I've just finished reading Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion, by Hal Abelson, Ken Ledeen, and Harry Lewis, and it's another title worth adding to your tech policy reading list. The authors survey a broad swath of tech policy territory -- privacy, search, encryption, free speech, copyright, spectrum policy -- and provide the reader with a wonderful history and technology primer on each topic.
I like the approach and tone they use throughout the book. It is certainly something more than "Internet Policy for Dummies." It's more like "Internet Policy for the Educated Layman": a nice mix of background, policy, and advice. I think Ray Lodato's Slashdot review gets it generally right in noting that, "Each chapter will alternatively interest you and leave you appalled (and perhaps a little frightened). You will be given the insight to protect yourself a little better, and it provides background for intelligent discussions about the legalities that impact our use of technology."
Abelson, Ledeen, and Lewis aren't really seeking to be polemical in this book by advancing a single thesis or worldview. To the extent the book's chapters are guided by any central theme, it comes in the form of the "two basic morals about technology" they outline in Chapter 1:
The first is that information technology is inherently neither good nor bad -- it can be used for good or ill, to free us or to shackle us. Second, new technology brings social change, and change comes with both risks and opportunities. All of us, and all of our public agencies and private institutions, have a say in whether technology will be used for good or ill and whether we will fall prey to its risks or prosper from the opportunities it creates. (p. 14)
In that sense, most chapters discuss how technology and technological change can be both a blessing and a curse, but the authors are generally more optimistic than pessimistic about the impact of the Net and digital technology on our society. What follows is a quick summary of some of the major issues covered in Blown to Bits.
Privacy: In the chapter on privacy, the authors conclude that it is increasingly difficult to bottle up our personal information and protect it and ourselves entirely from the outside world. "Despite the very best efforts, and the most sophisticated technologies, we can not control the spread of our private information. And we often want information to be made public to serve our own, or society's purposes." (p. 70) They argue that there still may be some ways to deal with the misuse of information and that some new technologies might be able to help protect our privacy at the margins. Generally speaking, however, this is a losing battle, and, more importantly, there is an increasing tension between privacy and freedom of speech:
A continuing border war is likely to be waged, however, along an existing free speech front: the line separating my right to tell the truth about you from your right not to have that information used against you. In the realm of privacy, the digital explosion has left matters deeply unsettled. (p. 70)
Encryption: Having followed the "crypto wars" closely in the mid-1990s, I also found their chapter on cryptography intriguing. The authors note that encryption has gone mainstream. "Keys are cheap. Secret messages are everywhere on the Internet. We are all cryptographers now." Despite that, the authors note that "very little email is encrypted today." With the exception of some human rights groups and some particularly privacy-sensitive users, most of us are perfectly content to send our e-mails unencrypted. They argue that there are three reasons most people are unconcerned about their e-mail privacy:
First, there is still little awareness of how easily our e-mail can be captured as the packets flow through the Internet. [...] Second, there is little concern because most ordinary citizens feel they have little to hide, so why would anyone bother looking? [...] Finally, encrypted email is not built into the Internet infrastructure in the way encrypted web browsing is. (p. 191-92)
Overall, the public seems unconcerned about privacy of communication today, and that privacy fervor that permeated the crypto wars a decade ago is nowhere to be seen. In a very real sense, the dystopian predictions of both sides of that debate are being realized: On the one hand, encryption technology is readily available around the world, and people can hide the contents of their messages, just as law-enforcement feared... At the same time, the spread of the Internet has been accompanied by an increase in surveillance, just as the opponents of encryption regulation feared. (p. 193)
Importantly, however, the authors correctly note how the truly beneficial result of the fight for crypto-freedom was an explosion of online commerce, facilitated by behind-the-scenes crypto protecting our transactions. Amazon, eBay, and many other e-commerce vendors, both big and small, have prospered because of strong crypto. That was the security blanket many of us needed before we were willing to take the plunge and begin doing most of our shopping and financial transactions online. This is a great public policy success story, and Abelson, Ledeen, and Lewis do a wonderful job relaying it to the reader.
Online Free Speech / Age Verification: As a passionate First Amendment advocate, the chapter on free speech issues was also of great interest to me. The authors run through the early history of efforts to censor online speech, including the Communications Decency Act of 1996 (CDA) and the Child Online Protection Act of 1998 (COPA), and bring us right up to speed with congressional efforts such as the Deleting Online Predators Act (DOPA), which would ban social networking sites and services in publicly funded schools and libraries. "DOPA, which has not passed into law, is the latest battle in a long war between conflicting values," note the authors. "On the one hand, society has an interest in keeping unwanted information away from children. On the other hand, society as a whole has an interest in maximizing open communication." (p. 231)
Abelson, Ledeen, and Lewis go on to outline the dangers of online censorship and the importance of defending the First Amendment from new legislative and regulatory attacks, but they would have done well to cite the growing diversity of parental control tools and methods that are now on the market. I share their passion for defending free speech values, but it is equally important we work hard to show parents and policymakers how many effective self-help tools and strategies are out there on the market today to help them guide -- or even control -- their child's media and Internet experiences. Not everyone is equally excited about what a world of media abundance offers us, or out children. If we hope to continue to fend off attacks on the First Amendment, we have to make sure parents are empowered to mentor their kids and limit access to content they find objectionable so they don't expect Uncle Sam to play the role of national nanny.
I was glad to see the authors spend some time focusing on online age verification / identity authentication since that is probably the most important free speech debate raging today. [I've written quite a bit here about the battle over online age verification for social networking sites and other online sites.] The authors point out Congress already attempted to impose age verification on the Internet when they passed the Child Online Protection Act in 1998. "The big problem," the authors note, "was that these methods either didn't work or didn't even exist." (p. 248) Indeed, the effort in COPA to require "adult personal identification numbers" or a "digital certificate that verifies age" was in their words, "basically a plea from Congress for the industry to come up with some technical magic for determining age at a distance." (p. 248) And things really haven't advanced much since then, they argue:
In the state-of-the-art, however, computers can't reliably tell the if party on the other end of the communications link is a human or is another computer. For a computer to tell whether a human is over or under the age of 17, even imperfectly, would be very hard indeed. Mischievous 15-year-olds could get around any simple screening system that could be used in the home. The Internet just isn't like a magazine store. (p. 249)
Spectrum Policy: The authors point out how the death of media scarcity has profound implications for the future of speech regulation and spectrum policy alike. "As a society," they argue, "we simply have to confront the reality that our mindset about radio and television is wrong. It has been shaped by decades of the scarcity argument." (p. 292) Regarding what it means for speech controls, they note:
If almost anyone can now send information that many people can receive, perhaps the government's interest in restricting transmissions should be less than what it once was, not greater. In the absence of scarcity, perhaps the government should have no more authority over what gets said on radio and TV than it does over what gets printed in newspapers. (p. 261)
Other regulation of broadcast words and images should end. Its legal foundation survives no longer in the newly engineered world of information. There are too many ways for the information to reach us. We need to take responsibility for what we see, and what our children are allowed to see. And they must be educated to live in a world of information plenty. (p. 293)
These were facts of the technology of the time. They were true, but they were contingent truths of engineering. They were never universal laws of physics, and are no longer limitations of technology. Because of engineering innovations over the past 20 years, there is no practically significant "natural limitation" on the number of broadcast stations. Arguments from inevitable scarcity can no longer justify U.S. government denials of the use of the airwaves.
The vast regulatory infrastructure, built to rationalize use of the spectrum but much more limited radio technology, has adjusted slowly -- as it almost inevitably must: Bureaucracies don't move as quickly as technological innovators. The FCC tries to anticipate resource needs centrally and far in advance. But technology can cause abrupt changes in supply, and market forces can cause abrupt changes in demand. Central planning works no better for the FCC than it did for the Soviet Union. (p. 272)
Abelson, Ledeen, and Lewis also fail to sweat the details about how to handle the issue of incumbent spectrum users in the transition to their preferred commons-based model. That strikes me as a pretty big problem. They repeatedly mention how incumbents often seek to block beneficial spectrum reforms -- which is no doubt true on some occasions -- but that doesn't mean incumbent spectrum holders don't have legitimate rights in their existing allocations that should be honored. I would hope that, even if they wanted to go with a pure commons approach going forward, the authors would at least be willing to grandfather-in existing spectrum users. If the goal is to encourage them to vacate what they currently have, incentivize them with flexible use and resale rights. For example, for the right price, a lot of broadcast spectrum holders might be willing to give up their current allotment. Alternatively, if flexible use was allowed, they might deploy their spectrum for a different purpose. Unfortunately, both of these options are currently prohibited by the FCC's command-and-control regulatory system.
Overall, however, I enjoyed the spectrum chapter and found the history and technology primer in this chapter to be the best in the book.
Copyright: The authors have a strongly-worded chapter on copyright that generally argues for relaxing copyright protections. Interestingly, however, (unless I am missing something) I notice they don't offer their book for free download on their site. I'm always intrigued by copyright critics who refuse to put their own content online. Apparently, it's another case of 'copying is good for me, but not for thee.' Regardless, in their copyright chapter, they argue that:
The war over copyright and the Internet has been escalating for more than 15 years. It is a spiral of more and more technology that makes it ever easier for more and more people to share more and more information. This explosion is countered by a legislative response that brings more and more acts within the scope of copyright enforcement, subject to punishments that grow ever more severe. Regulation tries to keep pace by banning technology, sometimes even before the technology exists... If we cannot slow the arms race, tomorrow's casualties may come to include the open Internet and dynamic of innovation that fuels the information revolution. (p. 199)
They also spend a lot of time discussing DRM. I was surprised by their comment that, "Developers of DRM and trusted platforms may be creating effective technologies to control the use of information, but no one has yet devised effective methods to circumscribe the limits of that control." (p. 212) I must say, that does not seem to match up with the reality of the market we see around us today in which DRM systems are rapidly crumbling and being abandoned left and right.
I didn't agree with everything in Blown to Bits, such as their unfortunate call for Net neutrality regulation. Overall, however, I enjoyed the book and recommend it. The narrative can be a little disjointed at times, almost sounding like a series of e-mail exchanges between friends (which may have been the case since the book had three authors). But the text is very accessible and contains a great deal of useful information to bring you up to speed on the hottest tech policy debates under the sun. If the authors are smart, they'll throw the book online and update it periodically to keep it fresh. As I have found with my parental controls and Media Metrics reports, that's the only way to keep up with the frantic pace of change in the tech policy arena -- version your books like software and release periodic updates.
This book will definitely appear on my big, end-of-year "Most Important Tech Policy Books of 2008" list, which I should have wrapped up shortly. Also, I think this book makes a nice complement to Palfrey and Gasser's Born Digital, which I reviewed here last month. And, if you are interested in another title that takes an approach similar to what Abelson, Ledeen, and Lewis have taken here, you might want to check out Bruce Owen's outstanding 1999 book "The Internet Challenge to Television." It's an oldy but a goodie, as I noted here.
Finally, given the title of the book and the countless times in the text that Abelson, Ledeen, and Lewis talk about the "bits revolution," how "bits are bits," and how "bits behave strangely," shockingly, they never seem to get around to crediting Nicholas Negroponte for his pioneering work on this front in Being Digital. Long before anybody else gave a damn about how the movement from a world of atoms to a world bits would change our entire existence, Nicholas Negroponte was preaching that gospel to the unconverted. And considering he was saying all that back in the dark (dial-up) ages of 1995, the man deserves some credit, as I have noted here before.