SlideShare a Scribd company logo
THE MAN IN THE MIDDLE
ERATE, FILTERING, AND CYBER-SECURITY
Office for Intellectual Freedom
American Library Association
Sept. 15, 2016
The issue
• New money!
• ALA’s history with filtering
• Cybersecurity issues
• The FCC
• Questions
The panelists
• Bob Bocher, Fellow, ALA's Office for Information
Technology Policy
• Doug Archer, Peace Studies and Global Affairs librarian
at University of Notre Dame’s Hesburgh Libraries
• Michael Robinson, Chair of the ALA's Intellectual
Freedom Privacy Subcommittee and Head of Systems at the
Consortium Library at the University of Alaska Anchorage's
Consortium Library
• Deborah Caldwell-Stone, Deputy Director of
the ALA’s Office for Intellectual Freedom
• Moderator: Jamie LaRue, Director, ALA’s Office
for Intellectual Freedom
Bob Bocher
• Fellow, ALA Office for Information
Technology Policy
• Wisconsin State Library E-rate and
Broadband Support Team
E-rate and Filtering: An Overview
• E-rate provides discounts of 20-90% on:
– Telecommunication services (Category 1)
– Internet access (Category 1)
– Internal connections (Category 2)
• Filtering mandated by CIPA applies to:
– Internet access
– Internal connections
– But not telecommunications
Impact of 2014 FCC E-rate Reforms
• Focus on broadband
– 62% of libraries had <10Mbps
– 41% of libraries had insufficient
broadband
– POTS discounts phased-out
• Increase funding from $2.4 to $3.9 billion
– Ensures all applications are funded
• Past fund limits meant no internal
connections were funded
High-speed broadband is
critical for 21st century
libraries. With it patrons
can participate in the digital
world. --FCC E-rate Order
It is in the national interest
to increase funding for
library broadband capacity.
-- ALA comments to FCC
E-rate Reforms And Filtering
• Lost: POTS discounts
• Gained: Sufficient funding
• Result: Some libraries may review
use of filters
• OITP working with SLD, FCC
– Review CIPA requirements
• Focus on ways to disable filter
– CIPA summary in July 21 SLD
News Brief
FCC rules when to disable the
filter would likely be overbroad
and imprecise, potentially
chilling speech. We leave this
to the local library. --FCC CIPA
regulations, April 2001.
Doug Archer
• Peace Studies and Global Affairs
librarian at University of Notre Dame’s
Hesburgh Libraries
ALA & Filters -- THEN
• ALA opposed filters in libraries because they
– Over blocked constitutionally protect speech
– Under blocked their stated target
• ALA opposed CIPA
– Facial challenge: unconstitutional on its face
– SCOTUS: constitutional if unblocking possible
• Only required blocking of images (plus a policy)
• Only if one wanted federal funds
ALA & Filters -- NOW
• ALA still “cannot” recommend filters
– Filters continue to over and under block
– See: Batch, Kristen R. Fencing Out Knowledge.
ALA OITP & OIF, Policy Brief No. 5, June 2014
• ALA supports libraries that don’t filter
• ALA understands that some libraries feel that
they must filter
– For local considerations (e.g., local politics)
– For the money (e.g., need it to have any access)
Minimizing the Negatives
• If a library feels that it must use filters,
ALA recommends that it:
– Do its best to minimize the impact of filters by
• Selecting the most flexible filter possible
• Maintaining as much local control as possible
• Using the lowest settings possible
– That is, block as little as possible consistent with
CIPA
– Do not be tempted to block “offensive” content
just because it’s easy to do
Michael
Robinson
• Chair of the ALA's Intellectual Freedom
Privacy Subcommittee and
• Head of Systems at the Consortium Library at
the University of Alaska Anchorage's
Consortium Library
The Man in the Middle
Unfiltered
Filtered
Browser Filter
Website
Website
Browser
Techniques for Content Filtering
• Block or allow based on domain name or URL
– i.e. blacklists or whitelists
• Block or allow protocols / ports
– http, https, ftp, ssh, proxies, streaming, etc
• Inspect content of web page to block or allow
– Keywords, phrases, or patterns in content
– Types of embedded content (media, scripts, etc)
– Source of embedded content (e.g. YouTube)
– Metadata of embedded content (e.g. jpg name)
HTTPS
• Encrypts communication between browser
and website
• Contents of the web page is encrypted
• Domain name is unencrypted
• But rest of URL path is encrypted, i.e. what
specific section, page or file is requested
https://somewebsite.com/
HTTPS
Unfiltered
Filtered
Browser
Filter
Website
Website
Browser
Encrypted Content
Encrypted Content & URLs
HTTPS & Content Filtering
• Block or allow based on domain name or URL
– i.e. blacklists or whitelists
• Block or allow protocols / ports
– http, https, ftp, ssh, proxies, streaming, etc
• Inspect content of web page to block or allow
– Keywords, phrases, or patterns in content
– Types of embedded content (media, scripts, etc)
– Source of embedded content (e.g. YouTube)
– Metadata of embedded content (e.g. jpg name)
HTTPS Decryption
Unfiltered
Filtered
Browser Filter
Website
Website
Browser
Encrypted
Encrypted Content
Encrypted
HTTPS Decryption
• Filter presents certificates pretending to be
requested HTTPS website
• Activities on supposedly secure websites can
now be monitored, inspected and logged
– Financial, commercial, legal, medical, educational
– Usernames, passwords, account numbers, PII
• Technically qualifies as a Man-in-the-Middle
Attack although that is not the intent
Movement to Encrypt the Web
• Recent study 50% of Web encrypted
• Presents challenges to content filtering
– HTTPS “breaks” filtering
– But decryption compromises privacy & security
• Optics are bad for libraries
– Is filtering only on domain name good enough?
– If decryption is enabled, what does user
notification look?
We can see and record all your activities on secure
websites but promise we won’t do anything bad
Deborah
Caldwell-
Stone
• Deputy Director of the ALA’s Office for
Intellectual Freedom
What CIPA Requires
• the filter must be set to
block visual images that are
obscene or child
pornography.
Adults
• the filter must be set to
block visual images that are
obscene, child pornography
or harmful to minors.
Minors
What CIPA Does NOT Require
Blocking access to narratives or other text-
based material.
Blocking access to controversial viewpoints or
subjects.
Blocking access to social media sites or search
tools.
Tracking or monitoring users' web surfing habits.
Defining Illegal Speech
Two categories of speech receive no
First Amendment protection:
• Obscenity
• Child pornography
A third category of protected speech
for adults is unprotected for persons
under 17
• "harmful to minors" or "obscene as to
minors"
The Federal Communications Commission is
responsible for implementing and enforcing
the provisions of CIPA.
• The FCC has given libraries wide
latitude on how to implement CIPA's
requirements.
• Enforcement is a civil, administrative
matter – not a criminal proceeding.
“Maximum Flexibility”
• "We have attempted to craft our rules in the most
practical way possible, while providing libraries
with maximum flexibility. We conclude that local
authorities are best situated to choose the
technology measures and Internet safety policies
most appropriate for their communities.”
• Allows libraries that must filter opportunities to
innovate within the boundaries of the CIPA statute
Panelist comments?
Audience questions
Summary
• E-rate changes may give some libraries
incentive to review the filtering issue
• Money is good.
• Values are forever.
Resources
• SLD CIPA Information --and -- July 21, 2016 CIPA News Brief
– http://www.usac.org/sl/applicants/step05/cipa.aspx
– http://www.universalservice.org/sl/tools/news-briefs/preview.aspx?id=709
• State E-rate Coordinators for Libraries
– http://www.ala.org/advocacy/e-rate-state-coordinators
• Batch, Kristen R. Fencing Out Knowledge: Impacts of the Children's Internet Protection Act 10
Years Later. Policy Brief No. 5, June 2014. ALA Office for Information Technology Policy and ALA
Office for Intellectual Freedom.
– http://connect.ala.org/files/cipa_report.pdf
• Filters and Filtering
– http://www.ala.org/advocacy/intfreedom/filtering
• Internet Filtering: An Interpretation of the Library Bill of Rights
– Adopted June 30, 2015, by the ALA Council.
– http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/internet-filtering
• This slide deck and related resources:
<hyperlink here>
QUESTIONS?

More Related Content

PPTX
Data for the Humanities
PDF
Blind Spots and Broken Links: Access to Government Information
PDF
The Web of Data: The W3C Semantic Web Initiative
PDF
Digital FDLP Louisiana GODORT 2012 slides+notes
PPTX
NISO Virtual Conference: The Semantic Web Coming of Age: Technologies and Imp...
PPTX
Oct 15 NISO Webinar: 21st Century Resource Sharing: Which Inter-Library Loan ...
ZIP
Linked Open Data in Libraries, Archives & Museums
PDF
The Challenge of Digital Sources in the Web Age: Common Tensions Across Three...
Data for the Humanities
Blind Spots and Broken Links: Access to Government Information
The Web of Data: The W3C Semantic Web Initiative
Digital FDLP Louisiana GODORT 2012 slides+notes
NISO Virtual Conference: The Semantic Web Coming of Age: Technologies and Imp...
Oct 15 NISO Webinar: 21st Century Resource Sharing: Which Inter-Library Loan ...
Linked Open Data in Libraries, Archives & Museums
The Challenge of Digital Sources in the Web Age: Common Tensions Across Three...

What's hot (20)

PPTX
Copyright Clearance for Genetics Books, A pilot project at the Wellcome Library
PPTX
NISO Webinar: Taking Your Website Wherever You Go: Delivering Great User Expe...
PPTX
Digital Odyssey 2015 - Open Collections
PDF
Halperin "The End of Library Ownership"
PPT
Cybercrime
PPTX
Ws spring 2014 rogers
PPTX
Research into Practice case study 2: Library linked data implementations an...
PDF
Preservation for all: the future of government documents and the “digital FDL...
PPTX
Annotated bib and research strategies
PPT
Broadband and Library Relevance
PDF
Morris "Supporting A Digital Sharing Ecosystem: Consortial Approaches to Owni...
PDF
Ellyssa Kroski Resume
PPTX
TREX 1001 Walker
PPTX
ENGL 1221 McManus
PPTX
Introduction to databases and metadata
PPTX
Forms of Innovation: Collaboration, Attribution, Access
PPTX
Anchorage public focus group web version
PDF
C01 silvia schenkolewski_retention_disposition
PPTX
C01 silvia schenkolewski_retention_disposition
PPTX
ENGL 1221 Writing Seminar
Copyright Clearance for Genetics Books, A pilot project at the Wellcome Library
NISO Webinar: Taking Your Website Wherever You Go: Delivering Great User Expe...
Digital Odyssey 2015 - Open Collections
Halperin "The End of Library Ownership"
Cybercrime
Ws spring 2014 rogers
Research into Practice case study 2: Library linked data implementations an...
Preservation for all: the future of government documents and the “digital FDL...
Annotated bib and research strategies
Broadband and Library Relevance
Morris "Supporting A Digital Sharing Ecosystem: Consortial Approaches to Owni...
Ellyssa Kroski Resume
TREX 1001 Walker
ENGL 1221 McManus
Introduction to databases and metadata
Forms of Innovation: Collaboration, Attribution, Access
Anchorage public focus group web version
C01 silvia schenkolewski_retention_disposition
C01 silvia schenkolewski_retention_disposition
ENGL 1221 Writing Seminar
Ad

Similar to Al Live: Filtering: The Man in the Middle (20)

PPT
Cosi Usage Data
PDF
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
PDF
Wetzel, Baish, Johnson, Reich, and Grant "Digital Preservation: Current Efforts"
PPTX
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
PDF
Slides anu talkwebarchivingaug2012
PDF
'Your Scholarship. Our World. Preserving the Long Tail' by Vicky Reich
PPTX
Digitization and public libraries
PPT
Straight Talk about the "B" Word: using the Edge benchmarks in your library
PPTX
Assessment & Marketing in Libraries
PPT
Marc and beyond: 3 Linked Data Choices
PPT
A Substitute for Conscience?
PPTX
NISO Virtual Conference: Web-Scale Discovery Services: Transforming Access to...
PPTX
Demography pro sem
PPTX
Collection Development, E-Resources, and Meeting the Needs of People with Dis...
PPTX
Web serachning tools & techniques
PPT
Cil06giltrud(1)
PPTX
Building the AAPB: Inter-Institutional Preservation and Access Workflows
PPTX
The digital closet 2014 - slideshare - aug 20
PPTX
How to get started on researching your m sc project
PPTX
Community Collaboration in the Creation of Digital Collections - 2015 OR Heri...
Cosi Usage Data
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Wetzel, Baish, Johnson, Reich, and Grant "Digital Preservation: Current Efforts"
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
Slides anu talkwebarchivingaug2012
'Your Scholarship. Our World. Preserving the Long Tail' by Vicky Reich
Digitization and public libraries
Straight Talk about the "B" Word: using the Edge benchmarks in your library
Assessment & Marketing in Libraries
Marc and beyond: 3 Linked Data Choices
A Substitute for Conscience?
NISO Virtual Conference: Web-Scale Discovery Services: Transforming Access to...
Demography pro sem
Collection Development, E-Resources, and Meeting the Needs of People with Dis...
Web serachning tools & techniques
Cil06giltrud(1)
Building the AAPB: Inter-Institutional Preservation and Access Workflows
The digital closet 2014 - slideshare - aug 20
How to get started on researching your m sc project
Community Collaboration in the Creation of Digital Collections - 2015 OR Heri...
Ad

More from ALATechSource (20)

PPT
Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)
PPTX
Dealing with Mental Health on the Front Lines: Part 1
PPT
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)
PDF
Using Visual Arts in Early Childhood Programming
PPTX
Serving Children with Autism Spectrum Disorder (Feb. 2019)
PPTX
Library Website Rehab: Promotional Webinar
PPTX
Taking STEAM Programs to the Next Level
PPTX
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)
PPT
Creating a Social Media Policy for Your Library (January 2019)
PPTX
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)
PPTX
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...
PPTX
Fake News, Real Concerns: Developing Information-Literate Students (December ...
PPTX
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
PPTX
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)
PPTX
Engaging Learners through Active Instruction and Assessment
PPTX
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)
PPTX
AL Live: What Do the Midterms Mean for Your Library? (November 2018)
PPTX
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)
PDF
Prepare for the Future: Tech Strategies You Need to Know (November 2018)
PPTX
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...
Liven Up Baby and Toddler Storytimes with Sign Language (March 2019)
Dealing with Mental Health on the Front Lines: Part 1
Serving Children with Autism Spectrum Disorder: Part 2 (Feb. 2019)
Using Visual Arts in Early Childhood Programming
Serving Children with Autism Spectrum Disorder (Feb. 2019)
Library Website Rehab: Promotional Webinar
Taking STEAM Programs to the Next Level
Creating a Digital Media Space for Today's Teens: Part 2 (Jan. 2019)
Creating a Social Media Policy for Your Library (January 2019)
Creating a Digital Media Space for Today's Teens: Part 1 (Jan. 2019)
Working with Individuals Affected by Homelessness: An Empathy-Driven Approach...
Fake News, Real Concerns: Developing Information-Literate Students (December ...
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 3 (Nov. 2018)
Engaging Learners through Active Instruction and Assessment
Library Director Bootcamp: Getting the Skills You Need, Part 2 (Nov. 2018)
AL Live: What Do the Midterms Mean for Your Library? (November 2018)
Library Director Bootcamp: Getting the Skills You Need, Part 1 (Nov. 2018)
Prepare for the Future: Tech Strategies You Need to Know (November 2018)
Write and Cite “Chicago Style”: Helping Students and Patrons Understand The C...

Recently uploaded (20)

DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
advance database management system book.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
What if we spent less time fighting change, and more time building what’s rig...
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Indian roads congress 037 - 2012 Flexible pavement
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
advance database management system book.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Chinmaya Tiranga quiz Grand Finale.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ChatGPT for Dummies - Pam Baker Ccesa007.pdf

Al Live: Filtering: The Man in the Middle

  • 1. THE MAN IN THE MIDDLE ERATE, FILTERING, AND CYBER-SECURITY Office for Intellectual Freedom American Library Association Sept. 15, 2016
  • 2. The issue • New money! • ALA’s history with filtering • Cybersecurity issues • The FCC • Questions
  • 3. The panelists • Bob Bocher, Fellow, ALA's Office for Information Technology Policy • Doug Archer, Peace Studies and Global Affairs librarian at University of Notre Dame’s Hesburgh Libraries • Michael Robinson, Chair of the ALA's Intellectual Freedom Privacy Subcommittee and Head of Systems at the Consortium Library at the University of Alaska Anchorage's Consortium Library • Deborah Caldwell-Stone, Deputy Director of the ALA’s Office for Intellectual Freedom • Moderator: Jamie LaRue, Director, ALA’s Office for Intellectual Freedom
  • 4. Bob Bocher • Fellow, ALA Office for Information Technology Policy • Wisconsin State Library E-rate and Broadband Support Team
  • 5. E-rate and Filtering: An Overview • E-rate provides discounts of 20-90% on: – Telecommunication services (Category 1) – Internet access (Category 1) – Internal connections (Category 2) • Filtering mandated by CIPA applies to: – Internet access – Internal connections – But not telecommunications
  • 6. Impact of 2014 FCC E-rate Reforms • Focus on broadband – 62% of libraries had <10Mbps – 41% of libraries had insufficient broadband – POTS discounts phased-out • Increase funding from $2.4 to $3.9 billion – Ensures all applications are funded • Past fund limits meant no internal connections were funded High-speed broadband is critical for 21st century libraries. With it patrons can participate in the digital world. --FCC E-rate Order It is in the national interest to increase funding for library broadband capacity. -- ALA comments to FCC
  • 7. E-rate Reforms And Filtering • Lost: POTS discounts • Gained: Sufficient funding • Result: Some libraries may review use of filters • OITP working with SLD, FCC – Review CIPA requirements • Focus on ways to disable filter – CIPA summary in July 21 SLD News Brief FCC rules when to disable the filter would likely be overbroad and imprecise, potentially chilling speech. We leave this to the local library. --FCC CIPA regulations, April 2001.
  • 8. Doug Archer • Peace Studies and Global Affairs librarian at University of Notre Dame’s Hesburgh Libraries
  • 9. ALA & Filters -- THEN • ALA opposed filters in libraries because they – Over blocked constitutionally protect speech – Under blocked their stated target • ALA opposed CIPA – Facial challenge: unconstitutional on its face – SCOTUS: constitutional if unblocking possible • Only required blocking of images (plus a policy) • Only if one wanted federal funds
  • 10. ALA & Filters -- NOW • ALA still “cannot” recommend filters – Filters continue to over and under block – See: Batch, Kristen R. Fencing Out Knowledge. ALA OITP & OIF, Policy Brief No. 5, June 2014 • ALA supports libraries that don’t filter • ALA understands that some libraries feel that they must filter – For local considerations (e.g., local politics) – For the money (e.g., need it to have any access)
  • 11. Minimizing the Negatives • If a library feels that it must use filters, ALA recommends that it: – Do its best to minimize the impact of filters by • Selecting the most flexible filter possible • Maintaining as much local control as possible • Using the lowest settings possible – That is, block as little as possible consistent with CIPA – Do not be tempted to block “offensive” content just because it’s easy to do
  • 12. Michael Robinson • Chair of the ALA's Intellectual Freedom Privacy Subcommittee and • Head of Systems at the Consortium Library at the University of Alaska Anchorage's Consortium Library
  • 13. The Man in the Middle Unfiltered Filtered Browser Filter Website Website Browser
  • 14. Techniques for Content Filtering • Block or allow based on domain name or URL – i.e. blacklists or whitelists • Block or allow protocols / ports – http, https, ftp, ssh, proxies, streaming, etc • Inspect content of web page to block or allow – Keywords, phrases, or patterns in content – Types of embedded content (media, scripts, etc) – Source of embedded content (e.g. YouTube) – Metadata of embedded content (e.g. jpg name)
  • 15. HTTPS • Encrypts communication between browser and website • Contents of the web page is encrypted • Domain name is unencrypted • But rest of URL path is encrypted, i.e. what specific section, page or file is requested https://somewebsite.com/
  • 17. HTTPS & Content Filtering • Block or allow based on domain name or URL – i.e. blacklists or whitelists • Block or allow protocols / ports – http, https, ftp, ssh, proxies, streaming, etc • Inspect content of web page to block or allow – Keywords, phrases, or patterns in content – Types of embedded content (media, scripts, etc) – Source of embedded content (e.g. YouTube) – Metadata of embedded content (e.g. jpg name)
  • 19. HTTPS Decryption • Filter presents certificates pretending to be requested HTTPS website • Activities on supposedly secure websites can now be monitored, inspected and logged – Financial, commercial, legal, medical, educational – Usernames, passwords, account numbers, PII • Technically qualifies as a Man-in-the-Middle Attack although that is not the intent
  • 20. Movement to Encrypt the Web • Recent study 50% of Web encrypted • Presents challenges to content filtering – HTTPS “breaks” filtering – But decryption compromises privacy & security • Optics are bad for libraries – Is filtering only on domain name good enough? – If decryption is enabled, what does user notification look? We can see and record all your activities on secure websites but promise we won’t do anything bad
  • 21. Deborah Caldwell- Stone • Deputy Director of the ALA’s Office for Intellectual Freedom
  • 22. What CIPA Requires • the filter must be set to block visual images that are obscene or child pornography. Adults • the filter must be set to block visual images that are obscene, child pornography or harmful to minors. Minors
  • 23. What CIPA Does NOT Require Blocking access to narratives or other text- based material. Blocking access to controversial viewpoints or subjects. Blocking access to social media sites or search tools. Tracking or monitoring users' web surfing habits.
  • 24. Defining Illegal Speech Two categories of speech receive no First Amendment protection: • Obscenity • Child pornography A third category of protected speech for adults is unprotected for persons under 17 • "harmful to minors" or "obscene as to minors"
  • 25. The Federal Communications Commission is responsible for implementing and enforcing the provisions of CIPA. • The FCC has given libraries wide latitude on how to implement CIPA's requirements. • Enforcement is a civil, administrative matter – not a criminal proceeding.
  • 26. “Maximum Flexibility” • "We have attempted to craft our rules in the most practical way possible, while providing libraries with maximum flexibility. We conclude that local authorities are best situated to choose the technology measures and Internet safety policies most appropriate for their communities.” • Allows libraries that must filter opportunities to innovate within the boundaries of the CIPA statute
  • 29. Summary • E-rate changes may give some libraries incentive to review the filtering issue • Money is good. • Values are forever.
  • 30. Resources • SLD CIPA Information --and -- July 21, 2016 CIPA News Brief – http://www.usac.org/sl/applicants/step05/cipa.aspx – http://www.universalservice.org/sl/tools/news-briefs/preview.aspx?id=709 • State E-rate Coordinators for Libraries – http://www.ala.org/advocacy/e-rate-state-coordinators • Batch, Kristen R. Fencing Out Knowledge: Impacts of the Children's Internet Protection Act 10 Years Later. Policy Brief No. 5, June 2014. ALA Office for Information Technology Policy and ALA Office for Intellectual Freedom. – http://connect.ala.org/files/cipa_report.pdf • Filters and Filtering – http://www.ala.org/advocacy/intfreedom/filtering • Internet Filtering: An Interpretation of the Library Bill of Rights – Adopted June 30, 2015, by the ALA Council. – http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/internet-filtering • This slide deck and related resources: <hyperlink here>

Editor's Notes

  • #5: Bob, your contact information again, and whatever you want to title your section.
  • #9: Doug, your contact information again, and whatever you want to title your section.
  • #13: Michael, your contact information again, and whatever you want to title your section.
  • #22: Deborah, your contact information again, and whatever you want to title your section.
  • #30: Summarize presentation content by restating the important points from the lessons. What do you want the audience to remember when they leave your presentation? Save your presentation to a video for easy distribution (To create a video, click the File tab, and then click Share.  Under File Types, click Create a Video.)
  • #31: Microsoft Confidential
  • #32: Microsoft Confidential