UNIT 5 - Computers and Democracy (Freedom of Speech Debate)
UNIT 5 - Computers and Democracy (Freedom of Speech Debate)
UNIT 5 - Computers and Democracy (Freedom of Speech Debate)
CONTENT .......................................................................................................................... 2
5. CENSORSHIP ................................................................................................................ 5
5.1 THE OFFICIAL SECRETS ACT ....................................................................................... 5
5.2 PLATO AND THE CENSORSHIP OF POETRY .................................................................... 5
7. SIBERIA USA................................................................................................................. 9
10. SUMMARY................................................................................................................. 16
BIS2061 1 Unit 5
Content
1. Freedom of Speech
The First Amendment to the U.S. Constitution
(1) Everyone has the right of freedom of expression. This right shall include
freedom to hold opinions and to receive and impart information and ideas
without inference by public authority and regardless of frontiers. This Article
shall not prevent States from requiring the licensing of broadcasting, television
or cinema enterprises.
(2) The exercise of these freedoms, since it carries with it duties and
responsibilities, may be subject to such formalities, conditions, restrictions or
penalties as are prescribed by law and are necessary in a democratic society, in
the interests of national security, territorial integrity or public safety, for the
prevention of disorder or crime, for the protection of health or morals, for the
protection of the reputation or rights of others, for preventing the disclosure of
information received in confidence, or for maintaining the authority and
impartiality of the judiciary.
The tradition is upheld in the United Kingdom by the National Secular Society 1866,
the Free Thinker 1881, the Rationalist Press Association 1899, and the British
Humanist Association 1963.
* Deism: The term usually refers to a movement of religious thought in the 17th and
18th centuries, characterised by the belief in a rational religion of nature as opposed to
the orthodox beliefs of Christianity. Deists believed that God is the source of natural
law but does not intervene directly in the affairs of the world, and that the only
religious duty of humanity is to be virtuous.
BIS2061 2 Unit 5
1.2 John Stuart Mill (1806-1873)
The philosopher John Stuart Mill advocated the importance of free speech and open
discussion in his famous essay "On Liberty" (1859). He argued that only by open
discussion could truth emerge, and falsity be revealed. What is more, he insisted that
engagement in discussion encouraged people to think for themselves rather than
simply accept whatever ideas others were promoting.
• Electronic mail: The Internet essentially started with electronic mail as its
primary communications medium, and has historically fought hard to keep it
free. By its very nature, electronic mail is extremely hard to censor, especially
simple, point-to-point mail, because of the distributed and robust nature of
routing protocols
• Usenet news is another widespread and difficult to censor technology. One can
censor the users at a particular site by dropping that group, and one can
attempt (often with very limited success) to use cancelbots*, but in general
Netnews is quite hard to control
• The World Wide Web, as a publishing medium par excellence, has gone a
long way towards promoting semi-permanent expression, as opposed to the
ephemera of Netnews and the limited distribution and unsearchability of
electronic mail
• Cryptography has protected free expression in a number of ways, by allowing
people the privacy to express their opinions to some without undesirable
others listening in
• Hand in hand with cryptography is Anonymity, which protects expression by
allowing unpopular opinions to be expressed without fear of retribution
• Lawyers are a major limiting factor to free expression. This can come about in
many ways; one major way is the tendency to support police entrapment.
Lawyers also work in Congress and tend to pass bills that attempt to control,
BIS2061 3 Unit 5
for example, so-called pornography. They have also been known to help
aggressively pursue trade secret harassment cases for certain religions, as the
Scientologists have shown so well
• Certain Internet technologies, such as Usenet news, have shown themselves
vulnerable to forged cancellation of previously published information. For
example, the use of cancelbots*
• Peer pressure has occasionally been useful at restraining free expression,
though usually it is only applied in large scale to individuals who have
demonstrated that it doesn't work against them, but only their service
providers
*A cancelbot is a program or bot (robot) that sends a message to one or more Usenet
newsgroups to cancel (remove from posting) a certain type of message. It searches for
messages matching a certain pattern, whether it be a duplicate message or offensive
material, and sends out cancels for them. When a message has been cancelled, its
status is changed to "cancel," and the Usenet servers will no longer post them
BIS2061 4 Unit 5
Rule 4: Members shall in their professional practice have regard to basic human
rights and shall avoid any actions that adversely affect such rights.
As a professional you have a professional duty to safeguard the basic human right to
freedom of speech.
5. Censorship
Censorship is defined as the suppression by authority of material considered immoral,
heretical, subversive, libellous, damaging to state security, or otherwise offensive. It is
generally more stringent under totalitarian or strongly religious regimes, and in
wartime.
The British Government uses the D-notice (a notice to the media prohibiting the
publication of material that is alleged to be of importance to national security) and the
Official Secrets Act to protect itself. Laws relating to obscenity, libel, and blasphemy
act as a form of censorship. The media also exercise a degree of self-censorship.
During the Gulf War 1991, the US military controlled access to the theatre of war -
only certain reporters were allowed in, and their movements were restricted. In the
USA, despite the First Amendment protection of free speech, government agencies
and groups make attempts at censorship. The question is often tested in the courts,
especially with respect to sexually explicit material. Recently, efforts have been made
to suppress certain pieces of music and works of art on such grounds as racial
harassment and social depravity.
The Official Secrets Act is an UK act of Parliament 1989. The Act prohibits the
disclosure of confidential material from government sources by employees. It remains
an absolute offence for a member or former member of the security and intelligence
services (or those working closely with them) to disclose information about their
work. There is no public-interest defence, and disclosure of information already in the
public domain is still a crime. Journalists who repeat disclosures may also be
prosecuted.
The best known of Plato's dialogues The Republic lays before us Plato's visions of the
ideal state. It covers a wide range of topics, including education. If Plato seems very
preoccupied with the moral and theological aspects of the poets it is because it was
from them that the ordinary Greek was expected to acquire his moral and theological
notions. The influence of the environment on growing minds is emphasised by Plato,
in that he calls for a rigid control of music and poetry in education:
‘We must start to educate the mind before training the body. And the first step, as you
know, is always what matters most, particularly when we are dealing with those who
are young and tender. That is the time when they are easily moulded and when any
impression we choose to make leaves a permanent mark. Shall we therefore readily
BIS2061 5 Unit 5
allow our children to listen to any stories made up by anyone, and to form opinions
that are for the most part the opposite of those we think they should have when they
grow up? .... Then it seems that our first business is to supervise the production of
stories, and choose only those we think suitable, and reject the rest. We shall persuade
mothers and nurses to tell our chosen stories to their children, and by means of them
to mould their minds and characters which are more important than their bodies at this
stage.’
Carefully selecting the sorts of stories which men ought (or ought not) to hear from
their earliest childhood, would produce citizens who honoured the gods, their parents
and would know how important it was to love one another. Plato continues:
‘It is not only to the poets therefore that we must issue orders requiring them to
portray good character in their poems or not to write at all; we must issue similar
orders to all artists and craftsman, and prevent them form portraying bad character, ill
discipline, meanness and ugliness in pictures of living things, in sculpture,
architecture, or any work of art, and if they are unable to comply they must be
forbidden to practice their art among us. We shall thus prevent our citizens being
brought up among representations of what is evil, and so day by day and little by
little, by grazing widely as it were in an unhealthy pasture, insensibly doing
themselves a cumulative psychological damage that is very serious. We must look for
artists and craftsman capable of perceiving the real nature of what is beautiful, and
then our young men, living as it were in a healthy climate, will benefit because all the
works of art they see and hear influence them for good, like breezes from some
healthy country, insensibly leading them from earliest childhood into close sympathy
and conformity with beauty and reason.’
Consider examples of "speech" which are deemed criminal under federal law: for
example, speech that violates obscenity laws, harassment laws and "hate crimes", and
where individuals utter racial, ethnic, or homophobic slurs in conjunction with the
commission of crimes. Does this type of speech fit with Plato's idea of the "sorts of
stories which men ought to hear from their earliest childhood … to produce citizens
who will show tolerance, respect and love to one another"? Should we consider
uneducated people to be the same as children? Should we influence "the environment"
that has an impact on their impressionable, undeveloped minds? Do we restrict the
right to freedom of speech to include only those educated by Plato's methods, who can
in adulthood distinguish between good and evil works of art?
BIS2061 6 Unit 5
6. Free Speech and Content Control
(In the following paragraphs the term "speech" can be taken as applying to speech
acts, or to expression in writing or visual images.)
In Miller v. California (1973), the Supreme Court established a three part test to
determine whether or not speech fell in the first category (i.e. was considered obscene
rather than indecent). To meet this test, speech had to satisfy the following conditions:
The second class of speech, often called indecent speech, is obscene for children but
not for adults. The relevant legal case is Ginsberg v. New York, which upheld New
York's law banning the sale of speech harmful to minors to anyone under the age of
seventeen. The law in dispute in the Ginsberg case defined harmful to minors as
follows:
‘That quality of any description or representation, in whatever form, of nudity, sexual
conduct, sexual excitement, or sado-masochistic abuse, when it:
(1) predominantly appeals to prurient, shameful, or morbid interests of minors, and
(2) is patently offensive to prevailing standards in the adult community as a whole
with what is suitable for minors, and
(3) is utterly without redeeming social importance for minors’
Although state legislatures have applied this case differently to their statutes
prohibiting the sale of obscene material to minors, these criteria can serve as a general
guide to what we classify as Ginsberg speech, which should be off limits to children
under the age of seventeen.
The United States not only does not prohibit hate speech, but actively protects it: for
example, the Ku Klux Klan marches on D.C. and American Nazi rallies in Skokie
Illinois. There are, however, related laws in most communities which can apply:
slander, conspiracy, incitement to riot, disturbing the peace, threats, etc. While you
may be able to stand up and say that ethnic group X is composed of thieves and
BIS2061 7 Unit 5
criminals, you can get into serious trouble if you name specific members of that race
as thieves and criminals. You may also be in trouble for the following activities:
§ specifically attempting to plan a criminal activity (either in public or private))
§ exciting a crowd and encouraging them to commit acts of violence
§ being too loud or annoying
§ making strong intimations that you will commit violence against members of an
ethnic group.
In other words, you can certainly say hateful things, as long as you don't make any
overt effort to encourage expressions of that hate beyond speech.
Disturbing the peace is a very broad statute in most locations. What may be deemed
intensely offensive by some might not be a cause for concern by others. It is a highly
subjective matter which most laws overcome by including ambiguous clauses like
community standards.
However, caution must be exercised because the distinction between hate speech and
unpopular or unorthodox political opinion is sometimes difficult to make. A rule of
thumb, for example, is that hate speech Web sites are those that attack, insult, and
demean whole segments of the population, such as Jews, African Americans, Whites,
homosexuals, and so forth. Spinello argues that many sites will fall in a nebulous grey
area, and this will call for conscientiousness and discretion on the part of those
charged with labelling those sites.
There are many specific examples in support of the argument that anonymous free
expression deserves protection. Social intolerance may require some individuals to
rely on anonymity to communicate openly about an embarrassing medical condition
or an awkward disability. Whistleblowers may be understandably reluctant to come
forward with valuable information unless they can remain anonymous. Political
dissent, even in democratic societies that prize free speech, may be impeded unless it
can be voiced anonymously. Anonymity then has an incontestable value in the
struggle against repression, and even against the more routine corporate and
government abuses of power. In the conflict in Kosovo, for example, some
individuals relied on anonymous programs (such as anonymizer.com) to describe
atrocities perpetrated against ethnic Albanians. If the Serbians were able to trace the
identity of these individuals their lives would have been in grave danger.
BIS2061 8 Unit 5
Anonymous communication, whether facilitated by remailers or by other means, does
of course have drawbacks. Criminals or terrorists seeking to communicate
anonymously to plot their crimes can abuse it. It also permits cowardly users to
communicate without civility, or to libel someone without accountability and with
little likelihood of apprehension by law enforcement authorities. Anonymity can also
be useful for revealing trade secrets or violating other intellectual property laws.
7. Siberia USA
In the 1970s, in his book The Gulag Archipelago, Aleksandr Solzhenitsyn graphically
portrayed the network of forced labour camps which dotted Siberia and were the last
stop for dissident Russians whose opinions and actions violated politically accepted
state norms.
To Americans already familiar with communist suppression of free speech and free
thought the existence of such detention camps was shocking, although not surprising.
Americans might have been more shocked, however, had they known that some 20
years earlier psychiatrists in their own country had initiated plans to create a similar
political Siberia. In the mid 1950s, on the heels of the McCarthy era, a bill was
introduced to the United States Congress to create just such a Gulag.
The Bill (Human Rights 6376) called for psychiatric facilities to be built in what was
then the relatively unpopulated territory of Alaska. The measure included provisions
for a national commitment procedure, which would have empowered any peace
officer to commit any individual to psychiatric care - without recourse. That person
would then be shipped off to Alaska for confinement and treatment.
Although there were only 325 mental patients in the whole of Alaska, the bill called
for the federal government to grant 1 million acres to the project and to provide an
extraordinary $12 million in funding. As the Brooklyn Tablet described it on March
31, 1956: “The Bill ... makes it possible for the Administration in power to have a
political nuisance transported to the 1,000,000 acres Alaska Mental Insane Asylum. It
legislates that duly accredited officers of any State party to this compact ... shall be
permitted to transport any patient being moved pursuant to this compact through any
and all States party to this compact without interference.”
The Bill came to the attention of Scientologists in 1956, only two years after the
Church of Scientology had been established. By that time, the bill had slipped almost
unnoticed through the House and was on its way to the Senate. Scientologists
responded with a campaign to inform the public of the very real threat to personal
liberties and freedom of speech posed by the measure. If passed, it would have created
a potential “gulag” where political undesirables could be sent and simply forgotten.
The hope of creating this psychiatric slave state was shattered by Scientologists.
Refusing to allow vested interests to destroy the right of every citizen to freely voice
BIS2061 9 Unit 5
their opinions without fear of retaliation, they instituted a huge grassroots letter
campaign. This alerted the Senate to public opposition and testimony was presented at
Senate Committee hearings on the Bill. Ultimately, except for granting a small
amount of money to Alaska for the continuing treatment of its few existing mental
patients, the Senate rejected the Siberia Bill and it was never heard of again.
Governance and regulations of the Internet could create a situation where political
undesirables could be refused access. Are we not sending these individuals to a
gulag?
History has taught us that the suppression of free speech and free thought can curtail
the speed of human advancement. Often ideas that are non-mainstream and conflict
with orthodox belief are rejected, scorned and silenced. Consider the following
examples:
BIS2061 10 Unit 5
and the religious fundamentalists, and the theory eventually became mainstream and
orthodox.
BIS2061 11 Unit 5
forceful films is the 1988 film The Last Temptation of Christ. The film offended many
Christians with alleged blasphemy by controversially depicting the sexual thoughts
and actions of Christ.
In order to easily recover the contents of an encrypted signal, the correct decryption
"key" is required. The key is an algorithm that "undoes" the work of the encryption
algorithm. Alternatively, a computer can be used in an attempt to "break" the cipher.
The more complex the encryption algorithm, the more difficult it becomes to infiltrate
communications without access to the key.
In recent years, a controversy has arisen over so-called "strong encryption". This
refers to ciphers that are essentially unbreakable without the decryption keys. While
most companies and their customers view it as a means of keeping secrets and
minimising fraud, some governments view strong encryption as a potential vehicle by
which terrorists might evade authorities. These governments (including the United
States), want to set up a key escrow arrangement. This means everyone who uses a
cipher would be required to provide the government with a copy of the key.
Decryption keys would be stored in a supposedly secure place, used only by
BIS2061 12 Unit 5
authorities, and used only if supported by a court order. Opponents of this scheme
argue that criminals could hack into the key escrow database and illegally obtain,
steal, or alter the keys. Supporters claim that while this is a possibility, implementing
the key escrow scheme would be better than doing nothing to prevent criminals from
freely using encryption/decryption.
The microprocessor and the Internet have created an information revolution that is
sweeping the globe. This revolution is putting information once available only to the
media, political and intellectual elite into the kitchens of ordinary people all across
America and opening previously locked cabinets in government, industry and
academe.
In short, the information revolution is empowering people; it is giving them the tools
and the information to make informed choices for themselves. People can more easily
exchange information with one another, buy, sell, discuss and decide among different
options. Already, e-mail exceeds regular mail usage by 10:1. Forrester Research
reports that $8 billion in goods and services were traded over the Internet in 1997; by
2002, 21 million homes will be doing online financial transactions worth $327 billion.
Essential to this commercial and personal communication is security. We want to
know that our information travels safely, without alteration or eavesdropping, and that
there is neither information theft nor identity fraud. Which means that we must
encrypt our data, so that only intended parties can access it.
The good news is that encryption technology is galloping forward. What was state of
the art a few years ago is now rear view mirror encryption. Today, 56 bit encryption,
with its 72 trillion combinations, is giving way to 128 bit encryption. A Canadian
company called Jaws Technology has a new technology with 4,096 bit encryption.
Cracking it, its creators say, would require the equivalent of hitting 1,000 consecutive
holes in one on the golf course from a 150-yard tee.
The bad news is that our government is demanding limits on encryption technology
and demanding access to all our encrypted messages -- financial, commercial and
ordinary e-mail. The government's efforts began with the Clipper Chip in 1993. The
Clipper Chip would have required encryption users to submit their encryption keys to
a government database. It met with such a hail of objections from technical and civil
liberties groups that it never came to pass, but the idea lives. The government
currently is seeking both the funding of a huge new encryption technology centre and
the means to access any computer communication individuals might generate.
BIS2061 13 Unit 5
The case against limits on encryption
It seems to me that all of this is wrongheaded, that these demands for government
access to our computer transmissions are based on three false assumptions.
§ The government can establish encryption standards. The truth is that encryption
technology is moving too rapidly for statutory law to keep up. For example, the
National Bureau of Standards at one point decided that the nation should have a
single 56 bit key encryption algorithm, an idea almost immediately obsolete as
technology went to 128 bit algorithms and higher
§ The idea that regulation can prevent criminals from acquiring unbreakable
encryption. The analogy here is a familiar one: Does anyone believe that gun
control laws - gun registration or prohibition of ownership, for example - will
keep guns out of the hands of criminals? Similarly, encryption strength ceilings,
key escrow or "trapdoors" in computer programs to allow government access will
limit personal and business usage by citizens and slow criminals not at all. The
international market is too accessible and its encryption offerings equally or more
sophisticated than U.S. technology
§ The idea that such regulations are cost-free to people using computer technology.
Key escrow and trapdoor systems would make encryption for U.S. businesses and
individuals less secure, more vulnerable and more easily broken. Weakening the
encryption security of American users is a not a policy in the national interest.
Forcing information vulnerabilities upon individuals and businesses is weakening
national security, not strengthening it
Most egregious in such encryption regulation is the massive invasion of civil liberties
it represents. The idea that various government agencies, from the FBI to health care
agencies, the IRS and the Justice Department, will have instant access to our Quicken
programs, e-mail and data transmissions is both dangerous and unsettling.
From Edmund Burke ‘people never give up their liberties but under some delusion’to
Woodrow Wilson ‘the history of liberty is a history of limitations of governmental
power, not the increase of it’, Americans have jealously guarded their freedom. The
next frontier of free speech will be the technology of encryption.
In the 18th century, the First Amendment was essential to guarding free speech.
Protecting the empowering technology of data transmission will be just as essential to
maintaining liberty in the 21st century.
BIS2061 14 Unit 5
9.2 No Right to Cryptography Export? Michael Stutz
The Pentagon's top civil servant said that no company has a "God-given right" to
export powerful American data scrambling technology that would allow foreign
nationals to communicate in total secrecy, according to information made public this
week. The then US Deputy Secretary of Defence John Hamre also told Fortune 500
company officials in a speech last week that the government was in talks with
Netscape Communications and other software firms about facilitating law
enforcement access, under court order, to scrambled information sent over the Net.
Hamre addressed the issue of cryptography export controls, long a thorn in the side of
Silicon Valley computer security companies. Industry leaders see the controls, which
strictly limit the export of strong data scrambling software and hardware, as
generating an unfair advantage for overseas competitors. But the Department of
Defence and intelligence agencies like the FBI and the National Security Agency
believe strong cryptography poses a threat to national security because it would
allegedly allow terrorists to communicate in secret.
Software industry leaders counter that such terrorists already have access to strong
encryption that has been developed overseas, ironically, a likely result of the US
policy. Hamre said:
‘I'd also ask American business not to make a campaign out of just trying to bust
through export controls as though somehow there was a God-given, inherent right to
send the strongest encryption to anybody in the world, no matter who they are, I don't
agree with that. I will never agree with that.’
The US government currently forbids the export of products with encryption stronger
than 56 bits unless they have key recovery, a means by which law enforcement, armed
with a court order, could recover the scrambled information. Civil liberties
organisations, such as the Electronic Frontier Foundation, have battled that plan for
years.
Hamre admitted that strong encryption was dangerous but also essential to protecting
the country's communications and enabling commerce and secure transmissions on
the Internet.
‘We have to protect ourselves in this environment and it's got to be with encryption
and some form of security management, key recovery in our case. But we're going to
make it voluntary.... It's something we all have to do, frankly, for the country.’
BIS2061 15 Unit 5
‘We've entered into contracts with a number of large houses to help us bring that
[voluntary key recovery] architecture. We'll get the first one running this fall with
Netscape, and hopefully, it'll be operational in October.’Netscape was unavailable for
comment. Hamre went on to say that 56-bit encryption was good enough for most
applications.
Earlier this month, the Electronic Frontier Foundation announced it had built a system
for less than US$250,000 that could crack a 56 bit encoded message in fewer than
three days. Despite his reservations about strong cryptography, which could protect
critical systems, Hamre said that the nation is currently wide open to attack
electronically.
Hamre admitted that the Defence Department is surprisingly vulnerable as well, since
most government communication is now conducted over commercial channels.
10. Summary
This unit has introduced some of the key concepts and issues that are invoked in the
Freedom on Speech debate related to computers and their associated network
technologies. You have been introduced to the debate, which is a classic tug of war
between advocates of limited free speech and supporters of unlimited Freedom of
Speech.
BIS2061 16 Unit 5