Está en la página 1de 15

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.

info/ 0256595 Communication, Laws and regulations: Assessed essay

When, if at all, is it appropriate to regulate the internet?

Introduction:

The internet is the network linking computers on a worldwide scale. This net, as it is often called enables each computer user to interact with other computers through the existing telecommunications network (phone lines, satellite connections, cable), without consideration of distances or borders. This system, gave birth to the notion of Cyberspace, term created by the writer William Gibson in his book Neuromancer and defined as a consensual hallucination experienced daily by millions of legitimate operators, in every nation1. Peoples gain access to the cyberspace through an Internet Service Provider (ISP). Another good definition of the internet can as well be found in the words of James Gillies: The World Wide Web is like an encyclopaedia, a telephone directory, a record collection, a video shop, and Speakers Corner all rolled into one and accessible through any computer2. The terms internet, cyberspace and World Wide Web are nowadays synonyms but in fact are describing three different things. Internet is the

William Gibson, Neuromancer, Penguin books, 1999. James Gillies and Robert Cailliau, How the web was born, Oxford University Press, 2000, p. 1.

This document was downloaded from Coursework.Info - The UK's Coursework Database 1 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 network, the hardware used to link computers together. The cyberspace is the border-free virtual territory created by this network and the WWW is a service accessible on the net. However, in the following essay, these words will be used as synonyms for the expression the use of internet appeals to the accessibility of the content and mainly to the notion of cyberspace. The internet differs from the other types of mass media (TV, radio, newspaper) for it is possible for all users to publish any kind of content. These various contents can be hosted by any ISP. The humongous size of the internet (approximatively 2 billion of publicly accessible web pages3), its exponential growth and the liberated environment it represent make it very difficult to exert any kind of control on the content of the broadcast. Everything is more or less available on internet sites, from e-business to child pornography. This easy availability of any kind of material, including illegal or offending content (child and adult pornography, racial abuses, recipe books for wannabe terrorists, breaches of copyrights, etc) has led to a huge pressure for more control or regulation. Nevertheless, opinions are split on the subject for internet have always been seen by a majority of users as a territory of complete freedom. Moreover, internet regulations can also be used by dictatorships to censor freedom of information, argument that has always been used by the strong supporters of an unregulated Web. Tim Berners-Lee, creator of the World Wide Web describe the nature of its invention as a vision encompassing the decentralized, organic growth of ideas, technology, and society it is a vision that provides us with new freedom, allows us to
3

See

This document was downloaded from Coursework.Info - The UK's Coursework Database 2 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 grow faster than we ever could when we were fettered by the hierarchal classification systems into which we bound ourselves4. No need then to say that the very idea of regulating the use of internet (which is majoritarily conducted through access to the World Wide Web) would tend to restrain that vision. Those who argue that regulating the internet would be indesirable join this opinion saying that its unregulated nature, along with low entry costs, has encouraged commercial and social innovation and self-expression5. The question to know when, if at all, it is appropriate to regulate the use of internet can only be answered to by a study of the already evoqued nature of the internet, the culture it gave birth to, and the risks society is facing in front of the emergence of this brand new medium. A closer look to the regulatory options available can also help one reckoning to what extent regulation is desirable.

I-

The nature of the internet:

Internet is the fabric of our lives it has the ability to distribute the power of information throughout the entire realm of Human activity6 and to paraphrase Manuel Castells opening title: the network is the message. As all networks, internet has the particularity to be anarchical, adaptable and very flexible. As all networks, its growth is
4

Tim Berners-Lee, Weaving the Web, Orion Business Books, 1999. See Manuel Castells, The internet galaxy, Oxford University Press, 2001, Opening Chapter.

This document was downloaded from Coursework.Info - The UK's Coursework Database 3 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 powered by the contribution of all its users, a fact that makes this growth virtually uncontrollable. This growing process refers not only to the size of the net but also to its content. As acknowledged supra, it is possible to find virtually anything on the internet. As a result, the upgrades and eases brought to us by the Information Highways are affecting every aspect of our lives and of our societies. Education, consumption, entertainment and of course deviances. The existence of this network raises specific societal issues linked to morality, equality of access, freedom of expression and of information, territoriality and disappearance of borders and propriety of such a social Pandora box. The perfect illustration of that set of concern is lurking under the words of Kurt Anderson: Starting with baby boomers, the big idea is getting whatever you want right this second, now. TV 24 hours a day, sex, drugs all of that so the web delivers in spades - books now, CDs now, flowers and groceries now, stocks, data, letters, anything I want I can get now, all of the time by tapping a button7. The nature of the internet is responsible for its huge impact on our societies. Yet these societies are managed by politics throughout the use of norms. In many ways, internet, by its development free of rules and the changes it induced, allows people to bypass these norms. This is the main risk. Internet can be described as anonymous, uncontrollable and interactive.

Kurt Anderson, Turn of the Century, quoted in Penelope Lawrence, Law on the internet, Sweet &

Maxwell, 2000, p. 9.

This document was downloaded from Coursework.Info - The UK's Coursework Database 4 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 Anonymity is granted on the internet because it is virtually impossible to locate with precision its users. Of course, this anonymity is not granted by the omission of ones name and address or the use of aliases. By using a computer at his home or office, a user can be still identified. But the truth is that all one needs to get connected is a computer, a modem, a connection (phone line, cable, etc) and an access (i.e. a provider). And technology as well as access to public computers can help the wannabe anonymous user to wipe out all possibilities to be identified. Moreover, the volume of online communications is a true obstacle to the identification process. Interactivity can be seen as the reason of the existence of the internet. Indeed, the main purpose of this global network is the transit of data stored in the computers that are constituting the network. Internet is, at last, uncontrollable. Of course, the access to the hardware and its propriety (cables, satellites, lines) can allow shut down of sites or entire domains, but by doing so, no real control is gained. On the one hand, creating, duplicating or renaming a site is very easy. On the other hand harshest measures (suppression of servers or domain parts, closing of gateways) are not really foreseeable because of being undiscriminating. Once again, the size of the net is an obstacle. Some countries tried to find control in engaging the liability of the provider. But it is very unrealistic to assume that providers will have the opportunity to check the content of each hosted site and the ability to provide an effective way of filtering offending material only. And, of course, it is easy to find a provider from a country with a different legislation: governments could do little to

This document was downloaded from Coursework.Info - The UK's Coursework Database 5 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 control communication flows able to circumvent geography and thus political boundaries8

II-

The risks resulting from the existence of internet.

The audacious Prometheus, according to Greek mythology stole the fire from the Olympic Gods. When Zeus saw the glow of fire on earth, he became very angry and punished humanity by sending Pandora. She carried a mysterious box and when she could not control her curiosity, she opened it. All the disasters and plagues that were in the box spread around the world.the myth warns us that progress exacts a price: the anger of Zeus. Technology inevitably brings great benefits and awesome risks9. As is as been said supra, Internet offers brand new opportunities to infringe the law (For example, according to CBS, internet crime is the fastest growing crime in the US10).Those new opportunities should not be seen as being born of the emergence of internet, for mostly all online offences or crimes already exist and existed before the creation of the net. Except maybe for the concept of hacking, internet only offers a new and easier way to breach the law as well as possibilities to escape the usual punishment for those breaches. Of course, it would be impossible and useless to try to list the different kind of internet crimes. But a general pattern can be found.
8

Manuel Castells, The internet galaxy, Oxford University Press, 2001, p.168. Cees J. Hamelink, The Ethics of Cyberspace, Sage Publications, 2000, p.1 see www.CBSnews.com

10

This document was downloaded from Coursework.Info - The UK's Coursework Database 6 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 Internet ignores boundaries. From his room, office, etcone can reach the other side of the world. This idea is very enjoyable, except when it comes to cyber crime. Indeed, physical borders between states have always determined which set of normative rules apply to individual behaviour11. Of course, laws apply online in the same way they do offline, but the international nature of the internet takes the crimes outside national jurisdictions. In fact, it is not only that a user from a country can infringe the laws of another country, but more the idea that the crime is committed on an imaginary soil: the Cyberspace. The only acceptable (but still fictional) projection of geographical concepts on this imaginary territory is to assimilate it to the whole world but a world in which no borders would exist. Governments have tried to ignore that fact, trying to regulate the accessibility of certain materials from their countries. But with no success at all, except maybe in dictatorships (accessing forbidden material in China has been so far sanctioned by 2 to 4 years of imprisonment12) for it is hardly possible to exert such a control without breaches of Human Rights (freedom of expression and of information). This border free environment is triggering a great demand for a set of international rules on the internet, indeed a much more realistic solution for the purpose of regulating cyberspace.

11

Jeroen Van Den Hoven, The internet and varieties of moral wrongdoing, in Duncan Langford, Internet

ethics, Macmillan Press, 2000, p. 129.


12

Internet in China in www.hrw.org

This document was downloaded from Coursework.Info - The UK's Coursework Database 7 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 A corollary of this absence of boundaries and of diversity of legislations is that it becomes impossible for an internet user to know if the material he dispatches on internet is not illegal somewhere. In fact, with the already quoted example of China, but also Saudi Arabia or Singapore, it actually is nearly impossible not to breach a set of laws when broadcasting material on internet. For example, who knows what impact consulting a syllabus of Human Rights law accessible on a Dutch university site can have on the life and freedom of a Chinese student? Not to talk about moral norms: it might be impossible to surf internet chat rooms without offending someone for such reasons as cultural differences. Amongst the most common breaches of the law on internet, three different kinds must be more closely studied. On the one hand, there are the breaches of privacy. According to American statistics, online, every 79 seconds, a thief steals someone identity, open accounts in the victims name and goes on a buying spree13. Another example is to be found in so-called petitions distributed throughout the web, under false reasons, in order to collect peoples personal information. For example, at the edge of the war in Iraq, a UN petition circulated, forcing the UN to open a site denying that they were using internet for the purpose of petitioning14. The same concern occurs with e-commerce and internet consumers. More than just being flooded by publicity, it is about the legitimate fear that companies may gather and sell personal data to others companies, turning these data into a commercial good. Of course, if the only
13

quoted in www.tecrime.com

14

This document was downloaded from Coursework.Info - The UK's Coursework Database 8 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 material sold is somebodys address no real harm is caused. But it can be medical data, credit card numbers, insurance numbers or information, etc15A good example of the foreseeable extremities such behaviour can trigger is to be found in Bruce Sterlings fictions16. On the other hand, the second types of cyber crimes are the breaches of copyrights, patents or trademarks. Indeed because internet purpose is the transfer of information on a wide scale, the data protected by the rules of intellectual property are not safe. Lets consider a set of practical examples: if a person buys a book, nothing can really impeach that person to scan it and make it available for all internet users. The problem is even more acute with video material because in this case, the buyer is not even facing the deterrent task of scanning several hundred pages. For example, the worldwide expected movie Matrix reloaded17 is to be released the 21.05.2003 but is already available on the internet. But the problem is much more serious with music. Two creations are at the origin of a revolution in the domain of music piracy. The first one, a new standard of compression called MP3 divides by twenty the storing space necessary for music, allowing users to stock hours of music on their hard drives (on average, five megabytes are needed for a 3 minute song and hard drives now have an average capacity of twenty to forty gigabytes). The second one is a new generation of sites initiated by a site called Napster. The principle of these sites is to allow their
15

Tim Berners-Lee, Weaving the Web, Orion Business Books, 1999, Chap.11. Bruce Sterling, Islands in the Net, or also, Mozart in mirror shades, Penguin Books. The Waschowsky Brothers, Matrix Reloaded, Warner Bros., 2003.

16

17

This document was downloaded from Coursework.Info - The UK's Coursework Database 9 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 members to put in common their hard drives: if a user is looking for a song, he launches an inquiry about the title of that song and will have access to all the hard drives on which the song is stored. Moreover, the song can be downloaded from several hard drives at the same time, consequently reducing the required downloading time. Associated with the propagation of CD recorders, Napster transformed a marginal crime (piracy) into an everyday habit amongst internet users (at its peak, Napster had over 80 million registered users18). Napster faced an US legal action and was forced to quit with peer-to-peer file sharing (as it is called). But the damage was done: other sites are opening every day (the most frequented one is now Casa19). Finally, the last category of cyber crimes is linked with child abuses, most of the time, sexual abuses. In America, 95% of the schools are connected to internet. Over 45 million of children ages 10 to 17 are internet user. Among them: One in five has been sexually solicited. One in four has encountered unwanted pornography. Almost 60% have received an e-mail or an instant message from a stranger and half have communicated back. Over 75% of internet crimes involving sexual solicitations of children and exposure to unwanted pornography is not reported to police or parents. Those statistics have to be associated with crimes that are not taking place on the internet but are triggered by a cyber encounter: the site teCrime.com reports the story of a 1318

19

This document was downloaded from Coursework.Info - The UK's Coursework Database 10 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 year-old Connecticut girl [who] was found murdered after she agreed to meet a 21-yearold married man she had met on the internet or the story of an undercover police officer pretending to be a teenager on internet whose arrest record of internet paedophiles is regrettably impressive20. There is, of course a lot of other cyber crimes but these are the most common ones. On the internet, another category of criminals are reaching a quasi-mythological status: the hackers. High-tech pirates, the hackers have for commitment breaching every kind of computerized security protocols. From the algorithm protecting credit cards (and creation of yes-cards always accepted and credited by the cash machines) to the confidential files of the CIA or the FBI (see the Kevin Mitnick case) hackers are turning the cyberspace into a security-free area in a nihilistic frenzy. Despite the legend rapidly growing around their prowess, Hacking remains a marginal and dangerous activity which, most of the times, brings the hacker in the grasp of justice.

III-

The potential course of action for regulating the internet: a clash of various conceptions.

The debate on regulating the internet triggers a wide range of reactions. From partisans of the auto-regulation opposed to any kind of state regulation, to the advocates of a statecontrolled internet. The cyberspace itself became the battlefield of an ideological feud
20

for the statistics as well as the crime reports, see www.tecrime.com

This document was downloaded from Coursework.Info - The UK's Coursework Database 11 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 involving all these actors21. Strong arguments are being waved by the adversaries of the regulation. They stress out that by the liberty internet enjoys, it became the closest form of democracy ever known to mankind; the ideal platform for independent thought, freedom of expression and critical analysis of the issues of the day free from the fetters of national restrictions. According to this group of people, any regulation whatsoever, would destroy this climate22. The problem is effectively that believing internet can be auto-regulated is merely a utopia. Abuses will not disappear because of the good will of the users. This utopia will not become a reality even sustained by charters as Virginia Sheas ten commandments23: Remember the human. Adhere to the same standards online that you follow in real life. Know where you are in cyberspace. Respect other peoples time and bandwidth. Make yourself look good online. Share expert knowledge. Help keep flame wars under control. Respect other people privacy. Dont abuse your power.

21

see sites like hands off the internet, www.handsoff.org anonymous in www.pachome1.pacific.net.seg Virginia Shea is quoted by Jeroen Van Den Hoven, The internet and varieties of moral wrongdoing, in

22

23

Duncan Langford, Internet ethics, Macmillan Press, 2000, p. 129.

This document was downloaded from Coursework.Info - The UK's Coursework Database 12 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 Be forgiving of other peoples mistakes. The opponents of such a theory are arguing that any medium where human interaction is rife has to be subject to laws and regulations to prevent the abuse of the medium by those who seek to mislead and take advantage of other users 24. To the argument of total democracy, they oppose the need of making the net a safer place in order to allow the rise of internet as a commercial medium. The uneasy task will be to try to avoid stifling a medium still very much in its infancy. There are 5 different standards of norms applicable to the internet, corresponding to 5 different types of regulators25: The actor himself, submitted to personal ethics, inflicting self-sanctions. Second party controllers (i.e. the person act upon), ruling according to contractual provisions, facing self-help mechanisms as sanctions, thanks to filter software, etc Social forces can also be regulators, regulating with social norms, inflicting social sanctions included in a code of conduct. Hierarchally organised Non-governmental organisations can be in charge too, setting organisation rules prescribing organisation sanctions, by industry self regulation.

24

anonymous in www.pachome1.pacific.net.seg ibid.

25

This document was downloaded from Coursework.Info - The UK's Coursework Database 13 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595 At last, the ultimate regulators can be the states, relying on law as substantive rule and mechanism of regulation, whose non-respect can then be sanctioned by state enforcement and coercive sanctions26. At last, the problem of regulating the internet relies heavily on the different kind of filters that can be used to control the accesses to cyberspace or the content of internet. There are 6 different kinds of filters: Filters that use a pre-selected list of sites: a very regularly updated list of site allows access to these sites only. Keyword based filters: the engines search the sites for keywords and ban the access if a keyword is found. Rating based filters: A coded label is placed on each web site, which describes its content. Blocking outgoing information: these tools control the uploading of information. Positive content filters: search engines are configured to return list of sites but of unobjectionable content. Monitoring: programs are recording online activity and send a signal to an organism if objectionable sites are found: the Internet Service Provider is then asked to shut the site down and the authorities are alerted27.

26

anonymous quoted in www.iso.org/isoc/whatis/conferences/inet/97

27

This document was downloaded from Coursework.Info - The UK's Coursework Database 14 - http://www.coursework.info/

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 0256595

Conclusion:

As a conclusion, it can be said that regulating internet is a really complex issue for the network is still in its infancy and because for the first time a completely new set of rules is to come. Indeed, despite the pre-existence (under a different form) of the activities available online, the existing regulations of those activities are not fitting the very nature of internet. It is however possible to say that internet should not be left unregulated for it is a powerful and potentially harmful tool. The principal feature of the network, an incredible stream of freedom must still remain be preserved, for it has powered the exponential growth of the cyberspace, the constancy of social and technological innovations, and the birth of the first universal link between wired humanity. A balance is to be found between freedom and control to avoid this overwhelming freedom being its first victim or to see internet turned into a new frontier of totalitarism as it is in some countries.

This document was downloaded from Coursework.Info - The UK's Coursework Database 15 - http://www.coursework.info/

También podría gustarte