Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Laws of Cyberspace Larry Lessig. Introductory Story Before Russian Revolution Tsar had system of internal passports which marked estate you came from.

Similar presentations


Presentation on theme: "The Laws of Cyberspace Larry Lessig. Introductory Story Before Russian Revolution Tsar had system of internal passports which marked estate you came from."— Presentation transcript:

1 The Laws of Cyberspace Larry Lessig

2 Introductory Story Before Russian Revolution Tsar had system of internal passports which marked estate you came from and determined places you could go –Also who you could associate with and what you could be They were like badges that granted or barred access

3 Story 2 Bolsheviks promised to change this Abolition of internal passport symbolized freedom for Russian people Democratization of citizenship in Russia Not to last though, ~15 years later, starving peasants flooded cities looking for food Stalin brought back system of internal passports Peasants again tied to rural land – lasted throughout 70’s

4 Four Constraints on Behavior Law – a prominent regulator of behavior because if you fail to follow the law their can be consequences Social Norms are a second constraint on behavior – understandings or expectations of how I ought to behave –These can regulate behavior in a far wider array of contexts than any law The third is Market – it regulates by price, by pricing goods, the market sets my opportunities, and through this range of opportunities it regulates The fourth is nature or what he calls architecture –The constraint of the world as it is –I can’t see through walls, a constraint on my ability to know what is happening on the other side –No wheel chair ramp can constrain access to a library for a wheel chair bound individual

5 Regulation through the Four Constraints To understand a regulation we must understand the sum of the four constraints operating together Any one cannot represent the effect of the four together

6 Cyberspace Hype Cyberspace is unavoidable Cyberspace is unregulable No nation can live without it No nation will be able to control behavior in it A place where individuals are inherently free from the control of real space sovereigns

7 His attack against the Hype He has a different view Now entering a world where freedom is not assured Cyberspace has the potential to be the most fully and extensively regulated space that we have ever known Unless we understand this we are likely to miss the transition from freedom into control

8 Connecting Cyberspace to Bolshevik Russia Similar to the real world, behavior in cyberspace is regulated by four types of constraints Again, Law is one of those constraints –copyright law, defamation law, sexual harassment law –In spite of the hype that cyberspace is wide open, these laws constrain behavior similarly to how behaviors are constrained in real space There are also Norms in cyberspace as there are in real space When norms are not followed, punishments are meted out

9 Cyberspace and Bolshevik Russia 2 The market also constrains cyberspace as in real space –change the price of access and constraints on access differ Architecture, the fourth, is most significant of the four –He calls this CODE - meaning the SW and HW which constitute cyberspace –the set of protocols implemented or codified in the SW of cyberspace that determine how people interact, or exist in the space –It sets the terms upon which we enter or exist in cyberspace, just like the architecture of the real space

10 How Architecture(CODE) constrains Behavior Sometimes one must enter a password, othertimes they don’t Some transactions produce link back to individual, othertimes they don’t Sometimes encryption is an option, sometimes it isn’t These differences are created by code by programmers, they constrain some behavior while allowing others possible They are like architecture of real space regulating behavior in cyberspace

11 Real Space and CyberSpace In real space architecture, market, norms, and law regulate behavior In cyberspace code, market, norms, and law regulate behavior As with real space, in cyberspace we need to look at how the four work together to constrain behavior

12 Example - Regulation of Indecency on the Net Concern sharply grew in 1995 Kids using net more frequently mixed with availability of “porn” Article cites controversial and flawed study in Georgetown Law Review reported that the new was “awash with porn.” Time and Newsweek ran cover articles about its availability Senators and Congressman bombarded with demands to do something to regulate cybersmut

13 Why the Outcry? Author writes - more indecent materials exist in real space than in cyberspace Most kids don’t have access to cyberspace, so why the outcry? Look at it differently, what regulates indecent materials in real space?

14 Why (U.S. View) 1) US laws regulate distribution of indecent materials to kids –ID checks to check age of buyers –Laws requiring these businesses to be far from kids 2) Norms - possibly more important than laws –Norms constrain adults not to sell this to kids 3) Market Norms - To buy this costs money and most kids do not have money 4) Architecture - difficult in real space to hide the fact that you are a kid So, constraints on being a kid are effective in real space

15 Cyberspace is Different Though In real space hard to hide that you are a kid, in cyberspace the default is anonymity Easy to hide who one is Practically impossible for the same laws and norms to apply in cyberspace Key difference is the regulability of cyberspace, the ability of governments to regulate behavior there Currently, cyberspace is less regulable than real space, less governments can do

16 Why? Key difference is the code that constitutes cyberspace Its current architecture is essentially unregulable (at least in 1995) The architecture of 1995 and 1996 essentially allowed anyone w/ access to roam w/o identifying who they were - Net95 was Bolshevik Russia One’s identity was invisible to the net then One could enter w/o credentials, w/o an internal passport Users were fundamentally equal, essentially free

17 Communications Decency Act (1996) With Net95 as the architecture of the network at the time- - this statute was declared unconstitutional Because, at the time, any regulation attempting to zone kids from indecent materials would be a regulation that was too burdensome on speakers and listeners As the net was then, regulation would be too burdensome Key problem was that the court spoke as if this architecture, net95, was the only architecture that the net could have

18 But... We know that the net has no nature, no single architecture Net 95 is a set of features or protocols that constituted the net at a particular period in time Nothing requires it to always be that way (remember malleability?) Court spoke as if it had discovered the nature of the net and was therefore deciding on the nature of any possible regulation of the net

19 Univ of Chicago - Harvard Story Author was professor at UoC, to gain access to net, just plug into a jack (located throughout Univ) Any machine could do it and you would have full, anonymous, free access to the net It was this way because of the administration This policy established the architectural design of the UoC net

20 @Harvard One cannot connect one’s machine to the net unless the machine is registered –That is, licensed, approved, verified Only members of the Univ community can register their machine Once registered all transactions over the net are potentially monitored and identified to a particular machine Anonymous speech on this net is not permitted Access can be controlled based on who someone is, interactions can be traced

21 Two Views Controlling access is the ideal at Harvard Facilitating access is the ideal at Univ of Chicago These two views are common today at Univ’s across America UoC is Net95 Harvard is not an Internet but an Intranet architecture –within an intranet, identity is sufficiently established such that access can be controlled and usage monitored

22 Philosophies They both are built from TCP/IP but at Harvard you have Internet Plus, the plus means the power to control They reflect two philosophies about access and reflect two sets of principles or values on how speech should be controlled they parallel difference between political regimes of freedom and political regimes of control

23 The Point Nothing against Harvard or Chicago Wants us to see that at the level of a nation, architecture is inherently political In cyberspace, the selection of an architecture is as important as the choice of a constitution The code of cyberspace is its constitution, it sets terms for access, sets the rules, controls their behavior, a sort of sovereignty competing with real space sovereigns in the regulation of behavior of real space citizens

24 Supreme Error Author feels that Supreme Court error is made by many The error of thinking that the architecture as we have it is an architecture that we will always have That the space will guarantee us freedom, liberty He feels this is “profoundly mistaken.” While we celebrate the “inherent” freedom of the net, its architecture is changing

25 Architecture Shift From an architecture of freedom to an architecture of control As it becomes an architecture of control it becomes more regulable US government is moving the architecture in these directions How? The government can regulate the architectures in cyberspace so that behaviors in cyberspace become more regulable

26 Two Examples Encryption –Much of its history has been heavily regulated by American government p 141 –Consistently banned its export –Has proposed laws requiring manufacturers to assure that any encryption have built within it either a key recovery ability or an equivalent back door so that gov could get access to content of such communications

27 2nd Example The first was regulation of code, our constitution offers very little control over government regulation like this There is little the constitution offers against the government’s regulation of business Second - Another use of encryption is identification - besides hiding, you can through digital certificates authenticate who sent something

28 What is Achieved? If both regulations went into effect Since US is largest market for Internet products, and no product can really succeed unless it is successful in U.S. The standards imposed in U.S. become standards for the world. We would be exporting an architecture that facilitates control –Not just for us but for any government Is this completely true?

29 Where will it go? The US then, would move itself from a symbol of freedom to a peddler of control But, is it all bad? Read bottom of p 142 and selected portions of 143 End


Download ppt "The Laws of Cyberspace Larry Lessig. Introductory Story Before Russian Revolution Tsar had system of internal passports which marked estate you came from."

Similar presentations


Ads by Google