Adam Thierer's Blog, page 102

February 13, 2012

Will the UN take over Net governance?

Over at TIME.com I write that we should keep a close eye on moves by Russia, China and other countries to move Internet governance to the UN:




All this year, and culminating in December at the World Conference on International Telecommunications in Dubai, the nations of the world will be negotiating a treaty to govern international telecommunications services between countries. It is widely believed that some countries, including Russia and China, will take the opportunity to push for U.N. control of Internet governance. Such a turn of events would certainly be troubling. …



It's amazing to think about it, but no state governs the Internet today. Decisions about its architecture are made by consensus among engineers and other volunteers. And that, in fact, is what has kept it open and free.



"Upending the fundamentals of the multi-stakeholder model is likely to Balkanize the Internet at best, and suffocate it at worst," FCC Commissioner Robert McDowell said recently in a speech. "A top-down, centralized, international regulatory overlay is antithetical to the architecture of the Net, which is a global network of networks without borders. No government, let alone an intergovernmental body, can make decisions in lightning-fast Internet time."




Read the whole thing at TIME.com.




 •  0 comments  •  flag
Share on Twitter
Published on February 13, 2012 11:38

February 12, 2012

Ithiel de Sola Pool Perfectly Predicted the Future of Copyright in 1984

On numerous occasions here at the TLF over the past eight years, I've noted the profound influence that the late Ithiel de Sola Pool had on my thinking about the interaction of technology, information, and public policy. In fact, when I needed to pick a thematic title for my weekly Forbes column, it only took me a second to think of the perfect one: "Technologies of Freedom." I borrowed that from the title of 1983 masterpiece, Technologies of Freedom: On Free Speech in an Electronic Age. As I noted in my short Amazon.com review, Pool's technological tour de force is simply breathtaking in its polemical power and predictive capabilities. Reading this book three decades after it was published, one comes to believe that Pool must have possessed a crystal ball or had a Nostradamus-like ability to foresee the future.



I felt that same was this week when I was re-reading some chapters from his posthumous book, Technologies without Boundaries: On Telecommunications in a Global Age–a collection of his remaining essays nicely edited and tied together by Eli Noam after Pool's death in 1984. Re-reading it again reminded me of Pool's remarkable predictive powers. In particular, the closing chapter on "Technology and Capture" includes some of Pool's thoughts on the future of copyright. As you read through that passage below, please try to remember he wrote these words back in the early 1980s, long before most people had even heard of the Internet and when home personal computing was only just beginning to take off. Yet, from what he already knew about networked computers and digital methods of transmitting information, Pool was able to paint a prescient portrait of the future copyright wars that we now find ourselves in the midst of. Here's what he had to say almost 30 years ago about how things would play out:



Can a computer infringe copyright? The printed output of recorded copyright material is likely to be a statutory violation of the Copyright Act which vests the exclusive right "to print, reporting, publish, copy and vend the…work."



In short, the process of computer communication entails processing of texts that are partly controlled by people and partly automatic. They are happening all through the system. Some of the text is never visible but is only stored electronically; some is flashed briefly on a terminal display; some is printed out in hard copy. What started as one text varies and changes by degrees to other things. The receivers may be individuals and clearly identified, or they may be passers­by with access but whose access is never recorded; the passer­by may only look, as a reader browsing through a book, or he may make an automatic copy; sometimes the program will record that, sometimes it will not.



To try to apply the concept of copyright to all these stages and actors would require a most elaborate set of regulations. It has none of the simplicity of checking what copies rolled off a printing press. Good intentions about what one would like can be defined. One would like to compensate an author if a computer terminal is used as a printing press to run off numerous copies of a valuable text. One would like not to impose any control as someone works at a terminal in the role of a reader and checks back and forth through various files. The boundary, however, is impossible to draw. In the new technology of interactive computing, the reader, the writer, the bookseller, and the printer have become one. In the old technology of printing one could have a right to free press for the reader and the writer but try to enforce copyright on the printer and the bookseller. That distinction will no longer work, any more than it would ever have worked in the past on conversation.



Those whose livelihood is at stake in copyright do not like that kind of comment. They contend that creative work must be compensated. Indeed it must. Publishers may point the finger in accusation and charge that one is taking bread out of the mouths of struggling writers. But the system must be practical to work. On highly charged subjects there is an impulse to insist that those who make a negative comment must have a panacea to offer instead. If one says prisons do not cure criminals, the rejoinder is apt to be, "Do you want to let them out to kill people?" One does not necessarily want that at all, but it may still be true the prisons do not cure criminals. Likewise, one can say that in an era of infinitely varied, automated text manipulation there is no reasonable way to count copies and charge royalties on them.



That is the situation now emerging. It may be very unfair to authors. It may have a profoundly negative effect on some aspects of culture, and in any case, whether positive or negative, it may change things considerably. If it becomes more difficult for authors and artists to be paid by a royalty scheme, more of them will seek salaried bases from which to work. Some may try to get paid by personal appearances or other auxiliaries to fame. Or the highly illustrated, well-bound book may acquire a special marketing significance if the mere words of the text are hard to protect. Or one may try to sell subscriptions to a continuing service, with the customer knowing that he will be a first recipient.



These are the kinds of considerations one must think about in speculating about the consequences for culture of a world where the royalty-carrying unit copy is no longer easy to protect in many of the domains where it has been dominant. While Congress tries to hold the fort, it is clear that with photocopiers and computers, copyright is an anachronism. Like many other unenforceable laws that we keep on the statute books from the past, this one may be with us for some time to come, but with less and less effect. (pp. 257-59)



Indeed, as I wrote in one of my recent Forbes column's (The Twilight of Copyright?"), it appears that–whether some of us like it or not–"copyright is dying… [as it] is being undermined by the unrelenting realities of the information age: digitization, instantaneous copying, borderless transactions, user-generated content, and so on." Of course, I'm basing that assertion on the facts on the ground around me circa 2012. By contrast, Ithiel de Sola Pool already had it figured out 30 years ago. Absolutely remarkable.




 •  0 comments  •  flag
Share on Twitter
Published on February 12, 2012 08:47

February 9, 2012

Feb. 24 Event: The Digital Inventor: How Entrepreneurs Compete on Platforms

Folks, I wanted to bring your attention to this conference on Feb. 24 from the Information Economy Project at George Mason University. The pitch:



The assembly line of our knowledge-based economy begins with technology discovery and ends with the moving target of a consumer market. Connectivity is funded and rewarded through exchanges of time, money, and digital goods. The conversation in this conference will identify key priorities in technology policy for innovation, network investment, and content delivery models. Articles will be published in a special issue of the Journal of Law, Economics & Policy.


See the website for speakers, schedule, and RSVP info.




 •  0 comments  •  flag
Share on Twitter
Published on February 09, 2012 11:17

Senate Cybersecurity Bill Nukes Privacy Protections

My seen-it-all cool was shaken yesterday when I examined how a Senate cybersecurity bill would scythe down legal protections for privacy. Anyone participating in government "cybersecurity exchanges" would have nearly total immunity from liability under any law. No Privacy Act, no ECPA, no E-Government Act, no contract law, no privacy torts. The scuttlebutt is that Senator Reid (D-NV) may push this especially hard as payback to the Internet for the SOPA/PIPA debacle.



In the push for cybersecurity legislation, Congress is driven far more by its desire to act (and D.C. lobbyists' desire to have Congress act) than by any plausible contribution it can make to the difficult problem of securing computers, networks, and data. That's why this cybersecurity bill, and all others I have seen, have greater costs than benefits.



Read about the devastation for privacy and the rule of law on offer in a current draft in "The Senate's SOPA Counterattack?: Cybersecurity the Undoing of Privacy."




 •  0 comments  •  flag
Share on Twitter
Published on February 09, 2012 06:59

February 7, 2012

Catherine Tucker on online advertising and antitrust

http://surprisinglyfree.com/wp-content/uploads/Tucker.jpg

On the podcast this week, Catherine Tucker, Douglas Drane Career Development Professor in IT and Management, and Assistant Professor of Marketing at MIT's Sloan School of Management, discusses her paper with Avi Goldfarb in the Journal of Competition Law and Economics entitled, Substitution Between Offline and Online Advertising Markets. According to Tucker, the FTC treats online advertising as a distinct market from offline advertising for antitrust purposes. She describes the study she and Goldfarb conducted, where they sought to determine whether online advertising could serve as a substitute for offline advertising. Tucker also discusses Google's role in online advertising, how its auction mechanism affects pricing, and the difference between search advertising and display advertising. The conversation ends with a discussion on policy implications on how dominant players in online advertising should be viewed.





Related Links

Substitution between Offline and Online Advertising Markets , by Tucker & Goldfarb"Google faces antitrust glare on Capitol Hill", Washington Post"Google Now Owns 44% of Global Advertising Market", Search Engine Watch

To keep the conversation around this episode in one place, we'd like to ask you to comment at the webpage for this episode on Surprisingly Free. Also, why not subscribe to the podcast on iTunes?




 •  0 comments  •  flag
Share on Twitter
Published on February 07, 2012 10:00

February 6, 2012

FBI Hacked While Congress Ponders Cybersecurity Legislation

Over at TIME.com I take a look at the different approaches to cybersecurity now being considered by Congress:




But what can congress do to improve cybersecurity? One line of thinking reportedly embodied by the Senate legislation, though details of that bill are not yet available, would tell network owners how to protect their systems. The Department of Homeland Security would be charged with creating security rules and punishing companies that did not comply. Such a prescriptive approach may not be very helpful, however. …



The bipartisan approach moving forward in the House, on the other hand, takes a different approach. At the center of the PRECISE Act is the creation of a non-profit National Information Sharing Organization (NISO) that would serve as a clearinghouse for the voluntary exchange of cybersecurity threat information between government and industry. Under the NISO umbrella, as long as they only share information for cybersecurity purposes, industry and government would be exempt from privacy laws that today restrict collaboration.




Read the whole thing at TIME.com.




 •  0 comments  •  flag
Share on Twitter
Published on February 06, 2012 11:21

What Did Aneesh Chopra Achieve?

I honestly don't know. I haven't been following his work, and, by saying I don't know, I don't imply that he didn't achieve anything. But it's utterly unclear from this interview with Nancy Scola what he achieved as chief technology officer in the Obama Administration the last few years.



I was piqued by the amusing—almost comical—claims to specificity he makes, right from the outset:



What is the elevator pitch on what you've been doing since you were named Chief Technology Officer of the United States?
What I do is advance the president's innovation agenda by incorporating his bottom-up theory of change. To be very specific about it, I execute the president's innovation strategy in a manner that taps into the expertise of the American people to solve big problems.


There is nothing specific about, "I execute the president's innovation strategy in a manner that taps into the expertise of the American people to solve big problems." If you were to look up "vague" in the dictionary, that sentence would illustrate the first definition of the word.



Ever notice how people say, "I don't mean to interrupt," when they are interrupting? How they say, "to make a long story short," when it's already too late? Chopra says he's going to be specific as he heads into empty generalities. Further along in the interview , he talks about his role and his involvement, which would be interesting meta-information if it set the stage for describing accomplishment.



So the question stands: What things happened under Aneesh Chopra that wouldn't have happened in his absence?



Caveats: Aneesh Chopra seems like a nice guy. I don't doubt his sincerity or intention to have done good things. I don't think he's unique among bureaucrats in not having identifiable achievements. I am open to learning what he did achieve. He just hasn't explained it himself.



This line of questioning also may seem disrespectful. Chopra has acted as a public servant the last few years and deserves credit for that, some would argue. But I disagree that the claim to "public service" should act as insulation against being held to account for performance. What did Aneesh Chopra achieve?




 •  0 comments  •  flag
Share on Twitter
Published on February 06, 2012 09:08

February 1, 2012

Kashmir Hill has it Right…

on the Google privacy policy change.



The idea that people should be able to opt out of a company's privacy policy strikes me as ludicrous.


Plus she embeds a valuable discussion among her Xtranormal friends.



Read the whole thing. Watch the whole thing. And, if you actually care, take some initiative to protect your privacy from Google, a thing you are well-empowered to do by the browser and computer you are using to view this post.






 •  0 comments  •  flag
Share on Twitter
Published on February 01, 2012 06:52

January 31, 2012

What Europe's 'Right to Be Forgotten' Has in Common with SOPA

Over at TIME.com I write that if you didn't like SOPA because it threatened free speech, then you probably won't like the new "Right to be Forgotten" proposed in the EU. Prof. Jane Yakowitz contributes some great insights to the piece. What I dislike most about the rule is that it subordinates expression to privacy:




[T]he new law would flip the traditional understanding of privacy as an exception to free speech. What this means is that if we treat free expression as the more important value, then one has to prove a harmful violation of privacy before the speaker can be silenced. Under the proposed law, however, it's the speaker who must show that his speech is a "legitimate" exception to a claim of privacy. That is, the burden of proof is switched so that speakers are the ones who would have to justify their speech.




Read the whole thing at TIME.com.




 •  0 comments  •  flag
Share on Twitter
Published on January 31, 2012 13:53

Reuben Grinberg on the legality of Bitcoin

http://surprisinglyfree.com/wp-content/uploads/Grinberg.jpg

On the podcast this week, Reuben Grinberg, a recent Yale Law School graduate now in private practice in New York City, discusses his paper, published in the Hastings Science & Technology Law Journal entitled, Bitcoin: An Innovative Alternative Digital Currency. Grinberg first gives a brief overview of Bitcoin, the decentralized, digital currency. According to Grinberg, Bitcoin can maintain sustainability, even though it is not backed by an institution or commodity, but it must overcome several hurdles. Grinberg then discusses the potential security problems and legal issues Bitcoin faces. He also describes some of the unique qualities of Bitcoin, including the ability to conduct transactions anonymously. Grinberg ends the discussion with his thoughts on what Bitcoin could potentially become.





Related Links

Bitcoin: An Innovative Alternative Digital Currency , by Grinberg"Online Cash Bitcoin Could Challenge Governments, Banks", Time Techlandbitcoin.orgThe Rise and Fall of Bitcoin, Wired

To keep the conversation around this episode in one place, we'd like to ask you to comment at the webpage for this episode on Surprisingly Free. Also, why not subscribe to the podcast on iTunes?




 •  0 comments  •  flag
Share on Twitter
Published on January 31, 2012 10:00

Adam Thierer's Blog

Adam Thierer
Adam Thierer isn't a Goodreads Author (yet), but they do have a blog, so here are some recent posts imported from their feed.
Follow Adam Thierer's blog with rss.