I The Internet Trinity | II Foucault & Digital Libertarianism | III Safe Harbours and Unintended Consequences | IV Privatised Panopticons and Legalised Enclosures | V A Communications Sampler | Conclusion |
The tendencies I have been describing here by no means end with the
Communications Decency Act and the NII Copyright Protection Bill. In fact,
the turn to privatised and technologically based enforcement to avoid practical
and constitutional obstacles seems to be the rule rather than the exception.
Outside of the Net, the most obvious example of this is the V-Chip,
a device to enable parents to restrict television programming through a
"voluntary" rating system. While the rating system is voluntary,
the device is mandated by section 551 of the Telecommunications Act of
1996.(65) The V-Chip decodes a set of ratings
agreed to by private parties and suggested by a state-convened "private"
board." It then blocks programming that is above a ratings threshold
set by parents.(66) The attractiveness
of this hardwired mix of public and private decisions can be judged by
the spread of V-Chip analogies -- President Clinton's "V-Chip for
the Net," Rep. Markey's "E-Chip." Why is this device so
popular, not just as a device, but as a rhetorical trope? The answer, I
think, is partly provided by the characteristics outlined here. The V-chip
seems to be merely a neutral facilitator of parental choice. The various
acts of coercion involved -- the government making the television company
insert the thing into the machine, the public-private board choosing which
ratings criteria will be available for parents to use -- simply disappear
into the background. Finally, the distributed privatised nature of the
system promises that it might actually work -- though admittedly, state
administration of the television system poses fewer headaches that state
administration of the Net.
Another set of examples is provided by encryption policy. In the digital
era, encryption is no longer merely the stuff of spy novels. It provides
the walls, the boundaries, the ways of preventing unauthorized or unwanted
entry. Faced with the development of a cryptography industry which would
produce digital walls unbreakable by the state, the government responded
by attempting to legislate its own backdoor The first proposal was that
the encryption of all communications had to be through a government designed
device -- known as the Clipper Chip. Your phone, fax or computer system
would encrypt your communication using the algorithm hardwired into the
Clipper Chip. The Clipper Chip utilizes a "key escrow" system
under which the government maintains a "back door" key to decrypt
all Clipper communications; a key that is supposed to be available only
to law enforcement agencies who, most of the time, would have to get judicial
approval of their actions. After considerable controversy, use of the Clipper
Chip encryption system was declared "voluntary" for both the
government and the private sector.
This might seem to be a partial vindication for the digital libertarian
position. In fact, the government has, for the most part, adopted the Clipper
Chip and has tried to use its considerable purchasing power to make it
a de facto industry standard.(67) While
the success of this method may have been undermined by later technical
development, the strategy shows that hardwired legal regime can be implemented
through market power as well as by fiat.
One of the arguments behind the Clipper Chip was that law enforcement
agencies were merely striving to achieve the same level of physically permissible
surveillance in a world of encoded transmissions as they currently possessed.
With this as a baseline it was obvious that the material possibility for
interception and decryption should be hardwired into the system itself.
The same argument was made successfully over digital telephony. Realizing
that new telephony technology, such as call forwarding, cellular telephones,
and digital communications in general, present increasing challenges to
wire tapping, Congress passed the Communications Assistance for Law Enforcement
Act,(68) more commonly known as the "Digital
Telephony Act." At its heart, the Digital Telephony Act requires that
telecommunications companies make "tappability" a design criteria
for the system. Everything recorded by the traditional "pen register"
system, as well as a few new categories of information, must be digitally
recorded. Under the Act, information regarding a subscriber's name, address,
telephone toll billing records, telephone number, length of service and
the types of services utilized are now available to the government.(69)
Technologically hardwired protections have also been implemented in order to protect intellectual property as in the Digital Audio Tape or (DAT) standard. Unlike compact disks, which until recently were "read-only," digital audio tape technology allows users to make perfect copies of recordings. Fearing that this ability would lead to the development of an extensive market for copied tapes, the recording industry pushed for mandatory technological protection, which they received in the Audio Home Recording At of 1992.(70) This Act requires all DAT recorders to utilize the Serial Copy Management System, which allows a first copy to be made onto DAT but prevents all subsequent copies.
These examples give us a number of conclusions at odds to popular wisdom.
On the one hand, they offer a cautionary note to the libertarian techno-optimists
who believe that technology always grows out of governmental control and
always in the direction of greater "liberty." Let us lay aside
many of the assumptions behind that belief for a moment-- such as that
governments are generally the greatest threat to daily "liberty"
-- or conversely that liberty should be defined primarily around the absence
of governmental restraint. Even with these qualifications the idea that
the technological changes of the digital revolution are always outside
the control of the state seems unproven,. In fact, the state is working
very hard to design its commands into the very technologies that, collectively
are supposed to spell its demise.
Another point needs to be made: As these examples indicate there are
-- whether one likes them or not -- strong arguments that the "technologies
of freedom" actually require an intensification of the mechanisms
of surveillance, public and private, to which we are currently subjected.
Cheap copying can be seen as primarily a threat to copyright, global communication
as a source of child pornography and bomb recipes, encryption as a wall
behind which the terrorist and the drug smuggler can hide. If the digital
technologies enlarge our space for living, both conceptually and practically,
the dangers posed by that expansion will prompt the demand -- often the
very reasonable demand -- that the Panopticon be hardwired into the "technologies
of freedom."(71)
JUMP TO NEXT SECTION
I The Internet Trinity | II Foucault & Digital Libertarianism | III Safe Harbours and Unintended Consequences | IV Privatised Panopticons and Legalised Enclosures | V A Communications Sampler | Conclusion |
ENDNOTES TO SECTION V
65. Telecommunications Act of 1996, Pub. L. No. 104-104, 110 Stat. 56 (1996).
66. See, Kristin S. Burns, Protecting the Child: The V-Chip Provisions of the Telecommunications Act of 1996, 7 Depaul-Lca J. Arts & Ent. L. 143 (1996); David V. Scott, The V-Chip Debate: Blocking Television Sex, Violence, and the First Amendment, 16 Loy. L.A. Ent. L. J. 741 (1996).
67. See Howard S. Dakoff, The Clipper Chip Proposal: Deciphering the Unfounded Fears that are Wrongfully Derailing its Implementation, 29 J. Marshiall L. Rev. 475, 482-84 (1996) (discussing the use of the government's purchasing power to create a de facto encryption system); See also, Richard L. Field, 1996: Survey of the Year's Developments in Electronic Cash Law and the Laws Affecting Electronic Banking in the United States, 46 Am. U. L. Rev. 967, 993 (1997); Ira S. Rubenstein, Export Controls on Encryption Software 748 PLI/Comm 309 (1996); A. Michael Froomkin, The Metaphor is the Key, Cryptograpy, the Clipper Chip, and the Constitution, 143 U. Pa. L. Rev. 709 (1995).
68. Pub. L. No. 103 - 414, 108 Stat. 4279 (1994) (codified at 47 U.S.C.A. s 1001 -10 (Supp. 1995)
69. 18 U.S.C. s 2703(c)(1)(C) (1994). See Susan Friewald, Uncertain Privacy: Communication Attributes After the Digital Telephony Act, 69 S. CAL. L. REV. 949 (1996).
70. 17 U.S.C. §§ 1001-1010 (1994).
71. Ithièl de Sola Pool, Technologies of Freedom (Harv. Univ. Press 1983).
72. See Lessig, Cyber Rights Now: Tyranny in the Infrastructure supra note 24.