Computers, Privacy & the Constitution

View   r1
AdrianNtwatwaFirstPaper 1 - 06 Mar 2015 - Main.AdrianNtwatwa
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"
A Zero-Zero Game

-- By AdrianNtwatwa - 06 Mar 2015

Over the past weeks, a common theme in our class discussions has been the zero-sum nature of the future of freedom of data flow. On one side is the specter of complete an inviolable censorship of all data, as espoused by Xi Jinping of the People’s Republic of China. And on the other is the prospect of absolute unencumbered freedom of data flow, a digital extension of the American creed that is freedom of speech. The conclusion of this thesis is a very fatalistic one in which only one of the two outcomes is possible. There is no middle ground. There is no 0.5 in this binary equation. Neither can live while the other survives, to quote a fictional philosopher. Based on the tenor of our classroom contributions, I would say this hypothesis has been hard for many to take. In fact, it has come to represent many people’s view of the very Professor that espouses it: bitingly stoic, constantly challenged, and only accepted arguendo. I too will now oppose this thesis, but not for the reason many before me have done so.

Section I

According to Eben, the People’s Republic of China wants to universally throttle the freedom of data flow. On China’s desire to curb the freedom of data flow, I think we can all agree the proof is in the pudding. I will not labor that particular point by citing statistics on what we all know is the deplorable nature of internet freedoms in China. To assert that China would like to extend its dominance of data flow outside of its sovereign borders to the rest of the world is not so much a logical leap as it is a natural next step.

On the other hand we have the United States, a lighthouse of liberty shining the beacon of freedom to bring all others safely ashore. To many in the United States, the phrase “freedom of data flow” is simply a placeholder for “freedom of speech”. And that which we call the 1st Amendment by any other name should still grant just as much freedom. So just as “bad speech” and “good speech” are afforded the same protection (I am admittedly oversimplifying here), so are revenge porn and charity websites afforded the same legal protections.

This is where most of the classroom would disagree with Eben, arguing that the first amendment does not abide child pornographers and their ilk. However, Eben’s point (if I understand it correctly) is that you cannot have your cake and eat it too. You (Congress) cannot calibrate the First Amendment to censor one form of data freedom while allowing others. To do so would contravene the one thing the First Amendment specifically told Congress to do vis-à-vis the abridgment of freedom of speech, namely to “…make no law…” According to Eben, were Congress to make such laws, it would become nothing more than the ugly more gridlocked stepbrother of the Politburo.

Section II

My argument is not that there ought to be some reasonable middle ground whereby we can police the internet pedophiles while still permitting “good” freedom of data. My argument is that one premise on which Eben’s argument stands – that the United States is trying to achieve an unparalleled level of free access to data for all – is false. On the contrary, I believe the United States government is trying its very best to achieve freedom of access to information for itself, not for its citizens or the citizens of the world, and at the expense of the privacy of these very people.

When we discuss China, the tenets of their internet tyranny seem threefold; a belief that all information belongs to the government, the resultant regulation of data (as is the right of the government to do so with the information it believes it owns), and the consequent need to monitor all data for security purposes. In the United States, we find the need for freedom of data flow. Additionally, there is a strong belief that all information belongs to the people unless they knowingly and purposefully afford it to the government. And finally, there is an abiding sentiment that regulation of data flow should be minimal if at all, as evidenced by the recent turmoil regarding net neutrality.

However, the United States government, much like the People’s Republic, strongly believes in the need to monitor data flow for security purposes. The exact nature of these security purposes changes from day to day and is practically always above most citizens’ clearance level. Just last week it was confirmed that the NSA (and GCHQ) launched attacks on Gemalto’s computer systems in an attempt to access data in the possession of the SIM card giant. Meanwhile, with its right hand, the United States vehemently criticized China’s plan to force all tech companies that wished to operate in the communist nation to place backdoors into their software and share the encryption keys with the Chinese government.

I can fault Xi Jinping’s administration for many things but never for its lack of consistency. The United States government on the other hand preaches freedom of data for all while practicing an invasive data monitoring that belies its true desire to access any and all data available at the cost of all privacy concerns. In the land of the free, not only does privacy have to rise when security interests enter the room, it often has to leave the room entirely. So my question is this: how can we imagine a future where only one of these two nations prevails? How can we envisage a world where one will shepherd us into a future of either stark data policing or of laissez faire information flow? How can we picture such a future when not even the government espousing the latter is buying what it’s selling? It does not seem to me that this is a zero-sum game at all. The calculus simply does not add up: the limit as we approach either future is always zero.

You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 1r1 - 06 Mar 2015 - 21:54:39 - AdrianNtwatwa
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM