Posted on 12/15/2003 4:36:41 AM PST by Happy2BMe
![]() Christoph Niemann for Newsweek
|
Issues 2004 - Picture, if you will, an information infrastructure that encourages censorship, surveillance and suppression of the creative impulse. Where anonymity is outlawed and every penny spent is accounted for. Where the powers that be can smother subversive (or economically competitive) ideas in the cradle, and no one can publish even a laundry list without the imprimatur of Big Brother. Some prognosticators are saying that such a construct is nearly inevitable. And this infrastructure is none other than the former paradise of rebels and free-speechers: the Internet.
advertisement |
Certainly John Walker believed all that. The hackerish founder of the software firm Autodesk, now retired to Switzerland to work on personal projects of his choosing, enjoyed unbounded optimism that the Net would not only offset the powers of industry and government but actually restore some previously threatened personal liberties. But in the past couple of years, he noticed a disturbing trend. Developments in technology, law and commerce seemed to be directed toward actually changing the open nature of the Net. And Internet Revisited would create opportunities for business and government to control and monitor cyberspace.
In September Walker posted his fears in a 28,000-word Web document called the Digital Imprimatur. The name refers to his belief that its possible that nothing would be allowed to even appear on the Internet without having a proper technical authorization.
How could the freedom genie be shoved back into the bottle? Basically, its part of a huge effort to transform the Net from an arena where anyone can anonymously participate to a sign-in affair where tamperproof digital certificates identify who you are. The advantages of such a system are clear: it would eliminate identity theft and enable small, secure electronic microtransactions, long a dream of Internet commerce pioneers. (Another bonus: arrivederci, unwelcome spam.) A concurrent step would be the adoption of trusted computing, a system by which not only people but computer programs would be stamped with identifying marks. Those would link with certificates that determine whether programs are uncorrupted and cleared to run on your computer.
The best-known implementation of this scheme is the work in progress at Microsoft known as Next Generation Secure Computing Base (formerly called Palladium). It will be part of Longhorn, the next big Windows version, out in 2006. Intel and AMD are onboard to create special secure chips that would make all computers sold after that point secure. No more viruses! And the addition of digital rights management to movies, music and even documents created by individuals (such protections are already built into the recently released version of Microsoft Office) would use the secure system to make sure that no one can access or, potentially, even post anything without permission.
The giants of Internet commerce are eager to see this happen. The social, economic and legal priorities are going to force the Internet toward security, says Stratton Sclavos, CEO of VeriSign, a company built to provide digital certificates (it also owns Network Solutions, the exclusive handler of the dot-com part of the Internet domain-name system). Its not going to be all right not to know whos on the other end of the wire. Governments will be able to tax e-commerceand dictators can keep track of whos saying what.
Walker isnt the first to warn of this ominous power shift. The Internets pre-eminent dean of darkness is Lawrence Lessig, the Stanford University guru of cyberlaw. Beginning with his 1999 book Code and Other Laws of Cyberspace, Lessig has been predicting that corporate and regulatory pressures would usurp the open nature of the Net, and now says that he has little reason to retract his pessimism. Lessig understands that restrictive copyright and Homeland Security laws give a legal rationale to total control, and also knows that it will be sold to the people as a great way to stop thieves, pirates, malicious hackers, spammers and child pornographers. To say we need total freedom isnt going to win, Lessig says. He is working hard to promote alternatives in which the law can be enforced outside the actual architecture of the system itself but admits that he considers his own efforts somewhat quixotic.
Does this mean that John Walkers nightmare is a foregone conclusion? Not necessarily. Certain influential companies are beginning to understand that their own businesses depend on an open Internet. (Google, for example, is dependent on the ability to image the Web on its own servers, a task that might be impossible in a controlled Internet.) Activist groups like the Electronic Frontier Foundation are sounding alarms. A few legislators like Sens. Sam Brownback of Kansas and Norm Coleman of Minnesota are beginning to look upon digital rights management schemes with skepticism. Courts might balk if the restrictions clearly violate the First Amendment. And there are pockets of technologists concocting schemes that may be able to bypass even a rigidly controlled Internet. In one paper published by, of all people, some of Microsofts Palladium developers, theres discussion of a scenario where small private dark nets can freely move data in a hostile environment. Picture digital freedom fighters huddling in the electronic equivalent of caves, file-swapping and blogging under the radar of censors and copyright cops.
Nonetheless, staving off the Internet power shift will be a difficult task, made even harder by apathy on the part of users who wont know what theyve got till its gone. Ive spent hundreds of hours talking to people about this, says Walker. And I cant think of a single person who is actually going to do something about it. Unfortunately, our increasingly Internet-based society will get only the freedom it fights for.
That day is now. Prior to 9/11, the gubmint really had no excuse for invasive activity in private correspondence (such as this) to the degree the Homeland Security Act now permits.
It's not when the control begins, it's how the gubmint will be able to do it.
They will require laws that mandate 100% participation by internet service providers for any and all private correspondences, financial transactions, etc. at a moment's notice.
Take for example the RIAA's endorsement by the gubmint to go after college kids for downloading music from the web.
That's how it will start, little - then more - then the web will be exactly that. A web of danger.
Welcome to Big Brother.
Behind two cascaded routers and a firewall. Places I connect to, including here, will always show some orginating IP of the pipeline I use to connect, but the numbers have nothing to do with the MAC numbers of my machines.
I am still at a loss as to what to do with some of the more sinister schemes for digital rights management, other than firewalling/muzzling Microsoft's Media Player.
But I can say that Microsoft Passport will never be used here.
Ha! "trusted" transactions, or "Trusted" anything, following the word "Microsoft"!
try posting the story about Lois Somerville of Florida here and see what happens!
The modem MAC addresses are recorded when issued and this leaves a very good means of tracking the origination of web traffic (along with IP addresses).
While this is fairly loose and still informal, how long will it be until permanent MAC addresses and static IPs are assigned to each machine?
Don't get me wrong, with terrorism, there must be a means to track these vermin down.
But we will all suffer because of it and it is looking more like the web will be the prototype for us losing our freedoms of speech.
As for Microsoft Passport, I was thinking of using it to communicate via webcam with our children so we can see our grandkids.
Is that not a good idea?
I've wondered about this.
How deep into M$ windoze do you think the feds are. I mean, do you think M$ coordinates windoze security updates to enable certain tracking features by the feds?
This would be unusual, but not impossible. And it would sure take the heat of antitrust suits against M$ off of them since they would then be considered basically aiding the gubmint in spying on people via their operating system.
Hmmm...
<*ding*> for that. And the day that you need it to get Windoze security updates is the day I start converting over to Linux.
Two machines running Red Hat Linux now, five to go.
Is that not a good idea?
You don't need it. I talk to my friends in Australia all the time using Netmeeting.
Likely, MS will do everything possible to convince you that you cannot live without it.
With enough motivation, Law Enforcement can always ID someone now, as it is. There is no true anonymity on the Net, already. So these "Authentification" or "Trusted" schemes have more to do with Commercial Control than anything else. MS wants the Internet. Read Bill Gates' "The Road Ahead", for example.
Unless they stifle the budding wireless access industry, the only way to track it will be by mac address. If that happens, look for a black market in "cloned" wireless cards, like they do with cell phones now.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.