compassion, collaboration & cooperation iN transistion
Barlow's declaration, addressed to the "Governments of the Industrial World, you weary giants of flesh and steel," represented one man's disgust with politicians who were trying not so much to legislate a new medium (about which they knew nothing), but rather to appear to be legislating. Barlow, paying homage to the ideals of Thomas Jefferson and the other Founding Fathers, declared the Internet off-limits to the governments of the physical world, and promised not a violent revolution but a war of attrition.
"You have no moral right to rule us," Barlow wrote, "nor do you
possess any methods of enforcement we have true reason to fear."
One thing all this legislating has succeeded in doing has been to solidify resistance among the increasingly numerous, wealthy and powerful residents of what Barlow called the "civilization of the Mind." The declaration, or rather the CDA, launched what we might think of as the other Information Revolution—the one that struggles to maintain the political independence of the internet.
Today's revolutionaries lobby against bad laws and bad judicial decisions through not-for-profit organizations including the EFF, the Electronic Privacy Information Center and the ACLU.
They define and operate their own quasi-governments—the governments of open source, of peer-to-peer, of Creative Commons and the blogosphere. They stage acts of civil disobedience and sometimes outright revolt, ignoring threats of enforcement made against them by private and public
enforcers from the world of "flesh and steel." The information revolutionaries can't always hide in the bits, and when captured, many have been dealt with severely. Companies such as MP3.com, Napster and Netscape are either gone or unrecognizable. Identity thieves, spammers, hackers and copyright pirates are picked off individually by governments and corporations. But even before their bodies are carried from the field, ten replacements, even more resistant to the antiviral agents of the physical world, appear, spread and take hold.
Well, here we go again. A few weeks ago, President Bush signed into law a reauthorization of the innocently named Violence Against Women Act, which, like the Telecommunications Act exactly ten years earlier, has hidden inside it an explosive device aimed at the First Amendment. Section 113 of VAWA, which claims to deal with the new crime of "cyberstalking," modifies the exact same section of U.S. telecommunications law, 47 U.S.C. § 223, the CDA tried and failed to change.
Where the CDA outlawed "indecency," the cyberstalking provision has made it a crime to use the Internet to communicate without disclosing your identity and with the "intent to annoy." Think of it as CDA II.
CDA II is one of the worst statutes I've ever read. It applies to any "device or software" that is capable of communicating over the Internet, but not necessarily one that is being used in that way. As one of my more devious students has pointed out, CDA II, in theory, would apply if he threw his PDA at me from the back row of class. Even if he missed me—even if I didn't realize he'd thrown it—he could be looking at two years in a federal prison.
And what does it mean to disclose one's identity in an electronic communication? (CDA II grafts itself onto an earlier provision that applies to obscene phone calls where the caller doesn't give his or her name.) Does my e-mail address identify me? My chat-profile name? Or, to avoid liability, do I need to include my name and address in every reply I post to your (dumb) blog?
The definition of "Internet" the new law uses may also have unintended consequences. It references an older law that limits "the Internet" to software and devices that use the TCP/IP protocol, or its successors or predecessors. Much of what today passes through electronic communications, and which the drafters probably intended to regulate, is arguably outside that definition.
It's important to understand what CDA II does not try to do. It does not criminalize communications that some recipient finds annoying, or which might annoy some hypothetical thin-skinned reader. The sender must intend to annoy (even if she fails), and as a criminal sanction that intent must be proven beyond a reasonable doubt. And so long as you identify yourself in the process, you may annoy with complete abandon.
Popular and trade media reports of CDA II have made some embarrassing mistakes of legal interpretation, but their basic message is right—this provision, poorly drafted and full of ambiguities as to its meaning, application and enforcement, attempts to criminalize what is almost assuredly protected speech. Just like the CDA.
But aside from some ranting on Web sites (some of it potentially violating the new law!), the revolutionaries have said almost nothing about CDA II. Ten years after "dumping some tea in the virtual harbor," Barlow hasn't issued a statement on the cyberstalking provision. When I asked him why, he told me, sounding a little weary himself, "All I can say is that some things never change."
Or maybe there's no need to rally the troops. No doubt lawsuits to void CDA II are already being drafted. More to the point, the "weary giants of flesh and steel" aren't the real threat anymore. The real threat to the Internet comes from within, from viruses and malicious hacking, and from foolish and greedy individuals and companies whose efforts to exploit the value-generating engine of the Internet sometimes distract and sometimes stall the machinery, though so far, at least, they haven't stopped it.
Congress, meanwhile, grows increasingly shrill and increasingly incoherent in its efforts to police the new world. It's the madness of King George. "
Larry Downes is Associate Dean of the UC-Berkeley School of Information Management and Systems. He is the author of Unleashing the Killer App - the ground-breaking E-commerce best seller for which Nicholas Negroponte wrote the fprward - and The Strategy Machine. His next column will appear in May.
The world now passing away consisted of business systems dominated by computer servers
and personal computers. The new one subsumes these into cloud computing and devices like
smartphones and tablets. The inability of companies like Microsoft and Dell to cope quickly enough
with this change led to their current problems. The steady, thorough way that companies like
Amazon and Salesforce have used the new technology to go after their elders’ business is what
makes them contenders.
"The corporations involved in this almost fantastical deployment of the machines and
communications infrastructure that we now rely on profited for themselves and their
shareholders, and certainly produced social and economic benefit around the world.
Those efforts were and are so profound in influence as to transform human civilization itself.
That is the Information Revolution, and it is nothing short of astonishing.
So it is safe to say that all these players in the Information Revolution — the enterprises that
created it — have engendered almost immeasurable social benefit by way of connecting people
of the world together and giving us opportunity to communicate with each other, begin to
understand each other, and if we want, try to help each other."
THIS REPORT is the latest research report in a sustained effort throughout 2014 by the
Pew Research Center Internet Project to mark the 25th anniversary of the creation of
the World Wide Web by Sir Tim Berners-Lee (The Web at 25).
Such figures have also regularly called for his execution, for quite literally stringing him up from
the old oak tree and letting him dangle in the breeze. Theirs has been a bloodcurdling collective
performance that gives the word “visceral” new meaning.
Such a response to the way Snowden released batches of NSA documents to Glenn Greenwald,
filmmaker Laura Poitras, and the Washington Post’s Barton Gellman calls for explanation.
Here's mine: the NSA’s goal in creating a global surveillance state was either utopian or dystopian
(depending on your point of view), but in either case, breathtakingly totalistic. Its top officials meant
to sweep up every electronic or online way one human being can communicate with others, and to
develop the capability to surveil and track every inhabitant of the planet. From German Chancellor
Angela Merkel and Brazilian President Dilma Rousseff to peasants with cell phones in the
backlands of Afghanistan (not to speak of American citizens anywhere), no one was to be off the
hook. Conceptually, there would be no exceptions.
AND the remarkable thing is how close the agency came to achieving this.
The Facebook whistleblower whose revelations have tipped the
social media giant into crisis has launched a stinging new criticism
of Mark Zuckerberg, saying he has not shown any readiness to
protect the public from the harm his company is causing.
Frances Haugen told the Observer that Facebook’s founder and
chief executive had not displayed a desire to run the company
in a way that shields the public from the consequences of
Dan Milmo - The Guardian.
Add a Comment
© 2023 Created by Michael Grove. Powered by
In the emerging information-sharing, open-source culture of the Web, people expect to share what they know and be engaged in a conversation. They expect to learn from a huge range of sources, many informal and expert by experience, rather than by title.
Welcome to what is quickly becoming the Hyperconnected World - a new era in communications where anything that would benefit from being connected - WILL BE connected to the network - which has become the largest and most complex machine mankind has ever built.
Nortel - Hyperconnectivity: an unstoppable force of change
The other information revolution, based as it is on the gift of the world wide web to the people, to provide ALL of these stories of experience of cooperation and collaboration of ..., for the mutual benefit of the peoples, IS now established as a result of an infrastructure which has become the machine which IS US and using US to potentially establish the most appropriate new order environment.
As has always happened throughout history, however, those that control the infrastructure of our inter-network of networks want to make more profits from that infrastructure as a result of implementing their own translation of the old order model based on the infranet initiative. So be it. BUT this time around the very people who are about to start funding those increased profits, have the opportunity to establish from the outset, a promise from their masters that a proportion of the profits be directed to the new order environmentally sustainable future of their children and their children’s children, NOT just in line with the TAX SLAVE STATUS which the old order model requires of them.
WE SHALL ALL have to start rethinking LOVE, FAMILY and OURSELVES and that WE R NOT THE WEB … WE are the HUB of the WEB
ALL that WE KNOW - ALL that WE ARE …
comes from the way our neurons are connected … said Tim Berners-Lee
“Research and education have become like motherhood and apple pie; harmless, wholesome and completely unobjectionable …
IT, [therefore], behoves us to develop a more reflective and qualified
view about the value of knowledge”