Law in the Internet Society

View   r3  >  r2  ...
AndreiVoinigescuPaper1Internet20 3 - 13 Nov 2008 - Main.AndreiVoinigescu
Line: 1 to 1
 
META TOPICPARENT name="WebHome"

Internet 2.0: 6 Degrees of (Hardware) Separation

Line: 16 to 16
 We should not entrust the balancing process to politics as usual. That is to say, we should not allow it to devolve into a bargain between incumbent factions with the resources to capture the political process. We need real grass-roots deliberation. We need an internet architected to curtail the influence of the incumbents--a network where both ownership and control are maximally dispersed.
Changed:
<
<

How Technology has enhanced the power of incumbents

Code is Law
>
>

How Technological Change Threatens Democracy and the Rule of Law

 
Changed:
<
<
One Switch to Rule Them All
>
>
Lawrence Lessig has identified four mechanisms though which human behavior is controlled: laws, social norms, market forces, and physical architecture. Physical architecture is a far more powerful means of regulation than law: physical architecture creates self-enforcing ex-anti constraints, while law can only threaten ex-post punishment and requires a complex bureaucracy to enforce. Laws against drunk driving are less effective then breathalysers hooked to the ignition switch.
 
Added:
>
>
For activities conducted over networks, the code than controls the switches defines the physical architecture of the network. It prescribes what can and cannot be done on the network, which communications can get through, which are to be modified (and how), and which are simply not to be forwarded on. Modify the code on enough switches to block the http protocol, and you could have an network where websites no longer exist, but email, VoIP? , torrents and other activities are unaffected. And that's just the crudest example of what you can do when you control the code.
 
Changed:
<
<

Network Architecture can act as a check and balance on power

>
>
Our ability to modify the physical architecture of the real world is still, fortunately, rather limited. But in a networked world, code is easy to modify. The owner of the switch has almost unlimited control over what is and isn't possible on the network. And, in the Internet as it exists now, ownership of the switches is concentrated among a relatively small number of Internet Service Providers (ISPs), most of whom are commercial entities. This creates an environment where a single ISP (or a few acting in concert) can regulate human behavior much more completely than the most determined police states of the Cold War era ever could. Comcast's unilateral decision to throttle BitTorrent? traffic across its network is a pale hint of what we can expect to see as switch hardware develops to allow real-time deep packet inspection of all network traffic and the owners of the switches become increasingly savvy about the power they control.

Network Architecture as a Check on the Power of Code

The solution to the dangerous concentration of power in the hands of the switch owners cannot be government regulation alone. First, such regulation only transfers the control from ISPs to political incumbents who would undoubtedly be tempted to employ it to consolidate their own power. Second, legal regulation it is only reactive, not preemptive; some switch owners will be willing to risk the consequences of the law if the immediate rewards are large enough. To stop factions from using the unprecedented regulatory power of code in ways that hurt democracy, we must take a page out of The Federalist #10, and create a network where ownership and control of the switches is disseminated as widely as possible.

 
Deleted:
<
<
Federalist 10
 
Deleted:
<
<
Free Software, Free Firmware, Free Choice
 
Changed:
<
<
Value consensus from the bottom up
>
>

Building a Commonly-Owned Internet

 
Added:
>
>
The current Internet architecture is very hierarchical. It is a network of networks that can be visualized like a pyramid with end-points at the bottom. Groups of end-points (laptops, PCs, internet-enabled cellphones, etc.) connect to a switch at the next layer up, allowing communication between all the end-points connected to that switch. Groups of switches in turn connect to one switch at a higher layer of the pyramid, and so on. Any end-point can thus communicate to any other end-point by climbing up through the levels of switches until it finds a switch that both end-points can reach, and then descending again. End-points never communicate directly with each other.

The hierarchical structure of the Internet is an part a relic of the use of wired links to connect computers together. While wireless (radio) technology

 
Deleted:
<
<

The Technical Implementation

 February 2009, Digital Broadcasting, and Spectrum

The F.C.C and White Spaces

Line: 42 to 46
 One Laptop Per Child.. and Teenager, Father, Grandmother
Added:
>
>
Free Software, Free Firmware, Free Choice
 --

 
<--/commentPlugin-->

Revision 3r3 - 13 Nov 2008 - 17:46:26 - AndreiVoinigescu
Revision 2r2 - 08 Nov 2008 - 19:47:51 - AndreiVoinigescu
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM