compassion, collaboration & cooperation iN transistion
Barlow's declaration, addressed to the "Governments of the Industrial World, you weary giants of flesh and steel," represented one man's disgust with politicians who were trying not so much to legislate a new medium (about which they knew nothing), but rather to appear to be legislating. Barlow, paying homage to the ideals of Thomas Jefferson and the other Founding Fathers, declared the Internet off-limits to the governments of the physical world, and promised not a violent revolution but a war of attrition.
"You have no moral right to rule us," Barlow wrote, "nor do you
possess any methods of enforcement we have true reason to fear."
One thing all this legislating has succeeded in doing has been to solidify resistance among the increasingly numerous, wealthy and powerful residents of what Barlow called the "civilization of the Mind." The declaration, or rather the CDA, launched what we might think of as the other Information Revolution—the one that struggles to maintain the political independence of the internet.
Today's revolutionaries lobby against bad laws and bad judicial decisions through not-for-profit organizations including the EFF, the Electronic Privacy Information Center and the ACLU.
They define and operate their own quasi-governments—the governments of open source, of peer-to-peer, of Creative Commons and the blogosphere. They stage acts of civil disobedience and sometimes outright revolt, ignoring threats of enforcement made against them by private and public
enforcers from the world of "flesh and steel." The information revolutionaries can't always hide in the bits, and when captured, many have been dealt with severely. Companies such as MP3.com, Napster and Netscape are either gone or unrecognizable. Identity thieves, spammers, hackers and copyright pirates are picked off individually by governments and corporations. But even before their bodies are carried from the field, ten replacements, even more resistant to the antiviral agents of the physical world, appear, spread and take hold.
Well, here we go again. A few weeks ago, President Bush signed into law a reauthorization of the innocently named Violence Against Women Act, which, like the Telecommunications Act exactly ten years earlier, has hidden inside it an explosive device aimed at the First Amendment. Section 113 of VAWA, which claims to deal with the new crime of "cyberstalking," modifies the exact same section of U.S. telecommunications law, 47 U.S.C. § 223, the CDA tried and failed to change.
Where the CDA outlawed "indecency," the cyberstalking provision has made it a crime to use the Internet to communicate without disclosing your identity and with the "intent to annoy." Think of it as CDA II.
CDA II is one of the worst statutes I've ever read. It applies to any "device or software" that is capable of communicating over the Internet, but not necessarily one that is being used in that way. As one of my more devious students has pointed out, CDA II, in theory, would apply if he threw his PDA at me from the back row of class. Even if he missed me—even if I didn't realize he'd thrown it—he could be looking at two years in a federal prison.
And what does it mean to disclose one's identity in an electronic communication? (CDA II grafts itself onto an earlier provision that applies to obscene phone calls where the caller doesn't give his or her name.) Does my e-mail address identify me? My chat-profile name? Or, to avoid liability, do I need to include my name and address in every reply I post to your (dumb) blog?
The definition of "Internet" the new law uses may also have unintended consequences. It references an older law that limits "the Internet" to software and devices that use the TCP/IP protocol, or its successors or predecessors. Much of what today passes through electronic communications, and which the drafters probably intended to regulate, is arguably outside that definition.
It's important to understand what CDA II does not try to do. It does not criminalize communications that some recipient finds annoying, or which might annoy some hypothetical thin-skinned reader. The sender must intend to annoy (even if she fails), and as a criminal sanction that intent must be proven beyond a reasonable doubt. And so long as you identify yourself in the process, you may annoy with complete abandon.
Popular and trade media reports of CDA II have made some embarrassing mistakes of legal interpretation, but their basic message is right—this provision, poorly drafted and full of ambiguities as to its meaning, application and enforcement, attempts to criminalize what is almost assuredly protected speech. Just like the CDA.
But aside from some ranting on Web sites (some of it potentially violating the new law!), the revolutionaries have said almost nothing about CDA II. Ten years after "dumping some tea in the virtual harbor," Barlow hasn't issued a statement on the cyberstalking provision. When I asked him why, he told me, sounding a little weary himself, "All I can say is that some things never change."
Or maybe there's no need to rally the troops. No doubt lawsuits to void CDA II are already being drafted. More to the point, the "weary giants of flesh and steel" aren't the real threat anymore. The real threat to the Internet comes from within, from viruses and malicious hacking, and from foolish and greedy individuals and companies whose efforts to exploit the value-generating engine of the Internet sometimes distract and sometimes stall the machinery, though so far, at least, they haven't stopped it.
Congress, meanwhile, grows increasingly shrill and increasingly incoherent in its efforts to police the new world. It's the madness of King George. "
Larry Downes is Associate Dean of the UC-Berkeley School of Information Management and Systems. He is the author of Unleashing the Killer App - the ground-breaking E-commerce best seller for which Nicholas Negroponte wrote the fprward - and The Strategy Machine. His next column will appear in May.
Views: 321
Tags:
You can view it as a technology race or a joint venture in the common interest. It hardly matters which. If the Chinese can crack thorium, the world will need less oil, coal, and gas than feared. Wind turbines will vanish from our landscape. There will less risk of a global energy crunch, less risk of resource wars, and less risk of a climate tipping point.
BECAUSE of its lightness and relatively large surface area, aerographite could enable the creation of much lighter lithium-ion batteries -
These would be especially useful to the transportation sector as well as mobile devices!!!
Tim Cook told the Xinhua news agency: “China is currently our second largest market.
I believe it will become our first. I believe strongly that it will.”
Mr Cook, who was in Beijing to meet regulators and telecoms companies, did not give any indication of when China was likely to surpass America as the company’s biggest revenue source, but his comments illuminate how important China has become to the iPad and iPhone maker.
Apple’s devices are hugely popular in China, and the company’s sales in the country doubled in 2010 and 2011. However, growth has slowed over the last year sparking concern amongst investors.
PC sales fall off a cliff - steepest quarterly decline on record reported
The full extent of the decline of the PC industry has been made clear in the latest quarterly analysis from IDC, which revealed a near 14pc drop in the number of PCs sold in the first quarter of this year compared with last year.
AS reported above Steve Jobs said - LESS PEOPLE WILL NEED THEM
Analysts are going to have to change the way they account for serve....
The very definition of "server" is changing from "box" to "node." Google, Facebook and
AWS don't buy boxes; they buy nodes, and they buy them by the truckload.
Robert Cathey
“What will the future PC look like and what hardware will
dominate computer development over the coming years?”
© 2024 Created by Michael Grove. Powered by
| delete
In the emerging information-sharing, open-source culture of the Web, people expect to share what they know and be engaged in a conversation. They expect to learn from a huge range of sources, many informal and expert by experience, rather than by title.
Michael Skoler
| delete
Welcome to what is quickly becoming the Hyperconnected World - a new era in communications where anything that would benefit from being connected - WILL BE connected to the network - which has become the largest and most complex machine mankind has ever built.
Nortel - Hyperconnectivity: an unstoppable force of change
The other information revolution, based as it is on the gift of the world wide web to the people, to provide ALL of these stories of experience of cooperation and collaboration of ..., for the mutual benefit of the peoples, IS now established as a result of an infrastructure which has become the machine which IS US and using US to potentially establish the most appropriate new order environment.
As has always happened throughout history, however, those that control the infrastructure of our inter-network of networks want to make more profits from that infrastructure as a result of implementing their own translation of the old order model based on the infranet initiative. So be it. BUT this time around the very people who are about to start funding those increased profits, have the opportunity to establish from the outset, a promise from their masters that a proportion of the profits be directed to the new order environmentally sustainable future of their children and their children’s children, NOT just in line with the TAX SLAVE STATUS which the old order model requires of them.
WE SHALL ALL have to start rethinking LOVE, FAMILY and OURSELVES and that WE R NOT THE WEB … WE are the HUB of the WEB
| delete
ALL that WE KNOW - ALL that WE ARE …
comes from the way our neurons are connected … said Tim Berners-Lee
“Research and education have become like motherhood and apple pie; harmless, wholesome and completely unobjectionable …
IT, [therefore], behoves us to develop a more reflective and qualified
view about the value of knowledge”
Nick Bostrum