[Docs] [txt|pdf|xml|html] [Tracker] [WG] [Email] [Diff1] [Diff2] [Nits]

Versions: (draft-tenoever-hrpc-political) 00 01 02 03 04 05 06 07

Human Rights Protocol Considerations Research Group         N. ten Oever
Internet-Draft                                   University of Amsterdam
Intended status: Informational                              May 16, 2019
Expires: November 17, 2019


               Notes on networking standards and politics
                      draft-irtf-hrpc-political-02

Abstract

   The IETF cannot ordain what standards or protocols are to be used on
   networks, but the standards development process in the IETF has a
   normative effect.  Among other things, the IETF's work affects what
   is perceived as technologically possible and useful where networking
   technologies are being deployed, and its standards reflect what is
   considered by the technical community to be feasible and good
   practice.  Because the IETF's protocols mediate many aspects of
   modern life, and therefore contribute to the ordering of societies
   and communities, the consideration of the potential social impact of
   protocols should be part of the standardization and development
   process.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 17, 2019.

Copyright Notice

   Copyright (c) 2019 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of



ten Oever               Expires November 17, 2019               [Page 1]


Internet-Draft                   politix                        May 2019


   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Vocabulary Used . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Research Question . . . . . . . . . . . . . . . . . . . . . .   4
   4.  Technology and Politics: a review of literature and community
       positions . . . . . . . . . . . . . . . . . . . . . . . . . .   4
     4.1.  Technology is value neutral . . . . . . . . . . . . . . .   4
     4.2.  Some protocols are political sometimes  . . . . . . . . .   5
     4.3.  All protocols are political sometimes . . . . . . . . . .   5
     4.4.  The network has its own logic and values  . . . . . . . .   5
     4.5.  Protocols are inherently political  . . . . . . . . . . .   6
   5.  IETF: Protocols as Standards  . . . . . . . . . . . . . . . .   7
     5.1.  Competition and collaboration . . . . . . . . . . . . . .   8
     5.2.  How voluntary are open standards? . . . . . . . . . . . .   9
   6.  Conclusion  . . . . . . . . . . . . . . . . . . . . . . . . .   9
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  10
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  10
   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  10
   10. Research Group Information  . . . . . . . . . . . . . . . . .  11
   11. References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     11.1.  Informative References . . . . . . . . . . . . . . . . .  11
     11.2.  URIs . . . . . . . . . . . . . . . . . . . . . . . . . .  16
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  16

1.  Introduction

   "Science and technology lie at the heart of social asymmetry.
      Thus technology both creates systems which close off other
      options and generate  novel, unpredictable and indeed
      previously unthinkable, option. The game of technology is
      never finished, and its ramifications are endless."

                                  - Michel Callon

   "The Internet isn't value-neutral, and neither is the IETF."

                                  -{{RFC3935}}

   The design of the Internet through protocols and standards is a
   technical issue with great political and economic impacts [RFC0613].



ten Oever               Expires November 17, 2019               [Page 2]


Internet-Draft                   politix                        May 2019


   The early Internet community already realized that it needed to make
   decisions on political issues such as intellectual property;
   internationalization [BramanI]; diversity; access [RFC0101]; privacy
   and security [RFC0049]; and the military [RFC0164] [RFC0316],
   governmental [RFC0144] [RFC0286] [RFC0313] [RFC0542] [RFC0549] and
   non-governmental [RFC0196] uses of the network.  This has been
   clearly pointed out by Braman [BramanII].

   Recently there has been increased discussion of the relation between
   Internet protocols and human rights [RFC8280], which spurred
   discussion of the value neutrality and political nature of standards.
   The network infrastructure is on the one hand designed, described,
   developed, standardized and implemented by the Internet community,
   while on the other hand the Internet community and Internet users are
   also shaped by the affordances of the technology.  Companies,
   citizens, governments, standards development bodies, public opinion
   and public interest groups all play a part in these discussions.  In
   this document we aim to outline different views on the relation
   between standards and politics, and seek to answer the question of
   whether standards are political, and if so, how.

2.  Vocabulary Used

   Politics  (from Greek: Politika: Politika, definition "affairs of the
      commons") is the process of making decisions applying to all
      members of a diverse group with conflicting interests.  More
      narrowly, it refers to achieving and exercising positions of
      governance or organized control over a community.  Furthermore,
      politics is the study or practice of the distribution of power and
      resources within a given community as well as the
      interrelationship(s) between communities. (adapted from
      [HagueHarrop])

   Affordances  The possibilities that are provided to an actor through
      the ordering of an environment by a technology.

   Protocols  'Protocols are rules governing communication between
      devices or applications, and the creation or manipulation of any
      logical or communicative artifacts concomitant with such
      communication.'  [Sisson]

   Standards  'An Internet Standard is a specification that is stable
      and well-understood, is technically competent, has multiple,
      independent, and interoperable implementations with substantial
      operational experience, enjoys significant public support, and is
      recognizably useful in some or all parts of the Internet.'
      [RFC2026]




ten Oever               Expires November 17, 2019               [Page 3]


Internet-Draft                   politix                        May 2019


3.  Research Question

   Are protocols political?  If so, should the politics of protocols be
   taken into account in their development process?

4.  Technology and Politics: a review of literature and community
    positions

   In 1993 the Computer Professionals for Social Responsibility stated
   that 'the Internet should meet public interest objectives'.
   Similarly, [RFC3935] states that 'The Internet isn't value-neutral,
   and neither is the IETF.'.  Ethics and the Internet was already a
   topic of an RFC by the IAB in 1989 [RFC1097].  Nonetheless there has
   been a recent uptick in discussions within the IETF about the impact
   of Internet protocols on human rights [RFC8280], and more generally
   in public debate about the impact of technology on society.

   This document aims to provide an overview of the spectrum of
   different positions that have been observed in the IETF and IRTF
   community.  These positions were observed during participatory
   observation, through 39 interviews with members of the community, the
   Human Rights Protocol Considerations Research Group mailing list, and
   during and after the Technical Plenary on Protocols and Human Rights
   during IETF98.

   Without judging them on their internal or external consistency they
   are represented here.  Where possible we also sought to engage with
   the academic literature on this topic.

4.1.  Technology is value neutral

   This position starts from the premise that the technical and
   political are differentiated fields and that technology is 'value
   free'.  This is also put more explicitly by Carey: "electronics is
   neither the arrival of apocalypse nor the dispensation of grace.
   Technology is technology; it is a means for communication and
   transportation over space, and nothing more."  [Carey].  In this view
   protocols only become political when it is actually being used by
   humans.  So the technology itself is not political, the use of the
   technology is.  This view sees technology as instrument;
   "technologies are 'tools' standing ready to serve the purposes of
   their users.  Technology is deemed 'neutral,' without valuative
   content of its own.'" [Feenberg].  Feenberg continues: "technology is
   not inherently good or bad, and can be used to whatever political or
   social ends desired by the person or institution in control.
   Technology is a 'rational entity' and universally applicable.  One
   may make exceptions on moral grounds, but one must also understand




ten Oever               Expires November 17, 2019               [Page 4]


Internet-Draft                   politix                        May 2019


   that the "price for the achievement of environmental, ethical, or
   religious goals...is reduced efficiency."  [Feenberg].

4.2.  Some protocols are political sometimes

   This stance is a pragmatic approach to the problem.  It states that
   some protocols under certain conditions can themselves have a
   political dimension.  This is different from the claim that a
   protocol might sometimes be used in a political way; that view is
   consistent with the idea of the technology being neutral (for the
   human action using the technology is where the politics lies).
   Instead, this position requires that each protocol and use be
   evaluated for its political dimension, in order to understand the
   extent to which it is political.

4.3.  All protocols are political sometimes

   While not an absolutist standpoint it recognizes that all design
   decisions are subject to the law of unintended consequences.  The
   system consisting of the Internet and its users is vastly too complex
   to be predictable; it is chaotic in nature; its emergent properties
   cannot be predicted.  This concept strongly hinges on the general
   purpose aspect of information technology and its malleability.
   Whereas not all (potential) behaviours, affordances and impacts of
   protocols can possible be predicted, one could at least consider the
   impact of proposed implementations.

4.4.  The network has its own logic and values

   While humans create technologies, this does not mean that they are
   forever under human control.  A technology, once created, has its own
   logic that is independent of the human actors that either create or
   use the technology.

   From this perspective, technologies can shape the world.  As Martin
   Heidegger says, "The hydroelectric plant is not built into the Rhine
   River as was the old wooden bridge that joined bank with bank for
   hundreds of years.  Rather the river is dammed up into the power
   plant.  What the river is now, namely, a water power supplier,
   derives from out of the essence of the power station."  [Heidegger]
   (p 16) The dam in the river changes the world in a way the bridge
   does not, because the dam alters the nature of the river.

   In the same way - in another and more recent example - the very
   existence of automobiles imposes physical forms on the world
   different from those that come from the electric tram or the horse-
   cart.  The logic of the automobile means speed and the rapid covering
   of distance, which encourages suburban development and a tendency



ten Oever               Expires November 17, 2019               [Page 5]


Internet-Draft                   politix                        May 2019


   toward conurbation.  But even if that did not happen, widespread
   automobile use requires paved roads, and parking lots and structures.
   These are pressures that come from the automotive technology itself,
   and would not arise without that technology.

   In much same way, then, networking technology, such as protocols,
   creates its own demands.  One of the most important conditions for a
   protocol's success is its incremental deployability [RFC5218].  This
   means that the network already contains constraints on what can be
   deployed into it.  In this sense the network creates its own paths,
   but also has its own objective.  According to this view the goal of
   the network is interconnection and connectivity; more connectivity is
   good for the network.  Proponents of this positions also often
   describe the Internet as an organism with its own unique ecosystem.

   In this position it is not necessarily clear where the 'social' ends
   and the 'technical' begins, and it could be argued that the
   distinction itself is a social construction [BijkerLaw] or that a
   real-life distinction between the two is hard to make [Bloor].

4.5.  Protocols are inherently political

   This position argues the opposite of 'technological neutrality'.
   This position is illustrated by Postman when he writes: "the uses
   made of technology are largely determined by the structure of the
   technology itself" [Postman].  He states that the medium itself
   "contains an ideological bias".  He continues to argue that
   technology is non-neutral:

   (1) because of the symbolic forms in which information is encoded,
   different media have different intellectual and emotional biases; (2)
   because of the accessibility and speed of their information,
   different media have different political biases; (3) because of their
   physical form, different media have different sensory biases; (4)
   because of the conditions in which we attend to them, different media
   have different social biases; (5) because of their technical and
   economic structure, different media have different content biases.

   Recent scholars of Internet infrastructure and governance have also
   pointed out that Internet processes and standards have become part
   and parcel of political processes and public policies.  Several
   concrete examples are found within this approach, for instance, the
   IANA transition or global innovation policy [DeNardis].  The Raven
   process in which the IETF refused to standardize wiretapping - which
   resulted in [RFC2804] - was an instance where an international
   governance body took a position that was largely political, although
   driven by a technical argument.  The process that led to [RFC6973] is
   similar: the Snowden disclosures, which occured in the political



ten Oever               Expires November 17, 2019               [Page 6]


Internet-Draft                   politix                        May 2019


   space, engendered the IETF to act.  This is summarized in [Abbate]
   who says: "protocols are politics by other means," emphasizing the
   interests that are at play in the process of designing standards.

   This position further holds that protocols can never be understood
   without their contextual embeddedness: protocols do not exist solely
   by themselves but always are to be understood in a more complex
   context - the stack, hardware, or nation-state interests and their
   impact on civil rights.  Finally, this view is that protocols are
   political because they affect or sometimes effect the socio-technical
   ordering of reality.  The latter observation leads Winner to conclude
   that the reality of technological progress has too often been a
   scenario where innovation has dictated change for society.  Those who
   had the power to introduce a new technology also had the power to
   create a consumer class to use the technology "with new practices,
   relationships, and identities supplanting the old, -- and those who
   had the wherewithal to implement new technologies often molded
   society to match the needs of emerging technologies and
   organizations."  [Winner].

5.  IETF: Protocols as Standards

   In the previous section we gave an overview of the different existing
   positions of the impact of Internet protocols in the Internet
   protocol community.  In the following section we will review the
   standards setting process and its consequences for the politics of
   protocols, through the lens of existing literature on standards
   setting.

   Standards enabling interoperating networks, what we think of today as
   the Internet, were created as open, formal and voluntary standards.
   A platform for Internet standardization, the Internet Engineering
   Task Force (IETF), was created in 1986 to enable the continuation of
   such standardization work.  The IETF has sought to make the standards
   process transparent (by ensuring everyone can access standards,
   mailing-lists and meetings), predictable (by having clear procedures
   and reviews) and of high quality (by having draft documents reviewed
   by members from its own epistemic community).  This is all aimed at
   increasing the accountability of the process and the quality of the
   standard.

   The IETF implements what has been referred to as an "informal ex ante
   disclosure policy" for patents [Contreras], which includes the
   possibility for participants to disclose the existence of a patent
   relevant for the standard, royalty-terms which would apply to the
   implementers of that standard should it enter into effect, as well as
   other licensing terms that may be interesting for implementers to
   know.  The community ethos in the IETF seems to lead to 100% royalty-



ten Oever               Expires November 17, 2019               [Page 7]


Internet-Draft                   politix                        May 2019


   free disclosures of prior patents which is a record number, even
   among other comparable standard organizations [Contreras].  In the
   following paragraph we will describe inherent tensions in the
   standards process.

5.1.  Competition and collaboration

   Standards exist for nearly everything: processes, technologies,
   safety, hiring, elections, and training.  Standards provide blue-
   prints for how to accomplish a particular task in a similar way for
   others that are trying to accomplish the same thing, while reducing
   overhead and inefficiencies.  Although there are different types and
   configurations of standards, they all enhance competition by allowing
   different entities to work from a commonly accepted baseline.

   On the first types of standards than can be found are "informal" ones
   - agreed-upon normal ways of interacting within a specific community.
   For example, the process through which greetings to a new
   acquaintance are expressed through a bow, a handshake or a kiss.  On
   the other hand, "formal" standards are normally codified in writing.

   Within economy studies, _de facto_ standards arise in market
   situations where one entity is particularly dominant; downstream
   competitors are therefore tied to the dominant entity's technological
   solutions [Ahlborn].  Under EU anti-trust law, _de facto_ standards
   have been found to restrict competition for downstream services in PC
   software products [CJEU2007], as well as downstream services
   dependent on health information [CJEU2004].

   Even in international law, the World Trade Organization (WTO) uses
   standards, although it recognizes a difference between standards and
   technical regulations.  The former are voluntary formal codes to
   which products or services may conform, while technical regulations
   are mandatory requirements to be fullfilled for a product to be
   accessible in a national market.  These rules have implications for
   how nation states bound by WTO agreements can impose specific
   technical requirements on companies.  Nonetheless, there are many
   standardization groups that were originally launched by nation states
   or groups of nation states.  ISO, BIS, CNIS, NIST, ABNT and ETSI are
   examples of institutions that are, wholly or partially, sponsored by
   public money in order to ensure the smooth development of formal
   standards.  Even if under WTO rules these organizations cannot create
   the equivalent of a technical regulation, they have important
   normative functions in their respective countries.  No matter what
   form, all standards enhance competition and collaboration because
   they define a common approach to a problem.  This potentially allows
   different instances to interoperate or be evaluated according to the
   same indicators.



ten Oever               Expires November 17, 2019               [Page 8]


Internet-Draft                   politix                        May 2019


   The development of formal standards faces a number of economic and
   organizational challenges.  Mainly, the cost and difficulty of
   organizing many entities around a mutual goal, as well as the cost of
   research and development leading up to a mutually beneficial
   technological platform.  In addition, deciding what the mutual goal
   is can also be a problem.  These challenges may be described as
   inter-organizational costs.  Even after a goal is decided upon,
   coordination of multiple entities requires time and money.  One needs
   communication platforms, processes and a commitment to mutual
   investment in a higher good.  They are not simple tasks, and the more
   different communities are affected by a particular standardization
   process, the more difficult the organizational challenges become.

5.2.  How voluntary are open standards?

   Coordinating transnational stakeholders in a process of negotiation
   and agreement through the development of common rules is a form of
   global governance [Nadvi].  Standards are among the mechanisms by
   which this governance is achieved.  Conformance to certain standards
   is often a basic condition of participation in international trade
   and communication, so there are strong economic and political
   incentives to conform, even in the absence of legal requirements
   [Russell].  [RogersEden] argue:

   "As unequal participants compete to define standards, technological
   compromises emerge, which add complexity to standards.  For instance,
   when working group participants propose competing solutions, it may
   be easier for them to agree on a standard that combines all the
   proposals rather than choosing any single proposal.  This shifts the
   responsibility for selecting a solution onto those who implement the
   standard, which can lead to complex implementations that may not be
   interoperable.  On its face this appears to be a failure of the
   standardization process, but this outcome may benefit certain
   participants - for example, by allowing an implementer with large
   market share to establish a _de facto_ standard within the scope of
   the documented standard."

6.  Conclusion

   Economics, competition, collaboration, openness, and political impact
   have been an inherent part of the work of the IETF since its early
   beginnings, by its nature as a standards development organization,
   through the contributions of the members of the Internet community,
   and because of the ordering effect the Internet has on society.  The
   IETF cannot ordain which standards are to be used on the networks,
   and it specifically does not determine the laws of regions or
   countries where networks are being used, but it does set open
   standards for interoperability on the Internet, and has done so since



ten Oever               Expires November 17, 2019               [Page 9]


Internet-Draft                   politix                        May 2019


   the inception of the Internet.  Because a standard is the blue-print
   for how to accomplish a particular task in a similar way to others,
   the standards adopted have a normative effect.  The standardization
   work at the IETF will have implications on what is perceived as
   technologically possible and useful where networking technologies are
   being deployed, and its standards reflect what is considered by the
   technical community as feasible and good practice.

   Whereas there might not be agreement among the Internet protocol
   community on what the specific political nature is of technological
   development, it is undisputed that standards and protocols are both
   products of a political process, and they can also be used for
   political means.  Therefore protocols and standards are 'value-
   neutral, and neither is the IETF' [RFC3935].  Whereas there is no
   need for a unified philosophy of Internet protocols, it is to the
   benefit of the IETF, the Internet, and arguably society at large to
   take this into account in the standards development process.

   It can be expected that if the IETF will not take these issues into
   account, this might lead to interventions in the form of policies and
   regulations, for instance through governmental or intergovernmental
   bodies, which could hamper the work of the IETF.

   The IETF has already shown that it can develop consensus positions on
   particular political issues, such as policies for open and diverse
   participation [RFC7704], the anti-harassment policy [RFC7776], as
   well as the Guidelines for Privacy Considerations [RFC6973].  These
   are all examples of positions about the IETF's work processes or
   product.  What is absent is a way for IETF participants to evaluate
   their role with respect to the wider implications of that IETF work.

7.  Security Considerations

   As this draft concerns a research document, there are no security
   considerations as described in [RFC3552], which does not mean that
   not addressing the issues brought up in this draft will not impact
   the security of end-users or operators.

8.  IANA Considerations

   This document has no actions for IANA.

9.  Acknowledgements

   Thanks to Michael Rogers, Andrew Sullivan, Brian Carpenter, Mark
   Perkins and all contributors and reviewers on the hrpc mailinglist.
   Special thanks to Gisela Perez de Acha for some thorough editing
   rounds, and Amelia Andersdotter for significant text contributions.



ten Oever               Expires November 17, 2019              [Page 10]


Internet-Draft                   politix                        May 2019


10.  Research Group Information

   The discussion list for the IRTF Human Rights Protocol Considerations
   working group is located at the e-mail address hrpc@ietf.org [1].
   Information on the group and information on how to subscribe to the
   list is at: https://www.irtf.org/mailman/listinfo/hrpc [2]

   Archives of the list can be found at: https://www.irtf.org/mail-
   archive/web/hrpc/current/index.html [3]

11.  References

11.1.  Informative References

   [Abbate]   Abbate, J., "Inventing the Internet", MIT Press , 2000,
              <https://mitpress.mit.edu/books/inventing-internet>.

   [Ahlborn]  Ahlborn, C., Denicolo, V., Geradin, D., and A. Padilla,
              "Implications of the Proposed Framework and Antitrust
              Rules for Dynamically Competitive Industries", DG Comp's
              Discussion Paper on Article 82, DG COMP, European
              Commission , 2006,
              <http://curia.europa.eu/juris/liste.jsf?num=T-201/04>.

   [BijkerLaw]
              Bijker, W. and J. Law, "Shaping Technology/ Building
              Society: Studies in Sociotechnical Change", Cambridge, MA:
              MIT Press , 1992.

   [Bloor]    Bloor, D., "Knowledge and Social Imagery", London:
              Routeledge & Kegan Paul , 1976.

   [BramanI]  Braman, S., "Internationalization of the Internet by
              design: The first decade", Global Media and Communication,
              Vol 8, Issue 1, pp. 27 - 45 , 2012, <http://dx.doi.org.pro
              xy.uba.uva.nl:2048/10.1177%2F1742766511434731>.

   [BramanII]
              Braman, S., "The Framing Years: Policy Fundamentals in the
              Internet Design Process, 1969-1979", The Information
              Society Vol. 27, Issue 5, 2011 , 2010, <http://dx.doi.org.
              proxy.uba.uva.nl:2048/10.1080/01972243.2011.607027>.

   [Carey]    Carey, J., "Communication As Culture", p. 139 , 1992.







ten Oever               Expires November 17, 2019              [Page 11]


Internet-Draft                   politix                        May 2019


   [CJEU2004]
              Court of Justice of the European Union, .,
              "ECLI:EU:C:2004:257, C-418/01 IMS Health", Cambridge, UK:
              Cambridge University Press , 2004,
              <http://curia.europa.eu/juris/liste.jsf?num=C-418/01>.

   [CJEU2007]
              Court of Justice of the European Union, .,
              "ECLI:EU:T:2007:289, T-201/04 Microsoft Corp.", Cambridge,
              UK: Cambridge University Press , 2007,
              <http://curia.europa.eu/juris/liste.jsf?num=T-201/04>.

   [Contreras]
              Contreras, J., "Technical Standards and Ex Ante
              Disclosure: Results and Analysis of an Empirical Study",
              Jurimetrics: The Journal of Law, Science & Technology,
              vol. 53, p. 163-211 , 2013.

   [DeNardis]
              Denardis, L., "The Internet Design Tension between
              Surveillance and Security", IEEE Annals of the History of
              Computing (volume 37-2) , 2015, <http://is.gd/7GAnFy>.

   [draft-finance-thoughts]
              Arkko, J., "Thoughts on IETF Finance Arrangements", 2017,
              <https://datatracker.ietf.org/doc/html/
              draft-arkko-ietf-finance-thoughts>.

   [Feenberg]
              Feenberg, A., "Critical Theory of Technology", p.5-6 ,
              1991.

   [HagueHarrop]
              Hague, R. and M. Harrop, "Comparative Government and
              Politics: An Introduction", Macmillan International Higher
              Education. pp. 1-. ISBN 978-1-137-31786-5. , 2013.

   [Hanseth]  Hanseth, O. and E. Monteiro, "Insribing Behaviour in
              Information Infrastructure Standards", Accounting,
              Management and Infomation Technology 7 (14) p.183-211 ,
              1997.

   [Heidegger]
              Heidegger, M., "The Question Concerning Technology and
              Other Essays", Garland: New York, 1977 , 1977,
              <http://ssbothwell.com/documents/ebooksclub.org__The_Quest
              ion_Concerning_Technology_and_Other_Essays.pdf>.




ten Oever               Expires November 17, 2019              [Page 12]


Internet-Draft                   politix                        May 2019


   [IAOC69]   IAOC, ., "IAOC Report Chicago", 2007,
              <https://iaoc.ietf.org/documents/
              IAOC-Report-Chicago-69.pdf>.

   [IAOC77]   IAOC, ., "IAOC Report Anaheim", 2010,
              <https://iaoc.ietf.org/documents/
              IAOC-Report-Anaheim-77.pdf>.

   [IAOC99]   IAOC, ., "IAOC Report Prague", 2017,
              <https://iaoc.ietf.org/documents/
              IAOCReportinAdvanceofIETF99.pdf>.

   [Nadvi]    Nadvi, K. and F. Waeltring, "Making sense of global
              standards", In: H. Schmitz (Ed.), Local enterprises in the
              global economy (pp. 53-94). Cheltenham, UK: Edward
              Elgar. , 2004.

   [Postman]  Postman, N., "Technopoly: the Surrender of Culture to
              Technology", Vintage: New York. pp. 3-20. , 1992.

   [RFC0049]  Meyer, E., "Conversations with S. Crocker (UCLA)", RFC 49,
              DOI 10.17487/RFC0049, April 1970,
              <https://www.rfc-editor.org/info/rfc49>.

   [RFC0101]  Watson, R., "Notes on the Network Working Group meeting,
              Urbana, Illinois, February 17, 1971", RFC 101,
              DOI 10.17487/RFC0101, February 1971,
              <https://www.rfc-editor.org/info/rfc101>.

   [RFC0144]  Shoshani, A., "Data sharing on computer networks",
              RFC 144, DOI 10.17487/RFC0144, April 1971,
              <https://www.rfc-editor.org/info/rfc144>.

   [RFC0164]  Heafner, J., "Minutes of Network Working Group meeting,
              5/16 through 5/19/71", RFC 164, DOI 10.17487/RFC0164, May
              1971, <https://www.rfc-editor.org/info/rfc164>.

   [RFC0196]  Watson, R., "Mail Box Protocol", RFC 196,
              DOI 10.17487/RFC0196, July 1971,
              <https://www.rfc-editor.org/info/rfc196>.

   [RFC0286]  Forman, E., "Network Library Information System", RFC 286,
              DOI 10.17487/RFC0286, December 1971,
              <https://www.rfc-editor.org/info/rfc286>.

   [RFC0313]  O'Sullivan, T., "Computer based instruction", RFC 313,
              DOI 10.17487/RFC0313, March 1972,
              <https://www.rfc-editor.org/info/rfc313>.



ten Oever               Expires November 17, 2019              [Page 13]


Internet-Draft                   politix                        May 2019


   [RFC0316]  McKay, D. and A. Mullery, "ARPA Network Data Management
              Working Group", RFC 316, DOI 10.17487/RFC0316, February
              1972, <https://www.rfc-editor.org/info/rfc316>.

   [RFC0542]  Neigus, N., "File Transfer Protocol", RFC 542,
              DOI 10.17487/RFC0542, August 1973,
              <https://www.rfc-editor.org/info/rfc542>.

   [RFC0549]  Michener, J., "Minutes of Network Graphics Group meeting,
              15-17 July 1973", RFC 549, DOI 10.17487/RFC0549, July
              1973, <https://www.rfc-editor.org/info/rfc549>.

   [RFC0613]  McKenzie, A., "Network connectivity: A response to RFC
              603", RFC 613, DOI 10.17487/RFC0613, January 1974,
              <https://www.rfc-editor.org/info/rfc613>.

   [RFC1097]  Miller, B., "Telnet subliminal-message option", RFC 1097,
              DOI 10.17487/RFC1097, April 1989,
              <https://www.rfc-editor.org/info/rfc1097>.

   [RFC1958]  Carpenter, B., Ed., "Architectural Principles of the
              Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996,
              <https://www.rfc-editor.org/info/rfc1958>.

   [RFC2026]  Bradner, S., "The Internet Standards Process -- Revision
              3", BCP 9, RFC 2026, DOI 10.17487/RFC2026, October 1996,
              <https://www.rfc-editor.org/info/rfc2026>.

   [RFC2804]  IAB and IESG, "IETF Policy on Wiretapping", RFC 2804,
              DOI 10.17487/RFC2804, May 2000,
              <https://www.rfc-editor.org/info/rfc2804>.

   [RFC3552]  Rescorla, E. and B. Korver, "Guidelines for Writing RFC
              Text on Security Considerations", BCP 72, RFC 3552,
              DOI 10.17487/RFC3552, July 2003,
              <https://www.rfc-editor.org/info/rfc3552>.

   [RFC3935]  Alvestrand, H., "A Mission Statement for the IETF",
              BCP 95, RFC 3935, DOI 10.17487/RFC3935, October 2004,
              <https://www.rfc-editor.org/info/rfc3935>.

   [RFC5218]  Thaler, D. and B. Aboba, "What Makes for a Successful
              Protocol?", RFC 5218, DOI 10.17487/RFC5218, July 2008,
              <https://www.rfc-editor.org/info/rfc5218>.







ten Oever               Expires November 17, 2019              [Page 14]


Internet-Draft                   politix                        May 2019


   [RFC6973]  Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
              Morris, J., Hansen, M., and R. Smith, "Privacy
              Considerations for Internet Protocols", RFC 6973,
              DOI 10.17487/RFC6973, July 2013,
              <https://www.rfc-editor.org/info/rfc6973>.

   [RFC7704]  Crocker, D. and N. Clark, "An IETF with Much Diversity and
              Professional Conduct", RFC 7704, DOI 10.17487/RFC7704,
              November 2015, <https://www.rfc-editor.org/info/rfc7704>.

   [RFC7776]  Resnick, P. and A. Farrel, "IETF Anti-Harassment
              Procedures", BCP 25, RFC 7776, DOI 10.17487/RFC7776, March
              2016, <https://www.rfc-editor.org/info/rfc7776>.

   [RFC8280]  ten Oever, N. and C. Cath, "Research into Human Rights
              Protocol Considerations", RFC 8280, DOI 10.17487/RFC8280,
              October 2017, <https://www.rfc-editor.org/info/rfc8280>.

   [RogersEden]
              Rogers, M. and G. Eden, "The Snowden Disclosures,
              Technical Standards, and the Making of Surveillance
              Infrastructures", International Journal of Communication
              11(2017), 802-823 , 2017,
              <http://ijoc.org/index.php/ijoc/article/view/5525/1941>.

   [Russell]  Russell, A., "Open standards and the digital age: History,
              ideology, and networks", Cambridge, UK: Cambridge
              University Press , 2014.

   [Sisson]   Sisson, D., "Standards and Protocols", 2000,
              <https://philosophe.com/design/standards/>.

   [UNGP]     Ruggie, J. and United Nations, "United Nations Guiding
              Principles for Business and Human Rights", 2011,
              <http://www.ohchr.org/Documents/Publications/
              GuidingPrinciplesBusinessHR_EN.pdf>.

   [Webster]  Webster, J., "Networks of Collaboration or Conflict? The
              Development of EDI", The social shaping of inter-
              organizational IT systems and data interchange, eds: I.
              McLougling & D. Mason, European Commission PICT/COST A4 ,
              1995.

   [Winner]   Winner, L., "Upon opening the black box and finding it
              empty: Social constructivism and the philosophy of
              technology", Science, Technology, and Human Values 18 (3)
              p. 362-378 , 1993.




ten Oever               Expires November 17, 2019              [Page 15]


Internet-Draft                   politix                        May 2019


   [Woolgar]  Woolgar, S., "Configuring the user: the case of usability
              trials", A sociology of monsters. Essays on power,
              technology and dominatior, ed: J. Law, Routeledge p.
              57-102. , 1991.

11.2.  URIs

   [1] mailto:hrpc@ietf.org

   [2] https://www.irtf.org/mailman/listinfo/hrpc

   [3] https://www.irtf.org/mail-archive/web/hrpc/current/index.html

Author's Address

   Niels ten Oever
   University of Amsterdam

   EMail: mail@nielstenoever.net
































ten Oever               Expires November 17, 2019              [Page 16]


Html markup produced by rfcmarkup 1.129d, available from https://tools.ietf.org/tools/rfcmarkup/