CYBERSPACE GOVERNANCE: Exploring constitutive principles and values, today and into the future

Gordon Crovitz, “Would-Be Internet Regulators Need Deleting,” The Wall Street Journal, December 9, 2012.

Terry Kramer, Remarks at the World Conference on Internet Telecommunications, Dubai, United Arab Emirates, December 13, 2012.

Rebecca MacKinnon, “The United Nations and the Internet: It’s Complicated,” Foreign Policy, August 8, 2012.

Robert McDowell, “The U.N. Threat to Internet Freedom,” The Wall Street Journal, February 21, 2012.

Andrew McLaughlin, “Should the U.N. Save the Internet?,” presented at Future Tense: Who Should Govern the Internet?, Washington, D.C., November 29, 2012.

Milton Mueller, “Rethinking America’s Dot-Com Hegemony (Response to Andrew McLaughlin),” presented at Future Tense: Who Should Govern the Internet?, Washington, D.C., November 29, 2012, 4:40 – 10:10.

Milton Mueller, “Threat Analysis of WCIT Part 2: Telecommunications Vs. Internet,” Internet Governance Project, June 7, 2012.


POLICING CYBERSPACE: Debating who should do the policing and under what conditions

Stewart Baker, “Anonymous Attacks Again,” Skating on Stilts, January 26, 2013.

Julien Demers and Nicholas Koutros, “Big Brother’s Shadow: Historical Decline in Electronic Surveillance by Canadian Federal Law Enforcement,” February 4, 2013.

Draft International Principles on Communications Surveillance and Human Rights,” Necessary and Proportionate.

Eric A. Fischer et al., “The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress,” Congressional Research Service, March 1, 2013.

Michael Geist, “Lawful Access is Dead (For Now),” Michael Geist, February 12, 2013.

Christopher Parsons, “Lawful Access and Data Preservation/Retention: Present Practices, Ongoing Harm, and Future Canadian Policies,” February 7, 2012.

Chris Soghoian, “New Documents Sheds Light on Government’s Ability to Search iPhones,” American Civil Liberties Union, February 26, 2013.


Probing the market for censorship, surveillance and computer network attack in a context of “attacking back”

John Arquilla, “Uncle Spam Wants You,” Foreign Policy, February 5, 2013.

Ron Deibert and Sarah McKune, “Teachers’ Pension Plan Invests in Internet Surveillance Firm,” Toronto Star, February 6, 2013.

Judy Dempsey, “An Attempt to Take Tools from Tyrants,” New York Times, February 18, 2013.

Herbert Lin, “Arms Control in Cyberspace: Challenges and Opportunities,” World Politics Review, March 6, 2012.

Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton, “You Only Click Twice: FinFisher’s Global Proliferation“, Citizen Lab, March 13, 2013.

Milton Mueller, “Technology As Symbol: Is Resistance to Surveillance Technology Being Misdirected?,” Internet Governance Project, December 20, 2011.

Milton Mueller, “Iran, Israel and DPI: The Misdirection of Resistance to Surveillance Technology Part 2,” Internet Governance Project, December 26, 2011.

Planet Blue Coat: Mapping Global Censorship and Surveillance Tool,” Citizen Lab, January 15, 2013.

John Sheldon, “The Case Against Cyber Arms Control,” World Politics Review, December 9, 2010.

Tom Simonite, “Welcome to the Malware-Industrial Complex,” MIT Technology Review, February 13, 2013.

John Steinbruner, “Prospects for Global Restraints on Cyberattack,” Arms Control Association, December 2011.

Ben Wagner, “Exporting Censorship and Surveillance Technology,” (The Hague: Hivos, 2012).

Jillian C. York, “When Sanctions Make Things Worse,” Al Jazeera, November 23, 2011.