (FoA)
"Everyone has the right to freedom of peaceful assembly and association.
"

But how to talk about human rights in an engineering context?

But can we translate these concepts into Internet architecture
technical terms?

What standards and protocols could have any relationship with freedom
of expression and association?

What are the possible relationships between them?


Methodology
===========

Mapping the relation between human rights and protocols and
architectures is a new research challenge, which requires a good
amount of interdisciplinary and cross organizational cooperation to
develop a consistent methodology.  While the authors of this first
draft are involved in  both human rights advocacy and research on
Internet technologies - we believe that bringing this work into the
IRTF facilitates and  improves this work by bringing human rights
experts together with the  community of researchers and developers of
Internet standards and technologies.

In order to map the potential relation between human rights and
protocols, so far, the HRPC proposed research group has been gathered
the data from three specific sources:

a. Discourse analysis of RFCs
To start addressing the issue, a mapping exercise analyzing Internet
architecture and protocols features, vis-a-vis possible impact on
human rights is being undertaken. Therefore, research on the language
used in current and historic RFCs and mailing list discussions is
underway to expose core architectural principles, language and
deliberations on human rights of those affected by the network.

b. Interviews with members of the IETF community during the Dallas
meeting of March 2015
Interviews with the current and past members of the Internet
Architecture Board (IAB), current and past members of the Internet
Engineering Steering Group(IESG) and chairs of selected working groups
and RFC authors. To get an insider understanding of how they view the
relationship (if any) between human rights and protocols to play out
in their work.

c. Participant observation in Working Groups
By participating in various working groups information was gathered
about the IETFs day-to-day work. From which which general themes and
use-cases about human rights and protocols were extracted.


All this data was then processed using the following three consecutive
strategies:

Translating Human Rights Concept into Technical Definitions
- -----------------------------------------------------------

Step 1.1 - Mapping protocols and standards related to FoE and FoA
Activity: Mapping of protocols and standards that potentially enable
the internet as a tool for freedom of expression
Expected Outcome: list of RFCs that describe standards and protocols
that are potentially more closely related to FoE and FoA.

Step 1.2 - Extracting concepts from mapped RFCs
Activity: Read the selected RFCs to highlight central design and
technical concepts which impact human rights.
Expected Outcome 1: a list of technical terms that combined create the
enabling environment for freedom of expression and freedom of associatio
n.
Expected Outcome 2: Possible translations of human rights concepts to
technical terms.

Step 1.3 - Building a common glossary
In the analysis of existing RFCs, central design and technical
concepts shall be found which impact human rights.
Expected Outcome: a Glossary for human rights protocol considerations
with a list of concepts and definitions of technical concepts


Map cases of protocols being exploited or enablers
- ------------------------------------------------------

Step 1.1 - Cases of protocols being exploited
Activity 1: Map cases in which users rights have been exploited,
violated or compromised, analyze which protocols or vulnerabilities in
protocols are invovled with this.
Activity 2: Understand technical rational for the use of particular
protocols that undermine human rights.
Expected Outcome: list of protocols that have been exploited to expose
users to rights violation and rationale.

Step 1.2 - Cases of protocols being enablers
Activity: Map cases in which users rights have been enabled, promoted
and protected and analyze which characteristics in the protocols are
involved with this.
Expected Outcome: list of characteristics in the protocols that have
been key to promote and protect the rights to freedom of expression
and association that could be added to our glossary


Apply human rights technical definitions to the cases mapped
- ---------------------------------------------------------------

Step 1 - Glossary and Cases
Activity: Investigate alternative technical options from within list
of technical design principle (see {{HRPC-GLOSSARY}}) that could have
been applied in the mapped cases to strengthen our technical
definition of FoE and FoA, and hence human rights and connectivity of
the network.

Expected Outcome: Identify best (and worst) current practices. Develop
procedures to systematically evaluate protocols for potential human
rights impact.



Preliminary findings achieved by applying current proposed methodology
=======================================================================


Translating Human Rights Concept into Technical Definitions
- -----------------------------------------------------------

Step 1.1 - Mapping protocols and standards related to FoE and FoA

Below are some examples of these protocols and standards that might be
related to FoE and FoA and FoE:

HTTP
Websites made it extremely easy for individuals to publish their
ideas, opinions and thoughts.  Never before has the world seen an
infrastructure that made it this easy to share information and ideas
with such a large group of other people.  The HTTP architecture and
standards, including {{RFC7230}}, {{RFC7231}}, {{RFC7232}},
{{RFC7234}}, {{RFC7235}}, {{RFC7236}}, and {{RFC7237}}, are essential
for the publishing of information.  The HTTP protocol, therefore,
forms an crucial enabler for freedom of expression, but also for the
right to freely participate in the culture life of the community
(Article 27) {{UDHR}}, to enjoy the arts and to share in scientific
advancement and its benefits.


Real time communications through XMPP and WebRTC
Collaborations and cooperation via the Internet have take a large step
forward with the progress of chat and other other real time
communications protocols.  The work on XMPP {{RFC6162}} has enabled
new methods of global interactions, cooperation and human right
advocacy.  The WebRTC work being done to standardize the API and
protocol elements to support real-time communications for browsers,
mobile applications and IoT by the World Wide Consortium (W3C) and the
IETF is another artifact enabling human rights globally on the Internet.

Mailing lists
Collaboration  and cooperation have been part of the Internet since
its early  beginning, one of the instruments of facilitating working
together in  groups are mailing lists (as described in {{RFC2639}},
{{RFC2919}}, and {{RFC6783}}.  Mailing lists are critical  instruments
and enablers for group communication and organization, and  therefore
form early artifacts of the (standardized) ability of Internet
standards to enable the right to freedom of assembly and association.


IDNs
English has been the lingua franca of the Internet, but for many
Internet user English is not their first language.  To have a true
global Internet, one that serves the whole world, it would need to
reflect the languages of these different communities.  The
Internationalized Domain Names IDNA2008 ({{RFC5890}}, {{RFC5891}},
{{RFC5892}}, and {{RFC5893}}), describes standards for the use of a
broad range of strings and characters (some also written from right to
left).  This enables users who use other characters than the standard
LDH ascii typeset to have their own URLs.  This shows the ambition of
the Internet community to reflect the diversity of users and to be in
line with Article 2 of the Universal Declaration of Human Rights which
clearly stipulates that "everyone is entitles to all rights and
freedoms `[...]`, without distinction of any kind, such as `[...]`
language `[...]`." {{UDHR}}

Current Status:
- ---------------
Based on these standards and protocols, a raw list of RFCs that
describe standards and protocols that are potentially related to FoE
and FoA is available here:
https://github.com/nllz/IRTF-HRPC/blob/master/RFC%20overview.ods


Step 1.2 - Extracting concepts from mapped RFCs
The list of RFCs compiled above has used to extract our key concepts.

Current Status:
- ---------------
Expected Outcome 1:  a list of  technical terms that combined create
the enabling environment for human rights, such a freedom  of
expression and freedom of association.

      Architectural principles                    Enabling features
        and characteristics                        for user rights

                       /------------------------------------------------
\
                       |
|
     +=================|=============================+
|
     =                 |                             =
|
     =                 |           End to end        =
|
     =                 |          Reliability        =
|
     =                 |           Resilience        =  Access as
|
     =                 |        Interoperability     =   Human Right
|
     =    Good enough  |          Transparency       =
|
     =     principle   |       Data minimization     =
|
     =                 |  Permissionless innovation  =
|
     =    Simplicity   |     Graceful degradation    =
|
     =                 |          Connectivity       =
|
     =                 |          Heterogenity       =
|
     =                 |                             =
|
     =                 |                             =
|
     =                 \------------------------------------------------
/
     =                                               =
     +===============================================+

Current status:
- ---------------
Expected Outcome 2: Translating human rights to technical terms. This
analysis points to translating human rights that impact or are
impacted by the Internet as follows:

The combination of content agnosticism, connectivity, security,
privacy (as defined in {{RFC6973}}, and open standards are the
technical principles that underlay freedom of expression on the Internet
.

      (        Connectivity         )
     (         Privacy               )
     (         Security              )   = freedom of expression
     (         Content agnosticism   )
     (	      Internationalization   )
     (        Censorship resistance  )
     (	      Open Standards         )
      (       Heterogeneity support )
	

     (		Anonymity           )
    (		Privacy              )   = Non-discrimination
    (		Pseudonymity         )
     (		Content agnosticism )	

			
    ( 	      Content Agnosticism  )
    (	      Security             ) 	= Equal protection


     (	      Anonymity       )
    (	      Privacy          )   = Right to be presumed innocent
     (	      Security        )	


	 (	Accessibility         )
	(	Internationalization   ) = Right to political participation
	(	Censorship resistance  )
	 (

					
	 (  Open standards         )
	(   Localization            ) = Rights for cultural life,
	(   Internationalization    )             arts and science
	 (  Censorship resistance  )


	 (	Connectivity         )
	(	Decentralization      )
	(     Censorship resistance ) = Right to freedom of assembly
	(  	Pseudonymity          )                   and association
	(	Anonymity             )
	 ( 	Security             )
	
        ( Reliability    )
       (  Confidentiality )	
       (  Integrity       ) = Right to security
       (  Authenticity    )
        ( Anonymity      )


Step 1.3 - Build a common glossary

Current status:
- ---------------
Expected Outcome: A first list of concepts, which definitions should
be improved and further aligned with existing RFCs, is published as {{ID
}}



Next Steps of the Methodology still to be applied
=================================================

Map cases of protocols being exploited or enablers
- ---------------------------------------------------

UPCOMING BEFORE YOKOHAMA


Apply human rights technical definitions to the cases mapped
- ------------------------------------------------------------


Next Steps of the Methodology still to be developed
===================================================

Future research questions
- -------------------------
All of the steps taken above raise the following question that need to
be addressed after the research methodological steps outlined above
have been completed:

How can the rights enabling environment be safeguarded in (future)
protocol development?

How  can (nontransparent) human rights violations be minimized in
(future) protocol development?

Can we propose guidelines to protect the Internet as a
human-rights-enabling environment in future protocol development,
specially in relation to freedom of expression and freedom of
association, in a manner similar to the work done for Privacy
Considerations in {{RFC6973}}?

Assuming that the research produces useful results, can the objective
evolve into the creation of a set of recommended considerations for
the protection of applicable human rights?


Security Considerations
========================

As this draft concerns a research document, there are no security
considerations.


IANA Considerations
==========================

This document has no actions for IANA.


Research Group Information
==========================

The discussion list for the IRTF Human Rights Protocol Considerations
proposed working group is located at the e-mail address
<hrpc@ietf.org>. Information on the group and information on how to
subscribe to the list is at
<https://www.irtf.org/mailman/listinfo/hrpc>

Archives of the list can be found at:
<https://www.irtf.org/mail-archive/web/hrpc/current/index.html>


- -- 
Niels ten Oever
Head of Digital

Article 19
www.article19.org

PGP fingerprint    8D9F C567 BEE4 A431 56C4
                   678B 08B5 A0F2 636D 68E9
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJV+zXlAAoJEAi1oPJjbWjp4vQH/iDS1RzUApo6ID1BOGIvMERg
HrMdVHTuYhVuWW/CKUSEDwnd3ABYV8pR7gbt21V0/tqPyWaVnAddLCpRn0IDQH3f
DZxVYNBMVF8Or3XaX/5xpZwPkVwXn34SVCIsLorUPmg4yLQUrPr+bVpyAP+muMSe
mXj4jGMWTgmrha94TWerx6vv2VygoZnB8990SVbHsSrKYAVyD1w5HEMnRXX/8xSe
Yb2FdDUmqve7W7FiJmrCCaTYJ0YNRL3kfJ6/qwioL0IK99aE2xFRAMHXOy6pXjvq
oZPj5+IoQVZrkEhLrerTF2IKhirp9lGQ+daOIy5IuBePCIW1kU+Od7nPYeTwk2c=
=oOYm
-----END PGP SIGNATURE-----